CN104954361A - Contact person verification method, device and system - Google Patents
Contact person verification method, device and system Download PDFInfo
- Publication number
- CN104954361A CN104954361A CN201510201426.8A CN201510201426A CN104954361A CN 104954361 A CN104954361 A CN 104954361A CN 201510201426 A CN201510201426 A CN 201510201426A CN 104954361 A CN104954361 A CN 104954361A
- Authority
- CN
- China
- Prior art keywords
- verification
- terminal
- picture
- audio information
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012795 verification Methods 0.000 title claims abstract description 445
- 238000000034 method Methods 0.000 title claims abstract description 91
- 230000006870 function Effects 0.000 claims description 35
- 230000000977 initiatory effect Effects 0.000 claims description 21
- 230000008569 process Effects 0.000 claims description 21
- 238000012545 processing Methods 0.000 claims description 21
- 230000001960 triggered effect Effects 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 abstract 1
- 238000004891 communication Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 16
- 238000005516 engineering process Methods 0.000 description 8
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention relates to a contact person verification method, device and system, and belongs to the technical field of network. The method comprises that when a conversation request is received, a first subscriber ID and a face image of a corresponding contact person corresponding to the conversation request is obtained; a verification request which includes the first subscriber ID and the face image is sent to the server, so that the server receives a verification image sent from a first terminal to which the first subscriber ID belongs, and the verification image is verified according to the face image; when a verification pass message sent from the server is received, conversion connection with the first terminal is established; and stored preset audio information corresponding to the first subscriber ID is sent to the first terminal. After the server verifies the identity of a present subscriber of the first terminal, a second terminal sends preset audio information to the first terminal, the privacy of the subscriber is protected, and the preset audio information is avoided from leakage.
Description
Technical Field
The present disclosure relates to the field of network technologies, and in particular, to a method, an apparatus, and a system for contact verification.
Background
With the development of information technology, the functions of the terminal are more and more perfect, but the call function is still widely applied as the basic function of the terminal, and many users can use the terminal to answer the call of a contact person or make a call to the contact person.
In daily life, a user may be busy in a meeting or the like, and at this time, if a contact makes a call, the user is inconvenient to get on the call. Then, in order to ensure that the user can communicate with the contact person even when the user can not make a call, the terminal can provide a function of automatically playing the recording, the user can start the function of automatically playing the recording, record a section of audio information on the terminal in advance, and determine the contact person needing to play the audio information when the user makes a call. In the subsequent process, when the contact makes a call, the terminal can automatically put through the call and play the audio information recorded by the user, so that the contact can listen to the audio information.
Disclosure of Invention
In order to solve the problems in the related art, the disclosure provides a contact person verification method, device and system. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a contact verification method, the method including:
when a call request is received, acquiring a first user identification and a face picture of a contact corresponding to the call request;
sending a verification request to a server, wherein the verification request carries the first user identification and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identification is located, and verifies the verification picture according to the face picture;
when receiving a verification passing message sent by the server, establishing call connection with the first terminal;
and sending preset audio information stored corresponding to the first user identification to the first terminal, so that the first terminal plays the preset audio information.
In another embodiment, after sending the preset audio information stored corresponding to the first user identifier to the first terminal, the method further includes:
and when the first terminal finishes playing the preset audio information, disconnecting the call connection with the first terminal.
In another embodiment, the obtaining a first user identifier and a face picture of a contact corresponding to a call request when the call request is received includes:
when the call request is received, acquiring a first user identifier corresponding to the call request;
judging whether preset audio information corresponding to the first user identification is stored or not;
and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
In another embodiment, the obtaining a first user identifier and a face picture of a contact corresponding to a call request when the call request is received includes:
when the call request is received, judging whether a contact person verification function is activated or not;
and if the contact person verification function is activated, acquiring the first user identification and the face picture.
In another embodiment, the method further comprises:
when receiving a verification failure message sent by the server, rejecting the call request; or,
when receiving a verification failure message sent by the server, establishing call connection with the first terminal, sending verification failure audio information to the first terminal, and disconnecting the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
In another embodiment, the method further comprises:
displaying a call recording setting interface;
when a recording setting instruction is received on the call recording setting interface, preset audio information is acquired;
when a contact person setting instruction is received on the call record setting interface, acquiring a designated contact person selected from a contact person list;
and correspondingly storing the preset audio information and the user identification of the designated contact.
According to a second aspect of embodiments of the present disclosure, there is provided a contact verification method, the method comprising:
receiving a verification request sent by a second terminal, wherein the verification request comprises a first user identifier and a face picture of a contact person, and the verification request is triggered by a call request received by the second terminal;
sending a verification instruction to a first terminal where the first user identification is located, so that the first terminal obtains a verification picture of the contact person when receiving the verification instruction;
when a check picture sent by the first terminal is received, judging whether the check picture is matched with the face picture;
if the verification picture is matched with the face picture, sending a verification passing message to the second terminal;
and if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal.
In another embodiment, the determining whether the verification picture is matched with the face picture when the verification picture sent by the first terminal is received includes:
when a check picture sent by the first terminal is received, acquiring the shooting time of the check picture;
calculating the time interval between the shooting time of the verification picture and the current time;
if the time interval is larger than a preset threshold value, sending a verification failure message to the second terminal;
and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
According to a third aspect of the embodiments of the present disclosure, there is provided a contact verification method, the method including:
receiving a verification instruction sent by a server in the process of initiating a call request to a second terminal;
acquiring a check picture of a current user;
sending the check picture to the server, so that the server verifies the check picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
and when the call connection with the second terminal is established, receiving preset audio information sent by the second terminal, and playing the preset audio information.
In another embodiment, the obtaining the verification picture of the current user includes:
shooting the current user to obtain the verification picture; or,
and selecting the verification picture from the stored pictures.
According to a fourth aspect of embodiments of the present disclosure, there is provided a contact verification apparatus, the apparatus comprising:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a first user identifier and a face picture of a contact corresponding to a call request when the call request is received;
the first sending module is used for sending a verification request to a server, wherein the verification request carries the first user identifier and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identifier is located, and verifies the verification picture according to the face picture;
the connection establishing module is used for establishing call connection with the first terminal when receiving a verification passing message sent by the server;
the second sending module is further configured to send preset audio information stored in correspondence with the first user identifier to the first terminal, so that the first terminal plays the preset audio information.
In another embodiment, the apparatus further comprises:
and the connection disconnection module is used for disconnecting the call connection with the first terminal when the first terminal finishes playing the preset audio information.
In another embodiment, the obtaining module is further configured to obtain a first user identifier corresponding to the call request when the call request is received; judging whether preset audio information corresponding to the first user identification is stored or not; and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
In another embodiment, the obtaining module is further configured to determine whether a contact verification function is activated when the call request is received; and if the contact person verification function is activated, acquiring the first user identification and the face picture.
In another embodiment, the apparatus further comprises:
the first processing module is used for rejecting the call request when receiving a verification failure message sent by the server; or,
and the second processing module is used for establishing call connection with the first terminal when receiving the verification failure message sent by the server, sending verification failure audio information to the first terminal, and disconnecting the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
In another embodiment, the apparatus further comprises:
the display module is used for displaying a call recording setting interface;
the setting module is used for acquiring preset audio information when a recording setting instruction is received on the call recording setting interface;
the setting module is further used for acquiring a designated contact person selected from the contact person list when a contact person setting instruction is received on the call record setting interface;
and the storage module is used for correspondingly storing the preset audio information and the user identification of the designated contact.
According to a fifth aspect of embodiments of the present disclosure, there is provided a contact verification apparatus, the apparatus including:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is used for receiving a verification request sent by a second terminal, the verification request comprises a first user identifier and a face picture of a contact person, and the verification request is triggered by a call request received by the second terminal;
the sending module is used for sending a verification instruction to a first terminal where the first user identifier is located, so that the first terminal obtains the verification picture of the contact person when receiving the verification instruction;
the judging module is used for judging whether the check picture is matched with the face picture or not when the check picture sent by the first terminal is received;
the sending module is further configured to send a verification passing message to the second terminal if the verification picture is matched with the face picture;
the sending module is further configured to send a verification failure message to the second terminal if the verification picture is not matched with the face picture.
In another embodiment, the determining module is further configured to obtain shooting time of the verification picture when the verification picture sent by the first terminal is received; calculating the time interval between the shooting time of the verification picture and the current time; if the time interval is larger than a preset threshold value, sending a verification failure message to the second terminal; and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
According to a sixth aspect of embodiments of the present disclosure, there is provided a contact verification apparatus, the apparatus comprising:
the receiving module is used for receiving a verification instruction sent by the server in the process of initiating a call request to the second terminal;
the acquisition module is used for acquiring a verification picture of a current user;
the sending module is used for sending the verification picture to the server, so that the server verifies the verification picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
the receiving module is further configured to receive preset audio information sent by the second terminal when a call connection is established with the second terminal;
and the playing module is used for playing the preset audio information.
In another embodiment, the obtaining module is further configured to shoot the current user to obtain the verification picture; or, the verification picture is selected from a plurality of stored pictures.
According to a seventh aspect of the embodiments of the present disclosure, there is provided a contact verification apparatus, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a call request is received, acquiring a first user identification and a face picture of a contact corresponding to the call request;
sending a verification request to a server, wherein the verification request carries the first user identification and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identification is located, and verifies the verification picture according to the face picture;
when receiving a verification passing message sent by the server, establishing call connection with the first terminal;
and sending preset audio information stored corresponding to the first user identification to the first terminal, so that the first terminal plays the preset audio information.
According to an eighth aspect of the embodiments of the present disclosure, there is provided a contact verification apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a verification request sent by a second terminal, wherein the verification request comprises a first user identifier and a face picture of a contact person, and the verification request is triggered by a call request received by the second terminal;
sending a verification instruction to a first terminal where the first user identification is located, so that the first terminal obtains a verification picture of the contact person when receiving the verification instruction;
when a check picture sent by the first terminal is received, judging whether the check picture is matched with the face picture;
if the verification picture is matched with the face picture, sending a verification passing message to the second terminal;
and if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal.
According to a ninth aspect of the embodiments of the present disclosure, there is provided a contact verification apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a verification instruction sent by a server in the process of initiating a call request to a second terminal;
acquiring a check picture of a current user;
sending the check picture to the server, so that the server verifies the check picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
and when the call connection with the second terminal is established, receiving preset audio information sent by the second terminal, and playing the preset audio information.
According to a tenth aspect of embodiments of the present disclosure, there is provided a contact verification system, the system comprising: the system comprises a first terminal, a second terminal and a server;
the first terminal is used for sending a call request to the second terminal;
the second terminal is used for acquiring a first user identifier and a face picture of a contact corresponding to the call request when receiving the call request, and sending a verification request to a server, wherein the verification request carries the first user identifier and the face picture;
the server is used for sending a verification instruction to the first terminal when receiving the verification request;
the first terminal is further used for acquiring a verification picture when the verification instruction is received, and sending the verification picture to the server;
the server is also used for judging whether the check picture is matched with the face picture or not when the check picture is received; if the verification picture is matched with the face picture, sending a verification passing message to the second terminal; if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal;
the second terminal is further used for establishing a call connection with the first terminal when receiving a verification passing message sent by the server, and sending preset audio information stored corresponding to the first user identifier to the first terminal;
and the first terminal is used for playing the preset audio information when receiving the preset audio information.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the method, the device and the system provided by the embodiment, when the second terminal receives a call request, the face picture corresponding to a contact person is obtained, and a verification request is sent to the server, so that the server verifies the verification picture of the first terminal initiating the call request according to the face picture, when the verification is passed, the user currently initiating the call request on the first terminal is determined to be the contact person, the second terminal establishes call connection with the first terminal, preset audio information is sent to the first terminal, and the first terminal plays the preset audio information. After the server verifies the identity of the current user of the first terminal, the second terminal sends preset audio information to the first terminal, privacy of the user of the second terminal is protected, and leakage of the preset audio information is avoided.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating a method of contact verification in accordance with an exemplary embodiment;
FIG. 2 is a flow diagram illustrating a method of contact verification in accordance with an exemplary embodiment;
FIG. 3 is a flow diagram illustrating a method of contact verification in accordance with an exemplary embodiment;
FIG. 4 is a flow diagram illustrating a method of contact verification in accordance with an exemplary embodiment;
FIG. 5 is a block diagram illustrating a contact verification apparatus in accordance with an exemplary embodiment;
FIG. 6 is a block diagram illustrating a contact verification apparatus in accordance with an exemplary embodiment;
FIG. 7 is a block diagram illustrating a contact verification apparatus in accordance with an exemplary embodiment;
FIG. 8 is a block diagram illustrating an apparatus for contact verification in accordance with an exemplary embodiment;
FIG. 9 is a block diagram illustrating an apparatus for contact verification in accordance with an exemplary embodiment;
FIG. 10 is a block diagram illustrating a contact verification system in accordance with an exemplary embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, the present disclosure is described in further detail below with reference to the embodiments and the accompanying drawings. The exemplary embodiments and descriptions of the present disclosure are provided herein for illustration of the present disclosure, but not for limitation of the present disclosure.
Before the embodiments of the present disclosure are explained in detail, first, taking a first terminal and a second terminal as an example, a call process between the two terminals is explained as follows:
the first terminal can send a call request to the second terminal, and the second terminal displays an answering option and a hang-up option when receiving the call request. At this time, the second user may select the hang-up option, trigger a rejection operation for the call request, and then reject the call request by the second terminal.
Or the second user can select the answering option to trigger the answering operation of the call request, and then the second terminal establishes a call connection with the first terminal, and the first user and the second user can carry out a call through the call connection. In the process of communication, the first terminal and the second terminal can both display hang-up options, when the first user selects the hang-up option on the first terminal, the first terminal disconnects the communication connection with the second terminal, or when the second user selects the hang-up option on the second terminal, the second terminal disconnects the communication connection with the first terminal.
The first user sends out audio information in the process of communicating with the second user, the first terminal obtains the audio information of the first user and sends the audio information to the second terminal through the communication connection, the second terminal receives the audio information sent by the first terminal and plays the audio information, and then the second user can hear the audio information of the first user.
The embodiment of the disclosure provides a method, a device and a system for verifying a contact person, and the disclosure is described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a contact verification method according to an exemplary embodiment, which is used in a terminal, as shown in fig. 1, and includes the following steps:
in step 101, when a call request is received, a first user identifier and a face picture of a contact corresponding to the call request are obtained.
In step 102, a verification request is sent to a server, where the verification request carries the first user identifier and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identifier is located, and verifies the verification picture according to the face picture.
In step 103, when receiving the verification passing message sent by the server, establishing a call connection with the first terminal.
In step 104, preset audio information stored corresponding to the first user identifier is sent to the first terminal, so that the first terminal plays the preset audio information.
In the method provided by the embodiment, when a call request is received, a face picture corresponding to a contact person is obtained, and a verification request is sent to a server, so that the server verifies a verification picture of a first terminal initiating the call request according to the face picture, and when the verification is passed, if it is determined that a user currently initiating the call request on the first terminal is the contact person, a call connection is established between the home terminal and the first terminal, and preset audio information is sent to the first terminal. After the identity of the current user of the first terminal is verified, the preset audio information is sent, so that the privacy of the user is protected, and the preset audio information is prevented from being leaked.
In another embodiment, after sending the preset audio information stored corresponding to the first user identifier to the first terminal, the method further includes:
and when the first terminal finishes playing the preset audio information, disconnecting the call connection with the first terminal.
In another embodiment, when a call request is received, acquiring a first user identifier and a face picture of a contact corresponding to the call request, including:
when the call request is received, acquiring a first user identifier corresponding to the call request;
judging whether preset audio information corresponding to the first user identification is stored or not;
and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
In another embodiment, when a call request is received, acquiring a first user identifier and a face picture of a contact corresponding to the call request, including:
when the call request is received, judging whether a contact person verification function is activated or not;
and if the contact person verification function is activated, acquiring the first user identification and the face picture.
In another embodiment, the method further comprises:
when receiving the authentication failure message sent by the server, rejecting the call request; or,
when receiving the verification failure message sent by the server, establishing call connection with the first terminal, sending verification failure audio information to the first terminal, and disconnecting the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
In another embodiment, the method further comprises:
displaying a call recording setting interface;
when a recording setting instruction is received on the call recording setting interface, preset audio information is acquired;
when a contact person setting instruction is received on the call record setting interface, acquiring a designated contact person selected from the contact person list;
and correspondingly storing the preset audio information and the user identification of the appointed contact.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
Fig. 2 is a flowchart illustrating a contact verification method according to an exemplary embodiment, which is used in a server, as shown in fig. 2, and includes the following steps:
in step 201, an authentication request sent by a second terminal is received, where the authentication request includes a first user identifier and a face picture of a contact, and the authentication request is triggered by a call request received by the second terminal.
In step 202, a verification instruction is sent to the first terminal where the first user identifier is located, so that the first terminal obtains the verification picture of the contact person when receiving the verification instruction.
In step 203, when a check picture sent by the first terminal is received, it is determined whether the check picture matches the face picture, if yes, step 204 is executed, and if no, step 205 is executed.
In step 204, an authentication pass message is sent to the second terminal.
In step 205, an authentication failure message is sent to the second terminal.
In the method provided by this embodiment, when an authentication request of a second terminal is received, a verification picture of the first terminal is authenticated according to a face picture sent by the second terminal, and when the authentication is passed, it is determined that a user who initiates a call request on the first terminal is the contact person, an authentication passing message is sent to the second terminal, so that a call connection is established between the second terminal and the first terminal, and preset audio information is sent to the first terminal. After the identity of the current user of the first terminal is verified, the second terminal sends the preset audio information to the first terminal, so that the privacy of the user of the second terminal is protected, and the preset audio information is prevented from being leaked.
In another embodiment, when receiving the verification picture sent by the first terminal, determining whether the verification picture matches the face picture includes:
when a check picture sent by the first terminal is received, acquiring the shooting time of the check picture;
calculating the time interval between the shooting time of the check picture and the current time;
if the time interval is larger than a preset threshold value, sending a verification failure message to the second terminal;
and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
Fig. 3 is a flowchart illustrating a contact verification method according to an exemplary embodiment, which is used in a terminal, as shown in fig. 3, and includes the following steps:
in step 301, in the process of initiating a call request to the second terminal, a verification instruction sent by the server is received.
In step 302, a verification picture of the current user is obtained.
In step 303, the verification picture is sent to the server, so that the server verifies the verification picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes.
In step 304, when a call connection is established with the second terminal, receiving preset audio information sent by the second terminal, and playing the preset audio information.
In the method provided by this embodiment, in the process of initiating a call request to the second terminal, a verification instruction sent by the server is received, and then a verification picture is sent to the server, so that the server verifies the verification picture according to the face picture sent by the second terminal, and when the verification is passed, a verification passing message is sent to the second terminal, so that a call connection is established between the second terminal and the home terminal, and the home terminal can play preset audio information sent by the second terminal. After the identity of the current user is verified through the server, the second terminal sends the preset audio information to the home terminal, privacy of the second terminal user is protected, and leakage of the preset audio information is avoided.
In another embodiment, the obtaining the verification picture of the current user includes:
shooting the current user to obtain the verification picture; or,
the verification picture is selected from the stored plurality of pictures.
Fig. 4 is a flowchart illustrating a contact verification method according to an exemplary embodiment, where, as shown in fig. 4, the interaction subjects of the contact verification method are a first terminal, a second terminal, and a server, and the method includes the following steps:
in step 401, the first terminal sends a call request to the second terminal based on the first subscriber identity.
The first user identifier is used to uniquely determine the first terminal, and may be a user account, a user nickname, a phone number, and the like of the first terminal, and correspondingly, the subsequent second user identifier is used to uniquely determine the second terminal, and may be a user account, a user nickname, a phone number, and the like of the second terminal, which is not limited in this embodiment.
When the first user identifier is the user account or the user nickname of the first terminal, the first terminal may send a call request to the second terminal through the server. That is, the first terminal obtains a second user identifier of the second terminal, and sends a call request to the server based on the second user identifier, where the call request carries the first user identifier and the second user identifier, and when receiving the call request, the server sends a call request to the second terminal according to the second user identifier, where the call request carries the first user identifier. The server may be an instant messaging server or other servers, and the first terminal and the second terminal may perform various types of call services such as voice call, video call, and the like through the server.
When the first user identifier is the telephone number of the first terminal, the first terminal may send a call request to the second terminal through an operator server, that is, the first terminal obtains a second user identifier of the second terminal and sends the call request to the operator server based on the first user identifier, where the call request carries the first user identifier and the second user identifier, and when the operator server receives the call request, the operator server sends the call request to the second terminal according to the second user identifier, where the call request carries the first user identifier. In this case, the first terminal and the second terminal may be further connected through a server, and the server may be a server dedicated to managing a call service of the terminal, which is not limited in this embodiment.
In step 402, when the second terminal receives the call request, the first user identifier and the face picture of the contact corresponding to the call request are obtained.
In this embodiment, the user of the first terminal is referred to as a first user, and the user of the second terminal is referred to as a second user. The call request is sent by the first terminal, and the call request carries the first user identifier, so that the contact corresponding to the call request is the first user, and when the second terminal receives the call request, the first user identifier can be acquired.
The second terminal may store the user identifier and the detail information of each contact correspondingly, where the detail information may include a phone number, a name, an address, a position, a face picture, a user identifier, and the like, and this embodiment does not limit this. When the second terminal acquires the first user identifier, detail information stored corresponding to the first user identifier can be acquired, a face picture is acquired from the detail information, namely the face picture of the first user, and the current user of the first terminal can be verified according to the face picture of the first user.
In this embodiment, the step 402 may include at least one of the following steps (1) - (4):
(1) and when the second terminal receives the call request, judging whether the do-not-disturb mode is started or not, and if the do-not-disturb mode is started, acquiring the first user identification and the face picture of the contact corresponding to the call request.
The embodiment is applied to a scene that the second user is inconvenient to talk, when the second user is inconvenient to talk, if the second terminal receives a talk request, the second terminal automatically processes the talk request to obtain the first user identifier and the face picture of the contact corresponding to the talk request, so that the current user of the first terminal can be verified according to the face picture.
And in practical application, when the second terminal receives the call request, whether the do-not-disturb mode is started or not can be judged firstly, if the do-not-disturb mode is started, the second terminal indicates that the second user is inconvenient to call, and the second terminal acquires the first user identification and the face picture. And if the do-not-disturb mode is not opened, the second user can communicate with the first user, at this time, the second terminal does not acquire the first user identification and the face picture any more, and when the answering operation or the refusing operation of the first user to the communication request is detected, the communication request is processed correspondingly.
This step (1) can also be replaced by the following steps: when the second terminal receives the call request, timing is started, and when the statistical time length is longer than the preset time length but the answering operation of the first user to the call request is not detected, the second terminal determines that the second user is inconvenient to call with the first user, and then the first user identification and the face picture are obtained. The preset time length may be set by default by the second terminal or set by the second user, which is not limited in this embodiment.
(2) When the second terminal receives the call request, acquiring a first user identifier of a contact corresponding to the call request, judging whether preset audio information corresponding to the first user identifier is stored, and if the preset audio information corresponding to the first user identifier is stored in the second terminal, acquiring a face picture corresponding to the first user identifier.
In practical applications, the second terminal may set the preset audio information for some contacts, but not set the preset audio information for other contacts. Then, when the second terminal receives the call request, the first user identifier may be obtained first, and whether the preset audio information corresponding to the first user identifier is stored or not may be determined.
And if the second terminal stores the preset audio information corresponding to the first user identification and indicates that the second user sets the preset audio information for the first user, the second terminal acquires a face picture corresponding to the first user identification so as to verify the current user of the second terminal. At this time, the second terminal may further obtain preset audio information stored corresponding to the first user identifier, so that the preset audio information is sent to the first terminal when the current user of the second terminal passes the verification.
And if the second terminal does not store the preset audio information corresponding to the first user identification, which indicates that the second user does not set audio information for the first user, the second terminal can directly refuse the call request.
Before the step (2), the method further comprises: the second terminal displays a call record setting interface, acquires preset audio information when a record setting instruction is received on the call record setting interface, acquires a designated contact selected from the contact list when a contact setting instruction is received on the call record setting interface, and correspondingly stores the preset audio information and the user identification of the designated contact.
The second terminal can display the call recording setting interface, the call recording setting interface comprises an audio adding option and a contact adding option, when the second terminal detects a click operation on the audio adding option, it is determined that a recording setting instruction is received, and then the second terminal can acquire an audio file selected by the second user from the second terminal, or the second terminal can record audio information input by the second user, so that preset audio information is acquired. When the second terminal detects the click operation of the contact adding option, a contact list is displayed, the contact list comprises a plurality of contacts, and the second terminal can acquire one or more designated contacts selected by the second user from the contact list. Then, the second terminal may correspondingly store the preset audio information and the user identifier of the designated contact, that is, establish a corresponding relationship between the preset audio information and the user identifier of the designated contact.
(3) When the second terminal receives the call request, acquiring a first user identifier of a contact corresponding to the call request and a preset time period corresponding to the first user identifier, judging whether the current time belongs to the preset time period, and if the current time belongs to the preset time period, acquiring a face picture corresponding to the first user identifier.
In practical applications, the second terminal may set a preset time period for playing the preset audio information for some contacts, and the preset audio information can be played only within the preset time period. And when the second terminal receives the call request, acquiring the first user identifier, and judging whether a preset time period corresponding to the first user identifier is stored, if the preset time period corresponding to the first user identifier is stored, acquiring the preset time period, judging whether the current time belongs to the preset time period, and if the current time belongs to the preset time period, acquiring a face picture corresponding to the first user identifier. If the current time does not belong to the preset time period, the second terminal can directly reject the call request.
Prior to the step (3), the method further comprises: when the second terminal receives a time period setting instruction on a call record setting interface of a designated contact, the set preset time period is obtained, and the preset time period and the user identification of the designated contact are correspondingly stored, namely, the corresponding relation between the user identification of the designated contact and the preset time period is established.
(4) And when the second terminal receives the call request, judging whether a contact person verification function is activated or not, and if the contact person verification function is activated, acquiring the first user identification and the face picture by the second terminal.
In practical application, the second terminal may provide a contact verification function, and only when the contact verification function is activated, the second terminal may verify the current user of the first terminal, and when the contact verification function is not activated, the second terminal does not need to verify the current user of the first terminal.
When the second terminal receives the call request, whether a contact person verification function is activated is judged, if the contact person verification function is activated, the second terminal acquires the first user identifier and the face picture so as to perform verification according to the face picture, and if the contact person verification function is not activated, the second terminal can directly establish call connection with the first terminal and send preset audio information to the first terminal without performing verification, which is not limited in this embodiment.
It should be noted that, four implementation conditions are given in the steps (1) to (4), and the second terminal may continue to perform the subsequent steps when any implementation condition is met, that is, the second terminal may perform any one of the steps (1) to (4) when receiving the call request. Alternatively, the second terminal may perform the subsequent steps when the second terminal satisfies two or more of the above-mentioned four implementation conditions. That is, the second terminal may perform two or more of the steps (1) to (4) when receiving the call request. Which of the steps (1) to (4) is specifically executed by the second terminal may be preset by the second terminal, which is not limited in this embodiment.
And the second terminal may determine an execution order of each step in advance when the second terminal executes two or more of the above steps (1) to (4). For example, when the second terminal receives the call request, it may first determine whether the do-not-disturb mode is enabled, and when the do-not-disturb mode is enabled, it may then determine whether the preset audio information corresponding to the first user identifier is stored, and if the preset audio information corresponding to the first user identifier is stored, it may then determine whether the contact verification function is activated. Or, when receiving the call request, the second terminal may first determine whether the do-not-disturb mode is turned on, and when the do-not-disturb mode is turned on, then determine whether the contact verification function is activated, and then determine whether the preset audio information corresponding to the first user identifier is stored.
In step 403, the second terminal sends an authentication request to the server, where the authentication request carries the first user identifier and the face picture.
In step 404, the server sends a verification instruction to the first terminal according to the first user identifier when receiving the verification request.
When the second terminal acquires the first user identification and the face picture, a verification request is sent to the server, the verification request carries the first user identification and the face picture, and when the server receives the verification request, a verification instruction is sent to the first terminal according to the first user identification to instruct the first terminal to upload the verification picture of the current user.
In step 405, when the first terminal receives the verification instruction, a verification picture of the current user is obtained.
When the first terminal receives the verification instruction, the verification picture of the current user is obtained and sent to the server, the server verifies the verification picture according to the face picture uploaded by the second terminal, the verification picture is used for representing the identity of the current user of the first terminal, and the server can verify the identity of the current user of the first terminal according to the verification picture.
The verification instruction may include prompt information for prompting uploading of a face picture of the current user, for example, the prompt information may be "an opposite party requests you to take a face picture in real time to verify the true identity of you". The prompt information may be audio information or text information, and the first terminal may play the audio information or display the text information when receiving the verification instruction, which is not limited in this embodiment.
In this embodiment, the first terminal may display a call initiation interface in a process of initiating a call request to the second terminal, where the call initiation interface includes a camera option. When the first terminal receives the verification instruction, the current user may click the camera option, and then the first terminal starts the camera to shoot the current user to obtain the verification picture, or after the first terminal starts the camera, opens a camera gallery in which a plurality of pictures are stored, and the first terminal may select one picture from the stored plurality of pictures as the verification picture according to the selection operation of the current user, which is not limited in this embodiment.
In step 406, the first terminal sends the verification picture to the server.
In step 407, when the server receives the verification picture, it determines whether the verification picture matches the face picture.
In order to ensure that the check picture can represent the identity of the current user of the second terminal, after receiving the check picture, the server may first obtain the shooting time of the check picture, calculate a time interval between the shooting time of the check picture and the current time, if the time interval is not greater than a preset threshold, represent that the check picture is shot recently, and can represent the identity of the current user of the first terminal, the server determines whether the check picture is matched with the face picture. And if the time interval is greater than the preset threshold, the verification picture is generated long before, and possibly the picture of the first user stored in the first terminal is possible, the verification picture cannot represent the identity of the current user, and the server sends an authentication failure message to the second terminal. The preset threshold may be determined by counting the sum of the time taken for taking the picture and the time taken for uploading the picture in advance by the server, which is not limited in this embodiment.
When the verification is performed, the server may adopt a face recognition technology to obtain the feature value of the verification picture and the feature value of the face picture, and determine whether the verification picture is matched with the face picture by comparing the feature values. And if the characteristic value of the check picture is the same as that of the face picture, determining that the check picture is matched with the face picture, and if the characteristic value of the check picture is different from that of the face picture, determining that the check picture is not matched with the face picture.
In step 408, if the verification picture matches the face picture, the server sends a verification pass message to the second terminal.
And if the verification picture is matched with the face picture, the server sends a verification passing message to the second terminal, wherein the verification passing message indicates that the current user of the first terminal is the first user. And if the check picture is not matched with the face picture, the server sends a verification failure message to the second terminal, wherein the verification picture indicates that the current user of the first terminal is not the first user.
In step 409, when the second terminal receives the verification passing message, a call connection is established with the first terminal, and preset audio information stored corresponding to the first user identifier is acquired.
In this embodiment, only the current user authentication pass of the second terminal is taken as an example for explanation, the second terminal receives the authentication pass message sent by the server, and at this time, the second terminal can perform answering processing on the call request and establish a call connection with the first terminal.
In step 410, the second terminal sends the preset audio information to the first terminal through the call connection.
In order to enable the first user to listen to the audio information preset by the second user, the second terminal acquires the preset audio information stored corresponding to the first user identifier, and sends the preset audio information to the first terminal through the call connection.
The second terminal can perform analog playing on the preset audio information, acquire a data stream of the preset audio information, and send the data stream of the preset audio information to the first terminal through the established call connection, so that when the first terminal receives the data stream, the preset audio information is played according to the data stream.
In step 411, when the first terminal receives the preset audio information, the first terminal plays the preset audio information.
In step 412, the second terminal disconnects the call connection with the first terminal when the second terminal determines that the playing of the preset audio information by the first terminal is completed.
And in the process of simulating and playing the preset audio information, the second terminal continuously sends the data stream of the preset audio information to the first terminal through the call connection. When the data stream of the preset audio information is completely sent, it can be determined that the playing of the preset audio information by the first terminal is completed, and then the second terminal disconnects the call connection with the first terminal.
It should be noted that, in the above step 408, only the verification picture is matched with the face picture as an example, and in another embodiment provided in this embodiment, when the server determines that the verification picture is not matched with the face picture, the server sends a verification failure message to the second terminal, the second terminal can refuse the call request when receiving the authentication failure message, or the second terminal can answer the call request to establish a call connection with the first terminal, sending the audio information of the failure of the verification to the first terminal through the call connection, playing the audio information of the failure of the verification by the first terminal to prompt the current user picture of the first terminal to fail the verification, and when the first terminal finishes playing the verification failure audio information, the second terminal disconnects the call connection with the first terminal. In addition, when the server determines that the verification picture is not matched with the face picture, a verification failure message may also be sent to the first terminal, which is not limited in this embodiment.
In addition, the embodiment is only described by taking the example that the first terminal and the second terminal continuously log in the server, but in practical applications, the first terminal and the second terminal may also log in the server when initiating a call request, or log in the server when determining to perform authentication.
For example, when the first terminal sends a call request to the second terminal based on the first user identifier, the first terminal logs in the server based on the first user identifier. In the subsequent process, once the first terminal cancels the call request, the first terminal logs out. And when the second terminal receives the call request, judging whether the contact person verification function is activated or not, and if the contact person verification function is activated, logging in the server by the second terminal based on the second user identification. In the subsequent process, when receiving the verification request of the second terminal, the server judges whether the first terminal is still in the login state according to the first user identification, if the first terminal is determined to be still in the login state, the server sends the verification request to the first terminal, and if the first terminal is determined not to be in the login state, the server sends a verification failure message to the second terminal. And when the first terminal establishes a call connection with the second terminal, if the second terminal disconnects the call connection with the first terminal, the second terminal logs out. The present embodiment does not limit the timing of the terminal logging in the server and logging out.
In the method provided by this embodiment, when the second terminal receives a call request, the second terminal obtains a face picture of the first user, and sends a verification request to the server, so that the server verifies a verification picture of the first terminal according to the face picture, and when the verification is passed, it is determined that the user who initiates the call request on the first terminal is the first user himself, then the second terminal establishes a call connection with the first terminal, sends preset audio information to the first terminal, and the first terminal plays the preset audio information. After the server verifies the identity of the current user of the first terminal, the second terminal sends preset audio information to the first terminal, privacy of the user of the second terminal is protected, and leakage of the preset audio information is avoided.
Fig. 5 is a block diagram illustrating a contact verification apparatus according to an example embodiment. Referring to fig. 5, the apparatus includes an obtaining module 501, a first sending module 502, a connection establishing module 503, and a second sending module 504.
The obtaining module 501 is configured to, when a call request is received, obtain a first user identifier and a face picture of a contact corresponding to the call request;
the first sending module 502 is configured to send an authentication request to a server, where the authentication request carries the first user identifier and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identifier is located, and authenticates the verification picture according to the face picture;
the connection establishing module 503 is configured to establish a call connection with the first terminal when receiving the verification passing message sent by the server;
the second sending module 504 is further configured to send preset audio information stored corresponding to the first user identifier to the first terminal, so that the first terminal plays the preset audio information.
In the method provided by the embodiment, when a call request is received, a face picture corresponding to a contact person is acquired, and a verification request is sent to a server, so that the server verifies a verification picture of a first terminal initiating the call request according to the face picture, and when the verification is passed, if it is determined that a user currently initiating the call request on the first terminal is the contact person, the device establishes a call connection with the first terminal, and sends preset audio information to the first terminal. After the identity of the current user of the first terminal is verified, the preset audio information is sent, so that the privacy of the user is protected, and the preset audio information is prevented from being leaked.
In another embodiment, the apparatus further comprises:
the disconnection module is configured to disconnect a call connection with the first terminal when the first terminal finishes playing the preset audio information.
In another embodiment, the obtaining module 501 is further configured to, when the call request is received, obtain a first user identifier corresponding to the call request; judging whether preset audio information corresponding to the first user identification is stored or not; and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
In another embodiment, the obtaining module 501 is further configured to determine whether a contact verification function is activated when the call request is received; and if the contact person verification function is activated, acquiring the first user identification and the face picture.
In another embodiment, the apparatus further comprises:
the first processing module is configured to reject the call request when receiving an authentication failure message sent by the server; or,
the second processing module is configured to establish a call connection with the first terminal when receiving the verification failure message sent by the server, send verification failure audio information to the first terminal, and disconnect the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
In another embodiment, the apparatus further comprises:
the display module is configured to display a call recording setting interface;
the setting module is configured to acquire set preset audio information when a recording setting instruction is received on the call recording setting interface;
the setting module is further configured to obtain a designated contact selected from the contact list when a contact setting instruction is received on the call record setting interface;
the storage module is configured to correspondingly store the preset audio information and the user identification of the designated contact.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
Fig. 6 is a block diagram illustrating a contact verification apparatus according to an example embodiment. Referring to fig. 6, the apparatus includes a receiving module 601, a sending module 602, and a determining module 603.
The receiving module 601 is configured to receive an authentication request sent by a second terminal, where the authentication request includes a first user identifier and a face picture of a contact, and the authentication request is triggered by a call request received by the second terminal;
the sending module 602 is configured to send a verification instruction to a first terminal where the first user identifier is located, so that the first terminal obtains a verification picture of the contact when receiving the verification instruction;
the judging module 603 is configured to, when receiving a check picture sent by the first terminal, judge whether the check picture matches with the face picture;
the sending module 602 is further configured to send an authentication pass message to the second terminal if the verification picture matches the face picture;
the sending module 602 is further configured to send an authentication failure message to the second terminal if the verification picture does not match the face picture.
In the method provided by this embodiment, when an authentication request of a second terminal is received, a verification picture of the first terminal is authenticated according to a face picture sent by the second terminal, and when the authentication is passed, it is determined that a user who initiates a call request on the first terminal is the contact person, an authentication passing message is sent to the second terminal, so that a call connection is established between the second terminal and the first terminal, and preset audio information is sent to the first terminal. After the identity of the current user of the first terminal is verified, the second terminal sends the preset audio information to the first terminal, so that the privacy of the user of the second terminal is protected, and the preset audio information is prevented from being leaked.
In another embodiment, the determining module 603 is further configured to, when receiving a verification picture sent by the first terminal, obtain a shooting time of the verification picture; calculating the time interval between the shooting time of the check picture and the current time; if the time interval is larger than a preset threshold value, sending a verification failure message to the second terminal; and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
Fig. 7 is a block diagram illustrating a contact verification apparatus according to an example embodiment. Referring to fig. 7, the apparatus includes a receiving module 701, an obtaining module 702, a sending module 703 and a playing module 704.
The receiving module 701 is configured to receive a verification instruction sent by the server in a process of initiating a call request to the second terminal;
the obtaining module 702 is configured to obtain a verification picture of a current user;
the sending module 703 is configured to send the verification picture to the server, so that the server verifies the verification picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
the receiving module 701 is further configured to receive preset audio information sent by the second terminal when a call connection is established with the second terminal;
the playing module 704 is configured to play the preset audio information.
In the method provided by this embodiment, in the process of initiating a call request to the second terminal, a verification instruction sent by the server is received, and then a verification picture is sent to the server, so that the server verifies the verification picture according to the face picture sent by the second terminal, and when the verification is passed, a verification passing message is sent to the second terminal, so that a call connection is established between the second terminal and the device, and the device can play preset audio information sent by the second terminal. After the identity of the current user is verified through the server, the second terminal sends the preset audio information to the device, privacy of the second terminal user is protected, and leakage of the preset audio information is avoided.
In another embodiment, the obtaining module 702 is further configured to take a picture of the current user, obtaining the verification picture; alternatively, the verification picture is selected from a plurality of stored pictures.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
It should be noted that: in the contact person verifying apparatus provided in the above embodiment, when the contact person is verified, only the division of the above functional modules is illustrated, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structures of the second terminal, the server, and the first terminal are divided into different functional modules, so as to complete all or part of the above described functions. In addition, the contact person verification device provided by the above embodiment and the contact person verification method embodiment belong to the same concept, and specific implementation processes thereof are detailed in the method embodiment and are not described herein again.
Fig. 8 is a block diagram illustrating an apparatus 800 for contact verification, according to an example embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 8, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described contact verification methods shown in fig. 1 and 3, and the steps performed by the first terminal or the second terminal in the contact verification method shown in fig. 4.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of a terminal, enable the terminal to perform a method of contact verification, the method comprising:
when a call request is received, acquiring a first user identification and a face picture of a contact corresponding to the call request;
sending a verification request to a server, wherein the verification request carries the first user identification and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identification is located, and verifies the verification picture according to the face picture;
when receiving a verification passing message sent by the server, establishing call connection with the first terminal;
and sending preset audio information stored corresponding to the first user identification to the first terminal, so that the first terminal plays the preset audio information.
In another embodiment, after sending the preset audio information stored corresponding to the first user identifier to the first terminal, the method further includes:
and when the first terminal finishes playing the preset audio information, disconnecting the call connection with the first terminal.
In another embodiment, the obtaining a first user identifier and a face picture of a contact corresponding to a call request when the call request is received includes:
when the call request is received, acquiring a first user identifier corresponding to the call request;
judging whether preset audio information corresponding to the first user identification is stored or not;
and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
In another embodiment, the obtaining a first user identifier and a face picture of a contact corresponding to a call request when the call request is received includes:
when the call request is received, judging whether a contact person verification function is activated or not;
and if the contact person verification function is activated, acquiring the first user identification and the face picture.
In another embodiment, the method further comprises:
when receiving a verification failure message sent by the server, rejecting the call request; or,
when receiving a verification failure message sent by the server, establishing call connection with the first terminal, sending verification failure audio information to the first terminal, and disconnecting the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
In another embodiment, the method further comprises:
displaying a call recording setting interface;
when a recording setting instruction is received on the call recording setting interface, preset audio information is acquired;
when a contact person setting instruction is received on the call record setting interface, acquiring a designated contact person selected from a contact person list;
and correspondingly storing the preset audio information and the user identification of the designated contact.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
Another non-transitory computer readable storage medium having instructions therein, which when executed by a processor of a terminal, enable the terminal to perform a method of contact verification, the method comprising:
receiving a verification instruction sent by a server in the process of initiating a call request to a second terminal;
acquiring a check picture of a current user;
sending the check picture to the server, so that the server verifies the check picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
and when the call connection with the second terminal is established, receiving preset audio information sent by the second terminal, and playing the preset audio information.
In another embodiment, the obtaining the verification picture of the current user includes:
shooting the current user to obtain the verification picture; or,
and selecting the verification picture from the stored pictures.
Fig. 9 is a block diagram illustrating an apparatus 900 for contact verification in accordance with an example embodiment. For example, the apparatus 900 may be provided as a server. Referring to fig. 9, the apparatus 900 includes a processing component 922, which further includes one or more processors, and memory resources, represented by memory 932, for storing instructions, such as applications, that are executable by the processing component 922. The application programs stored in memory 932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 922 is configured to execute instructions to perform the steps performed by the server in the contact verification method shown in fig. 2 and the contact verification method shown in fig. 4 described above.
The device 900 may also include a power component 926 configured to perform power management of the device 900, a wired or wireless network interface 950 configured to connect the device 900 to a network, and an input output (I/O) interface 958. The device 900 may operate based on an operating system stored in the memory 932, such as Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMOr the like.
Fig. 10 is a block diagram illustrating a contact verification system, see fig. 10, according to an example embodiment, including: a first terminal 1001, a second terminal 1002, and a server 1003. The first terminal 1001 and the server 1003 are connected via a network, and the second terminal 1002 and the server 1003 are connected via a network.
The first terminal 1001 is configured to send a call request to the second terminal 1002;
the second terminal 1002 is configured to, when receiving the call request, obtain a first user identifier and a face picture of a contact corresponding to the call request, and send an authentication request to the server 1003, where the authentication request carries the first user identifier and the face picture;
the server 1003 is configured to send an authentication instruction to the first terminal 1001 when receiving the authentication request;
the first terminal 1001 is further configured to, when receiving the verification instruction, obtain a verification picture, and send the verification picture to the server 1003;
the server 1003 is further configured to determine whether the verification picture is matched with the face picture when the verification picture is received; if the verification picture is matched with the face picture, sending a verification passing message to the second terminal 1002; if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal 1002;
the second terminal 1002 is further configured to establish a call connection with the first terminal 1001 when receiving the verification passing message sent by the server 1003, and send preset audio information stored corresponding to the first user identifier to the first terminal 1001;
the first terminal 1001 is configured to play the preset audio information when receiving the preset audio information.
In another embodiment, the second terminal 1002 is further configured to disconnect the call connection with the first terminal 1001 when the first terminal 1001 finishes playing the preset audio information.
In another embodiment, the second terminal 1002 is further configured to, when receiving the call request, obtain a first user identifier corresponding to the call request; judging whether preset audio information corresponding to the first user identification is stored or not; and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
In another embodiment, the second terminal 1002 is further configured to determine whether a contact verification function is activated when the call request is received; and if the contact person verification function is activated, acquiring the first user identification and the face picture.
In another embodiment, the second terminal 1002 is further configured to reject the call request when receiving the authentication failure message sent by the server 1003; or,
the second terminal 1002 is further configured to establish a call connection with the first terminal 1001 when receiving the verification failure message sent by the server 1003, send verification failure audio information to the first terminal 1001, and disconnect the call connection when the first terminal 1001 completes playing the verification failure audio information, where the verification failure audio information is used to prompt that the picture verification fails.
In another embodiment, the second terminal 1002 is further configured to display a call record setting interface; when a recording setting instruction is received on the call recording setting interface, preset audio information is acquired; when a contact person setting instruction is received on the call record setting interface, acquiring a designated contact person selected from the contact person list; and correspondingly storing the preset audio information and the user identification of the appointed contact.
In another embodiment, the server 1003 is further configured to obtain a shooting time of the verification picture when receiving the verification picture sent by the first terminal 1001; calculating the time interval between the shooting time of the check picture and the current time; if the time interval is greater than the preset threshold, sending a verification failure message to the second terminal 1002; and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
In another embodiment, the first terminal 1001 is further configured to take a picture of the current user to obtain the verification picture; alternatively, the verification picture is selected from a plurality of stored pictures.
All the above optional technical solutions may be combined arbitrarily to form the optional embodiments of the present disclosure, and are not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (24)
1. A method of contact verification, the method comprising:
when a call request is received, acquiring a first user identification and a face picture of a contact corresponding to the call request;
sending a verification request to a server, wherein the verification request carries the first user identification and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identification is located, and verifies the verification picture according to the face picture;
when receiving a verification passing message sent by the server, establishing call connection with the first terminal;
and sending preset audio information stored corresponding to the first user identification to the first terminal, so that the first terminal plays the preset audio information.
2. The method according to claim 1, wherein after sending the preset audio information stored corresponding to the first subscriber identity to the first terminal, the method further comprises:
and when the first terminal finishes playing the preset audio information, disconnecting the call connection with the first terminal.
3. The method according to claim 1, wherein when receiving a call request, acquiring a first user identifier and a face picture of a contact corresponding to the call request comprises:
when the call request is received, acquiring a first user identifier corresponding to the call request;
judging whether preset audio information corresponding to the first user identification is stored or not;
and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
4. The method according to claim 1, wherein when receiving a call request, acquiring a first user identifier and a face picture of a contact corresponding to the call request comprises:
when the call request is received, judging whether a contact person verification function is activated or not;
and if the contact person verification function is activated, acquiring the first user identification and the face picture.
5. The method of claim 1, further comprising:
when receiving a verification failure message sent by the server, rejecting the call request; or,
when receiving a verification failure message sent by the server, establishing call connection with the first terminal, sending verification failure audio information to the first terminal, and disconnecting the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
6. The method of claim 1, further comprising:
displaying a call recording setting interface;
when a recording setting instruction is received on the call recording setting interface, preset audio information is acquired;
when a contact person setting instruction is received on the call record setting interface, acquiring a designated contact person selected from a contact person list;
and correspondingly storing the preset audio information and the user identification of the designated contact.
7. A method of contact verification, the method comprising:
receiving a verification request sent by a second terminal, wherein the verification request comprises a first user identifier and a face picture of a contact person, and the verification request is triggered by a call request received by the second terminal;
sending a verification instruction to a first terminal where the first user identification is located, so that the first terminal obtains a verification picture of the contact person when receiving the verification instruction;
when a check picture sent by the first terminal is received, judging whether the check picture is matched with the face picture;
if the verification picture is matched with the face picture, sending a verification passing message to the second terminal;
and if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal.
8. The method according to claim 7, wherein when receiving a verification picture sent by the first terminal, the determining whether the verification picture matches the face picture comprises:
when a check picture sent by the first terminal is received, acquiring the shooting time of the check picture;
calculating the time interval between the shooting time of the verification picture and the current time;
if the time interval is larger than a preset threshold value, sending a verification failure message to the second terminal;
and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
9. A method of contact verification, the method comprising:
receiving a verification instruction sent by a server in the process of initiating a call request to a second terminal;
acquiring a check picture of a current user;
sending the check picture to the server, so that the server verifies the check picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
and when the call connection with the second terminal is established, receiving preset audio information sent by the second terminal, and playing the preset audio information.
10. The method of claim 9, wherein obtaining the verification picture of the current user comprises:
shooting the current user to obtain the verification picture; or,
and selecting the verification picture from the stored pictures.
11. An apparatus for contact verification, the apparatus comprising:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a first user identifier and a face picture of a contact corresponding to a call request when the call request is received;
the first sending module is used for sending a verification request to a server, wherein the verification request carries the first user identifier and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identifier is located, and verifies the verification picture according to the face picture;
the connection establishing module is used for establishing call connection with the first terminal when receiving a verification passing message sent by the server;
the second sending module is further configured to send preset audio information stored in correspondence with the first user identifier to the first terminal, so that the first terminal plays the preset audio information.
12. The apparatus of claim 11, further comprising:
and the connection disconnection module is used for disconnecting the call connection with the first terminal when the first terminal finishes playing the preset audio information.
13. The apparatus according to claim 11, wherein the obtaining module is further configured to, when the call request is received, obtain a first user identifier corresponding to the call request; judging whether preset audio information corresponding to the first user identification is stored or not; and if the preset audio information corresponding to the first user identification is stored, acquiring a face picture corresponding to the first user identification.
14. The apparatus of claim 11, wherein the obtaining module is further configured to determine whether a contact verification function is activated when the call request is received; and if the contact person verification function is activated, acquiring the first user identification and the face picture.
15. The apparatus of claim 11, further comprising:
the first processing module is used for rejecting the call request when receiving a verification failure message sent by the server; or,
and the second processing module is used for establishing call connection with the first terminal when receiving the verification failure message sent by the server, sending verification failure audio information to the first terminal, and disconnecting the call connection when the first terminal finishes playing the verification failure audio information, wherein the verification failure audio information is used for prompting the picture verification failure.
16. The apparatus of claim 11, further comprising:
the display module is used for displaying a call recording setting interface;
the setting module is used for acquiring preset audio information when a recording setting instruction is received on the call recording setting interface;
the setting module is further used for acquiring a designated contact person selected from the contact person list when a contact person setting instruction is received on the call record setting interface;
and the storage module is used for correspondingly storing the preset audio information and the user identification of the designated contact.
17. An apparatus for contact verification, the apparatus comprising:
the system comprises a receiving module, a verification module and a verification module, wherein the receiving module is used for receiving a verification request sent by a second terminal, the verification request comprises a first user identifier and a face picture of a contact person, and the verification request is triggered by a call request received by the second terminal;
the sending module is used for sending a verification instruction to a first terminal where the first user identifier is located, so that the first terminal obtains the verification picture of the contact person when receiving the verification instruction;
the judging module is used for judging whether the check picture is matched with the face picture or not when the check picture sent by the first terminal is received;
the sending module is further configured to send a verification passing message to the second terminal if the verification picture is matched with the face picture;
the sending module is further configured to send a verification failure message to the second terminal if the verification picture is not matched with the face picture.
18. The device according to claim 17, wherein the determining module is further configured to obtain a shooting time of the verification picture when the verification picture sent by the first terminal is received; calculating the time interval between the shooting time of the verification picture and the current time; if the time interval is larger than a preset threshold value, sending a verification failure message to the second terminal; and if the time interval is not larger than the preset threshold value, judging whether the verification picture is matched with the face picture.
19. An apparatus for contact verification, the apparatus comprising:
the receiving module is used for receiving a verification instruction sent by the server in the process of initiating a call request to the second terminal;
the acquisition module is used for acquiring a verification picture of a current user;
the sending module is used for sending the verification picture to the server, so that the server verifies the verification picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
the receiving module is further configured to receive preset audio information sent by the second terminal when a call connection is established with the second terminal;
and the playing module is used for playing the preset audio information.
20. The apparatus according to claim 19, wherein the obtaining module is further configured to take a picture of the current user to obtain the verification picture; or, the verification picture is selected from a plurality of stored pictures.
21. A contact verification apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
when a call request is received, acquiring a first user identification and a face picture of a contact corresponding to the call request;
sending a verification request to a server, wherein the verification request carries the first user identification and the face picture, so that the server receives a verification picture sent by a first terminal where the first user identification is located, and verifies the verification picture according to the face picture;
when receiving a verification passing message sent by the server, establishing call connection with the first terminal;
and sending preset audio information stored corresponding to the first user identification to the first terminal, so that the first terminal plays the preset audio information.
22. A contact verification apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a verification request sent by a second terminal, wherein the verification request comprises a first user identifier and a face picture of a contact person, and the verification request is triggered by a call request received by the second terminal;
sending a verification instruction to a first terminal where the first user identification is located, so that the first terminal obtains a verification picture of the contact person when receiving the verification instruction;
when a check picture sent by the first terminal is received, judging whether the check picture is matched with the face picture;
if the verification picture is matched with the face picture, sending a verification passing message to the second terminal;
and if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal.
23. A contact verification apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a verification instruction sent by a server in the process of initiating a call request to a second terminal;
acquiring a check picture of a current user;
sending the check picture to the server, so that the server verifies the check picture according to the face picture sent by the second terminal, and sends a verification passing message to the second terminal when the verification passes;
and when the call connection with the second terminal is established, receiving preset audio information sent by the second terminal, and playing the preset audio information.
24. A contact verification system, the system comprising: the system comprises a first terminal, a second terminal and a server;
the first terminal is used for sending a call request to the second terminal;
the second terminal is used for acquiring a first user identifier and a face picture of a contact corresponding to the call request when receiving the call request, and sending a verification request to a server, wherein the verification request carries the first user identifier and the face picture;
the server is used for sending a verification instruction to the first terminal when receiving the verification request;
the first terminal is further used for acquiring a verification picture when the verification instruction is received, and sending the verification picture to the server;
the server is also used for judging whether the check picture is matched with the face picture or not when the check picture is received; if the verification picture is matched with the face picture, sending a verification passing message to the second terminal; if the verification picture is not matched with the face picture, sending a verification failure message to the second terminal;
the second terminal is further used for establishing a call connection with the first terminal when receiving a verification passing message sent by the server, and sending preset audio information stored corresponding to the first user identifier to the first terminal;
and the first terminal is used for playing the preset audio information when receiving the preset audio information.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510201426.8A CN104954361B (en) | 2015-04-24 | 2015-04-24 | Contact person's verification method, apparatus and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510201426.8A CN104954361B (en) | 2015-04-24 | 2015-04-24 | Contact person's verification method, apparatus and system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN104954361A true CN104954361A (en) | 2015-09-30 |
| CN104954361B CN104954361B (en) | 2018-10-12 |
Family
ID=54168715
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510201426.8A Active CN104954361B (en) | 2015-04-24 | 2015-04-24 | Contact person's verification method, apparatus and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104954361B (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105847548A (en) * | 2016-03-22 | 2016-08-10 | 维沃移动通信有限公司 | Communication method, calling terminal and called terminal |
| CN107392178A (en) * | 2017-08-10 | 2017-11-24 | 广州杰之良软件有限公司 | Monitoring method and system |
| CN108270743A (en) * | 2016-12-30 | 2018-07-10 | 华为技术有限公司 | A kind of information security verification method and terminal |
| CN110113826A (en) * | 2019-04-25 | 2019-08-09 | 维沃移动通信有限公司 | A kind of D2D device-to-device connection method and terminal device |
| CN110536001A (en) * | 2019-09-30 | 2019-12-03 | 维沃移动通信有限公司 | A kind of call method and electronic equipment |
| CN111159772A (en) * | 2019-12-16 | 2020-05-15 | 北京康吉森技术有限公司 | Information security access system of electronic information system |
| CN112633091A (en) * | 2020-12-09 | 2021-04-09 | 北京博瑞彤芸科技股份有限公司 | Method and system for verifying real meeting |
| CN116248660A (en) * | 2022-12-26 | 2023-06-09 | 中国建设银行股份有限公司 | File distribution method, device, equipment, system, storage medium and program product |
| CN118865974A (en) * | 2024-08-07 | 2024-10-29 | 北京蜂巢世纪科技有限公司 | Interaction method and device, wearable device, terminal, server, storage medium |
Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1794759A (en) * | 2006-01-05 | 2006-06-28 | 倚天资讯股份有限公司 | Communication device with telephone anti-interference function, server and method thereof |
| US20070165811A1 (en) * | 2006-01-19 | 2007-07-19 | John Reumann | System and method for spam detection |
| US20080159488A1 (en) * | 2006-12-27 | 2008-07-03 | Chander Raja | Voice based caller identification and screening |
| CN101335943A (en) * | 2008-05-30 | 2008-12-31 | 北京天语君锐科技有限公司 | Speech message receiving method and mobile terminal thereof |
| CN101478590A (en) * | 2008-11-26 | 2009-07-08 | 康佳集团股份有限公司 | Voice automatic response method and system for mobile phone |
| US20100158206A1 (en) * | 2008-12-23 | 2010-06-24 | International Business Machines Corporation | Performing human client verification over a voice interface |
| CN102123192A (en) * | 2011-02-14 | 2011-07-13 | 无锡移讯惠信息科技有限公司 | Exception-allowable call management method containing identity authentication |
| US8135119B1 (en) * | 2008-11-04 | 2012-03-13 | Trend Micro Incorporated | Techniques for protecting telephone users from caller ID spoofing attacks |
| CN102487412A (en) * | 2010-12-02 | 2012-06-06 | 深圳富泰宏精密工业有限公司 | Mobile phone call firewall control system and method |
| CN103685711A (en) * | 2012-09-21 | 2014-03-26 | 崔玉珩 | Call control and processing method based on automatic connection of mobile phone |
| CN104363330A (en) * | 2014-10-10 | 2015-02-18 | 惠州市德赛西威汽车电子有限公司 | Safety call answering method and device during driving |
-
2015
- 2015-04-24 CN CN201510201426.8A patent/CN104954361B/en active Active
Patent Citations (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1794759A (en) * | 2006-01-05 | 2006-06-28 | 倚天资讯股份有限公司 | Communication device with telephone anti-interference function, server and method thereof |
| US20070165811A1 (en) * | 2006-01-19 | 2007-07-19 | John Reumann | System and method for spam detection |
| US20080159488A1 (en) * | 2006-12-27 | 2008-07-03 | Chander Raja | Voice based caller identification and screening |
| CN101335943A (en) * | 2008-05-30 | 2008-12-31 | 北京天语君锐科技有限公司 | Speech message receiving method and mobile terminal thereof |
| US8135119B1 (en) * | 2008-11-04 | 2012-03-13 | Trend Micro Incorporated | Techniques for protecting telephone users from caller ID spoofing attacks |
| CN101478590A (en) * | 2008-11-26 | 2009-07-08 | 康佳集团股份有限公司 | Voice automatic response method and system for mobile phone |
| US20100158206A1 (en) * | 2008-12-23 | 2010-06-24 | International Business Machines Corporation | Performing human client verification over a voice interface |
| CN102487412A (en) * | 2010-12-02 | 2012-06-06 | 深圳富泰宏精密工业有限公司 | Mobile phone call firewall control system and method |
| CN102123192A (en) * | 2011-02-14 | 2011-07-13 | 无锡移讯惠信息科技有限公司 | Exception-allowable call management method containing identity authentication |
| CN103685711A (en) * | 2012-09-21 | 2014-03-26 | 崔玉珩 | Call control and processing method based on automatic connection of mobile phone |
| CN104363330A (en) * | 2014-10-10 | 2015-02-18 | 惠州市德赛西威汽车电子有限公司 | Safety call answering method and device during driving |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105847548A (en) * | 2016-03-22 | 2016-08-10 | 维沃移动通信有限公司 | Communication method, calling terminal and called terminal |
| CN105847548B (en) * | 2016-03-22 | 2020-01-31 | 维沃移动通信有限公司 | A communication method, calling terminal and called terminal |
| CN108270743A (en) * | 2016-12-30 | 2018-07-10 | 华为技术有限公司 | A kind of information security verification method and terminal |
| CN107392178A (en) * | 2017-08-10 | 2017-11-24 | 广州杰之良软件有限公司 | Monitoring method and system |
| CN110113826A (en) * | 2019-04-25 | 2019-08-09 | 维沃移动通信有限公司 | A kind of D2D device-to-device connection method and terminal device |
| CN110536001A (en) * | 2019-09-30 | 2019-12-03 | 维沃移动通信有限公司 | A kind of call method and electronic equipment |
| CN111159772A (en) * | 2019-12-16 | 2020-05-15 | 北京康吉森技术有限公司 | Information security access system of electronic information system |
| CN112633091A (en) * | 2020-12-09 | 2021-04-09 | 北京博瑞彤芸科技股份有限公司 | Method and system for verifying real meeting |
| CN112633091B (en) * | 2020-12-09 | 2021-11-16 | 北京博瑞彤芸科技股份有限公司 | Method and system for verifying real meeting |
| CN116248660A (en) * | 2022-12-26 | 2023-06-09 | 中国建设银行股份有限公司 | File distribution method, device, equipment, system, storage medium and program product |
| CN118865974A (en) * | 2024-08-07 | 2024-10-29 | 北京蜂巢世纪科技有限公司 | Interaction method and device, wearable device, terminal, server, storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN104954361B (en) | 2018-10-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104954361B (en) | Contact person's verification method, apparatus and system | |
| EP3113466B1 (en) | Method and device for warning | |
| CN106210797B (en) | Network live broadcast method and device | |
| CN105915521B (en) | Multi-party call management method, device and terminal | |
| CN104391712B (en) | Closedown method and device | |
| CN109039860B (en) | Method and device for sending and displaying messages, and method and device for identity authentication | |
| CN107959757B (en) | User information processing method, device, APP server and terminal device | |
| CN105162980A (en) | Call processing method and device | |
| CN106533918A (en) | User addition prompting method and apparatus | |
| CN104219038A (en) | Method and device for synchronizing data | |
| CN105208089A (en) | Information display method, apparatus and system | |
| CN105472109A (en) | Emergency contact person calling system and method | |
| CN105282295A (en) | Candidate contact recommendation method and device | |
| CN104780256A (en) | Address book management method and device and intelligent terminal | |
| CN107911380B (en) | Identity verification method and device | |
| CN106034214A (en) | Video data recording method and apparatus thereof | |
| CN106550482B (en) | Communication connection establishing method and device and electronic equipment | |
| CN105100352A (en) | Method and device for acquiring contact information | |
| CN108377302A (en) | Shield the method and device of harassing call | |
| CN106776874A (en) | User's colonization method and device | |
| CN110913055B (en) | Terminal device searching method and device and electronic device | |
| CN107169042B (en) | Method and device for sharing pictures and computer readable storage medium | |
| CN105101258A (en) | Communication request transfer method and device | |
| CN111865767B (en) | User display method, device, server, client, terminal and storage medium for indirectly monitoring telephone in instant messaging | |
| CN105227891A (en) | A kind of video call method and device |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |