CN106992977A - alarm method, device and equipment - Google Patents
alarm method, device and equipment Download PDFInfo
- Publication number
- CN106992977A CN106992977A CN201710190948.1A CN201710190948A CN106992977A CN 106992977 A CN106992977 A CN 106992977A CN 201710190948 A CN201710190948 A CN 201710190948A CN 106992977 A CN106992977 A CN 106992977A
- Authority
- CN
- China
- Prior art keywords
- account
- instant message
- device identification
- message
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Alarm Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The disclosure is directed to a kind of alarm method, device and equipment, this method includes:Detect the first instant message;In response to detecting the first instant message, the first device identification and the first account of the first instant message sender, the account logged in when the first account is the first instant message of transmission are obtained;Prompt message is exported according to the first device identification, prompt message indicates the dangerous property of the first account.The disclosure can improve the experience of user.
Description
Technical field
This disclosure relates to the communications field, more particularly to alarm method, device and equipment.
Background technology
With the fast development of network technology, increasing user's selection is made friends by social software with other people, to enter
Row is linked up or exchanged.
In correlation technique, increasing criminal passes through social software by means of user equipmenies such as mobile phone or computers
Exchanged with user, illegally to be publicized and swindled, usual user can only be identified by the experience of itself, to prevent from being taken in
Be deceived.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of alarm method, device and equipment.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of alarm method, including:
Detect the first instant message;
In response to detecting the first instant message, the first device identification and the first account of the first instant message sender is obtained
Number, the account logged in when the first account is the first instant message of transmission;
Prompt message is exported according to the first device identification, prompt message indicates the dangerous property of the first account.
Because the first device identification according to the sender for sending the first instant message exports prompt message, to remind user
The dangerous property of first account, it is possible thereby to avoid user in correlation technique from judging that receive first is instant according to experience
Whether message is the phenomenon for swindling message, it is possible thereby to improve the experience of user.
Alternatively, prompt message is exported according to the first device identification, including:
Target database is obtained, target database indicates the second equipment mark of the second instant message sender of historical reception
Know the corresponding relation between the second account, the account logged in when the second account is the second instant message of transmission;
Travel through target database, detection and first device identification identical the second device identification of target;
In response to detecting the device identification of target second, prompt message is exported.
Alternatively, in response to detecting the device identification of target second, prompt message is exported, including:
Exist and first the second device identification of device identification identical, and the second equipment mark if detecting in target database
Know corresponding second account different from the first account, then export prompt message.
Due to by obtaining target database, and travel through the target database, detection and the first device identification identical mesh
The second device identification is marked, in response to detecting the device identification of target second, then prompt message is exported.Due to detecting first i.e.
When message and the second instant message when being by logging in the first account in same equipment and the second account is sent respectively, will
Prompt message is exported to user, it is possible thereby to avoid user from having dust thrown into the eyes, so as to improve the experience of user.
Alternatively, the device identification of target second is put on the blacklist;Second instant message is to be received in preset time period
The instant message arrived.
Due to when detecting the presence of with first device identification the second device identification of identical, by the target second detected
Device identification pipes off, it is possible thereby to rejecting target device identifies the instant message that corresponding equipment is sent, can be with
Improve the experience of user.
Alternatively, the first device identification and the first account of the first instant message sender is obtained, including:
The first device identification and the first account are obtained from the first instant message, the first instant message includes:First equipment
Mark and the first account.
Because terminal device is after the first instant message is detected, the first equipment will be directly obtained from the first instant message
Mark and the first account, it is possible thereby to improve the efficiency that the first device identification and the first account are obtained.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of alarm device, including:
Detection module, is configured as detecting the first instant message;
Acquisition module, is configured to respond to detect the first instant message, obtains the of the first instant message sender
One device identification and the first account, the account logged in when the first account is the first instant message of transmission;
Output module, the first device identification for being configured as being obtained according to acquisition module exports prompt message, prompt message
Indicate the dangerous property of the first account.
Alternatively, output module includes:
First acquisition submodule, is configured as obtaining target database, target database indicates that the second of historical reception is
When message sender the second device identification and the second account between corresponding relation, the second account for send the second instant message
Shi Denglu account;
Detection sub-module, is configured as traveling through target database, detection is set with the first device identification identical target second
Standby mark;
Output sub-module, is configured to respond to detect the device identification of target second, exports prompt message.
Alternatively, output sub-module includes:
Output unit, is configured as, and first account and second account identical with the second device identification in the first device identification
During number difference, prompt message is exported.
Alternatively, the device identification of target second is put on the blacklist;Second instant message is to be received in preset time period
The instant message arrived.
Alternatively, acquisition module includes:
Second acquisition submodule, is configured as from the first instant message obtaining the first device identification and the first account, the
One instant message includes:First device identification and the first account.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of terminal device, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
Detect the first instant message;
In response to detecting the first instant message, the first device identification and the first account of the first instant message sender is obtained
Number, the account logged in when the first account is the first instant message of transmission;
Prompt message is exported according to the first device identification, prompt message indicates the dangerous property of the first account.
The technical scheme provided by this disclosed embodiment can include the following benefits:
After the first instant message is detected, the first device identification and the first account of first instant message sender is obtained
Number, wherein, the first account is believed to send the account logged in during the first instant message according to the first device identification output prompting
Breath, the prompt message indicates the dangerous property of the first account.Because first according to the sender for sending the first instant message sets
Standby mark output prompt message, to remind the dangerous property of the account of user first, it is possible thereby to avoid user's root in correlation technique
Whether the first instant message received according to experience judgement is the phenomenon for swindling message, it is possible thereby to improve the body of user
Test.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of alarm method according to an exemplary embodiment;
Fig. 2 is the flow chart of another alarm method according to an exemplary embodiment;
Fig. 3 is the schematic diagram of prompt message display interface;
Fig. 4 is the flow chart of another alarm method according to an exemplary embodiment;
Fig. 5 is a kind of block diagram of alarm device according to an exemplary embodiment;
Fig. 6 is a kind of block diagram of alarm device according to another exemplary embodiment;
Fig. 7 is a kind of block diagram of alarm device according to further example embodiment;
Fig. 8 is a kind of block diagram of alarm device according to another exemplary embodiment;
Fig. 9 is a kind of block diagram of the entity of terminal device according to an exemplary embodiment;
Figure 10 is a kind of block diagram for alarm device according to an exemplary embodiment.
Pass through above-mentioned accompanying drawing, it has been shown that the clear and definite embodiment of the disclosure, will hereinafter be described in more detail.These accompanying drawings
It is not intended to limit the scope that the disclosure is conceived by any mode with word description, but is by reference to specific embodiment
Those skilled in the art illustrate the concept of the disclosure.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
The disclosure provides a kind of alarm method, and the alarm method can apply in terminal device, such as mobile phone, computer or
Flat board etc..
With reference to Fig. 1, Fig. 1 is a kind of flow chart of alarm method according to an exemplary embodiment, as shown in figure 1,
The alarm method may comprise steps of:
In step s 11, the first instant message is detected.
In step s 12, in response to detecting the first instant message, the first equipment of the first instant message sender is obtained
Mark and the first account, the account logged in when first account is the first instant message of transmission.
In the disclosed embodiments, sending method, apparatus can be sent by the first account logged in thereon to terminal device
First instant message, terminal device will obtain the transmission of the first instant message of transmission after first instant message is detected
First device identification of side, and log on the first device, and for sending the first account of the first instant message.Wherein,
Sender can include mobile phone, computer or flat board etc., or be set with other of instant message function are sent by account
It is standby, therefore, the agreement (Internet interconnected between the network that the first device identification can for example log in for the first account
Protocol;Referred to as:IP) machine string number of address or transmission method, apparatus etc., the first account for example can be wechat, QQ or rice
The account of social software such as merely.
In step s 13, prompt message is exported according to the first device identification, the prompt message indicates that the first account has danger
It is dangerous.
In the disclosed embodiments, terminal device will determine that whether receive before after the first device identification is got
Cross the second account and log in the instant message sent in the corresponding equipment of the first device identification, if so, then explanation may have multiple
Account, which is logged in, sends instant message on same terminal device, now, and terminal device will export prompt message to user, to carry
The dangerous property of user's first account of waking up, so as to reduce the unnecessary loss of user.Wherein, output prompt message can include
Acoustic information, output vibration information or output light flash information are exported, can also be to user's display reminding interface, the interface
On show prompt message.
The alarm method of the present embodiment, after the first instant message is detected, obtains first instant message sender's
First device identification and the first account, wherein, the account logged in when the first account is the first instant message of transmission, and according to first
Device identification exports prompt message, and the prompt message indicates the dangerous property of the first account.Due to being disappeared immediately according to transmission first
The first device identification output prompt message of the sender of breath, to remind the dangerous property of the account of user first, it is possible thereby to keep away
Exempt from whether the first instant message that user receives according to experience judgement in correlation technique is the phenomenon for swindling message, thus
The experience of user can be improved.
The disclosure provides another alarm method, and this method is further expanding and optimize to the method shown in Fig. 1.
With reference to Fig. 2, Fig. 2 is the flow chart of another alarm method according to an exemplary embodiment.Such as Fig. 2 institutes
Show that the step S13 " exporting prompt message according to the first device identification " shown in Fig. 1 may comprise steps of:
In the step s 21, target database is obtained, the target database indicates that the second instant message of historical reception is sent
Corresponding relation between second device identification of side and the second account, second account is logged in when sending the second instant message
Account.
In the disclosed embodiments, terminal device will obtain mesh after the first device identification and the first account is got
Mark database, the target database include transmission the second instant message sender the second device identification and the second account it
Between corresponding relation.For example:Second account A correspondence the second device identification a, the second account B correspondences, second device identification b etc..Its
In, the second instant message is the instant message of historical reception, the instant message such as received within past 1 hour, or in mistake
Remove instant message for being received in 2 hours etc..In addition, the second account logs in transmission method, apparatus to send during the second instant message
On account, second account such as can the social software for wechat, QQ or Michat account, and the second account and the first account
Number difference.Second device identification is the identification information that the second instant message sends method, apparatus, for example, can be logged in for the second account
IP address or send machine string number etc. of method, apparatus.
In addition, when two users are logging in same network the different time using different user equipmenies respectively,
Now IP address is possible to repeat, and because the device identification of user equipment is identical, but account is different, therefore, can send out
Raw false alarm conditions.It will be understood by those skilled in the art that different user equipmenies is in same network entry, each user
The time interval of logging in network is when more than preset value, the phenomenon that IP address may be repeated, therefore, in order to improve alarm
Accuracy, the second instant message received in preset time period will be only stored in target database, when will exceed default
Between section the second instant message delete.Wherein, the specific value of preset time period, can be carried out according to actual conditions or experience
Set, such as can be 1 hour or 2 hours, for the specific value of preset time period, this is not restricted for the present embodiment.
In step S22, target database, detection and first device identification identical the second device identification of target are traveled through.
In the disclosed embodiments, terminal device will travel through the target database after target database is got,
Second device identification and the second account i.e. in traversal target database, set so as to detect and whether there is in target database with first
The standby mark device identification of identical second, i.e. target device is identified.
In step S23, in response to detecting the device identification of target second, prompt message is exported.
In the disclosed embodiments, exist and first the second equipment of device identification identical if detecting in target database
Mark, and corresponding second account of second device identification is different from the first account, then illustrates that the first account and the second account are
Log in same equipment, i.e. the first instant message and the second instant message are respectively by logging in same equipment
One account and the second account are sent, and now, terminal device will export prompt message, to remind user first that account is dangerous
Property.For example, Fig. 3 is the schematic diagram of prompt message display interface, as shown in figure 3, illustrated so that terminal device is mobile phone as an example,
Assuming that the first account and the second account are differed, terminal device is detected the presence of to be set with the first device identification identical target second
Standby mark, then will show " the first account is dangerous " on interface, user is reminded with this, to prevent user from having dust thrown into the eyes,
So as to improve the experience of user.
Need to illustrate, if detecting to exist and first the second equipment of device identification identical in target database
Mark, i.e., after the device identification of target second, during the device identification of target second is piped off.So, after terminal device
The instant message that the corresponding equipment of the device identification of target second is sent will be rejected, or is directly shielded the instant message
Cover.In addition, in order to prevent situation about the device identification of target second piping off by mistake, terminal device can also receive use
After the determination message for the dangerous property of the account of confirmation first that family is sent, then the equipment of target second piped off.
The alarm method that the embodiment of the present disclosure is provided, by obtaining target database, and travels through the target database, detects
With first device identification identical the second device identification of target, in response to detecting the device identification of target second, then output prompting
Information.Due to being by logging in the first account in same equipment respectively detecting the first instant message and the second instant message
Number and the second account send when, will to user export prompt message, it is possible thereby to avoid user from having dust thrown into the eyes, so as to improve
The experience of user.
With reference to Fig. 4, Fig. 4 is the flow chart of another alarm method according to an exemplary embodiment.Such as Fig. 4 institutes
Show, before the step S11 " the first instant message of detection " shown in Fig. 1, this method can also comprise the following steps:
In step S41, the second instant message is received.
In step S42, the second device identification and the second account are obtained according to the second instant message.
In the disclosed embodiments, terminal device is before the first instant message is detected, it is necessary first to set up target data
Storehouse.Specifically, because the second instant message that sending direction terminal device is sent includes the second device identification and the second account,
After terminal device is receiving the second instant message, the second device identification and the second account will be obtained from the second instant message
Number.
In step S43, target database is set up according to the second device identification and the second account.
In the disclosed embodiments, terminal device will set up two after the second device identification and the second account is got
The corresponding relation of person, the corresponding relation represents that the second account is logged in the corresponding equipment of the second device identification, after the completion of foundation,
Corresponding relation is stored in target database.
In addition, terminal device may receive multiple second instant messages, for each the second instant message, terminal
Equipment will obtain the second device identification carried in second instant message and the second account, and the second device identification and the second account
Corresponding relation between number.For example:If the second instant message is to be sent by user equipment by the second account a logged in thereon
To terminal device, therefore, terminal device will get the machine string A of the user equipment carried in second instant message
With the second account a, and the corresponding relation between machine string A and the second account a is stored.Similarly, terminal device is every
Second instant message is received, the second account for sending second instant message can be all set up and log in second account
Corresponding relation between second equipment identification information of equipment.
The alarm method that the embodiment of the present disclosure is provided, is obtained by receiving the second instant message, and by the second instant message
The second device identification and the second account are taken, target database is set up according to second device identification and the second account, for terminal
Equipment detects whether there is the device identification of target second when receiving the first instant message, so that user is pointed out, it is possible thereby to
Improve the experience of user.
Alternatively, on the basis of embodiment illustrated in fig. 1, obtain the first instant message sender the first device identification and
First account, including:The first device identification and the first account are obtained from the first instant message, first instant message includes the
One device identification and the first account.
Specifically, the first instant message that sending direction terminal device is sent includes the first equipment mark for sending method, apparatus
Know, and log in the first account for sending and the first instant message being sent on method, apparatus.Therefore, terminal device is detecting first
After instant message, the first device identification and the first account will be directly obtained from the first instant message, it is possible thereby to improve first
The efficiency that device identification and the first account are obtained.
The implementation process of alarm method is the foregoing described, the process can be realized by alarm device, below will be to the dress
The built-in function and structure put are illustrated.
Fig. 5 is a kind of block diagram of alarm device according to an exemplary embodiment.As shown in figure 5, the alarm device
Including detection module 11, acquisition module 12 and output module 13.
Detection module 11 is configured as detecting the first instant message;
Acquisition module 12 is configured to respond to detect the first instant message, obtains the of the first instant message sender
One device identification and the first account, the account logged in when the first account is the first instant message of transmission;
The first device identification that output module 13 is configured as being obtained according to acquisition module 12 exports prompt message, points out letter
Breath indicates the dangerous property of the first account.
The alarm device of the present embodiment, after the first instant message is detected, obtains first instant message sender's
First device identification and the first account, wherein, the account logged in when the first account is the first instant message of transmission, and according to first
Device identification exports prompt message, and the prompt message indicates the dangerous property of the first account.Due to being disappeared immediately according to transmission first
The first device identification output prompt message of the sender of breath, to remind the dangerous property of the account of user first, it is possible thereby to keep away
Exempt from whether the first instant message that user receives according to experience judgement in correlation technique is the phenomenon for swindling message, thus
The experience of user can be improved.
Wherein, as shown in fig. 6, Fig. 6 is a kind of block diagram of alarm device according to another exemplary embodiment, in figure
On the basis of 5 illustrated embodiments, output module 13 includes:
First acquisition submodule 131 is configured as obtaining target database, and target database indicates the second of historical reception
Corresponding relation between the second device identification of instant message sender and the second account, the second account disappears immediately to send second
The account logged in during breath;
Detection sub-module 132 is configured as traveling through target database, detection and the first device identification identical target second
Device identification;
Output sub-module 133 is configured to respond to detect the device identification of target second, exports prompt message.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
In addition, as shown in fig. 7, Fig. 7 is a kind of block diagram of alarm device according to further example embodiment, in figure
On the basis of 6 illustrated embodiments, output sub-module 133 includes:
Output unit 1331 is configured as, and first account and second identical with the second device identification in the first device identification
When account is different, prompt message is exported.
Alternatively, the device identification of target second is put on the blacklist;Second instant message is to be received in preset time period
The instant message arrived.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
In addition, as shown in figure 8, Fig. 8 is a kind of block diagram of alarm device according to another exemplary embodiment, in figure
On the basis of 5 illustrated embodiments, acquisition module 12 includes:
Second acquisition submodule 121 is configured as from the first instant message obtaining the first device identification and the first account,
First instant message includes:First device identification and the first account.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Inner function module and the structural representation of terminal device are the foregoing described, Fig. 9 is shown according to an exemplary embodiment
A kind of block diagram of the entity of the terminal device gone out, reference picture 9, terminal device can be implemented as:
Processor;
Memory for storing processor-executable instruction;
Wherein, processor is configured as:
Detect the first instant message;
In response to detecting the first instant message, the first device identification and the first account of the first instant message sender is obtained
Number, the account logged in when the first account is the first instant message of transmission;
Prompt message is exported according to the first device identification, prompt message indicates the dangerous property of the first account.
On the terminal device in above-described embodiment, wherein modules perform the concrete mode operated and are somebody's turn to do relevant
It is described in detail in the embodiment of method, explanation will be not set forth in detail herein.
Figure 10 is a kind of block diagram for alarm device according to an exemplary embodiment.Device 1000 can be moved
Mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, Medical Devices, body-building is set
It is standby, personal digital assistant etc..
Reference picture 10, device 1000 can include following one or more assemblies:Processing assembly 1002, memory 1004,
Power supply module 1006, multimedia groupware 1008, audio-frequency assembly 1010, the interface 1012 of input/output (I/O), sensor cluster
1014, and communication component 1016.
The integrated operation of the usual control device 1000 of processing assembly 1002, such as with display, call, data communication,
The camera operation operation associated with record operation.Processing assembly 1002 can include one or more processors 1020 to perform
Instruction, to complete all or part of step of above-mentioned method.In addition, processing assembly 1002 can include one or more moulds
Block, is easy to the interaction between processing assembly 1002 and other assemblies.For example, processing assembly 1002 can include multi-media module,
To facilitate the interaction between multimedia groupware 1008 and processing assembly 1002.
Memory 1004 is configured as storing various types of data supporting the operation in device 1000.These data
Example includes the instruction of any application program or method for being used to operate on device 1000, contact data, telephone book data,
Message, picture, video etc..Memory 1004 can by any kind of volatibility or non-volatile memory device or they
Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Power supply module 1006 provides electric power for the various assemblies of device 1000.Power supply module 1006 can include power management
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 1000.
Multimedia groupware 1008 is included in the touching display screen of one output interface of offer between device 1000 and user.
In certain embodiments, touching display screen can include liquid crystal display (LCD) and touch panel (TP).Touch panel includes one
Individual or multiple touch sensors are with the gesture on sensing touch, slip and touch panel.Touch sensor can not only sense tactile
Touch or sliding action border, but also detection and touch or slide related duration and pressure.In some implementations
In example, multimedia groupware 1008 includes a front camera and/or rear camera.When device 1000 be in operator scheme,
During such as screening-mode or video mode, front camera and/or rear camera can receive the multi-medium data of outside.Each
Front camera and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 1010 is configured as output and/or input audio signal.For example, audio-frequency assembly 1010 includes a wheat
Gram wind (MIC), when device 1000 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone quilt
It is configured to receive external audio signal.The audio signal received can be further stored in memory 1004 or via communication
Component 1016 is sent.In certain embodiments, audio-frequency assembly 1010 also includes a loudspeaker, for exports audio signal.
I/O interfaces 1012 are that interface, above-mentioned peripheral interface module are provided between processing assembly 1002 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 1014 includes one or more sensors, and the state for providing various aspects for device 1000 is commented
Estimate.For example, sensor cluster 1014 can detect opening/closed mode of device 1000, the relative positioning of component, such as group
Part is the display and keypad of device 1000, and sensor cluster 1014 can be with 1,000 1 groups of detection means 1000 or device
The position of part changes, the existence or non-existence that user contacts with device 1000, the orientation of device 1000 or acceleration/deceleration and device
1000 temperature change.Sensor cluster 1014 can include proximity transducer, be configured to connect in not any physics
The presence of object nearby is detected when touching.Sensor cluster 1014 can also include optical sensor, such as CMOS or ccd image sensing
Device, for being used in imaging applications.In certain embodiments, the sensor cluster 1014 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1016 is configured to facilitate the communication of wired or wireless way between device 1000 and other equipment.Dress
The wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof can be accessed by putting 1000.It is exemplary at one
In embodiment, communication component 1016 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, communication component 1016 also includes near-field communication (NFC) module, to promote junction service.
For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) skill can be based in NFC module
Art, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1000 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing above-mentioned document display method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 1004 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 1020 of device 1000.Example
Such as, non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and
Optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in storage medium is held by the processor of device 1000
During row so that device 1000 is able to carry out following methods:
Detect the first instant message;
In response to detecting the first instant message, the first device identification and the first account of the first instant message sender is obtained
Number, the account logged in when the first account is the first instant message of transmission;
Prompt message is exported according to the first device identification, prompt message indicates the dangerous property of the first account.
Wherein, prompt message is exported according to the first device identification, including:
Target database is obtained, target database indicates the second equipment mark of the second instant message sender of historical reception
Know the corresponding relation between the second account, the account logged in when the second account is the second instant message of transmission;
Travel through target database, detection and first device identification identical the second device identification of target;
In response to detecting the device identification of target second, prompt message is exported.
Wherein, in response to detecting the device identification of target second, prompt message is exported, including:
Exist and first the second device identification of device identification identical, and the second equipment mark if detecting in target database
Know corresponding second account different from the first account, then export prompt message.
Wherein, the device identification of target second is put on the blacklist;Second instant message is to be received in preset time period
Instant message.
Wherein, the first device identification and the first account of the first instant message sender is obtained, including:
The first device identification and the first account are obtained from the first instant message, the first instant message includes:First equipment
Mark and the first account.
Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein
Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claims are pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claims
System.
Claims (11)
1. a kind of alarm method, it is characterised in that including:
Detect the first instant message;
In response to detecting first instant message, the first device identification and the of the first instant message sender is obtained
One account, the account logged in when first account is transmission first instant message;
Prompt message is exported according to first device identification, the prompt message indicates the dangerous property of the first account.
2. according to the method described in claim 1, it is characterised in that described according to first device identification output prompting letter
Breath, including:
Target database is obtained, the target database indicates the second equipment mark of the second instant message sender of historical reception
Know the corresponding relation between the second account, the account logged in when second account is transmission second instant message;
Travel through the target database, detection and the second device identification of the first device identification identical target;
In response to detecting the device identification of target second, the prompt message is exported.
3. method according to claim 2, it is characterised in that described in response to detecting the second equipment of target mark
Know, export the prompt message, including:
Exist and the second device identification of the first device identification identical, and described the if detecting in the target database
Corresponding second account of two device identifications is different from first account, then exports the prompt message.
4. according to the method in claim 2 or 3, it is characterised in that the device identification of target second is put on the blacklist;
Second instant message is the instant message received in preset time period.
5. according to the method described in claim 1, it is characterised in that described to obtain the first of the first instant message sender
Device identification and the first account, including:
First device identification and first account, the first instant message bag are obtained from first instant message
Include:First device identification and first account.
6. a kind of alarm device, it is characterised in that including:
Detection module, is configured as detecting the first instant message;
Acquisition module, is configured to respond to detect first instant message, obtains the first instant message sender
The first device identification and the first account, the account that logs in when first account is sends first instant message;
Output module, first device identification for being configured as being obtained according to the acquisition module exports prompt message, described
Prompt message indicates the dangerous property of the first account.
7. device according to claim 6, it is characterised in that the output module includes:
First acquisition submodule, is configured as obtaining target database, the target database indicates that the second of historical reception is
When message sender the second device identification and the second account between corresponding relation, second account for send described second
The account logged in during instant message;
Detection sub-module, is configured as traveling through the target database, detection and the first device identification identical target the
Two device identifications;
Output sub-module, is configured to respond to detect the device identification of target second, exports the prompt message.
8. device according to claim 7, it is characterised in that the output sub-module includes:
Output unit, is configured as, and first account identical with second device identification in first device identification
When different from second account, the prompt message is exported.
9. the device according to claim 7 or 8, it is characterised in that the device identification of target second is put on the blacklist;
Second instant message is the instant message received in preset time period.
10. device according to claim 6, it is characterised in that the acquisition module includes:
Second acquisition submodule, is configured as from first instant message obtaining first device identification and described first
Account, first instant message includes:First device identification and first account.
11. a kind of terminal device, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Detect the first instant message;
In response to detecting first instant message, the first device identification and the of the first instant message sender is obtained
One account, the account logged in when first account is transmission first instant message;
Prompt message is exported according to first device identification, the prompt message indicates the dangerous property of the first account.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710190948.1A CN106992977B (en) | 2017-03-28 | 2017-03-28 | Alarm method, device and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710190948.1A CN106992977B (en) | 2017-03-28 | 2017-03-28 | Alarm method, device and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106992977A true CN106992977A (en) | 2017-07-28 |
CN106992977B CN106992977B (en) | 2020-06-19 |
Family
ID=59412046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710190948.1A Active CN106992977B (en) | 2017-03-28 | 2017-03-28 | Alarm method, device and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106992977B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532797A (en) * | 2013-11-06 | 2014-01-22 | 网之易信息技术(北京)有限公司 | Abnormity monitoring method and device for user registration |
CN105306610A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Network identifier detection method and device |
-
2017
- 2017-03-28 CN CN201710190948.1A patent/CN106992977B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103532797A (en) * | 2013-11-06 | 2014-01-22 | 网之易信息技术(北京)有限公司 | Abnormity monitoring method and device for user registration |
CN105306610A (en) * | 2014-07-04 | 2016-02-03 | 腾讯科技(深圳)有限公司 | Network identifier detection method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106992977B (en) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104216742B (en) | Brush machine control method and device based on password | |
CN104580730B (en) | Alarm clock prompting method and device | |
CN104683568A (en) | Information reminding method and information reminding device | |
CN104063654B (en) | The monitoring method and device of application program | |
CN104660806A (en) | Information reminding method and device | |
CN106790043A (en) | The method and device of message is sent in live application | |
CN104159230A (en) | Telephone call identification method and device | |
CN106203650A (en) | Call a taxi and ask sending method and device | |
CN106325670A (en) | Message prompting method and device | |
CN107330391A (en) | Product information reminding method and device | |
CN105323152A (en) | Message processing method, device and equipment | |
CN107423386A (en) | Generate the method and device of electronic card | |
CN107203306A (en) | Head portrait processing method and processing device | |
CN104463047B (en) | The device and method of control module work | |
CN105491518A (en) | Method and device for social reminding based on wearable devices | |
CN108476379A (en) | Information recording method and information record carrier | |
CN107404429A (en) | Circle of friends answering method, device and computer-readable recording medium | |
CN106534495A (en) | Method of information processing, device and equipment | |
CN104410900B (en) | A kind of method and device for controlling the indicator light being installed on smart machine | |
CN106453774A (en) | Method and apparatus for displaying contact information | |
CN105227660A (en) | A kind of based reminding method and device | |
CN105635414A (en) | Method and device for screening incoming calls | |
CN107819836A (en) | The remapping method and device of facility information | |
CN107158685A (en) | Locomotion assay method and apparatus | |
CN106789554A (en) | The method and device of short message treatment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |