CN103037337A - Method intercepting sent short message and device thereof - Google Patents
Method intercepting sent short message and device thereof Download PDFInfo
- Publication number
- CN103037337A CN103037337A CN2012105356935A CN201210535693A CN103037337A CN 103037337 A CN103037337 A CN 103037337A CN 2012105356935 A CN2012105356935 A CN 2012105356935A CN 201210535693 A CN201210535693 A CN 201210535693A CN 103037337 A CN103037337 A CN 103037337A
- Authority
- CN
- China
- Prior art keywords
- note
- sent
- sends
- program
- short message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a method intercepting a sent short message and a device thereof. The method comprises the following steps: setting a program for sending a short message; obtaining the sent short message; judging whether the sent short message is sent by the program for sending the short message, if the sent short message is sent by the program for sending the short message, a sending step is carried out, or otherwise, a rejecting step is carried out. The sending step comprises the steps of sending the short message and finishing the process. The rejecting step comprises the steps of rejecting to send the short message and finishing the process. By monitoring whether a package name of the short message in an intelligent mobile phone is the same as that of the set program to judge whether the sent short message is legal, prompting steps are provided, and therefore the short message can be prevented from being sent in an automatic mode or a manual mode. Thus, malicious application programs can be prevented from sending malicious short messages towards external, and safety of the mobile phone is improved well.
Description
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of method and apparatus of the malice note of sending being tackled based on smart mobile phone.
Background technology
In the actual life, increasing people uses mobile phone to carry out communication and exchange.But when using mobile phone to exchange, tend to run into some troublesome telephones and note.Such as advertising, swindle phone and swindle note etc.In case user's telephone number is leaked by nameless channel, just receive easily incoming call and the note of various malice.Therefore, in order to solve this class problem, produced a lot of methods in the prior art.For example Chinese invention patent application CN1984184 has proposed a kind of mobile phone maliciously to be sent a telegram here and the malice note method of carrying out early warning, does not need called subscriber's processing, just can directly refuse the undesirable communication service of called subscriber by network side.Chinese invention patent application CN101257652 has proposed a kind of method and system of limiting telecommunication, by the number synchronization server, the malice number of data server end and the malice number of mobile phone terminal database is carried out synchronously.The number that can comprise in client's early warning Stranger Calls incoming call or note and the note is the malice number, thereby makes the user avoid falling into the various traps that malice number transmit leg arranges, and misses to Min. simultaneously the proper communication with non-malice number transmit leg.But this all is the detection that is confined to when being confined to from the outside to send note to the machine, but lacks phone and note that the active detecting mobile phone of detection of handset own sends.
Along with the operation system of smart phone of the increasing cell phone manufacturer of the development of mobile phone operating system technology choice for use main flow in the own new product of releasing, operation system of smart phone has very large difference in the installation of software and application facet and conventional mobile phone.Traditional mobile phone only has prefabricated several single software function, can not satisfy user's various demands, and in the operation system of smart phone of main flow, can be convenient to use the concept of a kind of " software market ", by the Internet, directly use mobile phone from up to ten thousand kinds are used, to select the application program of own needs and be mounted in the mobile phone.But when enjoying various convenient that the numerous application of smart mobile phone bring as people, dimly do not know in numerous softwares under cover many vicious functions, for example downloads ad is privately uploaded information etc., causes the problems such as loss customer flow.Therefore, adopt the network interface in the monitoring intelligent mobile phone in the prior art, perhaps directly shielded the network connecting function of irrelevant software.
But mainly be that the 2G of mobile phone or the network traffics of 3G are monitored in the prior art, the note of mobile phone not being sent is monitored.And some software also has the function that sends note.What lose with respect to privately surfing the Net only is flow, and the harm that private is sent short messages is more serious.As: certain picture application software is wherein being hidden the function of sending short messages steathily, namely under the table some information is sent in the number of deducting fees in normal use software, causes the user to produce the telephone expenses of great number.Perhaps, the spyware that has is sent to user's individual privacy such as associated person information, short message content, message registration etc. on the particular server, causes all information of user to be revealed.
Therefore, the note that how can monitoring mobile phone sends prevents privately outer carrying out of sending short messages of background program, and can guarantee to send normally SMS and become the problem of needing solution badly.
Summary of the invention
The technical problem that the present invention solves has been to provide a kind of method and apparatus of the malice note of sending being tackled based on smart mobile phone.
The method of note is sent in a kind of interception, and described method comprises the steps:
A, appointment send the program of note;
B, obtain the note that sends;
C, judge that whether the note send is sent by the program of described transmission note; If so, execution in step D then; Otherwise, execution in step E;
D, transmission note, then execution in step F;
E, refusal send note, then execution in step F;
F, end.
Wherein, in step C, judge method that whether note that sends is sent by the program of described transmission note specify by judgement obtain among the Bao Mingyu step B of the note that program sends that sends note the bag name of transmission note whether identical.
Wherein, when the determination result is NO, at first execution in step C1 pointed out the result relevant with step C at step C.
Wherein, whether step C1 prompting user sends this note, if so, and execution in step D then; Otherwise, execution in step E.
Wherein, the note that the described acquisition of step C1 prompting user sends is illegal note, then execution in step E.
The device of note is sent in a kind of interception, and described device comprises:
Setup unit is used to specify the program that sends note;
Monitoring unit is used for obtaining the note that sends;
Identifying unit be used for to judge that whether the note that sends is sent by the program of described transmission note; If so, then move transmitting element; Otherwise, operation note blocking unit;
Transmitting element is used for sending note, then process ends;
The note blocking unit is used for refusal and sends note, then process ends.
Wherein, described identifying unit judge method that whether note that sends sent by the program of described transmission note by judge the described monitoring unit of Bao Mingyu of specifying the note that program sends that sends note in the described setup unit obtained the bag name of transmission note whether identical.
Wherein, also have Tip element, when the determination result is NO, at first carry out described Tip element at described identifying unit, the described Tip element prompting content relevant with the identifying unit result of determination
Wherein, described Tip element is used for prompting user and whether sends this note, if so, then moves described transmitting element; Otherwise, move described note blocking unit.
Perhaps, described Tip element, the note that sends for the described acquisition of prompting user is illegal note, and then moves described note blocking unit.
Whether the bag name of the present invention by the Bao Mingyu setting program of monitoring short message in smart mobile phone be identical judges whether the note that sends is legal, and the transmission of prevention note that further can be automatic or manual.Therefore, avoid some malicious application to send some malice note to the outside, better improved the mobile phone fail safe.
Description of drawings
Fig. 1 is the flow chart that the method for note is sent in interception according to an embodiment of the invention;
Fig. 2 is the flow chart that the method for note is sent in according to another embodiment of the invention interception;
Fig. 3 is the block diagram that short message apparatus is sent in interception according to an embodiment of the invention.
Embodiment
The present invention is described in further detail below in conjunction with drawings and Examples.Be understandable that specific embodiment described herein only is used for explaining the present invention, but not limitation of the invention.Also need to prove in addition, for convenience of description, only show part related to the present invention in the accompanying drawing but not entire infrastructure.
The present invention is directed to the problem that some background program is sent short messages privately in the smart mobile phone outward, the solution below proposing.The note that the method and apparatus of note sends in can monitoring cell-phone is sent in interception of the present invention, and sets certain decision condition, judges by this decision condition whether the note that sends is legal.This decision condition can be the bag name that can send the program of note, with monitor whether be sent out the bag name of extracting in the note identical, thereby judge whether this note sends behavior legal, and then determine it is the transmission that allows the transmission of note also or refuse this note.
By this scheme, the user can set application or the program that allows to send note freely, and automatically tackles unallowed note by system, thus the safety that the protection user mobile phone uses.In addition, except the mode of automatic processing, also has the mode of prompting.
Embodiment one
Fig. 1 is the flow chart that the method for note is sent in interception according to an embodiment of the invention.As shown in Figure 1, described method comprises:
Therefore, sent by the program of described transmission note by judging the note send, the operation whether execution tackles note, avoided the transmission of unallowed note.
Wherein, in step 140, judge method that whether note that sends is sent by the program of described transmission note specify by judgement obtain in the Bao Mingyu step 130 of the note that program sends that sends note the bag name of transmission note whether identical.
By the method, the user can set has the program that sends the note authority, and this program can be one or more, and carries out automatically the interception action by system, has both strengthened the fail safe that mobile phone uses, easy again user's operation.
Embodiment two
Fig. 2 is the flow chart that the method for note is sent in according to another embodiment of the invention interception, and as shown in Figure 2, described method is as follows:
Then step 250, transmission note carry out steps 270;
Whether step 245, prompting user send this note, and if so, then execution in step 250; Otherwise, execution in step 260;
As seen, the hold-up interception method of the hold-up interception method among the embodiment 2 and embodiment 1 is basic identical, and its identical step has identical step mark, except having increased by 100.Similarly, in step 240, judge method that the note that sends is sent by the program of described transmission note specify by judgement obtain in the Bao Mingyu step 230 of the note that program sends that sends note the bag name of transmission note whether identical.
Difference is, in step 240 when the determination result is NO, at first carries out and has the prompting step 245 of judging attribute, ejects dialog box, and the note that the described acquisition of prompting user sends is illegal note, is to send or tackle this note.Like this, although need the user to determine, increase the flexibility of the method, allowed some special notes of interim clearance user known safe.
In addition, step 245 also can only be a prompting step and need not the user judge that the note that the described acquisition of prompting user sends is illegal note, has tackled this note, and then refusal sends this note.
Embodiment three
Fig. 3 is the block diagram that short message apparatus is sent in interception according to an embodiment of the invention.As shown in Figure 3, described device comprises setup unit, monitoring unit, identifying unit, Tip element, note blocking unit and transmitting element.
Described setup unit is used to specify the program that sends note;
Described monitoring unit is used for obtaining the note that sends;
Described identifying unit be used for to judge that whether the note that sends is sent by the program of described transmission note; If so, then move described transmitting element; Otherwise, move described note blocking unit;
Described transmitting element is used for sending note, then process ends;
Described note blocking unit is used for refusal and sends note, then process ends.
Wherein said identifying unit judge method that whether note that sends sent by the program of described transmission note by judge the described monitoring unit of Bao Mingyu of specifying the note that program sends that sends note in the described setup unit obtained the bag name of transmission note whether identical.
Further, can also comprise Tip element, when the determination result is NO, at first carry out Tip element at described identifying unit, the described Tip element prompting content relevant with the identifying unit result of determination
Particularly, described Tip element can have the judgement attribute, ejects dialog box, and the note that the described acquisition of prompting user sends is illegal note, is to send or tackle this note.Like this, although need to manually determine, increase the flexibility of this device, allowed some special notes of interim clearance user known safe.
Described Tip element also can only be to point out and need not the user judge that the note that the described acquisition of prompting user sends is illegal note, will tackle this note, then this note of refusal transmission.
Be understood that described Tip element not necessarily.
The present invention utilizes the bag name of the program that the Bao Mingyu of monitoring short message sets is whether identical judges whether the note that sends is legal, and the further transmission of automatic or manual prevention note.Therefore, avoid some malicious application to send some malice note to the outside, better improved the mobile phone fail safe.
Obviously, those skilled in the art should be understood that, above-mentioned each unit of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can realize with the executable program code of computer installation, carried out by calculation element thereby they can be stored in the storage device, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to the combination of any specific hardware and software.
In the concrete execution mode of a kind of software, whether whether can the bag name b that detect the application program that sends note be set at the framework layer consistent with the bag name a of the program that arranges, if consistent, then normally send, send otherwise stop this time, Check processing can be placed on framework layer SmsManager.sendTextMessage() method the inside, can be by the method getTargetPackage(of the parameter PendingIntent class in this sendTextMessage method) obtain to send the bag name of time note.
Notice that above-mentioned only is preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that to the invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious variations, readjust and substitute and can not break away from protection scope of the present invention.Therefore, although by above embodiment the present invention has been carried out comparatively detailed explanation, the present invention is not limited only to above embodiment, in the situation that does not break away from the present invention's design, can also comprise more other equivalent embodiment, and scope of the present invention is determined by appended claim scope.
Claims (10)
1. the method for note is sent in an interception, and described method comprises the steps:
A, appointment send the program of note;
B, obtain the note that sends;
C, judge that whether the note send is sent by the program of described transmission note; If so, execution in step D then; Otherwise, execution in step E;
D, transmission note, then execution in step F;
E, refusal send note, then execution in step F;
F, end.
2. the method for note is sent in interception according to claim 1, it is characterized in that:
Wherein, in step C, judge method that whether note that sends is sent by the program of described transmission note specify by judgement obtain among the Bao Mingyu step B of the note that program sends that sends note the bag name of transmission note whether identical.
3. the method for note is sent in interception according to claim 2, it is characterized in that:
When the determination result is NO, at first execution in step C1 pointed out the result relevant with step C at step C.
4. the method for note is sent in interception according to claim 3, it is characterized in that:
Whether step C1 prompting user sends this note, if so, and execution in step D then; Otherwise, execution in step E.
5. the method for note is sent in interception according to claim 3, it is characterized in that:
The note that the described acquisition of step C1 prompting user sends is illegal note, then execution in step E.
6. the device of note is sent in an interception, and described device comprises:
Setup unit is used to specify the program that sends note;
Monitoring unit is used for obtaining the note that sends;
Identifying unit be used for to judge that whether the note that sends is sent by the program of described transmission note; If so, then move transmitting element; Otherwise, operation note blocking unit;
Transmitting element is used for sending note, then process ends;
The note blocking unit is used for refusal and sends note, then process ends.
7. the device of note is sent in interception according to claim 6, it is characterized in that:
Described identifying unit judge method that whether note that sends sent by the program of described transmission note by judge the described monitoring unit of Bao Mingyu of specifying the note that program sends that sends note in the described setup unit obtained the bag name of transmission note whether identical.
8. the device of note is sent in interception according to claim 7, it is characterized in that:
Also have Tip element, when the determination result is NO, at first carry out described Tip element at described identifying unit, the described Tip element prompting content relevant with described identifying unit result of determination.
9. the device of note is sent in interception according to claim 8, it is characterized in that:
Described Tip element is used for prompting user and whether sends this note, if so, then moves described transmitting element; Otherwise, move described note blocking unit.
10. the device of note is sent in interception according to claim 8, it is characterized in that:
Described Tip element, the note that sends for the described acquisition of prompting user is illegal note, and then moves described note blocking unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105356935A CN103037337A (en) | 2012-12-11 | 2012-12-11 | Method intercepting sent short message and device thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105356935A CN103037337A (en) | 2012-12-11 | 2012-12-11 | Method intercepting sent short message and device thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103037337A true CN103037337A (en) | 2013-04-10 |
Family
ID=48023733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012105356935A Pending CN103037337A (en) | 2012-12-11 | 2012-12-11 | Method intercepting sent short message and device thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103037337A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104159231A (en) * | 2014-08-19 | 2014-11-19 | 北京奇虎科技有限公司 | Method for optimizing background flow of client, and client |
CN104853414A (en) * | 2015-06-11 | 2015-08-19 | 联想(北京)有限公司 | Control method and electronic equipment |
CN106068014A (en) * | 2016-06-20 | 2016-11-02 | 广东欧珀移动通信有限公司 | Note monitor method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921640A (en) * | 2005-08-23 | 2007-02-28 | 杨红兵 | Method for processing waste information in communication system |
US20080064381A1 (en) * | 2003-09-26 | 2008-03-13 | Disney Enterprises, Inc. | Rerouting communications to provide cell phone parental control |
CN101754182A (en) * | 2008-12-19 | 2010-06-23 | 北京网秦天下科技有限公司 | Packed-based network contact list implementation method and system |
CN102323893A (en) * | 2011-09-07 | 2012-01-18 | 福州博远无线网络科技有限公司 | Method for managing application program on Android mobile phone through PC (Personal Computer) |
CN102395128A (en) * | 2011-06-30 | 2012-03-28 | 北京邮电大学 | Malicious information transmission preventing method and system of mobile intelligent terminal |
-
2012
- 2012-12-11 CN CN2012105356935A patent/CN103037337A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080064381A1 (en) * | 2003-09-26 | 2008-03-13 | Disney Enterprises, Inc. | Rerouting communications to provide cell phone parental control |
CN1921640A (en) * | 2005-08-23 | 2007-02-28 | 杨红兵 | Method for processing waste information in communication system |
CN101754182A (en) * | 2008-12-19 | 2010-06-23 | 北京网秦天下科技有限公司 | Packed-based network contact list implementation method and system |
CN102395128A (en) * | 2011-06-30 | 2012-03-28 | 北京邮电大学 | Malicious information transmission preventing method and system of mobile intelligent terminal |
CN102323893A (en) * | 2011-09-07 | 2012-01-18 | 福州博远无线网络科技有限公司 | Method for managing application program on Android mobile phone through PC (Personal Computer) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104159231A (en) * | 2014-08-19 | 2014-11-19 | 北京奇虎科技有限公司 | Method for optimizing background flow of client, and client |
CN104853414A (en) * | 2015-06-11 | 2015-08-19 | 联想(北京)有限公司 | Control method and electronic equipment |
CN104853414B (en) * | 2015-06-11 | 2018-06-01 | 联想(北京)有限公司 | A kind of control method and electronic equipment |
CN106068014A (en) * | 2016-06-20 | 2016-11-02 | 广东欧珀移动通信有限公司 | Note monitor method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102209326B (en) | Malicious behavior detection method and system based on smartphone radio interface layer | |
CN103780457B (en) | Mobile intelligent terminal safety detection method based on boundary detection | |
CN104244281A (en) | Base station detection method and base station detection device | |
CN101854609B (en) | Short message monitoring system and method | |
CN104168557A (en) | Upgrading method for operating systems and upgrading device for operating systems | |
CN101444119A (en) | System for implementing security police on mobile communication equipment | |
WO2011160328A1 (en) | Method and device for monitoring communications | |
CN101257652A (en) | Method and system for early warning of mobile phone malevolence incoming call and malevolence SMS | |
CN102185922B (en) | Point-to-point access method for wireless IoT (Internet of Things) video monitoring terminal based on 2.5G communication and handset mailbox | |
CN102665176A (en) | System and method for safely monitoring by mobile terminal | |
CN103888949A (en) | Illegal AP prevention method and device | |
CN104378482B (en) | Mobile terminal addressbook update method and system | |
CN104243725B (en) | Simple call system and method thereof | |
CN103037337A (en) | Method intercepting sent short message and device thereof | |
CN105992212B (en) | A kind of detection method that mobile phone malice is deducted fees | |
CN102158830A (en) | Real time monitoring system for mobile network spam | |
CN102098640A (en) | Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam | |
CN101771757A (en) | Method for detecting and intercepting nuisance calls | |
CN103974259B (en) | Prevention method, crime prevention device and crime prevention system that malice is deducted fees | |
CN102547249A (en) | 3G (3rd Generation) network-based video surveillance point-to-point access method | |
CN101778364A (en) | System and method for discovering and governing behaviors of copying SIM cards of mobile phones by adopting forced login | |
CN106713649A (en) | Information sharing method and system of realizing dialing process | |
CN105681535A (en) | Intelligent firewall method, apparatus, and system | |
CN103139740B (en) | The identification of a kind of illegal signaling, processing method and device | |
CN107086978B (en) | Method and device for identifying Trojan horse virus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130410 |