CN110062385B - Garbage short message shielding method, mobile terminal and readable storage medium - Google Patents

Garbage short message shielding method, mobile terminal and readable storage medium Download PDF

Info

Publication number
CN110062385B
CN110062385B CN201910359978.XA CN201910359978A CN110062385B CN 110062385 B CN110062385 B CN 110062385B CN 201910359978 A CN201910359978 A CN 201910359978A CN 110062385 B CN110062385 B CN 110062385B
Authority
CN
China
Prior art keywords
information
base station
operator
preset
shielding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910359978.XA
Other languages
Chinese (zh)
Other versions
CN110062385A (en
Inventor
赵阳光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhongwang Communication Technology Co ltd
Original Assignee
Shenzhen Zhongwang Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhongwang Communication Technology Co ltd filed Critical Shenzhen Zhongwang Communication Technology Co ltd
Priority to CN201910359978.XA priority Critical patent/CN110062385B/en
Publication of CN110062385A publication Critical patent/CN110062385A/en
Application granted granted Critical
Publication of CN110062385B publication Critical patent/CN110062385B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a garbage short message shielding method, which comprises the following steps: when the first information is received, an information work log of a modem layer is obtained; acquiring an operator of a base station which sends the first information in the information work log, and confirming whether the operator is a preset operator or not; when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length or not; and when the first time length is smaller than a first preset time length, confirming that the first information is the spam short message, and shielding the first information. The invention also discloses a mobile terminal and a readable storage medium. The invention can improve the accuracy and shielding effect of shielding the junk information.

Description

Garbage short message shielding method, mobile terminal and readable storage medium
Technical Field
The present invention relates to the field of mobile terminals, and in particular, to a method for shielding spam messages, a mobile terminal, and a readable storage medium.
Background
The short message is an alphanumeric message that the user directly sends or receives through a cell phone or other telecommunication terminal. The short message can effectively transmit text information, but in recent years, spam short messages are increasingly flooded, which brings trouble to users, and common mobile phones have a spam short message shielding function. However, these spam message shielding methods cannot accurately shield some spam messages, for example: the illegal merchant backs up the miniature pseudo base station, and sends the junk advertisement short messages to all mobile phones covered by the miniature pseudo base station, and the source numbers for sending the junk advertisement short messages can be modified, so that the junk advertisement short messages can not be effectively shielded by a blacklist short message shielding method or a number format attribution screening shielding method, and a good shielding effect can not be achieved.
Disclosure of Invention
The invention mainly aims to provide a spam message shielding method, a mobile terminal and a readable storage medium, which aim to improve the accuracy and the shielding effect of shielding spam messages.
In order to achieve the above purpose, the invention provides a method for shielding spam messages, which comprises the following steps:
When the first information is received, an information work log of a modem layer is obtained;
acquiring an operator of a base station which sends the first information in the information work log, and confirming whether the operator is a preset operator or not;
when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length or not;
and when the first time length is smaller than a first preset time length, confirming that the first information is the spam short message, and shielding the first information.
Optionally, after the step of obtaining the operator of the base station sending the first information in the information work log and confirming whether the operator is a preset operator, the method further includes:
when the operator is confirmed to be a non-preset operator, acquiring the establishment time of the base station in the information work log, and confirming whether the establishment time of the base station is smaller than the preset time;
and when the establishment time of the base station is smaller than the preset time, confirming that the first information is the spam short message, and shielding the first information.
Optionally, after the step of acquiring the time for establishing the base station in the information work log and determining whether the time for establishing the base station is less than the preset time when the operator is determined to be a non-preset operator, the method further includes:
when the establishment time of the base station is confirmed to be longer than the preset time, acquiring operation information corresponding to the first information;
and when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
Optionally, after the step of acquiring the operation information corresponding to the first information when the establishment time of the base station is determined to be greater than the preset time, the method further includes
When the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, confirming that the first information is a spam message, and shielding the first information.
Optionally, after the step of acquiring the operation information corresponding to the first information when the establishment time of the base station is determined to be greater than the preset time, the method further includes
When the state of the first information is the read state, if the second duration of displaying the first information is smaller than the third preset duration, confirming that the first information is junk information, and shielding the first information.
Optionally, after the step of obtaining a first time length when the base station is at the same position in a first preset time period in the information work log and determining whether the first time length is less than a first preset time length when the operator is determined to be a non-preset operator, the method further includes:
when the first time length is confirmed to be longer than a first preset time length, acquiring the times of information transmission of the base station in a second preset time period in the information work log, and confirming whether the times are smaller than preset times or not;
and when the times are confirmed to be smaller than the preset times, confirming that the first information is the spam short message, and shielding the first information.
Optionally, after the step of obtaining the number of times that the base station sends the information in the second preset time period in the information work log when the first time period is confirmed to be longer than the first preset time period and confirming whether the number of times is smaller than the preset number of times, the method further includes:
when the times are confirmed to be larger than the preset times, acquiring operation information corresponding to the first information;
and when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
Optionally, the step of obtaining the operator of the base station sending the first information in the information work log and confirming whether the operator is a preset operator includes:
acquiring an identification code of a base station which sends the first information in the information work log;
and confirming the operator of the base station according to the identification code, and confirming whether the operator is a preset operator or not.
In addition, to achieve the above object, the present invention also provides a mobile terminal including: memory, processor and garbage message shielding program stored in the memory and capable of running on the processor, the garbage message shielding program realizing the steps of the garbage message shielding method when being executed by the processor
In addition, in order to achieve the above object, the present invention also provides a readable storage medium, on which a spam message shielding program is stored, the spam message shielding program implementing the steps of the spam message shielding method described above when executed by a processor.
When receiving the first information, the invention acquires the information work log of the modem layer; acquiring an operator of a base station which sends the first information in the information work log, and confirming whether the operator is a preset operator or not; when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length or not; and when the first time length is smaller than a first preset time length, confirming that the first information is the spam short message, and shielding the first information. By the method, when information is received, the information work log is obtained, the operator of the base station is obtained from the work log, whether the operator is a preset operator is analyzed, when the operator of the base station is a non-preset operator, whether the base station moves frequently is further analyzed through the first time length and the first preset time length of the base station at the same position in the first preset time period, whether the base station is a pseudo base station is confirmed, when the first time length is smaller than the first preset time length, the base station can be confirmed to be the pseudo base station, the information sent by the pseudo base station is confirmed to be a spam message, the received spam message is shielded, and the accuracy and the shielding effect of shielding the spam message can be effectively improved through identifying the pseudo base station.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present invention;
FIG. 3 is a flowchart of a first embodiment of the spam message screening method of the present invention;
fig. 4 is a schematic flow chart of a second embodiment of the spam message screening method of the present invention;
FIG. 5 is a flowchart of a third embodiment of the spam message screening method according to the present invention;
FIG. 6 is a flowchart of a fourth embodiment of the spam message screening method of the present invention;
fig. 7 is a schematic flow chart of a fifth embodiment of a spam message screening method according to the present invention;
fig. 8 is a schematic flow chart of a sixth embodiment of a spam message screening method according to the present invention;
fig. 9 is a schematic flow chart of a seventh embodiment of a spam message screening method according to the present invention;
fig. 10 is a flowchart of an eighth embodiment of the spam message screening method according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present invention, and have no specific meaning per se. Thus, "module," "component," or "unit" may be used in combination.
The terminal may be implemented in various forms. For example, the terminals described in the present invention may include mobile terminals such as cell phones, tablet computers, notebook computers, palm computers, personal digital assistants (Personal Digital Assistant, PDA), portable media players (Portable Media Player, PMP), navigation devices, wearable devices, smart bracelets, pedometers, and fixed terminals such as digital TVs, desktop computers, and the like.
The following description will be given taking a mobile terminal as an example, and those skilled in the art will understand that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for a moving purpose.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention, the mobile terminal 100 may include: an RF (Radio Frequency) unit 101, a WiFi module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal structure shown in fig. 1 is not limiting of the mobile terminal and that the mobile terminal may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be used for receiving and transmitting signals during the information receiving or communication process, specifically, after receiving downlink information of the base station, processing the downlink information by the processor 110; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication, global System for Mobile communications), GPRS (General Packet Radio Service ), CDMA2000 (Code Division Multiple Access, CDMA 2000), WCDMA (Wideband Code Division Multiple Access ), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, time Division synchronous code Division multiple Access), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency Division Duplex Long term evolution), and TDD-LTE (Time Division Duplexing-Long Term Evolution, time Division Duplex Long term evolution), etc.
WiFi belongs to a short-distance wireless transmission technology, and a mobile terminal can help a user to send and receive e-mails, browse web pages, access streaming media and the like through the WiFi module 102, so that wireless broadband Internet access is provided for the user. Although fig. 1 shows a WiFi module 102, it is understood that it does not belong to the necessary constitution of a mobile terminal, and can be omitted entirely as required within a range that does not change the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a talk mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the mobile terminal 100. The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive an audio or video signal. The a/V input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, the graphics processor 1041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 can receive sound (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, and the like, and can process such sound into audio data. The processed audio (voice) data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 101 in the case of a telephone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting the audio signal.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor can turn off the display panel 1061 and/or the backlight when the mobile terminal 100 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for applications of recognizing the gesture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; as for other sensors such as fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured in the mobile phone, the detailed description thereof will be omitted.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. In particular, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1071 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 110, and can receive and execute commands sent from the processor 110. Further, the touch panel 1071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 107 may include other input devices 1072 in addition to the touch panel 1071. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc., as specifically not limited herein.
Further, the touch panel 1071 may overlay the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or thereabout, the touch panel 1071 is transferred to the processor 110 to determine the type of touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 may be integrated with the display panel 1061 to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device can be connected with the mobile terminal 100. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and an external device.
Memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area that may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a storage data area; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 109 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power source 111 (e.g., a battery) for supplying power to the respective components, and preferably, the power source 111 may be logically connected to the processor 110 through a power management system, so as to perform functions of managing charging, discharging, and power consumption management through the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described herein.
Based on the above-mentioned mobile terminal hardware structure, various embodiments of the mobile terminal of the present invention are presented.
Referring to fig. 1, in an embodiment of the mobile terminal of the present invention, the mobile terminal includes: memory 109, processor 110 and a spam message mask program stored on said memory 109 and operable on said processor 110, said spam message mask program when executed by said processor 110 performing the steps of:
when the first information is received, an information work log of a modem layer is obtained;
acquiring an operator of a base station which sends the first information in the information work log, and confirming whether the operator is a preset operator or not;
when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length or not;
And when the first time length is smaller than a first preset time length, confirming that the first information is the spam short message, and shielding the first information.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: after the step of obtaining the operator of the base station sending the first information in the information work log and confirming whether the operator is a preset operator, the method further includes:
when the operator is confirmed to be a non-preset operator, acquiring the establishment time of the base station in the information work log, and confirming whether the establishment time of the base station is smaller than the preset time;
and when the establishment time of the base station is smaller than the preset time, confirming that the first information is the spam short message, and shielding the first information.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: when the operator is confirmed to be a non-preset operator, acquiring the set-up time of the base station in the information work log, and confirming whether the set-up time of the base station is smaller than the preset time, wherein the method further comprises:
when the establishment time of the base station is confirmed to be longer than the preset time, acquiring operation information corresponding to the first information;
And when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: after the step of acquiring the operation information corresponding to the first information when the establishment time of the base station is greater than the preset time, the method further comprises the steps of
When the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, confirming that the first information is a spam message, and shielding the first information.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: after the step of acquiring the operation information corresponding to the first information when the establishment time of the base station is greater than the preset time, the method further comprises the steps of
When the state of the first information is the read state, if the second duration of displaying the first information is smaller than the third preset duration, confirming that the first information is junk information, and shielding the first information.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length, wherein the method further comprises:
when the first time length is confirmed to be longer than a first preset time length, acquiring the times of information transmission of the base station in a second preset time period in the information work log, and confirming whether the times are smaller than preset times or not;
and when the times are confirmed to be smaller than the preset times, confirming that the first information is the spam short message, and shielding the first information.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: when the first time period is confirmed to be longer than the first preset time period, the frequency of the base station sending information in the second preset time period in the information work log is obtained, and whether the frequency is smaller than the preset frequency is confirmed, and after the step of confirming that the frequency is smaller than the preset frequency, the method further comprises the following steps:
When the times are confirmed to be larger than the preset times, acquiring operation information corresponding to the first information;
and when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
Further, the spam message mask program, when executed by the processor 110, further implements the following steps: the step of obtaining the operator of the base station sending the first information in the information work log and confirming whether the operator is a preset operator comprises the following steps:
acquiring an identification code of a base station which sends the first information in the information work log;
and confirming the operator of the base station according to the identification code, and confirming whether the operator is a preset operator or not.
The specific embodiments of the mobile terminal are basically the same as the specific embodiments of the garbage short message shielding method described below, and are not described herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based will be described below.
Referring to fig. 2, fig. 2 is a schematic diagram of a communication network system according to an embodiment of the present invention, where the communication network system is an LTE system of a general mobile communication technology, and the LTE system includes a UE (User Equipment) 201, an e-UTRAN (Evolved UMTS Terrestrial Radio Access Network ) 202, an epc (Evolved Packet Core, evolved packet core) 203, and an IP service 204 of an operator that are sequentially connected in communication.
Specifically, the UE201 may be the terminal 100 described above, and will not be described herein.
The E-UTRAN202 includes eNodeB2021 and other eNodeB2022, etc. The eNodeB2021 may be connected with other eNodeB2022 by a backhaul (e.g., an X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide access from the UE201 to the EPC 203.
EPC203 may include MME (Mobility Management Entity ) 2031, hss (Home Subscriber Server, home subscriber server) 2032, other MMEs 2033, SGW (Serving Gate Way) 2034, pgw (PDN Gate Way) 2035 and PCRF (Policy and Charging Rules Function, policy and tariff function entity) 2036, and so on. The MME2031 is a control node that handles signaling between the UE201 and EPC203, providing bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location registers (not shown) and to hold user specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034 and PGW2035 may provide IP address allocation and other functions for UE201, PCRF2036 is a policy and charging control policy decision point for traffic data flows and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem ), or other IP services, etc.
Although the LTE system is described above as an example, it should be understood by those skilled in the art that the present invention is not limited to LTE systems, but may be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and the communication network system, various embodiments of the method of the present invention are provided.
The invention provides a garbage short message shielding method.
Referring to fig. 3, fig. 3 is a schematic flow chart of a first embodiment of a spam message shielding method according to the present invention, where the method includes:
step S10, when first information is received, an information work log of a modem layer is obtained;
the embodiment of the invention is applied to a mobile terminal, when the mobile terminal receives first information, the first information is updated to an information work log of a modem layer (modem layer), the first mobile terminal acquires the updated information work log of the modem layer through a resident network, the information work log comprises base station information of the first information received by the terminal each time, the base station information is information of a base station which transmits the first information to the terminal, the base station information comprises a base station cell number, a base station operator identification code, establishment time information of the base station, longitude and latitude of a position where the base station is located, duration of the same position where the base station is located and the like, and the information work log can also count according to the number of times of transmitting the same base station to the mobile terminal and sort the base stations according to the number of times.
Step S20, acquiring operators of the base station which sends the first information in the information work log, and confirming whether the operators are preset operators or not;
when the mobile terminal obtains the information work log of the modem layer, the mobile terminal obtains the base station operator for sending the first information in the information work log, and confirms whether the operator of the base station for the first information is a preset operator in the terminal, wherein the preset operator can comprise legal operators such as mobile operators, unicom operators, telecom operators and the like. And confirming whether the operator of the base station is a legal operator such as mobile, communication or telecom.
Step S30, when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length;
confirming whether the operator of the base station of the first information is a preset operator, and further acquiring a first duration of the base station recorded in the information work log when the operator is confirmed to be a non-preset operator, namely, the operator of the base station of the first information is a legal operator of non-mobile, communication or telecommunication, wherein the first duration is recorded in the information work log when the base station is at the same position in a first preset time period, for example: the duration of the base station in the same position in a week, which is recorded in the work log, if the time that the base station appears in the same position in the week is 48 hours, the duration of the base station in the same position (including time) can be simultaneously transmitted to the mobile terminal when the first information is transmitted to the mobile terminal, the mobile terminal records in the information work log when the duration of the base station in the same position is received, or can comprehensively analyze the corresponding position in the information frequency transmitted by the base station, so as to confirm whether the position of the base station is fixed or not, or the base station is in a state of frequent movement.
And confirming whether the first time length is smaller than a first preset time length, comparing the time length of the base station at the same position with the first preset time length, confirming whether the base station is a pseudo base station moving at any time, and increasing the accuracy of identifying whether the first information is the spam message through confirming the pseudo base station.
In the embodiment of the invention, when the operator is a non-preset operator, the mobile terminal acquires operation information corresponding to the first information, monitors operation of a user on the first information, and when the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, that is, the user does not open to read the first information beyond the second preset duration, or when the state of the first information is a read state, if the second duration of the first information is displayed to be less than a third preset duration, that is, the duration of the user opening to read the information is less than the third preset duration, or when the operation information is unopened and the first information is deleted, that is, the user does not open to read the information and directly delete the first information; and confirming that the first information is the spam short message, shielding the first information under the condition that the user does not delete the first information, setting the number of the mobile terminal for transmitting the first information as a blacklist, and shielding the third information transmitted by the number at the current moment of receiving the first information.
Step S40, when the first time length is smaller than a first preset time length, confirming that the first information is a spam message, and shielding the first information.
The mobile terminal confirms whether the first time length is smaller than the first preset time length, when confirming that the first preset time length is smaller than the first preset time length, the mobile terminal can confirm that the position of the base station is in a state of constant movement, and can confirm that the base station is a pseudo base station according to the control characteristics of illegal merchants on the pseudo base station, so that the mobile terminal can confirm that first information sent by the mobile terminal is a junk short message, mask the first information, mark cell codes of the base station and directly mask the next time the information sent by the base station is received.
In the embodiment of the invention, when information is received, an information work log is obtained, an operator of a base station is obtained from the work log, whether the operator is a preset operator or not is analyzed, when the operator of the base station is not the preset operator, the first time length of the base station in the same position in a first preset time period is further confirmed, whether the first time length is smaller than the first preset time length or not is confirmed, whether the attribute of the base station is a pseudo base station or not is confirmed, thereby confirming whether the first information is a junk short message, increasing the accuracy of confirming the first information as the junk short message, effectively shielding the junk information sent by the pseudo base station, solving the problem that the original short message shielding method cannot effectively shield the junk information sent by the pseudo base station, and improving the accuracy and shielding effect of shielding the junk short message.
Further, referring to fig. 4, fig. 4 is a schematic flow chart of a second embodiment of the method of the present invention. Based on the embodiment shown in fig. 2, after step S20, the method may further include:
step S50, when the operator is confirmed to be a non-preset operator, acquiring the establishment time of the base station in the information work log, and confirming whether the establishment time of the base station is smaller than the preset time;
in another embodiment of the present invention, it is determined whether the operator is a preset operator, and when it is determined that the operator is a non-preset operator, that is, the operator is a legal operator such as a non-mobile operator, a communication operator, a telecommunication operator, etc., the set-up time of the base station in the information work log may be further obtained, and it is determined whether the set-up time of the base station is less than the preset time, and it is determined whether the base station has the attribute of a pseudo base station through the set-up time of the base station. And determining whether the first information is the spam message or not through judging the base station.
Step S60, when the establishment time of the base station is smaller than the preset time, confirming that the first information is the spam message, and shielding the first information.
And when the established time is less than the preset time, confirming that the first information is the spam message, shielding the first information, marking the cell code of the base station, and directly shielding when the information sent by the base station is received next time.
In the embodiment of the invention, after the operator of the base station is an illegal operator, whether the base station is a pseudo base station is further confirmed through the establishment time of the base station, when the operator of the base station is an illegal operator and the establishment time of the base station is too short, the base station is confirmed to be a pseudo base station, the first information sent by the base station is a junk short message, and the establishment time of the base station is further analyzed, so that the accuracy of confirming the first information as the junk short message is increased, the junk information sent by the pseudo base station can be effectively shielded, the problem that the junk information sent by the pseudo base station cannot be effectively shielded by the original short message shielding method is solved, and the accuracy and the shielding effect of shielding the junk short message are improved.
Further, referring to fig. 5, fig. 5 is a schematic flow chart of a third embodiment of the spam message shielding method of the present invention. Based on the above embodiment, after step S50, the method may further include:
step S70, when the establishment time of the base station is greater than the preset time, acquiring the operation information corresponding to the first information;
when confirming that the operator of the base station for sending the first information is a non-preset operator, but the set-up time of the base station is longer than the preset time, the base station is possibly a legal other commercial base station, the first information which cannot be confirmed to be sent by the base station is a spam message, the operation information corresponding to the first information can be further obtained, whether the first information is the spam message is confirmed through the operation information of the user, and the accuracy of confirming the first information as the spam message is improved.
Step S80, when the operation information is that the first information is not opened and deleted, if the second information sent by the base station is received, the second information is masked.
And acquiring the operation information corresponding to the first information, when the operation information is acquired as that the first information is not opened by a user and the first information is directly deleted, confirming that the first information sent by the base station is a spam short message, confirming that the base station is a pseudo base station, marking the number of the base station, and shielding the second information sent by the base station according to the mark when the second information sent by the base station is received.
In the embodiment of the invention, when the operators of the base station confirm that the base station is a legal operator such as non-mobile, connected and telecommunication and the set-up time of the base station is longer than the preset time, the base station which cannot accurately confirm that the base station transmits the first information is the pseudo base station, the operation information corresponding to the first information can be further acquired, the base station is confirmed to be the pseudo base station through the corresponding operation information of the user to the first information, and when the operation information is confirmed to be the pseudo base station, the second information transmitted by the base station is shielded, the comprehensiveness of garbage short message judgment and the accuracy of garbage short message confirmation are improved, and meanwhile, the garbage information transmitted by the pseudo base station can be effectively shielded, so that the problem that the original short message shielding method cannot effectively shield the garbage information transmitted by the pseudo base station is solved, the pseudo base station is prevented from bypassing the user by the existing garbage short message shielding method, and the accuracy and the shielding effect of garbage short message shielding are improved.
Further, referring to fig. 6, fig. 6 is a flowchart of a fourth embodiment of the spam message screening method according to the present invention. Based on the above embodiment, after step S70, the method may further include:
step S90, when the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, confirming that the first information is a spam message, and shielding the first information.
When the establishment time of the base station is greater than the preset time, whether the base station is a pseudo base station or not cannot be confirmed, whether the first information is a spam message or not cannot be confirmed, so that operation information corresponding to the first information is further obtained, whether the first information is a spam message or not is confirmed through corresponding operation information of a user on the first information, and when the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, for example: and the second preset time length is 72 hours, when the duration time length after the first information is received reaches 72 hours and the state of the first information is in an unread state, namely, when the mobile terminal acquires that the user does not read the first information for more than 72 hours, the first information is confirmed to be junk information, and the first information is shielded.
In the embodiment of the invention, when the operator of the base station confirms that the base station is a legal operator such as non-mobile, communication and telecommunication and the set-up time of the base station is longer than the preset time, the base station which cannot accurately confirm that the base station transmits the first information is the pseudo base station, the operation information corresponding to the first information can be further acquired, when the duration after receiving the first information reaches the second preset duration, if the state of the first information is in an unread state, namely, the user confirms that the first information is junk information when the second preset duration is exceeded and does not read the first information, and the corresponding processing of the junk information is carried out, so that the comprehensiveness of junk short message judgment and the accuracy of junk short message confirmation are increased.
Further, referring to fig. 7, fig. 7 is a flowchart of a fifth embodiment of the spam message screening method according to the present invention. Based on the above embodiment, after step S70, the method may further include:
step S100, when the state of the first information is the read state, if the second duration of displaying the first information is smaller than the third preset duration, confirming that the first information is junk information, and shielding the first information.
When the establishment time of the base station is greater than the preset time, whether the base station is a pseudo base station or not can not be confirmed, and whether the first information is a spam message or not is confirmed, so that operation information corresponding to the first information is further obtained, whether the first information is a spam message or not is confirmed through the corresponding operation information of the user on the first information, when the state of the first information is a read state, if the second duration of the first information is displayed to be less than a third preset duration, namely, when the second duration of the user reading the first information is less than a third preset duration, for example: and when the third preset duration is 3 seconds and the mobile terminal acquires that the state of the first information is the read state, if the second duration of displaying the first information is less than 3 seconds, namely, the duration of reading the first information by a user is less than 3 seconds, the first information is confirmed to be junk information, and the first information is shielded.
In the embodiment of the invention, when the operator through the base station confirms that the operator is a legal operator such as non-mobile, communication and telecommunication and the set-up time of the base station is longer than the preset time, whether the base station for transmitting the first information is a pseudo base station or not can not be accurately confirmed, the operation information corresponding to the first information can be further acquired, when the state of the first information is the read state, if the second time length for displaying the first information is shorter than the third preset time length, namely, the second time length for reading the first information by a user is shorter than the third preset time length, the first information is confirmed to be junk information, corresponding processing of the junk information is carried out, and the comprehensiveness of junk short message judgment and the accuracy of junk short message confirmation are increased.
Further, referring to fig. 8, fig. 8 is a flowchart of a sixth embodiment of the spam message screening method according to the present invention. Based on the above embodiment, after step S30, the method may further include:
step S110, when the first time length is confirmed to be longer than a first preset time length, acquiring the times of information transmission of the base station in the information work log in a second preset time period, and confirming whether the times are smaller than preset times or not;
when the operator of the base station is confirmed to be a non-preset operator, further acquiring a first time length of the base station at the same position in a first preset time period, confirming whether the first time length is smaller than the first preset time length, and when the first time length is larger than the first preset time length, failing to confirm that the base station is a pseudo base station or failing to confirm that first information sent by the base station is junk information, further integrating other information of the base station to confirm whether the base station is a pseudo base station or not, acquiring the times of the base station sending information in a second preset time period in an information work log, and confirming whether the times are smaller than preset times or not.
And step S120, when the times are confirmed to be smaller than the preset times, confirming that the first information is the spam message and shielding the first information.
And confirming whether the times are smaller than preset times, and shielding the first information after confirming that the first information is the spam short message. For example: the operator of the base station confirms that legal operators such as non-mobile operators, unicom operators and telecom operators are legal operators, the first preset time period is a week, the first preset time period is 3 days, the second preset time period is a month, the preset times are 3 times, when the first time period of the same position in the week of the base station is 4 days and the times of the information transmission of the base station in the month are 4 times, the first information cannot be confirmed to be spam messages, and if the first time period of the same position in the week of the base station is 4 days and the times of the information transmission of the base station in one month are 1 time in the information work log, the first information can be confirmed to be spam messages and the first short messages can be shielded.
In this embodiment, after the operator of the base station is a non-preset operator, when the duration of the base station at the first position in the first preset time period is greater than the first preset time period, further determining whether the first information is a spam message through the number of times that the base station transmits the information in the second preset time period, so that the accuracy and the comprehensiveness of determining that the first information is the spam message are increased, the problem that the original method for shielding the spam message cannot effectively shield the spam message transmitted by the pseudo base station is solved, the problem that the pseudo base station bypasses the existing method for shielding the spam message to bother users is avoided, and the accuracy and the shielding effect of shielding the spam message are improved.
Further, referring to fig. 9, fig. 9 is a flowchart of a seventh embodiment of the spam message shielding method according to the present invention. Based on the above embodiment, after step S110, the method may further include:
step S130, when the times are confirmed to be larger than the preset times, operation information corresponding to the first information is obtained;
when the operator of the base station is confirmed to be a non-preset operator, further acquiring a first time length of the base station at the same position in a first preset time period, confirming whether the first time length is smaller than the first preset time length, and further acquiring the times of information transmission of the base station in a second preset time period in an information work log when the first time length is larger than the first preset time length, and confirming whether the times are smaller than preset times. When the number of times is larger than the preset number of times, the base station cannot be confirmed to be a pseudo base station, the operation information corresponding to the first information can be further acquired, whether the first information is a spam message or not is confirmed through the operation information corresponding to the first information by a user,
and step S80, when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
And acquiring the operation information corresponding to the first information, when the operation information is acquired as that the first information is not opened by a user and the first information is directly deleted, confirming that the first information sent by the base station is a spam short message, confirming that the base station is a pseudo base station, marking the number of the base station, and shielding the second information sent by the base station according to the mark when the second information sent by the base station is received.
In an embodiment, when the obtained operation information is that the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, the first information is confirmed to be a spam message, and the first information is shielded.
In an embodiment, when the acquired operation information is that the state of the first information is a read state, if the second duration of displaying the first information is less than a third preset duration, the first information is confirmed to be junk information, and the first information is shielded.
In the embodiment of the invention, when the operator of the base station confirms that the operator is a legal operator such as non-mobile operator, communication operator and telecommunication operator and the base station is in the same position in the first preset time period, the first time length is longer than the first preset time length, and the number of times that the base station transmits the information in the second preset time period is longer than the preset time number, if the base station cannot be confirmed to be a pseudo base station, the operation information corresponding to the first information can be further acquired, if the user confirms that the base station is the pseudo base station through the operation information corresponding to the first information, when the user confirms that the base station is the pseudo base station, the second information transmitted by the base station is shielded, the judgment comprehensiveness of the spam short message confirmation and the accuracy of the spam short message confirmation are increased, and meanwhile, the problem that the spam information transmitted by the pseudo base station cannot be effectively shielded by the original short message shielding method is solved, the user who bypasses the existing spam short message shielding method by the pseudo base station is avoided, and the accuracy and the shielding effect of the spam short message are improved.
Further, referring to fig. 10, fig. 10 is a schematic flow chart of an eighth embodiment of the spam message shielding method of the present invention. Based on the above embodiment, step S20 may further include:
step S21, the identification code of the base station which sends the first information in the information work log is obtained;
in an embodiment, when the information work log of the modem layer is obtained, the identification code of the base station sending the first information in the information work log is obtained, and the base station devices of legal operators such as mobile operators, unicom operators and telecom operators all have corresponding identification codes, and when the first information is sent to the terminal, the identification code of the base station device sending the first information is recorded in the information work log of the modem layer of the terminal.
Step S22, confirming the operator of the base station according to the identification code, and confirming whether the operator is a preset operator or not.
The operator of the base station is confirmed through the identification code corresponding to the operator, and whether the operator is a preset operator is confirmed after the operator is confirmed, in an embodiment, if the base station identification code for sending the first information cannot be obtained in the information work log of the modem layer, the operator of the base station can be directly confirmed to be not the preset operator.
In the embodiment of the invention, the identification code of the base station can be obtained from the information work log, and after the operator of the base station is confirmed by the identification code, the operator is confirmed whether to be a preset operator or not, so that the technical effect of accurately judging the operator of the base station is achieved.
In the embodiment of the present invention, the values of the preset data, such as the first preset duration, the second preset duration, the third preset duration, the preset time, the first preset time period, the second preset time period, the preset times, and the like, may be set correspondingly according to the needs, and the illustration of the preset data is not intended to limit the scope of the present invention.
The invention also provides a readable storage medium.
The invention stores the garbage short message shielding program on the readable storage medium, and the garbage short message shielding program realizes the steps of the garbage short message shielding method when being executed by a processor.
The method implemented when the spam message shielding program running on the processor is executed may refer to the spam message shielding method embodiment of the present invention, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.

Claims (9)

1. A method for shielding spam messages is characterized by comprising the following steps:
when the first information is received, an information work log of a modem layer is obtained;
acquiring an operator of a base station which sends the first information in the information work log, and confirming whether the operator is a preset operator or not;
when the operator is confirmed to be a non-preset operator, acquiring a first time length when the base stations are at the same position in a first preset time period in the information work log, and confirming whether the first time length is smaller than a first preset time length or not;
when the first time length is confirmed to be smaller than a first preset time length, confirming that the first information is a spam message, and shielding the first information;
when the first time length is confirmed to be longer than a first preset time length, acquiring the times of information transmission of the base station in a second preset time period in the information work log, and confirming whether the times are smaller than preset times or not;
and when the times are confirmed to be smaller than the preset times, confirming that the first information is the spam short message, and shielding the first information.
2. The spam message screening method according to claim 1, wherein after the steps of obtaining the operator of the base station that sends the first information in the information work log and confirming whether the operator is a preset operator, the method further comprises:
When the operator is confirmed to be a non-preset operator, acquiring the establishment time of the base station in the information work log, and confirming whether the establishment time of the base station is smaller than the preset time;
and when the establishment time of the base station is smaller than the preset time, confirming that the first information is the spam short message, and shielding the first information.
3. The spam message screening method according to claim 2, wherein, when the operator is determined to be a non-preset operator, the method further comprises, after the step of obtaining the setup time of the base station in the information work log and determining whether the setup time of the base station is less than a preset time:
when the establishment time of the base station is confirmed to be longer than the preset time, acquiring operation information corresponding to the first information;
and when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
4. The spam message screening method as recited in claim 3, wherein after the step of obtaining the operation information corresponding to the first information when the establishment time of the base station is confirmed to be greater than the preset time, the method further comprises
When the duration after receiving the first information reaches a second preset duration, if the state of the first information is an unread state, confirming that the first information is a spam message, and shielding the first information.
5. The spam message screening method as recited in claim 4, wherein after the step of obtaining the operation information corresponding to the first information when the establishment time of the base station is confirmed to be greater than the preset time, the method further comprises
When the state of the first information is the read state, if the second duration of displaying the first information is smaller than the third preset duration, confirming that the first information is junk information, and shielding the first information.
6. The spam message screening method according to claim 1, wherein, after the step of obtaining the number of times the base station transmits information in the second preset time period in the information work log and determining whether the number of times is smaller than a preset number of times when the first time period is determined to be longer than a first preset time period, the method further comprises:
when the times are confirmed to be larger than the preset times, acquiring operation information corresponding to the first information;
And when the operation information is that the first information is not opened and deleted, shielding the second information if the second information sent by the base station is received.
7. The spam message screening method according to any one of claims 1 to 6, wherein the step of obtaining the operator of the base station that sends the first information in the information work log and confirming whether the operator is a preset operator includes:
acquiring an identification code of a base station which sends the first information in the information work log;
and confirming the operator of the base station according to the identification code, and confirming whether the operator is a preset operator or not.
8. A mobile terminal, the mobile terminal comprising: memory, a processor and a spam message masking program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the spam message masking method of any one of claims 1 to 7.
9. A computer readable storage medium, wherein a spam message masking program is stored on the computer readable storage medium, which when executed by a processor implements the steps of the spam message masking method of any one of claims 1 to 7.
CN201910359978.XA 2019-04-28 2019-04-28 Garbage short message shielding method, mobile terminal and readable storage medium Active CN110062385B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910359978.XA CN110062385B (en) 2019-04-28 2019-04-28 Garbage short message shielding method, mobile terminal and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910359978.XA CN110062385B (en) 2019-04-28 2019-04-28 Garbage short message shielding method, mobile terminal and readable storage medium

Publications (2)

Publication Number Publication Date
CN110062385A CN110062385A (en) 2019-07-26
CN110062385B true CN110062385B (en) 2023-06-02

Family

ID=67321818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910359978.XA Active CN110062385B (en) 2019-04-28 2019-04-28 Garbage short message shielding method, mobile terminal and readable storage medium

Country Status (1)

Country Link
CN (1) CN110062385B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104754533A (en) * 2013-12-31 2015-07-01 中国移动通信集团公司 Short message intercepting method, device and terminal
CN106559761A (en) * 2015-09-28 2017-04-05 中国移动通信集团公司 A kind of information processing method and terminal, server
CN106686562A (en) * 2016-11-29 2017-05-17 中国移动通信集团江苏有限公司 Method for processing links in short messages sent by pseudo base station, device and server
CN107295489A (en) * 2017-06-28 2017-10-24 百度在线网络技术(北京)有限公司 Pseudo-base station note recognition methods, device, equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104902482A (en) * 2014-03-04 2015-09-09 中国移动通信集团江苏有限公司 Method and device for achieving pseudo base station detection
CN105578430A (en) * 2015-12-16 2016-05-11 努比亚技术有限公司 Mobile terminal, and method for identifying pseudo base station short messages
CN106231572A (en) * 2016-07-29 2016-12-14 宇龙计算机通信科技(深圳)有限公司 Pseudo-base station refuse messages discrimination method and system
CN106255119A (en) * 2016-09-13 2016-12-21 宇龙计算机通信科技(深圳)有限公司 Pseudo-base station message recognition methods and system
CN108271127A (en) * 2016-12-30 2018-07-10 中国移动通信集团公司 Pseudo-base station note knows method for distinguishing and terminal
CN107172622B (en) * 2017-07-21 2021-03-09 北京奇虎科技有限公司 Method, device and system for identifying and analyzing pseudo base station short message
CN109495891B (en) * 2017-09-13 2021-11-12 中兴通讯股份有限公司 Pseudo base station identification method, apparatus and computer readable storage medium
CN109548028B (en) * 2017-09-21 2021-05-14 腾讯科技(深圳)有限公司 Base station type identification method, device, terminal and computer readable storage medium
CN109275146A (en) * 2018-10-25 2019-01-25 努比亚技术有限公司 A kind of pseudo-base station detection method, terminal and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104754533A (en) * 2013-12-31 2015-07-01 中国移动通信集团公司 Short message intercepting method, device and terminal
CN106559761A (en) * 2015-09-28 2017-04-05 中国移动通信集团公司 A kind of information processing method and terminal, server
CN106686562A (en) * 2016-11-29 2017-05-17 中国移动通信集团江苏有限公司 Method for processing links in short messages sent by pseudo base station, device and server
CN107295489A (en) * 2017-06-28 2017-10-24 百度在线网络技术(北京)有限公司 Pseudo-base station note recognition methods, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110062385A (en) 2019-07-26

Similar Documents

Publication Publication Date Title
CN109195143B (en) Network access method, mobile terminal and readable storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN107807767B (en) Communication service processing method, terminal and computer readable storage medium
CN109195213B (en) Mobile terminal screen control method, mobile terminal and computer readable storage medium
CN109144705B (en) Application management method, mobile terminal and computer readable storage medium
CN107862217B (en) Position information acquisition method, mobile terminal and computer storage medium
CN107547741B (en) Information processing method and device and computer readable storage medium
CN109753210B (en) Information display method of mobile terminal, mobile terminal and readable storage medium
CN109584897B (en) Video noise reduction method, mobile terminal and computer readable storage medium
CN108958936B (en) Application program switching method, mobile terminal and computer readable storage medium
CN110113779B (en) eSIM card testing method, system and medium
CN109040468A (en) Incoming display method, device and computer readable storage medium
CN109495376B (en) Group message screening method, mobile terminal and computer readable storage medium
CN109545120B (en) Screen light sensor adjusting method, mobile terminal and computer readable storage medium
CN109522276B (en) Application icon management method, terminal and computer-readable storage medium
CN107347114B (en) Voice information receiving and sending control method and terminal
CN111970738B (en) Network switching control method, device and computer readable storage medium
CN109948368B (en) Privacy authority control method, device and computer readable storage medium
CN109740121B (en) Search method of mobile terminal, mobile terminal and storage medium
CN109462829B (en) Call transfer method, device and computer readable storage medium
CN110046151B (en) Data cleaning method, server and computer readable storage medium
CN109104722B (en) Terminal access method, device and computer readable storage medium
CN108566476B (en) Information processing method, terminal and computer readable storage medium
CN108040330B (en) WiFi directional transmission method, mobile terminal and readable storage medium
CN107222933B (en) Communication method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230419

Address after: C3-203, Building C, Kexing Science Park, No. 15 Keyuan Road, Science Park Community, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 518057

Applicant after: Shenzhen Zhongwang Communication Technology Co.,Ltd.

Address before: 518057 Dazu Innovation Building, 9018 Beihuan Avenue, Nanshan District, Shenzhen City, Guangdong Province, 6-8, 10-11, 6 and 6-10 floors in Area A, B and C

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant