CN109587640B - Junk information identification method, terminal and computer storage medium - Google Patents

Junk information identification method, terminal and computer storage medium Download PDF

Info

Publication number
CN109587640B
CN109587640B CN201710907200.9A CN201710907200A CN109587640B CN 109587640 B CN109587640 B CN 109587640B CN 201710907200 A CN201710907200 A CN 201710907200A CN 109587640 B CN109587640 B CN 109587640B
Authority
CN
China
Prior art keywords
time zone
short message
zone information
unit
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710907200.9A
Other languages
Chinese (zh)
Other versions
CN109587640A (en
Inventor
王峰生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201710907200.9A priority Critical patent/CN109587640B/en
Publication of CN109587640A publication Critical patent/CN109587640A/en
Application granted granted Critical
Publication of CN109587640B publication Critical patent/CN109587640B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The embodiment of the invention discloses a junk information identification method, a terminal and a computer storage medium. The method comprises the following steps: receiving a short message, and extracting first time zone information in the short message; and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result.

Description

Junk information identification method, terminal and computer storage medium
Technical Field
The invention relates to an information processing technology, in particular to a junk information identification method, a terminal and a computer storage medium.
Background
In recent years, as various technologies of the traditional mobile communication system tend to mature, and the number of attack events aiming at the traditional mobile communication system is increasing, the attack mode is mainly realized by a pseudo base station and a spam short message. The implementation principle of sending the spam short message through the pseudo base station specifically comprises the following steps: in a real current network environment, a pseudo base station which is the same as the frequency point information and the system broadcast information of the coverage area is temporarily built, a terminal is absorbed onto the pseudo base station by utilizing the characteristic of system cell switching, the terminal position updating process is triggered, so that the terminal identification information is obtained, the pseudo base station can send junk short messages to terminal equipment by utilizing the identification information reported by the terminal, and after the junk short messages are sent, the terminal is removed from the pseudo base station, and the whole junk short message sending process is completed.
However, in the prior art, the identification and prevention mode for sending the spam message by the pseudo base station can be judged by a parameter judgment method, for example, whether the spam message is the obtained base station parameter or the obtained short message service number is judged.
However, the base station parameters or short message service numbers in the parameter judgment method are easily forged by constructing the same parameter mode as the current network, and the configuration of the completely simulated current network base station or short message service number in the pseudo base station cannot accurately judge the spam messages sent by the pseudo base station.
Disclosure of Invention
In order to solve the existing technical problem, embodiments of the present invention provide a spam information identifying method, a terminal, and a computer storage medium.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is realized as follows:
the embodiment of the invention provides a junk information identification method, which comprises the following steps:
receiving a short message, and extracting first time zone information in the short message;
and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result.
In the foregoing solution, the determining whether the short message is spam sent by the pseudo base station based on the comparison result includes:
and when the comparison result shows that the first time zone information is inconsistent with the second time zone information in the time synchronization service, judging that the short message is junk information sent by the pseudo base station.
In the foregoing solution, the determining whether the short message is spam sent by the pseudo base station based on the comparison result includes:
and when the comparison result shows that the first time zone information is consistent with the second time zone information in the time synchronization service, judging that the short message is not the junk information sent by the pseudo base station.
In the foregoing solution, before receiving the short message, the method further includes:
and after accessing the mobile communication network, obtaining and recording the second time zone information based on the time synchronization service.
In the above scheme, the method further comprises: executing a cell switching monitoring process;
correspondingly, the extracting the first time zone information in the short message includes:
and extracting the first time zone information in the short message after monitoring the cell switching operation and the position updating operation.
An embodiment of the present invention further provides a terminal, where the terminal includes: a receiving unit, an extracting unit and a comparing and judging unit; wherein the content of the first and second substances,
the receiving unit is used for receiving the short message;
the extracting unit is configured to extract the first time zone information in the short message received by the receiving unit;
and the comparison and judgment unit is used for comparing whether the first time zone information extracted by the extraction unit is consistent with the second time zone information in the time synchronization service or not and judging whether the short message is junk information sent by the pseudo base station or not based on a comparison result.
In the foregoing solution, the comparing and determining unit is configured to determine that the short message is spam sent by the pseudo base station when the comparison result indicates that the first time zone information is inconsistent with the second time zone information in the time synchronization service.
In the foregoing solution, the comparing and determining unit is configured to determine that the short message is not the spam sent by the pseudo base station when the comparison result indicates that the first time zone information is consistent with the second time zone information in the time synchronization service.
In the above scheme, the terminal further includes an access unit and a storage unit;
the access unit is used for accessing a mobile communication network and obtaining second time zone information based on the time synchronization service after accessing the mobile communication network;
the storage unit is used for recording the second time zone information obtained by the access unit.
In the above solution, the terminal further includes a monitoring unit, configured to execute a cell handover monitoring procedure;
the extracting unit is configured to extract the first time zone information in the short message after the monitoring unit monitors a cell switching operation and a location updating operation.
The embodiment of the invention also provides a computer storage medium, on which computer instructions are stored, and the instructions, when executed by a processor, implement the steps of the spam information identification method according to the embodiment of the invention.
The embodiment of the invention also provides a terminal, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the steps of the junk information identification method in the embodiment of the invention.
The embodiment of the invention provides a junk information identification method, a terminal and a computer storage medium, wherein the method comprises the following steps: receiving a short message, and extracting first time zone information in the short message; and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result. By adopting the technical scheme of the embodiment of the invention, whether the short message is the junk information sent by the pseudo base station is identified by comparing whether the first time zone information in the received short message is consistent with the second time zone information in the time synchronization service, so that the pseudo base station can not construct a clock source which is the same as the access network equipment or the short message center, and the accuracy of junk information identification is greatly improved.
Drawings
Fig. 1 is a schematic diagram of a pseudo base station;
fig. 2 is an interaction diagram of a short message center sending a short message to a terminal;
fig. 3 is a schematic flowchart of a spam identification method according to a first embodiment of the present invention;
fig. 4 is a flowchart illustrating a spam identification method according to a second embodiment of the present invention;
fig. 5 is a schematic diagram of a first structure of a terminal according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a second structure of the terminal according to the embodiment of the present invention;
fig. 7 is a schematic diagram of a third structure of the terminal according to the embodiment of the present invention;
fig. 8 is a schematic diagram of a hardware composition structure of the terminal according to the embodiment of the present invention.
Detailed Description
Before describing the spam identification method according to the embodiment of the present invention in detail, the principle of the pseudo base station and the principle of the pseudo base station transmitting information will be described first.
Fig. 1 is a schematic diagram of a pseudo base station; as shown in fig. 1, the pseudo base station performs configuration by using the scanned information of the peripheral strong signal cells, so that the terminal is attached to the pseudo base station, and performs a location update procedure during attachment, and reports the user identification information to the pseudo base station; and after the pseudo base station acquires the user identification information, triggering a short message sending process.
Fig. 2 is an interaction diagram of a short message center sending a short message to a terminal; as shown in fig. 2, the short message center (SC) transmits a short message to the terminal (MS); after receiving the short message, the terminal sends a delivery report to the short message center.
In general, a short message sent through a short message center carries a timestamp, and the time represented by the timestamp is time zone information of the short message center. However, the time zone carried in the short message sent by the pseudo base station is not the time zone of the short message center entity in the actual network because the pseudo base station does not simulate the short message center entity. Based on this, the following examples of the present invention are proposed.
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
Example one
The embodiment of the invention provides a junk information identification method which is applied to a terminal. Fig. 3 is a schematic flowchart of a spam identification method according to a first embodiment of the present invention; as shown in fig. 3, the method includes:
step 301: and receiving the short message, and extracting the first time zone information in the short message.
Step 302: and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result.
In this embodiment, before receiving the short message, the method further includes: and after accessing the mobile communication network, obtaining and recording the second time zone information based on the time synchronization service. The access mobile communication network can be accessed to the mobile communication network for the first time after the terminal is started; further based on the Time synchronization service, as an embodiment, the Time synchronization service may be a Network Identification and Time Zone (NITZ) Time synchronization service, and records Time Zone information in the MMInformation message as the second Time Zone information.
In this embodiment, the received short message includes a timestamp, and the time indicated by the timestamp is time zone information of the short message center, and then the time zone information in the short message is extracted as the first time zone information.
In this embodiment, as a first implementation manner, the determining whether the short message is spam sent by the pseudo base station based on the comparison result includes: and when the comparison result shows that the first time zone information is inconsistent with the second time zone information in the time synchronization service, judging that the short message is junk information sent by the pseudo base station.
As a second embodiment, the determining whether the short message is spam sent by a pseudo base station based on the comparison result includes: and when the comparison result shows that the first time zone information is consistent with the second time zone information in the time synchronization service, judging that the short message is not the junk information sent by the pseudo base station.
Specifically, since the short message center and the access network device of the mobile communication network use the same clock source, the second time zone information recorded when accessing the network should be consistent with the first time zone information carried in the short message. If the short message is issued by a short message center of the mobile communication network, the first time zone information and the second time zone information are kept consistent, and based on a comparison result of the consistency of the first time zone information and the second time zone information, the short message is judged to be not the junk information sent by the pseudo base station, but a normal short message. If the short message is not sent by the short message center of the mobile communication network but sent by the pseudo base station, because the pseudo base station does not simulate the short message center entity, and the time zone carried in the sent short message is not the time zone of the short message center entity in the actual network, the short message is judged to be the junk information sent by the pseudo base station based on the comparison result of the inconsistency of the first time zone information and the second time zone information.
By adopting the technical scheme of the embodiment of the invention, whether the short message is the junk information sent by the pseudo base station is identified by comparing whether the first time zone information in the received short message is consistent with the second time zone information in the time synchronization service, so that the pseudo base station can not construct a clock source which is the same as the access network equipment or the short message center, and the accuracy of junk information identification is greatly improved.
Example two
The embodiment of the invention provides a junk information identification method which is applied to a terminal. Fig. 4 is a flowchart illustrating a spam identification method according to a second embodiment of the present invention; as shown in fig. 4, the method includes:
step 401: and executing a cell switching monitoring process.
Step 402: and when cell switching operation and position updating operation are monitored, receiving a short message and extracting first time zone information in the short message.
Step 403: judging whether the first time zone information is consistent with second time zone information in the time synchronization service, and if so, executing step 404; when the determination result is negative, step 405 is executed.
Step 404: and judging that the short message is not the junk information sent by the pseudo base station.
Step 405: and judging that the short message is junk information sent by the pseudo base station.
In this embodiment, before the performing the cell handover monitoring procedure, the method further includes: and after accessing the mobile communication network, obtaining and recording the second time zone information based on the time synchronization service. The access mobile communication network can be accessed to the mobile communication network for the first time after the terminal is started; further based on the time synchronization service, as an embodiment, the time synchronization service may be a NITZ time synchronization service, which records time zone information in the MMInformation message as the second time zone information.
In this embodiment, after accessing the mobile communication network, a cell handover monitoring procedure is executed, specifically, whether a terminal initiates a cell handover operation and a location update operation is monitored in real time on a wireless channel. And after the cell switching and the position updating are monitored, extracting first time zone information from the received short message.
Because the short message center and the access network device of the mobile communication network adopt the same clock source, the second time zone information recorded when the network is accessed is consistent with the first time zone information carried in the short message. If the short message is issued by a short message center of the mobile communication network, the first time zone information and the second time zone information are kept consistent, and based on a comparison result of the consistency of the first time zone information and the second time zone information, the short message is judged to be not the junk information sent by the pseudo base station, but a normal short message. If the short message is not sent by the short message center of the mobile communication network but sent by the pseudo base station, because the pseudo base station does not simulate the short message center entity, and the time zone carried in the sent short message is not the time zone of the short message center entity in the actual network, the short message is judged to be the junk information sent by the pseudo base station based on the comparison result of the inconsistency of the first time zone information and the second time zone information.
By adopting the technical scheme of the embodiment of the invention, whether the short message is the junk information sent by the pseudo base station is identified by comparing whether the first time zone information in the received short message is consistent with the second time zone information in the time synchronization service, so that the pseudo base station can not construct a clock source which is the same as the access network equipment or the short message center, and the accuracy of junk information identification is greatly improved.
EXAMPLE III
The embodiment of the invention also provides the terminal. Fig. 5 is a schematic diagram of a first structure of a terminal according to an embodiment of the present invention; as shown in fig. 5, the terminal includes: a receiving unit 51, an extracting unit 52, and a comparison and determination unit 53; wherein the content of the first and second substances,
the receiving unit 51 is configured to receive a short message;
the extracting unit 52 is configured to extract the first time zone information in the short message received by the receiving unit 51;
the comparison determination unit 53 is configured to compare whether the first time zone information extracted by the extraction unit 52 and the second time zone information in the time synchronization service are consistent, and determine whether the short message is spam sent by the pseudo base station based on a comparison result.
In one embodiment, the comparison determining unit 53 is configured to determine that the short message is spam sent by a pseudo base station when the comparison result is that the first time zone information and the second time zone information in the time synchronization service do not coincide with each other.
As another embodiment, the comparison determination unit 53 is configured to determine that the short message is not spam sent by a pseudo base station when the comparison result is that the first time zone information and the second time zone information in the time synchronization service are consistent.
Fig. 6 is a schematic diagram of a second structure of the terminal according to the embodiment of the present invention; as shown in fig. 6, the terminal further includes an access unit 54 and a storage unit 55;
the access unit 54 is configured to access a mobile communication network, and obtain second time zone information based on the time synchronization service after accessing the mobile communication network;
the storage unit 55 is configured to record the second time zone information obtained by the accessing unit 54.
Fig. 7 is a schematic diagram of a third structure of the terminal according to the embodiment of the present invention; as shown in fig. 7, the terminal further includes a monitoring unit 56, configured to perform a cell handover monitoring procedure;
the extracting unit 52 is configured to extract the first time zone information in the short message after the monitoring unit 56 monitors a cell switching operation and a location updating operation.
In the embodiment of the present invention, the extracting Unit 52, the comparing and determining Unit 53, and the monitoring Unit 56 in the terminal may be implemented by a Central Processing Unit (CPU), a Digital Signal Processor (DSP), a Micro Control Unit (MCU), or a Programmable Gate Array (FPGA) in the terminal in practical application; the storage unit 55 in the terminal can be implemented by a memory in practical application; the access unit 54 and the sending unit in the terminal can be implemented by a communication module (including a basic communication suite, an operating system, a communication module, a standardized interface, a protocol and the like) and a transceiving antenna in practical application.
It should be noted that: in the terminal provided in the above embodiment, when performing information processing, only the division of each program module is exemplified, and in practical applications, the processing distribution may be completed by different program modules according to needs, that is, the internal structure of the terminal is divided into different program modules to complete all or part of the processing described above. In addition, the terminal and the embodiment of the method for reporting the buffer status provided by the above embodiment belong to the same concept, and the specific implementation process thereof is described in the embodiment of the method for reporting the buffer status, which is not described herein again.
Example four
The embodiment of the invention also provides the terminal. Fig. 8 is a schematic diagram of a hardware composition structure of a terminal according to an embodiment of the present invention, and as shown in fig. 8, the terminal includes: a communication component 63 for data transmission, at least one processor 61 and a memory 62 for storing computer programs capable of running on the processor 61. The various components in the terminal are coupled together by a bus system 64. It will be appreciated that the bus system 64 is used to enable communications among the components. The bus system 64 includes a power bus, a control bus, and a status signal bus in addition to the data bus. For clarity of illustration, however, the various buses are labeled as bus system 64 in fig. 8.
It will be appreciated that the memory 62 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical disk, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic Random Access Memory (SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced Synchronous Dynamic Random Access Memory (ESDRAM), Enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), Synchronous Dynamic Random Access Memory (SLDRAM), Direct Memory (DRmb Access), and Random Access Memory (DRAM). The memory 42 described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
The method disclosed in the above embodiments of the present invention may be applied to the processor 61, or implemented by the processor 61. The processor 61 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 61. The processor 61 described above may be a general purpose processor, a DSP, or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. Processor 61 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present invention. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed by the embodiment of the invention can be directly implemented by a hardware decoding processor, or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the memory 42 and the processor 61 reads the information in the memory 62 and in combination with its hardware performs the steps of the method described previously.
In an exemplary embodiment, the terminal may be implemented by one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), FPGAs, general purpose processors, controllers, MCUs, microprocessors (microprocessors), or other electronic components for performing the aforementioned methods.
In this embodiment, when the processor 61 executes the program, it implements: receiving a short message, and extracting first time zone information in the short message; and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result.
As an embodiment, the processor 61, when executing the program, implements: and when the comparison result shows that the first time zone information is inconsistent with the second time zone information in the time synchronization service, judging that the short message is junk information sent by the pseudo base station.
As an embodiment, the processor 61, when executing the program, implements: and when the comparison result shows that the first time zone information is consistent with the second time zone information in the time synchronization service, judging that the short message is not the junk information sent by the pseudo base station.
As an embodiment, the processor 61, when executing the program, implements: and before receiving the short message, after accessing the mobile communication network, obtaining and recording the second time zone information based on the time synchronization service.
As an embodiment, the processor 61, when executing the program, implements: executing a cell switching monitoring process; and extracting the first time zone information in the short message after monitoring the cell switching operation and the position updating operation.
EXAMPLE five
Embodiments of the present invention further provide a computer storage medium, for example, a memory 62 shown in fig. 8 storing a computer program, which can be executed by a processor 61 of the apparatus to perform the steps of the foregoing method. The computer storage medium can be FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface Memory, optical disk, or CD-ROM; or may be various devices including one or any combination of the above memories.
In this embodiment, a computer storage medium provided in an embodiment of the present invention stores thereon a computer program, and when the computer program is executed by a processor, the computer program executes: receiving a short message, and extracting first time zone information in the short message; and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result.
As an embodiment, the computer program, when executed by the processor, performs: and when the comparison result shows that the first time zone information is inconsistent with the second time zone information in the time synchronization service, judging that the short message is junk information sent by the pseudo base station.
As an embodiment, the computer program, when executed by the processor, performs: and when the comparison result shows that the first time zone information is consistent with the second time zone information in the time synchronization service, judging that the short message is not the junk information sent by the pseudo base station.
As an embodiment, the computer program, when executed by the processor, performs: and before receiving the short message, after accessing the mobile communication network, obtaining and recording the second time zone information based on the time synchronization service.
As an embodiment, the computer program, when executed by the processor, performs: executing a cell switching monitoring process; and extracting the first time zone information in the short message after monitoring the cell switching operation and the position updating operation.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (12)

1. A spam identification method, the method comprising:
receiving a short message, and extracting first time zone information in the short message;
and comparing whether the first time zone information is consistent with second time zone information in time synchronization service, and judging whether the short message is junk information sent by the pseudo base station based on a comparison result.
2. The method of claim 1, wherein the determining whether the short message is spam sent by a pseudo base station based on the comparison result comprises:
and when the comparison result shows that the first time zone information is inconsistent with the second time zone information in the time synchronization service, judging that the short message is junk information sent by the pseudo base station.
3. The method of claim 1, wherein the determining whether the short message is spam sent by a pseudo base station based on the comparison result comprises:
and when the comparison result shows that the first time zone information is consistent with the second time zone information in the time synchronization service, judging that the short message is not the junk information sent by the pseudo base station.
4. The method of claim 1, wherein before receiving the short message, the method further comprises:
and after accessing the mobile communication network, obtaining and recording the second time zone information based on the time synchronization service.
5. The method of claim 1, further comprising: executing a cell switching monitoring process;
correspondingly, the extracting the first time zone information in the short message includes:
and extracting the first time zone information in the short message after monitoring the cell switching operation and the position updating operation.
6. A terminal, characterized in that the terminal comprises: a receiving unit, an extracting unit and a comparing and judging unit; wherein the content of the first and second substances,
the receiving unit is used for receiving the short message;
the extracting unit is configured to extract the first time zone information in the short message received by the receiving unit;
and the comparison and judgment unit is used for comparing whether the first time zone information extracted by the extraction unit is consistent with the second time zone information in the time synchronization service or not and judging whether the short message is junk information sent by the pseudo base station or not based on a comparison result.
7. The terminal according to claim 6, wherein the comparison determining unit is configured to determine that the short message is spam sent by a pseudo base station when the comparison result is that the first time zone information and the second time zone information in the time synchronization service are not consistent.
8. The terminal according to claim 6, wherein the comparison determining unit is configured to determine that the short message is not the spam sent by the pseudo base station when the comparison result is that the first time zone information and the second time zone information in the time synchronization service are consistent.
9. The terminal of claim 6, further comprising an access unit and a storage unit;
the access unit is used for accessing a mobile communication network and obtaining second time zone information based on the time synchronization service after accessing the mobile communication network;
the storage unit is used for recording the second time zone information obtained by the access unit.
10. The terminal according to claim 6, wherein the terminal further comprises a monitoring unit, configured to perform a cell handover monitoring procedure;
the extracting unit is configured to extract the first time zone information in the short message after the monitoring unit monitors a cell switching operation and a location updating operation.
11. A computer storage medium having computer instructions stored thereon, wherein the instructions, when executed by a processor, implement the steps of the spam identification method of any of claims 1 to 5.
12. A terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the spam recognition method of any of claims 1 to 5 when executing the program.
CN201710907200.9A 2017-09-29 2017-09-29 Junk information identification method, terminal and computer storage medium Active CN109587640B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710907200.9A CN109587640B (en) 2017-09-29 2017-09-29 Junk information identification method, terminal and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710907200.9A CN109587640B (en) 2017-09-29 2017-09-29 Junk information identification method, terminal and computer storage medium

Publications (2)

Publication Number Publication Date
CN109587640A CN109587640A (en) 2019-04-05
CN109587640B true CN109587640B (en) 2021-05-04

Family

ID=65914288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710907200.9A Active CN109587640B (en) 2017-09-29 2017-09-29 Junk information identification method, terminal and computer storage medium

Country Status (1)

Country Link
CN (1) CN109587640B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064603A (en) * 2006-04-27 2007-10-31 国际商业机器公司 Short message forwarding method and system, server and short message receiving and transmitting apparatus
CN101730004A (en) * 2009-10-30 2010-06-09 中兴通讯股份有限公司 Method and system for realizing message time treatment
CN101980555A (en) * 2010-10-26 2011-02-23 中兴通讯股份有限公司 Time setting method for mobile terminal and mobile terminal
US20130007142A1 (en) * 2011-06-30 2013-01-03 Jonathan Rosenberg Processing A Message
CN103686989B (en) * 2013-12-05 2017-03-15 华为终端有限公司 Time and the synchronous method and terminal unit in time zone
CN104853328A (en) * 2014-02-17 2015-08-19 南京英锐祺科技有限公司 Digital watermark implementation method based on time stamp
CN106131851A (en) * 2016-08-17 2016-11-16 北京安信创基信息科技有限公司 A kind of flow-type pseudo-base station tracking positioning method and system
CN106332024A (en) * 2016-08-31 2017-01-11 华为技术有限公司 Insecure short message recognition method and related equipment

Also Published As

Publication number Publication date
CN109587640A (en) 2019-04-05

Similar Documents

Publication Publication Date Title
US11201810B2 (en) Data transmission method and apparatus
CN111177165B (en) Method, device and equipment for detecting data consistency
US8838094B2 (en) Acquiring information from volatile memory of a mobile device
US20170126556A1 (en) Information transmission method and apparatus, device and storage medium
CN113225339B (en) Network security monitoring method and device, computer equipment and storage medium
CN107102928A (en) A kind of application crash information uploading method and device
CN111680008A (en) Log processing method and system, readable storage medium and intelligent device
CN102724565B (en) Abnormal signal processing method and device for mobile terminal
CN109587640B (en) Junk information identification method, terminal and computer storage medium
CN112306871A (en) Data processing method, device, equipment and storage medium
CN111194050B (en) Method and device for identifying fault type
CN111010706A (en) Exception recovery method and device
CN111479290A (en) L TE-based dynamic monitoring method, system, server and storage medium
KR102121555B1 (en) Mobile communication apparatus and method for managing diagnosis information thereof
CN107885618B (en) Data monitoring method, device, equipment and storage medium based on network game
CN110888686B (en) Application program starting method, device and storage medium
CN114168947B (en) Attack detection method and device, electronic equipment and storage medium
CN109413596B (en) Method, device, terminal and computer readable storage medium for identifying pseudo base station
CN116662101B (en) Fault restoration method of electronic equipment and electronic equipment
WO2021168654A1 (en) Method and apparatus for detecting synchronized data, server, and data synchronization system
WO2023065901A1 (en) Device identifier acquisition method and apparatus
CN111954073B (en) Method for quickly realizing android set top box production software and related products
CN108770013B (en) Network monitoring method and device
CN110800334B (en) User equipment call detection method and related product
CN110731094B (en) User equipment authentication detection method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant