CN105245744B - GPRS connection protection method and system - Google Patents

GPRS connection protection method and system Download PDF

Info

Publication number
CN105245744B
CN105245744B CN201410319214.5A CN201410319214A CN105245744B CN 105245744 B CN105245744 B CN 105245744B CN 201410319214 A CN201410319214 A CN 201410319214A CN 105245744 B CN105245744 B CN 105245744B
Authority
CN
China
Prior art keywords
alarm
incoming call
gprs connection
module
alert
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410319214.5A
Other languages
Chinese (zh)
Other versions
CN105245744A (en
Inventor
朱井泉
周亮
张建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Honeywell International Inc
Original Assignee
Honeywell International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Honeywell International Inc filed Critical Honeywell International Inc
Priority to CN201410319214.5A priority Critical patent/CN105245744B/en
Publication of CN105245744A publication Critical patent/CN105245744A/en
Application granted granted Critical
Publication of CN105245744B publication Critical patent/CN105245744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a GPRS connection protection method and a GPRS connection protection system, wherein the method comprises the following steps: receiving an incoming call; determining whether the incoming call exceeds a predetermined limit; in response to the incoming call exceeding a predetermined limit, shutting down GSM telephone functionality; generating an alarm and indicating the alarm to a user; reporting the alert to an alert center; and restoring the GSM phone functionality after reporting the alert to the alarm center.

Description

GPRS connection protection method and system
Technical Field
The invention relates to a GPRS connection protection method and a GPRS connection protection system, in particular to a method and a system for protecting GPRS connection when an intelligent home reports an alarm to a defense area alarm host.
Background
The smart home is widely applied to modern life. In the field of smart home, a defense area alarm host is popular in recent years. The defense area alarm host can support network and telephone report or backup report, and can support various communication modes such as telephone lines, networks, GPRS wireless networks and the like. When the alarm center of the defense area alarm host is connected through the mobile terminal, the report about the alarm is sent through the GPRS connection.
Under the current mobile communication network conditions, the GPRS connection will automatically close when the mobile terminal answers the call. The GPRS connection will not be available even during the time the call is waiting to be answered but not yet answered. In case the GPRS connection is closed or unavailable, the mobile terminal will not be able to send a report to the alarm center. Therefore, when there is a continuous call of an unfamiliar phone number, especially when there is a continuous malicious pattern incoming call, the mobile terminal cannot provide a report on the warning to the alarm center. Therefore, a technique for protecting GPRS connections is needed.
Disclosure of Invention
In order to overcome one or more defects in the prior art of reporting to an alarm center by using a mobile terminal, the invention provides a GPRS connection protection method and a GPRS connection protection system, which can ensure the stability and effectiveness of GPRS connection when reporting to the alarm center.
According to one aspect of the present invention, a GPRS connection protection method is provided, which is characterized by comprising the following steps: receiving an incoming call; determining whether the incoming call exceeds a predetermined limit; in response to the incoming call exceeding a predetermined limit, shutting down GSM telephone functionality; generating an alarm and indicating the alarm to a user; reporting the alert to an alert center; and restoring the GSM phone functionality after reporting the alert to the alarm center.
According to an aspect of the present invention, there is provided a GPRS connection protection system, comprising: the receiving module is used for receiving an incoming call; the judging module is used for judging whether the incoming call exceeds a preset limit or not; a closing module for closing the GSM telephone function in response to the incoming call exceeding a predetermined limit; the alarm module is used for generating an alarm and indicating the alarm to a user; the reporting module is used for reporting the alarm to an alarm center; and the recovery module is used for recovering the GSM telephone function after the alarm is reported to the alarm center.
The GPRS connection protection method and the GPRS connection protection system have the advantages that: the GPRS connection can be protected upon incoming calls, especially continuous malicious strange calls, in order to ensure that an alarm report is sent to the alarm centre.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flow chart illustrating a GPRS connection protection method according to an embodiment of the present invention; and
fig. 2 is a functional block diagram illustrating a GPRS connection protection system according to an embodiment of the present invention.
Detailed Description
In this description, certain terminology is used throughout this specification to refer to particular system components. As one skilled in the art will appreciate, identical components may generally be referred to by different names, and thus this document does not intend to distinguish between components that differ in name but not function. In this document, the terms "comprising", "including" and "having" are used in an open fashion and thus should be interpreted to mean "including but not limited to …". Further, the terms "substantially", "substantially" or "approximately" as may be used herein relate to industry accepted tolerances for the respective terms. The term "coupled," as may be employed herein, includes direct coupling and indirect coupling via another component, element, circuit, or module where, for indirect coupling, the intervening component, element, circuit, or module does not alter the information of a signal but may adjust its current level, voltage level, and/or power level. Inferred coupling (e.g., where one element is coupled to another element by inference) includes direct and indirect coupling between two elements in the same manner as "coupled".
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present apparatus, methods, and devices may be practiced without these specific details. Reference in the specification to "an embodiment," "an example," or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment or example is included in at least that one embodiment or example, but not necessarily in other embodiments or examples. The various instances of the phrase "in one embodiment," "in a preferred embodiment," or similar phrases in various places in the specification are not necessarily all referring to the same embodiment.
The invention is further described below with reference to preferred embodiments and the accompanying drawings.
Fig. 1 is a flowchart illustrating a GPRS connection protection method according to an embodiment of the present invention. The method is applicable to any mobile terminal capable of GPRS wireless communication with an alarm center (for example, located in a defense area alarm host).
First, at step S110, the mobile terminal receives an incoming call. When the mobile terminal receives an incoming call, due to the limitation of the existing mobile communication network, the GPRS connection will be automatically closed no matter whether the user answers the incoming call. Therefore, when there is an incoming call, especially when a malicious strange number continues to call the mobile terminal, the mobile terminal cannot send a report to the alarm center using the GPRS connection.
At step S120, the mobile terminal determines whether the incoming call exceeds a predetermined limit. This step can also be considered as determining whether the incoming call is a malicious incoming call. The predetermined limit may be set to a predetermined number of incoming calls within a predetermined time. The predetermined time may be set to 1 minute, 2 minutes, 5 minutes or more, preferably 1 minute. The predetermined number of incoming calls may be different depending on the security level desired by the user, and may be set to 3 times, 5 times, or 10 times, for example. In a preferred embodiment, this step may only make a determination as to whether the incoming call to the unfamiliar number exceeds a predetermined limit. The way of determining whether the incoming call is a strange number belongs to the prior art and is not described in detail herein. However, the user may also make a determination whether incoming calls of all numbers exceed a predetermined limit according to specific needs, without being limited to unfamiliar numbers.
At step S130, when it is determined that the incoming call exceeds the predetermined limit through step S120, that is, when it is determined that the incoming call exceeds the predetermined number of times at the predetermined time, the GSM phone function of the mobile terminal is turned off. That is, when it is determined that the incoming call is a malicious call, the GSM phone function of the mobile terminal is turned off to protect the GPRS connection, i.e., to keep the GPRS connection available.
At step S140, after the GSM phone function of the mobile terminal is turned off at step S130, the mobile terminal generates an alert and indicates it to the user. The alert is then reported to an alert center at step S150. The alert generated by the mobile terminal may include the number of the incoming call, the number of times the incoming call is made, and the time of the incoming call, among others. The mobile terminal may indicate the alert to the user through the display, or may indicate the alert to the user through sound, vibration, or an indicator light, or any combination of these. Reports on the alarms are sent to the alarm centre over the protected GPRS connection.
After the alarm is reported to the alarm center, the GSM phone function is restored at step S160. After the report is sent to the alarm center, the GSM telephone function of the mobile terminal is recovered so as to enable the mobile terminal to recover to be normal and to be in the incoming call standby state again.
By the method of the embodiment, the mobile terminal can still maintain the usability of GPRS connection and send a report to the alarm center through the GPRS connection when the incoming call of the strange number is harassed (namely, continuous calling).
Fig. 2 is a functional block diagram illustrating a GPRS connection protection system according to an embodiment of the present invention. The GPRS connection protection system shown in fig. 2 is used in a mobile terminal and includes a receiving module 210, a determining module 220, a closing module 230, an alarming module 240, a reporting module 250, and a recovering module 260.
The receiving module 210 is used for receiving an incoming call. When the mobile terminal receives an incoming call through the receiving module 210, due to the limitation of the existing mobile communication network, the GPRS connection is automatically closed regardless of whether the user answers the incoming call. Therefore, when there is an incoming call, especially when a malicious strange number continues to call the mobile terminal, the mobile terminal cannot send a report to the alarm center using the GPRS connection.
The determining module 220 is used for determining whether the incoming call exceeds a predetermined limit. The function of the determining module 210 can also be considered as determining whether the incoming call is a malicious incoming call. The predetermined limit may be set to a predetermined number of incoming calls within a predetermined time. The predetermined time may be set to 1 minute, 2 minutes, 5 minutes or more, preferably 1 minute. The predetermined number of incoming calls may be different depending on the security level desired by the user, and may be set to 3 times, 5 times, or 10 times, for example. In a preferred embodiment, the determining module 210 may only determine whether the incoming call of the strange number exceeds a predetermined limit. The way of determining whether the incoming call is a strange number belongs to the prior art and is not described in detail herein. However, the user may also make a determination whether incoming calls of all numbers exceed a predetermined limit according to specific needs, without being limited to unfamiliar numbers.
The closing module 230 is configured to close the GSM phone function of the mobile terminal when the incoming call is determined to exceed the predetermined limit by the determining module 220, that is, when the incoming call is determined to exceed the predetermined number of times in the predetermined time. That is, when the incoming call is determined to be a malicious call, the shutdown module 230 shuts down the GSM phone function of the mobile terminal so as to protect the GPRS connection, i.e., keep the GPRS connection available.
The alarm module 240 is configured to generate an alarm and indicate to the user through the alarm module 240 after the GSM phone function of the mobile terminal is turned off by the turning-off module 230.
The reporting module 250 is used to report the alert to an alert center. The alert generated by the mobile terminal through the alert module 240 may include the number of the incoming call, the number of times of the incoming call, the time of the incoming call, and the like. The mobile terminal may indicate the alert to the user through the display, or may indicate the alert to the user through sound, vibration, or an indicator light, or any combination of these. Reports on the alarms are sent to the alarm centre over the protected GPRS connection.
The recovery module 260 is used to recover GSM phone functionality after reporting the alarm to the alarm center. After reporting to the alarm center, the GSM phone function of the mobile terminal is restored by the restoring module 260 so as to restore the mobile terminal to normal and to be in the incoming call standby state again.
Through the GPRS connection protection system of the embodiment, when incoming call harassment (namely continuous calling) of strange numbers occurs, the mobile terminal can still keep the usability of GPRS connection and send a report to an alarm center through the GPRS connection.
Note that the preferred embodiments may be implemented in hardware, software, firmware, or a combination thereof. In various embodiment(s), the device components are implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. If implemented in hardware, as in some embodiments, the device components may be implemented using any or a combination of the following technologies, all of which are well known in the art: discrete logic circuit(s) having logic gates for implementing logic functions on data signals, Application Specific Integrated Circuit (ASIC) having appropriate combinational logic gates, programmable gate array(s) (PGA), Field Programmable Gate Array (FPGA), or the like.
The software components may include an ordered listing of executable instructions for implementing logical functions, and can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. In addition, the scope of the present disclosure includes embodying the functionality of one or more embodiments in logic embodied in hardware or software-constructed media.
The foregoing disclosure of embodiments of the present disclosure has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the disclosure to the precise form disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. Note that the above examples are not intended to be limiting. Additional embodiments of the apparatus, methods, and devices that may include many of the features described above are also contemplated. Other apparatus, methods, devices, features and advantages of the disclosure will be or will become apparent to one with skill in the art upon examination of the following drawings and detailed description. It is intended that all such additional devices, methods, apparatus, features and advantages be included within this description.
Conditional language such as "can," "may," "might," or "may" is generally intended to convey that certain embodiments may, but need not, include certain features, elements and/or steps, unless specifically stated otherwise or understood otherwise within the context of use. Thus, such conditional language is not generally intended to imply that one or more embodiments are in any way required to include features, elements and/or steps.
Any process descriptions or blocks in flow charts should be understood as representing code portions, or segments, modules, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process, and alternate implementations are included within the scope of the preferred embodiment of the present disclosure in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present disclosure.

Claims (9)

1. A GPRS connection protection method is characterized by comprising the following steps:
receiving an incoming call;
determining whether the incoming call exceeds a predetermined limit;
in response to the incoming call exceeding a predetermined limit, shutting down GSM telephone functionality and keeping a GPRS connection available;
generating an alarm and indicating the alarm to a user;
reporting the alert to an alert center; and
after reporting the alert to the alert center, restoring the GSM telephone functionality.
2. The method of claim 1, wherein the predetermined limit is a predetermined number of incoming calls within a predetermined time.
3. The method of claim 2, wherein the predetermined time is 1 minute and the predetermined number of times is 3, 5, or 10.
4. The method of claim 1, wherein the incoming call is an incoming call to a strange number.
5. Method according to claim 1, wherein the alarm is indicated to the user by means of a display or by means of a sound, vibration and/or indicator light and is reported to the alarm centre over a GPRS connection.
6. The method of claim 1, wherein the alarm center is located in a defence area alarm host.
7. A GPRS connection protection system is characterized by comprising the following parts:
the receiving module is used for receiving an incoming call;
the judging module is used for judging whether the incoming call exceeds a preset limit or not;
a closing module for closing the GSM telephone function and keeping GPRS connection available in response to the incoming call exceeding a predetermined limit;
the alarm module is used for generating an alarm and indicating the alarm to a user;
the reporting module is used for reporting the alarm to an alarm center; and
and the recovery module is used for recovering the GSM telephone function after the alarm is reported to the alarm center.
8. The system of claim 7, wherein the predetermined limit is a predetermined number of incoming calls within a predetermined time.
9. The system of claim 7, wherein the incoming call is an incoming call to a strange number.
CN201410319214.5A 2014-07-07 2014-07-07 GPRS connection protection method and system Active CN105245744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410319214.5A CN105245744B (en) 2014-07-07 2014-07-07 GPRS connection protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410319214.5A CN105245744B (en) 2014-07-07 2014-07-07 GPRS connection protection method and system

Publications (2)

Publication Number Publication Date
CN105245744A CN105245744A (en) 2016-01-13
CN105245744B true CN105245744B (en) 2020-01-10

Family

ID=55043235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410319214.5A Active CN105245744B (en) 2014-07-07 2014-07-07 GPRS connection protection method and system

Country Status (1)

Country Link
CN (1) CN105245744B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1791146A (en) * 2004-12-15 2006-06-21 展讯通信(上海)有限公司 Method and apparatus for refusing telephone selectively of mobile station
CN101175274A (en) * 2006-10-31 2008-05-07 联发科技股份有限公司 System and method for processing connection requests in a mobile terminal
CN101621859A (en) * 2008-06-30 2010-01-06 鸿富锦精密工业(深圳)有限公司 Portable electronic device
CN102665176A (en) * 2012-04-23 2012-09-12 厦门网拓科技有限公司 System and method for safely monitoring by mobile terminal
CN102984828A (en) * 2012-12-11 2013-03-20 东莞宇龙通信科技有限公司 Terminal and communication interference suppression method
CN103095944A (en) * 2011-10-31 2013-05-08 郑州康联安防科技有限公司 Alarming information transmission method and alarming system based on general packet radio service (GPRS)

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007057607A1 (en) * 2007-11-28 2009-06-25 T-Mobile Internationale Ag Method for reducing the power consumption in a mobile radio network with at least two supply levels

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1791146A (en) * 2004-12-15 2006-06-21 展讯通信(上海)有限公司 Method and apparatus for refusing telephone selectively of mobile station
CN101175274A (en) * 2006-10-31 2008-05-07 联发科技股份有限公司 System and method for processing connection requests in a mobile terminal
CN101621859A (en) * 2008-06-30 2010-01-06 鸿富锦精密工业(深圳)有限公司 Portable electronic device
CN103095944A (en) * 2011-10-31 2013-05-08 郑州康联安防科技有限公司 Alarming information transmission method and alarming system based on general packet radio service (GPRS)
CN102665176A (en) * 2012-04-23 2012-09-12 厦门网拓科技有限公司 System and method for safely monitoring by mobile terminal
CN102984828A (en) * 2012-12-11 2013-03-20 东莞宇龙通信科技有限公司 Terminal and communication interference suppression method

Also Published As

Publication number Publication date
CN105245744A (en) 2016-01-13

Similar Documents

Publication Publication Date Title
US20130249699A1 (en) Alarm method and apparatus for terminal anti-eavesdropping
US11128154B2 (en) Charging method and related device
CN103401991A (en) Method and device for prompting communication event of terminal device
KR20070086769A (en) Triggering an emergency mode in a radio communication system and methods thereof
CN103685751A (en) Call reminding method and terminal
EP3129851A1 (en) Bi-level bi-class thermal mitigation technique for single/multi-sim devices
US6898446B2 (en) Portable telephone with a battery alarm function indicating lowest level for communication
CN104166591A (en) Method and device for avoiding forced interruption of game
US10037686B1 (en) Systems and methods for preventing false alarms during alarm sensitivity threshold changes in fire alarm systems
CN105245744B (en) GPRS connection protection method and system
AU2018100903A4 (en) A tap timer system, method and apparatus capable of detecting device's burst-off accident and notifying user immediately
CN105025168A (en) Incoming call reminding method and device
WO2016165423A1 (en) Theft prevention method, antitheft device, and computer storage medium
US9686658B2 (en) Method and apparatus for adaptive event notification control
CN104462958B (en) The inter-system switching method and device of a kind of terminal
JP2006271077A (en) Portable electronic equipment
JP4568990B2 (en) Gas shut-off device
CN111262846B (en) Control method of bus controller, bus controller and readable storage medium
CN113037930B (en) Method, device, terminal and readable storage medium for processing abnormality of radio frequency device
JP2005311637A (en) Portable terminal device and submersion-under-water protection circuit used for it
US20150063185A1 (en) Mobile device and method for controlling fast dormancy function of mobile device
EP3723353A1 (en) Information processing method and device, terminal, and storage medium
CN103200303A (en) Safety prompting method and electronic equipment
JP4237994B2 (en) Vehicle abnormality alarm method and system, vehicle abnormality alarm device, and vehicle abnormality alarm receiver
CN105554727B (en) Mobile phone card security verification method, mobile phone card security verification device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant