WO2016019793A1 - Information monitoring method and apparatus and mobile terminal - Google Patents

Information monitoring method and apparatus and mobile terminal Download PDF

Info

Publication number
WO2016019793A1
WO2016019793A1 PCT/CN2015/084307 CN2015084307W WO2016019793A1 WO 2016019793 A1 WO2016019793 A1 WO 2016019793A1 CN 2015084307 W CN2015084307 W CN 2015084307W WO 2016019793 A1 WO2016019793 A1 WO 2016019793A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
database
deleted
modified
backup
Prior art date
Application number
PCT/CN2015/084307
Other languages
French (fr)
Chinese (zh)
Inventor
唐虹刚
Original Assignee
阿里巴巴集团控股有限公司
唐虹刚
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司, 唐虹刚 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2016019793A1 publication Critical patent/WO2016019793A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/06Arrangements for sorting, selecting, merging, or comparing data on individual record carriers
    • G06F7/20Comparing separate sets of record carriers arranged in the same sequence to determine whether at least some of the data in one set is identical with that in the other set or sets

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, and a mobile terminal for monitoring information.
  • the functions of smart phones are becoming more and more powerful, and more and more users choose to manage their own text messages through some application software in smart phones.
  • the application software can scan and securely verify the short message to intercept the short message.
  • the present invention aims to solve at least one of the technical problems in the related art to some extent. To this end, it is an object of the present invention to provide a method of monitoring information.
  • the method can solve the problem that the information is maliciously deleted and modified, and improve the security of the information in the mobile terminal.
  • a second object of the present invention is to provide an information monitoring apparatus.
  • a third object of the present invention is to provide a mobile terminal.
  • a method for monitoring information includes: receiving a notification of a change in information; reading information from the information database and the backup database, respectively, and extracting information from the information database with the source The information in the backup database is compared to identify the deleted or modified information; and if it is determined that the deleted or modified information is from a trusted source, the prompt information or/and the information is deleted or modified. Restore deleted or modified information.
  • the method for monitoring information in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and prompts the user or directly when the information is determined to be from the trusted source. Restoring the information solves the problem that the information is maliciously deleted and modified, improves the security of the information in the mobile terminal, and avoids property loss.
  • the information monitoring apparatus of the second aspect of the present invention includes: a processing module, configured to send a notification of the information change to the monitoring module; and the monitoring module is configured to separately receive the notification after receiving the notification Reading information from the information database and the backup database, and comparing the information from the information database with information from the backup database to identify deleted or modified information; and a warning reminder module for determining Said
  • the deleted or modified information identified by the monitoring module is from a trusted source, and the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
  • the information monitoring apparatus of the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and prompts the user or directly when the information is determined to be from the trusted source. Restoring the information solves the problem that the information is maliciously deleted and modified, improves the security of the information in the mobile terminal, and avoids property loss.
  • the embodiment of the present invention provides a mobile terminal, which includes a casing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the casing, and the processing And the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; and the processor reads by Executing program code stored in the memory to execute a program corresponding to the executable program code for performing the steps of: receiving a notification of a change in information; reading information from the information database and the backup database, respectively, and Information from the information database is compared with information from the backup database to identify deleted or modified information; and if it is determined that the deleted or modified information is from a trusted source, the information is sent Deleted or modified prompt information or / and restore deleted or modified information.
  • the mobile terminal of the information in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and prompts the user or directly when the information is determined to be from the trusted source. Restoring the information solves the problem that the information is maliciously deleted and modified, improves the security of the information in the mobile terminal, and avoids property loss.
  • FIG. 1 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
  • FIG. 2 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of an information monitoring apparatus according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an apparatus for monitoring information according to another embodiment of the present invention.
  • FIG. 1 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
  • the monitoring method of information includes:
  • the mobile terminal has an information database and a backup database. After the mobile terminal receives the information, the mobile terminal can save the received information to the information database. At the same time, the received information is also saved to the backup database. It should be noted that in order to improve security, the mobile terminal can directly obtain information from the RIL (radio interface layer). In this way, information can be obtained before the information is maliciously intercepted, and saved to the backup database. . That is to say, the information stored in the backup database is the original information, and once the information is maliciously intercepted, it can be restored through the backup database. The mobile terminal can then update the information database based on the operation of the information by the user or a third party application. If the information in the information database changes, the mobile terminal can receive a notification of the change in the information.
  • the above information may be short message, referred to as short message.
  • S102 Read information from the information database and the backup database, respectively, and compare the information from the information database with the information from the backup database to identify the deleted or modified information.
  • the mobile terminal can read all the information from the information database and the backup database, respectively, and compare the information from the information database with the information from the backup database. , identifying the deleted or modified information. For example, when a mobile phone receives a text message, if there is no malicious virus or application software interception, the information database and the backup database in the mobile phone are consistent, but when a malicious virus malicious interception or mobile application software error intercepts or modifies the short message, The information database and the backup database will be inconsistent. Compare all the SMS messages in the mobile phone information database and the backup database, and finally get the deleted or modified SMS.
  • the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
  • the mobile terminal may have a trusted source database for storing a trusted short message sender number, such as an Alipay, a bank, or the like, or may have an untrusted source database.
  • a trusted short message sender number such as an Alipay, a bank, or the like
  • the mobile terminal may issue a prompt message that the information is deleted or modified, and may also be deleted or modified. information.
  • the mobile terminal can check whether the sender number of the deleted or modified information is located in the trusted source database. If located in a trusted source database, it can be determined that the deleted or modified information is from a trusted source. The mobile terminal can also check if the sender number of the deleted or modified information is in the untrusted source database. If not, it can be determined that the deleted or modified information is from a trusted source.
  • the deleted or modified short message may be read from the backup database and restored to the information database, or the corresponding short message may be read from the backup database, and restored to the information database, and the prompt information is sent, and based on the user basis The operation performed by the prompt information displays the corresponding short message.
  • the information database supports displaying text messages by means of a short message list. For example, after the deleted or modified information is restored, a prompt message is sent, and then the user can view the short message through the short message list to obtain the content.
  • the method for monitoring information in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and restores the information when it is determined that the information is from a trusted source.
  • the problem that the information is maliciously deleted and modified is solved, the security of the information in the mobile terminal is improved, and property loss is avoided.
  • FIG. 2 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
  • the monitoring method of information includes:
  • the mobile phone has a short message database and a backup database. After the mobile phone receives the short message, the mobile phone can save the received information to the short message database and the backup database. At this time, when the short message in the short message database is found to change, such as malicious virus interception or modification, it indicates that the mobile phone text message has changed.
  • all the short messages in the short message database can be compared with all the short messages in the backup database to obtain the deleted or modified short message.
  • step S203 Determine whether the source is from a trusted source. If the short message is from a trusted source, go to step S204. If the message comes from an untrusted source, it ends.
  • the trusted source database is used to store trusted sender number, such as Alipay, bank and other SMS senders.
  • the user may be reminded that the short message from the trusted source is deleted or modified, and then the deleted or modified short message is restored.
  • the method for monitoring information in the embodiment of the present invention obtains a deleted or modified short message by monitoring the change of the short message data.
  • the short message is from a trusted source
  • the user is reminded and the short message is restored, and the short message is maliciously solved.
  • the problem of deletion and modification improves the security of the personal information of the user in the mobile phone, effectively protects the privacy of the user and avoids property loss.
  • the present invention also proposes an information monitoring apparatus.
  • FIG. 3 is a schematic structural diagram of an information monitoring apparatus according to an embodiment of the present invention.
  • the information monitoring device includes: a processing module 110, a monitoring module 120, and a warning reminding module 130.
  • the processing module 110 is configured to send a notification of the information change to the monitoring module 120.
  • the mobile terminal has an information database and a backup database.
  • the processing module 110 is configured to update the information database according to the operation of the information by the user or the third party application.
  • the processing module 110 can send a notification of the information change to the monitoring module 120.
  • the above information can be short message, Jane Called SMS.
  • the monitoring module 120 is configured to read information from the information database and the backup database respectively after receiving the notification, and compare the information from the information database with the information from the backup database to identify the deleted or modified information.
  • the warning reminding module 130 is configured to, when determining that the deleted or modified information identified by the monitoring module 120 is from a trusted source, issue prompt information that the information is deleted or modified or/and restore the deleted or modified information.
  • the alert reminder module 130 can check if the sender number of the deleted or modified information is in the trusted source database. If located in a trusted source database, it can be determined that the deleted or modified information is from a trusted source. The alert reminder module 130 can also check if the sender number of the deleted or modified information is in the untrusted source database. If not, it can be determined that the deleted or modified information is from a trusted source.
  • the alert reminder module 130 may issue a prompt message in which the information was deleted or modified, and may also restore the deleted or modified information.
  • the deleted or modified short message may be read from the backup database and restored to the information database, or the corresponding short message may be read from the backup database, and restored to the information database, and the prompt information is sent, and based on the user basis The operation performed by the prompt information displays the corresponding short message.
  • the information database supports displaying text messages by means of a short message list. For example, after the deleted or modified information is restored, a prompt message is sent, and then the user can view the short message through the short message list to obtain the content.
  • the monitoring device for information of the embodiment may further include a receiving module 140.
  • the receiving module 140 is configured to send a backup instruction to the monitoring module 120 and an update instruction to the processing module 110 after receiving the information.
  • the monitoring module 120 can receive information from the wireless interface layer RIL according to the backup instruction, and save the information to the backup database.
  • the processing module 110 may save the received information to the information database according to the update instruction.
  • FIG. 4 is a schematic structural diagram of an information monitoring apparatus according to another embodiment of the present invention. As shown in FIG. 4, it may include:
  • the bottom layer of the phone receives the short message and then transmits it to the RIL.
  • the bottom layer of the phone and the RIL are located in the receiving module 140.
  • the RIL notifies the short message monitoring process that the short message is received.
  • the short message monitoring process is located in the monitoring module 120.
  • the short message monitoring process backs up the received short message to the backup database.
  • the RIL notifies the short message processing framework to receive the short message.
  • the short message processing framework is in the processing module 110.
  • the short message processed by the short message processing framework is saved to the short message database.
  • the short message monitoring process reads all the short messages in the short message database.
  • the short message monitoring process reads all the short messages in the backup database.
  • S409 The short message monitoring process compares all the short messages in the short message database with all the short messages in the backup database, and identifies the deleted or modified short messages.
  • the short message monitoring process reads the number of the trusted sender from the trusted source database, and identifies that the deleted or modified short message is from the trusted source.
  • the warning reminding module 130 reminds the user that the short message from the trusted source is deleted or modified, and restores the deleted or modified short message.
  • the information monitoring apparatus of the embodiment of the present invention identifies the deleted or modified short message by comparing the short message in the short message database with the short message in the backup database, and restores the short message when the short message is determined to be from the trusted source.
  • the problem that the short message is maliciously deleted and modified is solved, the security of the information in the mobile terminal is improved, and property loss is avoided.
  • the present invention further provides a mobile terminal including a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the housing, The processor and the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; and the processor reads the memory stored in the memory by reading The executable program code runs a program corresponding to the above executable program code for performing the following steps:
  • the mobile terminal has an information database and a backup database. After the mobile terminal receives the information, the mobile terminal can save the received information to the information database. At the same time, the received information is also saved to the backup database. It should be noted that the mobile terminal can obtain information directly from the RIL. The mobile terminal can then update the information database based on the operation of the information by the user or a third party application. If the information in the information database changes, the mobile terminal can receive a notification of the change in the information.
  • the above information may be short message, referred to as short message.
  • the mobile terminal can read all the information from the information database and the backup database, respectively, and compare the information from the information database with the information from the backup database. , identifying the deleted or modified information. For example, when a mobile phone receives a text message, if there is no malicious virus or application software interception, the information database and the backup database in the mobile phone are consistent, but when a malicious virus malicious interception or mobile application software error intercepts or modifies the short message, The information database and the backup database will be inconsistent. Compare all the text messages in the mobile phone information database and the backup database, and finally get the short deleted or modified. letter.
  • the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
  • the mobile terminal may have a trusted source database for storing a trusted short message sender number, such as an Alipay, a bank, or the like, or may have an untrusted source database.
  • a trusted short message sender number such as an Alipay, a bank, or the like
  • the mobile terminal may issue a prompt message that the information is deleted or modified, and may also be deleted or modified. information.
  • the mobile terminal can check whether the sender number of the deleted or modified information is located in the trusted source database. If located in a trusted source database, it can be determined that the deleted or modified information is from a trusted source. The mobile terminal can also check if the sender number of the deleted or modified information is in the untrusted source database. If not, it can be determined that the deleted or modified information is from a trusted source.
  • the deleted or modified short message may be read from the backup database and restored to the information database, or the corresponding short message may be read from the backup database and restored to The information database is issued with prompt information, and the corresponding short message is displayed based on the operation performed by the user according to the prompt information.
  • the information database supports displaying text messages by means of a short message list. For example, after the deleted or modified information is restored, a prompt message is sent, and then the user can view the short message through the short message list to obtain the content.
  • the mobile terminal in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and when the information is determined to be from the trusted source, the information is restored, and the information is solved.
  • the problem that information is maliciously deleted and modified improves the security of information in the mobile terminal and avoids property loss.
  • first and second are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
  • features defining “first” or “second” may include at least one of the features, either explicitly or implicitly.
  • the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise.
  • a "computer-readable medium” can be any apparatus that can contain, store, communicate, propagate, or transport a program for use in an instruction execution system, apparatus, or device, or in conjunction with the instruction execution system, apparatus, or device.
  • computer readable media include the following: electrical connections (electronic devices) having one or more wires, portable computer disk cartridges (magnetic devices), random access memory (RAM), Read only memory (ROM), erasable editable read only memory (EPROM or flash memory), fiber optic devices, and portable compact disk read only memory (CDROM).
  • the computer readable medium may even be a paper or other suitable medium on which the program can be printed, as it may be optically scanned, for example by paper or other medium, followed by editing, interpretation or, if appropriate, other suitable The method is processed to obtain the program electronically and then stored in computer memory.
  • portions of the invention may be implemented in hardware, software, firmware or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are an information monitoring method and apparatus and a mobile terminal. The information monitoring method comprises: receiving a notification about an information change; reading information separately from an information database and a backup database, and comparing the information from the information database with the information from the backup database to identify deleted or modified information; and if it is determined that the deleted or modified information comes from a trusted source, sending prompt information indicating that information is deleted or modified and/or restoring the deleted or modified information. According to the information monitoring method and apparatus and the mobile terminal in embodiments of the present invention, information in the information database is compared with information in the backup database to identify deleted or modified information, and the information is restored when it is determined that the information comes from a trusted source, so the problem that information is maliciously deleted or modified is solved, the security of information in the mobile terminal is improved, and property loss is prevented.

Description

信息的监控方法、装置和移动终端Information monitoring method, device and mobile terminal 技术领域Technical field
本发明涉及信息安全技术领域,尤其涉及一种信息的监控方法、装置和移动终端。The present invention relates to the field of information security technologies, and in particular, to a method, an apparatus, and a mobile terminal for monitoring information.
背景技术Background technique
随着科技的高速发展,智能手机的功能日趋强大,越来越多的用户选择在智能手机中通过一些应用软件来管理自己的短信。当用户接收到一条短信时,应用软件可对该短信进行扫描及安全验证,从而对短信进行拦截。With the rapid development of technology, the functions of smart phones are becoming more and more powerful, and more and more users choose to manage their own text messages through some application software in smart phones. When the user receives a short message, the application software can scan and securely verify the short message to intercept the short message.
但是,如果手机中毒,或者应用软件设置问题,一些关键的短信被恶意拦截,很可能会造成关键短信的丢失或修改,安全性低,导致用户无法获知关键短信中的内容,给用户带来很多不便,甚至是财产损失,导致用户体验差。However, if the phone is poisoned, or the application software is set up, some key SMS messages are maliciously intercepted, which may cause loss or modification of key SMS messages. The security is low, and the user cannot know the content of the key SMS, which brings a lot of users. Inconvenience, even property damage, leads to poor user experience.
发明内容Summary of the invention
本发明旨在至少在一定程度上解决相关技术中的技术问题之一。为此,本发明的一个目的在于提出一种信息的监控方法。该方法能够解决信息被恶意删除、修改的问题,提高移动终端中信息的安全性。The present invention aims to solve at least one of the technical problems in the related art to some extent. To this end, it is an object of the present invention to provide a method of monitoring information. The method can solve the problem that the information is maliciously deleted and modified, and improve the security of the information in the mobile terminal.
本发明的第二个目的在于提出一种信息的监控装置。A second object of the present invention is to provide an information monitoring apparatus.
本发明的第三个目的在于提出一种移动终端。A third object of the present invention is to provide a mobile terminal.
为了实现上述目的,本发明第一方面实施例的信息的监控方法,包括:接收信息变化的通知;分别从信息数据库和备份数据库中读取信息,并将来自所述信息数据库的信息与来自所述备份数据库中的信息进行对比,识别出被删除或被修改的信息;以及若确定所述被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。In order to achieve the above object, a method for monitoring information according to an embodiment of the present invention includes: receiving a notification of a change in information; reading information from the information database and the backup database, respectively, and extracting information from the information database with the source The information in the backup database is compared to identify the deleted or modified information; and if it is determined that the deleted or modified information is from a trusted source, the prompt information or/and the information is deleted or modified. Restore deleted or modified information.
本发明实施例的信息的监控方法,通过将信息数据库中的信息与备份数据库中的信息进行对比,识别出被删除或被修改的信息,当确定该信息来自可信源时,提醒用户或直接还原该信息,解决了信息被恶意删除、修改的问题,提高了移动终端中信息的安全性,避免产生财产损失。The method for monitoring information in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and prompts the user or directly when the information is determined to be from the trusted source. Restoring the information solves the problem that the information is maliciously deleted and modified, improves the security of the information in the mobile terminal, and avoids property loss.
为了实现上述目的,本发明第二方面实施例的信息的监控装置,包括:处理模块,用于向监控模块发送信息变化的通知;所述监控模块,用于在接收所述通知后,分别从信息数据库和备份数据库中读取信息,并将来自所述信息数据库的信息与来自所述备份数据库中的信息进行对比,识别出被删除或被修改的信息;以及警告提醒模块,用于若确定所述 监控模块识别出的所述被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。In order to achieve the above object, the information monitoring apparatus of the second aspect of the present invention includes: a processing module, configured to send a notification of the information change to the monitoring module; and the monitoring module is configured to separately receive the notification after receiving the notification Reading information from the information database and the backup database, and comparing the information from the information database with information from the backup database to identify deleted or modified information; and a warning reminder module for determining Said The deleted or modified information identified by the monitoring module is from a trusted source, and the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
本发明实施例的信息的监控装置,通过将信息数据库中的信息与备份数据库中的信息进行对比,识别出被删除或被修改的信息,当确定该信息来自可信源时,提醒用户或直接还原该信息,解决了信息被恶意删除、修改的问题,提高了移动终端中信息的安全性,避免产生财产损失。The information monitoring apparatus of the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and prompts the user or directly when the information is determined to be from the trusted source. Restoring the information solves the problem that the information is maliciously deleted and modified, improves the security of the information in the mobile terminal, and avoids property loss.
本发明实施例提出了一种移动终端,该移动终端包括壳体、处理器、存储器、电路板和电源电路,其中,所述电路板安置在所述壳体围成的空间内部,所述处理器和所述存储器设置在所述电路板上;所述电源电路,用于为所述移动终端的各个电路或器件供电;所述存储器用于存储可执行程序代码;所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序,以用于执行以下步骤:接收信息变化的通知;分别从信息数据库和备份数据库中读取信息,并将来自所述信息数据库的信息与来自所述备份数据库中的信息进行对比,识别出被删除或被修改的信息;以及若确定所述被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。The embodiment of the present invention provides a mobile terminal, which includes a casing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the casing, and the processing And the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; and the processor reads by Executing program code stored in the memory to execute a program corresponding to the executable program code for performing the steps of: receiving a notification of a change in information; reading information from the information database and the backup database, respectively, and Information from the information database is compared with information from the backup database to identify deleted or modified information; and if it is determined that the deleted or modified information is from a trusted source, the information is sent Deleted or modified prompt information or / and restore deleted or modified information.
本发明实施例的信息的移动终端,通过将信息数据库中的信息与备份数据库中的信息进行对比,识别出被删除或被修改的信息,当确定该信息来自可信源时,提醒用户或直接还原该信息,解决了信息被恶意删除、修改的问题,提高了移动终端中信息的安全性,避免产生财产损失。The mobile terminal of the information in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and prompts the user or directly when the information is determined to be from the trusted source. Restoring the information solves the problem that the information is maliciously deleted and modified, improves the security of the information in the mobile terminal, and avoids property loss.
附图说明DRAWINGS
图1是根据本发明一个实施例的信息的监控方法的流程图。1 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
图2是根据本发明一个具体实施例的信息的监控方法的流程图。2 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
图3是根据本发明一个实施例的信息的监控装置的结构示意图。FIG. 3 is a schematic structural diagram of an information monitoring apparatus according to an embodiment of the present invention.
图4是根据本发明另一个实施例的信息的监控装置的结构示意图。FIG. 4 is a schematic structural diagram of an apparatus for monitoring information according to another embodiment of the present invention.
具体实施方式detailed description
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。The embodiments of the present invention are described in detail below, and the examples of the embodiments are illustrated in the drawings, wherein the same or similar reference numerals are used to refer to the same or similar elements or elements having the same or similar functions. The embodiments described below with reference to the drawings are intended to be illustrative of the invention and are not to be construed as limiting.
下面参考附图描述本发明实施例的信息的监控方法、装置和移动终端。The method, device, and mobile terminal for monitoring information of an embodiment of the present invention are described below with reference to the accompanying drawings.
图1是根据本发明一个实施例的信息的监控方法的流程图。 1 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
如图1所示,信息的监控方法包括:As shown in Figure 1, the monitoring method of information includes:
S101,接收信息变化的通知。S101. Receive a notification of a change in information.
在本发明的实施例中,移动终端中具有信息数据库和备份数据库。当移动终端接收到信息后,移动终端可将接收到的信息保存至信息数据库中。同时,接收到的信息也保存至备份数据库中。应当注意的是,为了提高安全性,移动终端可直接从RIL(radio interface layer,无线接口层)获取信息,通过此方式,能够保证信息被恶意拦截前就能获取到信息,并保存至备份数据库。也就是说,该备份数据库中保存的信息是原始信息,一旦信息被恶意拦截,可以通过该备份数据库恢复。然后移动终端可根据用户或第三方应用程序对信息的操作更新信息数据库。如果信息数据库中的信息发生变化,则移动终端可接收信息变化的通知。上述信息可以为短信息,简称短信。In an embodiment of the invention, the mobile terminal has an information database and a backup database. After the mobile terminal receives the information, the mobile terminal can save the received information to the information database. At the same time, the received information is also saved to the backup database. It should be noted that in order to improve security, the mobile terminal can directly obtain information from the RIL (radio interface layer). In this way, information can be obtained before the information is maliciously intercepted, and saved to the backup database. . That is to say, the information stored in the backup database is the original information, and once the information is maliciously intercepted, it can be restored through the backup database. The mobile terminal can then update the information database based on the operation of the information by the user or a third party application. If the information in the information database changes, the mobile terminal can receive a notification of the change in the information. The above information may be short message, referred to as short message.
S102,分别从信息数据库和备份数据库中读取信息,并将来自信息数据库的信息与来自备份数据库中的信息进行对比,识别出被删除或被修改的信息。S102: Read information from the information database and the backup database, respectively, and compare the information from the information database with the information from the backup database to identify the deleted or modified information.
在本发明的实施例中,在接收到信息变化的通知后,移动终端可分别从信息数据库和备份数据库中读取所有的信息,并将来自信息数据库的信息与来自备份数据库中的信息进行对比,识别出被删除或被修改的信息。举例来说,当手机接收到短信后,如果没有恶意病毒或应用软件的拦截,手机中的信息数据库和备份数据库是一致的,但是当有恶意病毒恶意拦截或手机应用软件错误拦截、修改短信,则信息数据库和备份数据库会产生不一致。将手机信息数据库和备份数据库中的所有的短信进行对比,最终获得被删除或被修改的短信。In an embodiment of the present invention, after receiving the notification of the information change, the mobile terminal can read all the information from the information database and the backup database, respectively, and compare the information from the information database with the information from the backup database. , identifying the deleted or modified information. For example, when a mobile phone receives a text message, if there is no malicious virus or application software interception, the information database and the backup database in the mobile phone are consistent, but when a malicious virus malicious interception or mobile application software error intercepts or modifies the short message, The information database and the backup database will be inconsistent. Compare all the SMS messages in the mobile phone information database and the backup database, and finally get the deleted or modified SMS.
S103,若确定被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。S103. If it is determined that the deleted or modified information is from a trusted source, the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
在本发明的实施例中,移动终端可具有可信来源数据库,用于保存可信任的短信发送方号码,如支付宝、银行等短信发送方;也可以具有不可信来源数据库。在识别出被删除或被修改的信息后,如果确定被删除或被修改的信息来自可信源,则移动终端可以发出信息被删除或被修改的提示信息,也可以还原被删除或被修改的信息。具体地,移动终端可检查被删除或被修改的信息的发送方号码是否位于可信来源数据库中。如果位于可信来源数据库中,则可确定被删除或被修改的信息来自可信源。移动终端也可以检查被删除或被修改的信息的发送方号码是否在不可信来源数据库中。如果不在,则可确定被删除或被修改的信息来自可信源。In an embodiment of the present invention, the mobile terminal may have a trusted source database for storing a trusted short message sender number, such as an Alipay, a bank, or the like, or may have an untrusted source database. After identifying the deleted or modified information, if it is determined that the deleted or modified information is from a trusted source, the mobile terminal may issue a prompt message that the information is deleted or modified, and may also be deleted or modified. information. Specifically, the mobile terminal can check whether the sender number of the deleted or modified information is located in the trusted source database. If located in a trusted source database, it can be determined that the deleted or modified information is from a trusted source. The mobile terminal can also check if the sender number of the deleted or modified information is in the untrusted source database. If not, it can be determined that the deleted or modified information is from a trusted source.
具体地,可从备份数据库中读取被删除或被修改的短信并还原至信息数据库,也可以从备份数据库中读取对应的短信,并还原至信息数据库,并发出提示信息,并基于用户根据提示信息执行的操作显示对应的短信。 Specifically, the deleted or modified short message may be read from the backup database and restored to the information database, or the corresponding short message may be read from the backup database, and restored to the information database, and the prompt information is sent, and based on the user basis The operation performed by the prompt information displays the corresponding short message.
当然,该信息数据库支持通过短信列表的方式显示短信。例如:对被删除或被修改的信息进行还原后,发出提示信息,然后用户可通过短信列表查看该短信,获知内容。Of course, the information database supports displaying text messages by means of a short message list. For example, after the deleted or modified information is restored, a prompt message is sent, and then the user can view the short message through the short message list to obtain the content.
本发明实施例的信息的监控方法,通过将信息数据库中的信息与备份数据库中的信息进行对比,识别出被删除或被修改的信息,当确定该信息来自可信源时,还原该信息,解决了信息被恶意删除、修改的问题,提高了移动终端中信息的安全性,避免产生财产损失。The method for monitoring information in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and restores the information when it is determined that the information is from a trusted source. The problem that the information is maliciously deleted and modified is solved, the security of the information in the mobile terminal is improved, and property loss is avoided.
图2是根据本发明一个具体实施例的信息的监控方法的流程图。2 is a flow chart of a method of monitoring information according to an embodiment of the present invention.
如图2所示,信息的监控方法包括:As shown in Figure 2, the monitoring method of information includes:
S201,监控短信数据变化。S201, monitoring SMS data changes.
具体地,手机中具有短信数据库和备份数据库。当手机接收到短信后,手机可将接收到的信息分别保存至短信数据库和备份数据库中。此时,当发现短信数据库中的短信发生变化时,如恶意病毒拦截或修改,则表明手机短信有变化。Specifically, the mobile phone has a short message database and a backup database. After the mobile phone receives the short message, the mobile phone can save the received information to the short message database and the backup database. At this time, when the short message in the short message database is found to change, such as malicious virus interception or modification, it indicates that the mobile phone text message has changed.
S202,对比备份数据库,获得被删除或被修改的短信。S202: Obtain a deleted or modified short message by comparing the backup database.
在接收到短信有变化的通知后,可将短信数据库中的所有短信与备份数据库中的所有短信进行对比,获得被删除或被修改的短信。After receiving the notification that the short message has changed, all the short messages in the short message database can be compared with all the short messages in the backup database to obtain the deleted or modified short message.
S203,判断是否来自可信源,如果该短信来自可信源,则跳转至步骤S204。如果该短信来自不可信源,则结束。S203. Determine whether the source is from a trusted source. If the short message is from a trusted source, go to step S204. If the message comes from an untrusted source, it ends.
在获得被删除或被修改的短信后,可根据可信来源库判断该短信是否来自可信源。可信来源数据库用于保存可信任的短信发送方号码,如支付宝、银行等短信发送方。After obtaining the deleted or modified short message, it can be judged according to the trusted source library whether the short message is from a trusted source. The trusted source database is used to store trusted sender number, such as Alipay, bank and other SMS senders.
S204,提醒用户,并还原被删除或被修改的短信。S204, reminding the user and restoring the deleted or modified short message.
在确定被删除或被修改的短信来自可信源后,可提醒用户有来自可信源的短信被删除或被修改,然后还原被删除或被修改的短信。After determining that the deleted or modified short message is from a trusted source, the user may be reminded that the short message from the trusted source is deleted or modified, and then the deleted or modified short message is restored.
本发明实施例的信息的监控方法,通过监控短信数据变化,获得被删除或被修改的短信,当确定该短信来自可信源时,对用户进行提醒,并还原该短信,解决了短信被恶意删除、修改的问题,提高了手机中用户个人信息的安全性,有效地保护了用户的隐私,避免了财产损失。The method for monitoring information in the embodiment of the present invention obtains a deleted or modified short message by monitoring the change of the short message data. When determining that the short message is from a trusted source, the user is reminded and the short message is restored, and the short message is maliciously solved. The problem of deletion and modification improves the security of the personal information of the user in the mobile phone, effectively protects the privacy of the user and avoids property loss.
为了实现上述实施例,本发明还提出一种信息的监控装置。In order to implement the above embodiments, the present invention also proposes an information monitoring apparatus.
图3是根据本发明一个实施例的信息的监控装置的结构示意图。FIG. 3 is a schematic structural diagram of an information monitoring apparatus according to an embodiment of the present invention.
如图3所示,信息的监控装置包括:处理模块110、监控模块120和警告提醒模块130。As shown in FIG. 3, the information monitoring device includes: a processing module 110, a monitoring module 120, and a warning reminding module 130.
处理模块110用于向监控模块120发送信息变化的通知。The processing module 110 is configured to send a notification of the information change to the monitoring module 120.
在本发明的实施例中,移动终端中具有信息数据库和备份数据库。处理模块110用于根据用户或第三方应用程序对信息的操作更新信息数据库。当信息数据库中的信息发生变化时,处理模块110可向监控模块120发送信息变化的通知。上述信息可以为短信息,简 称短信。In an embodiment of the invention, the mobile terminal has an information database and a backup database. The processing module 110 is configured to update the information database according to the operation of the information by the user or the third party application. When the information in the information database changes, the processing module 110 can send a notification of the information change to the monitoring module 120. The above information can be short message, Jane Called SMS.
监控模块120用于在接收通知后,分别从信息数据库和备份数据库中读取信息,并将来自信息数据库的信息与来自备份数据库中的信息进行对比,识别出被删除或被修改的信息。The monitoring module 120 is configured to read information from the information database and the backup database respectively after receiving the notification, and compare the information from the information database with the information from the backup database to identify the deleted or modified information.
警告提醒模块130用于当确定监控模块120识别出的被删除或被修改的信息来自可信源时,发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。具体地,警告提醒模块130可检查被删除或被修改的信息的发送方号码是否位于可信来源数据库中。如果位于可信来源数据库中,则可确定被删除或被修改的信息来自可信源。警告提醒模块130也可以检查被删除或被修改的信息的发送方号码是否在不可信来源数据库中。如果不在,则可确定被删除或被修改的信息来自可信源。The warning reminding module 130 is configured to, when determining that the deleted or modified information identified by the monitoring module 120 is from a trusted source, issue prompt information that the information is deleted or modified or/and restore the deleted or modified information. In particular, the alert reminder module 130 can check if the sender number of the deleted or modified information is in the trusted source database. If located in a trusted source database, it can be determined that the deleted or modified information is from a trusted source. The alert reminder module 130 can also check if the sender number of the deleted or modified information is in the untrusted source database. If not, it can be determined that the deleted or modified information is from a trusted source.
在确定被删除或被修改的信息来自可信源后,警告提醒模块130可发出信息被删除或被修改的提示信息,也可以还原被删除或被修改的信息。具体地,可从备份数据库中读取被删除或被修改的短信并还原至信息数据库,也可以从备份数据库中读取对应的短信,并还原至信息数据库,并发出提示信息,并基于用户根据提示信息执行的操作显示对应的短信。After determining that the deleted or modified information is from a trusted source, the alert reminder module 130 may issue a prompt message in which the information was deleted or modified, and may also restore the deleted or modified information. Specifically, the deleted or modified short message may be read from the backup database and restored to the information database, or the corresponding short message may be read from the backup database, and restored to the information database, and the prompt information is sent, and based on the user basis The operation performed by the prompt information displays the corresponding short message.
当然,该信息数据库支持通过短信列表的方式显示短信。例如:对被删除或被修改的信息进行还原后,发出提示信息,然后用户可通过短信列表查看该短信,获知内容。Of course, the information database supports displaying text messages by means of a short message list. For example, after the deleted or modified information is restored, a prompt message is sent, and then the user can view the short message through the short message list to obtain the content.
另外,本实施例的信息的监控装置还可包括接收模块140。In addition, the monitoring device for information of the embodiment may further include a receiving module 140.
接收模块140用于在接收到信息后,分别向监控模块120发送备份指令和向处理模块110发送更新指令。The receiving module 140 is configured to send a backup instruction to the monitoring module 120 and an update instruction to the processing module 110 after receiving the information.
监控模块120在收到接收模块140发送的备份指令后,可根据备份指令,从无线接口层RIL接收信息,并保存至备份数据库。After receiving the backup instruction sent by the receiving module 140, the monitoring module 120 can receive information from the wireless interface layer RIL according to the backup instruction, and save the information to the backup database.
处理模块110在收到接收模块140发送的更新指令后,可根据更新指令,将接收到的信息保存至信息数据库中。After receiving the update instruction sent by the receiving module 140, the processing module 110 may save the received information to the information database according to the update instruction.
在本发明的实施例中,图4是根据本发明另一个实施例的信息的监控装置的结构示意图。如图4所示,可包括:In the embodiment of the present invention, FIG. 4 is a schematic structural diagram of an information monitoring apparatus according to another embodiment of the present invention. As shown in FIG. 4, it may include:
S401,电话底层接收短信,然后传送至RIL。其中,电话底层和RIL位于接收模块140中。S401. The bottom layer of the phone receives the short message and then transmits it to the RIL. The bottom layer of the phone and the RIL are located in the receiving module 140.
S402,RIL通知短信监控进程接收到短信。其中,短信监控进程位于监控模块120中。S402: The RIL notifies the short message monitoring process that the short message is received. The short message monitoring process is located in the monitoring module 120.
S403,短信监控进程将接收到的短信备份至备份数据库中。S403. The short message monitoring process backs up the received short message to the backup database.
S404,RIL通知短信处理框架接收到短信。其中短信处理框架处于处理模块110中。S404. The RIL notifies the short message processing framework to receive the short message. The short message processing framework is in the processing module 110.
S405,经过短信处理框架处理后的短信保存至短信数据库中。 S405. The short message processed by the short message processing framework is saved to the short message database.
S406,当有短信被恶意拦截或修改时,短信处理框架向短信监控进程发送信息变化的通知。S406: When a short message is maliciously intercepted or modified, the short message processing framework sends a notification of the information change to the short message monitoring process.
S407,短信监控进程读取短信数据库中的所有短信。S407. The short message monitoring process reads all the short messages in the short message database.
S408,短信监控进程读取备份数据库中的所有短信。S408. The short message monitoring process reads all the short messages in the backup database.
S409,短信监控进程将短信数据库中的所有短信与备份数据库中的所有短信进行对比,识别出被删除或被修改的短信。S409: The short message monitoring process compares all the short messages in the short message database with all the short messages in the backup database, and identifies the deleted or modified short messages.
S410,短信监控进程从可信来源数据库读取可信任发送者的号码,识别出被删除或被修改的短信来自可信源。S410. The short message monitoring process reads the number of the trusted sender from the trusted source database, and identifies that the deleted or modified short message is from the trusted source.
S411,警告提醒模块130提醒用户有来自可信源的短信被删除或被修改,并还原被删除或被修改的短信。S411. The warning reminding module 130 reminds the user that the short message from the trusted source is deleted or modified, and restores the deleted or modified short message.
本发明实施例的信息的监控装置,通过将短信数据库中的短信与备份数据库中的短信进行对比,识别出被删除或被修改的短信,当确定该短信来自可信源时,还原该短信,解决了短信被恶意删除、修改的问题,提高了移动终端中信息的安全性,避免产生财产损失。The information monitoring apparatus of the embodiment of the present invention identifies the deleted or modified short message by comparing the short message in the short message database with the short message in the backup database, and restores the short message when the short message is determined to be from the trusted source. The problem that the short message is maliciously deleted and modified is solved, the security of the information in the mobile terminal is improved, and property loss is avoided.
为了实现上述实施例,本发明还提出一种移动终端,该移动终端包括壳体、处理器、存储器、电路板和电源电路,其中,上述电路板安置在上述壳体围成的空间内部,上述处理器和上述存储器设置在上述电路板上;上述电源电路,用于为上述移动终端的各个电路或器件供电;上述存储器用于存储可执行程序代码;上述处理器通过读取上述存储器中存储的可执行程序代码来运行与上述可执行程序代码对应的程序,以用于执行以下步骤:In order to achieve the above embodiment, the present invention further provides a mobile terminal including a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the housing, The processor and the memory are disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; and the processor reads the memory stored in the memory by reading The executable program code runs a program corresponding to the above executable program code for performing the following steps:
S101’,接收信息变化的通知。S101', receiving a notification of a change in information.
在本发明的实施例中,移动终端中具有信息数据库和备份数据库。当移动终端接收到信息后,移动终端可将接收到的信息保存至信息数据库中。同时,接收到的信息也保存至备份数据库中。应当注意的是,移动终端可直接从RIL获取信息。然后移动终端可根据用户或第三方应用程序对信息的操作更新信息数据库。如果信息数据库中的信息发生变化,则移动终端可接收信息变化的通知。上述信息可以为短信息,简称短信。In an embodiment of the invention, the mobile terminal has an information database and a backup database. After the mobile terminal receives the information, the mobile terminal can save the received information to the information database. At the same time, the received information is also saved to the backup database. It should be noted that the mobile terminal can obtain information directly from the RIL. The mobile terminal can then update the information database based on the operation of the information by the user or a third party application. If the information in the information database changes, the mobile terminal can receive a notification of the change in the information. The above information may be short message, referred to as short message.
S102’,分别从信息数据库和备份数据库中读取信息,并将来自信息数据库的信息与来自备份数据库中的信息进行对比,识别出被删除或被修改的信息。S102', reading information from the information database and the backup database, respectively, and comparing the information from the information database with the information from the backup database to identify the deleted or modified information.
在本发明的实施例中,在接收到信息变化的通知后,移动终端可分别从信息数据库和备份数据库中读取所有的信息,并将来自信息数据库的信息与来自备份数据库中的信息进行对比,识别出被删除或被修改的信息。举例来说,当手机接收到短信后,如果没有恶意病毒或应用软件的拦截,手机中的信息数据库和备份数据库是一致的,但是当有恶意病毒恶意拦截或手机应用软件错误拦截、修改短信,则信息数据库和备份数据库会产生不一致。将手机信息数据库和备份数据库中的所有的短信进行对比,最终获得被删除或被修改的短 信。In an embodiment of the present invention, after receiving the notification of the information change, the mobile terminal can read all the information from the information database and the backup database, respectively, and compare the information from the information database with the information from the backup database. , identifying the deleted or modified information. For example, when a mobile phone receives a text message, if there is no malicious virus or application software interception, the information database and the backup database in the mobile phone are consistent, but when a malicious virus malicious interception or mobile application software error intercepts or modifies the short message, The information database and the backup database will be inconsistent. Compare all the text messages in the mobile phone information database and the backup database, and finally get the short deleted or modified. letter.
S103’,若确定被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。S103', if it is determined that the deleted or modified information is from a trusted source, the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
在本发明的实施例中,移动终端可具有可信来源数据库,用于保存可信任的短信发送方号码,如支付宝、银行等短信发送方;也可以具有不可信来源数据库。在识别出被删除或被修改的信息后,如果确定被删除或被修改的信息来自可信源,则移动终端可以发出信息被删除或被修改的提示信息,也可以还原被删除或被修改的信息。具体地,移动终端可检查被删除或被修改的信息的发送方号码是否位于可信来源数据库中。如果位于可信来源数据库中,则可确定被删除或被修改的信息来自可信源。移动终端也可以检查被删除或被修改的信息的发送方号码是否在不可信来源数据库中。如果不在,则可确定被删除或被修改的信息来自可信源。In an embodiment of the present invention, the mobile terminal may have a trusted source database for storing a trusted short message sender number, such as an Alipay, a bank, or the like, or may have an untrusted source database. After identifying the deleted or modified information, if it is determined that the deleted or modified information is from a trusted source, the mobile terminal may issue a prompt message that the information is deleted or modified, and may also be deleted or modified. information. Specifically, the mobile terminal can check whether the sender number of the deleted or modified information is located in the trusted source database. If located in a trusted source database, it can be determined that the deleted or modified information is from a trusted source. The mobile terminal can also check if the sender number of the deleted or modified information is in the untrusted source database. If not, it can be determined that the deleted or modified information is from a trusted source.
在确定被删除或被修改的信息来自可信源后,可从备份数据库中读取被删除或被修改的短信并还原至信息数据库,也可以从备份数据库中读取对应的短信,并还原至信息数据库,并发出提示信息,并基于用户根据提示信息执行的操作显示对应的短信。After determining that the deleted or modified information is from a trusted source, the deleted or modified short message may be read from the backup database and restored to the information database, or the corresponding short message may be read from the backup database and restored to The information database is issued with prompt information, and the corresponding short message is displayed based on the operation performed by the user according to the prompt information.
当然,该信息数据库支持通过短信列表的方式显示短信。例如:对被删除或被修改的信息进行还原后,发出提示信息,然后用户可通过短信列表查看该短信,获知内容。Of course, the information database supports displaying text messages by means of a short message list. For example, after the deleted or modified information is restored, a prompt message is sent, and then the user can view the short message through the short message list to obtain the content.
本发明实施例的移动终端,通过将信息数据库中的信息与备份数据库中的信息进行对比,识别出被删除或被修改的信息,当确定该信息来自可信源时,还原该信息,解决了信息被恶意删除、修改的问题,提高了移动终端中信息的安全性,避免产生财产损失。The mobile terminal in the embodiment of the present invention identifies the deleted or modified information by comparing the information in the information database with the information in the backup database, and when the information is determined to be from the trusted source, the information is restored, and the information is solved. The problem that information is maliciously deleted and modified improves the security of information in the mobile terminal and avoids property loss.
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本发明的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of the present specification, the description with reference to the terms "one embodiment", "some embodiments", "example", "specific example", or "some examples" and the like means a specific feature described in connection with the embodiment or example. A structure, material or feature is included in at least one embodiment or example of the invention. In the present specification, the schematic representation of the above terms is not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in a suitable manner in any one or more embodiments or examples. In addition, various embodiments or examples described in the specification, as well as features of various embodiments or examples, may be combined and combined.
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。Moreover, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, features defining "first" or "second" may include at least one of the features, either explicitly or implicitly. In the description of the present invention, the meaning of "a plurality" is at least two, such as two, three, etc., unless specifically defined otherwise.
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分, 并且本发明的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所属技术领域的技术人员所理解。Any process or method description in the flowcharts or otherwise described herein may be understood to represent a module, segment or portion of code that includes one or more executable instructions for implementing the steps of a particular logical function or process. , And the scope of the preferred embodiments of the invention includes additional implementations, in which the functions may be performed in a substantially simultaneous manner or in the reverse order, depending on the order in which they are illustrated, which should be It will be understood by those skilled in the art to which the embodiments of the present invention pertain.
在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。The logic and/or steps represented in the flowchart or otherwise described herein, for example, may be considered as an ordered list of executable instructions for implementing logical functions, and may be embodied in any computer readable medium, Used in conjunction with, or in conjunction with, an instruction execution system, apparatus, or device (eg, a computer-based system, a system including a processor, or other system that can fetch instructions and execute instructions from an instruction execution system, apparatus, or device) Or use with equipment. For the purposes of this specification, a "computer-readable medium" can be any apparatus that can contain, store, communicate, propagate, or transport a program for use in an instruction execution system, apparatus, or device, or in conjunction with the instruction execution system, apparatus, or device. More specific examples (non-exhaustive list) of computer readable media include the following: electrical connections (electronic devices) having one or more wires, portable computer disk cartridges (magnetic devices), random access memory (RAM), Read only memory (ROM), erasable editable read only memory (EPROM or flash memory), fiber optic devices, and portable compact disk read only memory (CDROM). In addition, the computer readable medium may even be a paper or other suitable medium on which the program can be printed, as it may be optically scanned, for example by paper or other medium, followed by editing, interpretation or, if appropriate, other suitable The method is processed to obtain the program electronically and then stored in computer memory.
应当理解,本发明的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that portions of the invention may be implemented in hardware, software, firmware or a combination thereof. In the above-described embodiments, multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。One of ordinary skill in the art can understand that all or part of the steps carried by the method of implementing the above embodiments can be completed by a program to instruct related hardware, and the program can be stored in a computer readable storage medium. When executed, one or a combination of the steps of the method embodiments is included.
此外,在本发明各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module. The above integrated modules can be implemented in the form of hardware or in the form of software functional modules. The integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制, 本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。 The above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like. Although the embodiments of the present invention have been shown and described, it is understood that the foregoing embodiments are illustrative and are not to be construed as limiting. Variations, modifications, alterations and variations of the above-described embodiments may be made by those skilled in the art within the scope of the invention.

Claims (11)

  1. 一种信息的监控方法,其特征在于,包括:A method for monitoring information, characterized in that it comprises:
    接收信息变化的通知;Receive notification of changes in information;
    分别从信息数据库和备份数据库中读取信息,并将来自所述信息数据库的信息与来自所述备份数据库中的信息进行对比,识别出被删除或被修改的信息;以及Reading information from the information database and the backup database, respectively, and comparing the information from the information database with information from the backup database to identify deleted or modified information;
    若确定所述被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。If it is determined that the deleted or modified information is from a trusted source, the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
  2. 根据权利要求1所述的方法,其特征在于,在所述分别从信息数据库和备份数据库中读取信息之前,还包括:The method according to claim 1, wherein before the reading of the information from the information database and the backup database, the method further comprises:
    从无线接口层RIL接收所述信息,并保存至所述备份数据库。The information is received from the wireless interface layer RIL and saved to the backup database.
  3. 根据权利要求1所述的方法,其特征在于,在所述分别从信息数据库和备份数据库中读取信息之前,还包括:The method according to claim 1, wherein before the reading of the information from the information database and the backup database, the method further comprises:
    将接收到的信息保存至所述信息数据库中,并根据用户或第三方应用程序对信息的操作更新所述信息数据库。The received information is saved to the information database and the information database is updated according to the operation of the information by the user or a third party application.
  4. 根据权利要求1-3任一权利要求所述的方法,其特征在于,所述确定所述被删除或被修改的信息来自可信源,包括:The method according to any one of claims 1 to 3, wherein the determining that the deleted or modified information is from a trusted source comprises:
    检查所述被删除或被修改的信息的发送方号码是否在可信来源数据库中,若是,则确定所述被删除或被修改的信息来自可信源;或者Checking whether the sender number of the deleted or modified information is in a trusted source database, and if so, determining that the deleted or modified information is from a trusted source; or
    检查所述被删除或被修改的信息的发送方号码是否在不可信来源数据库中,若否,则确定所述被删除或被修改的信息来自可信源。Checking whether the sender number of the deleted or modified information is in the untrusted source database, and if not, determining that the deleted or modified information is from a trusted source.
  5. 根据权利要求1所述的方法,其特征在于,所述还原被删除或被修改的信息,包括:The method of claim 1 wherein said restoring deleted or modified information comprises:
    从所述备份数据库中读取对应的短信,并还原至所述信息数据库;或者Reading a corresponding short message from the backup database and restoring to the information database; or
    从所述备份数据库中读取对应的短信,并还原至所述信息数据库,以及发出提示信息,并基于用户根据所述提示信息执行的操作显示对应的短信。Reading a corresponding short message from the backup database, and restoring to the information database, and issuing a prompt message, and displaying a corresponding short message based on an operation performed by the user according to the prompt information.
  6. 一种信息的监控装置,其特征在于,包括:An information monitoring device, comprising:
    处理模块,用于向监控模块发送信息变化的通知;a processing module, configured to send a notification of the information change to the monitoring module;
    所述监控模块,用于在接收所述通知后,分别从信息数据库和备份数据库中读取信息,并将来自所述信息数据库的信息与来自所述备份数据库中的信息进行对比,识别出被删除或被修改的信息;以及The monitoring module is configured to, after receiving the notification, read information from the information database and the backup database, and compare the information from the information database with the information from the backup database to identify the Deleted or modified information;
    警告提醒模块,用于若确定所述监控模块识别出的所述被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。 The warning reminding module is configured to: if it is determined that the deleted or modified information identified by the monitoring module is from a trusted source, the prompt information or/and the restoration information that is deleted or modified is deleted or modified. information.
  7. 根据权利要求6所述的装置,其特征在于,还包括:The device according to claim 6, further comprising:
    接收模块,用于在接收到信息后,分别向所述监控模块发送备份指令和向所述处理模块发送更新指令。The receiving module is configured to send a backup instruction to the monitoring module and send an update instruction to the processing module after receiving the information.
  8. 根据权利要求7所述的装置,其特征在于,所述监控模块,还用于:根据所述备份指令,从无线接口层RIL接收所述信息,并保存至所述备份数据库;The device according to claim 7, wherein the monitoring module is further configured to: receive the information from the wireless interface layer RIL according to the backup instruction, and save the information to the backup database;
    所述处理模块,还用于:根据所述更新指令,将所述信息保存至所述信息数据库中。The processing module is further configured to: save the information into the information database according to the update instruction.
  9. 根据权利要求8所述的装置,其特征在于,所述处理模块,还用于:根据用户或第三方应用程序对信息的操作更新所述信息数据库。The apparatus according to claim 8, wherein the processing module is further configured to: update the information database according to an operation of information by a user or a third-party application.
  10. 根据权利要求6-9任一权利要求所述的装置,其特征在于,所述警告提醒模块,具体用于:检查所述被删除或被修改的信息的发送方号码是否位于可信来源数据库中,若是,则确定所述被删除或被修改的信息来自可信源;或者The device according to any one of claims 6-9, wherein the warning reminding module is specifically configured to: check whether a sender number of the deleted or modified information is located in a trusted source database. And if so, determining that the deleted or modified information is from a trusted source; or
    检查所述被删除或被修改的信息的发送方号码是否在不可信来源数据库中,若否,则确定所述被删除或被修改的信息来自可信源。Checking whether the sender number of the deleted or modified information is in the untrusted source database, and if not, determining that the deleted or modified information is from a trusted source.
  11. 一种移动终端,其特征在于,包括:壳体、处理器、存储器、电路板和电源电路,其中,所述电路板安置在所述壳体围成的空间内部,所述处理器和所述存储器设置在所述电路板上;所述电源电路,用于为所述移动终端的各个电路或器件供电;所述存储器用于存储可执行程序代码;所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序,以用于:A mobile terminal, comprising: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside a space enclosed by the housing, the processor and the a memory is disposed on the circuit board; the power circuit is configured to supply power to each circuit or device of the mobile terminal; the memory is configured to store executable program code; and the processor reads the memory by reading Stored executable program code to execute a program corresponding to the executable program code for:
    接收信息变化的通知;Receive notification of changes in information;
    分别从信息数据库和备份数据库中读取信息,并将来自所述信息数据库的信息与来自所述备份数据库中的信息进行对比,识别出被删除或被修改的信息;以及Reading information from the information database and the backup database, respectively, and comparing the information from the information database with information from the backup database to identify deleted or modified information;
    若确定所述被删除或被修改的信息来自可信源,则发出信息被删除或被修改的提示信息或/和还原被删除或被修改的信息。 If it is determined that the deleted or modified information is from a trusted source, the prompt information that the information is deleted or modified is issued or/and the information deleted or modified is restored.
PCT/CN2015/084307 2014-08-07 2015-07-17 Information monitoring method and apparatus and mobile terminal WO2016019793A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410387437.5A CN105451223B (en) 2014-08-07 2014-08-07 Monitoring method, device and the mobile terminal of information
CN201410387437.5 2014-08-07

Publications (1)

Publication Number Publication Date
WO2016019793A1 true WO2016019793A1 (en) 2016-02-11

Family

ID=55263122

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/084307 WO2016019793A1 (en) 2014-08-07 2015-07-17 Information monitoring method and apparatus and mobile terminal

Country Status (3)

Country Link
CN (1) CN105451223B (en)
HK (1) HK1221846A1 (en)
WO (1) WO2016019793A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111459722A (en) * 2020-04-08 2020-07-28 江西博微新技术有限公司 Data processing method, system, readable storage medium and computer equipment
CN111859036A (en) * 2020-08-19 2020-10-30 深圳市富之富信息科技有限公司 Short message data detection method and device, computer equipment and storage medium

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824595A (en) * 2016-03-31 2016-08-03 北京金山安全软件有限公司 Space management method and device and mobile terminal
CN109584087B (en) * 2018-11-12 2021-04-13 泰康保险集团股份有限公司 Information processing method, device and storage medium
CN109857720B (en) * 2018-12-20 2024-02-02 中国平安人寿保险股份有限公司 Database table monitoring method, device, computer device and readable storage medium
CN110175090A (en) * 2019-05-29 2019-08-27 数字中融信息技术河北有限公司 A kind of data managing method handled with comparison and be capable of backup and reduction

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1838083A (en) * 2005-03-21 2006-09-27 微软公司 System and method of efficient data backup in a networking environment
US20080059545A1 (en) * 2004-03-03 2008-03-06 International Business Machines Corporation Method to maintain the integrity of remote data by making it disposable
CN101159003A (en) * 2007-11-16 2008-04-09 中国科学院软件研究所 Data-base malevolence transaction method and system thereof
CN101370305A (en) * 2008-09-23 2009-02-18 中兴通讯股份有限公司 Method and system for protecting data traffic security
CN101847198A (en) * 2009-03-24 2010-09-29 索尼公司 Content reproducing device and content reproducing method
US20110208849A1 (en) * 2010-02-25 2011-08-25 General Electric Company Method and system for security maintenance in a network

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068217B (en) * 2006-06-16 2010-06-16 腾讯科技(深圳)有限公司 Method and device for simplifying E-mail operation
CN101193148A (en) * 2006-11-22 2008-06-04 乐金电子(昆山)电脑有限公司 Personal information management method for mobile phone
CN101540704B (en) * 2009-05-05 2011-06-15 北京神舟航天软件技术有限公司 Unreliable DBMS malicious intrusion detection system and method
CN101848274A (en) * 2010-03-12 2010-09-29 深圳市同洲电子股份有限公司 Methods and devices for backup and recovery of records in mobile terminal
CN102236764B (en) * 2011-06-30 2013-10-30 北京邮电大学 Method and monitoring system for Android system to defend against desktop information attack
CN102495771A (en) * 2011-09-30 2012-06-13 奇智软件(北京)有限公司 Terminal object classified backup and recovery methods based on cloud architecture
CN103838589A (en) * 2012-11-20 2014-06-04 腾讯科技(深圳)有限公司 Plug-in unit deleting and recovering method and client side

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080059545A1 (en) * 2004-03-03 2008-03-06 International Business Machines Corporation Method to maintain the integrity of remote data by making it disposable
CN1838083A (en) * 2005-03-21 2006-09-27 微软公司 System and method of efficient data backup in a networking environment
CN101159003A (en) * 2007-11-16 2008-04-09 中国科学院软件研究所 Data-base malevolence transaction method and system thereof
CN101370305A (en) * 2008-09-23 2009-02-18 中兴通讯股份有限公司 Method and system for protecting data traffic security
CN101847198A (en) * 2009-03-24 2010-09-29 索尼公司 Content reproducing device and content reproducing method
US20110208849A1 (en) * 2010-02-25 2011-08-25 General Electric Company Method and system for security maintenance in a network

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111459722A (en) * 2020-04-08 2020-07-28 江西博微新技术有限公司 Data processing method, system, readable storage medium and computer equipment
CN111859036A (en) * 2020-08-19 2020-10-30 深圳市富之富信息科技有限公司 Short message data detection method and device, computer equipment and storage medium
CN111859036B (en) * 2020-08-19 2024-02-13 深圳市富之富信息科技有限公司 Short message data detection method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
HK1221846A1 (en) 2017-06-09
CN105451223B (en) 2019-03-15
CN105451223A (en) 2016-03-30

Similar Documents

Publication Publication Date Title
WO2016019793A1 (en) Information monitoring method and apparatus and mobile terminal
EP3200487B1 (en) Message processing method and apparatus
CN107430666B (en) Tenant lock box
US9104768B2 (en) Person-based information aggregation
US20180329703A1 (en) Method, apparatus and system for verifying code integrity on clients
US20090298468A1 (en) System and method for deleting data in a communication device
CN107403089B (en) Resource tampering identification method and device based on application program
US20170104861A1 (en) Electronic device monitoring method and apparatus
CN110266505B (en) Method and equipment for managing session group
US10956383B2 (en) Device backup and wipe
CN110278143B (en) E-mail data processing method and device, computer equipment and storage medium
CN103631580B (en) Method and device for generating theme icon
CN107871015B (en) Log data processing method and device, terminal and readable storage medium
US20160321450A1 (en) Method and Apparatus for Managing Super User Password on Smart Mobile Terminal
US9509832B2 (en) Recommending preferred ringer settings for a mobile communications device
WO2017166616A1 (en) Information processing method and apparatus, and electronic device
US9143906B2 (en) Premium messaging challenges
CN112099836A (en) Configuration file updating method, configuration server, version control server and system
CN111782728A (en) Data synchronization method, device, electronic equipment and medium
WO2015154464A1 (en) Encryption method and device
CN104038552A (en) Information updating method and device
US20180276719A1 (en) Method and device for determining area of message operation region and electronic device
CN109213431B (en) Consistency detection method and device for multi-copy data and electronic equipment
WO2017050056A1 (en) Application security protection processing method and device, and terminal equipment
WO2017092308A1 (en) Method, device and system for managing wireless network connection information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15829159

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15829159

Country of ref document: EP

Kind code of ref document: A1