CN110971746A - Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium - Google Patents

Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium Download PDF

Info

Publication number
CN110971746A
CN110971746A CN201811151611.0A CN201811151611A CN110971746A CN 110971746 A CN110971746 A CN 110971746A CN 201811151611 A CN201811151611 A CN 201811151611A CN 110971746 A CN110971746 A CN 110971746A
Authority
CN
China
Prior art keywords
short message
bombing
mode
terminal equipment
short
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811151611.0A
Other languages
Chinese (zh)
Inventor
王冬
庞洲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811151611.0A priority Critical patent/CN110971746A/en
Publication of CN110971746A publication Critical patent/CN110971746A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to the technical field of communication, and discloses a method and a device for preventing short message bombing, electronic equipment and a computer readable storage medium, wherein the method for preventing short message bombing comprises the following steps: when monitoring that the terminal equipment receives the short message, determining whether the currently received short message is a bombing short message; and if the bombing short message is detected, controlling the terminal equipment to enter an anti-bombing mode. The method can monitor the short messages received by the terminal equipment in real time, can detect whether the received short messages are bombing short messages or not, and can control the terminal equipment to enter the bombing prevention mode at the first time when the short messages currently received by the terminal equipment are determined to be the bombing short messages, so that the short message bombing of malicious attackers is effectively prevented, the interference of the malicious attackers to users through the short message bombing is avoided, and the users can be ensured to normally use communication operator services.

Description

Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for preventing a short message from bombing, an electronic device, and a computer-readable storage medium.
Background
With the development of mobile communication services and the popularization of mobile phones, mobile phones gradually become indispensable communication tools in people's lives, wherein short message services are popular among users due to low price, novel form, convenience and rapidness, and users transmit more and more information by using short messages. However, with the development of short message service, more and more merchants spread advertisements by using short messages, short messages with advertisement contents begin to be more and more, various advertisement short messages begin to bother mass mobile phone users, and meanwhile, short messages with deceptive properties and short messages with other illegal contents begin to be more and more.
In addition, with the wide application of the mobile phone number binding functions of Web page short message verification code login, registration and the like, a 'short message bomber' also appears, collects the URL of the sent short message, directly requests the URL by a program by opening a normal short message sending page without a browser, and sends harassment short messages to a specified mobile phone number, and after the 'short message bomber' collects enough URLs, a large number of short messages can be sent to a certain mobile phone number in a short time, for example, dozens of short messages are sent in one minute, so that the normal use of the mobile phone by a user is influenced, and particularly, when the user sets the mobile phone to remind the receiving of the short messages in a ring tone mode, the user is greatly disturbed.
At present, although some methods for intercepting spam short messages such as advertisement short messages, fraud information and malicious harassment short messages are provided, no solution for short message bombing exists.
Disclosure of Invention
The purpose of the present application is to solve at least one of the above technical drawbacks, and to provide the following solutions:
in a first aspect, a method for preventing short message bombing is provided, which includes:
when monitoring that the terminal equipment receives the short message, determining whether the currently received short message is a bombing short message;
and if the bombing short message is detected, controlling the terminal equipment to enter an anti-bombing mode.
Specifically, determining whether the currently received short message is bombed includes:
detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not;
if the short message is smaller than the first preset threshold, determining that the short message is a bombing short message; alternatively, the first and second electrodes may be,
taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received within a preset time length, and detecting whether the average value is smaller than a second preset threshold value;
and if the short message is smaller than a second preset threshold, determining that the short message is a bombing short message.
Further, controlling the terminal device to enter an anti-bombing mode, comprising:
controlling the terminal equipment to switch to a mute mode; and/or the presence of a gas in the gas,
and controlling the terminal equipment to close the preset function permission.
Further, after the terminal device is controlled to enter the anti-bombing mode, the method further includes:
and generating prompt information for the terminal equipment to enter the anti-bombing mode, and displaying the prompt information.
Further, the prompt message is used for prompting the user whether to exit the anti-bombing mode.
Further, after the terminal device is controlled to enter the anti-bombing mode, the method further includes:
determining whether the subsequently received short message is not a bombing short message;
and if the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Further, determining whether the subsequently received short message is not a bombing short message includes:
detecting whether the receiving time interval between the subsequently received short message and the corresponding previous short message is larger than a third preset threshold value or not;
and if the number of the received short messages is larger than the third preset threshold, determining that the subsequently received short messages are not bombing short messages.
In a second aspect, a device for preventing short message bombing is provided, which includes:
the first determining module is used for determining whether the currently received short message is a bombing short message when monitoring that the terminal equipment receives the short message;
and the control module is used for controlling the terminal equipment to enter the anti-bombing mode when the short messages are bombed.
Specifically, the first determining module comprises a first detecting submodule and a second detecting submodule;
the first detection submodule is used for detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not, and determining that the short message is a bombing short message when the time interval is smaller than the first preset threshold value;
the second detection submodule is used for taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received in the preset time length, and detecting whether the average value is smaller than a second preset threshold value or not; and when the average value is smaller than a second preset threshold value, determining that the short message is a bombing short message.
Further, the control module is specifically configured to control the terminal device to switch to the mute mode; and/or, the method is used for controlling the terminal equipment to close the preset function authority.
Further, the system also comprises a prompt module;
and the prompt module is used for generating prompt information for the terminal equipment to enter the anti-bombing mode and displaying the prompt information.
Further, the prompt message is used for prompting the user whether to exit the anti-bombing mode.
Further, the device also comprises a second determination module;
the second determining module is used for determining whether the subsequently received short message is not a bombing short message; and when the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Further, the second determining module is specifically configured to detect whether a receiving time interval between a subsequently received short message and a previous short message corresponding to the subsequently received short message is greater than a third preset threshold; and when the receiving time interval is larger than a third preset threshold value, losing weight, and determining that the subsequently received short message is not a bombing short message.
In a third aspect, an electronic device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the method for preventing short message bombing is implemented.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, and the program, when executed by a processor, implements the method for preventing short message bombing.
According to the method for preventing the short message from being bombed provided by the embodiment of the application, when the terminal device is monitored to receive the short message, whether the currently received short message is the bombed short message is determined, so that the short message received by the terminal device can be monitored in real time, whether the received short message is the bombed short message can be detected, and a solid foundation is laid for subsequently controlling the terminal device to enter the bombed prevention mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart illustrating a method for preventing short message bombing according to an embodiment of the present disclosure;
fig. 2 is a schematic basic structure diagram of a short message bombing prevention device according to an embodiment of the present application;
fig. 3 is a detailed structural schematic diagram of a short message bombing prevention device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
With the wide application of the mobile phone number binding functions of Web page short message verification code login, registration and the like, a short message bomber also appears, collects the URL of a sent short message, directly requests the URL by a program by opening a normal short message sending page without a browser, and sends harassing short messages to a specified mobile phone number, and after the short message bomber collects enough URLs, a large number of short messages can be sent to a certain mobile phone number in a short time, for example, dozens of short messages are sent in one minute, so that the normal use of the mobile phone by a user is influenced, and particularly, when the user sets the mobile phone to remind the receiving of the short messages in a ring tone mode, the user is greatly interfered. At present, no solution for short message bombing exists.
The application provides a method, a device, an electronic device and a computer readable storage medium for preventing short message bombing, and aims to solve the above technical problems in the prior art.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
The embodiment of the application provides a method for preventing short message bombing, as shown in fig. 1, the method includes:
step S110, when it is monitored that the terminal device receives the short message, determining whether the currently received short message is a bombed short message.
Specifically, an application program or a plug-in for preventing short message bombing may be installed in a terminal device (e.g., a mobile phone), and the application program or the plug-in may monitor a short message receiving condition of the terminal device in real time, and detect a received short message when it is monitored that the terminal device receives the short message, so as to determine whether the currently received short message is a bombed short message.
And step S120, if the bombing short message is received, controlling the terminal equipment to enter an anti-bombing mode.
Specifically, when the application program or the plug-in determines that the short message currently received by the terminal device is a bombing short message, a control signal for controlling the terminal device to enter the anti-bombing mode may be generated, so that the terminal device enters the anti-bombing mode, that is, when the application program or the plug-in determines that the short message currently received by the terminal device is a bombing short message, the terminal device is controlled to enter the anti-bombing mode.
Compared with the prior art, the method for preventing the short message from being bombed provided by the embodiment of the application determines whether the currently received short message is the bombed short message when the terminal device is monitored to receive the short message, so that the short message received by the terminal device can be monitored in real time, whether the received short message is the bombed short message can be detected, and a solid foundation is laid for subsequently controlling the terminal device to enter the bombed prevention mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
The embodiments of the present application provide another possible implementation manner, wherein,
step S110 includes step S1101 (not shown) and step S1102 (not shown), wherein,
step S1101: detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not; if the short message is smaller than the first preset threshold, determining that the short message is a bombing short message;
step S1102: taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received within a preset time length, and detecting whether the average value is smaller than a second preset threshold value; and if the short message is smaller than a second preset threshold, determining that the short message is a bombing short message.
Specifically, a time interval between two short messages received successively (i.e. the first preset threshold) may be set in advance according to an actual short message sending or receiving condition, and if the shortest time interval for receiving a short message under a normal condition is 5 seconds, i.e. the time interval between two short messages not bombed by a short message is at least 5 seconds, the first preset threshold may be set to 5 seconds, where the first preset threshold may be dynamically adjusted according to an actual condition, which is only an exemplary description.
Further, the application program or the plug-in may calculate a time interval between the receiving time of the short message currently received by the terminal device and the receiving time of the previous short message received by the terminal device, and determine whether the short message currently received by the terminal device is a bombing short message by comparing the calculated time interval with a first preset threshold. If the receiving time of the short message currently received by the terminal device is 10: 55: 20, the receiving time of the previous short message received by the terminal device is 10: 55: 12, it can be calculated that the time interval between two short messages is 8 seconds, and the first preset threshold is 5 seconds, so that the time interval is greater than the first preset threshold, and it can be determined that the short message currently received by the terminal device is not a bombing short message. If the receiving time of the short message currently received by the terminal device is 10: 55: 15, the receiving time of the previous short message received by the terminal device is 10: 55: 12, it can be calculated that the time interval between two short messages is 3 seconds, and the first preset threshold is 5 seconds, so that the time interval is smaller than the first preset threshold, and it can be determined that the short message currently received by the terminal device is a bombing short message.
Further, it may be specified in advance that, according to the actual short message sending or receiving situation, more than 20 short messages received within 1 minute are considered that the terminal device has entered the situation of being bombed by the short message, at this time, an average value calculation may be performed on the time interval between the receiving times of the 20 short messages, that is, the time interval between the 1 st short message and the 2 nd short message (denoted as a1), the time interval between the 2 nd short message and the 3 rd short message (denoted as a2), and … … may be performed until the time interval between the 29 th short message and the 30 th short message (denoted as a29) is calculated, then the average value calculation is performed on the obtained time intervals (a1, a2, … …, and a29), so as to obtain the average value of the time intervals between adjacent short messages received within 1 minute, at this time, the calculated average value may be used as a second preset threshold, and if the average value of the time intervals between adjacent short messages received within 1 minute is 3 seconds, the second preset threshold is 3 seconds. The second preset threshold may be dynamically adjusted according to actual needs, and the above is only an exemplary description.
Further, when monitoring that the terminal device receives the short message, the application program or the plug-in may use the receiving time of the short message as a time end point, calculate an average value of time intervals between adjacent short messages received within a first preset time period (e.g., 30 seconds, 50 seconds, 1 minute, 2 minutes, etc.), and determine whether the short message currently received by the terminal device is a bombing short message by detecting whether the average value is smaller than a second preset threshold. If the average value of the time intervals between adjacent short messages received within the first preset time is 5 seconds, the short message currently received by the terminal device is determined not to be a bombing short message because the average value is greater than the second preset threshold. If the average value of the time intervals between adjacent short messages received within the first preset time is 2 seconds, the short message currently received by the terminal device can be determined to be a bombing short message because the average value is smaller than the second preset threshold.
According to the embodiment of the application, whether the received short message is a bombing short message or not can be accurately judged by comparing the time interval of the receiving time of two successive short messages with the first preset threshold value or comparing the average value of the time interval between adjacent short messages received within the first preset time with the second preset threshold value, so that the occurrence of misjudgment can be effectively prevented.
The embodiments of the present application provide another possible implementation manner, wherein,
step S120 includes step S1201 (not shown) and/or step S1202 (not shown), wherein,
step S1201: controlling the terminal equipment to switch to a mute mode;
step S1202: and controlling the terminal equipment to close the preset function permission.
In addition, step S130 (not labeled in the figure) is also included after step S120: and generating prompt information for the terminal equipment to enter the anti-bombing mode, and displaying the prompt information.
The prompt information is used for prompting the user whether to exit the anti-bombing mode.
In addition, step S140 (not labeled in the figure) is also included after step S120: determining whether the subsequently received short message is not a bombing short message; and if the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Determining whether the subsequently received short message is not a bombing short message comprises the following steps:
detecting whether the receiving time interval between the subsequently received short message and the corresponding previous short message is larger than a third preset threshold value or not;
and if the number of the received short messages is larger than the third preset threshold, determining that the subsequently received short messages are not bombing short messages.
Specifically, when the application program or the plug-in determines that the short message currently received by the terminal device is a bombing short message, the terminal device is controlled to enter the bombing prevention mode. If the terminal device is currently set to remind the user in a ringing mode when receiving the short message, the terminal device can be controlled to be switched to the silent mode, namely when the currently received short message is determined to be a bombing short message, the terminal device is controlled to be switched from the ringing mode to the silent mode, so that the user is prevented from being greatly interfered by continuous ringing. In addition, when the short message currently received by the terminal device is determined to be a bombing short message, the terminal device can be controlled to close some preset function authorities, such as a short message reminding function authority, a short message receiving function authority and the like.
Further, after the terminal device is controlled to enter the anti-bombing mode, prompt information for the terminal device to enter the anti-bombing mode can be generated, and the prompt information is displayed on the terminal device, wherein the prompt information can be used for prompting a user whether to exit the anti-bombing mode. In practical applications, after the terminal device enters the anti-bombing mode, a "switched to the anti-bombing mode, exit or not? The prompt box is used for informing or prompting a user, and meanwhile, the prompt box comprises a yes button and a no button, so that the user can select whether to quit or not, if the user selects the yes button, the current anti-bombing mode is quitted, and if the user selects the no button, the current anti-bombing mode is kept, wherein if the user does not click the prompt box to make any selection, namely, the user does not click the yes button and the no button, the prompt box is always displayed on a screen and does not disappear until the user clicks any button, so that the current mode of the user terminal equipment can be prompted, corresponding configuration can be carried out according to the selection of the user, and the personalized requirements of the user are met.
Further, after the control terminal device enters the anti-bombing mode, it may be further continuously determined whether the subsequently received short message is not a bombing short message, and when it is determined that the subsequently received short message is not a bombing short message, the control terminal device switches from the anti-bombing mode to the normal mode, for example, the control terminal device returns from the mute mode to the ringer mode, so as to prevent the terminal device from being in the anti-bombing mode all the time and affecting the use of the user, that is, the application program or the plug-in can monitor whether the current short message of the terminal device is bombed in real time, and if so, the control terminal device returns from the mute mode to the ringer mode for the normal use of the user.
Further, in the process of determining whether the subsequently received short message is not a bombing short message, it may be determined that the subsequently received short message is not a bombing short message by detecting whether a receiving time interval between the subsequently received short message and a previous short message corresponding thereto is greater than a third preset threshold, if the time interval is greater than the third preset threshold, it is determined that the subsequently received short message is not a bombing short message, and if the time interval is less than the third preset threshold, it is determined that the subsequently received short message is still a bombing short message. The third preset threshold may be an empirical value that is reset according to an actual situation, for example, 4 seconds, 6 seconds, 8 seconds, or the like, or a value of the first preset threshold may be adopted, that is, the third preset threshold is equal to the first preset threshold.
Further, in the process of determining whether the subsequently received short message is not a bombing short message, the receiving time of the subsequently received short message may be used as a time end point, an average value of time intervals between adjacent short messages received within a preset time length (e.g., 40 seconds, 90 seconds) is calculated, and it is detected whether the average value is greater than a fourth preset threshold value, so as to determine that the subsequently received short message is not a bombing short message, if the time interval is greater than the fourth preset threshold value, it is determined that the subsequently received short message is not a bombing short message, and if the average value is less than the fourth preset threshold value, it is determined that the subsequently received short message is still a bombing short message. The fourth preset threshold may be an empirical value that is reset according to an actual situation, for example, 3 seconds, 4 seconds, or the like, or a value of the second preset threshold may be adopted, that is, the fourth preset threshold is equal to the second preset threshold.
For the embodiment of the application, when the received short message is determined to be a bombing short message, the terminal device can be controlled to enter the bombing prevention mode in time, so that the bombing of the short message of a malicious attacker can be effectively prevented, after the bombing prevention mode is entered, whether the subsequently received short message is a bombing short message or not is continuously detected, and therefore, when the subsequently received short message is not a bombing short message, the bombing prevention mode is exited at the first time, and the user can be ensured to normally use the service of a communication operator.
Example two
Fig. 2 is a schematic structural diagram of a device for preventing short message bombing according to an embodiment of the present disclosure, as shown in fig. 2, the device 20 may include a first determining module 21 and a control module 22, wherein,
the first determining module 21 is configured to determine whether a currently received short message is a bombing short message when it is monitored that the terminal device receives the short message;
the control module 22 is used for controlling the terminal device to enter the anti-bombing mode when the short message is bombed.
Specifically, the first determining module 21 includes a first detecting submodule 211 and a second detecting submodule 212, as shown in fig. 3, wherein,
the first detection submodule 211 is configured to detect whether a time interval between a receiving time of a short message and a receiving time of a previous short message is smaller than a first preset threshold, and determine that the short message is a bombing short message when the time interval is smaller than the first preset threshold;
the second detection submodule 212 is configured to calculate an average value of time intervals between adjacent short messages received within a preset time length, using the receiving time of the short message as a time end point, and detect whether the average value is smaller than a second preset threshold; and when the average value is smaller than a second preset threshold value, determining that the short message is a bombing short message.
Further, the control module 22 is specifically configured to control the terminal device to switch to the mute mode; and/or, the method is used for controlling the terminal equipment to close the preset function authority.
Further, a prompt module 23 is further included, as shown in fig. 3, where the prompt module 23 is configured to generate a prompt message that the terminal device enters the anti-bombing mode, and display the prompt message.
Further, the prompt message is used for prompting the user whether to exit the anti-bombing mode.
Further, a second determining module 24 is further included, as shown in fig. 3, wherein the second determining module 24 is configured to determine whether the subsequently received short message is not a bombing short message; and when the short messages are not bombed, the control terminal device is switched from the anti-bombing mode to the normal mode.
Further, the second determining module 24 is specifically configured to detect whether a receiving time interval between a subsequently received short message and a previous short message corresponding to the subsequently received short message is greater than a third preset threshold; and when the receiving time interval is larger than a third preset threshold value, losing weight, and determining that the subsequently received short message is not a bombing short message.
Compared with the prior art, the device provided by the embodiment of the application determines whether the currently received short message is the bombing short message when the terminal device is monitored to receive the short message, so that the short message received by the terminal device can be monitored in real time, whether the received short message is the bombing short message can be detected, and a solid foundation is laid for subsequently controlling the terminal device to enter the anti-bombing mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
EXAMPLE III
An embodiment of the present application provides an electronic device, as shown in fig. 4, an electronic device 400 shown in fig. 4 includes: a processor 401 and a memory 403. Wherein the processor 401 is coupled to the memory 403, such as via a bus 402. Further, the electronic device 400 may also include a transceiver 404. It should be noted that the transceiver 404 is not limited to one in practical applications, and the structure of the electronic device 400 is not limited to the embodiment of the present application.
The processor 401 is applied to the embodiment of the present application, and is configured to implement the functions of the first determining module and the control module shown in fig. 2 or fig. 3, and the functions of the prompting module and the second determining module shown in fig. 3.
The processor 401 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 401 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
Bus 402 may include a path that transfers information between the above components. The bus 402 may be a PCI bus or an EISA bus, etc. The bus 402 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
The memory 403 may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 403 is used for storing application program codes for executing the scheme of the application, and the execution is controlled by the processor 401. The processor 401 is configured to execute the application program code stored in the memory 403 to implement the actions of the short message bombing prevention apparatus provided in the embodiment shown in fig. 2 or fig. 3.
The electronic device provided by the embodiment of the application comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and when the processor executes the program, compared with the prior art, the electronic device can realize that: when the terminal equipment receives the short message, whether the currently received short message is the bombing short message is determined, so that the short message received by the terminal equipment can be monitored in real time, whether the received short message is the bombing short message can be detected, and a solid foundation is laid for subsequently controlling the terminal equipment to enter the anti-bombing mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
The embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method shown in the first embodiment. Compared with the prior art, when the terminal equipment receives the short message, whether the currently received short message is the bombing short message is determined, so that the short message received by the terminal equipment can be monitored in real time, whether the received short message is the bombing short message can be detected, and a solid foundation is laid for subsequently controlling the terminal equipment to enter the anti-bombing mode; if the short messages are bombed, the terminal equipment is controlled to enter the anti-bombing mode, so that when the short messages currently received by the terminal equipment are bombed short messages, the terminal equipment is controlled to enter the anti-bombing mode at the first time, the short message bombing of a malicious attacker is effectively prevented, the interference of the malicious attacker on a user through the short message bombing is avoided, and the user can be ensured to normally use the service of a communication operator.
The computer-readable storage medium provided by the embodiment of the application is suitable for any embodiment of the method. And will not be described in detail herein.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present application, and it should be noted that, for those skilled in the art, several modifications and decorations can be made without departing from the principle of the present application, and these modifications and decorations should also be regarded as the protection scope of the present application.

Claims (10)

1. A method for preventing short message bombing is characterized by comprising the following steps:
when monitoring that the terminal equipment receives the short message, determining whether the currently received short message is a bombing short message;
and if the bombing short message is the bombing short message, controlling the terminal equipment to enter an anti-bombing mode.
2. The method of claim 1, wherein determining whether the currently received sms message is bombed comprises:
detecting whether the time interval between the receiving time of the short message and the receiving time of the previous short message is smaller than a first preset threshold value or not;
if the short message is smaller than a first preset threshold value, determining that the short message is a bombing short message; alternatively, the first and second electrodes may be,
taking the receiving time of the short message as a time end point, calculating the average value of the time intervals between adjacent short messages received in a preset time length, and detecting whether the average value is smaller than a second preset threshold value;
and if the short message is smaller than a second preset threshold, determining that the short message is a bombing short message.
3. The method according to claim 1 or 2, wherein the controlling the terminal device to enter an anti-bombing mode comprises:
controlling the terminal equipment to switch to a mute mode; and/or the presence of a gas in the gas,
and controlling the terminal equipment to close the preset function permission.
4. The method according to any one of claims 1-3, further comprising, after controlling the terminal device to enter an anti-bombing mode:
and generating prompt information for the terminal equipment to enter the anti-bombing mode, and displaying the prompt information.
5. The method of claim 4, wherein the prompt is for prompting the user whether to exit the anti-bombing mode.
6. The method according to any one of claims 1-5, further comprising, after controlling the terminal device to enter an anti-bombing mode:
determining whether the subsequently received short message is not a bombing short message;
and if the terminal equipment is not bombed with the short message, controlling the terminal equipment to be switched from the anti-bombing mode to the normal mode.
7. The method of claim 6, wherein determining whether the subsequently received message is not a bombing message comprises:
detecting whether the receiving time interval between the subsequently received short message and the corresponding previous short message is larger than a third preset threshold value;
and if the number of the received short messages is larger than a third preset threshold value, determining that the subsequently received short messages are not bombing short messages.
8. A device for preventing short message bombing is characterized by comprising:
the first determining module is used for determining whether the currently received short message is a bombing short message when monitoring that the terminal equipment receives the short message;
and the control module is used for controlling the terminal equipment to enter an anti-bombing mode when the short messages are bombed.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for preventing short message bombing of any of claims 1-7 when executing the program.
10. A computer-readable storage medium, wherein a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the method for preventing short message bombing according to any one of claims 1 to 7.
CN201811151611.0A 2018-09-29 2018-09-29 Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium Pending CN110971746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811151611.0A CN110971746A (en) 2018-09-29 2018-09-29 Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811151611.0A CN110971746A (en) 2018-09-29 2018-09-29 Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN110971746A true CN110971746A (en) 2020-04-07

Family

ID=70027494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811151611.0A Pending CN110971746A (en) 2018-09-29 2018-09-29 Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN110971746A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115623485A (en) * 2022-12-20 2023-01-17 杭州孝道科技有限公司 Short message bombing detection method, system, server and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805572A (en) * 2005-01-11 2006-07-19 康佳集团股份有限公司 Short message explosive protection system and method for mobile terminals
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN102761650A (en) * 2011-04-26 2012-10-31 珠海德百祺科技有限公司 DND method for mobile terminal and mobile terminal with DND function
CN103458120A (en) * 2013-08-27 2013-12-18 小米科技有限责任公司 Event processing method and device and mobile terminal
CN108064030A (en) * 2017-11-14 2018-05-22 北京百悟科技有限公司 SMS interception method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805572A (en) * 2005-01-11 2006-07-19 康佳集团股份有限公司 Short message explosive protection system and method for mobile terminals
CN101184264A (en) * 2007-11-27 2008-05-21 北京网秦天下科技有限公司 Mobile phone telephone and message anti-disturbance and private communication method and system
CN102761650A (en) * 2011-04-26 2012-10-31 珠海德百祺科技有限公司 DND method for mobile terminal and mobile terminal with DND function
CN103458120A (en) * 2013-08-27 2013-12-18 小米科技有限责任公司 Event processing method and device and mobile terminal
CN108064030A (en) * 2017-11-14 2018-05-22 北京百悟科技有限公司 SMS interception method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115623485A (en) * 2022-12-20 2023-01-17 杭州孝道科技有限公司 Short message bombing detection method, system, server and storage medium
CN115623485B (en) * 2022-12-20 2023-04-07 杭州孝道科技有限公司 Short message bombing detection method, system, server and storage medium

Similar Documents

Publication Publication Date Title
CN104660481B (en) Instant communication information processing method and processing device
CN107743086B (en) Message processing method and system, and message sending and receiving device
CN107643977B (en) Anti-addiction method and related product
CN107040494B (en) User account abnormity prevention method and system
CN108712561B (en) Authority management method, device, mobile terminal and storage medium
Androulidakis Mobile phone security and forensics
CN107466041B (en) Method and device for identifying pseudo base station and mobile terminal
CN109389393B (en) Method, device, electronic equipment and computer readable storage medium for payment
KR20110132392A (en) User challenge using information based on geography or user identity
US11330101B2 (en) Managing spoofed calls to mobile devices
CN107633172B (en) Malicious webpage monitoring method and electronic equipment
CN110557499B (en) Information processing method and device and mobile terminal
CN104580108A (en) Information prompting method and system as well as server
CN108650645B (en) Method and related device for preventing malicious fee deduction
CN109246094B (en) User terminal verification method, device and storage medium
CN107708115B (en) Redirection control method and device and mobile terminal
CN110971746A (en) Method and device for preventing short message from bombing, electronic equipment and computer-readable storage medium
CN106127034B (en) A kind of method, apparatus that anti-locking system is maliciously closed and electronic equipment
WO2012072808A1 (en) Method and system for broadcasting informative contents to a mobile terminal
CN106874804B (en) Information display method, information display device and terminal
CN104660480B (en) A kind of method, apparatus and system of account number abnormality processing
CN105119801B (en) A kind of social message management method, system, user terminal and server
CN110198264B (en) Processing method and device and electronic equipment
KR20140099389A (en) System for detecting and preventing a phishing message of banking and method for detecting and preventing a phishing message of banking thereof
CN108174349B (en) Short message channel quality detection method and network server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200407