CN110971746A - Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium - Google Patents
Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium Download PDFInfo
- Publication number
- CN110971746A CN110971746A CN201811151611.0A CN201811151611A CN110971746A CN 110971746 A CN110971746 A CN 110971746A CN 201811151611 A CN201811151611 A CN 201811151611A CN 110971746 A CN110971746 A CN 110971746A
- Authority
- CN
- China
- Prior art keywords
- short message
- bombing
- mode
- terminal equipment
- short
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012544 monitoring process Methods 0.000 claims abstract description 6
- 230000006870 function Effects 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 9
- 238000004891 communication Methods 0.000 abstract description 10
- 230000002265 prevention Effects 0.000 abstract description 10
- 239000007787 solid Substances 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000005034 decoration Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72484—User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application relates to the technical field of communication, and discloses a method and a device for preventing short message bombing, electronic equipment and a computer readable storage medium, wherein the method for preventing short message bombing comprises the following steps: when monitoring that the terminal equipment receives the short message, determining whether the currently received short message is a bombing short message; and if the bombing short message is detected, controlling the terminal equipment to enter an anti-bombing mode. The method can monitor the short messages received by the terminal equipment in real time, can detect whether the received short messages are bombing short messages or not, and can control the terminal equipment to enter the bombing prevention mode at the first time when the short messages currently received by the terminal equipment are determined to be the bombing short messages, so that the short message bombing of malicious attackers is effectively prevented, the interference of the malicious attackers to users through the short message bombing is avoided, and the users can be ensured to normally use communication operator services.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for preventing a short message from bombing, an electronic device, and a computer-readable storage medium.
Background
With the development of mobile communication services and the popularization of mobile phones, mobile phones gradually become indispensable communication tools in people's lives, wherein short message services are popular among users due to low price, novel form, convenience and rapidness, and users transmit more and more information by using short messages. However, with the development of short message service, more and more merchants spread advertisements by using short messages, short messages with advertisement contents begin to be more and more, various advertisement short messages begin to bother mass mobile phone users, and meanwhile, short messages with deceptive properties and short messages with other illegal contents begin to be more and more.
In addition, with the wide application of the mobile phone number binding functions of Web page short message verification code login, registration and the like, a 'short message bomber' also appears, collects the URL of the sent short message, directly requests the URL by a program by opening a normal short message sending page without a browser, and sends harassment short messages to a specified mobile phone number, and after the 'short message bomber' collects enough URLs, a large number of short messages can be sent to a certain mobile phone number in a short time, for example, dozens of short messages are sent in one minute, so that the normal use of the mobile phone by a user is influenced, and particularly, when the user sets the mobile phone to remind the receiving of the short messages in a ring tone mode, the user is greatly disturbed.
At present, although some methods for intercepting spam short messages such as advertisement short messages, fraud information and malicious harassment short messages are provided, no solution for short message bombing exists.
Disclosure of Invention
The purpose of the present application is to solve at least one of the above technical drawbacks, and to provide the following solutions:
in a first aspect, a method for preventing short message bombing is provided, which includes:
when monitoring that the terminal equipment receives the short message, determining whether the currently received short message is a bombing short message;
and if the bombing short message is detected, controlling the terminal equipment to enter an anti-bombing mode.
Specifically, determining whether the currently received short message is bombed includes:
detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not;
if the short message is smaller than the first preset threshold, determining that the short message is a bombing short message; alternatively, the first and second electrodes may be,
taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received within a preset time length, and detecting whether the average value is smaller than a second preset threshold value;
and if the short message is smaller than a second preset threshold, determining that the short message is a bombing short message.
Further, controlling the terminal device to enter an anti-bombing mode, comprising:
controlling the terminal equipment to switch to a mute mode; and/or the presence of a gas in the gas,
and controlling the terminal equipment to close the preset function permission.
Further, after the terminal device is controlled to enter the anti-bombing mode, the method further includes:
and generating prompt information for the terminal equipment to enter the anti-bombing mode, and displaying the prompt information.
Further, the prompt message is used for prompting the user whether to exit the anti-bombing mode.
Further, after the terminal device is controlled to enter the anti-bombing mode, the method further includes:
determining whether the subsequently received short message is not a bombing short message;
and if the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Further, determining whether the subsequently received short message is not a bombing short message includes:
detecting whether the receiving time interval between the subsequently received short message and the corresponding previous short message is larger than a third preset threshold value or not;
and if the number of the received short messages is larger than the third preset threshold, determining that the subsequently received short messages are not bombing short messages.
In a second aspect, a device for preventing short message bombing is provided, which includes:
the first determining module is used for determining whether the currently received short message is a bombing short message when monitoring that the terminal equipment receives the short message;
and the control module is used for controlling the terminal equipment to enter the anti-bombing mode when the short messages are bombed.
Specifically, the first determining module comprises a first detecting submodule and a second detecting submodule;
the first detection submodule is used for detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not, and determining that the short message is a bombing short message when the time interval is smaller than the first preset threshold value;
the second detection submodule is used for taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received in the preset time length, and detecting whether the average value is smaller than a second preset threshold value or not; and when the average value is smaller than a second preset threshold value, determining that the short message is a bombing short message.
Further, the control module is specifically configured to control the terminal device to switch to the mute mode; and/or, the method is used for controlling the terminal equipment to close the preset function authority.
Further, the system also comprises a prompt module;
and the prompt module is used for generating prompt information for the terminal equipment to enter the anti-bombing mode and displaying the prompt information.
Further, the prompt message is used for prompting the user whether to exit the anti-bombing mode.
Further, the device also comprises a second determination module;
the second determining module is used for determining whether the subsequently received short message is not a bombing short message; and when the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Further, the second determining module is specifically configured to detect whether a receiving time interval between a subsequently received short message and a previous short message corresponding to the subsequently received short message is greater than a third preset threshold; and when the receiving time interval is larger than a third preset threshold value, losing weight, and determining that the subsequently received short message is not a bombing short message.
In a third aspect, an electronic device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the method for preventing short message bombing is implemented.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, and the program, when executed by a processor, implements the method for preventing short message bombing.
According to the method for preventing the short message from being bombed provided by the embodiment of the application, when the terminal device is monitored to receive the short message, whether the currently received short message is the bombed short message is determined, so that the short message received by the terminal device can be monitored in real time, whether the received short message is the bombed short message can be detected, and a solid foundation is laid for subsequently controlling the terminal device to enter the bombed prevention mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart illustrating a method for preventing short message bombing according to an embodiment of the present disclosure;
fig. 2 is a schematic basic structure diagram of a short message bombing prevention device according to an embodiment of the present application;
fig. 3 is a detailed structural schematic diagram of a short message bombing prevention device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
With the wide application of the mobile phone number binding functions of Web page short message verification code login, registration and the like, a short message bomber also appears, collects the URL of a sent short message, directly requests the URL by a program by opening a normal short message sending page without a browser, and sends harassing short messages to a specified mobile phone number, and after the short message bomber collects enough URLs, a large number of short messages can be sent to a certain mobile phone number in a short time, for example, dozens of short messages are sent in one minute, so that the normal use of the mobile phone by a user is influenced, and particularly, when the user sets the mobile phone to remind the receiving of the short messages in a ring tone mode, the user is greatly interfered. At present, no solution for short message bombing exists.
The application provides a method, a device, an electronic device and a computer readable storage medium for preventing short message bombing, and aims to solve the above technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
The embodiment of the application provides a method for preventing short message bombing, as shown in fig. 1, the method includes:
step S110, when it is monitored that the terminal device receives the short message, determining whether the currently received short message is a bombed short message.
Specifically, an application program or a plug-in for preventing short message bombing may be installed in a terminal device (e.g., a mobile phone), and the application program or the plug-in may monitor a short message receiving condition of the terminal device in real time, and detect a received short message when it is monitored that the terminal device receives the short message, so as to determine whether the currently received short message is a bombed short message.
And step S120, if the bombing short message is received, controlling the terminal equipment to enter an anti-bombing mode.
Specifically, when the application program or the plug-in determines that the short message currently received by the terminal device is a bombing short message, a control signal for controlling the terminal device to enter the anti-bombing mode may be generated, so that the terminal device enters the anti-bombing mode, that is, when the application program or the plug-in determines that the short message currently received by the terminal device is a bombing short message, the terminal device is controlled to enter the anti-bombing mode.
Compared with the prior art, the method for preventing the short message from being bombed provided by the embodiment of the application determines whether the currently received short message is the bombed short message when the terminal device is monitored to receive the short message, so that the short message received by the terminal device can be monitored in real time, whether the received short message is the bombed short message can be detected, and a solid foundation is laid for subsequently controlling the terminal device to enter the bombed prevention mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
The embodiments of the present application provide another possible implementation manner, wherein,
step S110 includes step S1101 (not shown) and step S1102 (not shown), wherein,
step S1101: detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not; if the short message is smaller than the first preset threshold, determining that the short message is a bombing short message;
step S1102: taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received within a preset time length, and detecting whether the average value is smaller than a second preset threshold value; and if the short message is smaller than a second preset threshold, determining that the short message is a bombing short message.
Specifically, a time interval between two short messages received successively (i.e. the first preset threshold) may be set in advance according to an actual short message sending or receiving condition, and if the shortest time interval for receiving a short message under a normal condition is 5 seconds, i.e. the time interval between two short messages not bombed by a short message is at least 5 seconds, the first preset threshold may be set to 5 seconds, where the first preset threshold may be dynamically adjusted according to an actual condition, which is only an exemplary description.
Further, the application program or the plug-in may calculate a time interval between the receiving time of the short message currently received by the terminal device and the receiving time of the previous short message received by the terminal device, and determine whether the short message currently received by the terminal device is a bombing short message by comparing the calculated time interval with a first preset threshold. If the receiving time of the short message currently received by the terminal device is 10: 55: 20, the receiving time of the previous short message received by the terminal device is 10: 55: 12, it can be calculated that the time interval between two short messages is 8 seconds, and the first preset threshold is 5 seconds, so that the time interval is greater than the first preset threshold, and it can be determined that the short message currently received by the terminal device is not a bombing short message. If the receiving time of the short message currently received by the terminal device is 10: 55: 15, the receiving time of the previous short message received by the terminal device is 10: 55: 12, it can be calculated that the time interval between two short messages is 3 seconds, and the first preset threshold is 5 seconds, so that the time interval is smaller than the first preset threshold, and it can be determined that the short message currently received by the terminal device is a bombing short message.
Further, it may be specified in advance that, according to the actual short message sending or receiving situation, more than 20 short messages received within 1 minute are considered that the terminal device has entered the situation of being bombed by the short message, at this time, an average value calculation may be performed on the time interval between the receiving times of the 20 short messages, that is, the time interval between the 1 st short message and the 2 nd short message (denoted as a1), the time interval between the 2 nd short message and the 3 rd short message (denoted as a2), and … … may be performed until the time interval between the 29 th short message and the 30 th short message (denoted as a29) is calculated, then the average value calculation is performed on the obtained time intervals (a1, a2, … …, and a29), so as to obtain the average value of the time intervals between adjacent short messages received within 1 minute, at this time, the calculated average value may be used as a second preset threshold, and if the average value of the time intervals between adjacent short messages received within 1 minute is 3 seconds, the second preset threshold is 3 seconds. The second preset threshold may be dynamically adjusted according to actual needs, and the above is only an exemplary description.
Further, when monitoring that the terminal device receives the short message, the application program or the plug-in may use the receiving time of the short message as a time end point, calculate an average value of time intervals between adjacent short messages received within a first preset time period (e.g., 30 seconds, 50 seconds, 1 minute, 2 minutes, etc.), and determine whether the short message currently received by the terminal device is a bombing short message by detecting whether the average value is smaller than a second preset threshold. If the average value of the time intervals between adjacent short messages received within the first preset time is 5 seconds, the short message currently received by the terminal device is determined not to be a bombing short message because the average value is greater than the second preset threshold. If the average value of the time intervals between adjacent short messages received within the first preset time is 2 seconds, the short message currently received by the terminal device can be determined to be a bombing short message because the average value is smaller than the second preset threshold.
According to the embodiment of the application, whether the received short message is a bombing short message or not can be accurately judged by comparing the time interval of the receiving time of two successive short messages with the first preset threshold value or comparing the average value of the time interval between adjacent short messages received within the first preset time with the second preset threshold value, so that the occurrence of misjudgment can be effectively prevented.
The embodiments of the present application provide another possible implementation manner, wherein,
step S120 includes step S1201 (not shown) and/or step S1202 (not shown), wherein,
step S1201: controlling the terminal equipment to switch to a mute mode;
step S1202: and controlling the terminal equipment to close the preset function permission.
In addition, step S130 (not labeled in the figure) is also included after step S120: and generating prompt information for the terminal equipment to enter the anti-bombing mode, and displaying the prompt information.
The prompt information is used for prompting the user whether to exit the anti-bombing mode.
In addition, step S140 (not labeled in the figure) is also included after step S120: determining whether the subsequently received short message is not a bombing short message; and if the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Determining whether the subsequently received short message is not a bombing short message comprises the following steps:
detecting whether the receiving time interval between the subsequently received short message and the corresponding previous short message is larger than a third preset threshold value or not;
and if the number of the received short messages is larger than the third preset threshold, determining that the subsequently received short messages are not bombing short messages.
Specifically, when the application program or the plug-in determines that the short message currently received by the terminal device is a bombing short message, the terminal device is controlled to enter the bombing prevention mode. If the terminal device is currently set to remind the user in a ringing mode when receiving the short message, the terminal device can be controlled to be switched to the silent mode, namely when the currently received short message is determined to be a bombing short message, the terminal device is controlled to be switched from the ringing mode to the silent mode, so that the user is prevented from being greatly interfered by continuous ringing. In addition, when the short message currently received by the terminal device is determined to be a bombing short message, the terminal device can be controlled to close some preset function authorities, such as a short message reminding function authority, a short message receiving function authority and the like.
Further, after the terminal device is controlled to enter the anti-bombing mode, prompt information for the terminal device to enter the anti-bombing mode can be generated, and the prompt information is displayed on the terminal device, wherein the prompt information can be used for prompting a user whether to exit the anti-bombing mode. In practical applications, after the terminal device enters the anti-bombing mode, a "switched to the anti-bombing mode, exit or not? The prompt box is used for informing or prompting a user, and meanwhile, the prompt box comprises a yes button and a no button, so that the user can select whether to quit or not, if the user selects the yes button, the current anti-bombing mode is quitted, and if the user selects the no button, the current anti-bombing mode is kept, wherein if the user does not click the prompt box to make any selection, namely, the user does not click the yes button and the no button, the prompt box is always displayed on a screen and does not disappear until the user clicks any button, so that the current mode of the user terminal equipment can be prompted, corresponding configuration can be carried out according to the selection of the user, and the personalized requirements of the user are met.
Further, after the control terminal device enters the anti-bombing mode, it may be further continuously determined whether the subsequently received short message is not a bombing short message, and when it is determined that the subsequently received short message is not a bombing short message, the control terminal device switches from the anti-bombing mode to the normal mode, for example, the control terminal device returns from the mute mode to the ringer mode, so as to prevent the terminal device from being in the anti-bombing mode all the time and affecting the use of the user, that is, the application program or the plug-in can monitor whether the current short message of the terminal device is bombed in real time, and if so, the control terminal device returns from the mute mode to the ringer mode for the normal use of the user.
Further, in the process of determining whether the subsequently received short message is not a bombing short message, it may be determined that the subsequently received short message is not a bombing short message by detecting whether a receiving time interval between the subsequently received short message and a previous short message corresponding thereto is greater than a third preset threshold, if the time interval is greater than the third preset threshold, it is determined that the subsequently received short message is not a bombing short message, and if the time interval is less than the third preset threshold, it is determined that the subsequently received short message is still a bombing short message. The third preset threshold may be an empirical value that is reset according to an actual situation, for example, 4 seconds, 6 seconds, 8 seconds, or the like, or a value of the first preset threshold may be adopted, that is, the third preset threshold is equal to the first preset threshold.
Further, in the process of determining whether the subsequently received short message is not a bombing short message, the receiving time of the subsequently received short message may be used as a time end point, an average value of time intervals between adjacent short messages received within a preset time length (e.g., 40 seconds, 90 seconds) is calculated, and it is detected whether the average value is greater than a fourth preset threshold value, so as to determine that the subsequently received short message is not a bombing short message, if the time interval is greater than the fourth preset threshold value, it is determined that the subsequently received short message is not a bombing short message, and if the average value is less than the fourth preset threshold value, it is determined that the subsequently received short message is still a bombing short message. The fourth preset threshold may be an empirical value that is reset according to an actual situation, for example, 3 seconds, 4 seconds, or the like, or a value of the second preset threshold may be adopted, that is, the fourth preset threshold is equal to the second preset threshold.
For the embodiment of the application, when the received short message is determined to be a bombing short message, the terminal device can be controlled to enter the bombing prevention mode in time, so that the bombing of the short message of a malicious attacker can be effectively prevented, after the bombing prevention mode is entered, whether the subsequently received short message is a bombing short message or not is continuously detected, and therefore, when the subsequently received short message is not a bombing short message, the bombing prevention mode is exited at the first time, and the user can be ensured to normally use the service of a communication operator.
Example two
Fig. 2 is a schematic structural diagram of a device for preventing short message bombing according to an embodiment of the present disclosure, as shown in fig. 2, the device 20 may include a first determining module 21 and a control module 22, wherein,
the first determining module 21 is configured to determine whether a currently received short message is a bombing short message when it is monitored that the terminal device receives the short message;
the control module 22 is used for controlling the terminal device to enter the anti-bombing mode when the short message is bombed.
Specifically, the first determining module 21 includes a first detecting submodule 211 and a second detecting submodule 212, as shown in fig. 3, wherein,
the first detection submodule 211 is configured to detect whether a time interval between a receiving time of a short message and a receiving time of a previous short message is smaller than a first preset threshold, and determine that the short message is a bombing short message when the time interval is smaller than the first preset threshold;
the second detection submodule 212 is configured to calculate an average value of time intervals between adjacent short messages received within a preset time length, using the receiving time of the short message as a time end point, and detect whether the average value is smaller than a second preset threshold; and when the average value is smaller than a second preset threshold value, determining that the short message is a bombing short message.
Further, the control module 22 is specifically configured to control the terminal device to switch to the mute mode; and/or, the method is used for controlling the terminal equipment to close the preset function authority.
Further, a prompt module 23 is further included, as shown in fig. 3, where the prompt module 23 is configured to generate a prompt message that the terminal device enters the anti-bombing mode, and display the prompt message.
Further, the prompt message is used for prompting the user whether to exit the anti-bombing mode.
Further, a second determining module 24 is further included, as shown in fig. 3, wherein the second determining module 24 is configured to determine whether the subsequently received short message is not a bombing short message; and when the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Further, the second determining module 24 is specifically configured to detect whether a receiving time interval between a subsequently received short message and a previous short message corresponding to the subsequently received short message is greater than a third preset threshold; and when the receiving time interval is larger than a third preset threshold value, losing weight, and determining that the subsequently received short message is not a bombing short message.
Compared with the prior art, the device provided by the embodiment of the application determines whether the currently received short message is the bombing short message when the terminal device is monitored to receive the short message, so that the short message received by the terminal device can be monitored in real time, whether the received short message is the bombing short message can be detected, and a solid foundation is laid for subsequently controlling the terminal device to enter the anti-bombing mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
EXAMPLE III
An embodiment of the present application provides an electronic device, as shown in fig. 4, an electronic device 400 shown in fig. 4 includes: a processor 401 and a memory 403. Wherein the processor 401 is coupled to the memory 403, such as via a bus 402. Further, the electronic device 400 may also include a transceiver 404. It should be noted that the transceiver 404 is not limited to one in practical applications, and the structure of the electronic device 400 is not limited to the embodiment of the present application.
The processor 401 is applied to the embodiment of the present application, and is configured to implement the functions of the first determining module and the control module shown in fig. 2 or fig. 3, and the functions of the prompting module and the second determining module shown in fig. 3.
The processor 401 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 401 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The memory 403 may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 403 is used for storing application program codes for executing the scheme of the application, and the execution is controlled by the processor 401. The processor 401 is configured to execute the application program code stored in the memory 403 to implement the actions of the short message bombing prevention apparatus provided in the embodiment shown in fig. 2 or fig. 3.
The electronic device provided by the embodiment of the application comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and when the processor executes the program, compared with the prior art, the electronic device can realize that: when the terminal equipment receives the short message, whether the currently received short message is the bombing short message is determined, so that the short message received by the terminal equipment can be monitored in real time, whether the received short message is the bombing short message can be detected, and a solid foundation is laid for subsequently controlling the terminal equipment to enter the anti-bombing mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
The embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method shown in the first embodiment. Compared with the prior art, when the terminal equipment receives the short message, whether the currently received short message is the bombing short message is determined, so that the short message received by the terminal equipment can be monitored in real time, whether the received short message is the bombing short message can be detected, and a solid foundation is laid for subsequently controlling the terminal equipment to enter the anti-bombing mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
The computer-readable storage medium provided by the embodiment of the application is suitable for any embodiment of the method. And will not be described in detail herein.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.
Claims (10)
1. A method for preventing short message bombing is characterized by comprising the following steps:
when monitoring that the terminal equipment receives the short message, determining whether the currently received short message is a bombing short message;
and if the bombing short message is the bombing short message, controlling the terminal equipment to enter an anti-bombing mode.
2. The method of claim 1, wherein determining whether the currently received sms message is bombed comprises:
detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not;
if the short message is smaller than a first preset threshold value, determining that the short message is a bombing short message; alternatively, the first and second electrodes may be,
taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received in a preset time length, and detecting whether the average value is smaller than a second preset threshold value;
and if the short message is smaller than a second preset threshold, determining that the short message is a bombing short message.
3. The method according to claim 1 or 2, wherein the controlling the terminal device to enter an anti-bombing mode comprises:
controlling the terminal equipment to switch to a mute mode; and/or the presence of a gas in the gas,
and controlling the terminal equipment to close the preset function permission.
4. The method according to any one of claims 1-3, further comprising, after controlling the terminal device to enter an anti-bombing mode:
and generating prompt information for the terminal equipment to enter the anti-bombing mode, and displaying the prompt information.
5. The method of claim 4, wherein the prompt is for prompting the user whether to exit the anti-bombing mode.
6. The method according to any one of claims 1-5, further comprising, after controlling the terminal device to enter an anti-bombing mode:
determining whether the subsequently received short message is not a bombing short message;
and if the terminal equipment is not bombed with the short message, controlling the terminal equipment to be switched from the anti-bombing mode to the normal mode.
7. The method of claim 6, wherein determining whether the subsequently received message is not a bombing message comprises:
detecting whether the receiving time interval between the subsequently received short message and the corresponding previous short message is larger than a third preset threshold value;
and if the number of the received short messages is larger than a third preset threshold value, determining that the subsequently received short messages are not bombing short messages.
8. A device for preventing short message bombing is characterized by comprising:
the first determining module is used for determining whether the currently received short message is a bombing short message when monitoring that the terminal equipment receives the short message;
and the control module is used for controlling the terminal equipment to enter an anti-bombing mode when the short messages are bombed.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for preventing short message bombing of any of claims 1-7 when executing the program.
10. A computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the method for preventing short message bombing according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811151611.0A CN110971746A (en) | 2018-09-29 | 2018-09-29 | Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811151611.0A CN110971746A (en) | 2018-09-29 | 2018-09-29 | Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110971746A true CN110971746A (en) | 2020-04-07 |
Family
ID=70027494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811151611.0A Pending CN110971746A (en) | 2018-09-29 | 2018-09-29 | Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110971746A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115623485A (en) * | 2022-12-20 | 2023-01-17 | 杭州孝道科技有限公司 | Short message bombing detection method, system, server and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805572A (en) * | 2005-01-11 | 2006-07-19 | 康佳集团股份有限公司 | Short message explosive protection system and method for mobile terminals |
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN102761650A (en) * | 2011-04-26 | 2012-10-31 | 珠海德百祺科技有限公司 | DND method for mobile terminal and mobile terminal with DND function |
CN103458120A (en) * | 2013-08-27 | 2013-12-18 | 小米科技有限责任公司 | Event processing method and device and mobile terminal |
CN108064030A (en) * | 2017-11-14 | 2018-05-22 | 北京百悟科技有限公司 | SMS interception method and device |
-
2018
- 2018-09-29 CN CN201811151611.0A patent/CN110971746A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805572A (en) * | 2005-01-11 | 2006-07-19 | 康佳集团股份有限公司 | Short message explosive protection system and method for mobile terminals |
CN101184264A (en) * | 2007-11-27 | 2008-05-21 | 北京网秦天下科技有限公司 | Mobile phone telephone and message anti-disturbance and private communication method and system |
CN102761650A (en) * | 2011-04-26 | 2012-10-31 | 珠海德百祺科技有限公司 | DND method for mobile terminal and mobile terminal with DND function |
CN103458120A (en) * | 2013-08-27 | 2013-12-18 | 小米科技有限责任公司 | Event processing method and device and mobile terminal |
CN108064030A (en) * | 2017-11-14 | 2018-05-22 | 北京百悟科技有限公司 | SMS interception method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115623485A (en) * | 2022-12-20 | 2023-01-17 | 杭州孝道科技有限公司 | Short message bombing detection method, system, server and storage medium |
CN115623485B (en) * | 2022-12-20 | 2023-04-07 | 杭州孝道科技有限公司 | Short message bombing detection method, system, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104660481B (en) | Instant communication information processing method and processing device | |
CN107743086B (en) | Message processing method and system, and message sending and receiving device | |
CN107643977B (en) | Anti-addiction method and related product | |
CN107040494B (en) | User account abnormity prevention method and system | |
CN108712561B (en) | Authority management method, device, mobile terminal and storage medium | |
Androulidakis | Mobile phone security and forensics | |
CN107466041B (en) | Method and device for identifying pseudo base station and mobile terminal | |
CN109389393B (en) | Method, device, electronic equipment and computer readable storage medium for payment | |
KR20110132392A (en) | User challenge using information based on geography or user identity | |
US11330101B2 (en) | Managing spoofed calls to mobile devices | |
CN107633172B (en) | Malicious webpage monitoring method and electronic equipment | |
CN110557499B (en) | Information processing method and device and mobile terminal | |
CN104580108A (en) | Information prompting method and system as well as server | |
CN108650645B (en) | Method and related device for preventing malicious fee deduction | |
CN109246094B (en) | User terminal verification method, device and storage medium | |
CN107708115B (en) | Redirection control method and device and mobile terminal | |
CN110971746A (en) | Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium | |
CN106127034B (en) | A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment | |
WO2012072808A1 (en) | Method and system for broadcasting informative contents to a mobile terminal | |
CN106874804B (en) | Information display method, information display device and terminal | |
CN104660480B (en) | A kind of method, apparatus and system of account number abnormality processing | |
CN105119801B (en) | A kind of social message management method, system, user terminal and server | |
CN110198264B (en) | Processing method and device and electronic equipment | |
KR20140099389A (en) | System for detecting and preventing a phishing message of banking and method for detecting and preventing a phishing message of banking thereof | |
CN108174349B (en) | Short message channel quality detection method and network server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200407 |