CN105611532B - Network communication processing method and device - Google Patents
Network communication processing method and device Download PDFInfo
- Publication number
- CN105611532B CN105611532B CN201511004632.6A CN201511004632A CN105611532B CN 105611532 B CN105611532 B CN 105611532B CN 201511004632 A CN201511004632 A CN 201511004632A CN 105611532 B CN105611532 B CN 105611532B
- Authority
- CN
- China
- Prior art keywords
- application program
- mobile
- plug
- mobile communication
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 191
- 238000003672 processing method Methods 0.000 title claims abstract description 26
- 238000010295 mobile communication Methods 0.000 claims abstract description 160
- 238000012545 processing Methods 0.000 claims abstract description 34
- 238000000034 method Methods 0.000 claims abstract description 30
- 230000003993 interaction Effects 0.000 claims abstract description 23
- 230000006870 function Effects 0.000 claims description 43
- 238000012544 monitoring process Methods 0.000 claims description 8
- 238000001514 detection method Methods 0.000 claims description 2
- 238000013461 design Methods 0.000 abstract description 9
- 238000010586 diagram Methods 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure relates to a network communication processing method and device, and belongs to the technical field of data processing. The method comprises the following steps: receiving a safe communication mode starting instruction; and prohibiting the application program with the mobile communication plug-in from performing communication interaction with the network side through the mobile network. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Description
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a network communication processing method and apparatus.
Background
With the popularization of various application programs on communication networks and intelligent terminals, users at all ages can perform information interaction with a network side through the application programs according to self requirements. However, the ease of use of various applications for the elderly population is limited to the font display level.
Disclosure of Invention
In order to overcome the problems in the related art, embodiments of the present disclosure provide a network communication processing method and apparatus. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a network communication processing method, including:
receiving a safe communication mode starting instruction;
and prohibiting the application program with the mobile communication plug-in from performing communication interaction with the network side through the mobile network.
The method as described above, the application program with mobile communication plug-in, comprising:
the method comprises the steps that a user determines an application program with a mobile communication plug-in advance; or,
analyzing the interface information of the application program to determine the application program with the mobile communication plug-in.
As described above, if all applications installed on the terminal device have the mobile communication plug-in, the prohibiting the applications having the mobile communication plug-in from interacting with the network side through the mobile network includes:
and closing the communication functions of all the application programs of the terminal equipment and the mobile network.
If part of the application installed on the terminal device has the mobile communication plug-in, the method for prohibiting the application having the mobile communication plug-in from interacting with the network side through the mobile network includes:
and prohibiting the communication function of a preset application program with a mobile communication plug-in and the mobile network.
The method for prohibiting the communication function of the preset application program with the mobile communication plug-in and the mobile network comprises the following steps:
receiving a mobile network communication request carrying an application identifier through a preset interface;
detecting whether the application program corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in according to a preset mobile network trigger control list;
and if the application program corresponding to the application identifier is detected to belong to a preset application program with a mobile communication plug-in, rejecting the mobile network communication request.
The method as described above, the application program with mobile communication plug-in, comprising one of:
an application having a phone application plug-in;
an application program with a short message application plug-in;
with an application that consumes mobile network traffic plug-ins.
The method as described above, further comprising:
monitoring the starting operation of manually setting the communication function of the application program with the mobile communication plug-in and the mobile network by a user;
and refusing the starting operation and prompting the user to close the safe communication mode.
The method as described above, further comprising:
hiding the opening operation entrance of the application program with the mobile communication plug-in and the mobile network communication function.
According to a second aspect of the embodiments of the present disclosure, there is provided a network communication processing apparatus, the apparatus including:
a receiving module configured to receive a secure communication mode start instruction;
and the control module is configured to prohibit the application program with the mobile communication plug-in from performing communication interaction with the network side through the mobile network.
The apparatus as described above, the application having a mobile communication plug-in, comprising:
the method comprises the steps that a user determines an application program with a mobile communication plug-in advance; or,
analyzing the interface information of the application program to determine the application program with the mobile communication plug-in.
In the apparatus as described above, if all applications installed on the terminal device have the mobile communication plug-in, the control module is configured to:
and closing the communication functions of all the application programs of the terminal equipment and the mobile network.
The apparatus as described above, if part of the application installed on the terminal device has the mobile communication plug-in, the control module is configured to:
and prohibiting the communication function of a preset application program with a mobile communication plug-in and the mobile network.
The apparatus as described above, the control module comprising:
the receiving unit is configured to receive a mobile network communication request carrying an application identifier through a preset interface;
the detection unit is used for detecting whether the application program corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in according to a preset mobile network trigger control list;
and the rejection unit is configured to reject the mobile network communication request if the application program corresponding to the application identifier is detected to belong to a preset application program with a mobile communication plug-in.
The apparatus as described above, the application having a mobile communication plug-in, comprising one of:
an application having a phone application plug-in;
an application program with a short message application plug-in;
with an application that consumes mobile network traffic plug-ins.
The apparatus as described above, further comprising:
the monitoring module is configured to monitor the starting operation of manually setting the communication function of the application program with the mobile communication plug-in and the mobile network by a user;
a prompt module configured to reject the opening operation and prompt the user to close the secure communication mode.
The apparatus as described above, further comprising:
and the hiding module is configured to hide the application program with the mobile communication plug-in and the opening operation entrance of the mobile network communication function.
According to a third aspect of the embodiments of the present disclosure, there is provided a network communication processing apparatus, the apparatus including:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to:
receiving a safe communication mode starting instruction;
and prohibiting the application program with the mobile communication plug-in from performing communication interaction with the network side through the mobile network.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
and when the opening instruction of the safe communication mode is received, prohibiting the application program with the mobile communication plug-in from interacting with the network side through the mobile network. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, are configured to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating a network communication processing method in accordance with an exemplary embodiment;
FIG. 2 is a schematic diagram of an application interface for a secure communication mode;
FIG. 3 is a schematic view of an application interface for another secure communication mode;
FIG. 4 is a flow chart illustrating a network communication processing method in accordance with another exemplary embodiment;
FIG. 5 is a flow chart illustrating a network communication processing method in accordance with another exemplary embodiment;
FIG. 6 is a block diagram illustrating a network communication processing device in accordance with an exemplary embodiment;
fig. 7 is a block diagram illustrating a network communication processing device according to another example embodiment;
fig. 8 is a block diagram illustrating a network communication processing device according to another example embodiment;
fig. 9 is a block diagram illustrating a network communication processing device according to another example embodiment;
fig. 10 is a block diagram illustrating a network communication processing device according to another example embodiment.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a network communication processing method according to an exemplary embodiment, and as shown in fig. 1, the network communication processing method may include the following steps:
in step 101, a secure communication mode enabling instruction is received.
Specifically, mobile communication plug-ins are often installed in applications published by a service provider, so that when a user uses a terminal device, in the process of operating various applications to perform information interaction with a network side, unnecessary loss and security risks are caused due to misoperation of the mobile communication plug-ins in the applications.
It should be emphasized that, when a user uses an application under both wifi network and mobile network, if a mobile communication plug-in the application is clicked, the mobile network is required to be used to complete the corresponding service of the mobile communication plug-in, so that even if the user uses the application under wifi network, if the mobile plug-in the application is clicked due to a misoperation, the mobile network communication cost of the user is consumed, causing unnecessary loss.
The network communication processing method provided by the disclosure provides a secure communication mode, and the secure communication mode is used for providing a protection function for the security of communication interaction between an application with a mobile communication plug-in on a terminal device and a network side. It can be understood that the specific design and interface representation of the secure communication mode are many, and can be set according to application requirements, for example:
as an example, the secure communication mode may be set on an old man mode interface of the terminal device, so that when the user starts the old man mode interface, the user is prompted to start the secure communication mode function.
FIG. 2 is a schematic diagram of an application interface for a secure communication mode. Referring to fig. 2, a setting identifier of a "security lock" is provided below an application interface in the elder mode (font enlargement). Where "XX" is shown in the application interface of FIG. 2 to simplify the textual information representing the application interface display.
As another example, the secure communication mode may be set on a menu interface of the terminal device, so that when the user opens the menu interface, the user is prompted to open the secure communication mode function.
FIG. 3 is a schematic diagram of an application interface of another secure communication mode, and referring to FIG. 3, a setting identifier of a word and a picture of a "security lock" is arranged in a "setting menu" interface.
As another example, the secure communication mode may be displayed on an application interface currently used by the user in a pop-up manner so as to prompt the user to start the secure communication mode function in real time.
As another example, a secure communication mode may be provided in a control interface of the terminal device, and a user may turn on a secure communication mode function in the control interface.
In order to avoid misoperation of the mobile communication plug-in the application program, the user opens the secure communication mode, so that the terminal equipment receives a secure communication mode opening instruction.
In step 102, an application program with a mobile communication plug-in is prohibited from interacting with the network side through the mobile network.
Specifically, in the process of using the application by the user, if the user triggers the mobile communication plug-in, the corresponding service needs to be implemented through the mobile network, which consumes the mobile network communication charges of the user, for example: therefore, if the application program comprises the mobile communication plug-in with the functions, the application program with the mobile communication plug-in belongs to the application program with the mobile communication plug-in related by the invention. For example, one of the following:
an application having a phone application plug-in;
an application program with a short message application plug-in;
with an application that consumes mobile network traffic plug-ins.
It should be noted that there are many ways of knowing the application program having the mobile communication plug-in on the terminal device, and the selection is performed according to a specific application scenario, which is not limited in this embodiment, for example:
as one example, a user actively determines an application having a mobile communication plug-in by using experience, viewing specific information of the application, and the like.
As another example, the interface information of the application is analyzed by means of a web crawler or the like to determine the application having the mobile communication plug-in.
And according to a safe communication mode starting instruction sent by a user, prohibiting the communication interaction between the application program with the mobile communication plug-in on the terminal equipment and the network side through the mobile network. That is, the application having the mobile communication plug-in cannot implement the corresponding function using the mobile network, including, for example, one of:
the mobile network cannot be used for making calls;
the mobile network cannot be used for sending short messages;
the traffic of the mobile network cannot be used for uplink and downlink data communication.
In summary, in the network communication processing method provided in this embodiment, when the secure communication mode opening instruction is received, the application program having the mobile communication plug-in is prohibited from interacting with the network side through the mobile network. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Based on the above embodiment, because the applications installed in different terminal devices are different, in one case, all current applications on the terminal device have mobile communication plugins, and in another case, a part of applications on the terminal device have mobile communication plugins, and a part of applications do not have mobile communication plugins, and for different setting situations, the mobile network communication prohibition manner corresponding to different mobile network is described as follows:
first, if all applications currently installed on the terminal device have a mobile communication plug-in. For the situation, the communication function between the mobile network and the terminal device application program is directly closed. Therefore, all the application programs on the terminal equipment are prohibited from communicating and interacting with the network side through the mobile network. Since all applications in this example have mobile communication plug-ins, that is, all mobile communication plug-ins cannot perform corresponding communication functions through the mobile network.
As a second example, if only a part of all applications currently on the terminal device have a mobile communication plug-in, a part of applications do not have a mobile communication plug-in. And for the situation, the communication function between the preset application program with the mobile communication plug-in and the mobile network is forbidden. That is, for an application requesting to use the mobile network, it is required to determine whether the application belongs to a preset application having a mobile communication plug-in, and if it is determined that the application belongs to the preset application having the mobile communication plug-in, the application is prohibited from interacting with the network side through the mobile network; and if the application program is determined not to belong to the preset application program with the mobile communication plug-in, allowing the application program to perform communication interaction with the network side through the mobile network.
The second example is explained with reference to fig. 4.
Figure 4 is a flow chart illustrating a network communication processing method according to another exemplary embodiment,
as shown in fig. 4, for step 102 shown in fig. 1, several steps may be included as follows:
in step 201, a mobile network communication request carrying an application identifier is received through a preset interface.
An interface for exchanging data information between the mobile network and each application program is set in the terminal equipment in advance.
When the user needs to realize the corresponding function through the mobile network in the process of using the application program, the mobile network communication request carrying the application identifier is sent to the interface.
In step 202, it is detected whether the application program corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in according to a preset mobile network trigger control list.
A mobile network trigger control list is set in the terminal device in advance, and the representation form of the mobile network trigger control list is many, for example: a blacklist of applications having mobile communication plugins may be preset and/or a whitelist of applications not having mobile communication plugins may be preset.
It should be noted that the blacklist and/or the white list is used to identify whether the application belongs to a preset application having a mobile communication plug-in, and specific identification manners are many, and the specific description is as follows, taking the blacklist of the application having the mobile communication plug-in preset in the terminal device as an example:
the first example: the preset blacklist of the application program with the mobile communication plug-in comprises an application identification list corresponding to the application program; the method comprises the following specific steps:
and analyzing the received mobile network communication request to obtain the application identifier. And judging whether the application identifier belongs to an application identifier list in a preset blacklist, and if the application identifier belongs to the application identifier list in the blacklist, acquiring that an application program requesting to use the mobile network has a mobile communication plug-in. If the application identification does not belong to the blacklisted application identification list, the application program requesting to use the mobile network is known not to have a mobile communication plug-in.
The second example is: the blacklist of the set application programs with the mobile communication plug-in comprises an MD5 code list corresponding to the attribute information of the application programs; the method comprises the following specific steps:
analyzing the received mobile network communication request to obtain an application identifier, inquiring prestored attribute information corresponding to the application program, and calculating an MD5 code corresponding to the attribute information. And judging whether the MD5 code belongs to a preset MD5 code list in a blacklist, and if the application identifier belongs to the blacklist MD5 code list, acquiring that the application program requesting to use the mobile network has a mobile communication plug-in. If the application identifies a list of MD5 codes that are not blacklisted, then the application that learns to request use of the mobile network does not have a mobile communications plugin.
In step 203, if it is detected that the application program corresponding to the application identifier belongs to a preset application program having a mobile communication plug-in, the mobile network communication request is rejected.
And if the application program requesting to use the mobile network has the mobile communication plug-in, rejecting the mobile network communication request sent by the application program. Furthermore, the application cannot use the mobile network to perform communication services such as telephone, short message, uplink and downlink data interaction and the like.
In summary, in the network communication processing method provided in this embodiment, a mobile network communication request carrying an application identifier is received through a preset interface, and according to a preset mobile network trigger control list, it is detected whether an application corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in, and if it is known that the application belongs to the preset application program with the mobile communication plug-in, the mobile network communication request is rejected. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Figure 5 is a flow chart illustrating a network communication processing method according to another exemplary embodiment,
as shown in fig. 5, after step 102 shown in fig. 1, the following steps may also be included:
step 301, monitoring the starting operation of manually setting the application program with the mobile communication plug-in and the mobile network communication function by a user;
When the secure communication mode is turned on, the manual setting for the application program that prohibits communication is kept in the listening state.
If the starting operation that the user manually sets the communication function between the application program with the mobile communication plug-in and the mobile network is monitored, for example: and if the data flow is started, the communication authority is started and other operations are carried out, the starting operation is refused, a prompt is popped up, and a user is informed of the current starting state of the safe communication mode, and if relevant operations are carried out, the safe communication mode is required to be closed firstly.
Further, the method can also comprise the following steps:
step 303, receiving a secure communication mode closing instruction.
And step 304, allowing the application program with the mobile communication plug-in to perform communication interaction with the network side through the mobile network.
When the user needs to use the cellular mobile communication service of the above-mentioned forbidden application program, the secure communication mode is closed.
And allowing a preset application program with a mobile communication plug-in to perform communication interaction with the network side through the mobile network according to the safe communication mode closing instruction.
In summary, in the network communication processing method provided in this embodiment, the user manually sets the start operation of the application having the mobile communication plug-in and the mobile network communication function by monitoring; refusing the opening operation, prompting the user to close the safe communication mode, and allowing a preset application program with a mobile communication plug-in to communicate and interact with the network side through a mobile network according to a safe communication mode closing instruction. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Based on the above embodiment, in order to further improve the security and avoid the user from manually setting the network permission to start the disabled program, the method may further include the following steps:
as an example of the manner in which the device may be used,
the method comprises the following steps of forbidding the mobile network starting operation of a preset application program with a mobile communication plug-in, wherein the forbidding modes are many, such as: and (4) carrying out ash setting processing on related setting items, setting the related setting items only by having corresponding authority, setting the related setting items only by having corresponding passwords, and the like.
As another example of the above-mentioned method,
and hiding the opening operation entrance of the application program with the mobile communication plug-in and the mobile network communication function, so that a user cannot operate on an interface, and manual opening is avoided.
Described below are disclosed apparatus embodiments that may be configured to perform disclosed method embodiments. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 6 is a block diagram illustrating a network communication processing device, which may be implemented by software, hardware, or a combination of both, according to an example embodiment, and may include:
a receiving module 11 configured to receive a secure communication mode start instruction;
and the control module 12 is configured to prohibit the application program with the mobile communication plug-in from performing communication interaction with the network side through the mobile network.
Among them, many applications with mobile communication plug-ins include, for example, one of the following:
an application having a phone application plug-in;
an application program with a short message application plug-in;
with an application that consumes mobile network traffic plug-ins.
It should be noted that the application program with the mobile communication plug-in includes:
the user actively determines the application having the mobile communication plug-in by using experience, viewing specific information of the application, and the like. Or,
and analyzing the interface information of the application program in a network crawler and other modes, and determining the application program with the mobile communication plug-in.
It should be noted that the foregoing explanation of the embodiment of the network communication processing method is also applicable to the network communication processing apparatus of the embodiment, and the implementation principle thereof is similar and will not be described herein again.
In summary, the network communication processing apparatus provided in this embodiment prohibits the application having the mobile communication plug-in from interacting with the network side through the mobile network when receiving the secure communication mode enabling instruction. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Based on the above embodiment, because the applications installed in different terminal devices are different, in one case, all current applications on the terminal device have mobile communication plugins, and in another case, among all current applications on the terminal device, a part of the applications have mobile communication plugins, and a part of the applications do not have mobile communication plugins, and for different setting situations, the mobile network communication prohibition manner corresponding to different mobile network is described as follows:
first, if all applications currently installed on the terminal device have a mobile communication plug-in. For the situation, the communication function between the mobile network and the terminal device application program is directly closed. Therefore, all the application programs on the terminal equipment are prohibited from communicating and interacting with the network side through the mobile network. Since all applications in this example have mobile communication plug-ins, that is, all mobile communication plug-ins cannot perform corresponding communication functions through the mobile network.
As a second example, if some of all applications currently on the terminal device have a mobile communication plug-in, some of the applications do not have a mobile communication plug-in. And for the situation, the communication function between the preset application program with the mobile communication plug-in and the mobile network is forbidden. That is, for an application requesting to use the mobile network, it is required to determine whether the application belongs to a preset application having a mobile communication plug-in, and if it is determined that the application belongs to the preset application having the mobile communication plug-in, the application is prohibited from interacting with the network side through the mobile network; and if the application program is determined not to belong to the preset application program with the mobile communication plug-in, allowing the application program to perform communication interaction with the network side through the mobile network.
The second example is explained with reference to fig. 7.
Fig. 7 is a block diagram illustrating a network communication processing apparatus according to another exemplary embodiment, which may be implemented by software, hardware, or a combination of both, as shown in fig. 7, and based on fig. 6, the control module 12 includes:
a receiving unit 121, configured to receive a mobile network communication request carrying an application identifier through a preset interface;
a detecting unit 122, configured to detect whether the application program corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in according to a preset mobile network trigger control list;
a rejecting unit 123 configured to reject the mobile network communication request if it is detected that the application program corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in.
It should be noted that the foregoing explanation of the embodiment of the network communication processing method is also applicable to the network communication processing apparatus of the embodiment, and the implementation principle thereof is similar and will not be described herein again.
In summary, the network communication processing apparatus provided in this embodiment receives a mobile network communication request carrying an application identifier through a preset interface, detects whether an application corresponding to the application identifier belongs to a preset application program with a mobile communication plug-in according to a preset mobile network trigger control list, and rejects the mobile network communication request if it is known that the application belongs to the preset application program with the mobile communication plug-in. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Fig. 8 is a block diagram of a network communication processing device according to another exemplary embodiment, which may be implemented by software, hardware or a combination of the two, and referring to fig. 8, based on the above embodiment, taking fig. 8 as an example, the device further includes:
a monitoring module 13 configured to monitor a user's manual setting of a starting operation of the application having the mobile communication plug-in and the mobile network communication function;
a prompting module 14 configured to reject the opening operation and prompt the user to turn off the secure communication mode.
The receiving module 11 is configured to receive a secure communication mode closing instruction;
and the control module 12 is configured to allow an application program with a mobile communication plug-in to perform communication interaction with the network side through a mobile network.
It should be noted that the foregoing explanation of the embodiment of the network communication processing method is also applicable to the network communication processing apparatus of the embodiment, and the implementation principle thereof is similar and will not be described herein again.
In summary, the network communication processing apparatus provided in this embodiment monitors the user to manually set the application having the mobile communication plug-in and the start operation of the mobile network communication function; refusing the opening operation, prompting the user to close the safe communication mode, and allowing a preset application program with a mobile communication plug-in to communicate and interact with the network side through a mobile network according to a safe communication mode closing instruction. The security design of the network service is realized, and the loss of a user caused by misoperation of a mobile communication plug-in an application program is avoided.
Fig. 9 is a block diagram of a network communication processing device according to another exemplary embodiment, which may be implemented by software, hardware or a combination of the two, referring to fig. 9, and based on the above embodiment, taking fig. 8 as an example, the device further includes:
a disabling module 15 configured to disable a mobile network opening operation of the application.
Further, the apparatus further comprises:
a hiding module 16 configured to hide the open operation entrance of the application program with the mobile communication plug-in and the mobile network communication function.
It should be noted that the foregoing explanation of the embodiment of the network communication processing method is also applicable to the network communication processing apparatus of the embodiment, and the implementation principle thereof is similar and will not be described herein again.
In summary, the network communication processing apparatus provided in this embodiment further improves security, prevents the user from opening the network permission of the disabled program by manual setting,
fig. 10 is a block diagram illustrating a network communication processing device 1300 according to an example embodiment. For example, apparatus 1300 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and so forth.
Referring to fig. 10, apparatus 1300 may include one or more of the following components: a processing component 1302, a memory 1304, a power component 1306, a multimedia component 1308, an audio component 1310, an input/output (I/O) interface 1312, a sensor component 1314, and a communication component 1316.
The processing component 1302 generally controls overall operation of the device 1300, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 1302 may include one or more processors 1320 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1302 can include one or more modules that facilitate interaction between the processing component 1302 and other components. For example, the processing component 1302 may include a multimedia module to facilitate interaction between the multimedia component 1308 and the processing component 1302.
The memory 1304 is configured to store various types of data to support operations at the apparatus 1300. Examples of such data include instructions for any application or method configured to operate on the apparatus 1300, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1304 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The multimedia component 1308 includes a touch-sensitive display screen that provides an output interface between the device 1300 and a user. In some embodiments, the touch display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1308 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the apparatus 1300 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1310 is configured to output and/or input audio signals. For example, the audio component 1310 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 1300 is in an operating mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 1304 or transmitted via the communication component 1316. In some embodiments, audio component 1310 also includes a speaker configured to output audio signals.
The I/O interface 1312 provides an interface between the processing component 1302 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 1314 includes one or more sensors configured to provide various aspects of state assessment for the apparatus 1300. For example, the sensor assembly 1314 may detect the open/closed state of the device 1300, the relative positioning of components, such as a display and keypad of the device 1300, the sensor assembly 1314 may also detect a change in the position of the device 1300 or a component of the device 1300, the presence or absence of user contact with the device 1300, orientation or acceleration/deceleration of the device 1300, and a change in the temperature of the device 1300. The sensor assembly 1314 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1314 may also include a light sensor, such as a CMOS or CCD image sensor, configured for use in imaging applications. In some embodiments, the sensor assembly 1314 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1316 is configured to facilitate communications between the apparatus 1300 and other devices in a wired or wireless manner. The apparatus 1300 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1316 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1316 also includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 1300 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components configured to perform the network communication processing methods described above.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 1304 comprising instructions, executable by the processor 1320 of the apparatus 1300 to perform the method described above is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of a mobile terminal, enable the mobile terminal to perform a network communication processing method, the method comprising:
receiving a safe communication mode starting instruction;
and prohibiting the application program with the mobile communication plug-in from performing communication interaction with the network side through the mobile network.
It should be noted that the foregoing explanation of the embodiment of the network communication processing method is also applicable to the network communication processing apparatus of the embodiment, and the implementation principle thereof is similar and will not be described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (14)
1. A network communication processing method, comprising:
receiving a secure communication mode starting instruction, wherein the secure communication mode is used for providing a protection function for the security of communication interaction between an application program with a mobile communication plug-in on a terminal device and a network side, the application program with the mobile communication plug-in comprises the application program with the mobile communication plug-in determined by analyzing interface information of the application program through a web crawler or the application program with the mobile communication plug-in predetermined by a user, and the mobile communication plug-in is a mobile communication plug-in using a mobile network;
the application program with the mobile communication plug-in is prohibited from communicating and interacting with the network side through a mobile network;
monitoring the starting operation of manually setting the communication function of the application program with the mobile communication plug-in and the mobile network by a user;
and refusing the starting operation and prompting the user to close the safe communication mode.
2. The method of claim 1, wherein if all applications installed on the terminal device have the mobile communication plug-in, the prohibiting the applications having the mobile communication plug-in from performing communication interaction with a network side through a mobile network comprises:
and closing the communication functions of all the application programs of the terminal equipment and the mobile network.
3. The method of claim 1, wherein if part of the applications installed on the terminal device have the mobile communication plug-in, the prohibiting the applications having the mobile communication plug-in from performing communication interaction with the network side through the mobile network comprises:
and prohibiting the communication function of a preset application program with a mobile communication plug-in and the mobile network.
4. The method of claim 3, wherein the prohibiting the communication function of the preset application program with the mobile communication plug-in and the mobile network comprises:
receiving a mobile network communication request carrying an application identifier through a preset interface;
detecting whether the application program corresponding to the application identifier belongs to the preset application program with the mobile communication plug-in according to a preset mobile network trigger control list;
and if the application program corresponding to the application identifier belongs to the preset application program with the mobile communication plug-in unit, rejecting the mobile network communication request.
5. The method of any of claims 1-4, wherein the application having a mobile communications plug-in comprises one of:
an application having a phone application plug-in;
an application program with a short message application plug-in;
with an application that consumes mobile network traffic plug-ins.
6. The method of any of claims 1-4, further comprising:
hiding the opening operation entrance of the application program with the mobile communication plug-in and the mobile network communication function.
7. A network communication processing apparatus, the apparatus comprising:
the terminal equipment comprises a receiving module and a starting module, wherein the receiving module is configured to receive a safe communication mode starting instruction, the safe communication mode is used for providing a protection function for the safety of communication interaction between an application program with a mobile communication plug-in and a network side on the terminal equipment, the application program with the mobile communication plug-in comprises the application program with the mobile communication plug-in determined by analyzing interface information of the application program through a network crawler or the application program with the mobile communication plug-in predetermined by a user, and the mobile communication plug-in is a mobile communication plug-in using a mobile network;
a control module configured to prohibit the application program with the mobile communication plug-in from interacting with the network side through the mobile network
The monitoring module is configured to monitor the starting operation of manually setting the communication function of the application program with the mobile communication plug-in and the mobile network by a user;
a prompt module configured to reject the opening operation and prompt the user to close the secure communication mode.
8. The apparatus of claim 7, wherein if all applications installed on the terminal device have the mobile communication plug-in, the control module is configured to:
and closing the communication functions of all the application programs of the terminal equipment and the mobile network.
9. The apparatus of claim 7, wherein if part of the application installed on the terminal device has the mobile communication plug-in, the control module is configured to:
and prohibiting the communication function of a preset application program with a mobile communication plug-in and the mobile network.
10. The apparatus of claim 9, wherein the control module comprises:
the receiving unit is configured to receive a mobile network communication request carrying an application identifier through a preset interface;
the detection unit is used for detecting whether the application program corresponding to the application identifier belongs to the preset application program with the mobile communication plug-in according to a preset mobile network trigger control list;
and the rejection unit is configured to reject the mobile network communication request if the application program corresponding to the application identifier is detected to belong to the preset application program with the mobile communication plug-in.
11. The apparatus according to any of claims 7-10, wherein the application having the mobile communication plug-in comprises one of:
an application having a phone application plug-in;
an application program with a short message application plug-in;
with an application that consumes mobile network traffic plug-ins.
12. The apparatus of any of claims 7-10, further comprising:
and the hiding module is configured to hide the application program with the mobile communication plug-in and the opening operation entrance of the mobile network communication function.
13. A network communication processing apparatus, the apparatus comprising:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to:
receiving a secure communication mode starting instruction, wherein the secure communication mode is used for providing a protection function for the security of communication interaction between an application program with a mobile communication plug-in on a terminal device and a network side, the application program with the mobile communication plug-in comprises the application program with the mobile communication plug-in determined by analyzing interface information of the application program through a web crawler or the application program with the mobile communication plug-in predetermined by a user, and the mobile communication plug-in is a mobile communication plug-in using a mobile network;
the application program with the mobile communication plug-in is prohibited from communicating and interacting with the network side through a mobile network;
monitoring the starting operation of manually setting the communication function of the application program with the mobile communication plug-in and the mobile network by a user;
and refusing the starting operation and prompting the user to close the safe communication mode.
14. A computer storage medium characterized in that the storage medium comprises instructions that are executed by a processor to implement the network communication processing method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511004632.6A CN105611532B (en) | 2015-12-29 | 2015-12-29 | Network communication processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511004632.6A CN105611532B (en) | 2015-12-29 | 2015-12-29 | Network communication processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105611532A CN105611532A (en) | 2016-05-25 |
CN105611532B true CN105611532B (en) | 2020-02-28 |
Family
ID=55991003
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511004632.6A Active CN105611532B (en) | 2015-12-29 | 2015-12-29 | Network communication processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105611532B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102573107A (en) * | 2010-11-22 | 2012-07-11 | 三星电子株式会社 | Apparatus and method for connecting an access point in portable terminal |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN104869595A (en) * | 2015-05-04 | 2015-08-26 | 小米科技有限责任公司 | Method and device for controlling data traffic |
CN104869569A (en) * | 2015-03-31 | 2015-08-26 | 小米科技有限责任公司 | Network permission control method and apparatus of application program |
-
2015
- 2015-12-29 CN CN201511004632.6A patent/CN105611532B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102573107A (en) * | 2010-11-22 | 2012-07-11 | 三星电子株式会社 | Apparatus and method for connecting an access point in portable terminal |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN104869569A (en) * | 2015-03-31 | 2015-08-26 | 小米科技有限责任公司 | Network permission control method and apparatus of application program |
CN104869595A (en) * | 2015-05-04 | 2015-08-26 | 小米科技有限责任公司 | Method and device for controlling data traffic |
Also Published As
Publication number | Publication date |
---|---|
CN105611532A (en) | 2016-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453052B (en) | Message interaction method and device | |
CN106210238B (en) | Short message storage method and device | |
US20170034776A1 (en) | Method, apparatus, and system for smart device to access router | |
CN109451880B (en) | Network connection method and device | |
KR101793621B1 (en) | Method, apparatus, program and recording medium for accessing base station | |
CN106537344A (en) | A method and apparatus for managing application calls | |
CN110049062B (en) | Verification code verification method, device, system, server, electronic equipment and storage medium | |
CN105163290B (en) | roaming prompting method and device | |
CN105809440B (en) | Online payment method and device | |
CN105487857A (en) | Method and apparatus for prompting image shooting part to be started | |
CN105511922A (en) | Application startup controlling method and device | |
CN106471513B (en) | Authority control method and device | |
CN106412227A (en) | Anti-lost alarm method and device and device for anti-lost alarm | |
CN109451840B (en) | Cell residence method and device and user equipment | |
CN106201628A (en) | Application program installation method and device | |
CN105991626A (en) | Network access method and network access device | |
CN106791145A (en) | Short message management method and device | |
CN106462696A (en) | Authority controlling method and device | |
CN110731090A (en) | System message processing method and device | |
CN106980454B (en) | Unlocking method and device | |
CN107103231B (en) | Method and device for installing and managing application | |
CN105611532B (en) | Network communication processing method and device | |
CN107704295B (en) | Method, device and storage medium for setting self-starting authority | |
CN108418878B (en) | Notification message pushing method and device, readable storage medium and electronic equipment | |
CN106462680A (en) | Method and device for abnormal information prompting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |