CN107370866A - A kind of method and apparatus for sending message - Google Patents
A kind of method and apparatus for sending message Download PDFInfo
- Publication number
- CN107370866A CN107370866A CN201710556942.1A CN201710556942A CN107370866A CN 107370866 A CN107370866 A CN 107370866A CN 201710556942 A CN201710556942 A CN 201710556942A CN 107370866 A CN107370866 A CN 107370866A
- Authority
- CN
- China
- Prior art keywords
- user
- message
- active user
- sent
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of method and apparatus for sending message, methods described includes:When detecting that message sends request, the biological information of active user is obtained;Judge whether the active user is authorized user according to the biological information;When the active user is authorized user, message content is sent to target terminal.The program sends identification authentication of the request triggering to active user by message, and authenticating result and message content are sent together when authentication passes through, it is easy to recipient to differentiate the message content received according to actual conditions, when avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, the security of the outer social information of terminal-pair is substantially increased, can effectively reduce the generation of information fraud.
Description
Technical field
The present invention relates to communication technical field, and in particular to a kind of method and apparatus for sending message.
Background technology
With the development of the communication technology, informationization has become a big characteristic of people's daily life, in daily exchange,
User can be sent short message by terminal (such as mobile phone, computer etc.), send internet social networking application message, be entered with destination object
Row mutually exchange, the convenience of information exchange add abundant color to daily life.
But the variation of information interaction approach, a series of social concern is also brought, especially prominent one is exactly
Information security issue, if the terminal of user be not I when in use, it sends a message to targeted customer, mesh by terminal
Mark user None- identified whether be terminal the information that sends of owner, can not also judge the authenticity of message content, i.e. message
Identifiability is relatively low.For example some criminals steal user mobile phone, electricity is then carried out to the good friend of user by user mobile phone
Believe fraudulent act etc., these problems not only cause serious infringement to the personal safety of people, moreover, also bringing bad
Social influence.
Therefore, the security of the message of terminal transmission how is improved, turns into a technical problem urgently to be resolved hurrily.
The content of the invention
In view of this, the embodiments of the invention provide a kind of method and apparatus for sending message, to solve in the prior art
Because terminal send message identifiability it is relatively low caused by information security issue.
First aspect present invention provides a kind of method for sending message, applied to terminal, such as mobile phone, tablet personal computer
Deng methods described includes:When detecting that message sends request, the biological information of active user is obtained;According to the life
Thing characteristic information judges whether the active user is authorized user;When the active user is authorized user, by message
Hold and send to target terminal.
The method described by implementing first aspect, detect whether that message sends request in real time, disappeared if detected
Breath send request, then extract active user biological information, herein biological information including but not limited to:Fingerprint is believed
Breath, iris information and face information, biological information have uniqueness, authentication information can be used as to carry out user's mirror
Power, i.e., judge whether active user is authorized user according to the biological information of the active user got, authorized user can
To store the biological information of correlation in the terminal in advance, by by the biological information currently obtained and the mandate that prestores
The biological information of user is contrasted, you can determines whether active user is authorized user, only active user is mandate
During user, it is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, such as
This, identification authentication of the request triggering to active user is sent by message, and sends message content when authentication passes through,
When avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases outside terminal-pair
The security of social information, it can effectively reduce the generation of information fraud.
With reference to first aspect present invention, in first aspect present invention first embodiment, when the active user is to authorize
During user, in addition to:Authorization result is sent to the target terminal.
, can also be by Authorization result and message when it is determined that active user is the user authorized by performing above-mentioned steps
Content is sent to target terminal together, and Authorization result may indicate that whether the essential information of the user (for example name, is terminal
Owner etc.), in this way, the message receiver can of target terminal understands that current message content is sent by whom, it is easy to receive
Root differentiates the message content received according to actual conditions.
With reference to first aspect present invention, in first aspect present invention second embodiment, in addition to:As the active user
When not being authorized user, unauthorized result and the message content are sent to the target terminal.
By performing above-mentioned steps, if active user determines not by identification authentication according to its biological information
It is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages that disabled user is carried out are sent, then can be incited somebody to action
Active user's unauthorized result is sent to target terminal together with message content, in this way, message receiver is seeing unauthorized
When as a result, the true and false of message content can be not only identified, and can determine that sending terminal is currently in non-secure states, can be with
The actual owner for notifying to send terminal by other contact methods is handled, and further increases Information Security.
With reference to first aspect present invention, in the embodiment of first aspect present invention the 3rd, in addition to:As the active user
When not being authorized user, refusal sends the message content.
By performing above-mentioned steps, if active user determines not by identification authentication according to its biological information
It is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages that disabled user is carried out are sent, then can be with
Refusal sends the message content that active user edits, in this way, target terminal does not just receive this malicious messages, avoids recipient
Because this malicious messages are had dust thrown into the eyes, and then can reduce the generation of information fraud.
With reference to first aspect present invention first embodiment or second embodiment, the embodiment party of first aspect present invention the 4th
In formula, the Authorization result and the unauthorized result are sent in the form of call tag to the target terminal.
By performing above-mentioned steps, the transmission form of Authorization result and unauthorized result can be various, such as can be with
It is call tag, specifically, if active user can add disabled user after message content and carry not by identification authentication
Indicating label, equally, if active user has passed through identification authentication, validated user prompting mark can be added after message content
Label, and the essential information of authorized user can be shown, to prompt recipient whether the message content is safe, in this way, recipient uses
Family can intuitively see editor's information of the message content behind message content, improve the hommization of information alert.
In addition, second aspect of the present invention provides a kind of device for sending message, for terminal, such as mobile phone, tablet personal computer
Deng method of the device for sending message including being used to perform any one transmission message of above-mentioned first aspect or first aspect
Module or unit.
For example, described device includes:Acquisition module, for when detecting that message sends request, obtaining active user's
Biological information;Judge module, for judging whether the active user is authorized user according to the biological information;
First sending module, for when the active user is authorized user, message content to be sent to target terminal.
By implementing the device of above-mentioned transmission message, detect whether that message sends request in real time, disappeared if detected
Breath send request, then extract active user biological information, herein biological information including but not limited to:Fingerprint is believed
Breath, iris information and face information, biological information have uniqueness, authentication information can be used as to carry out user's mirror
Power, i.e., judge whether active user is authorized user according to the biological information of the active user got, authorized user can
To store the biological information of correlation in the terminal in advance, by by the biological information currently obtained and the mandate that prestores
The biological information of user is contrasted, you can determines whether active user is authorized user, only active user is mandate
During user, it is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, such as
This, identification authentication of the request triggering to active user is sent by message, and sends message content when authentication passes through,
When avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases outside terminal-pair
The security of social information, it can effectively reduce the generation of information fraud.
With reference to second aspect of the present invention, in second aspect of the present invention first embodiment, in addition to:Second sending module,
For when the active user is authorized user, Authorization result to be sent to the target terminal.
By implementing the device of above-mentioned transmission message, when it is determined that active user is the user authorized, will can also authorize
As a result sent together with message content to target terminal, Authorization result may indicate that the essential information of the user (for example name, is
No is owner of terminal etc.), in this way, the message receiver can of target terminal understands that current message content is sent by whom
, it is easy to recipient to differentiate the message content received according to actual conditions.
With reference to second aspect of the present invention, in second aspect of the present invention second embodiment, in addition to:3rd sending module,
For when the active user is not authorized user, unauthorized result and the message content being sent whole to the target
End.
It is if active user is not by identification authentication, i.e., special according to its biology by implementing the device of above-mentioned transmission message
Reference breath determines that it is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages hair that disabled user is carried out
Send, then active user's unauthorized result can be sent to target terminal together with message content, in this way, message receiver exists
When seeing unauthorized result, the true and false of message content can be not only identified, and can determine that sending terminal is currently in non-peace
Total state, it can be handled by the actual owner that other contact methods notify to send terminal, further increase information peace
Quan Xing.
With reference to second aspect of the present invention, in the embodiment of second aspect of the present invention the 3rd, in addition to:Refuse module, be used for
When the active user is not authorized user, refusal sends the message content.
It is if active user is not by identification authentication, i.e., special according to its biology by implementing the device of above-mentioned transmission message
Reference breath determines that it is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages hair that disabled user is carried out
Send, then can also refuse to send the message content that active user edits, disappear in this way, target terminal does not just receive this malice
Breath, recipient is avoided because this malicious messages are had dust thrown into the eyes, and then can reduce the generation of information fraud.
With reference to second aspect of the present invention first embodiment or second embodiment, the embodiment party of second aspect of the present invention the 4th
In formula, the Authorization result and the unauthorized result are sent in the form of call tag to the target terminal.
By implementing the device of above-mentioned transmission message, the transmission form of Authorization result and unauthorized result can be various
, for example can be call tag, specifically, if active user not by identification authentication, can be attached after message content
Add disabled user's call tag, equally, if active user has passed through identification authentication, it is legal to be added after message content
User's call tag, and the essential information of authorized user can be shown, to prompt recipient whether the message content is safe, such as
This, recipient user can intuitively see editor's information of the message content behind message content, improve information alert
Hommization.
Module or unit included by the device for sending message are not limited to above-mentioned naming method.
These aspects of the application can more straightforward in the following description.
Third aspect present invention provides a kind of terminal, including:Any implementation of second aspect of the present invention or second aspect
The device of transmission message described in mode, therefore described in any embodiment with second aspect of the present invention or second aspect
All beneficial effects of the device of message are sent, will not be repeated here.
Fourth aspect present invention provides a kind of computer-readable recording medium, the computer-readable recording medium storage
Computer instruction, the computer instruction are used for any reality for making the computer perform first aspect present invention or first aspect
The method for applying the transmission message described in mode.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood by reference to accompanying drawing, accompanying drawing is schematically without that should manage
Solve to carry out any restrictions to the present invention, in the accompanying drawings:
Fig. 1 shows the structure chart of mobile phone in the embodiment of the present invention;
Fig. 2 shows the flow chart of the method for transmission message according to embodiments of the present invention;
Fig. 3 shows the display interface schematic diagram of the message content according to embodiments of the present invention in wechat application;
Fig. 4 shows the display interface schematic diagram of the message content according to embodiments of the present invention in short message application;
Fig. 5 shows another flow chart of the method for transmission message according to embodiments of the present invention;
Fig. 6 shows the structural representation of the device of transmission message according to embodiments of the present invention;
Fig. 7 shows another structural representation of the device of transmission message according to embodiments of the present invention;
Fig. 8 shows the structural representation of terminal according to embodiments of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having
There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, it is the application scenarios schematic diagram of embodiments of the invention.Mobile terminal is mobile phone or tablet personal computer etc.
Mobile device, mobile terminal by taking mobile phone as an example, the part-structure block diagram of mobile phone as shown in figure 1, mobile phone include radio circuit 110,
Memory 120, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, wireless module 170, processor 180
And the grade of power supply 190 part.It will be understood by those skilled in the art that the handset structure shown in Fig. 1 is not formed to mobile phone
Limit, can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Wherein RF circuits 110 be used for receive and send messages or communication process in, the reception and transmission of signal.Memory 120 is used for
Software program and module are stored, processor 180 is stored in the software program and module of memory 120 by operation, so as to
Perform various function application and the data processing of mobile phone.Input block 130 is used for the numeral or character information for receiving input, with
And produce the key signals relevant with the user of mobile phone setting and function control and input.Input block 130 may include contact panel
131 and other input equipments 132.Other input equipments 132 can include but is not limited to physical keyboard, function key, mouse, behaviour
Make the one or more in bar.Display unit 140 be used for show by user input information or be supplied to user information and
The various menus of mobile phone.Display unit 140 can include display panel 141.Contact panel 131 can cover display panel 141, when
After contact panel 131 detects the touch operation on or near it, processor 180 is sent to determine the class of touch event
Type, it is followed by subsequent processing device 180 and corresponding visual output is provided on display panel 141 according to the type of touch event.
Mobile phone may also include at least one sensor 150, such as optical sensor, motion sensor and other sensors.Light
Sensor may include ambient light sensor and proximity transducer, and environmental sensor can adjust display according to the light and shade of ambient light
The brightness of panel 141, proximity transducer can close display panel 141 and/or backlight when mobile phone is moved in one's ear.This implementation
In example on the housing for the front and back that optical sensor can be arranged on mobile phone, for detecting blocked area when user holds mobile phone
Domain.Pressure sensor can also be included herein, be arranged on the front or back housing of mobile phone, for the side by detecting pressure
Formula obtains occlusion area when user holds mobile phone.In addition, mobile phone can also configure gyroscope, barometer, hygrometer, temperature
The other sensors such as meter, infrared ray sensor, are repeated no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and mobile phone.Wireless mould
Block 170 can be WIFI module, provide the user wireless the Internet access service.
Processor 180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform the software program and/or module being stored in memory 120, and call and be stored in memory 120
Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 180 can be with
Including one or more processing units.In addition, mobile phone also include each part power supply power supply 190, by power-supply management system with
Processor 180 is logically contiguous, so as to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
Referring to Fig. 2, a kind of method for sending message provided in an embodiment of the present invention, applied to terminal, such as it is mobile phone, flat
Plate computer etc., method includes:
S21:When detecting that message sends request, the biological information of active user is obtained.Detect whether in real time
There is message to send request, if having detected that message sends request, the biological information of active user is extracted, for editor
The situation that message is not sent, and without identification authentication, can so save the energy consumption of terminal;Biological information bag herein
Contain but be not limited to:Finger print information, iris information and face information, biological information have uniqueness, can recognize as identity
Demonstrate,prove information and carry out subscription authentication, and when active user triggers message and sent, biological information is easily obtained, such as terminal
Camera and Fingerprint Identification Unit can get the biological information of active user in real time.
S22:Judge whether active user is authorized user according to biological information.Authorized user can be in advance in terminal
The related biological information of middle storage, by the way that the biology of the biological information currently obtained and the authorized user to prestore is special
Reference breath is contrasted, you can is determined whether active user is authorized user, if active user is authorized user, is entered step
Rapid S23, otherwise into step S24.
S23:When active user is authorized user, message content is sent to target terminal.Only active user is to award
When weighing user, it is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal,
In this way, sending identification authentication of the request triggering to active user by message, and message content is sent out when authentication passes through
Go, when avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases terminal-pair
The security of outer social information, it can effectively reduce the generation of information fraud.
Alternatively, step S23 can also include:When active user is authorized user, Authorization result is sent to target
Terminal.Specifically, it is determined that active user be authorize user when, Authorization result and message content can also be sent together to
Target terminal, Authorization result may indicate that the essential information (such as name, whether be owner of terminal etc.) of the user, in this way,
The message receiver can of target terminal understands that current message content is sent by whom, is easy to recipient according to actual conditions
Differentiate the message content received.
In addition to step S24 alternatively, in some embodiments of the invention,:When active user is not authorized user,
Unauthorized result and message content are sent to target terminal.If active user is not by identification authentication, i.e., according to its biology
Characteristic information determines that it is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages that disabled user is carried out
Send, then active user's unauthorized result can be sent to target terminal together with message content, in this way, message receiver
When seeing unauthorized result, the true and false of message content can be not only identified, and it is non-to determine that transmission terminal is currently in
Safe condition, it can be handled by the actual owner that other contact methods notify to send terminal, further increase information
Security.
Alternatively, step S23 Authorization result and step S24 unauthorized results are sent in the form of call tag to target
Terminal.The transmission form of Authorization result and unauthorized result can be various, for example can be call tag, specifically, such as
Shown in Fig. 3 and Fig. 4, if active user has passed through identification authentication, validated user prompting mark can be added after message content
(such as message content " reaches Lijing to label finally!It is dead tired " have call tag " in person " below), and authorized user can be shown
Essential information, with prompt the recipient message content whether safety, equally, if active user not by identification authentication,
Disabled user's call tag can be added after message content, and (message content " lose, and makes a call to 1000 yuan to me soon by my wallet”
Have call tag " non-good friend " below), in this way, recipient user can intuitively see the message behind message content
Editor's information of content, improve the hommization of information alert.
Alternatively, in some embodiments of the invention, the signaling process with reference to shown in Fig. 5 illustrates:
S51:Detailed content reference signaling process step S21;
S52:Detailed content reference signaling process step S22, if active user is authorized user, into step S53,
Otherwise step S54 is entered.;
S53:Detailed content reference signaling process step S23;
S54:If active user is not authorized user, refusal sends message content.I.e. if active user does not pass through body
Part authentication, i.e., determine that it is not authorized user according to its biological information, illustrate that the terminal is possible to stolen, or illegally
The malicious messages that user is carried out are sent, then can also refuse to send the message content that active user edits, in this way, target terminal is just
This malicious messages are not received, avoid recipient because this malicious messages are had dust thrown into the eyes, substantially increase the outer society of terminal-pair
The security of information is handed over, and then the generation of information fraud can be reduced.
The method of the transmission message provided in the present embodiment, by having detected whether that message sends request in real time, if inspection
Measured message send request, then extract active user biological information, herein biological information including but not limited to:
Finger print information, iris information and face information, biological information have uniqueness, can be used as authentication information
Family authenticates, i.e., judges whether active user is authorized user according to the biological information of the active user got, authorizes and uses
Family can store the biological information of correlation in the terminal in advance, by by the biological information currently obtained and prestoring
The biological information of authorized user is contrasted, you can determines whether active user is authorized user, only active user is
During authorized user, it is secured user to illustrate active user, and the message content that can just edit active user sends whole to target
End, in this way, sending identification authentication of the request triggering to active user by message, and by authenticating result and disappear when authentication passes through
Breath content is sent together, is easy to recipient to differentiate the message content received according to actual conditions, is avoided user mobile phone
When being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases the safety of the outer social information of terminal-pair
Property, it can effectively reduce the generation of information fraud.
It is a kind of structural representation of device for sending message provided in an embodiment of the present invention referring to Fig. 6, for terminal,
Such as mobile phone, tablet personal computer etc., it includes:
Acquisition module 61, for when detecting that message sends request, obtaining the biological information of active user;In detail
Content is referring to the step S21 in above-described embodiment.
Judge module 62, for judging whether active user is authorized user according to biological information;Detailed content is joined
The step S22 seen in above-described embodiment.
First sending module 63, for when active user is authorized user, message content to be sent to target terminal.In detail
Thin content is referring to the step S23 in above-described embodiment.
Alternatively, in some embodiments of the invention, as shown in fig. 7, also including:Second sending module 64, for when current
When user is authorized user, Authorization result is sent to target terminal.Detailed content is detailed referring to the correlation in above-described embodiment
Description.
Alternatively, in some embodiments of the invention, as shown in fig. 7, also including:3rd sending module 65, for when current
When user is not authorized user, unauthorized result and message content are sent to target terminal.Detailed content is referring to above-mentioned implementation
Step S24 in example.
Alternatively, in some embodiments of the invention, as shown in fig. 7, also including:Refuse module 66, for working as active user
When not being authorized user, refusal sends message content.Detailed content is referring to the step S54 in above-described embodiment.
Alternatively, in some embodiments of the invention, Authorization result and unauthorized result sent in the form of call tag to
Target terminal.Detailed content is described in detail referring to the correlation in above-described embodiment.
The device of above-mentioned transmission message, by having detected whether that message sends request in real time, if having detected message hair
Send request, then extract active user biological information, herein biological information including but not limited to:Finger print information, rainbow
Film information and face information, biological information have uniqueness, authentication information can be used as to carry out subscription authentication, i.e. root
Judge whether active user is authorized user according to the biological information of the active user got, authorized user can exist in advance
The biological information of correlation is stored in terminal, by by the biological information currently obtained and the life of authorized user to prestore
Thing characteristic information is contrasted, you can is determined whether active user is authorized user, when only active user is authorized user, is said
Bright active user is secured user, and the message content that can just edit active user is sent to target terminal, in this way, by disappearing
Breath sends identification authentication of the request triggering to active user, and sends authenticating result and message content together when authentication passes through
Go out, be easy to recipient to differentiate the message content that receives according to actual conditions, it is unauthorized when avoiding user mobile phone and being stolen
User carries out malicious messages transmission by terminal, substantially increases the security of the outer social information of terminal-pair, can effectively reduce
The generation of information fraud.
The embodiment of the present invention additionally provides a kind of terminal, including:Any device for sending message in above-described embodiment.
Illustrate a kind of terminal of the present invention by taking a kind of smart mobile phone as an example below.
As shown in figure 8, correspondingly, a kind of terminal provided in the embodiment of the present invention, including:At least one He of processor 81
Memory 82, in Fig. 8 by taking a processor as an example, processor 81 and memory 82 are connected by bus 80, and memory 82 stores
There is the instruction that can be performed by least one processor 81, instruct and performed by least one processor 81, so that at least one processing
Device performs following method:
When detecting that message sends request, the biological information of active user is obtained;
Judge whether active user is authorized user according to biological information;
When active user is authorized user, message content is sent to target terminal.
Optionally, in some embodiments of the invention, when active user is authorized user, in addition to:Tied authorizing
Fruit is sent to target terminal.
Optionally, in some embodiments of the invention, in addition to:When active user is not authorized user, will not award
Power result and message content are sent to target terminal.
Alternatively, in some embodiments of the invention, in addition to:When active user is not authorized user, refusal hair
Send message content.
Alternatively, in some embodiments of the invention, Authorization result and unauthorized result are sent out in the form of call tag
Deliver to target terminal.
Related description can correspond to associated description corresponding the step of referring to Fig. 2 to Fig. 5 and effect is understood, herein
Do not do and excessively repeat.
The terminal that above-described embodiment provides, by having detected whether that message sends request in real time, if having detected message
Send request, then extract active user biological information, herein biological information including but not limited to:Finger print information,
Iris information and face information, biological information have uniqueness, authentication information can be used as to carry out subscription authentication, i.e.,
Judge whether active user is authorized user according to the biological information of the active user got, authorized user can be advance
The biological information of correlation is stored in the terminal, by by the biological information currently obtained and the authorized user that prestores
Biological information is contrasted, you can determine whether active user is authorized user, when only active user is authorized user,
It is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, in this way, passing through
Message sends identification authentication of the request triggering to active user, and rises authenticating result and message content one when authentication passes through
See off, be easy to recipient to differentiate the message content that receives according to actual conditions, it is non-to award when avoiding user mobile phone and being stolen
Weigh user and malicious messages transmission is carried out by terminal, substantially increase the security of the outer social information of terminal-pair, can effectively subtract
The generation of few information fraud.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, and computer-readable recording medium storage has meter
Calculation machine executable instruction, the computer executable instructions can perform all or part of flow in above-described embodiment method.Wherein,
Storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM), random access memory
(Random Access Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, contracting
Write:) or solid state hard disc (Solid-State Drive, SSD) etc. HDD;Storage medium can also include the memory of mentioned kind
Combination.
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention
Spirit and scope in the case of various modification can be adapted and modification, such modifications and variations are each fallen within by appended claims institute
Within the scope of restriction.
Claims (10)
- A kind of 1. method for sending message, it is characterised in that including:When detecting that message sends request, the biological information of active user is obtained;Judge whether the active user is authorized user according to the biological information;When the active user is authorized user, message content is sent to target terminal.
- 2. the method according to claim 1 for sending message, it is characterised in that when the active user is authorized user When, in addition to:Authorization result is sent to the target terminal.
- 3. the method according to claim 1 for sending message, it is characterised in that also include:When the active user is not authorized user, unauthorized result and the message content are sent whole to the target End.
- 4. the method according to claim 1 for sending message, it is characterised in that also include:When the active user is not authorized user, refusal sends the message content.
- 5. the method for the transmission message according to Claims 2 or 3, it is characterised in that the Authorization result and described do not award Power result is sent in the form of call tag to the target terminal.
- A kind of 6. device for sending message, it is characterised in that including:Acquisition module, for when detecting that message sends request, obtaining the biological information of active user;Judge module, for judging whether the active user is authorized user according to the biological information;First sending module, for when the active user is authorized user, message content to be sent to target terminal.
- 7. the device according to claim 6 for sending message, it is characterised in that also include:Second sending module, for when the active user is authorized user, Authorization result to be sent to the target terminal.
- 8. the device according to claim 6 for sending message, it is characterised in that also include:3rd sending module, for when the active user is not authorized user, by unauthorized result and the message content Send to the target terminal.
- 9. the device according to claim 6 for sending message, it is characterised in that also include:Refuse module, for when the active user is not authorized user, refusal to send the message content.
- 10. the device of the transmission message according to claim 7 or 8, it is characterised in that the Authorization result and described do not award Power result is sent in the form of call tag to the target terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710556942.1A CN107370866A (en) | 2017-07-10 | 2017-07-10 | A kind of method and apparatus for sending message |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710556942.1A CN107370866A (en) | 2017-07-10 | 2017-07-10 | A kind of method and apparatus for sending message |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107370866A true CN107370866A (en) | 2017-11-21 |
Family
ID=60306049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710556942.1A Pending CN107370866A (en) | 2017-07-10 | 2017-07-10 | A kind of method and apparatus for sending message |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370866A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109039860A (en) * | 2018-07-17 | 2018-12-18 | 北京小米移动软件有限公司 | Send and show method and device, the identity authentication method and device of message |
CN112118263A (en) * | 2020-09-21 | 2020-12-22 | 深圳市筑泰防务智能科技有限公司 | Communication method, communication device, communication terminal and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101699888A (en) * | 2009-11-16 | 2010-04-28 | 深圳华为通信技术有限公司 | Wireless dial-up networking method, wireless networking equipment and system |
CN104980899A (en) * | 2015-05-28 | 2015-10-14 | 广东欧珀移动通信有限公司 | Communication method and system for mobile terminal, mobile terminal and server |
-
2017
- 2017-07-10 CN CN201710556942.1A patent/CN107370866A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101699888A (en) * | 2009-11-16 | 2010-04-28 | 深圳华为通信技术有限公司 | Wireless dial-up networking method, wireless networking equipment and system |
CN104980899A (en) * | 2015-05-28 | 2015-10-14 | 广东欧珀移动通信有限公司 | Communication method and system for mobile terminal, mobile terminal and server |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109039860A (en) * | 2018-07-17 | 2018-12-18 | 北京小米移动软件有限公司 | Send and show method and device, the identity authentication method and device of message |
CN109039860B (en) * | 2018-07-17 | 2021-07-30 | 北京小米移动软件有限公司 | Method and device for sending and displaying message and method and device for identity authentication |
CN112118263A (en) * | 2020-09-21 | 2020-12-22 | 深圳市筑泰防务智能科技有限公司 | Communication method, communication device, communication terminal and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105900102B (en) | Sensor-based near-field communication certification | |
CN103370717B (en) | Always-available embedded theft reaction subsystem | |
KR102005110B1 (en) | Mobile device to detect unexpected behaviour | |
CN105447691A (en) | E-card transaction authorization based on geographic location | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN104967593B (en) | A kind of auth method, device and system | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
US11825002B2 (en) | Dynamic user interface schemes for an electronic device based on detected accessory devices | |
CN108156537B (en) | Remote operation method of mobile terminal and mobile terminal | |
CN108763895B (en) | Image processing method and device, electronic equipment and storage medium | |
CN104346550B (en) | A kind of information processing method and a kind of electronic equipment | |
CN104539798A (en) | Multifunctional mobile phone anti-theft system | |
CN107908939A (en) | Terminal alarms method, apparatus and mobile terminal | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
CN107491673A (en) | Biometric discrimination method and Related product | |
CN106951757A (en) | A kind of method and apparatus for operating application program | |
CN107370866A (en) | A kind of method and apparatus for sending message | |
CN106447325B (en) | NFC communication-based processing method and device and mobile terminal | |
CN202771533U (en) | Encryption keyboard and self-service device utilizing the same | |
KR20150104589A (en) | Card swiping method and device for determining mobile terminal for swiping card, utilizing intensity of ultrasonic signal | |
CN107122647A (en) | Finger print data processing method, device and electronic equipment | |
CN105335629A (en) | Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology | |
CN108133581A (en) | A kind of automobile key method for searching, automobile key and mobile terminal | |
JP3368886B2 (en) | Mobile terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171121 |
|
RJ01 | Rejection of invention patent application after publication |