CN106940674B - Method and device for triggering target event in mobile terminal - Google Patents

Method and device for triggering target event in mobile terminal Download PDF

Info

Publication number
CN106940674B
CN106940674B CN201610006893.XA CN201610006893A CN106940674B CN 106940674 B CN106940674 B CN 106940674B CN 201610006893 A CN201610006893 A CN 201610006893A CN 106940674 B CN106940674 B CN 106940674B
Authority
CN
China
Prior art keywords
notification message
monitoring
interface
notification
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610006893.XA
Other languages
Chinese (zh)
Other versions
CN106940674A (en
Inventor
刘宇龙
陈昭宇
刘坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610006893.XA priority Critical patent/CN106940674B/en
Publication of CN106940674A publication Critical patent/CN106940674A/en
Application granted granted Critical
Publication of CN106940674B publication Critical patent/CN106940674B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a method for triggering a target event in a mobile terminal, which is characterized by comprising the following steps: a monitoring program acquires monitoring authority of a notification message of an operating system in the mobile terminal; monitoring a notification message of the operating system, and identifying whether the notification message meets a preset rule; and if the notification message conforms to a preset rule, triggering and operating a target event set for the notification message. According to the embodiment of the application, the monitoring efficiency of the notification message can be improved, so that a user can conveniently acquire the required important information.

Description

Method and device for triggering target event in mobile terminal
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for triggering a target event in a mobile terminal.
Background
When a user uses a terminal such as a mobile phone and a computer, a notification message is usually popped up in a pop-up window form on a display interface of the terminal to prompt the user to check the notification message, and when a plurality of notification messages exist in sequence, the latest notification message is popped up to cover the historical notification message.
However, in practical applications, important messages that users are interested in may be covered by some other unimportant messages that are frequently popped up, and thus users miss important notification messages.
Therefore, at present, an effective monitoring means is lacked for the notification message of the terminal, so that the user cannot acquire the required information in time.
Disclosure of Invention
In view of the above problems, embodiments of the present application are provided to provide a method for triggering a target event in a mobile terminal and a corresponding device for triggering a target event in a mobile terminal, which overcome or at least partially solve the above problems.
In order to solve the above problem, the present application discloses a method for triggering a target event in a mobile terminal, including:
a monitoring program acquires monitoring authority of a notification message of an operating system in the mobile terminal;
monitoring a notification message of the operating system, and identifying whether the notification message meets a preset rule;
and if the notification message conforms to a preset rule, triggering and operating a target event set for the notification message.
Optionally, the acquiring, by the monitoring program, a monitoring right to the notification message of the operating system in the mobile terminal includes:
receiving the selection operation of the user on the opening entrance of the monitoring authority;
and skipping to a setting interface of a system auxiliary function in the mobile terminal to set operation according to the authority of the user on the setting interface, so that the monitoring program acquires the monitoring authority of the notification message.
Optionally, the monitoring program pre-stores an interface identifier of the setting interface, where the interface identifier is suitable for a mobile terminal installed with different system firmware;
the interface for setting the system auxiliary function jumped to the mobile terminal comprises:
and jumping to a setting interface corresponding to the interface identifier.
Optionally, before the monitoring program acquires the monitoring right to the notification message of the operating system in the mobile terminal, the method further includes:
and when the monitoring program is installed or started, providing an opening entrance of the monitoring authority for a user.
Optionally, the monitoring the notification message of the operating system includes:
and monitoring a message notification bar of the operating system, and acquiring a notification message from an application program received by the message notification bar.
Optionally, the identifying whether the notification message conforms to a preset rule includes:
and identifying whether the notification message is sourced from a target application program or not, wherein the notification message comprises a target keyword.
Optionally, the triggering the running of the target event set for the notification message includes:
and calling the target application program to generate an operation interface associated with the target keyword.
Optionally, the method further comprises:
and executing preset operation aiming at the target keyword on the operation interface.
Optionally, the triggering the running of the target event set for the notification message includes at least one of:
calling the target application program to generate a display interface of the notification message;
generating an entry to view the notification message;
generating a presentation window for the notification message;
voice prompting the user to view the notification message;
and extracting the network link from the notification message and accessing the page corresponding to the network link.
Optionally, the method further comprises:
and performing pop-up blocking operation on the message notification bar to be displayed of the notification message by adopting a preset window hook program.
In order to solve the above problem, the present application further discloses a device for triggering a target event in a mobile terminal, including:
the monitoring authority acquisition module is used for acquiring monitoring authority of a notification message of an operating system in the mobile terminal by a monitoring program;
the notification message monitoring module is used for monitoring the notification message of the operating system and identifying whether the notification message meets a preset rule or not;
and the target event triggering module is used for triggering and operating the target event set for the notification message if the notification message conforms to a preset rule.
Optionally, the monitoring authority obtaining module includes:
the selection operation receiving submodule is used for receiving the selection operation of the user on the opening entrance of the monitoring authority;
and the setting interface skipping submodule is used for skipping to a setting interface of a system auxiliary function in the mobile terminal so as to set operation according to the authority of a user on the setting interface, so that the monitoring program acquires the monitoring authority of the notification message.
Optionally, the monitoring program pre-stores an interface identifier of the setting interface, where the interface identifier is suitable for a mobile terminal installed with different system firmware;
the setting interface skip submodule comprises:
and the interface identifier jumping subunit is used for jumping to a setting interface corresponding to the interface identifier.
Optionally, the apparatus further comprises:
and the opening entrance providing module is used for providing an opening entrance of the monitoring authority for the user when the monitoring program is installed or started.
Optionally, the notification message monitoring module includes:
and the message notification bar monitoring submodule is used for monitoring the message notification bar of the operating system and acquiring the notification message which is received by the message notification bar and comes from an application program.
Optionally, the notification message monitoring module includes:
and the notification message identification submodule is used for identifying whether the notification message is from a target application program or not, and the notification message comprises a target keyword.
Optionally, the target event triggering module includes:
and the operation interface generation submodule is used for calling the target application program to generate an operation interface associated with the target keyword.
Optionally, the apparatus further comprises:
and the preset operation execution module is used for executing preset operation aiming at the target keyword on the operation interface.
Optionally, the target event triggering module includes:
the display interface generation submodule is used for calling the target application program to generate a display interface of the notification message; the entrance generation submodule is used for generating an entrance for viewing the notification message;
the display window generation submodule is used for generating a display window for the notification message;
the voice prompt submodule is used for voice prompting the user to check the notification message;
and the page access sub-module is used for extracting the network link from the notification message and accessing the page corresponding to the network link.
Optionally, the apparatus further comprises:
and the hook program adopting module is used for adopting a preset window hook program to perform popup blocking operation on the message notification bar to be displayed of the notification message.
The embodiment of the application has the following advantages:
according to the embodiment of the application, the notification message of the operating system is monitored by acquiring the monitoring authority of the notification message, the notification message is identified according to the preset rule, and the target event set for the notification message is triggered according to the identification result, so that the monitoring efficiency of the notification message is improved, and a user can conveniently acquire the required important information without being interfered by other non-concerned information.
Drawings
Fig. 1 is a flowchart illustrating steps of a first embodiment of a method for triggering a target event in a mobile terminal according to the present application;
fig. 2 is a flowchart illustrating steps of a second embodiment of a method for triggering a target event in a mobile terminal according to the present application;
fig. 3 is a block diagram illustrating a first embodiment of a triggering apparatus for a target event in a mobile terminal according to the present application;
fig. 4 is a block diagram illustrating a second embodiment of a triggering apparatus for a target event in a mobile terminal according to the present application;
fig. 5 is a flow chart illustrating a notification message monitoring according to the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a flowchart illustrating a first step of a method for triggering a target event in a mobile terminal according to an embodiment of the present application is shown, which may specifically include the following steps:
step 101, a monitoring program acquires a monitoring right to a notification message of an operating system in the mobile terminal.
The monitoring program may be an application installed on the mobile terminal for monitoring a notification message of the operating system. It should be noted that, usually, the operating system is provided with a monitoring right for the notification message, and when the monitoring right is not obtained, the operating system will refuse to monitor the notification message by other external programs, so as to avoid that a malicious program illegally utilizes the notification message of the system.
The monitoring program may obtain the monitoring right in various ways, for example, when the user installs or starts the monitoring program, the user may be prompted to set the monitoring right on a setting interface, or when the user installs or starts the monitoring program, an opening entry of the monitoring right is provided. And skipping to a monitoring authority setting interface of the operating system according to the selection operation of the user, and carrying out authority setting operation on the setting interface by the user so that the monitoring program acquires the monitoring authority of the notification message.
Step 102, monitoring the notification message of the operating system, and identifying whether the notification message meets a preset rule.
The notification messages of the operating system can be monitored, and the monitored notification messages are identified according to preset rules. The preset rules can be various, for example, whether the source of the notification message is a preset or user-defined target application program is judged; or judging whether the notification message comprises the target keyword or not; or, judging whether the sending frequency of the notification message exceeds a threshold value; or, judging whether the application program of the notification message source exists in a preset blacklist or not. One skilled in the art can set the preset rule to recognize the notification message according to the actual requirement by adopting one or more rules in combination.
Step 103, if the notification message conforms to a preset rule, triggering to run a target event set for the notification message.
When the notification message conforms to the preset rule, the notification message is the information which is possibly focused on, so that the target event set for the notification message can be triggered to run. The target event may be set according to an application program from which the notification message originates and a keyword included in the notification message. For example, for a chat message of the instant messaging software, which contains a keyword related to an electronic money transaction operation, the chat message can jump to a chat message display interface capable of performing the electronic money transaction operation, and a user can know specific message content and perform the electronic money transaction operation accordingly on the interface. The target event may also be the generation of a presentation window containing a portion of the keywords in the notification message or the playing of a voice prompting the user to view the notification message. Those skilled in the art can set various triggered target events so that the user can perform corresponding operations according to the notification message.
According to the embodiment of the application, the notification message of the operating system is monitored by acquiring the monitoring authority of the notification message, the notification message is identified according to the preset rule, and the target event set for the notification message is triggered according to the identification result, so that the monitoring efficiency of the notification message is improved, and a user can conveniently acquire the required important information without being interfered by other non-concerned information.
Referring to fig. 2, a flowchart illustrating steps of a second embodiment of a method for triggering a target event in a mobile terminal according to the present application is shown, which may specifically include the following steps:
step 201, providing an opening entrance of the monitoring authority for the user when the monitoring program is installed or started.
Step 202, receiving the selection operation of the user to open the entrance of the monitoring authority.
In a specific implementation, when a user installs or starts a monitoring program, an open entry of a monitoring right can be provided for the user. For example, after the user executes an installation program execution file of the monitoring program or starts the execution file, a display interface of the monitoring permission start setting is generated to prompt the user to select start. An open entry for monitoring authority may also be provided when the user starts the monitoring program. The user can click and select the entrance aiming at the monitoring authority.
And 203, jumping to a setting interface of a system auxiliary function in the mobile terminal to set operation according to the authority of the user on the setting interface, so that the monitoring program acquires the monitoring authority of the notification message.
Generally, an operating system of a mobile terminal is provided with a system assistance function. For example, a system firmware (ROM) of an Android system (Android) is configured with an Accessibility Service (Accessibility Service), which is originally designed to help a user operate a terminal device more conveniently, and may include auxiliary functions of subtitles, text-to-speech, tactile feedback, gesture operation, a trackball, a handle operation, a power button shortcut key, and the like, so that the auxiliary functions are also called barrier-free functions. In addition, the system auxiliary function may also provide settings of a notification message monitoring manner, such as settings of a pop-up manner of the notification message, a time period for allowing the notification message to be prompted, an application program for allowing the notification message to be popped up, an application program for allowing the notification message to be acquired, and the like.
For a plurality of function services provided by the system auxiliary function, a user generally needs to preset in a setting interface provided by the user so as to start the corresponding function or service. Therefore, the user can jump to a setting interface of the auxiliary function of the system according to the selection operation of the monitoring authority opening entrance. The setting interface of the system auxiliary function may have a selection setting of whether to allow a certain application program to monitor the notification message, or a monitoring authority setting list allowing monitoring of the notification message, and the user may perform an authority setting operation of the notification message for the monitoring program on the setting interface, for example, may add the monitoring program in the monitoring authority setting list. Of course, in practical application, the user may directly add the monitoring program in the monitoring authority setting list of the system auxiliary function without jumping.
In addition, to facilitate subsequent monitoring of the target program, the package name of the application program may be set in the system auxiliary function. For example, for an auxiliary function Service of an android system, an Accessibility Service Info object may be established first to determine a notification message of a monitoring system, and when the Accessibility Service Info is configured, a package name of an application program may be set by using a packageanames attribute, for example, a package name of instant messaging software is set, so that the notification message of the instant messaging software may be monitored and acquired later. In addition, if the package name of the target program is not set, the situation that other programs are crashed during running can be caused, so that the package name of the monitored program is set in advance, and the running stability of the operating system can be improved.
The setting interface sets operation according to the permission of the user, and the monitoring program can obtain the monitoring permission of the notification message by calling an API (application program interface) of an auxiliary function of the operating system. In practical applications, different mobile terminals or operating systems set operations for permissions of users so that processing manners of acquiring monitoring permissions of notification messages by monitoring programs are different.
Specifically, three steps are required for calling the Android Accessibility API: applying for the authority, registering the Service, and configuring the Access Service Info.
As a preferred example of the embodiment of the present application, the monitoring program may store in advance an interface identifier of the setting interface, where the interface identifier may be suitable for a mobile terminal installed with different system firmware; the interface for jumping to the system auxiliary function in the mobile terminal may include: and jumping to a setting interface corresponding to the interface identifier.
The setting interface can be positioned in a setting program of the mobile terminal, provides the setting of the system auxiliary function, and can complete the setting of the monitoring authority of the monitoring program in the setting interface. In practical applications, different types, manufacturers, and models of mobile terminals are installed with different system firmware, and the auxiliary function setting interfaces of different system firmware usually have different entry modes and entry paths. Therefore, the same interface identification can be configured for different system auxiliary function setting interfaces and stored in the monitoring program, and when the system auxiliary function setting interfaces are jumped to, the setting interfaces can be directly accessed according to the interface identification without writing a plurality of codes according to different access paths, so that the method is suitable for various types of operating systems.
Step 204, monitoring a message notification bar of the operating system, and acquiring a notification message from an application program received by the message notification bar.
After the monitoring authority of the notification message is obtained, the message notification bar of the operating system can be monitored. The message notification bar receives the notification message from the application program or the notification message from the operating system, and when the message notification bar pops up the notification message, the notification message can be acquired to perform the next recognition processing. In practical applications, other positions associated with the notification message may also be monitored, for example, in a transmission path from the notification message to the message notification bar or a transmission path from the application program to the notification message, a corresponding notification message usually exists, and thus monitoring may be performed to obtain the notification message. In addition, the method can also monitor the notification messages which are sent to the message notification bar by the operating system and are related to power supply electric quantity prompt, conversation time statistic prompt and the like. Those skilled in the art can obtain different notification messages according to actual needs.
Step 205, identifying whether the notification message is from a target application program, and the notification message includes a target keyword; if yes, go to step 206.
In practical applications, the user focuses on some notification messages with specific contents in an application, such as an arrival notification in electronic transaction software, an arrival notification in internet banking software, a payment confirmation notification in internet payment software, and an electronic money transaction operation notification in instant messaging software. Therefore, the message source and the included keywords of the acquired notification message can be identified.
When the notification message comes from a preset or user-defined target application program and the notification message comprises a preset or user-defined target keyword, a target event can be triggered. The target application program may include various kinds, such as electronic transaction software, internet banking software, instant messaging software, and the like. The target keyword may be a combination of one or more of words, numbers, symbols, such as the word "confirm payment" with respect to the transaction, and such as the word "win the package" with respect to the electronic money transaction operation.
Those skilled in the art may define the target application and the target shutdown keyword according to actual situations, and the embodiments of the present application do not limit specific target applications and target keywords.
Step 206, triggering and running the target event set for the notification message.
As a first preferred example of the embodiment of the present application, the step 206 may include:
and calling the target application program to generate an operation interface associated with the target keyword.
Specifically, the triggered target event may be a target application program, and an operation interface associated with the target keyword is generated by using the target application program, so that the user performs subsequent operations on the target keyword. For example, for a communication group chat message of instant communication software, the instant communication software can be called to jump to a chat display interface of a communication group so as to display a chat record of the communication group to a user, and the user can reply the chat message on the interface; aiming at the chat message of the instant communication software about the electronic money transaction operation, jumping to a chat display interface of the chat message, and enabling a user to perform the electronic money transaction operation on the interface; for another example, the electronic transaction software may be invoked to generate a display interface of the notification message generated by the electronic transaction software about payment confirmation, and the user may know the details of the notification message on the display interface and may perform a click-and-select operation to confirm payment.
As a preferred example of the embodiment of the present application, the method may further include: and executing preset operation aiming at the target keyword on the operation interface. In practical applications, some notification messages require the user to perform certain feedback operations besides providing information, such as chat messages of instant messaging software related to electronic money transaction operations, the user can perform operations of receiving electronic money or prompting messages of receiving mails in a mail program, and the user can perform operations of returning read receipts to the sender. Therefore, the preset operation can be set, and the corresponding preset operation is directly executed correspondingly aiming at the target keyword of the notification message. For example, when the notification message contains a target keyword "rob the red envelope", the red envelope can be obtained by directly clicking a page red envelope button in the operation interface; alternatively, when the notification message contains the target keyword "received mail", the operation of sending the read receipt may be directly performed.
As a second preferred example of the embodiment of the present application, the step 206 may include at least one of:
and a substep S1, calling the target application program to generate a display interface of the notification message. The target application program can call the source of the notification message, and the notification message is displayed on the display interface of the target application program; or generating another display interface on the interface currently displayed by the terminal by the target application program so as to display the notification message.
And a substep S2 of generating an entry to view the notification message. The monitoring program may provide notification messages from the viewing portal to the user in the terminal's current presentation interface. The portal can be generated in various forms and provided for the user, for example, the portal can be the complete content or partial key content of the notification message, so that the user can directly obtain the notification message; or the text identifier or the image identifier of the application program corresponding to the notification message, so that the user can know the source of the notification message conveniently, and whether the specific message content needs to be checked is judged. The viewing entrance can be generated at the edge of the terminal display screen, so that the user can use one hand to further perform touch operation for viewing the notification message, and the user does not need to use two hands to perform operation.
And a substep S3 of generating a presentation window for the notification message. The monitoring program can also generate a display window according to the content of the notification message, and display the complete notification message or part of the keywords on the current display interface of the terminal. The user can directly obtain the notification message from the display window without restarting the application program from which the notification message originates.
And a sub-step S4 of voice prompting the user to view the notification message. The monitoring program can also recognize keywords contained in the notification message and broadcast the keywords in voice, so that the user can know the content of the notification message more conveniently.
And a substep S5 of extracting the network link from the notification message and accessing the page corresponding to the network link. When the notification message contains the network link, the monitoring program can extract the network link and access the corresponding page, so that the operation that the user starts the application program and clicks to select the network link is saved.
As a preferred example of the embodiment of the present application, the method may further include:
and performing pop-up blocking operation on the message notification bar to be displayed of the notification message by adopting a preset window hook program.
Application notification messages are usually displayed in a popup window of an operating system, and advertisement messages of some applications may influence other users to use other applications, so that the other applications can be intercepted. Specifically, a window hook program may be preset, and the pop-up blocking operation is performed on the message notification bar to be displayed by using the window hook program. For example, a setwindows hookex interface of a Windows operating system is used to set a window hook program for preventing popup operation of a notification message, and when a notification message of an application program is generated, and a message notification bar is not reached, the window hook program captures the notification message first. The window hook program can modify the notification message and can also force the notification message to be finished and pop up a pop-up window in the message notification bar. Therefore, when the user can acquire the notification message through the target event, the notification can be repeatedly presented by the message notification bar.
According to the embodiment of the application, the system auxiliary function is utilized to acquire the monitoring authority of the notification message, and the target event is triggered when the notification message which is sent by the target application program and comprises the target keyword is identified, so that the identification accuracy is improved. Meanwhile, the method and the device for obtaining the information can enable the user to obtain the important information in time and carry out corresponding feedback operation, and efficiency of obtaining the information and carrying out operation by the user is improved.
Moreover, the embodiment of the application can be suitable for mobile terminals of various brands and models and configured with different operating systems, and the applicability of notification message monitoring is improved.
To facilitate those skilled in the art to understand the embodiment of the present application, fig. 5 shows a flowchart of notification message monitoring according to the present application. As can be seen from the figure, the monitoring program can interact with the user through indicating information such as characters, patterns and the like in the monitoring authority opening entry, and guide the user to set the monitoring authority of the monitoring program in the auxiliary function of the operating system. The monitoring program may pre-configure trigger conditions for specific applications and specific keywords and associate the trigger conditions with the triggered target events. The notification messages sent by the third-party application programs are identified and screened by utilizing the triggering conditions, and when the notification messages sent by a certain application program hit the triggering conditions configured in advance, the monitoring program can trigger target events set for the specific application program and the specific keywords in real time.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 3, a block diagram of a first embodiment of a triggering apparatus for a target event in a mobile terminal according to the present application is shown, which may specifically include the following modules:
a monitoring authority obtaining module 301, configured to obtain, by a monitoring program, a monitoring authority for a notification message of an operating system in the mobile terminal.
A notification message monitoring module 302, configured to monitor a notification message of the operating system, and identify whether the notification message meets a preset rule.
And a target event triggering module 303, configured to trigger to run a target event set for the notification message if the notification message meets a preset rule.
According to the embodiment of the application, the notification message of the operating system is monitored by acquiring the monitoring authority of the notification message, the notification message is identified according to the preset rule, and the target event set for the notification message is triggered according to the identification result, so that the monitoring efficiency of the notification message is improved, and a user can conveniently acquire the required important information without being interfered by other non-concerned information.
Referring to fig. 4, a block diagram of a second embodiment of a triggering apparatus for a target event in a mobile terminal according to the present application is shown, which may specifically include the following modules:
an open entry providing module 401, configured to provide an open entry for the monitoring authority by the user when the monitoring program is installed or started.
A monitoring right obtaining module 402, configured to obtain, by a monitoring program, a monitoring right to a notification message of an operating system in the mobile terminal.
A notification message monitoring module 403, configured to monitor a notification message of the operating system, and identify whether the notification message meets a preset rule.
A target event triggering module 404, configured to trigger to run a target event set for the notification message if the notification message meets a preset rule.
The hook program adopting module 405 is configured to adopt a preset window hook program to perform pop-up blocking operation on a message notification bar to be displayed of the notification message.
As a preferred example of the embodiment of the present application, the monitoring right obtaining module 402 may include:
and the selection operation receiving submodule is used for receiving the selection operation of the user on the opening entrance of the monitoring authority.
And the setting interface skipping submodule is used for skipping to a setting interface of a system auxiliary function in the mobile terminal so as to set operation according to the authority of a user on the setting interface, so that the monitoring program acquires the monitoring authority of the notification message.
As a preferred example of the embodiment of the present application, the monitoring program pre-stores an interface identifier of the setting interface, where the interface identifier is suitable for a mobile terminal installed with different system firmware.
The setting interface skip submodule comprises:
and the interface identifier jumping subunit is used for jumping to a setting interface corresponding to the interface identifier.
As a first preferred example of the embodiment of the present application, the notification message monitoring module 403 may include:
and the message notification bar monitoring submodule is used for monitoring the message notification bar of the operating system and acquiring the notification message which is received by the message notification bar and comes from an application program.
As a second preferred example of the embodiment of the present application, the notification message monitoring module 403 includes:
and the notification message identification submodule is used for identifying whether the notification message is from a target application program or not, and the notification message comprises a target keyword.
As a preferred example of the embodiment of the present application, the target event triggering module 404 may include:
and the operation interface generation submodule is used for calling the target application program to generate an operation interface associated with the target keyword.
And the display interface generation submodule is used for calling the target application program to generate a display interface of the notification message.
And the entrance generation submodule is used for generating an entrance for viewing the notification message.
And the display window generation submodule is used for generating a display window for the notification message.
And the voice prompt submodule is used for voice prompting the user to check the notification message.
And the page access sub-module is used for extracting the network link from the notification message and accessing the page corresponding to the network link.
As a preferred example of the embodiment of the present application, the apparatus may further include:
and the preset operation execution module is used for executing preset operation aiming at the target keyword on the operation interface.
According to the embodiment of the application, the system auxiliary function is utilized to acquire the monitoring authority of the notification message, and the target event is triggered when the notification message which is sent by the target application program and comprises the target keyword is identified, so that the identification accuracy is improved. Meanwhile, the method and the device for obtaining the information can enable the user to obtain the important information in time and carry out corresponding feedback operation, and efficiency of obtaining the information and carrying out operation by the user is improved.
Moreover, the embodiment of the application can be suitable for mobile terminals of various brands and models and configured with different operating systems, and the applicability of notification message monitoring is improved.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
In a typical configuration, the computer device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (fransitory media), such as modulated data signals and carrier waves.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The method for triggering the target event in the mobile terminal and the device for triggering the target event in the mobile terminal provided by the application are introduced in detail, and a specific example is applied in the text to explain the principle and the implementation of the application, and the description of the above embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (16)

1. A method for triggering a target event in a mobile terminal is characterized by comprising the following steps:
a monitoring program acquires monitoring authority of a notification message of an operating system in the mobile terminal;
monitoring a notification message of the operating system, and identifying whether the notification message meets a preset rule;
if the notification message conforms to a preset rule, triggering and operating a target event set for the notification message;
wherein the identifying whether the notification message conforms to a preset rule comprises:
identifying whether the notification message is from a target application program or not, wherein the notification message comprises a target keyword;
the triggering the running of the target event set for the notification message comprises the following steps:
and calling the target application program to generate an operation interface associated with the target keyword.
2. The method of claim 1, wherein the monitoring program obtaining the monitoring right to the notification message of the operating system in the mobile terminal comprises:
receiving the selection operation of the user on the opening entrance of the monitoring authority;
and skipping to a setting interface of a system auxiliary function in the mobile terminal to set operation according to the authority of the user on the setting interface, so that the monitoring program acquires the monitoring authority of the notification message.
3. The method according to claim 2, wherein the monitoring program pre-stores an interface identifier of the setting interface, and the interface identifier is suitable for mobile terminals installed with different system firmware;
the interface for setting the system auxiliary function jumped to the mobile terminal comprises:
and jumping to a setting interface corresponding to the interface identifier.
4. The method according to claim 2, before the monitoring program acquires the monitoring right to the notification message of the operating system in the mobile terminal, the method further comprising:
and when the monitoring program is installed or started, providing an opening entrance of the monitoring authority for a user.
5. The method of claim 1, wherein monitoring the operating system for notification messages comprises:
and monitoring a message notification bar of the operating system, and acquiring a notification message from an application program received by the message notification bar.
6. The method of claim 1, further comprising:
and executing preset operation aiming at the target keyword on the operation interface.
7. The method of claim 1, wherein the triggering the running of the target event set for the notification message comprises at least one of:
calling the target application program to generate a display interface of the notification message;
generating an entry to view the notification message;
generating a presentation window for the notification message;
voice prompting the user to view the notification message;
and extracting the network link from the notification message and accessing the page corresponding to the network link.
8. The method of claim 1, further comprising:
and performing pop-up blocking operation on the message notification bar to be displayed of the notification message by adopting a preset window hook program.
9. An apparatus for triggering a target event in a mobile terminal, comprising:
the monitoring authority acquisition module is used for acquiring monitoring authority of a notification message of an operating system in the mobile terminal by a monitoring program;
the notification message monitoring module is used for monitoring the notification message of the operating system and identifying whether the notification message meets a preset rule or not;
the target event triggering module is used for triggering and operating a target event set for the notification message if the notification message conforms to a preset rule;
wherein the notification message monitoring module comprises:
the notification message identification submodule is used for identifying whether the notification message is from a target application program or not, and the notification message comprises a target keyword;
the target event triggering module comprises:
and the operation interface generation submodule is used for calling the target application program to generate an operation interface associated with the target keyword.
10. The apparatus of claim 9, wherein the monitoring right obtaining module comprises:
the selection operation receiving submodule is used for receiving the selection operation of the user on the opening entrance of the monitoring authority;
and the setting interface skipping submodule is used for skipping to a setting interface of a system auxiliary function in the mobile terminal so as to set operation according to the authority of a user on the setting interface, so that the monitoring program acquires the monitoring authority of the notification message.
11. The device according to claim 10, wherein the monitoring program pre-stores an interface identifier of the setting interface, and the interface identifier is suitable for mobile terminals installed with different system firmware;
the setting interface skip submodule comprises:
and the interface identifier jumping subunit is used for jumping to a setting interface corresponding to the interface identifier.
12. The apparatus of claim 10, further comprising:
and the opening entrance providing module is used for providing an opening entrance of the monitoring authority for the user when the monitoring program is installed or started.
13. The apparatus of claim 9, wherein the notification message monitoring module comprises:
and the message notification bar monitoring submodule is used for monitoring the message notification bar of the operating system and acquiring the notification message which is received by the message notification bar and comes from an application program.
14. The apparatus of claim 9, further comprising:
and the preset operation execution module is used for executing preset operation aiming at the target keyword on the operation interface.
15. The apparatus of claim 9, wherein the target event triggering module comprises:
the display interface generation submodule is used for calling the target application program to generate a display interface of the notification message; the entrance generation submodule is used for generating an entrance for viewing the notification message;
the display window generation submodule is used for generating a display window for the notification message;
the voice prompt submodule is used for voice prompting the user to check the notification message;
and the page access sub-module is used for extracting the network link from the notification message and accessing the page corresponding to the network link.
16. The apparatus of claim 9, further comprising:
and the hook program adopting module is used for adopting a preset window hook program to perform popup blocking operation on the message notification bar to be displayed of the notification message.
CN201610006893.XA 2016-01-05 2016-01-05 Method and device for triggering target event in mobile terminal Active CN106940674B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610006893.XA CN106940674B (en) 2016-01-05 2016-01-05 Method and device for triggering target event in mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610006893.XA CN106940674B (en) 2016-01-05 2016-01-05 Method and device for triggering target event in mobile terminal

Publications (2)

Publication Number Publication Date
CN106940674A CN106940674A (en) 2017-07-11
CN106940674B true CN106940674B (en) 2021-03-26

Family

ID=59469348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610006893.XA Active CN106940674B (en) 2016-01-05 2016-01-05 Method and device for triggering target event in mobile terminal

Country Status (1)

Country Link
CN (1) CN106940674B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704294B (en) * 2017-10-27 2021-01-15 北京小米移动软件有限公司 Method and device for processing reserved event
CN108156220B (en) * 2017-12-04 2021-12-03 北京小米移动软件有限公司 Communication method and device
CN108345475A (en) * 2018-01-29 2018-07-31 上海爱优威软件开发有限公司 A kind of message based application call method and terminal
CN110610083A (en) * 2018-06-15 2019-12-24 上海巍擎信息技术有限责任公司 Method for judging pollution of monitoring data and corresponding device
CN112866094A (en) * 2021-02-02 2021-05-28 上海蓝云网络科技有限公司 Message receiving prompting method, device, equipment and storage medium
CN114296825A (en) * 2021-12-29 2022-04-08 杭州盈高科技有限公司 Starting method and device of mobile terminal, storage medium and processor
CN114527925B (en) * 2022-02-18 2024-02-23 北京字跳网络技术有限公司 Conversation method, conversation device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019681A (en) * 2012-11-20 2013-04-03 北京小米科技有限责任公司 Notification message handling method, notification message handling device and mobile terminal
CN103019719A (en) * 2012-12-14 2013-04-03 北京奇虎科技有限公司 Device and method for intercepting pop-up window
CN103546641A (en) * 2013-10-29 2014-01-29 广东欧珀移动通信有限公司 Method and device for filtering messages on notification bar of mobile terminal
WO2015085928A1 (en) * 2013-12-13 2015-06-18 Tencent Technology (Shenzhen) Company Limited Method and device for message pushing management cross-reference to related applications
CN104869248A (en) * 2015-05-15 2015-08-26 广东欧珀移动通信有限公司 Mobile terminal information prompting method and apparatus
CN105072294A (en) * 2015-07-02 2015-11-18 北京奇虎科技有限公司 Call state processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103019681A (en) * 2012-11-20 2013-04-03 北京小米科技有限责任公司 Notification message handling method, notification message handling device and mobile terminal
CN103019719A (en) * 2012-12-14 2013-04-03 北京奇虎科技有限公司 Device and method for intercepting pop-up window
CN103546641A (en) * 2013-10-29 2014-01-29 广东欧珀移动通信有限公司 Method and device for filtering messages on notification bar of mobile terminal
WO2015085928A1 (en) * 2013-12-13 2015-06-18 Tencent Technology (Shenzhen) Company Limited Method and device for message pushing management cross-reference to related applications
CN104869248A (en) * 2015-05-15 2015-08-26 广东欧珀移动通信有限公司 Mobile terminal information prompting method and apparatus
CN105072294A (en) * 2015-07-02 2015-11-18 北京奇虎科技有限公司 Call state processing method and device

Also Published As

Publication number Publication date
CN106940674A (en) 2017-07-11

Similar Documents

Publication Publication Date Title
CN106940674B (en) Method and device for triggering target event in mobile terminal
US11093303B2 (en) Notification message processing method and apparatus
CN108804299B (en) Application program exception handling method and device
US20150262031A1 (en) Method And Apparatus For Identifying Picture
CN109286724B (en) Data interaction method and device based on short message
JP7193059B2 (en) Speech processing method, apparatus, device, program and computer storage medium
US10802674B2 (en) Method and apparatus for displaying function interface
WO2016008413A1 (en) Information providing method and client
US20160092349A1 (en) Correlating out-of-band process data during mobile test automation
US20230409827A1 (en) Utilizing natural language processing to automatically perform multi-factor authentication
CN105391860A (en) Method and apparatus for processing communication request
CN111538964B (en) Login mode pushing method, device and system and electronic equipment
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN106874718B (en) Privacy processing method and device and terminal
CN108984417B (en) Software testing method, device, terminal and storage medium
CN110868347A (en) Message prompting method, device and system
CN110874176B (en) Interaction method, storage medium, operating system and device
CN107483534B (en) Service processing method and device
CN110059476B (en) Application access method, device and equipment
CN109840113B (en) Application data processing method and equipment, storage medium and terminal thereof
KR102106484B1 (en) Information display method, terminal, and server
CN116204799A (en) Data identification method, device, electronic equipment and storage medium
CN111124627A (en) Method, device, terminal and storage medium for determining application program caller
EP3702921B1 (en) Clipboard listener detector
CN108121582B (en) Message processing method, mobile terminal and device with storage function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1239878

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant