CN107370866A - A kind of method and apparatus for sending message - Google Patents

A kind of method and apparatus for sending message Download PDF

Info

Publication number
CN107370866A
CN107370866A CN201710556942.1A CN201710556942A CN107370866A CN 107370866 A CN107370866 A CN 107370866A CN 201710556942 A CN201710556942 A CN 201710556942A CN 107370866 A CN107370866 A CN 107370866A
Authority
CN
China
Prior art keywords
user
message
active user
sent
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710556942.1A
Other languages
Chinese (zh)
Inventor
符黎钢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201710556942.1A priority Critical patent/CN107370866A/en
Publication of CN107370866A publication Critical patent/CN107370866A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of method and apparatus for sending message, methods described includes:When detecting that message sends request, the biological information of active user is obtained;Judge whether the active user is authorized user according to the biological information;When the active user is authorized user, message content is sent to target terminal.The program sends identification authentication of the request triggering to active user by message, and authenticating result and message content are sent together when authentication passes through, it is easy to recipient to differentiate the message content received according to actual conditions, when avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, the security of the outer social information of terminal-pair is substantially increased, can effectively reduce the generation of information fraud.

Description

A kind of method and apparatus for sending message
Technical field
The present invention relates to communication technical field, and in particular to a kind of method and apparatus for sending message.
Background technology
With the development of the communication technology, informationization has become a big characteristic of people's daily life, in daily exchange, User can be sent short message by terminal (such as mobile phone, computer etc.), send internet social networking application message, be entered with destination object Row mutually exchange, the convenience of information exchange add abundant color to daily life.
But the variation of information interaction approach, a series of social concern is also brought, especially prominent one is exactly Information security issue, if the terminal of user be not I when in use, it sends a message to targeted customer, mesh by terminal Mark user None- identified whether be terminal the information that sends of owner, can not also judge the authenticity of message content, i.e. message Identifiability is relatively low.For example some criminals steal user mobile phone, electricity is then carried out to the good friend of user by user mobile phone Believe fraudulent act etc., these problems not only cause serious infringement to the personal safety of people, moreover, also bringing bad Social influence.
Therefore, the security of the message of terminal transmission how is improved, turns into a technical problem urgently to be resolved hurrily.
The content of the invention
In view of this, the embodiments of the invention provide a kind of method and apparatus for sending message, to solve in the prior art Because terminal send message identifiability it is relatively low caused by information security issue.
First aspect present invention provides a kind of method for sending message, applied to terminal, such as mobile phone, tablet personal computer Deng methods described includes:When detecting that message sends request, the biological information of active user is obtained;According to the life Thing characteristic information judges whether the active user is authorized user;When the active user is authorized user, by message Hold and send to target terminal.
The method described by implementing first aspect, detect whether that message sends request in real time, disappeared if detected Breath send request, then extract active user biological information, herein biological information including but not limited to:Fingerprint is believed Breath, iris information and face information, biological information have uniqueness, authentication information can be used as to carry out user's mirror Power, i.e., judge whether active user is authorized user according to the biological information of the active user got, authorized user can To store the biological information of correlation in the terminal in advance, by by the biological information currently obtained and the mandate that prestores The biological information of user is contrasted, you can determines whether active user is authorized user, only active user is mandate During user, it is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, such as This, identification authentication of the request triggering to active user is sent by message, and sends message content when authentication passes through, When avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases outside terminal-pair The security of social information, it can effectively reduce the generation of information fraud.
With reference to first aspect present invention, in first aspect present invention first embodiment, when the active user is to authorize During user, in addition to:Authorization result is sent to the target terminal.
, can also be by Authorization result and message when it is determined that active user is the user authorized by performing above-mentioned steps Content is sent to target terminal together, and Authorization result may indicate that whether the essential information of the user (for example name, is terminal Owner etc.), in this way, the message receiver can of target terminal understands that current message content is sent by whom, it is easy to receive Root differentiates the message content received according to actual conditions.
With reference to first aspect present invention, in first aspect present invention second embodiment, in addition to:As the active user When not being authorized user, unauthorized result and the message content are sent to the target terminal.
By performing above-mentioned steps, if active user determines not by identification authentication according to its biological information It is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages that disabled user is carried out are sent, then can be incited somebody to action Active user's unauthorized result is sent to target terminal together with message content, in this way, message receiver is seeing unauthorized When as a result, the true and false of message content can be not only identified, and can determine that sending terminal is currently in non-secure states, can be with The actual owner for notifying to send terminal by other contact methods is handled, and further increases Information Security.
With reference to first aspect present invention, in the embodiment of first aspect present invention the 3rd, in addition to:As the active user When not being authorized user, refusal sends the message content.
By performing above-mentioned steps, if active user determines not by identification authentication according to its biological information It is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages that disabled user is carried out are sent, then can be with Refusal sends the message content that active user edits, in this way, target terminal does not just receive this malicious messages, avoids recipient Because this malicious messages are had dust thrown into the eyes, and then can reduce the generation of information fraud.
With reference to first aspect present invention first embodiment or second embodiment, the embodiment party of first aspect present invention the 4th In formula, the Authorization result and the unauthorized result are sent in the form of call tag to the target terminal.
By performing above-mentioned steps, the transmission form of Authorization result and unauthorized result can be various, such as can be with It is call tag, specifically, if active user can add disabled user after message content and carry not by identification authentication Indicating label, equally, if active user has passed through identification authentication, validated user prompting mark can be added after message content Label, and the essential information of authorized user can be shown, to prompt recipient whether the message content is safe, in this way, recipient uses Family can intuitively see editor's information of the message content behind message content, improve the hommization of information alert.
In addition, second aspect of the present invention provides a kind of device for sending message, for terminal, such as mobile phone, tablet personal computer Deng method of the device for sending message including being used to perform any one transmission message of above-mentioned first aspect or first aspect Module or unit.
For example, described device includes:Acquisition module, for when detecting that message sends request, obtaining active user's Biological information;Judge module, for judging whether the active user is authorized user according to the biological information; First sending module, for when the active user is authorized user, message content to be sent to target terminal.
By implementing the device of above-mentioned transmission message, detect whether that message sends request in real time, disappeared if detected Breath send request, then extract active user biological information, herein biological information including but not limited to:Fingerprint is believed Breath, iris information and face information, biological information have uniqueness, authentication information can be used as to carry out user's mirror Power, i.e., judge whether active user is authorized user according to the biological information of the active user got, authorized user can To store the biological information of correlation in the terminal in advance, by by the biological information currently obtained and the mandate that prestores The biological information of user is contrasted, you can determines whether active user is authorized user, only active user is mandate During user, it is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, such as This, identification authentication of the request triggering to active user is sent by message, and sends message content when authentication passes through, When avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases outside terminal-pair The security of social information, it can effectively reduce the generation of information fraud.
With reference to second aspect of the present invention, in second aspect of the present invention first embodiment, in addition to:Second sending module, For when the active user is authorized user, Authorization result to be sent to the target terminal.
By implementing the device of above-mentioned transmission message, when it is determined that active user is the user authorized, will can also authorize As a result sent together with message content to target terminal, Authorization result may indicate that the essential information of the user (for example name, is No is owner of terminal etc.), in this way, the message receiver can of target terminal understands that current message content is sent by whom , it is easy to recipient to differentiate the message content received according to actual conditions.
With reference to second aspect of the present invention, in second aspect of the present invention second embodiment, in addition to:3rd sending module, For when the active user is not authorized user, unauthorized result and the message content being sent whole to the target End.
It is if active user is not by identification authentication, i.e., special according to its biology by implementing the device of above-mentioned transmission message Reference breath determines that it is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages hair that disabled user is carried out Send, then active user's unauthorized result can be sent to target terminal together with message content, in this way, message receiver exists When seeing unauthorized result, the true and false of message content can be not only identified, and can determine that sending terminal is currently in non-peace Total state, it can be handled by the actual owner that other contact methods notify to send terminal, further increase information peace Quan Xing.
With reference to second aspect of the present invention, in the embodiment of second aspect of the present invention the 3rd, in addition to:Refuse module, be used for When the active user is not authorized user, refusal sends the message content.
It is if active user is not by identification authentication, i.e., special according to its biology by implementing the device of above-mentioned transmission message Reference breath determines that it is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages hair that disabled user is carried out Send, then can also refuse to send the message content that active user edits, disappear in this way, target terminal does not just receive this malice Breath, recipient is avoided because this malicious messages are had dust thrown into the eyes, and then can reduce the generation of information fraud.
With reference to second aspect of the present invention first embodiment or second embodiment, the embodiment party of second aspect of the present invention the 4th In formula, the Authorization result and the unauthorized result are sent in the form of call tag to the target terminal.
By implementing the device of above-mentioned transmission message, the transmission form of Authorization result and unauthorized result can be various , for example can be call tag, specifically, if active user not by identification authentication, can be attached after message content Add disabled user's call tag, equally, if active user has passed through identification authentication, it is legal to be added after message content User's call tag, and the essential information of authorized user can be shown, to prompt recipient whether the message content is safe, such as This, recipient user can intuitively see editor's information of the message content behind message content, improve information alert Hommization.
Module or unit included by the device for sending message are not limited to above-mentioned naming method.
These aspects of the application can more straightforward in the following description.
Third aspect present invention provides a kind of terminal, including:Any implementation of second aspect of the present invention or second aspect The device of transmission message described in mode, therefore described in any embodiment with second aspect of the present invention or second aspect All beneficial effects of the device of message are sent, will not be repeated here.
Fourth aspect present invention provides a kind of computer-readable recording medium, the computer-readable recording medium storage Computer instruction, the computer instruction are used for any reality for making the computer perform first aspect present invention or first aspect The method for applying the transmission message described in mode.
Brief description of the drawings
The features and advantages of the present invention can be more clearly understood by reference to accompanying drawing, accompanying drawing is schematically without that should manage Solve to carry out any restrictions to the present invention, in the accompanying drawings:
Fig. 1 shows the structure chart of mobile phone in the embodiment of the present invention;
Fig. 2 shows the flow chart of the method for transmission message according to embodiments of the present invention;
Fig. 3 shows the display interface schematic diagram of the message content according to embodiments of the present invention in wechat application;
Fig. 4 shows the display interface schematic diagram of the message content according to embodiments of the present invention in short message application;
Fig. 5 shows another flow chart of the method for transmission message according to embodiments of the present invention;
Fig. 6 shows the structural representation of the device of transmission message according to embodiments of the present invention;
Fig. 7 shows another structural representation of the device of transmission message according to embodiments of the present invention;
Fig. 8 shows the structural representation of terminal according to embodiments of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not having There is the every other embodiment made and obtained under the premise of creative work, belong to the scope of protection of the invention.
As shown in figure 1, it is the application scenarios schematic diagram of embodiments of the invention.Mobile terminal is mobile phone or tablet personal computer etc. Mobile device, mobile terminal by taking mobile phone as an example, the part-structure block diagram of mobile phone as shown in figure 1, mobile phone include radio circuit 110, Memory 120, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, wireless module 170, processor 180 And the grade of power supply 190 part.It will be understood by those skilled in the art that the handset structure shown in Fig. 1 is not formed to mobile phone Limit, can include than illustrating more or less parts, either combine some parts or different parts arrangement.
Wherein RF circuits 110 be used for receive and send messages or communication process in, the reception and transmission of signal.Memory 120 is used for Software program and module are stored, processor 180 is stored in the software program and module of memory 120 by operation, so as to Perform various function application and the data processing of mobile phone.Input block 130 is used for the numeral or character information for receiving input, with And produce the key signals relevant with the user of mobile phone setting and function control and input.Input block 130 may include contact panel 131 and other input equipments 132.Other input equipments 132 can include but is not limited to physical keyboard, function key, mouse, behaviour Make the one or more in bar.Display unit 140 be used for show by user input information or be supplied to user information and The various menus of mobile phone.Display unit 140 can include display panel 141.Contact panel 131 can cover display panel 141, when After contact panel 131 detects the touch operation on or near it, processor 180 is sent to determine the class of touch event Type, it is followed by subsequent processing device 180 and corresponding visual output is provided on display panel 141 according to the type of touch event.
Mobile phone may also include at least one sensor 150, such as optical sensor, motion sensor and other sensors.Light Sensor may include ambient light sensor and proximity transducer, and environmental sensor can adjust display according to the light and shade of ambient light The brightness of panel 141, proximity transducer can close display panel 141 and/or backlight when mobile phone is moved in one's ear.This implementation In example on the housing for the front and back that optical sensor can be arranged on mobile phone, for detecting blocked area when user holds mobile phone Domain.Pressure sensor can also be included herein, be arranged on the front or back housing of mobile phone, for the side by detecting pressure Formula obtains occlusion area when user holds mobile phone.In addition, mobile phone can also configure gyroscope, barometer, hygrometer, temperature The other sensors such as meter, infrared ray sensor, are repeated no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and mobile phone.Wireless mould Block 170 can be WIFI module, provide the user wireless the Internet access service.
Processor 180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module being stored in memory 120, and call and be stored in memory 120 Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 180 can be with Including one or more processing units.In addition, mobile phone also include each part power supply power supply 190, by power-supply management system with Processor 180 is logically contiguous, so as to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
Referring to Fig. 2, a kind of method for sending message provided in an embodiment of the present invention, applied to terminal, such as it is mobile phone, flat Plate computer etc., method includes:
S21:When detecting that message sends request, the biological information of active user is obtained.Detect whether in real time There is message to send request, if having detected that message sends request, the biological information of active user is extracted, for editor The situation that message is not sent, and without identification authentication, can so save the energy consumption of terminal;Biological information bag herein Contain but be not limited to:Finger print information, iris information and face information, biological information have uniqueness, can recognize as identity Demonstrate,prove information and carry out subscription authentication, and when active user triggers message and sent, biological information is easily obtained, such as terminal Camera and Fingerprint Identification Unit can get the biological information of active user in real time.
S22:Judge whether active user is authorized user according to biological information.Authorized user can be in advance in terminal The related biological information of middle storage, by the way that the biology of the biological information currently obtained and the authorized user to prestore is special Reference breath is contrasted, you can is determined whether active user is authorized user, if active user is authorized user, is entered step Rapid S23, otherwise into step S24.
S23:When active user is authorized user, message content is sent to target terminal.Only active user is to award When weighing user, it is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, In this way, sending identification authentication of the request triggering to active user by message, and message content is sent out when authentication passes through Go, when avoiding user mobile phone and being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases terminal-pair The security of outer social information, it can effectively reduce the generation of information fraud.
Alternatively, step S23 can also include:When active user is authorized user, Authorization result is sent to target Terminal.Specifically, it is determined that active user be authorize user when, Authorization result and message content can also be sent together to Target terminal, Authorization result may indicate that the essential information (such as name, whether be owner of terminal etc.) of the user, in this way, The message receiver can of target terminal understands that current message content is sent by whom, is easy to recipient according to actual conditions Differentiate the message content received.
In addition to step S24 alternatively, in some embodiments of the invention,:When active user is not authorized user, Unauthorized result and message content are sent to target terminal.If active user is not by identification authentication, i.e., according to its biology Characteristic information determines that it is not authorized user, illustrates that the terminal is possible to stolen, or the malicious messages that disabled user is carried out Send, then active user's unauthorized result can be sent to target terminal together with message content, in this way, message receiver When seeing unauthorized result, the true and false of message content can be not only identified, and it is non-to determine that transmission terminal is currently in Safe condition, it can be handled by the actual owner that other contact methods notify to send terminal, further increase information Security.
Alternatively, step S23 Authorization result and step S24 unauthorized results are sent in the form of call tag to target Terminal.The transmission form of Authorization result and unauthorized result can be various, for example can be call tag, specifically, such as Shown in Fig. 3 and Fig. 4, if active user has passed through identification authentication, validated user prompting mark can be added after message content (such as message content " reaches Lijing to label finally!It is dead tired " have call tag " in person " below), and authorized user can be shown Essential information, with prompt the recipient message content whether safety, equally, if active user not by identification authentication, Disabled user's call tag can be added after message content, and (message content " lose, and makes a call to 1000 yuan to me soon by my wallet” Have call tag " non-good friend " below), in this way, recipient user can intuitively see the message behind message content Editor's information of content, improve the hommization of information alert.
Alternatively, in some embodiments of the invention, the signaling process with reference to shown in Fig. 5 illustrates:
S51:Detailed content reference signaling process step S21;
S52:Detailed content reference signaling process step S22, if active user is authorized user, into step S53, Otherwise step S54 is entered.;
S53:Detailed content reference signaling process step S23;
S54:If active user is not authorized user, refusal sends message content.I.e. if active user does not pass through body Part authentication, i.e., determine that it is not authorized user according to its biological information, illustrate that the terminal is possible to stolen, or illegally The malicious messages that user is carried out are sent, then can also refuse to send the message content that active user edits, in this way, target terminal is just This malicious messages are not received, avoid recipient because this malicious messages are had dust thrown into the eyes, substantially increase the outer society of terminal-pair The security of information is handed over, and then the generation of information fraud can be reduced.
The method of the transmission message provided in the present embodiment, by having detected whether that message sends request in real time, if inspection Measured message send request, then extract active user biological information, herein biological information including but not limited to: Finger print information, iris information and face information, biological information have uniqueness, can be used as authentication information Family authenticates, i.e., judges whether active user is authorized user according to the biological information of the active user got, authorizes and uses Family can store the biological information of correlation in the terminal in advance, by by the biological information currently obtained and prestoring The biological information of authorized user is contrasted, you can determines whether active user is authorized user, only active user is During authorized user, it is secured user to illustrate active user, and the message content that can just edit active user sends whole to target End, in this way, sending identification authentication of the request triggering to active user by message, and by authenticating result and disappear when authentication passes through Breath content is sent together, is easy to recipient to differentiate the message content received according to actual conditions, is avoided user mobile phone When being stolen, unauthorized user carries out malicious messages transmission by terminal, substantially increases the safety of the outer social information of terminal-pair Property, it can effectively reduce the generation of information fraud.
It is a kind of structural representation of device for sending message provided in an embodiment of the present invention referring to Fig. 6, for terminal, Such as mobile phone, tablet personal computer etc., it includes:
Acquisition module 61, for when detecting that message sends request, obtaining the biological information of active user;In detail Content is referring to the step S21 in above-described embodiment.
Judge module 62, for judging whether active user is authorized user according to biological information;Detailed content is joined The step S22 seen in above-described embodiment.
First sending module 63, for when active user is authorized user, message content to be sent to target terminal.In detail Thin content is referring to the step S23 in above-described embodiment.
Alternatively, in some embodiments of the invention, as shown in fig. 7, also including:Second sending module 64, for when current When user is authorized user, Authorization result is sent to target terminal.Detailed content is detailed referring to the correlation in above-described embodiment Description.
Alternatively, in some embodiments of the invention, as shown in fig. 7, also including:3rd sending module 65, for when current When user is not authorized user, unauthorized result and message content are sent to target terminal.Detailed content is referring to above-mentioned implementation Step S24 in example.
Alternatively, in some embodiments of the invention, as shown in fig. 7, also including:Refuse module 66, for working as active user When not being authorized user, refusal sends message content.Detailed content is referring to the step S54 in above-described embodiment.
Alternatively, in some embodiments of the invention, Authorization result and unauthorized result sent in the form of call tag to Target terminal.Detailed content is described in detail referring to the correlation in above-described embodiment.
The device of above-mentioned transmission message, by having detected whether that message sends request in real time, if having detected message hair Send request, then extract active user biological information, herein biological information including but not limited to:Finger print information, rainbow Film information and face information, biological information have uniqueness, authentication information can be used as to carry out subscription authentication, i.e. root Judge whether active user is authorized user according to the biological information of the active user got, authorized user can exist in advance The biological information of correlation is stored in terminal, by by the biological information currently obtained and the life of authorized user to prestore Thing characteristic information is contrasted, you can is determined whether active user is authorized user, when only active user is authorized user, is said Bright active user is secured user, and the message content that can just edit active user is sent to target terminal, in this way, by disappearing Breath sends identification authentication of the request triggering to active user, and sends authenticating result and message content together when authentication passes through Go out, be easy to recipient to differentiate the message content that receives according to actual conditions, it is unauthorized when avoiding user mobile phone and being stolen User carries out malicious messages transmission by terminal, substantially increases the security of the outer social information of terminal-pair, can effectively reduce The generation of information fraud.
The embodiment of the present invention additionally provides a kind of terminal, including:Any device for sending message in above-described embodiment.
Illustrate a kind of terminal of the present invention by taking a kind of smart mobile phone as an example below.
As shown in figure 8, correspondingly, a kind of terminal provided in the embodiment of the present invention, including:At least one He of processor 81 Memory 82, in Fig. 8 by taking a processor as an example, processor 81 and memory 82 are connected by bus 80, and memory 82 stores There is the instruction that can be performed by least one processor 81, instruct and performed by least one processor 81, so that at least one processing Device performs following method:
When detecting that message sends request, the biological information of active user is obtained;
Judge whether active user is authorized user according to biological information;
When active user is authorized user, message content is sent to target terminal.
Optionally, in some embodiments of the invention, when active user is authorized user, in addition to:Tied authorizing Fruit is sent to target terminal.
Optionally, in some embodiments of the invention, in addition to:When active user is not authorized user, will not award Power result and message content are sent to target terminal.
Alternatively, in some embodiments of the invention, in addition to:When active user is not authorized user, refusal hair Send message content.
Alternatively, in some embodiments of the invention, Authorization result and unauthorized result are sent out in the form of call tag Deliver to target terminal.
Related description can correspond to associated description corresponding the step of referring to Fig. 2 to Fig. 5 and effect is understood, herein Do not do and excessively repeat.
The terminal that above-described embodiment provides, by having detected whether that message sends request in real time, if having detected message Send request, then extract active user biological information, herein biological information including but not limited to:Finger print information, Iris information and face information, biological information have uniqueness, authentication information can be used as to carry out subscription authentication, i.e., Judge whether active user is authorized user according to the biological information of the active user got, authorized user can be advance The biological information of correlation is stored in the terminal, by by the biological information currently obtained and the authorized user that prestores Biological information is contrasted, you can determine whether active user is authorized user, when only active user is authorized user, It is secured user to illustrate active user, and the message content that can just edit active user is sent to target terminal, in this way, passing through Message sends identification authentication of the request triggering to active user, and rises authenticating result and message content one when authentication passes through See off, be easy to recipient to differentiate the message content that receives according to actual conditions, it is non-to award when avoiding user mobile phone and being stolen Weigh user and malicious messages transmission is carried out by terminal, substantially increase the security of the outer social information of terminal-pair, can effectively subtract The generation of few information fraud.
The embodiment of the present invention additionally provides a kind of computer-readable recording medium, and computer-readable recording medium storage has meter Calculation machine executable instruction, the computer executable instructions can perform all or part of flow in above-described embodiment method.Wherein, Storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, contracting Write:) or solid state hard disc (Solid-State Drive, SSD) etc. HDD;Storage medium can also include the memory of mentioned kind Combination.
Although being described in conjunction with the accompanying embodiments of the invention, those skilled in the art can not depart from the present invention Spirit and scope in the case of various modification can be adapted and modification, such modifications and variations are each fallen within by appended claims institute Within the scope of restriction.

Claims (10)

  1. A kind of 1. method for sending message, it is characterised in that including:
    When detecting that message sends request, the biological information of active user is obtained;
    Judge whether the active user is authorized user according to the biological information;
    When the active user is authorized user, message content is sent to target terminal.
  2. 2. the method according to claim 1 for sending message, it is characterised in that when the active user is authorized user When, in addition to:
    Authorization result is sent to the target terminal.
  3. 3. the method according to claim 1 for sending message, it is characterised in that also include:
    When the active user is not authorized user, unauthorized result and the message content are sent whole to the target End.
  4. 4. the method according to claim 1 for sending message, it is characterised in that also include:
    When the active user is not authorized user, refusal sends the message content.
  5. 5. the method for the transmission message according to Claims 2 or 3, it is characterised in that the Authorization result and described do not award Power result is sent in the form of call tag to the target terminal.
  6. A kind of 6. device for sending message, it is characterised in that including:
    Acquisition module, for when detecting that message sends request, obtaining the biological information of active user;
    Judge module, for judging whether the active user is authorized user according to the biological information;
    First sending module, for when the active user is authorized user, message content to be sent to target terminal.
  7. 7. the device according to claim 6 for sending message, it is characterised in that also include:
    Second sending module, for when the active user is authorized user, Authorization result to be sent to the target terminal.
  8. 8. the device according to claim 6 for sending message, it is characterised in that also include:
    3rd sending module, for when the active user is not authorized user, by unauthorized result and the message content Send to the target terminal.
  9. 9. the device according to claim 6 for sending message, it is characterised in that also include:
    Refuse module, for when the active user is not authorized user, refusal to send the message content.
  10. 10. the device of the transmission message according to claim 7 or 8, it is characterised in that the Authorization result and described do not award Power result is sent in the form of call tag to the target terminal.
CN201710556942.1A 2017-07-10 2017-07-10 A kind of method and apparatus for sending message Pending CN107370866A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710556942.1A CN107370866A (en) 2017-07-10 2017-07-10 A kind of method and apparatus for sending message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710556942.1A CN107370866A (en) 2017-07-10 2017-07-10 A kind of method and apparatus for sending message

Publications (1)

Publication Number Publication Date
CN107370866A true CN107370866A (en) 2017-11-21

Family

ID=60306049

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710556942.1A Pending CN107370866A (en) 2017-07-10 2017-07-10 A kind of method and apparatus for sending message

Country Status (1)

Country Link
CN (1) CN107370866A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039860A (en) * 2018-07-17 2018-12-18 北京小米移动软件有限公司 Send and show method and device, the identity authentication method and device of message
CN112118263A (en) * 2020-09-21 2020-12-22 深圳市筑泰防务智能科技有限公司 Communication method, communication device, communication terminal and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699888A (en) * 2009-11-16 2010-04-28 深圳华为通信技术有限公司 Wireless dial-up networking method, wireless networking equipment and system
CN104980899A (en) * 2015-05-28 2015-10-14 广东欧珀移动通信有限公司 Communication method and system for mobile terminal, mobile terminal and server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101699888A (en) * 2009-11-16 2010-04-28 深圳华为通信技术有限公司 Wireless dial-up networking method, wireless networking equipment and system
CN104980899A (en) * 2015-05-28 2015-10-14 广东欧珀移动通信有限公司 Communication method and system for mobile terminal, mobile terminal and server

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039860A (en) * 2018-07-17 2018-12-18 北京小米移动软件有限公司 Send and show method and device, the identity authentication method and device of message
CN109039860B (en) * 2018-07-17 2021-07-30 北京小米移动软件有限公司 Method and device for sending and displaying message and method and device for identity authentication
CN112118263A (en) * 2020-09-21 2020-12-22 深圳市筑泰防务智能科技有限公司 Communication method, communication device, communication terminal and readable storage medium

Similar Documents

Publication Publication Date Title
CN105900102B (en) Sensor-based near-field communication certification
CN103370717B (en) Always-available embedded theft reaction subsystem
KR102005110B1 (en) Mobile device to detect unexpected behaviour
CN105447691A (en) E-card transaction authorization based on geographic location
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104967593B (en) A kind of auth method, device and system
CN106327193B (en) A kind of system unlocking method and equipment
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
US11825002B2 (en) Dynamic user interface schemes for an electronic device based on detected accessory devices
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN108763895B (en) Image processing method and device, electronic equipment and storage medium
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
CN104539798A (en) Multifunctional mobile phone anti-theft system
CN107908939A (en) Terminal alarms method, apparatus and mobile terminal
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
CN107491673A (en) Biometric discrimination method and Related product
CN106951757A (en) A kind of method and apparatus for operating application program
CN107370866A (en) A kind of method and apparatus for sending message
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
CN202771533U (en) Encryption keyboard and self-service device utilizing the same
KR20150104589A (en) Card swiping method and device for determining mobile terminal for swiping card, utilizing intensity of ultrasonic signal
CN107122647A (en) Finger print data processing method, device and electronic equipment
CN105335629A (en) Real-time protection method of mobile equipment capable of combing with intelligent wearable equipment on the basis of sensor technology
CN108133581A (en) A kind of automobile key method for searching, automobile key and mobile terminal
JP3368886B2 (en) Mobile terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171121

RJ01 Rejection of invention patent application after publication