CN103037337A - Method intercepting sent short message and device thereof - Google Patents

Method intercepting sent short message and device thereof Download PDF

Info

Publication number
CN103037337A
CN103037337A CN2012105356935A CN201210535693A CN103037337A CN 103037337 A CN103037337 A CN 103037337A CN 2012105356935 A CN2012105356935 A CN 2012105356935A CN 201210535693 A CN201210535693 A CN 201210535693A CN 103037337 A CN103037337 A CN 103037337A
Authority
CN
China
Prior art keywords
note
sent
sends
program
short message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012105356935A
Other languages
Chinese (zh)
Inventor
莫庆平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN2012105356935A priority Critical patent/CN103037337A/en
Publication of CN103037337A publication Critical patent/CN103037337A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method intercepting a sent short message and a device thereof. The method comprises the following steps: setting a program for sending a short message; obtaining the sent short message; judging whether the sent short message is sent by the program for sending the short message, if the sent short message is sent by the program for sending the short message, a sending step is carried out, or otherwise, a rejecting step is carried out. The sending step comprises the steps of sending the short message and finishing the process. The rejecting step comprises the steps of rejecting to send the short message and finishing the process. By monitoring whether a package name of the short message in an intelligent mobile phone is the same as that of the set program to judge whether the sent short message is legal, prompting steps are provided, and therefore the short message can be prevented from being sent in an automatic mode or a manual mode. Thus, malicious application programs can be prevented from sending malicious short messages towards external, and safety of the mobile phone is improved well.

Description

The method and apparatus of note is sent in a kind of interception
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of method and apparatus of the malice note of sending being tackled based on smart mobile phone.
Background technology
In the actual life, increasing people uses mobile phone to carry out communication and exchange.But when using mobile phone to exchange, tend to run into some troublesome telephones and note.Such as advertising, swindle phone and swindle note etc.In case user's telephone number is leaked by nameless channel, just receive easily incoming call and the note of various malice.Therefore, in order to solve this class problem, produced a lot of methods in the prior art.For example Chinese invention patent application CN1984184 has proposed a kind of mobile phone maliciously to be sent a telegram here and the malice note method of carrying out early warning, does not need called subscriber's processing, just can directly refuse the undesirable communication service of called subscriber by network side.Chinese invention patent application CN101257652 has proposed a kind of method and system of limiting telecommunication, by the number synchronization server, the malice number of data server end and the malice number of mobile phone terminal database is carried out synchronously.The number that can comprise in client's early warning Stranger Calls incoming call or note and the note is the malice number, thereby makes the user avoid falling into the various traps that malice number transmit leg arranges, and misses to Min. simultaneously the proper communication with non-malice number transmit leg.But this all is the detection that is confined to when being confined to from the outside to send note to the machine, but lacks phone and note that the active detecting mobile phone of detection of handset own sends.
Along with the operation system of smart phone of the increasing cell phone manufacturer of the development of mobile phone operating system technology choice for use main flow in the own new product of releasing, operation system of smart phone has very large difference in the installation of software and application facet and conventional mobile phone.Traditional mobile phone only has prefabricated several single software function, can not satisfy user's various demands, and in the operation system of smart phone of main flow, can be convenient to use the concept of a kind of " software market ", by the Internet, directly use mobile phone from up to ten thousand kinds are used, to select the application program of own needs and be mounted in the mobile phone.But when enjoying various convenient that the numerous application of smart mobile phone bring as people, dimly do not know in numerous softwares under cover many vicious functions, for example downloads ad is privately uploaded information etc., causes the problems such as loss customer flow.Therefore, adopt the network interface in the monitoring intelligent mobile phone in the prior art, perhaps directly shielded the network connecting function of irrelevant software.
But mainly be that the 2G of mobile phone or the network traffics of 3G are monitored in the prior art, the note of mobile phone not being sent is monitored.And some software also has the function that sends note.What lose with respect to privately surfing the Net only is flow, and the harm that private is sent short messages is more serious.As: certain picture application software is wherein being hidden the function of sending short messages steathily, namely under the table some information is sent in the number of deducting fees in normal use software, causes the user to produce the telephone expenses of great number.Perhaps, the spyware that has is sent to user's individual privacy such as associated person information, short message content, message registration etc. on the particular server, causes all information of user to be revealed.
Therefore, the note that how can monitoring mobile phone sends prevents privately outer carrying out of sending short messages of background program, and can guarantee to send normally SMS and become the problem of needing solution badly.
Summary of the invention
The technical problem that the present invention solves has been to provide a kind of method and apparatus of the malice note of sending being tackled based on smart mobile phone.
The method of note is sent in a kind of interception, and described method comprises the steps:
A, appointment send the program of note;
B, obtain the note that sends;
C, judge that whether the note send is sent by the program of described transmission note; If so, execution in step D then; Otherwise, execution in step E;
D, transmission note, then execution in step F;
E, refusal send note, then execution in step F;
F, end.
Wherein, in step C, judge method that whether note that sends is sent by the program of described transmission note specify by judgement obtain among the Bao Mingyu step B of the note that program sends that sends note the bag name of transmission note whether identical.
Wherein, when the determination result is NO, at first execution in step C1 pointed out the result relevant with step C at step C.
Wherein, whether step C1 prompting user sends this note, if so, and execution in step D then; Otherwise, execution in step E.
Wherein, the note that the described acquisition of step C1 prompting user sends is illegal note, then execution in step E.
The device of note is sent in a kind of interception, and described device comprises:
Setup unit is used to specify the program that sends note;
Monitoring unit is used for obtaining the note that sends;
Identifying unit be used for to judge that whether the note that sends is sent by the program of described transmission note; If so, then move transmitting element; Otherwise, operation note blocking unit;
Transmitting element is used for sending note, then process ends;
The note blocking unit is used for refusal and sends note, then process ends.
Wherein, described identifying unit judge method that whether note that sends sent by the program of described transmission note by judge the described monitoring unit of Bao Mingyu of specifying the note that program sends that sends note in the described setup unit obtained the bag name of transmission note whether identical.
Wherein, also have Tip element, when the determination result is NO, at first carry out described Tip element at described identifying unit, the described Tip element prompting content relevant with the identifying unit result of determination
Wherein, described Tip element is used for prompting user and whether sends this note, if so, then moves described transmitting element; Otherwise, move described note blocking unit.
Perhaps, described Tip element, the note that sends for the described acquisition of prompting user is illegal note, and then moves described note blocking unit.
Whether the bag name of the present invention by the Bao Mingyu setting program of monitoring short message in smart mobile phone be identical judges whether the note that sends is legal, and the transmission of prevention note that further can be automatic or manual.Therefore, avoid some malicious application to send some malice note to the outside, better improved the mobile phone fail safe.
Description of drawings
Fig. 1 is the flow chart that the method for note is sent in interception according to an embodiment of the invention;
Fig. 2 is the flow chart that the method for note is sent in according to another embodiment of the invention interception;
Fig. 3 is the block diagram that short message apparatus is sent in interception according to an embodiment of the invention.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.Be understandable that specific embodiment described herein only is used for explaining the present invention, but not limitation of the invention.Also need to prove in addition, for convenience of description, only show part related to the present invention in the accompanying drawing but not entire infrastructure.
The present invention is directed to the problem that some background program is sent short messages privately in the smart mobile phone outward, the solution below proposing.The note that the method and apparatus of note sends in can monitoring cell-phone is sent in interception of the present invention, and sets certain decision condition, judges by this decision condition whether the note that sends is legal.This decision condition can be the bag name that can send the program of note, with monitor whether be sent out the bag name of extracting in the note identical, thereby judge whether this note sends behavior legal, and then determine it is the transmission that allows the transmission of note also or refuse this note.
By this scheme, the user can set application or the program that allows to send note freely, and automatically tackles unallowed note by system, thus the safety that the protection user mobile phone uses.In addition, except the mode of automatic processing, also has the mode of prompting.
Embodiment one
Fig. 1 is the flow chart that the method for note is sent in interception according to an embodiment of the invention.As shown in Figure 1, described method comprises:
Step 110, beginning the method;
Step 120, appointment send the program of note;
Step 130, obtain the note that sends;
Step 140, judge that whether the note send is sent by the program of described transmission note; If so, execution in step 150 then; Otherwise, execution in step 160;
Step 150, transmission note, then execution in step 170;
Step 160, refusal send note, and then execution in step 170;
Step 170, end.
Therefore, sent by the program of described transmission note by judging the note send, the operation whether execution tackles note, avoided the transmission of unallowed note.
Wherein, in step 140, judge method that whether note that sends is sent by the program of described transmission note specify by judgement obtain in the Bao Mingyu step 130 of the note that program sends that sends note the bag name of transmission note whether identical.
By the method, the user can set has the program that sends the note authority, and this program can be one or more, and carries out automatically the interception action by system, has both strengthened the fail safe that mobile phone uses, easy again user's operation.
Embodiment two
Fig. 2 is the flow chart that the method for note is sent in according to another embodiment of the invention interception, and as shown in Figure 2, described method is as follows:
Step 210, beginning the method;
Step 220, appointment send the program of note;
Step 230, obtain the note that sends;
Step 240, judge that whether the note send is sent by the program of described transmission note; If so, execution in step 250 then; Otherwise, execution in step 245;
Then step 250, transmission note carry out steps 270;
Whether step 245, prompting user send this note, and if so, then execution in step 250; Otherwise, execution in step 260;
Step 260, refusal send note, then carry out steps 270;
Step 270, end.
As seen, the hold-up interception method of the hold-up interception method among the embodiment 2 and embodiment 1 is basic identical, and its identical step has identical step mark, except having increased by 100.Similarly, in step 240, judge method that the note that sends is sent by the program of described transmission note specify by judgement obtain in the Bao Mingyu step 230 of the note that program sends that sends note the bag name of transmission note whether identical.
Difference is, in step 240 when the determination result is NO, at first carries out and has the prompting step 245 of judging attribute, ejects dialog box, and the note that the described acquisition of prompting user sends is illegal note, is to send or tackle this note.Like this, although need the user to determine, increase the flexibility of the method, allowed some special notes of interim clearance user known safe.
In addition, step 245 also can only be a prompting step and need not the user judge that the note that the described acquisition of prompting user sends is illegal note, has tackled this note, and then refusal sends this note.
Embodiment three
Fig. 3 is the block diagram that short message apparatus is sent in interception according to an embodiment of the invention.As shown in Figure 3, described device comprises setup unit, monitoring unit, identifying unit, Tip element, note blocking unit and transmitting element.
Described setup unit is used to specify the program that sends note;
Described monitoring unit is used for obtaining the note that sends;
Described identifying unit be used for to judge that whether the note that sends is sent by the program of described transmission note; If so, then move described transmitting element; Otherwise, move described note blocking unit;
Described transmitting element is used for sending note, then process ends;
Described note blocking unit is used for refusal and sends note, then process ends.
Wherein said identifying unit judge method that whether note that sends sent by the program of described transmission note by judge the described monitoring unit of Bao Mingyu of specifying the note that program sends that sends note in the described setup unit obtained the bag name of transmission note whether identical.
Further, can also comprise Tip element, when the determination result is NO, at first carry out Tip element at described identifying unit, the described Tip element prompting content relevant with the identifying unit result of determination
Particularly, described Tip element can have the judgement attribute, ejects dialog box, and the note that the described acquisition of prompting user sends is illegal note, is to send or tackle this note.Like this, although need to manually determine, increase the flexibility of this device, allowed some special notes of interim clearance user known safe.
Described Tip element also can only be to point out and need not the user judge that the note that the described acquisition of prompting user sends is illegal note, will tackle this note, then this note of refusal transmission.
Be understood that described Tip element not necessarily.
The present invention utilizes the bag name of the program that the Bao Mingyu of monitoring short message sets is whether identical judges whether the note that sends is legal, and the further transmission of automatic or manual prevention note.Therefore, avoid some malicious application to send some malice note to the outside, better improved the mobile phone fail safe.
Obviously, those skilled in the art should be understood that, above-mentioned each unit of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can realize with the executable program code of computer installation, carried out by calculation element thereby they can be stored in the storage device, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to the combination of any specific hardware and software.
In the concrete execution mode of a kind of software, whether whether can the bag name b that detect the application program that sends note be set at the framework layer consistent with the bag name a of the program that arranges, if consistent, then normally send, send otherwise stop this time, Check processing can be placed on framework layer SmsManager.sendTextMessage() method the inside, can be by the method getTargetPackage(of the parameter PendingIntent class in this sendTextMessage method) obtain to send the bag name of time note.
Notice that above-mentioned only is preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that to the invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious variations, readjust and substitute and can not break away from protection scope of the present invention.Therefore, although by above embodiment the present invention has been carried out comparatively detailed explanation, the present invention is not limited only to above embodiment, in the situation that does not break away from the present invention's design, can also comprise more other equivalent embodiment, and scope of the present invention is determined by appended claim scope.

Claims (10)

1. the method for note is sent in an interception, and described method comprises the steps:
A, appointment send the program of note;
B, obtain the note that sends;
C, judge that whether the note send is sent by the program of described transmission note; If so, execution in step D then; Otherwise, execution in step E;
D, transmission note, then execution in step F;
E, refusal send note, then execution in step F;
F, end.
2. the method for note is sent in interception according to claim 1, it is characterized in that:
Wherein, in step C, judge method that whether note that sends is sent by the program of described transmission note specify by judgement obtain among the Bao Mingyu step B of the note that program sends that sends note the bag name of transmission note whether identical.
3. the method for note is sent in interception according to claim 2, it is characterized in that:
When the determination result is NO, at first execution in step C1 pointed out the result relevant with step C at step C.
4. the method for note is sent in interception according to claim 3, it is characterized in that:
Whether step C1 prompting user sends this note, if so, and execution in step D then; Otherwise, execution in step E.
5. the method for note is sent in interception according to claim 3, it is characterized in that:
The note that the described acquisition of step C1 prompting user sends is illegal note, then execution in step E.
6. the device of note is sent in an interception, and described device comprises:
Setup unit is used to specify the program that sends note;
Monitoring unit is used for obtaining the note that sends;
Identifying unit be used for to judge that whether the note that sends is sent by the program of described transmission note; If so, then move transmitting element; Otherwise, operation note blocking unit;
Transmitting element is used for sending note, then process ends;
The note blocking unit is used for refusal and sends note, then process ends.
7. the device of note is sent in interception according to claim 6, it is characterized in that:
Described identifying unit judge method that whether note that sends sent by the program of described transmission note by judge the described monitoring unit of Bao Mingyu of specifying the note that program sends that sends note in the described setup unit obtained the bag name of transmission note whether identical.
8. the device of note is sent in interception according to claim 7, it is characterized in that:
Also have Tip element, when the determination result is NO, at first carry out described Tip element at described identifying unit, the described Tip element prompting content relevant with described identifying unit result of determination.
9. the device of note is sent in interception according to claim 8, it is characterized in that:
Described Tip element is used for prompting user and whether sends this note, if so, then moves described transmitting element; Otherwise, move described note blocking unit.
10. the device of note is sent in interception according to claim 8, it is characterized in that:
Described Tip element, the note that sends for the described acquisition of prompting user is illegal note, and then moves described note blocking unit.
CN2012105356935A 2012-12-11 2012-12-11 Method intercepting sent short message and device thereof Pending CN103037337A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012105356935A CN103037337A (en) 2012-12-11 2012-12-11 Method intercepting sent short message and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012105356935A CN103037337A (en) 2012-12-11 2012-12-11 Method intercepting sent short message and device thereof

Publications (1)

Publication Number Publication Date
CN103037337A true CN103037337A (en) 2013-04-10

Family

ID=48023733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012105356935A Pending CN103037337A (en) 2012-12-11 2012-12-11 Method intercepting sent short message and device thereof

Country Status (1)

Country Link
CN (1) CN103037337A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104159231A (en) * 2014-08-19 2014-11-19 北京奇虎科技有限公司 Method for optimizing background flow of client, and client
CN104853414A (en) * 2015-06-11 2015-08-19 联想(北京)有限公司 Control method and electronic equipment
CN106068014A (en) * 2016-06-20 2016-11-02 广东欧珀移动通信有限公司 Note monitor method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921640A (en) * 2005-08-23 2007-02-28 杨红兵 Method for processing waste information in communication system
US20080064381A1 (en) * 2003-09-26 2008-03-13 Disney Enterprises, Inc. Rerouting communications to provide cell phone parental control
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system
CN102323893A (en) * 2011-09-07 2012-01-18 福州博远无线网络科技有限公司 Method for managing application program on Android mobile phone through PC (Personal Computer)
CN102395128A (en) * 2011-06-30 2012-03-28 北京邮电大学 Malicious information transmission preventing method and system of mobile intelligent terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080064381A1 (en) * 2003-09-26 2008-03-13 Disney Enterprises, Inc. Rerouting communications to provide cell phone parental control
CN1921640A (en) * 2005-08-23 2007-02-28 杨红兵 Method for processing waste information in communication system
CN101754182A (en) * 2008-12-19 2010-06-23 北京网秦天下科技有限公司 Packed-based network contact list implementation method and system
CN102395128A (en) * 2011-06-30 2012-03-28 北京邮电大学 Malicious information transmission preventing method and system of mobile intelligent terminal
CN102323893A (en) * 2011-09-07 2012-01-18 福州博远无线网络科技有限公司 Method for managing application program on Android mobile phone through PC (Personal Computer)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104159231A (en) * 2014-08-19 2014-11-19 北京奇虎科技有限公司 Method for optimizing background flow of client, and client
CN104853414A (en) * 2015-06-11 2015-08-19 联想(北京)有限公司 Control method and electronic equipment
CN104853414B (en) * 2015-06-11 2018-06-01 联想(北京)有限公司 A kind of control method and electronic equipment
CN106068014A (en) * 2016-06-20 2016-11-02 广东欧珀移动通信有限公司 Note monitor method and device

Similar Documents

Publication Publication Date Title
CN102209326B (en) Malicious behavior detection method and system based on smartphone radio interface layer
CN103780457B (en) Mobile intelligent terminal safety detection method based on boundary detection
CN104244281A (en) Base station detection method and base station detection device
CN101854609B (en) Short message monitoring system and method
CN104168557A (en) Upgrading method for operating systems and upgrading device for operating systems
CN101444119A (en) System for implementing security police on mobile communication equipment
WO2011160328A1 (en) Method and device for monitoring communications
CN101257652A (en) Method and system for early warning of mobile phone malevolence incoming call and malevolence SMS
CN102185922B (en) Point-to-point access method for wireless IoT (Internet of Things) video monitoring terminal based on 2.5G communication and handset mailbox
CN102665176A (en) System and method for safely monitoring by mobile terminal
CN103888949A (en) Illegal AP prevention method and device
CN104378482B (en) Mobile terminal addressbook update method and system
CN104243725B (en) Simple call system and method thereof
CN103037337A (en) Method intercepting sent short message and device thereof
CN105992212B (en) A kind of detection method that mobile phone malice is deducted fees
CN102158830A (en) Real time monitoring system for mobile network spam
CN102098640A (en) Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam
CN101771757A (en) Method for detecting and intercepting nuisance calls
CN103974259B (en) Prevention method, crime prevention device and crime prevention system that malice is deducted fees
CN102547249A (en) 3G (3rd Generation) network-based video surveillance point-to-point access method
CN101778364A (en) System and method for discovering and governing behaviors of copying SIM cards of mobile phones by adopting forced login
CN106713649A (en) Information sharing method and system of realizing dialing process
CN105681535A (en) Intelligent firewall method, apparatus, and system
CN103139740B (en) The identification of a kind of illegal signaling, processing method and device
CN107086978B (en) Method and device for identifying Trojan horse virus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130410