WO2024027199A1 - Risk identification method and electronic device - Google Patents

Risk identification method and electronic device Download PDF

Info

Publication number
WO2024027199A1
WO2024027199A1 PCT/CN2023/088202 CN2023088202W WO2024027199A1 WO 2024027199 A1 WO2024027199 A1 WO 2024027199A1 CN 2023088202 W CN2023088202 W CN 2023088202W WO 2024027199 A1 WO2024027199 A1 WO 2024027199A1
Authority
WO
WIPO (PCT)
Prior art keywords
risk
electronic device
information
application
call
Prior art date
Application number
PCT/CN2023/088202
Other languages
French (fr)
Chinese (zh)
Inventor
赵晓娜
Original Assignee
荣耀终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 荣耀终端有限公司 filed Critical 荣耀终端有限公司
Publication of WO2024027199A1 publication Critical patent/WO2024027199A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Definitions

  • This application relates to the field of information security, and in particular to risk identification methods and electronic devices.
  • Communication electronic devices such as mobile phones, usually provide a call transfer function. After the user successfully sets the call transfer function on the electronic device, it can meet the user's normal answering needs in certain specific scenarios. For example, when the mobile phone has no network or is turned off, the user can still Answer calls by calling a forwarding number.
  • Embodiments of the present application provide risk identification methods and electronic devices, which can perform risk identification and risk reminders for current operations when the electronic device is triggered and set to some functions or modes that temporarily lose normal contact in the above scenarios, thereby improving the user terminal's security. Information security and property security, and optimize user experience.
  • the embodiments of the present application adopt the following technical solutions.
  • this embodiment provides a risk identification method, applied to a terminal.
  • the method includes: an electronic device receives an operation of a user setting a specific scene, obtains first information, and after obtaining the first information, the electronic device performs the following steps according to the first The information is used to identify risks, and if it is determined that a risk exists, risk warning information is output.
  • specific scenarios may include scenarios where the electronic device is temporarily unable to make normal calls.
  • Specific scenarios include but are not limited to call transfer, do not disturb mode or airplane mode.
  • the first information includes at least one of phone number information and environmental information involved in the specific scene.
  • the phone number information may include the local number and the call transfer number; optionally, the phone number information may also include the terminal identification associated with the local number and the call transfer number.
  • Environmental information may include phone call events, application running events and/or function running events, application download events or application installation events, application interaction events, etc.
  • the phone call event refers to the behavior of the electronic device making a call.
  • Application running events and/or function running events refer to the behavior of an electronic device running an application, and/or the behavior of a specific function being run.
  • Application download matters A software or application installation event refers to an electronic device having application downloading behavior or application installation behavior.
  • Application interaction events refer to receiving prompt messages sent by the application, etc.
  • the electronic device when it detects that a specific scene is triggered, it can obtain the first information generated in the specific scene.
  • the first information includes the environmental information and phone number information involved in the specific scene, thereby
  • the electronic device may determine whether there is a risky operation in the current environment based on the first information.
  • risk warning information is output in a timely manner and the setting operation of a specific scenario is suspended.
  • This achieves effective identification and risk warning of risky operations in specific scenarios, provides users with effective risk reminders, and reduces the risk to a certain extent. It increases the probability of users performing risky operations and enhances users’ information security and property security.
  • it prevents the conduct of risky operations and avoids the occurrence of risky operations. It also avoids to a certain extent the situation where the electronic equipment used by users is used by specific users, and prevents specific users from using the electronic equipment used by users to hinder or interfere with the work of staff. Issues with early warning work.
  • the phone number information at least includes the call transfer number
  • the electronic device performs risk identification based on the first information, including: if the call transfer number is determined If it is not a safe number, then there is definitely a risk.
  • the judgment conditions for determining that the call forwarding number is a secure number include one or more of the following: determining that the call forwarding number is the local SIM card number; determining that the call forwarding number is in local communication is being recorded; make sure the call forwarding number is in the preset white list; make sure the owner information of the call forwarding number is the same as the owner information of the local number.
  • the call forwarding number satisfies at least one of the above judgment conditions, it is determined that the call forwarding number is a security number; otherwise, it is determined that the call forwarding number is not a security number.
  • the electronic device can send a query request to the server to obtain the owner information of the local number and the owner information of the call forwarding number to determine that the owner information of the call forwarding number is the same as the owner information of the local number.
  • determining that the owner information of the call forwarding number is the same as the owner information of the local number includes: sending a first query request carrying the first identifier and the call forwarding number to the server. ;
  • the first identification is used to indicate the local number of the terminal;
  • the first query request is used to instruct the server to query the local owner information and the call transfer owner information based on the first identification and the call transfer number; receive the local ownership returned by the server;
  • the first query response between the owner information and the call transfer owner information if it is determined that the owner information of the local machine matches the call transfer owner information successfully, it is determined that the owner information of the call transfer number is the same as the owner information of the local number.
  • the electronic device can also directly obtain the matching result from the server to determine that the owner information of the call forwarding number is the same as the owner information of the local number.
  • determining that the owner information of the call forwarding number is the same as the owner information of the local number includes: sending a second query request carrying the first identifier and the call forwarding number to the server. ;
  • the first identifier is used to indicate the local number of the terminal;
  • the second query request is used to instruct the server to determine the matching result of the owner information of the local number and the owner information of the call forwarding number;
  • the third query request carrying the matching result returned by the receiving server 2.
  • Query response if the matching result is determined to be successful, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
  • the first identification may be an Internet protocol address (IP address) of the terminal, an international mobile subscriber identity (IMSI) of the terminal, or other identification that can be associated with the local number.
  • IP address Internet protocol address
  • IMSI international mobile subscriber identity
  • the server may directly extract the identification corresponding to the electronic device, such as the IP address, when establishing a network layer connection with the electronic device.
  • the server can determine the local number associated with the first identification according to the first identification.
  • the electronic device performs risk identification from the perspective of determining whether the call transfer number is a safe number.
  • the risk identification judgment of the call transfer number is determined from the security aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
  • the phone number information at least includes the call transfer number
  • the electronic device performs risk identification based on the first information, including: if the call transfer number is determined is a risk number, it is determined that there is a risk.
  • determining that the call transfer number is a risk number includes: determining that the call transfer number is in a preset blacklist; or, determining that the call transfer number is by querying a third-party risk identification platform The numbers are those that have been marked as risky.
  • the risk-marked number may be a risk-marked number locally on the electronic device, or may be a risk-marked number obtained by the electronic device from a third-party risk identification platform.
  • the electronic device can also obtain the risk query result of querying the call forwarding number from the third-party risk identification platform, and determine whether the call forwarding number is a number that has been marked with risk based on the risk query result.
  • the electronic device performs risk identification from the perspective of determining whether the call transfer number is a risk number.
  • the risk identification judgment of the call transfer number is determined from the risk aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
  • the phone number information at least includes the call transfer number
  • the electronic device performs risk identification based on the first information, including: if the call transfer number is determined It is not a safe number, and if it is determined that the call forwarding number is a risk number, it is determined that there is a risk.
  • the electronic device can judge from the two dimensions of security and risk. More accurately and effectively determine the risk of call forwarding numbers.
  • the risk warning information includes content instructing the user to cancel the setting of a specific scenario or to confirm the setting of a specific scenario.
  • the risk identification method also includes: after the electronic device outputs the risk warning information, the electronic device obtains the setting operation triggered by the user, and when the setting operation is to cancel the setting of a specific scene, output a prompt message indicating that the setting failed. To confirm the setting of a specific scene, a prompt message indicating successful setting is output.
  • the electronic device can output to the user the content of a secondary determination of setting a specific scene, perform a secondary determination of the current specific scene setting operation, and while warning the user, also allow the user to continue or cancel.
  • the electronic device when the specific scenario is call transfer, before the above-mentioned electronic device outputs a prompt message indicating that the setting is successful, the electronic device also needs to send a call transfer setting request to the server.
  • the setting request carries a first identifier and a call transfer number.
  • the first identifier is used to indicate the local number of the terminal.
  • the setting request is used to instruct the server to transfer the call of the local number to the terminal based on the local number and the call transfer number. Call the forwarding number and return a setup response to the electronic device after setup is completed. After receiving the setting response returned by the server, the electronic device outputs a prompt message indicating that the setting is successful.
  • the first identifier may be the terminal's Internet protocol address (IP address), the terminal's International Mobile Subscriber Identity (IMSI), or other identifier that can be associated with the local number.
  • IP address Internet protocol address
  • IMSI International Mobile Subscriber Identity
  • the server may directly extract the identification corresponding to the electronic device, such as the IP address, when establishing a network layer connection with the electronic device.
  • the server may determine the local number associated with the first identification according to the first identification.
  • the electronic device needs to communicate with the server so that the server can perform the call forwarding setting operation based on the local number and the call forwarding number.
  • the server After receiving the setting response returned by the server, Output a prompt message indicating that the setting is successful so that the user can clearly know that the call transfer has been set up successfully and optimize the user experience.
  • performing risk identification based on the first information includes: determining whether there is a risky operation at the first moment or within a preset time period before the first moment based on the environmental information.
  • the first moment is the moment when the user's operation to set a specific scene is received.
  • the preset time period before the first time may be 5 minutes, 10 minutes, 30 minutes, etc. before the first time.
  • the electronic device determines that a risky operation exists at the first moment based on the environmental information, or determines that a risky operation exists within a preset time period before the first moment, then the electronic device determines that a risk exists. Based on the different contents included in the environmental information, the risk operations for electronic equipment to identify risks are also different.
  • the environmental information is a phone call event
  • the risk operation includes whether the call number of the phone call event is a risk number, and/or whether the call number of the phone call event is a safe number.
  • the environmental information is a phone call event
  • the electronic device performs risk identification based on the call number involved in the phone call event.
  • the first aspect can be combined to determine whether the call number is a safe number, and whether the call number is a risk number. When it is determined that the call number is not a safe number, and/or it is determined that the call number is a risk number, it is determined that a risky operation exists.
  • performing risk identification on the call number is the simplest and most effective risk identification method. If the electronic device determines that the call number is a risk number, or determines that the call number is not a safe number, or determines that the call number is not a safe number and is a risk number, it directly determines that a risky operation exists in the current environment.
  • the environment information is an application running event and/or a function running event;
  • the risk operation includes running a specific application and/or running a specific function of a specific application.
  • the specific application may be an application with screen sharing or remote control mode, and the corresponding specific function may be enabled in sharing or remote control mode.
  • the specific application may also be a payment application, and the corresponding specific function may be the execution of payment or transfer activities.
  • the electronic device can determine that a specific application is running based on the environment information; or determine that a specific function of a specific application is running, it is determined that a risky operation exists.
  • the electronic device determines that an application in sharing screen mode is running, it determines that a risky operation exists; or if the electronic device determines that it is currently in sharing mode, it determines that a risky operation exists; or if the electronic device determines that an application in sharing screen mode is running And if you are currently in screen sharing mode, it is determined that there is a risky operation.
  • the electronic device determines that a payment application is running, it is determined that a risky operation exists; or if the electronic device determines that a certain payment operation is being performed, it is determined that a risky operation exists; or if the electronic device determines that a payment application is running and If a certain payment operation is being performed, it is determined that there is a risky operation.
  • the electronic device may determine whether to execute the application within a preset time period before the first time based on the execution start time and execution end time of the specific application and/or its specific function. For example, the preset time period before the first moment is 30 minutes before the first moment. If the electronic device determines that the running start time and the running end time of the payment application are both within 30 minutes before the first moment, it is determined that there is a risky operation.
  • the electronic device can directly query the process to determine whether a specific application and/or its specific function is executed at the current moment. For example, if the electronic device directly queries the process and determines that a payment application is running at the current moment, it is determined that a risky operation exists.
  • the electronic device may be remotely controlled and operated by a specific user, or may be induced by a specific user to perform payment operations.
  • the electronic device performs risk identification based on application and/or function running events, which can be done through Determine that a specific application is running and/or a specific function of a specific application is executed at the current moment, or that a specific application has been run and/or a specific function of a specific application has been executed within a preset time period before the first moment, to determine that there is a risk in the current operation, consider The identification of environmental information based on the operational vulnerabilities of electronic equipment is more accurate.
  • the environmental information is an application download event, and the risk operation includes the behavior of downloading the risky application;
  • the environmental information is the application installation event, and the risk operation includes the behavior of installing the risky application.
  • the risk application may be a risk-marked application determined by the electronic device through querying the third-party risk identification platform; it may also be a risk-marked application stored in the electronic device in advance.
  • the electronic device can determine whether the risky application has been downloaded based on the application download event for risk identification; or the electronic device can determine whether to install the risky application based on the application installation event.
  • Risk applications are used for risk identification.
  • the electronic device may determine whether there is an application download or installation behavior at the first moment or within a preset time period before the first moment based on the download start time, download completion time, installation start time, and installation completion time of the application.
  • the electronic device may also query the current process to determine whether there is an application download or installation behavior at the first moment. If it is determined that there is an application downloading behavior or an application installation behavior at the first moment or within the preset time period before the first moment, it is determined based on the risk-marked applications whether the application is a risky application. When the existing application is determined to be a risky application, it is determined that there is a risky operation.
  • the environment information is an application interaction event
  • the risk operation includes receiving a risk reminder message sent by a specific application.
  • the specific application here refers to an application that can identify risks and generate risk prompts.
  • the specific application can be an application with a payment function and a risk identification reminder. If the application detects a risk during the payment process, it will generate risk reminder information and transmit the risk reminder information to the risk identification module of the electronic device.
  • the electronic device can also determine from historical interaction events whether risk prompt information is generated within a preset time period before the first time. If it is determined that risk prompt information is generated within a preset time period before the first time, it is determined that a risky operation exists. Alternatively, if the electronic device receives the risk prompt information generated by the specific application at the first moment, it determines that there is a risky operation.
  • risk identification based on specific application interaction information can quickly and effectively determine whether electronic devices have risks.
  • the environmental information includes one or more of the above events
  • the electronic device can identify risky operations based on a combination of multiple environmental information.
  • the electronic device identifies risky operations based on a variety of environmental information.
  • the identification can be combined from one or more dimensions such as the application dimension, the system dimension, the call dimension, and the interactive information dimension. Considering that the electronic device may be in Complex environments enable more accurate risk identification of current operations.
  • risk identification is carried out based on the first information, including:
  • the risk identification is based on the phone number information and it is determined that there is a risk, and/or if the risk identification is based on the environmental information and it is determined that there is a risk, then it is determined that there is a risk; if the risk identification is based on the phone number and it is determined that there is no risk, and, the risk is based on the environmental information If it is determined that there is no risk, then it is determined that there is no risk.
  • the electronic device can also perform combined risk identification based on the phone number information and environmental information. Only when it is determined that there is currently no risk based on the phone number information and that there is currently no risk based on the environment information, it is finally determined that there is currently no risk. ; In the case where the current risk is determined based on the phone number information and/or the current risk is determined based on the environmental information, the risk is ultimately determined to exist.
  • the risk identification judgment is based on the combination of telephone number information and environmental information, making risk identification more secure and further improving the effectiveness of risk identification.
  • an electronic device including a processor and a display screen;
  • the processor is used to receive the user's operation of setting a specific scene and obtain the first information; perform risk identification based on the first information; if it is determined that there is a risk, output the risk warning information to the display screen; the display screen is used to display the risk warning information.
  • specific scenarios may include scenarios where the electronic device is temporarily unable to make normal calls.
  • Specific scenarios include but are not limited to setting call transfer, setting do not disturb mode, and setting airplane mode.
  • the first information includes but is not limited to number information and environmental information involved in a specific scenario.
  • the number information generally includes a call forwarding number; optionally, the telephone number information may also include a first identifier and a call forwarding number used to indicate the local number.
  • Environmental information may include phone call events, application running events and/or function running events, application download events or application installation events, application interaction events, etc.
  • the phone call event refers to the behavior of the electronic device making a call.
  • Application running events and/or function running events refer to the behavior of an electronic device running an application, and/or the behavior of a specific function being run.
  • An application download event or an application installation event refers to an electronic device having application downloading behavior or application installation behavior.
  • Application interaction events refer to receiving prompt messages sent by the application, etc.
  • the electronic device when it detects that a specific scene is triggered, it can obtain the first information generated in the specific scene.
  • the first information includes the environmental information and number information involved in the specific scene, thereby
  • the electronic device can determine whether there is a risky operation in the current environment based on the first information, and if it is determined that there is a risky operation, timely output the risk warning information and stop the setting operation of the specific scenario, achieving effective identification and identification of risky operations in the specific scenario.
  • Risk warning provides users with effective risk tips, reduces the probability of users performing risky operations to a certain extent, and enhances users' information security and property security. At the same time, it prevents the conduct of risky operations and avoids the occurrence of risky operations. It also avoids to a certain extent the situation where the electronic equipment used by users is used by specific users, and prevents specific users from using the electronic equipment used by users to hinder or interfere with the work of staff. Early warning issues.
  • the phone number information at least includes the call transfer number
  • the processor is configured to determine that the call transfer number is not a safe number if it is determined that there is risk.
  • the judgment conditions for determining that the call forwarding number is a safe number include one or more of the following: determining that the call forwarding number is the local SIM card number; determining that the call forwarding number is in local communication is being recorded; make sure the call forwarding number is in the preset white list; make sure the owner information of the call forwarding number is the same as the owner information of the local number.
  • the electronic device can send a query request to the server to obtain the owner information of the local number and the owner information of the call forwarding number to determine that the owner information of the call forwarding number is the same as the owner information of the local number. Based on this, the above electronic device also includes communication module.
  • the communication module is configured to send a first query request carrying a first identifier and a call transfer number to the server; the first identifier is used to indicate the local number of the terminal;
  • the query request is used to instruct the server to query the owner information of the local machine and the call transfer owner information based on the local number and the call transfer number; receive the first query response returned by the server carrying the owner information of the local machine and the call transfer owner information; if If it is determined that the owner information of the local phone and the call forwarding owner information match successfully, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
  • the electronic device can also directly obtain the matching result from the server to determine that the owner information of the call forwarding number is the same as the owner information of the local number.
  • the communication module is configured to send a second query request carrying the first identifier and the call transfer number to the server; the second query request is used to instruct the server to determine the attribute of the local number.
  • the matching result between the main information and the owner information of the call forwarding number; receiving the second query response carrying the matching result returned by the server; if it is determined that the matching result is successful, then determining the owner information of the call forwarding number and the ownership of the local number
  • the main information is the same.
  • the electronic device performs risk identification from the perspective of determining whether the call transfer number is a safe number.
  • the risk identification judgment of the call transfer number is determined from the security aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
  • the phone number information at least includes the call forwarding number
  • the processor is configured to determine if the call forwarding number is a risk number, risk.
  • determining that the call transfer number is a risk number includes: determining that the call transfer number is in a preset blacklist; or, determining the call transfer number by querying a third-party risk identification platform It is a number that has been marked as a risk.
  • the electronic device performs risk identification from the perspective of determining whether the call transfer number is a risk number.
  • the risk identification judgment of the call transfer number is determined from the risk aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
  • the phone number information at least includes the call forwarding number
  • the processor is configured to determine that the call forwarding number is not a safe number and determine that the call If the transfer number is a risk number, it is determined that there is a risk.
  • the electronic device can judge the risk of the call forwarding number more accurately and effectively from the two dimensions of safety and risk.
  • the risk warning information includes content instructing the user to cancel the setting of a specific scenario or to confirm the setting of a specific scenario.
  • the processor is used to obtain the setting operation triggered by the user.
  • the setting operation is to cancel the setting of a specific scene, output a prompt message of setting failure to the display screen.
  • the setting operation is to confirm the setting of a specific scene, send a message to the display screen.
  • the display screen outputs a prompt message indicating that the setting is successful.
  • the display screen is used to display a prompt message indicating that the setting fails, or to display a prompt message indicating that the setting is successful.
  • the electronic device can output to the user the content of a secondary determination of setting a specific scene, perform a secondary determination of the current specific scene setting operation, and while warning the user, also allow the user to continue or cancel.
  • the communication module is also used to send a call transfer setting request to the server; receive a setting response returned by the server, and feed the setting response back to the processor.
  • the processor is configured to output a prompt message indicating successful setting to the display screen based on the feedback response.
  • the display screen is used to display a prompt message indicating that the setting is successful.
  • the setting request carries a first identifier and a call forwarding number.
  • the first identifier is used to indicate the terminal's local number.
  • the setting request is used to instruct the server to call the local number based on the local number and the call forwarding number. Transfer to the call forwarding number and return a setup answer to the electronic device after setup is complete. After receiving the setting response returned by the server, the electronic device outputs a prompt message indicating that the setting is successful.
  • the electronic device needs to communicate with the server so that the server can perform the call forwarding setting operation based on the local number and the call forwarding number.
  • the server After receiving the setting response returned by the server, Output a prompt message indicating that the setting is successful so that the user can clearly know that the call transfer has been set up successfully and optimize the user experience.
  • the processor is configured to determine whether there is a risky operation at the first moment or within a preset time period before the first moment based on the environmental information.
  • the first moment is the moment when the user's operation to set a specific scene is received.
  • the environmental information is a phone call event
  • the risk operation includes that the call number of the phone call event is a risk number, and/or the call number of the phone call event is not a safe number.
  • performing risk identification on the call number is the simplest and most effective risk identification method. If the electronic device determines that the call number is a risk number, or determines that the call number is not a safe number, or determines that the call number is not a safe number and is a risk number, it directly determines that a risky operation exists in the current environment.
  • the environment information is an application running event and/or a function running event;
  • the risk operation includes the running of a specific application and/or the running of a specific function of a specific application.
  • the electronic device may be remotely controlled and operated by a specific user, or may be induced by a specific user to perform payment operations.
  • the electronic device performs risk identification based on application and/or function running events, which can be done through Determine whether a specific application is running and/or a specific function of a specific application is executed at the current moment, or a specific application has been running and/or a specific function of a specific application has been executed within a preset time period before the first moment, to determine the current
  • risk identification based on application and/or function running events, which can be done through Determine whether a specific application is running and/or a specific function of a specific application is executed at the current moment, or a specific application has been running and/or a specific function of a specific application has been executed within a preset time period before the first moment, to determine the current
  • risk identification of environmental information that takes into account the operational vulnerabilities of electronic equipment is more accurate.
  • the environmental information is an application download event, and the risk operation includes the behavior of downloading and installing risky applications; the environmental information is an application installation event, and the risk operation includes the behavior of installing risky applications.
  • the risk operation includes receiving a risk reminder message sent by a specific application.
  • risk identification based on specific application interaction information can quickly and effectively determine whether electronic devices have risks.
  • the environmental information includes one or more of the above events
  • the electronic device can identify risky operations based on a combination of multiple environmental information.
  • the electronic device identifies risky operations based on a variety of environmental information.
  • the identification can be combined from one or more dimensions such as the application dimension, the system dimension, the call dimension, and the interactive information dimension. Considering that the electronic device may be in Complex environments enable more accurate risk identification of current operations.
  • the processor is configured to determine that a risk exists if it is determined that a risk exists based on the phone number information, and/or if a risk is determined to exist based on the environmental information, and/or it is determined that a risk exists; If the risk identification based on the phone number determines that there is no risk, and the risk identification based on the environmental information determines that there is no risk, then it is determined that there is no risk.
  • the electronic device can also perform combined risk identification based on the phone number information and environmental information. Only when it is determined that there is currently no risk based on the phone number information and that there is currently no risk based on the environment information, it is finally determined that there is currently no risk. ; In the case where the current risk is determined based on the phone number information, and/or the current risk is determined based on the environmental information, the risk is finally determined to exist.
  • the risk identification judgment is based on the combination of telephone number information and environmental information, making risk identification more secure and further improving the effectiveness of risk identification.
  • an electronic device in a third aspect, includes a memory, a display screen, and one or more processors; the memory, the display screen, and the processor are coupled; and a computer program is stored in the memory.
  • Code, the computer program code includes computer instructions, which when executed by the processor, cause the electronic device to perform the method according to any one of the above first aspects.
  • a computer-readable storage medium In a fourth aspect, a computer-readable storage medium is provided. Instructions are stored in the computer-readable storage medium. When the computer-readable storage medium is run on an electronic device, the electronic device can execute any one of the above-mentioned first aspects. method.
  • a fifth aspect provides a computer program product containing instructions that, when run on an electronic device, enables the electronic device to execute the method described in any one of the above first aspects.
  • Figure 1 is a schematic diagram of a scenario in which a specific user sets a call transfer to a specific number in a risk warning scenario provided by an embodiment of the present application;
  • Figure 2A is a schematic diagram of an interface for setting call transfer based on an electronic device interactive interface provided by an embodiment of the present application
  • Figure 2B is a schematic diagram of an interface for setting call transfer based on dialing according to an embodiment of the present application
  • Figure 3 is a schematic diagram of the application environment of a risk identification method provided by the embodiment of the present application.
  • Figure 4A is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application.
  • Figure 4B is a system software architecture diagram of an electronic device provided by an embodiment of the present application.
  • Figure 5 is a flow chart of a risk identification method provided by an embodiment of the present application.
  • Figure 6 is a schematic diagram of a display interface of another electronic device provided by an embodiment of the present application.
  • Figure 7 is a flow chart of another risk identification method provided by an embodiment of the present application.
  • Figure 8 is a flow chart of another risk identification method provided by an embodiment of the present application.
  • Figure 9 is a flow chart of another risk identification method provided by an embodiment of the present application.
  • FIG. 10 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • first and second are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Therefore, features defined as “first” and “second” may explicitly or implicitly include one or more of these features. In the description of this embodiment, unless otherwise specified, “plurality” means two or more.
  • electronic device 1 is an electronic device used by ordinary users
  • electronic device 2 is an electronic device used by specific users
  • electronic device 3 is an electronic device used by staff.
  • the electronic device 1, the electronic device 2, and the electronic device 3 can each be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc.
  • the specific user inducing the ordinary user to set the mobile phone to some specific modes or setting specific functions may include inducing the ordinary user to set the electronic device 1 to transfer the call to a specific number (electronic device 2).
  • the specific number used so that when the staff makes a phone warning to an ordinary user, the call is transferred to the specific number, and the specific user pretends to be an ordinary user to respond to the alert; or the specific user induces the ordinary user to set the electronic device 1 to do not disturb mode, or induce ordinary users to set the electronic device 1 to the mode of rejecting unknown numbers, etc., so that the staff cannot effectively contact ordinary users and hinder the staff's risk warning work for ordinary users.
  • the call forwarding function refers to transferring incoming calls to a set call forwarding number in certain specific scenarios such as being unable to answer the phone or unwilling to answer the phone.
  • Call transfer functions include unconditional call transfer, busy call transfer, no-answer call transfer, user unreachable call transfer, etc.
  • Common call forwarding settings Including: the first one is to set through the menu provided by the mobile phone interactive interface, please refer to Figure 2A, the user can transfer the call based on different conditions set in the interactive interface 10; the second one is to input human-machine input through the dial pad of the phone application
  • the interface (man-machine-interface, MMI) code is used to perform call transfer settings. Refer to Figure 2B.
  • the user can perform dial-up call transfer settings based on the dial pad interface 20 of the phone application.
  • the dialing mode setting call transfer includes the following. Way:
  • Method 2 To transfer the call when busy, dial **67*called number#.
  • Method 3 To transfer calls without response, dial **61*called number#.
  • Method 4 If the user cannot reach the call transfer, dial **62*called number#.
  • Method 5 Cancel the call forwarding setting and dial ##002#.
  • the reminder information interface may include relevant content indicating whether to prompt the user to unconditionally transfer the call to 137********, and the reminder information interface may include The function controls for confirming the setting of call transfer and canceling the setting of call transfer are shown in the reference interface 21 and include two function button controls of "OK" and "Cancel" to enable the user to confirm the setting call transfer operation or cancel the call transfer operation.
  • the mobile phone After the mobile phone detects the confirmation setting call transfer operation, it sends a call transfer setting request carrying the local number and call transfer number to the operator (server). After the operator (server) responds, the call forwarding setting operation is completed.
  • the electronic device 100 can be understood as a device used by ordinary users. In some risky scenarios, the electronic device 100 can also be understood as a device used by the victim.
  • the electronic device 100 can be a smart phone, a tablet computer, a notebook computer, a desktop computer, or other electronic device that has communication functions, call transfer settings, do not disturb settings, payment functions, etc.
  • the embodiment of the present disclosure does not specify the product type of the electronic device 100 limitations.
  • the server 101 can be a server corresponding to an operator that communicates with electronic devices.
  • the server 101 can be an independent server, a server cluster, or a cloud server.
  • the embodiment of the present disclosure does not make any changes to the product type of the server 101. Specific limitations. It should be noted that the server 101 can provide the electronic device 100 with functions such as telephone number information query and telephone number function setting.
  • the electronic device 100 may send a call forwarding setting request carrying the local number and the call forwarding number to the server 101.
  • the server 101 performs call forwarding settings based on the local number and the call forwarding number, and Return a setting response to the electronic device 100, and the electronic device 100 receives After the setting is answered, prompt information indicating successful call transfer setting is displayed to the user based on the interactive interface.
  • the electronic device 100 can also send an owner query request carrying the local number and the call forwarding number to the server 101.
  • the server 101 obtains the local owner information corresponding to the local number and the call forwarding number based on its own database. transfer the owner information, thereby returning a query response carrying the local owner information and the transferred owner information to the electronic device 100.
  • the electronic device 100 displays the local owner information and the transferred owner information to the user based on the interactive interface. Transfer owner information, etc.
  • the owner information refers to the user's personal information corresponding to the phone number, such as the user's name, the location of the phone number, etc.
  • the electronic device 100 in the embodiment of the present application may be an electronic device installed with a phone application and may be installed with other functional applications.
  • other functional applications may include applications with payment functions, applications with communication functions, applications with functions of managing electronic device systems, applications with functions of remote control of electronic devices, etc.
  • the electronic device can be a portable computer (such as a mobile phone), a tablet computer, a notebook computer, a personal computer (PC), a wearable electronic device (such as a smart watch), augmented reality (AR) ⁇ virtual Reality (virtual reality, VR) equipment, vehicle-mounted computers, etc.
  • AR augmented reality
  • VR virtual reality
  • FIG. 4A shows a structural block diagram of an electronic device (such as the electronic device 100) provided by an embodiment of the present application.
  • the electronic device 100 may include a processor 310, an external memory interface 320, an internal memory 321, a universal serial bus (USB) interface 330, a charging management module 340, a power management module 341, a battery 342, and an antenna 1, Antenna 2, radio frequency module 350, communication module 360, audio module 370, speaker 370A, receiver 370B, microphone 370C, headphone interface 370D, sensor module 380, button 390, motor 391, indicator 392, camera 393, display screen 394, and Subscriber identification module (SIM) card interface 395, etc.
  • SIM Subscriber identification module
  • the sensor module 380 may include a pressure sensor 380A, a gyro sensor 380B, an air pressure sensor 380C, a magnetic sensor 380D, an acceleration sensor 380E, a distance sensor 380F, a proximity light sensor 380G, a fingerprint sensor 380H, a temperature sensor 380J, a touch sensor 380K, and ambient light.
  • the structure illustrated in the embodiment of the present invention does not constitute a limitation on the electronic device 100 . More or fewer components may be included than shown, or some components may be combined, or some components may be separated, or may be arranged differently. The components illustrated may be implemented in hardware, software, or a combination of software and hardware.
  • Processor 310 may include one or more processing units.
  • the processor 310 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), an image signal processor (image signal processor, ISP), a controller, and a memory.
  • application processor application processor
  • GPU graphics processing unit
  • ISP image signal processor
  • controller controller
  • memory e.g., a random access memory
  • video codec digital signal processor
  • DSP digital signal processor
  • NPU neural-network processing unit
  • different processing units can be independent devices or integrated in one or more processors.
  • the above-mentioned controller may be a decision-maker that directs various components of the electronic device 100 to work in coordination according to instructions. It is the nerve center and command center of the electronic device 100.
  • the controller generates operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
  • the processor 310 may also be provided with a memory for storing instructions and data.
  • the memory in the processor 310 is a cache memory that can save instructions or data that have just been used or recycled by the processor 310 . If processor 310 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 310 is reduced, thus improving the efficiency of the system.
  • processor 310 may include an interface.
  • Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, SIM interface, and/or USB interface, etc.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • UART universal asynchronous receiver and transmitter
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • the USB interface 330 can be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc.
  • the USB interface 330 can be used to connect a charger to charge the electronic device 100, and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones to play audio through them. It can also be used to connect other electronic devices, such as AR devices, etc.
  • the interface connection relationships between the modules illustrated in the embodiment of the present invention are only schematic illustrations and do not constitute a structural limitation on the electronic device 100 .
  • the electronic device 100 may adopt different interface connection methods in the embodiment of the present invention, or a combination of multiple interface connection methods.
  • the charge management module 340 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 340 may receive charging input from the wired charger through the USB interface 330 .
  • the charging management module 340 may receive wireless charging input through the wireless charging coil of the electronic device 100 . While the charging management module 340 charges the battery 342, it can also provide power to the electronic device 100 through the power management module 341.
  • the power management module 341 is used to connect the battery 342, the charging management module 340 and the processor 310.
  • the power management module 341 receives input from the battery 342 and/or the charging management module 340, and supplies power to the processor 310, the internal memory 321, the external memory interface 320, the display screen 394, the camera 393, the communication module 360, and the like.
  • the power management module 341 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters.
  • the power management module 341 may also be provided in the processor 310.
  • the power management module 341 and the charging management module 340 can also be provided in the same device.
  • the wireless communication function of the electronic device 100 can be implemented through the antenna 1, the antenna 2, the radio frequency module 350, the communication module 360, the modem, the baseband processor, and the like.
  • Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: a cellular network antenna can be reused as a wireless LAN diversity antenna. In some embodiments, antennas may be used in conjunction with tuning switches.
  • the radio frequency module 350 may provide a communication processing module including solutions for wireless communication such as 2G/3G/4G/5G applied on the electronic device 100 .
  • the radio frequency module 350 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc.
  • the radio frequency module 350 receives electromagnetic waves from the antenna 1, performs filtering, amplification and other processing on the received electromagnetic waves, and transmits them to the modem for demodulation.
  • the radio frequency module 350 can also amplify the signal modulated by the modem and convert it into electromagnetic waves through the antenna 1 for radiation.
  • at least part of the functional modules of the radio frequency module 350 may be disposed in the processor 310 .
  • at least part of the functional modules of the radio frequency module 350 and at least part of the modules of the processor 310 may be provided in the same device.
  • a modem may include a modulator and a demodulator.
  • the modulator is used to modulate the low-frequency baseband signal to be transmitted into a medium-high frequency signal.
  • the demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal.
  • the demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing.
  • the application processor outputs sound signals through audio devices (not limited to speaker 370A, receiver 370B, etc.), or displays images or videos through display screen 394.
  • the modem may be a stand-alone device.
  • the modem may be independent of the processor 310 and may be provided in the same device as the radio frequency module 350 or other functional modules.
  • the communication module 360 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (blue tooth, BT), and global navigation satellites.
  • WLAN wireless local area networks
  • Communication processing module for wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), infrared technology (infrared, IR).
  • GNSS global navigation satellite system
  • FM frequency modulation
  • NFC near field communication
  • IR infrared technology
  • the communication module 360 may be one or more devices integrating at least one communication processing module.
  • the communication module 360 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 310 .
  • the communication module 360 can also receive the signal to be sent from the processor 310, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
  • the antenna 1 of the electronic device 100 is coupled to the radio frequency module 350, and the antenna 2 is coupled to the communication module 360, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global satellite positioning system (satellite based augmentation systems, SBAS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou navigation satellite system (BeiDou navigation satellite system, BDS), quasi-zenith satellite system ( Quasi-Zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • SBAS global satellite positioning system
  • GLONASS global navigation satellite system
  • Beidou navigation satellite system Beidou navigation satellite system
  • BeiDou navigation satellite system BDS
  • quasi-zenith satellite system Quasi-Zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
  • SBAS satellite based augmentation systems
  • the electronic device 100 implements display functions through a GPU, a display screen 394, an application processor, and the like.
  • the GPU is an image processing microprocessor and is connected to the display screen 394 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering.
  • Processor 310 may include one or more GPUs that execute program instructions to generate or alter display information.
  • the display screen 394 is used to display images, videos, etc.
  • the display screen 394 can display an incoming call reminder interface and a voice call interface.
  • the display screen 394 of the electronic device 100 may display a voice call interface including the business information of the first application.
  • Display 394 includes a display panel.
  • the display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light).
  • the electronic device 100 may include 1 or N display screens 394, where N is a positive integer greater than 1.
  • the electronic device 100 can implement the shooting function through an ISP, camera 393, video codec, GPU, display screen, application processor, etc.
  • the ISP is used to process the data fed back by the camera 393. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 393.
  • Camera 393 is used to capture still images or video.
  • the object passes through the lens to produce an optical image that is projected onto the photosensitive element.
  • the photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal.
  • ISP outputs digital image signals to DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other format image signals.
  • the electronic device 100 may include 1 or N cameras 393, where N is a positive integer greater than 1.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
  • Video codecs are used to compress or decompress digital video.
  • Electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
  • MPEG moving picture experts group
  • MPEG2 MPEG2, MPEG3, MPEG4, etc.
  • NPU is a neural network (NN) computing processor.
  • NN neural network
  • Intelligent cognitive applications of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
  • the external memory interface 320 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 100.
  • the external memory card communicates with the processor 310 through the external memory interface 320 to implement the data storage function. Such as saving music, videos, etc. files in external memory card.
  • Internal memory 321 may be used to store computer executable program code, which includes instructions.
  • the processor 310 executes instructions stored in the internal memory 321 to execute various functional applications and data processing of the electronic device 100 .
  • the memory 121 may include a program storage area and a data storage area. Among them, the stored program area can store an operating system, at least one application program required for a function (such as a sound playback function, an image playback function, etc.).
  • the storage data area may store data created during use of the electronic device 100 (such as audio data, phone book, etc.).
  • the memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one disk storage device, a flash memory device, other volatile solid-state storage devices, universal flash storage (UFS), etc. .
  • the electronic device 100 can use the audio module 370, the speaker 370A, the receiver 370B, the microphone 370C, Headphone interface 370D, and application processor implement audio functions. Such as music playback, recording, etc.
  • the audio module 370 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 370 may also be used to encode and decode audio signals. In some embodiments, the audio module 370 may be provided in the processor 310 , or some functional modules of the audio module 370 may be provided in the processor 310 .
  • Speaker 370A also called “speaker” is used to convert audio electrical signals into sound signals.
  • Electronic device 100 can listen to music through speaker 370A, or listen to hands-free calls.
  • Receiver 370B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the voice can be heard by bringing the receiver 370B close to the human ear.
  • Microphone 370C also known as “microphone” and “microphone”, is used to convert sound signals into audio electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 370C with the human mouth and input the sound signal to the microphone 370C.
  • the electronic device 100 may be provided with at least one microphone 370C. In some embodiments, the electronic device 100 may be provided with two microphones 370C, which in addition to collecting sound signals, may also implement a noise reduction function. In some embodiments, the electronic device 100 can also be equipped with three, four or more microphones 370C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
  • the headphone interface 370D is used to connect wired headphones.
  • the headphone interface 370D can be a USB interface 330, or a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA Cellular Telecommunications Industry Association of the USA
  • the buttons 390 include a power button, a volume button, etc.
  • Key 390 may be a mechanical key. It can also be a touch button.
  • the electronic device 100 receives key 390 input and generates key signal input related to user settings and function control of the electronic device 100 .
  • Motor 391 can produce vibration prompts.
  • Motor 391 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback.
  • touch operations for different applications can correspond to different vibration feedback effects.
  • Touch operations acting on different areas of the display screen 394 may also correspond to different vibration feedback effects.
  • Different application scenarios (such as time reminders, receiving information, alarm clocks, games, etc.) can also correspond to different vibration feedback effects.
  • the touch vibration feedback effect can also be customized.
  • the indicator 392 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
  • SIM card interface 395 is used to connect SIM.
  • the SIM card can be connected to or separated from the electronic device 100 by inserting it into the SIM card interface 395 or pulling it out from the SIM card interface 395 .
  • the electronic device 100 can support 1 or N SIM card interfaces, where N is a positive integer greater than 1.
  • SIM card interface 395 can support Nano SIM card, Micro SIM card, SIM card, etc.
  • the same SIM card interface 395 can insert multiple cards at the same time.
  • the types of the plurality of cards may be the same or different.
  • the SIM card interface 395 is also compatible with different types of SIM cards.
  • the SIM card interface 395 is also compatible with external memory cards.
  • the electronic device 100 interacts with the network through the SIM card to implement functions such as calls and data communications.
  • the electronic device 100 employs an eSIM, an embedded SIM card.
  • the eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100 .
  • the software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture.
  • the embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the electronic device Prepare the software structure of 100.
  • FIG. 4B is a software structure block diagram of the electronic device 100 according to the embodiment of the present invention.
  • the layered architecture divides the software into several layers, and each layer has clear roles and division of labor.
  • the layers communicate through software interfaces.
  • the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
  • the application layer can include a series of application packages.
  • the application package may include applications such as camera, gallery, calendar, phone (i.e., the "phone” application in the embodiment of this application), map, navigation, WLAN, Bluetooth, music, video, short message, etc.
  • applications such as camera, gallery, calendar, phone (i.e., the "phone” application in the embodiment of this application), map, navigation, WLAN, Bluetooth, music, video, short message, etc.
  • the application framework layer provides an application programming interface (API) and programming framework for applications in the application layer.
  • API application programming interface
  • the application framework layer includes some predefined functions.
  • the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and a risk identification module.
  • the risk identification module can implement the risk identification method provided in this embodiment by interacting with other modules in the application framework layer, applications in the application layer, databases in the system library, and drivers in the kernel layer. It should be noted that this implementation takes the risk identification module arranged at the application framework layer as an example for explanation. In other embodiments, the risk identification module can be deployed in other layers or implemented by other modules. For example, the function of the risk identification module described in the embodiment of this application can be implemented by a "phone" application or as an independent application. In order to facilitate the description of the overall solution, the following embodiment is introduced by taking the execution subject as the electronic device 100 as an example.
  • a window manager is used to manage window programs.
  • the window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc.
  • Content providers are used to store and retrieve data and make this data accessible to applications. Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc.
  • the view system includes visual controls, such as controls that display text, controls that display pictures, etc.
  • a view system can be used to build applications.
  • the display interface can be composed of one or more views.
  • the dial pad interface 20 and the prompt information interface 21 are shown in Figure 2B.
  • the dial pad interface 20 can display a "dial pad", a view of the called number, a "dial” icon, and other functionalities. The view of the control.
  • the phone manager is used to provide communication functions of the electronic device 100 .
  • call status management including connected, hung up, etc.
  • the resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc.
  • the notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction.
  • the notification manager is used to notify download completion, message reminders, etc.
  • the notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
  • Android runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system.
  • the core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
  • the application layer and application framework layer run in virtual machines.
  • the virtual machine combines the application layer and application
  • the java files of the framework layer are executed as binary files.
  • the virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
  • System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (media libraries), 3D graphics processing libraries (for example: openGL ES), 2D graphics engines (for example: SGL), etc.
  • the surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications.
  • the media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc.
  • the media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc.
  • the 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing.
  • 2D Graphics Engine is a drawing engine for 2D drawing.
  • the kernel layer is the layer between hardware and software.
  • the kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
  • the embodiment of the present disclosure provides a risk For the identification method, see Figure 5.
  • the method flow provided by the embodiment of the present disclosure includes:
  • the specific scenario can be understood as a scenario in which the electronic device 100 is temporarily unable to make a communication connection.
  • the specific scenario may include that the electronic device 100 is in a do not disturb mode, the electronic device 100 is set to call forwarding, and the electronic device 100 is set to reject unknown calls. Then, the electronic device 100 is set to airplane mode, etc.
  • the electronic device 100 can detect whether a specific scene is triggered by monitoring the application process or monitoring the interactive interface. For example, referring to FIG. 2A , the user can set call transfer based on the call transfer menu interactive interface 10, and the electronic device 100 can detect whether the specific scene is triggered by monitoring the user interface. Based on the operation of the interactive interface 10, it is detected whether the setting call transfer operation occurs. For another example, the user can set whether to turn on the Do Not Disturb mode based on the menu setting interactive interface, and the electronic device 100 can detect whether the operation of turning on the Do Not Disturb mode occurs by monitoring the operation of the menu setting interactive interface.
  • the first information may be information generated by the electronic device 100 when the first moment is detected or within a preset time period before the first moment.
  • the first moment here refers to the moment when a specific scene is triggered.
  • the preset time period can be 5 minutes before the first time, 10 minutes before the first time, etc.
  • the first information, the number information in the first information, and the environmental information in the first information involved in this embodiment all refer to the first moment or the preset time period before the first moment. The embodiment does not limit this.
  • the first information includes information related to a specific environment.
  • the first information includes number information generated when the specific environment is a call transfer scenario.
  • the first information may also include environmental information generated when the specific environment is setting call transfer, do not disturb mode, etc.
  • the environmental information may be a phone call event, an application running event and/or a function running event, an application download event or an application installation event. , application interaction events, etc. It should be noted that environmental information can be generated in any specific environment, such as setting call forwarding, setting do not disturb mode, setting flight mode, setting rejection of unknown calls, etc.; number information is generated in a specific environment involving number settings. , for example, set up call forwarding, etc.
  • the phone call event refers to the call application of the electronic device 100 being running at the first moment or running within a preset time period before the first moment. If it is determined that the call application is running, the electronic device 100 obtains the call application The generated current call number is used; if it is determined that the call application has been run within the preset time period before the first moment, the electronic device 100 obtains the historical call number generated by the call application.
  • the historical call numbers can be all the peer call numbers within the preset time (such as 10 minutes) before the first moment.
  • the above-mentioned application running event and/or function running event refers to the current running or running of the application in the electronic device 100, and the current running or running of the function corresponding to the application.
  • application A is running at the first moment, or application A has been run within the preset time period before the first moment, or the function corresponding to application A is running at the first moment, or preset before the first moment Assume that the function corresponding to application A has been run within the duration.
  • the electronic device 100 can determine whether an application is running or is in a certain functional mode by querying the current process.
  • the electronic device can also determine whether the application has been run or the electronic device 100 has been in a certain functional mode within a preset time period before the first time based on information such as the running start time and running end time of the application or function.
  • the last running start time of application A is 17:38 on June 16, 2022
  • its last running end time is 17:50 on June 16, 2022
  • the first time is 17:52 on June 16, 2022
  • the default duration before the first moment is 30 minutes before the first moment.
  • application A ran 30 minutes before the first moment. It should be noted that if an application only has the last running start time but no last running end time, it can also mean that the application is running.
  • the app can run in the foreground, and the app can also run in the background.
  • the electronic device 100 can also obtain application and/or function running events from the log corresponding to each application.
  • an interaction strategy between each application and the risk identification module of the electronic device 100 can also be agreed upon.
  • the interaction strategy is specifically expressed as sending a request to the risk identification module when the application starts running or ends running, and/or when the function of the application is turned on or off.
  • the corresponding operation time and operation type of the operation are sent, so that the risk identification module summarizes and obtains application running events and/or function running events based on this information.
  • the above-mentioned application download event or application installation event refers to that the application in the electronic device 100 is being downloaded or installed, or that the application has completed downloading or installation.
  • the electronic device 100 may determine whether an application is being downloaded or installed by querying the current process.
  • the electronic device may determine whether an application is being downloaded or installed based on the download start time and end time, and the installation start time and end time of the application.
  • the electronic device may determine whether an application has been downloaded or installed within a preset time period before the first time based on the download start time and end time, and the installation start time and end time of the application.
  • the above-mentioned application interaction event refers to the interaction generated by the application feeding back information to the risk identification module of the electronic device 100.
  • an application with risk identification and reminder can generate risk prompt information and send it to In the risk identification module of electronic equipment.
  • the electronic device 100 can detect in real time whether interaction information with the application is generated, and thereby identify risky operations based on the interaction information.
  • the first information may include a call forwarding number, or the first signal may include the local number and the call forwarding number, or the first information may include a number indicating the local number.
  • the first identifier may be the terminal's IP address, IMSI, or other identifier that can be associated with the local number.
  • the electronic device 100 can send a call forwarding setting request carrying a first identification and a call forwarding number to the server.
  • the server can determine the local number of the electronic device 100 based on the first identification, thereby based on the local number.
  • the number and call forwarding number set the call forwarding function of the local number in the electronic device 100 .
  • the first identification is used to enable the server to determine the number associated with it.
  • the first information in the setting request sent by the electronic device 100 to the server only contains the call forwarding number.
  • the server can directly extract the identification corresponding to the electronic device, such as the IP address, when establishing a network layer connection with the electronic device. To determine the corresponding local number.
  • the first information may also include other information that can provide risk identification for the electronic device 100, which is not limited in this embodiment.
  • the electronic device 100 performs risk identification of the current operation based on the first information, and determines whether the electronic device 100 has a risky operation.
  • the risk identification of the current operation performed by the electronic device 100 based on the first information includes multiple aspects:
  • the obtained first information at least includes a call forwarding number.
  • the electronic device 100 can determine whether the call forwarding number is a security number.
  • the security number can be understood as a number in a preset white list in the electronic device 100, or a number in the address book of the electronic device 100, or a number in the electronic device 100.
  • the electronic device 100 determines that the call forwarding number is a safe number based on the above conditions, it determines that the current operation does not involve a risky operation; if it determines that the call forwarding number is not a safe number, it determines that the current operation involves a risky operation. For another example, the electronic device 100 can also determine whether the call forwarding number is a risk number.
  • the risk number may include a number in a blacklist in the electronic device 100 or a risk number marked by a third-party risk identification platform.
  • the electronic device 100 determines that the call forwarding number is a risk number based on the above conditions, it determines that the current operation involves a risky operation; if it determines that the call forwarding number is not a risk number, it determines that the current operation does not involve a risky operation.
  • the first information may include a call forwarding number, or a local number and a call forwarding number, or a first identification associated with the local number and a call forwarding number.
  • the electronic device 100 may send an owner information query request carrying the first information to the server, so that the server can query the owner information based on the first information.
  • a query response carrying the owner information of the local number and the call forwarding number is returned to the electronic device 100 .
  • the electronic device 100 compares the received owner information of the local number and the owner information of the call forwarding number.
  • the electronic device 100 may also send a comparison result query request carrying the first information to the server, so that the server obtains the owner information of the local number and the owner information of the call forwarding number based on the first information and performs comparison. After obtaining the comparison result of whether the owner information of the local number and the call forwarding number are consistent, a query response carrying the comparison result is returned to the electronic device 100 .
  • the electronic device 100 determines that the received comparison result indicates that the two are consistent, it determines that the current operation does not include a risky operation; if the comparison result indicates that the two are inconsistent, it determines that the current operation includes a risky operation.
  • the electronic device 100 can also make a comprehensive judgment based on the above multiple types of information to determine whether the current operation involves a risky operation.
  • the electronic device 100 may be in any of the above specific scenarios, and the first information it obtains includes environmental information.
  • the electronic device 100 determines whether the current operation is a risky operation based on the environmental information in step S501.
  • the environmental information is a phone call event, and its corresponding risk operation is that the call number is a risk number, and/or the call number is not a safe number.
  • the electronic device 100 determines that a phone call event is generated, it means that the call application is running, or that the call application has been run within a preset time period before the first moment is detected. In this case, taking the call application as "phone” as an example, the electronic device 100 can obtain “phone” The call number of the application. For example, if the "Phone" application is running, the current call number is obtained; if the "Phone” application has been run within the preset time period before the first moment, the historical call number is obtained, or by requesting the "Phone” application.
  • the application obtains its historical call records to determine whether historical calls have occurred within the preset time period before the first moment, so as to obtain the corresponding historical call number.
  • the electronic device 100 performs risk operation identification based on the current call number and/or the historical call number, including determining whether the current call number is a safe number or a risk number, and determining whether the historical call number is a safe number or a risk number.
  • the specific determination is The method is the same as the above one: determine whether the call forwarding number is a safe number or a risk number.
  • the electronic device 100 determines that the historical call number is a safe number, or determines that the historical call number is not a risk number, or determines that the historical call number is both a safe number and not a risk number, it is determined that there is no risky operation. After it is determined that the historical call number is not a safe number, or it is determined that the historical call number is a risk number, or it is determined that the historical call number is both a safe number and a risk number, it is determined whether the current operation contains a risky operation.
  • the electronic device 100 can also obtain the risk identification result of the call application.
  • the call application has the function of risk identification based on the call number.
  • the electronic device 100 sends a query history call number to the call application.
  • the call application performs risk identification on the call number and returns the identification result to the electronic device 100, so that the electronic device 100 determines whether the call number is risky based on the identification result.
  • the environment information is an application running event and/or a function running event
  • the corresponding risk operation refers to the existence of a specific application running, or the existence of a specific application preset before the first moment. has been run within the time period, or there is a specific function of a specific application that is running, or there is a specific function of a specific application that has been run within the preset time period before the first moment.
  • the specific application here can be an application with screen sharing or remote control mode, and its corresponding specific function can be enabled by screen sharing or remote control mode.
  • the specific application can also be a payment application, and the corresponding specific function can be the execution of payment or transfer activities.
  • the specific function may also be a functional mode of the electronic device, for example, the electronic device is in the system do not disturb mode, the system shared desktop mode, or the system remote control mode.
  • the electronic device 100 can determine whether there is a specific application and/or function running event by querying the current process. For example, by querying the current process, the electronic device 100 determines that the electronic device is in the sharing mode through a specific application A with a sharing function, and then determines that the current operation involves a risky operation. For another example, the electronic device 100 determines that a specific application B with a payment function is running by querying the current process, and then determines that the current operation involves a risky operation.
  • the electronic device 100 can also determine whether the specific application has been run within the preset time period before the first time based on the running start time and the running end time of the specific application. If it is determined that the specific application has been run within the preset time period before the first time, If it has been run, it is determined that the current operation contains risky operations.
  • the environment information is an application download event or an application installation event
  • the corresponding risky operation refers to the behavior of downloading or installing a risky application.
  • the electronic device 100 can determine whether the application is a risk application based on the results of real-time query to the three-party risk identification platform; or, the electronic device 100 can also directly obtain the risk application list from the three-party risk identification platform and determine based on the risk application list. Whether the application is a risk application; alternatively, the electronic device can also determine whether the application is a risk application based on a pre-stored locally risk application list.
  • the electronic device 100 can determine whether there is a download or installation of an application at the first moment or within a preset time period before the first moment by querying the current process and the process log. If there is a downloaded or installed application, determine the application. Whether it is a risky application. If it is a risky application, determine whether the current operation exists. Risk operation; if the downloaded or installed application is not a risk application, it is determined that the current operation does not involve a risk operation.
  • the environment information is an application interaction event
  • the corresponding risk operation refers to receiving a risk warning message sent by a specific application.
  • the specific application here can be an application with risk identification and risk prompts.
  • some payment applications ensure the safety of payment operations.
  • these payment applications have risk identification of the payment environment. If the payment application detects risks in its payment environment, , then send a risk reminder message to the risk identification module; for another example, when some communication applications (such as phone calls, text messages, instant messaging software, etc.) detect that the user uses an electronic device to communicate with a risk number or account, they send a risk warning message to the risk identification module.
  • some communication applications such as phone calls, text messages, instant messaging software, etc.
  • Prompt messages for another example, some security management applications (such as Mobile Guard, etc.) send risk prompt messages to the risk identification module when detecting specific risk behaviors on electronic devices. If the risk identification module of the electronic device 100 receives the risk reminder information sent by these specific applications at the first moment or within a preset time period before the first moment, it determines that the current operation contains a risky operation.
  • some security management applications such as Mobile Guard, etc.
  • the interaction strategy has been clearly defined between the risk identification module of the electronic device 100 and the specific application.
  • the specific application determines that there is a risky operation and generates risks. After prompting the information, the risk prompt information will be fed back to the risk identification module based on the interaction strategy, so that the risk identification module performs risk identification operations based on the risk prompt information.
  • the specific interaction strategy can be determined according to the actual situation, and this embodiment does not limit this .
  • Aspect 3 Based on the number information and environmental information in the first information, the electronic device 100 performs corresponding risk identification using the methods provided by aspects 1 and 2 above, thereby determining whether there is a risky operation in the current environment.
  • the way in which the electronic device 100 performs risk identification based on different contents of the first information is not limited to one.
  • the electronic device 100 can combine different risk identification ways, and perform analysis on the current environment according to a certain execution sequence or execution logic.
  • Risk identification if at least one of the multiple risk identification methods indicates that there is a risky operation in the current environment, it is determined that there is a risky operation in the current environment; if multiple risk identification methods all indicate that there is no risky operation in the current environment , it is determined that there are no risky operations in the current environment.
  • the execution logic of multiple risk identification methods is not limited. For example, multiple risk identification methods can all be executed simultaneously and in parallel; some of them can be executed simultaneously and some of them sequentially; or all of them can be executed sequentially. implement. The execution sequence is determined according to actual conditions, and is not limited in this embodiment.
  • the risk warning information indicates that there are risky operations in the current environment, and the purpose is to remind the user to terminate the setting operation of the current specific scenario, or to remind the user of the risk of the setting operation of the current specific scenario.
  • the electronic device 100 may output the risk warning information in a variety of ways.
  • the electronic device 100 can display risk warning information in the current interactive interface.
  • the electronic device detects that setting the call forwarding function is triggered, and the electronic device 100 bases the local number and the call forwarding number 137******** in the first information on , as well as the owner information of the local number and the owner information of the call forwarding number obtained from the server, it is determined that the call forwarding number is a risk number, and the electronic device can display the risk warning information interface 22 based on the current interface 20, please refer to Figure 6 As shown in the figure, the risk warning information interface 22 includes the risk warning information that "the call transfer number 137******** is a risk number".
  • the risk warning information interface 22 may also include the risk warning information of "Please confirm whether to continue setting.”"Calltransfer" is re-determined when the electronic device 100 detects that the user triggers the "cancel" control based on the risk warning information interface 22 In this case, the electronic device 100 cancels the operation of setting call forwarding.
  • the user may also choose to continue setting call forwarding. When the electronic device 100 detects that the user triggers the "OK" control based on the risk warning information interface 22, the electronic device 100 continues to perform the operation of setting call forwarding.
  • the electronic device 100 detects that the do-not-disturb mode is triggered and obtains the first information.
  • the electronic device 100 can determine the current situation based on the environmental information in the first information. If there are risky operations in the environment, the risk warning information interface can be displayed in the current interface.
  • the risk warning information interface can include the reminder "The current operation is risky, please confirm whether to continue" and the content of secondary determination.
  • the risk warning information interface may also include "OK" and "Cancel" controls for triggering the user to confirm and cancel operations.
  • the electronic device 100 detects that the "Cancel” control is triggered, the do not disturb mode is cancelled; If the electronic device 100 detects that the "OK” control is triggered, it continues to perform the operation of setting the do not disturb mode. It should be noted that the user can also directly perform the secondary confirmation or cancellation operation through voice input. This embodiment does not limit the specific implementation method of the user's secondary confirmation or cancellation operation.
  • the electronic device 100 can also output risk warning information in other ways, for example, by outputting risk warning audio through audio output devices such as speakers and earpieces in the electronic device 100.
  • the risk warning audio can be a buzzer, an alarm, etc. , which can also be audio including voice content.
  • the electronic device 100 outputs a risk warning audio, and the voice content of the audio may include "Call forwarding number 137*** ***** is a risk number, please confirm whether to continue setting up call forwarding".
  • the electronic device 100 can also output a prompt interface including confirmation and cancellation on the current interface for the user to confirm again.
  • the risk warning audio prompt is released, and corresponding operations are performed based on the operation triggered by the user.
  • the risk warning audio output through the audio output device is similar, and will not be described in detail in this implementation.
  • other methods may also include the electronic device 100 triggering an identity verification operation and outputting risk warning information through voice or a display interface.
  • the identity verification operation may include performing face recognition based on the current interface of the electronic device, and collecting the collected information. The facial features of the electronic device 100 are matched with the existing facial features in the electronic device 100. If the matching is passed, the risk warning information is output through the voice or display interface.
  • the electronic device 100 can also output the information including confirmation, The cancellation prompt interface is used for the user to confirm again.
  • the risk warning audio prompt is released, and corresponding operations are performed based on the operation triggered by the user; if the electronic device 100 determines that the facial feature matching fails, then It is noted that the electronic device 100 may be in a lost state. At this time, the electronic device 100 may perform a lock screen operation based on the current display interface and force the user to terminate the setting operation of a specific scene.
  • the electronic device 100 may further output information on the current interface that the setting of the specific scene failed.
  • the electronic device 100 detects that the user triggers a cancellation operation, it can output information on the current interface that the call transfer failed to be set; in a specific scenario of setting the do not disturb mode, the electronic device 100 If it is detected that the user triggers the cancellation operation, information indicating that the setting of the do-not-disturb mode failed can be output on the current interface, which is not limited in this embodiment.
  • the electronic device 100 may also perform the following steps:
  • the user can perform the cancellation operation by triggering the cancel control in the interactive interface.
  • the user can also perform the cancellation operation by inputting "cancel” by voice.
  • the user can also double-click the designated keys such as the "home” key and the volume key. Wait for the specified operation to perform the cancellation operation, which is not limited in this embodiment.
  • the electronic device 100 detects the cancellation operation, the electronic device 100 executes terminating the current specific scene while outputting the prompt message of the setting failure, or after outputting the prompt message of the setting failure, or before outputting the prompt message of the setting failure.
  • the electronic device 100 terminates the operation of sending the call forwarding setting request to the server 101; for another example, if the do not disturb mode is currently being set, the electronic device 100 terminates the system.
  • the electronic device 100 is set to operate in the do-not-disturb mode, that is, the electronic device 100 is prohibited from turning on the do-not-disturb mode.
  • the user can perform the secondary determination operation by triggering the determination control in the interactive interface.
  • the user can also perform the secondary determination operation by voice inputting "OK” or “Confirm” or “Continue”.
  • the user can also perform the secondary determination operation by Specific operations such as double-clicking on designated keys such as the "home" key and volume keys are performed to perform a secondary determination operation, which is not limited in this embodiment.
  • the electronic device 100 detects the determination operation, before outputting a prompt message indicating that the setting is successful, the electronic device 100 continues to perform the setting operation of the current specific scenario. For example, if the call transfer is currently being set, the electronic device 100 continues to send a message to the server.
  • the electronic device 100 sends an operation of setting a call transfer request to complete the operation of setting a call transfer; for another example, if the do-not-disturb mode is currently set, the electronic device 100 performs an operation of turning on the do-not-disturb mode.
  • the electronic device can also continue to perform risk identification.
  • the specific scene is successfully set or within a preset time period after the successful setting, if the electronic device determines that there is a risky operation based on the risk identification method, the reminder information is output, and the reminder information is used to remind The user cancels the corresponding specific scene settings.
  • the electronic device can output reminder information on the current interface. For example, if the electronic device detects a risky operation within 10 minutes after the user sets the call transfer function, the electronic device will output reminder information.
  • the reminder information is "The current scene exists.” Risky operation, please cancel the setting of call forwarding function.”
  • the electronic device can also play a voice reminder message, for example, play a voice reminder message of "There are risky operations in the current scene, please cancel the setting of the call transfer function.”
  • the electronic device 100 when the electronic device 100 detects that certain specific scenarios are triggered, it can obtain the first information generated in the specific scenario.
  • the first information includes environmental information corresponding to the specific scenario. or number information, so that the electronic device 100 can determine whether there is a risky operation in the current environment based on the first information, and if it is determined that there is a risky operation, promptly output the risk warning information, suspend the setting operation of the specific scenario, and realize the operation in the specific scenario.
  • Effective identification of risky operations and risk early warning provide users with effective risk reminders, reduce the probability of users performing risky operations to a certain extent, and enhance users' information security and property security. At the same time, it prevents risky operations from occurring and avoids them to a certain extent. The situation where the electronic equipment used by the user is used by a specific user avoids the problem of a specific user using the electronic equipment used by the user to hinder or interfere with the staff's early warning work.
  • the electronic device 100 can perform risk identification on the target number in the number information according to a preset identification method.
  • the preset identification method can include determining whether the target number is a safe number, or determining whether the target number is a risk number. Identification judgments in two dimensions.
  • the safe number here refers to a number that does not have harassment marking or risk marking in the conventional sense, or a custom whitelist number, or a number that has the same owner as the user number; risk number refers to a number that is registered on the user or risk identification platform Numbers marked with risks, or numbers in the preset blacklist, etc.
  • the target number is the call forwarding number.
  • the following descriptions will be made respectively from the dimensions of the electronic device 100 determining whether the target number is a safe number and whether the target number is a risk number.
  • the electronic device 100 determines whether the target number is a safe number, including the following methods:
  • Method 1 The electronic device 100 determines whether the target number is the local SIM card number.
  • the electronic device 100 can directly determine whether the target number is the local number.
  • the electronic device 100 can obtain the local SIM card number information. If the target number is consistent with any number in the local SIM card number information, the target number is considered to be the same. It is a security number; if the target number is inconsistent with all the numbers in the local SIM card number information, the target number is considered not a security number.
  • Method 2 The electronic device 100 determines whether the target number is in the local address book.
  • the electronic device 100 can obtain the local address book information from the local register, or the electronic device 100 can interact with the "Phone" application to obtain the local address book information.
  • the local address book information includes at least one known number marked with a name.
  • the electronic device 100 can match the target number with all known numbers in the local address book. If the matching is successful, that is, there is a known number consistent with the target number in the local address book. , the target number is considered a safe number; if the match fails, that is, there is no known number consistent with the target number in the local address book, the target number is not a safe number.
  • Method 3 The electronic device 100 determines whether the target number is in the white list.
  • the white list can be understood as a list of numbers with higher security that is pre-stored in the electronic device 100. After obtaining the target number, the electronic device 100 matches the target number with the numbers in the white list. If the matching is successful, that is , if there is a number consistent with the target number in the whitelist, the target number is considered to be a safe number; if the matching fails, that is, if there is no number consistent with the target number in the whitelist, the target number is considered not to be a safe number.
  • the whitelist may also be a list of numbers obtained by the electronic device 100 from a third-party platform. After obtaining the target number, the electronic device 100 obtains the whitelist from the third-party platform. After obtaining the whitelist, the electronic device 100 combines the target number with the whitelist. If the match is successful, that is, there is a number consistent with the target number in the white list, the target number is considered a safe number; if the match fails, that is, there is no number consistent with the target number in the white list, It is considered that the target number is not a safe number.
  • Method 4 The electronic device 100 determines whether the owner information of the target number is the same as the owner information of the local number.
  • the electronic device 100 may send a query request carrying the target number to the server 102 to receive a response returned by the server 102 carrying the owner information of the target number, based on the received owner information of the target number and the owner information of the local number.
  • Master information to determine whether the two are consistent.
  • the owner information includes a uniquely identifying number, the user's name, user ID card information and other information. If there is at least one piece of uniquely identifying information in the two owner information If the owner information of the target number is consistent, it is considered that the owner information of the target number is the same as the owner information of the local number, and the target number is a safe number; if any of the two owner information is inconsistent, the owner information of the target number is considered to be the same.
  • the target number is not a safe number.
  • the owner information of the local number can be stored locally on the electronic device, or it can be received by querying the server. The latter method can be to directly carry the local number or instruction in the query request.
  • the first identifier of the local number may also be the first identifier obtained by the server when establishing a network layer connection with the electronic device, etc. The solution of the present invention is not limited to this.
  • the electronic device 100 can also send a query request carrying a first identifier and a target number used to indicate the own number to the server 102, requesting the server 102 to determine the own number based on the first identifier, and the local number and the target number based on the first identifier.
  • the owner information is matched to receive a response carrying the owner information matching result returned by the server 102. If the received owner information matching result is a successful match, it is considered whether the owner information of the target number matches the owner information of the local number.
  • the target number is a safe number; if the received owner information matching result is a match failure, it is considered that the owner information of the target number is different from the owner information of the local number, and the target number is not a safe number. .
  • the electronic device 100 performs the above four methods from the perspective of determining whether the target number is a safe number.
  • the electronic device 100 can perform the four methods in combination.
  • the execution order and execution logic of these methods are not limited and can be based on The actual situation is determined.
  • an implementation method for determining whether the target number is a safe number by combining four methods including:
  • the electronic device 100 obtains the target number.
  • the electronic device 100 determines whether the target number is the local SIM card number; if so, perform S706; if not, perform S703.
  • the above method 1 is used to determine whether the target number is the local SIM card number.
  • the electronic device 100 determines whether the target number is in the local address book; if so, execute S706; if not, execute S704.
  • the above method 2 is used to determine whether the target number is in the local address book.
  • the electronic device 100 determines whether the target number is in the white list; if so, perform S706; if not, perform S705.
  • the above method three is used to determine whether the target number is in the white list.
  • the electronic device 100 determines whether the owner information of the target number is the same as the owner information of the local number. If yes, S706 is executed. If not, S707 is executed.
  • the above method 4 is used to determine whether the owner information of the target number is the same as the owner information of the local number.
  • the electronic device 100 first determines whether the target number is the local SIM card number. If the target number is not the local SIM card number, it is not sure whether the target number is a security number; considering that the electronic device 100 is lost, the SIM card When an unknown number is inserted into the slot, if the target number is the local SIM card number, the target number may not be a safe number, or there may not be multiple SIM cards in the electronic device, or the call forwarding number set by the user may not be a safe number. The SIM card may be inserted into other devices, etc. Therefore, the electronic device 100 can also determine the target number in the local address book and whitelist. If the target number is not in the local address book, the electronic device can continue to determine whether the target number is in the whitelist.
  • the electronic device performs a judgment on the owner information of the target number. If the owner information is determined to be the same, the target number is determined to be a safe number; otherwise, the target number is not safe. Number. If the target number is in the local address book, or the target number is in the whitelist, the target number is determined to be a safe number.
  • the electronic device 100 determines whether the target number is a risk number, including the following methods:
  • Method 5 The electronic device 100 determines whether the target number is in the blacklist.
  • the blacklist can be understood as a list of risky or harassing harassing numbers pre-stored in the electronic device 100. After obtaining the target number, the electronic device 100 matches the target number with the harassing numbers in the blacklist. If they match, If the match is successful, that is, if there is a harassing number consistent with the target number in the blacklist, the target number is considered to be a risk number; if the match fails, that is, if there is no harassing number consistent with the target number in the blacklist, the target number is considered not to be a risk number. .
  • the blacklist may also be a list of risk numbers obtained by the electronic device 100 from a third-party platform. After obtaining the target number, the electronic device 100 obtains the blacklist from the third-party platform. After obtaining the blacklist, the electronic device 100 compares the target number with The risk number in the blacklist is matched. If the match is successful, that is, there is a risk number consistent with the target number in the blacklist, the target number is considered to be a risk number; if the match fails, that is, there is no consistent risk number with the target number in the whitelist. risk number, the target number is considered not to be a risk number.
  • Method 6 The electronic device 100 determines whether the target number is marked as a risk.
  • the electronic device 100 may send a query request information carrying a target number to the server 102 or a third-party risk identification platform to receive a response information returned by the server 102 or a third-party risk identification platform carrying the target number as to whether the target number is marked for risk. Based on the received The response information received determines whether the target number is a risk-marked number. If so, the target number is considered to be a risk number; if it is determined that the target number is not marked for risk, the target number is considered not to be a risk number.
  • the electronic device 100 performs the above-mentioned method five and/or method six from the perspective of determining whether the target number is a risk number.
  • the electronic device 100 may perform method five or method six, or may perform method five and method six in combination.
  • the execution sequence and execution logic of these methods are not limited and can be determined according to the actual situation.
  • an implementation method for determining whether the target number is a risk number by combining multiple methods including:
  • the electronic device 100 obtains the target number.
  • the electronic device 100 determines whether the target number is in the blacklist; if so, perform S805; if not, perform S803.
  • the above method 5 is used to determine whether the target number is in the blacklist.
  • the electronic device 100 determines whether the target number is marked as a risk; if so, perform S805; if not, perform S804.
  • the above-mentioned method six is used to determine whether the target number is marked as a risk.
  • the electronic device 100 first determines whether the target number is in the blacklist. If the target number is in the blacklist, it means that the target number is a risk number. If the target number is not in the blacklist, in order to further determine the target number Security, the electronic device 100 can determine whether the target number is marked as a risk. If the target number is marked as a risk, it is determined that the target number is a risk number. If the target number is not marked as a risk, it means that the target number is not a risk number. .
  • the electronic device 100 can determine the security of the target number by combining the two dimensions of determining whether the target number is a safe number and determining whether the target number is a risk number.
  • the electronic device 100 can determine whether the target number is a safe number based on one or more of the above methods one to four. For example, the electronic device 100 can determine whether the target number is a safe number based on the embodiment provided in Figure 7 , if the target number is a safe number, it is determined that there is no risky operation in the current environment. If the target number is not a safe number, the electronic device 100 determines whether the target number is a risk number based on one or more of the above method five and method six, If the target number is not a risk number, it is determined that there is no risky operation in the current environment; if the target number is a risk number, it is determined that there is a risky operation in the current environment.
  • the electronic device 100 can determine whether the target number is a risk number based on one or more of the above-mentioned method five and method six. For example, the electronic device 100 can determine whether the target number is a risk number based on the embodiment provided in FIG. 8 , if the target number is a risk number, it is determined that a risky operation exists in the current environment. If the target number is not a risk number, the electronic device 100 can determine whether the target number is a safe number based on one or more of the above methods one to four. If If the target number is a safe number, it is determined that there is no risky operation in the current environment. If the target number is not a safe number, it is determined that there is a risky operation in the current environment.
  • the electronic device 100 may determine whether the target number is a safe number based on one or more of the above methods one to four. For example, the electronic device 100 may determine whether the target number is not a safe number based on the embodiment provided in FIG. 7 , or, The electronic device 100 can determine whether the target number is a risk number based on one or more of the above-mentioned method five and method six. For example, the electronic device 100 can determine whether the target number is a risk number based on the embodiment provided in Figure 8.
  • the target number After determining the target number If the number is a safe number or it is determined that the target number is not a risk number, it is determined that there is no risky operation in the current environment; if it is determined that the target number is not a safe number or it is determined If the target number is a risk number, it is determined that there is a risky operation in the current environment.
  • the technical solution of identifying and judging whether there is a risky operation in the current environment based on the target number in the first information can be applied to specific scenarios where the electronic device 100 is set to call transfer, or other situations involving to the specific scenario of number information.
  • the target number is information that can be obtained directly, and the acquisition method is relatively convenient.
  • the electronic device 100 performs risk identification and judgment of the current environment based on the obtained target number, which can be effective and Quickly determine whether the operations in the current environment are risky, so as to provide risk reminders when it is determined that there are risky operations in the current environment, which enhances the user's information security and optimizes the user experience.
  • the risk identification method includes:
  • the electronic device 100 obtains the environment information, and determines based on the environment information whether there is a risky operation at the first moment or within a preset time period before the first moment; wherein the first moment is the moment when the user's operation to set a specific scene is received.
  • the preset time period before the first time may be 5 minutes, 10 minutes, 30 minutes, etc. before the operation time of the specific scene.
  • the environmental information may include different events that occur on the electronic device when the current operation occurs or within a preset time before the current operation occurs.
  • the environment information may be a phone call event, an application and/or function running event, an application download or installation event, an interaction event between the terminal and the application, etc.
  • the electronic device 100 determines whether to preset at the first moment or before the first moment based on the environmental information. Whether there are risky operations within the time period, the following embodiment specifically describes how to identify and judge risky operations.
  • determining whether the electronic device 100 has risky operations includes the following methods:
  • Method 7 If the environment information is an application running event and/or a function running event, the electronic device 100 determines whether there is a risky operation in the current environment based on whether the specific application and/or its corresponding specific function is run.
  • the specific application may be an application with screen sharing or remote control mode, and the corresponding specific function may be enabled by screen sharing or remote control mode.
  • a specific application can also be a payment application, and the corresponding specific function can be the execution of payment or transfer activities.
  • a specific application list may be set in the electronic device 100 in advance. The electronic device 100 can determine whether a specific application is in progress by querying the current process based on the specific application list; accordingly, the electronic device 100 can also determine whether the electronic device 100 is in a specific functional mode of a specific application by querying the current process.
  • the electronic device 100 may also determine whether the specific application is running or whether the specific application has been run within a preset time period before the first time based on the running start time and/or the running end time of the specific application. It should be noted that the application end time will be recorded when the application ends. If there is no end time, it means that the application should be running.
  • the electronic device 100 determines that the specific application A is running by querying the current process, it is determined that the current operation involves a risky operation. Alternatively, if the electronic device 100 determines that the electronic device 100 is in a specific functional mode of the specific application A by querying the current process, it is determined that the current operation involves a risky operation. Alternatively, if the electronic device 100 determines that the specific application A does not have a final execution end time, then determines that the specific application A is running, and determines that a risky operation exists in the current environment.
  • the electronic device 100 determines that the last start time of specific application A is 17:38 on June 16, 2022, the last start time is 17:50 on June 16, 2022, and the electronic device 100 detects the first The time is 17:52 on June 16, 2022. Take the preset time before the first time as 30 minutes as an example. Obviously, the specific application A has been run within 30 minutes before the first time.
  • the current operation contains risky operations; if the electronic device determines that the last start time of specific application A is 10:38 on June 16, 2022, and the last start time is 11:50 on June 16, 2022, obviously , if the specific application A did not run within 30 minutes before the first moment, it is determined that the current operation does not involve risky operations.
  • the above embodiment uses one specific application as an example. If there are multiple specific applications, the judgment will be made based on logic or principles. That is, if it is determined that at least one specific application exists at the first moment or the preset time period before the first moment. If the application is running or has been run before, it is determined that the current operation contains risky operations. If it is determined that no specific application is running and no specific application has been run at the first moment or within the preset time period before the first moment, it is determined that the current operation does not include a risky operation.
  • the specific functions may also include system function modes of the electronic device 100, such as working mode, do not disturb mode, remote control mode, desktop sharing mode, flight mode, silent mode, conference mode, etc. of the electronic device 100.
  • the specific functions here refer to modes that may have risks of information leakage, inability to make calls, and have remote control and communication functions. For example, if the electronic device 100 queries the current process and determines that the remote control mode has been turned on within a preset time period before the first moment, it determines that the current operation involves a risky operation. Alternatively, the electronic device 100 may also determine whether there is a risky operation based on the execution time of a specific function.
  • the start time of the remote control mode is 17:38 on June 16, 2022, and there is no end time, it means that it is still in the remote control mode. In this case, it can also be determined that the current operation is a risky operation. If the start time of the remote control mode is 10:38 on June 13, 2022, the end time is 11:50 on June 13, 2022, and the first time is 17:40 on June 16, 2022, the first time The first 30 minutes are used to detect risky operations. Obviously, although the remote control mode has been turned on, its start time is not within 30 minutes before the detection of a specific scenario being triggered. In this case, it is determined that the current operation does not contain risky operations.
  • these applications with payment functions are generally deployed with a payment software development kit (SDK).
  • SDK payment software development kit
  • the electronic device 100 can also be configured according to each application.
  • the operation log is used to determine whether the payment SDK has been called. If the payment SDK is called at the first moment of detection or within the preset time period before the first moment, it is determined that the current operation is a risky operation.
  • the risk identification module of the electronic device 100 can obtain the running log of each application from the register of each application.
  • the running log mainly records the running data of each application itself, for example, at what time the application obtained what information, and at what time What information was generated, etc.
  • Method 8 If the environmental information is an application download event or an application installation event, the electronic device 100 determines whether there is a risky operation based on whether the risky application is downloaded or whether the risky application is installed.
  • the risk application may be an application with a risk mark, and a list of applications with a risk mark may be set in the electronic device 100 in advance.
  • the electronic device 100 may also obtain the list of applications with a risk mark from a third-party risk identification platform in real time, or , the electronic device 100 can also obtain the risk query results of the application from the third-party risk identification platform in real time, and determine whether the queried application is a risk application based on the risk query results.
  • the electronic device 100 can determine whether an application is being downloaded or installed by querying the current process or by interacting with a specific application (such as an installer application, an application market, or other applications with application distribution functions). application, it is determined whether the application is a risky application.
  • the electronic device 100 may also query the process log or other methods to determine whether there is a behavior of downloading or installing an application within a preset time period before the first moment. If there is a behavior of downloading or installing an application, it is determined whether the application is a risky application. After determining If the application is a risky application, it is determined that the current operation is risky. operate. Alternatively, the electronic device 100 may also determine whether there is a download or installation behavior for an application within a preset time period before the first time based on the download start time, download completion time, installation start time, and installation completion time of each application.
  • the first time is 17:50 on June 16, 2022
  • the preset time before the first time is 30 minutes before the first time
  • the download start time of application C is 17:38 on June 16, 2022.
  • the electronic device 100 determines that application C has a download behavior 30 minutes before the first time, and then performs risk application identification on application C. If application C is in the list of applications with risk marks set in the electronic device 100, or application C is in the The list of applications with risk marks obtained by the third-party risk identification platform, or the electronic device 100 obtains the risk query result of application C from the third-party risk identification platform, and the result shows that application C is a risk application. In these cases, it is determined
  • the current operation involves risky operations.
  • the above embodiments take the behavior of downloading one risky application as an example. If it is determined that there are multiple applications downloading or installing behaviors within the first moment or within the preset time period before the first moment, then multiple applications will be downloaded or installed based on logic or principles. If at least one application is a risky application, it is determined that there is a risky operation in the current operation; if all downloaded or installed applications are not risky applications, it is determined that there is no risky operation in the current environment.
  • Method nine If the environmental information is a phone call event, the electronic device 100 determines whether there is a risky operation based on the call number of the phone call event.
  • the electronic device 100 determines that the call application is running, it obtains the current call number, and performs risk identification on the current call number based on the above method two, three, five and six. If it is determined that the current call number is safe number, and/or, it is determined that the current call number is not a risk number, then it is determined that the current operation does not have a risk operation; if it is determined that the current call number is not a safe number, and/or, it is determined that the current call number is a risk number, then it is determined that the current operation is risky. operate.
  • the electronic device 100 determines that the call application has been run within the preset time period before the first time, it obtains the historical call numbers within the preset time period before the first time, and pairs them one by one based on the above-mentioned method two, method three, method five and method six. Historical call numbers are used for risk identification. If it is determined that all historical call numbers are safe numbers, and/or, it is determined that all historical call numbers are not risky numbers, then it is determined that there is no risk operation in the current operation; if it is determined that at least one historical call number is not safe number, and/or, if it is determined that at least one historical call number is a risk number, it is determined that the current operation involves a risky operation.
  • Method 10 The environmental information is an application interaction event, and the electronic device 100 determines whether the current operation involves a risky operation based on the specific application interaction information.
  • the specific application can be an application with risk identification and risk prompts.
  • the specific application identifies risky operations based on user operations. After determining that there are risky operations and generating risk prompt information, based on the interaction strategy, the specific application generates the risk prompt information. Feedback to the risk identification module. For example, if the risk identification module of the electronic device 100 determines the first moment, or receives risk reminder information sent by a specific application within a preset time period before the first moment, it determines that the current operation involves a risky operation; if the electronic device 100 If the risk identification module does not receive risk reminder information at the first moment and within the preset time period before the first moment, it is determined that there is no risky operation in the current operation.
  • the electronic device 100 obtains environmental information.
  • the electronic device 100 determines that the specific application is running or has been run for a period of time before detecting that the specific scene is triggered; if so, perform S909; if not, perform S903.
  • the above-mentioned method seven can be used to determine that a specific application is running or has been running for a period of time before detecting that a specific scenario is triggered.
  • the electronic device 100 determines whether the call application is running or has been run for a period of time before detecting that the specific scene is triggered. If so, perform S904; if not, perform S905.
  • the electronic device 100 determines whether the current call number or the historical call number is a safe number based on the call information generated by the call application; if so, perform S905; if not, perform S909.
  • the above-mentioned method nine can be used to determine whether the current call number or historical call number is a safe number.
  • the electronic device 100 determines that the risky application is being downloaded or installed, or has been downloaded or installed a period of time before detecting that the specific scene is triggered; if so, perform S909; if not, perform S906.
  • the above-mentioned method eight can be used to determine that the risky application is being downloaded or installed, or has been downloaded or installed a period of time before it is detected that a specific scenario is triggered.
  • the electronic device 100 determines whether the risk mode is turned on at the current moment when the specific scene is detected to be triggered or a period of time ago; if so, perform S909; if not, perform S907.
  • the above-mentioned method seven can be used to determine whether the risk mode is turned on at the current moment or a period of time before a specific scene is detected to be triggered.
  • the above-mentioned method ten can be used to determine whether risk reminder information is received at the current moment or a period of time before a specific scene is detected to be triggered.
  • the technical solution of identifying and judging whether there is a risky operation in the current environment based on the environmental information in the first information can be applied to any specific scenario setting scenario, for example, electronic equipment 100 is set to a specific scenario of call forwarding, or the electronic device 100 is set to do not disturb mode, or the electronic device 100 is set to airplane mode, or the electronic device 100 is set to reject unknown calls mode, etc., or other things that may cause the electronic device 100 to temporarily Scenario where communication capability is lost.
  • the electronic device 100 based on the environment information, the electronic device 100 successively determines whether a specific application is opened or running at the current moment or a period of time before the specific scene is detected to be triggered.
  • the call information determines whether there is a call between the electronic device and the risk number, determines whether the risk application has been downloaded or installed, whether the risk mode is turned on in the system, and whether risk warning information is generated. Risk identification and judgment are carried out in all aspects and multiple dimensions. Determine whether there are risky operations in the current environment, and further improve the effectiveness and accuracy of risk identification based on environmental information.
  • aspect one provides a method for identifying the risk of a number based on the number information in the first information.
  • One to method six; aspect two provides methods seven to ten for risk identification based on the environmental information in the first information from applications, system models, risk warning information and other methods.
  • the risk operation identification of the current environment can also be carried out through the identification method of the above-mentioned aspect three.
  • the method provided by the aspect three is actually a combination of the above-mentioned aspects one and two for identification and judgment. For example, if the electronic device 100 can perform number risk judgment on the number information based on the combination of methods one to six in aspect one, and determine that the target number in the number information is a risk number, and, the electronic device 100 can determine the number risk based on the combination of methods seven to six in aspect two.
  • the combination of method ten is used to identify risks in environmental information, and it is determined that there are risky operations in the current environment, and then it is finally determined that there are risky operations in the current environment; for another example, if the electronic device 100 can perform the risk identification on the number information based on the combination of methods one to six in aspect one. Number risk judgment determines that the target number in the number information is a risk number, or the electronic device 100 performs risk identification on the environmental information based on the combination of methods seven to ten in aspect two and determines that there are risky operations in the current environment, and then finally determines the current There are risky operations in the environment.
  • the electronic device 100 performs the identification methods of method one to method six in aspect one, and the order of performing the identification methods of method seven to method ten of aspect two is not limited. It is understood that the identification methods of aspect one and aspect two can also be executed in parallel, and this embodiment does not limit this.
  • the electronic device 100 performs risk identification of the target number involved in the current operation based on the number information in the first information, and performs risk identification of the environment in which the current operation is based on a variety of information in the environmental information, thereby improving
  • the utilization rate of various information in the first information is improved, and risk identification based on different information can further improve the effectiveness and accuracy of risk identification of the current operation of the electronic device, improve the success rate of risk interception, and optimize the user experience.
  • FIG. 10 shows a possible structural diagram of the electronic device involved in the above embodiment.
  • the electronic device 1000 includes: a processor 1001, a display screen 1002 and a communication module 1003.
  • the processor 1001 is used to control and manage the actions of the electronic device 1000 .
  • the display screen 1002 is used to display images generated by the processor 1001.
  • the communication module 1003 is used to support communication between the electronic device 1000 and other network entities (such as servers).
  • the processor 1001 is used to receive the user's operation of setting a specific scene and obtain the first information; perform risk identification based on the first information, and if it is determined that there is a risk, output the risk warning information to the display screen; the display screen 1002 is used to display the risk warning information.
  • the phone number information at least includes the call forwarding number
  • the processor 1001 is configured to determine that a risk exists if it is determined that the call forwarding number is not a safe number.
  • determining that the call forwarding number is a security number includes: determining that the call forwarding number is the local SIM card number; or determining that the call forwarding number is in the local address book; or determining that the call forwarding number is in a preset in the whitelist; or, make sure that the owner information of the call forwarding number is the same as the owner information of the local number.
  • the communication module 1003 is configured to send a first query request carrying the local number or the first identifier of the local number and the call transfer number to the server; the first query request is used to instruct the server to base the The number and call transfer number query the owner information of the local machine and the call transfer owner information; receive the first query response returned by the server carrying the owner information of the local machine and the call transfer owner information; if it is determined that the owner information of the local machine and the call transfer owner information are If the owner information matches successfully, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
  • the communication module 1003 is used to send a message carrying the local number or the local number to the server.
  • the phone number information at least includes the call forwarding number
  • the processor 1001 is configured to determine that a risk exists if the call forwarding number is determined to be a risk number.
  • determining that the call forwarding number is a risk number includes: determining that the call forwarding number is in a preset blacklist; or determining that the call forwarding number is a number that has been marked as a risk.
  • the phone number information at least includes the call forwarding number
  • the processor 1001 is configured to determine that the call forwarding number is not a safe number and determine that the call forwarding number is a risk number. , then it is determined that there is a risk.
  • the risk warning information includes content instructing the user to cancel the setting of a specific scenario or to confirm the setting of a specific scenario.
  • the processor 1001 is used to obtain the setting operation triggered by the user.
  • the setting operation is to cancel the setting of a specific scene, output a prompt message of setting failure to the display screen.
  • a prompt message indicating that the setting is successful is output to the display screen 1002.
  • the display screen 1002 is used to display a prompt message indicating that the setting fails, or to display a prompt message indicating that the setting is successful.
  • the communication module 1003 is also configured to send a call transfer setting request to the server; receive a setting response returned by the server, and feed the setting response back to the processor.
  • the processor 1001 is configured to output a prompt message indicating that the setting is successful based on the feedback response to the display screen.
  • the display screen 1002 is used to display a prompt message indicating that the setting is successful.
  • the processor 1001 is configured to determine whether there is a risky operation at the first moment or within a preset time period before the first moment according to the environmental information; wherein the first moment is when the operation of setting a specific scene by the user is received. moment.
  • the environmental information is a phone call event
  • the risk operation includes that the call number of the phone call event is a risk number, and/or the call number of the phone call event is not a safe number.
  • the environment information is an application running event and/or a function running event
  • the risk operation includes running a specific application and/or running a specific function of a specific application.
  • the environment information is an application download event, and the risk operation includes the behavior of downloading a risky application; the environment information is an application installation event, and the risk operation includes the behavior of installing a risky application.
  • the environment information is an application interaction event
  • the risk operation includes receiving a risk reminder message sent by a specific application.
  • the processor 1001 is configured to determine that a risk exists if the risk is identified based on the phone number information, and/or if the risk is identified based on the environmental information, then determine that the risk exists; otherwise, determine that the risk does not exist. .
  • the processor 1001 may be a central processing unit (CPU), a digital signal processor (DSP), an application-specific integrated circuit (ASIC), or a field programmable gate array (field programmable gate array).
  • programmable gate array FPGA or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof.
  • Processors may include application processors and baseband processors. It may be implemented or performed as described in connection with the disclosure of this application various illustrative logic blocks, modules and circuits.
  • the processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on.
  • the communication module 1003 may be a transceiver, a transceiver circuit, etc.
  • the storage module may be a memory.
  • the processor 1001 can be the processor 3210 as shown in Figure 4A
  • the communication module 1003 includes a radio frequency module (the radio frequency module 350 as shown in Figure 4A).
  • the communication module may also include a Wi-Fi module, a Bluetooth module, a radio frequency module 350 and other communication modules.
  • the storage module may be a memory (internal memory 221 as shown in Figure 4A).
  • the display screen 1002 may be a display screen 394 as shown in FIG. 4A , the display screen 394 may be a touch screen, and the touch screen may integrate a display panel and a touch panel.
  • the terminal provided by the embodiment of the present application may be the electronic device 100 shown in Figure 4A.
  • the above-mentioned processor, display, etc. may be connected together, for example, through a bus.
  • Embodiments of the present application also provide a computer-readable storage medium.
  • the computer-readable storage medium includes computer instructions.
  • the electronic device When the computer instructions are run on the above-mentioned electronic device, the electronic device causes the electronic device to execute the electronic device 100 in the above-mentioned method embodiment. Each function or step performed.
  • An embodiment of the present application also provides a computer program product.
  • the computer program product When the computer program product is run on a computer, it causes the computer to perform each function or step performed by the electronic device 100 in the above method embodiment.
  • the computer may be the electronic device 100 described above.
  • the disclosed devices and methods can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of modules or units is only a logical function division.
  • there may be other division methods for example, multiple units or components may be The combination can either be integrated into another device, or some features can be omitted, or not implemented.
  • the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
  • the units described as separate components may or may not be physically separated.
  • the components shown as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit.
  • the above integrated units can be implemented in the form of hardware or software functional units.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium.
  • the technical solutions of the embodiments of the present application are essentially or contribute to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the software product is stored in a storage medium , including several instructions to cause a device (which can be a microcontroller, a chip, etc.) or a processor to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read only memory (ROM), random access memory (RAM), magnetic disk or optical disk, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present application relates to the field of information security, and discloses a risk identification method and an electronic device. The method comprises: when the electronic device receives an operation for a user to set a specific scenario, for example, to set call forwarding, to set a do-not-disturb mode, or to set an airplane mode, acquiring first information, performing risk identification according to the first information, and outputting risk early warning information when it is determined that there is a risk operation, wherein the first information comprises at least one of phone number information and environmental information in the specific scenario. The electronic device may face or is experiencing problems such as a network risk operation, property loss, information leakage when the specific scenario is set. In the present solution, when the user sets the specific scenario, the electronic device acquires the phone number information and/or environmental information in the specific scenario to perform risk identification to determine whether there is the risk operation when the specific scenario is set, and then risk early warning is performed in time when it is determined that there is the risk operation, thereby improving the security of using the electronic device by the user.

Description

风险识别方法和电子设备Risk identification methods and electronic equipment
本申请要求于2022年08月02日提交国家知识产权局、申请号为202210922242.0、发明名称为“风险识别方法和电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese patent application filed with the State Intellectual Property Office on August 2, 2022, with application number 202210922242.0 and the invention name "Risk Identification Method and Electronic Device", the entire content of which is incorporated into this application by reference. .
技术领域Technical field
本申请涉及信息安全领域,尤其涉及风险识别方法和电子设备。This application relates to the field of information security, and in particular to risk identification methods and electronic devices.
背景技术Background technique
通讯电子设备如手机,通常提供呼叫转移功能,用户在电子设备设置呼叫转移功能成功之后,可以满足用户在某些特定场景下的正常接听需求,例如,当手机无网络或关机时,用户仍可以通过呼叫转移号码来接听电话。Communication electronic devices, such as mobile phones, usually provide a call transfer function. After the user successfully sets the call transfer function on the electronic device, it can meet the user's normal answering needs in certain specific scenarios. For example, when the mobile phone has no network or is turned off, the user can still Answer calls by calling a forwarding number.
随着互联网技术的发展,用户终端的使用安全性也逐渐暴露短板,出现一些特定用户对用户终端信息安全造成威胁的场景。例如,随着电信网络诈骗手段不断升级翻新,电子设备上原本为用户提供便利的功能可能反被诈骗人员利用,从而更加顺利的实施诈骗。可选地,特定人员,例如诈骗人员,可以诱导或操控用户将终端设置呼叫转移至特定号码,或者,开启终端免打扰模式等,使得用户终端无法与外界正常通话的情况。以上场景均会导致用户终端暂时失去正常联系,对用户终端的信息安全、财产安全造成威胁,且,在一些预警工作人员需要与用户终端通话进行风险预警的情况下,以上场景也阻碍了风险预警工作的正常进行。With the development of Internet technology, shortcomings in the security of user terminals have gradually been exposed, and there have been scenarios where certain users pose a threat to user terminal information security. For example, as telecom network fraud methods continue to be upgraded and renovated, functions on electronic devices that originally provided convenience to users may be exploited by fraudsters, making the fraud more smoothly possible. Optionally, a specific person, such as a fraudster, can induce or manipulate the user to transfer calls to the terminal settings to a specific number, or turn on the terminal's Do Not Disturb mode, etc., so that the user terminal cannot communicate normally with the outside world. The above scenarios will cause the user terminal to temporarily lose normal contact, posing a threat to the information security and property security of the user terminal. Moreover, in the case where some early warning staff need to talk to the user terminal for risk warning, the above scenarios also hinder risk warning. The work proceeds normally.
而在实现本发明过程中,发明人发现现有技术中的电子设备并未针对以上风险场景进行风险识别和预警。In the process of implementing the present invention, the inventor found that the electronic devices in the prior art did not carry out risk identification and early warning for the above risk scenarios.
发明内容Contents of the invention
本申请实施例提供风险识别方法和电子设备,可以针对以上场景,在电子设备被触发设置为一些暂时失去正常联系的功能或模式下,进行当前操作的风险识别与风险提醒,从而提高用户终端的信息安全和财产安全,优化用户体验。为达到上述目的,本申请的实施例采用如下技术方案。Embodiments of the present application provide risk identification methods and electronic devices, which can perform risk identification and risk reminders for current operations when the electronic device is triggered and set to some functions or modes that temporarily lose normal contact in the above scenarios, thereby improving the user terminal's security. Information security and property security, and optimize user experience. In order to achieve the above objectives, the embodiments of the present application adopt the following technical solutions.
第一方面,本实施例提供一种风险识别方法,应用于终端,该方法包括:电子设备接收到用户设置特定场景的操作,获取第一信息,在获取第一信息之后,电子设备根据第一信息进行风险识别,如果确定存在风险,输出风险预警信息。In a first aspect, this embodiment provides a risk identification method, applied to a terminal. The method includes: an electronic device receives an operation of a user setting a specific scene, obtains first information, and after obtaining the first information, the electronic device performs the following steps according to the first The information is used to identify risks, and if it is determined that a risk exists, risk warning information is output.
其中,特定场景可以包括使电子设备处于暂时无法正常通话的场景,特定场景包括但不限于呼叫转移、免打扰模式或飞行模式。第一信息包括特定场景中涉及的电话号码信息和环境信息中至少一个。其中,在个别特定场景中,例如设置呼叫转移的场景下,电话号码信息可以包括本机号码和呼叫转移号码;可选地,电话号码信息还可以包括与本机号码关联的终端标识与呼叫转移号码。环境信息可以包括电话通话事件、应用运行事件和/功能运行事件、应用下载事件或应用安装事件、应用交互事件等。其中,电话通话事件指的是电子设备存在通话的行为。应用运行事件和/功能运行事件指的是电子设备存在应用运行的行为,和/或,存在特定功能被运行的行为。应用下载事 件或应用安装事件指的是电子设备存在应用下载行为,或存在应用安装行为。应用交互事件指的是接收到应用发送的提示消息等。Among them, specific scenarios may include scenarios where the electronic device is temporarily unable to make normal calls. Specific scenarios include but are not limited to call transfer, do not disturb mode or airplane mode. The first information includes at least one of phone number information and environmental information involved in the specific scene. Among them, in some specific scenarios, such as the scenario of setting up call transfer, the phone number information may include the local number and the call transfer number; optionally, the phone number information may also include the terminal identification associated with the local number and the call transfer number. Number. Environmental information may include phone call events, application running events and/or function running events, application download events or application installation events, application interaction events, etc. Among them, the phone call event refers to the behavior of the electronic device making a call. Application running events and/or function running events refer to the behavior of an electronic device running an application, and/or the behavior of a specific function being run. Application download matters A software or application installation event refers to an electronic device having application downloading behavior or application installation behavior. Application interaction events refer to receiving prompt messages sent by the application, etc.
在本实施例中,电子设备在检测到特定场景被触发时,可以获取特定场景下产生的第一信息,该第一信息中包括了特定场景中所涉及到的环境信息和电话号码信息,从而电子设备可以基于第一信息确定当前环境中是否存在风险操作。在确定存在风险操作的情况下,及时输出风险预警信息,中止特定场景的设置操作,实现了在特定场景下风险操作的有效识别和风险预警,为用户提供了有效的风险提示,一定程度上降低了用户执行风险操作的概率,增强了用户的信息安全和财产安全。同时,阻止风险操作的进行,避免风险操作的发生,也一定程度上避免了用户所使用的电子设备被特定用户利用的情况,避免了特定用户利用用户所使用的电子设备阻碍或干扰工作人员进行预警工作的问题。In this embodiment, when the electronic device detects that a specific scene is triggered, it can obtain the first information generated in the specific scene. The first information includes the environmental information and phone number information involved in the specific scene, thereby The electronic device may determine whether there is a risky operation in the current environment based on the first information. When it is determined that a risky operation exists, risk warning information is output in a timely manner and the setting operation of a specific scenario is suspended. This achieves effective identification and risk warning of risky operations in specific scenarios, provides users with effective risk reminders, and reduces the risk to a certain extent. It increases the probability of users performing risky operations and enhances users’ information security and property security. At the same time, it prevents the conduct of risky operations and avoids the occurrence of risky operations. It also avoids to a certain extent the situation where the electronic equipment used by users is used by specific users, and prevents specific users from using the electronic equipment used by users to hinder or interfere with the work of staff. Issues with early warning work.
结合第一方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,电子设备根据第一信息进行风险识别,包括:如果确定呼叫转移号码不是安全号码,则确定存在风险。Combined with the first aspect, in a possible design approach, in a specific scenario where the call transfer is performed, the phone number information at least includes the call transfer number, and the electronic device performs risk identification based on the first information, including: if the call transfer number is determined If it is not a safe number, then there is definitely a risk.
结合第一方面,在一种可能的设计方式中,确定呼叫转移号码是安全号码的判断条件包括以下一项或多项:确定呼叫转移号码是本机SIM卡号码;确定呼叫转移号码在本地通讯录中;确定呼叫转移号码在预设的白名单中;确定呼叫转移号码的属主信息与本机号码的属主信息相同。Combined with the first aspect, in a possible design approach, the judgment conditions for determining that the call forwarding number is a secure number include one or more of the following: determining that the call forwarding number is the local SIM card number; determining that the call forwarding number is in local communication is being recorded; make sure the call forwarding number is in the preset white list; make sure the owner information of the call forwarding number is the same as the owner information of the local number.
在本实施例中,若确定呼叫转移号码满足以上判断条件中的至少一项,则确定呼叫转移号码为安全号码;否则确定呼叫转移号码不是安全号码。In this embodiment, if it is determined that the call forwarding number satisfies at least one of the above judgment conditions, it is determined that the call forwarding number is a security number; otherwise, it is determined that the call forwarding number is not a security number.
其中,电子设备可以向服务器发送查询请求来获取本机号码的属主信息、呼叫转移号码的属主信息来确定呼叫转移号码的属主信息与本机号码的属主信息相同。Among them, the electronic device can send a query request to the server to obtain the owner information of the local number and the owner information of the call forwarding number to determine that the owner information of the call forwarding number is the same as the owner information of the local number.
结合第一方面,在一种可能的设计方式中,确定呼叫转移号码的属主信息与本机号码的属主信息相同,包括:向服务器发送携带第一标识和呼叫转移号码的第一查询请求;第一标识用于指示终端的本机号码;第一查询请求用于指示服务器基于第一标识和呼叫转移号码查询本机属主信息和呼叫转移属主信息;接收服务器返回的携带本机属主信息与呼叫转移属主信息的第一查询应答;如果确定本机属主信息与呼叫转移属主信息匹配成功,则确定呼叫转移号码的属主信息与本机号码的属主信息相同。In conjunction with the first aspect, in one possible design approach, determining that the owner information of the call forwarding number is the same as the owner information of the local number includes: sending a first query request carrying the first identifier and the call forwarding number to the server. ; The first identification is used to indicate the local number of the terminal; the first query request is used to instruct the server to query the local owner information and the call transfer owner information based on the first identification and the call transfer number; receive the local ownership returned by the server; The first query response between the owner information and the call transfer owner information; if it is determined that the owner information of the local machine matches the call transfer owner information successfully, it is determined that the owner information of the call transfer number is the same as the owner information of the local number.
或者,电子设备还可以直接获取服务器的匹配结果,来确定呼叫转移号码的属主信息与本机号码的属主信息相同。Alternatively, the electronic device can also directly obtain the matching result from the server to determine that the owner information of the call forwarding number is the same as the owner information of the local number.
结合第一方面,在一种可能的设计方式中,确定呼叫转移号码的属主信息与本机号码的属主信息相同,包括:向服务器发送携带第一标识和呼叫转移号码的第二查询请求;第一标识用于指示终端的本机号码;第二查询请求用于指示服务器确定本机号码的属主信息与呼叫转移号码的属主信息的匹配结果;接收服务器返回的携带匹配结果的第二查询应答;如果确定匹配结果为匹配成功,则确定呼叫转移号码的属主信息与本机号码的属主信息相同。In conjunction with the first aspect, in one possible design approach, determining that the owner information of the call forwarding number is the same as the owner information of the local number includes: sending a second query request carrying the first identifier and the call forwarding number to the server. ; The first identifier is used to indicate the local number of the terminal; the second query request is used to instruct the server to determine the matching result of the owner information of the local number and the owner information of the call forwarding number; the third query request carrying the matching result returned by the receiving server 2. Query response; if the matching result is determined to be successful, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
可选地,第一标识可以为终端的互联网协议地址(internet protocol address,IP地址)、终端的国际移动用户识别码(international mobile subscriber identity,IMSI)等可以关联本机号码的标识。需要说明的是,该第一标识对应的信息字段不一 定包括在上述设置请求中,可以是服务器在与电子设备建立网络层的连接时直接提取电子设备对应的标识,如IP地址。服务器可以根据第一标识确定与其关联的本机号码。Optionally, the first identification may be an Internet protocol address (IP address) of the terminal, an international mobile subscriber identity (IMSI) of the terminal, or other identification that can be associated with the local number. It should be noted that the information fields corresponding to the first identifier are different. must be included in the above setting request. The server may directly extract the identification corresponding to the electronic device, such as the IP address, when establishing a network layer connection with the electronic device. The server can determine the local number associated with the first identification according to the first identification.
在本实施例中,针对呼叫转移的场景,电子设备从确定呼叫转移号码是否为安全号码的角度进行风险识别,通过以上一种或多种方法,从安全性方面判断呼叫转移号码的风险识别判断,可以更准确、有效地判断出呼叫转移号码的风险性。In this embodiment, for the call transfer scenario, the electronic device performs risk identification from the perspective of determining whether the call transfer number is a safe number. Through one or more of the above methods, the risk identification judgment of the call transfer number is determined from the security aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
结合第一方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,电子设备根据第一信息进行风险识别,包括:如果确定呼叫转移号码是风险号码,则确定存在风险。Combined with the first aspect, in a possible design approach, in a specific scenario where the call transfer is performed, the phone number information at least includes the call transfer number, and the electronic device performs risk identification based on the first information, including: if the call transfer number is determined is a risk number, it is determined that there is a risk.
结合第一方面,在一种可能的设计方式中,确定呼叫转移号码是风险号码包括:确定呼叫转移号码在预设的黑名单中;或者,通过向三方风险识别平台查询的方式,确定呼叫转移号码为已被标注风险的号码。Combined with the first aspect, in one possible design approach, determining that the call transfer number is a risk number includes: determining that the call transfer number is in a preset blacklist; or, determining that the call transfer number is by querying a third-party risk identification platform The numbers are those that have been marked as risky.
可选地,已被标注风险的号码可以是电子设备本地标注风险的号码,也可以是电子设备从三方风险识别平台获取的已经标注了风险的号码。可选地,电子设备还可以向三方风险识别平台获取查询呼叫转移号码的风险查询结果,基于风险查询结果确定呼叫转移号码是否为已被标注风险的号码。Optionally, the risk-marked number may be a risk-marked number locally on the electronic device, or may be a risk-marked number obtained by the electronic device from a third-party risk identification platform. Optionally, the electronic device can also obtain the risk query result of querying the call forwarding number from the third-party risk identification platform, and determine whether the call forwarding number is a number that has been marked with risk based on the risk query result.
在本实施例中,针对呼叫转移的场景,电子设备从确定呼叫转移号码是否为风险号码的角度进行风险识别,通过以上一种或多种方法,从风险性方面判断呼叫转移号码的风险识别判断,可以更准确、有效地判断出呼叫转移号码的风险性。In this embodiment, for the call transfer scenario, the electronic device performs risk identification from the perspective of determining whether the call transfer number is a risk number. Through one or more of the above methods, the risk identification judgment of the call transfer number is determined from the risk aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
结合第一方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,电子设备根据第一信息进行风险识别,包括:如果确定呼叫转移号码不是安全号码,并且确定呼叫转移号码是风险号码,则确定存在风险。Combined with the first aspect, in a possible design approach, in a specific scenario where the call transfer is performed, the phone number information at least includes the call transfer number, and the electronic device performs risk identification based on the first information, including: if the call transfer number is determined It is not a safe number, and if it is determined that the call forwarding number is a risk number, it is determined that there is a risk.
在本实施例中,针对呼叫转移的场景,考虑到一些特定号码又可能不是安全号码,也有可能不是风险号码,基于这种情况下,电子设备从安全性、风险性两个维度结合判断,可以更准确、有效地判断出呼叫转移号码的风险性。In this embodiment, for the call transfer scenario, considering that some specific numbers may not be safe numbers or risk numbers, based on this situation, the electronic device can judge from the two dimensions of security and risk. More accurately and effectively determine the risk of call forwarding numbers.
结合第一方面,在一种可能的设计方式中,上述风险预警信息中包括指示用户执行取消设置特定场景或执行确定设置特定场景的内容。基于此,该风险识别方法还包括:在电子设备输出风险预警信息之后,电子设备获取用户触发的设置操作,在设置操作为取消设置特定场景的情况下,输出设置失败的提示消息,在设置操作为确定设置特定场景的情况下,输出设置成功的提示消息。In conjunction with the first aspect, in a possible design approach, the risk warning information includes content instructing the user to cancel the setting of a specific scenario or to confirm the setting of a specific scenario. Based on this, the risk identification method also includes: after the electronic device outputs the risk warning information, the electronic device obtains the setting operation triggered by the user, and when the setting operation is to cancel the setting of a specific scene, output a prompt message indicating that the setting failed. To confirm the setting of a specific scene, a prompt message indicating successful setting is output.
在本实施例中,电子设备可以在输出风险预警信息的同时向用户输出二次确定设置特定场景的内容,对当前特定场景设置操作进行二次确定,在警示用户的同时也允许用户继续或取消设置特定场景,在提高用户信息安全的同时,优化用户体验。In this embodiment, while outputting the risk warning information, the electronic device can output to the user the content of a secondary determination of setting a specific scene, perform a secondary determination of the current specific scene setting operation, and while warning the user, also allow the user to continue or cancel. Set specific scenarios to improve user information security while optimizing user experience.
结合第一方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,在上述电子设备输出设置成功的提示消息之前,电子设备还需要向服务器发送呼叫转移的设置请求。其中,设置请求中携带了第一标识和呼叫转移号码,第一标识用于指示终端的本机号码,该设置请求用于指示服务器根据本机号码和呼叫转移号码,将本机号码呼叫转移至呼叫转移号码,并在设置完成后向电子设备返回设置应答。电子设备在接收到服务器返回的设置应答之后,输出设置成功的提示消息。 Combined with the first aspect, in one possible design approach, when the specific scenario is call transfer, before the above-mentioned electronic device outputs a prompt message indicating that the setting is successful, the electronic device also needs to send a call transfer setting request to the server. The setting request carries a first identifier and a call transfer number. The first identifier is used to indicate the local number of the terminal. The setting request is used to instruct the server to transfer the call of the local number to the terminal based on the local number and the call transfer number. Call the forwarding number and return a setup response to the electronic device after setup is completed. After receiving the setting response returned by the server, the electronic device outputs a prompt message indicating that the setting is successful.
可选地,第一标识可以为终端的互联网协议地址(internet protocol address,IP地址)、终端的国际移动用户识别码(international mobile subscriber identity,IMSI)等可以关联本机号码的标识。需要说明的是,该第一标识对应的信息字段不一定包括在上述设置请求中,可以是服务器在与电子设备建立网络层的连接时直接提取电子设备对应的标识,如IP地址。服务器可以根据第一标识确定与其关联的本机号码。Optionally, the first identifier may be the terminal's Internet protocol address (IP address), the terminal's International Mobile Subscriber Identity (IMSI), or other identifier that can be associated with the local number. It should be noted that the information field corresponding to the first identification is not necessarily included in the above-mentioned setting request. The server may directly extract the identification corresponding to the electronic device, such as the IP address, when establishing a network layer connection with the electronic device. The server may determine the local number associated with the first identification according to the first identification.
在本实施例中,针对设置呼叫转移的场景,电子设备需要和服务器进行通信,以使服务器来根据本机号码和呼叫转移号码进行呼叫转移的设置操作,在接收到服务器返回的设置应答之后,输出设置成功的提示消息,以使用户可以明确获知呼叫转移已经设置成功,优化用户体验。In this embodiment, for the scenario of setting call forwarding, the electronic device needs to communicate with the server so that the server can perform the call forwarding setting operation based on the local number and the call forwarding number. After receiving the setting response returned by the server, Output a prompt message indicating that the setting is successful so that the user can clearly know that the call transfer has been set up successfully and optimize the user experience.
结合第一方面,在一种可能的设计方式中,根据第一信息进行风险识别,包括:根据环境信息判断在第一时刻或第一时刻前预设时长内是否存在风险操作。其中,第一时刻为接收到用户设置特定场景的操作的时刻。Combined with the first aspect, in one possible design approach, performing risk identification based on the first information includes: determining whether there is a risky operation at the first moment or within a preset time period before the first moment based on the environmental information. The first moment is the moment when the user's operation to set a specific scene is received.
可选地,第一时刻前预设时长可以为第一时刻前5分钟、10分钟、30分钟等。Optionally, the preset time period before the first time may be 5 minutes, 10 minutes, 30 minutes, etc. before the first time.
在本实施例中,电子设备若基于环境信息确定第一时刻存在风险操作,或者,确定第一时刻前预设时长内存在风险操作,则确定存在风险。基于环境信息包括的不同内容,电子设备识别风险的风险操作也不同。In this embodiment, if the electronic device determines that a risky operation exists at the first moment based on the environmental information, or determines that a risky operation exists within a preset time period before the first moment, then the electronic device determines that a risk exists. Based on the different contents included in the environmental information, the risk operations for electronic equipment to identify risks are also different.
在一种可能的设计方式中,环境信息为电话通话事件,风险操作包括电话通话事件的通话号码是风险号码,和/或,电话通话事件的通话号码是不是安全号码。In a possible design approach, the environmental information is a phone call event, and the risk operation includes whether the call number of the phone call event is a risk number, and/or whether the call number of the phone call event is a safe number.
考虑到电子设备可以被特定用户通过通话进行诱导操作,在这种情况下,环境信息为电话通话事件,电子设备根据电话通话事件所涉及到的通话号码进行风险识别。例如,可以结合第一方面,判断通话号码是否为安全号码,以及,判断通话号码是否为风险号码。在确定通话号码不是安全号码,和/或,确定通话号码是风险号码的情况下,确定存在风险操作。Considering that electronic devices can be induced to operate by a specific user through phone calls, in this case, the environmental information is a phone call event, and the electronic device performs risk identification based on the call number involved in the phone call event. For example, the first aspect can be combined to determine whether the call number is a safe number, and whether the call number is a risk number. When it is determined that the call number is not a safe number, and/or it is determined that the call number is a risk number, it is determined that a risky operation exists.
在本实施例中,在针对环境信息为电话通话事件的情况下,通过对通话号码进行风险识别,是最简单、有效的风险识别方法。若电子设备确定通话号码是风险号码,或者确定通话号码不是安全号码,或者,确定通话号码不是安全号码且是风险号码,则直接确定当前环境存在风险操作。In this embodiment, when the environmental information is a phone call event, performing risk identification on the call number is the simplest and most effective risk identification method. If the electronic device determines that the call number is a risk number, or determines that the call number is not a safe number, or determines that the call number is not a safe number and is a risk number, it directly determines that a risky operation exists in the current environment.
结合第一方面,在一种可能的设计方式中,环境信息为应用运行事件和/或功能运行事件;风险操作包括特定应用运行和/或特定应用的特定功能被运行。Combined with the first aspect, in a possible design approach, the environment information is an application running event and/or a function running event; the risk operation includes running a specific application and/or running a specific function of a specific application.
其中,特定应用可以是有共享屏幕或远程控制模式的应用,相应的特定功能可以是共享或远程控制模式开启。或者,特定应用也可以是支付类应用,相应的特定功能可以是支付或转账活动执行。The specific application may be an application with screen sharing or remote control mode, and the corresponding specific function may be enabled in sharing or remote control mode. Alternatively, the specific application may also be a payment application, and the corresponding specific function may be the execution of payment or transfer activities.
示例性地,若电子设备可以基于该环境信息确定存在特定应用运行;或者确定存在特定应用的特定功能被运行,则确定存在风险操作。For example, if the electronic device can determine that a specific application is running based on the environment information; or determine that a specific function of a specific application is running, it is determined that a risky operation exists.
比如,电子设备确定有共享屏幕模式的应用正在运行,则确定存在风险操作;或者,电子设备确定当前正处于共享模式,则确定存在风险操作;或者,电子设备确定有共享屏幕模式的应用正在运行且当前正处于共享屏幕模式,则确定存在风险操作。比如,电子设备确定支付类应用运行,则确定存在风险操作;或者,电子设备确定正在执行某一支付操作,则确定存在风险操作;或者,电子设备确定支付类应用运行且 正在执行某一支付操作,则确定存在风险操作。For example, if the electronic device determines that an application in sharing screen mode is running, it determines that a risky operation exists; or if the electronic device determines that it is currently in sharing mode, it determines that a risky operation exists; or if the electronic device determines that an application in sharing screen mode is running And if you are currently in screen sharing mode, it is determined that there is a risky operation. For example, if the electronic device determines that a payment application is running, it is determined that a risky operation exists; or if the electronic device determines that a certain payment operation is being performed, it is determined that a risky operation exists; or if the electronic device determines that a payment application is running and If a certain payment operation is being performed, it is determined that there is a risky operation.
可选地,电子设备可以根据特定应用和/或其特定功能的运行开始时刻和运行结束时刻,来确定在第一时刻前预设时长内是否执行。例如,第一时刻前预设时长为第一时刻前30分钟,若电子设备确定支付类应用的运行开始时刻与运行结束时刻均在第一时刻的前30分钟内,则确定存在风险操作。或者,电子设备可以直接查询进程,确定当前时刻有无特定应用和/或其特定功能执行,例如,电子设备直接查询进程,确定当前时刻有支付类的应用正在运行,则确定存在风险操作。Optionally, the electronic device may determine whether to execute the application within a preset time period before the first time based on the execution start time and execution end time of the specific application and/or its specific function. For example, the preset time period before the first moment is 30 minutes before the first moment. If the electronic device determines that the running start time and the running end time of the payment application are both within 30 minutes before the first moment, it is determined that there is a risky operation. Alternatively, the electronic device can directly query the process to determine whether a specific application and/or its specific function is executed at the current moment. For example, if the electronic device directly queries the process and determines that a payment application is running at the current moment, it is determined that a risky operation exists.
在本实施例中,电子设备可能存在被特定用户远程控制操作、或者被特定用户诱导进行支付操作的情况,在这种情况下,电子设备基于应用和/或功能运行事件进行风险识别,可以通过确定当前时刻有特定应用运行和/或特定应用的特定功能执行,或第一时刻前预设时长内有特定应用运行过和/或特定应用的特定功能执行过,来确定当前操作存在风险,考虑到电子设备的操作漏洞而进行的环境信息的识别更准确。In this embodiment, the electronic device may be remotely controlled and operated by a specific user, or may be induced by a specific user to perform payment operations. In this case, the electronic device performs risk identification based on application and/or function running events, which can be done through Determine that a specific application is running and/or a specific function of a specific application is executed at the current moment, or that a specific application has been run and/or a specific function of a specific application has been executed within a preset time period before the first moment, to determine that there is a risk in the current operation, consider The identification of environmental information based on the operational vulnerabilities of electronic equipment is more accurate.
结合第一方面,在一种可能的设计方式中,环境信息为应用下载事件,风险操作包括存在下载风险应用的行为;环境信息为应用安装事件,风险操作包括存在安装风险应用的行为。Combined with the first aspect, in a possible design method, the environmental information is an application download event, and the risk operation includes the behavior of downloading the risky application; the environmental information is the application installation event, and the risk operation includes the behavior of installing the risky application.
其中,风险应用可以是电子设备通过向三方风险识别平台查询确定的已标注风险的应用;也可以为预先存储至电子设备中的已标注风险的应用。考虑到特定用户可能通过诱导用户在电子设备安装风险应用进行风险操作,电子设备可以基于应用下载事件,确定是否下载了风险应用来进行风险识别;或者,电子设备可以基于应用安装事件,确定是否安装了风险应用来进行风险识别。可选地,电子设备可以根据应用的下载开始时刻、下载完成时刻、安装开始时刻、安装完成时刻来确定在第一时刻或在第一时刻前预设时长内是否存在应用下载或安装的行为。或者,电子设备也可以查询当前进程来确定第一时刻是否存在应用下载或安装的行为。若确定第一时刻或第一时刻前预设时长内存在应用下载的行为或者存在应用安装的行为,则基于已标注风险的应用来确定该应用是否为风险应用。在确定存应用为风险应用的情况下,确定存在风险操作。Among them, the risk application may be a risk-marked application determined by the electronic device through querying the third-party risk identification platform; it may also be a risk-marked application stored in the electronic device in advance. Considering that a specific user may perform risky operations by inducing the user to install a risky application on an electronic device, the electronic device can determine whether the risky application has been downloaded based on the application download event for risk identification; or the electronic device can determine whether to install the risky application based on the application installation event. Risk applications are used for risk identification. Optionally, the electronic device may determine whether there is an application download or installation behavior at the first moment or within a preset time period before the first moment based on the download start time, download completion time, installation start time, and installation completion time of the application. Alternatively, the electronic device may also query the current process to determine whether there is an application download or installation behavior at the first moment. If it is determined that there is an application downloading behavior or an application installation behavior at the first moment or within the preset time period before the first moment, it is determined based on the risk-marked applications whether the application is a risky application. When the existing application is determined to be a risky application, it is determined that there is a risky operation.
在本实施例中,电子设备存在风险的场景大概率情况下会产生风险应用的下载安装,因此,在产生应用下载或应用安装的行为的情况下,确定该应用是否为风险应用,可以快速有效地确定当前场景下应用安装的风险性,从而从该角度进行当前操作的风险识别更直接、有效。In this embodiment, scenarios where risks exist in electronic devices will most likely result in the downloading and installation of risky applications. Therefore, in the event of application downloading or application installation behavior, determining whether the application is a risky application can be quickly and effectively It can accurately determine the risk of application installation in the current scenario, so that the risk identification of the current operation from this perspective is more direct and effective.
结合第一方面,在一种可能的设计方式中,环境信息为应用交互事件,风险操作包括接收到特定应用发送的风险提示消息。Combined with the first aspect, in a possible design approach, the environment information is an application interaction event, and the risk operation includes receiving a risk reminder message sent by a specific application.
可选地,这里的特定应用指的是可以进行风险识别并产生风险提示的应用。例如,特定应用可以为具有支付功能与风险识别提醒的应用,该应用在执行支付过程中若检测到风险,则产生风险提示信息,并将该风险提示信息传输至电子设备的风险识别模块。例如,电子设备还可以从历史交互事件中确定第一时刻前预设时长内是否产生风险提示信息,若确定第一时刻前预设时长内产生风险提示信息,则确定存在风险操作。或者,电子设备若在第一时刻接收到特定应用产生的风险提示信息,则确定存在风险操作。 Optionally, the specific application here refers to an application that can identify risks and generate risk prompts. For example, the specific application can be an application with a payment function and a risk identification reminder. If the application detects a risk during the payment process, it will generate risk reminder information and transmit the risk reminder information to the risk identification module of the electronic device. For example, the electronic device can also determine from historical interaction events whether risk prompt information is generated within a preset time period before the first time. If it is determined that risk prompt information is generated within a preset time period before the first time, it is determined that a risky operation exists. Alternatively, if the electronic device receives the risk prompt information generated by the specific application at the first moment, it determines that there is a risky operation.
在本实施例中,电子设备存在风险的场景情况下可能会被其他特定应用敏感识别,因此,基于特定应用交互信息进行风险识别,可以快速有效地确定电子设备是否存在风险。In this embodiment, in scenarios where risks exist in electronic devices, they may be sensitively identified by other specific applications. Therefore, risk identification based on specific application interaction information can quickly and effectively determine whether electronic devices have risks.
可选的,环境信息包括以上一种或多种事件,电子设备可以根据多种环境信息结合进行风险操作的识别。在本实施例中,电子设备基于多种环境信息进行风险操作的识别,可以从应用维度、系统维度、通话维度、交互信息维度等一个或多个维度进行结合识别,考虑到电子设备可能处于的复杂环境,使得当前操作的风险识别更准确。Optionally, the environmental information includes one or more of the above events, and the electronic device can identify risky operations based on a combination of multiple environmental information. In this embodiment, the electronic device identifies risky operations based on a variety of environmental information. The identification can be combined from one or more dimensions such as the application dimension, the system dimension, the call dimension, and the interactive information dimension. Considering that the electronic device may be in Complex environments enable more accurate risk identification of current operations.
结合第一方面,在一种可能的设计复方式中,根据第一信息进行风险识别,包括:Combined with the first aspect, in one possible design method, risk identification is carried out based on the first information, including:
若根据电话号码信息进行风险识别确定存在风险,和/或,根据环境信息进行风险识别确定存在风险,则确定存在风险;若根据电话号码进行风险识别确定不存在风险,且,根据环境信息进行风险识别确定不存在风险,则确定不存在风险。If the risk identification is based on the phone number information and it is determined that there is a risk, and/or if the risk identification is based on the environmental information and it is determined that there is a risk, then it is determined that there is a risk; if the risk identification is based on the phone number and it is determined that there is no risk, and, the risk is based on the environmental information If it is determined that there is no risk, then it is determined that there is no risk.
可选地,电子设备还可以基于电话号码信息与环境信息进行结合风险识别,在基于电话号码信息确定当前不存在风险且基于环境信息确定当前不存在风险的情况下,才最终确定当前不存在风险;在基于电话号码信息确定当前存在风险和/或,基于环境信息确定当前存在风险的情况下,最终确定存在风险。Optionally, the electronic device can also perform combined risk identification based on the phone number information and environmental information. Only when it is determined that there is currently no risk based on the phone number information and that there is currently no risk based on the environment information, it is finally determined that there is currently no risk. ; In the case where the current risk is determined based on the phone number information and/or the current risk is determined based on the environmental information, the risk is ultimately determined to exist.
本实施例中,基于电话号码信息与环境信息的结合风险识别判断,使得风险识别更有保障,进一步提高了风险识别的有效性。In this embodiment, the risk identification judgment is based on the combination of telephone number information and environmental information, making risk identification more secure and further improving the effectiveness of risk identification.
第二方面,提供了一种电子设备,该电子设备包括处理器和显示屏;In a second aspect, an electronic device is provided, the electronic device including a processor and a display screen;
处理器,用于接收到用户设置特定场景的操作,获取第一信息;根据第一信息进行风险识别,如果确定存在风险,向显示屏输出风险预警信息;显示屏,用于显示风险预警信息。The processor is used to receive the user's operation of setting a specific scene and obtain the first information; perform risk identification based on the first information; if it is determined that there is a risk, output the risk warning information to the display screen; the display screen is used to display the risk warning information.
其中,特定场景可以包括使电子设备处于暂时无法正常通话的场景,特定场景包括但不限于设置呼叫转移、设置免打扰模式、设置飞行模式。其中,第一信息包括但不限定在特定场景中涉及的号码信息和环境信息。其中,号码信息一般包括呼叫转移号码;可选地,电话号码信息还可以包括用于指示本机号码的第一标识与呼叫转移号码。环境信息可以包括电话通话事件、应用运行事件和/功能运行事件、应用下载事件或应用安装事件、应用交互事件等。其中,电话通话事件指的是电子设备存在通话的行为。应用运行事件和/功能运行事件指的是电子设备存在应用运行的行为,和/或,存在特定功能被运行的行为。应用下载事件或应用安装事件指的是电子设备存在应用下载行为,或存在应用安装行为。应用交互事件指的是接收到应用发送的提示消息等。Among them, specific scenarios may include scenarios where the electronic device is temporarily unable to make normal calls. Specific scenarios include but are not limited to setting call transfer, setting do not disturb mode, and setting airplane mode. The first information includes but is not limited to number information and environmental information involved in a specific scenario. The number information generally includes a call forwarding number; optionally, the telephone number information may also include a first identifier and a call forwarding number used to indicate the local number. Environmental information may include phone call events, application running events and/or function running events, application download events or application installation events, application interaction events, etc. Among them, the phone call event refers to the behavior of the electronic device making a call. Application running events and/or function running events refer to the behavior of an electronic device running an application, and/or the behavior of a specific function being run. An application download event or an application installation event refers to an electronic device having application downloading behavior or application installation behavior. Application interaction events refer to receiving prompt messages sent by the application, etc.
在本实施例中,电子设备在检测到特定场景被触发时,可以获取特定场景下产生的第一信息,该第一信息中包括了与特定场景中所涉及到的环境信息和号码信息,从而电子设备可以基于第一信息确定当前环境中是否存在风险操作,在确定存在风险操作的情况下,及时输出风险预警信息,中止特定场景的设置操作,实现了在特定场景下风险操作的有效识别和风险预警,为用户提供了有效的风险提示,一定程度上降低了用户执行风险操作的概率,增强了用户的信息安全和财产安全。同时,阻止风险操作的进行,避免风险操作的发生,也一定程度上避免了用户所使用的电子设备被特定用户利用的情况,避免了特定用户利用用户所使用的电子设备阻碍或干扰工作人员进行预警工作的问题。 In this embodiment, when the electronic device detects that a specific scene is triggered, it can obtain the first information generated in the specific scene. The first information includes the environmental information and number information involved in the specific scene, thereby The electronic device can determine whether there is a risky operation in the current environment based on the first information, and if it is determined that there is a risky operation, timely output the risk warning information and stop the setting operation of the specific scenario, achieving effective identification and identification of risky operations in the specific scenario. Risk warning provides users with effective risk tips, reduces the probability of users performing risky operations to a certain extent, and enhances users' information security and property security. At the same time, it prevents the conduct of risky operations and avoids the occurrence of risky operations. It also avoids to a certain extent the situation where the electronic equipment used by users is used by specific users, and prevents specific users from using the electronic equipment used by users to hinder or interfere with the work of staff. Early warning issues.
结合第二方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,处理器,用于如果确定呼叫转移号码不是安全号码,则确定存在风险。Combined with the second aspect, in a possible design approach, when the specific scenario is call transfer, the phone number information at least includes the call transfer number, and the processor is configured to determine that the call transfer number is not a safe number if it is determined that there is risk.
结合第二方面,在一种可能的设计方式中,确定呼叫转移号码是安全号码的判断条件包括以下一项或多项:确定呼叫转移号码是本机SIM卡号码;确定呼叫转移号码在本地通讯录中;确定呼叫转移号码在预设的白名单中;确定呼叫转移号码的属主信息与本机号码的属主信息相同。Combined with the second aspect, in a possible design method, the judgment conditions for determining that the call forwarding number is a safe number include one or more of the following: determining that the call forwarding number is the local SIM card number; determining that the call forwarding number is in local communication is being recorded; make sure the call forwarding number is in the preset white list; make sure the owner information of the call forwarding number is the same as the owner information of the local number.
电子设备可以向服务器发送查询请求来获取本机号码的属主信息、呼叫转移号码的属主信息来确定呼叫转移号码的属主信息与本机号码的属主信息相同,基于此,上述电子设备还包括通信模块。The electronic device can send a query request to the server to obtain the owner information of the local number and the owner information of the call forwarding number to determine that the owner information of the call forwarding number is the same as the owner information of the local number. Based on this, the above electronic device Also includes communication module.
结合第二方面,在一种可能的设计方式中,通信模块,用于向服务器发送携带第一标识和呼叫转移号码的第一查询请求;第一标识用于指示终端的本机号码;第一查询请求用于指示服务器基于本机号码和呼叫转移号码查询本机属主信息和呼叫转移属主信息;接收服务器返回的携带本机属主信息与呼叫转移属主信息的第一查询应答;如果确定本机属主信息与呼叫转移属主信息匹配成功,则确定呼叫转移号码的属主信息与本机号码的属主信息相同。Combined with the second aspect, in a possible design manner, the communication module is configured to send a first query request carrying a first identifier and a call transfer number to the server; the first identifier is used to indicate the local number of the terminal; The query request is used to instruct the server to query the owner information of the local machine and the call transfer owner information based on the local number and the call transfer number; receive the first query response returned by the server carrying the owner information of the local machine and the call transfer owner information; if If it is determined that the owner information of the local phone and the call forwarding owner information match successfully, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
或者,电子设备还可以直接获取服务器的匹配结果,来确定呼叫转移号码的属主信息与本机号码的属主信息相同。Alternatively, the electronic device can also directly obtain the matching result from the server to determine that the owner information of the call forwarding number is the same as the owner information of the local number.
结合第二方面,在一种可能的设计方式中,通信模块,用于向服务器发送携带第一标识和呼叫转移号码的第二查询请求;第二查询请求用于指示服务器确定本机号码的属主信息与呼叫转移号码的属主信息的匹配结果;接收服务器返回的携带匹配结果的第二查询应答;如果确定匹配结果为匹配成功,则确定呼叫转移号码的属主信息与本机号码的属主信息相同。In conjunction with the second aspect, in a possible design manner, the communication module is configured to send a second query request carrying the first identifier and the call transfer number to the server; the second query request is used to instruct the server to determine the attribute of the local number. The matching result between the main information and the owner information of the call forwarding number; receiving the second query response carrying the matching result returned by the server; if it is determined that the matching result is successful, then determining the owner information of the call forwarding number and the ownership of the local number The main information is the same.
在本实施例中,针对呼叫转移的场景,电子设备从确定呼叫转移号码是否为安全号码的角度进行风险识别,通过以上一种或多种方法,从安全性方面判断呼叫转移号码的风险识别判断,可以更准确、有效地判断出呼叫转移号码的风险性。In this embodiment, for the call transfer scenario, the electronic device performs risk identification from the perspective of determining whether the call transfer number is a safe number. Through one or more of the above methods, the risk identification judgment of the call transfer number is determined from the security aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
结合第二方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,处理器,用于如果确定呼叫转移号码是风险号码,则确定存在风险。Combined with the second aspect, in a possible design approach, in a specific scenario of call forwarding, the phone number information at least includes the call forwarding number, and the processor is configured to determine if the call forwarding number is a risk number, risk.
结合第二方面,在一种可能的设计方式中,确定呼叫转移号码是风险号码包括:确定呼叫转移号码在预设的黑名单中;或者,通过向三方风险识别平台查询的方式确定呼叫转移号码为已被标注风险的号码。Combined with the second aspect, in one possible design approach, determining that the call transfer number is a risk number includes: determining that the call transfer number is in a preset blacklist; or, determining the call transfer number by querying a third-party risk identification platform It is a number that has been marked as a risk.
在本实施例中,针对呼叫转移的场景,电子设备从确定呼叫转移号码是否为风险号码的角度进行风险识别,通过以上一种或多种方法,从风险性方面判断呼叫转移号码的风险识别判断,可以更准确、有效地判断出呼叫转移号码的风险性。In this embodiment, for the call transfer scenario, the electronic device performs risk identification from the perspective of determining whether the call transfer number is a risk number. Through one or more of the above methods, the risk identification judgment of the call transfer number is determined from the risk aspect. , can more accurately and effectively determine the risk of call forwarding numbers.
结合第二方面,在一种可能的设计方式中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,处理器,用于如果确定呼叫转移号码不是安全号码,并且确定呼叫转移号码是风险号码,则确定存在风险。Combined with the second aspect, in a possible design approach, in a specific scenario of call forwarding, the phone number information at least includes the call forwarding number, and the processor is configured to determine that the call forwarding number is not a safe number and determine that the call If the transfer number is a risk number, it is determined that there is a risk.
在本实施例中,针对呼叫转移的场景,考虑到一些特定号码又可能不是安全号码, 也有可能不是风险案号,基于这种情况下,电子设备从安全性、风险性两个维度结合判断,可以更准确、有效地判断出呼叫转移号码的风险性。In this embodiment, for the call transfer scenario, considering that some specific numbers may not be safe numbers, It may not be a risk case number. In this case, the electronic device can judge the risk of the call forwarding number more accurately and effectively from the two dimensions of safety and risk.
结合第二方面,在一种可能的设计方式中,上述风险预警信息中包括指示用户执行取消设置特定场景或执行确定设置特定场景的内容。基于此,处理器,用于获取用户触发的设置操作,在设置操作为取消设置特定场景的情况下,向显示屏输出设置失败的提示消息,在设置操作为确定设置特定场景的情况下,向显示屏输出设置成功的提示消息。Combined with the second aspect, in a possible design approach, the risk warning information includes content instructing the user to cancel the setting of a specific scenario or to confirm the setting of a specific scenario. Based on this, the processor is used to obtain the setting operation triggered by the user. When the setting operation is to cancel the setting of a specific scene, output a prompt message of setting failure to the display screen. When the setting operation is to confirm the setting of a specific scene, send a message to the display screen. The display screen outputs a prompt message indicating that the setting is successful.
显示屏,用于显示设置失败的提示消息,或者,显示设置成功的提示消息。The display screen is used to display a prompt message indicating that the setting fails, or to display a prompt message indicating that the setting is successful.
在本实施例中,电子设备可以在输出风险预警信息的同时向用户输出二次确定设置特定场景的内容,对当前特定场景设置操作进行二次确定,在警示用户的同时也允许用户继续或取消设置特定场景,在提高用户信息安全的同时,优化用户体验。In this embodiment, while outputting the risk warning information, the electronic device can output to the user the content of a secondary determination of setting a specific scene, perform a secondary determination of the current specific scene setting operation, and while warning the user, also allow the user to continue or cancel. Set specific scenarios to improve user information security while optimizing user experience.
结合第二方面,在一种可能的设计方式中,通信模块,还用于向服务器发送呼叫转移的设置请求;并接收服务器返回的设置应答,将设置应答反馈至处理器。Combined with the second aspect, in one possible design approach, the communication module is also used to send a call transfer setting request to the server; receive a setting response returned by the server, and feed the setting response back to the processor.
处理器,用于基于该反馈应答,向显示屏输出设置成功的提示消息。The processor is configured to output a prompt message indicating successful setting to the display screen based on the feedback response.
显示屏,用于显示设置成功的提示消息。The display screen is used to display a prompt message indicating that the setting is successful.
可选地,设置请求中携带了第一标识和呼叫转移号码,第一标识用于指示终端的本机号码,该设置请求用于指示服务器根据本机号码和呼叫转移号码,将本机号码呼叫转移至呼叫转移号码,并在设置完成后向电子设备返回设置应答。电子设备在接收到服务器返回的设置应答之后,输出设置成功的提示消息。Optionally, the setting request carries a first identifier and a call forwarding number. The first identifier is used to indicate the terminal's local number. The setting request is used to instruct the server to call the local number based on the local number and the call forwarding number. Transfer to the call forwarding number and return a setup answer to the electronic device after setup is complete. After receiving the setting response returned by the server, the electronic device outputs a prompt message indicating that the setting is successful.
在本实施例中,针对设置呼叫转移的场景,电子设备需要和服务器进行通信,以使服务器来根据本机号码和呼叫转移号码进行呼叫转移的设置操作,在接收到服务器返回的设置应答之后,输出设置成功的提示消息,以使用户可以明确获知呼叫转移已经设置成功,优化用户体验。In this embodiment, for the scenario of setting call forwarding, the electronic device needs to communicate with the server so that the server can perform the call forwarding setting operation based on the local number and the call forwarding number. After receiving the setting response returned by the server, Output a prompt message indicating that the setting is successful so that the user can clearly know that the call transfer has been set up successfully and optimize the user experience.
结合第二方面,在一种可能的设计方式中,处理器,用于根据环境信息判断在第一时刻或第一时刻前预设时长内是否存在风险操作。其中,第一时刻为接收到用户设置特定场景的操作的时刻。Combined with the second aspect, in one possible design approach, the processor is configured to determine whether there is a risky operation at the first moment or within a preset time period before the first moment based on the environmental information. The first moment is the moment when the user's operation to set a specific scene is received.
结合第二方面,在一种可能的设计方式中,环境信息为电话通话事件,风险操作包括电话通话事件的通话号码是风险号码,和/或,电话通话事件的通话号码不是安全号码。Combined with the second aspect, in one possible design approach, the environmental information is a phone call event, and the risk operation includes that the call number of the phone call event is a risk number, and/or the call number of the phone call event is not a safe number.
在本实施例中,在针对环境信息为电话通话事件的情况下,通过对通话号码进行风险识别,是最简单、有效的风险识别方法。若电子设备确定通话号码是风险号码,或者确定通话号码不是安全号码,或者,确定通话号码不是安全号码且是风险号码,则直接确定当前环境存在风险操作。In this embodiment, when the environmental information is a phone call event, performing risk identification on the call number is the simplest and most effective risk identification method. If the electronic device determines that the call number is a risk number, or determines that the call number is not a safe number, or determines that the call number is not a safe number and is a risk number, it directly determines that a risky operation exists in the current environment.
结合第一方面,在一种可能的设计方式中,环境信息为应用运行事件和/或功能运行事件;风险操作包括特定应用运行和/或特定应用的特定功能被运行。Combined with the first aspect, in a possible design approach, the environment information is an application running event and/or a function running event; the risk operation includes the running of a specific application and/or the running of a specific function of a specific application.
在本实施例中,电子设备可能存在被特定用户远程控制操作、或者被特定用户诱导进行支付操作的情况,在这种情况下,电子设备基于应用和/或功能运行事件进行风险识别,可以通过确定当前时刻有特定应用运行和/或特定应用的特定功能执行,或第一时刻前预设时长内有特定应用运行过和/或特定应用的特定功能执行过,来确定当前 操作存在风险,考虑到电子设备的操作漏洞而进行的环境信息的识别更准确。In this embodiment, the electronic device may be remotely controlled and operated by a specific user, or may be induced by a specific user to perform payment operations. In this case, the electronic device performs risk identification based on application and/or function running events, which can be done through Determine whether a specific application is running and/or a specific function of a specific application is executed at the current moment, or a specific application has been running and/or a specific function of a specific application has been executed within a preset time period before the first moment, to determine the current There are risks in operation, and the identification of environmental information that takes into account the operational vulnerabilities of electronic equipment is more accurate.
结合第一方面,在一种可能的设计方式中,环境信息为应用下载事件,风险操作包括存在下载装风险应用的行为;环境信息为应用安装事件,风险操作包括存在安装风险应用的行为。Combined with the first aspect, in a possible design method, the environmental information is an application download event, and the risk operation includes the behavior of downloading and installing risky applications; the environmental information is an application installation event, and the risk operation includes the behavior of installing risky applications.
在本实施例中,电子设备存在风险的场景大概率情况下会产生风险应用的下载安装,因此,在产生应用下载或安装的行为的情况下,确定该应用是否为风险应用,可以快速有效地确定当前场景下应用安装的风险性,从而从该角度进行当前操作的风险识别更直接、有效。In this embodiment, there is a high probability that risky applications will be downloaded and installed in scenarios where electronic devices have risks. Therefore, when an application is downloaded or installed, it can be quickly and effectively determined whether the application is a risky application. Determine the risk of application installation in the current scenario, so that the risk identification of the current operation from this perspective is more direct and effective.
结合第一方面,在一种可能的设计方式中,环境信息为应用交互事件时,风险操作包括接收到特定应用发送的风险提示消息。Combined with the first aspect, in a possible design approach, when the environment information is an application interaction event, the risk operation includes receiving a risk reminder message sent by a specific application.
在本实施例中,电子设备存在风险的场景情况下可能会被其他特定应用敏感识别,因此,基于特定应用交互信息进行风险识别,可以快速有效地确定电子设备是否存在风险。In this embodiment, in scenarios where risks exist in electronic devices, they may be sensitively identified by other specific applications. Therefore, risk identification based on specific application interaction information can quickly and effectively determine whether electronic devices have risks.
可选的,环境信息包括以上一种或多种事件,电子设备可以根据多种环境信息结合进行风险操作的识别。在本实施例中,电子设备基于多种环境信息进行风险操作的识别,可以从应用维度、系统维度、通话维度、交互信息维度等一个或多个维度进行结合识别,考虑到电子设备可能处于的复杂环境,使得当前操作的风险识别更准确。Optionally, the environmental information includes one or more of the above events, and the electronic device can identify risky operations based on a combination of multiple environmental information. In this embodiment, the electronic device identifies risky operations based on a variety of environmental information. The identification can be combined from one or more dimensions such as the application dimension, the system dimension, the call dimension, and the interactive information dimension. Considering that the electronic device may be in Complex environments enable more accurate risk identification of current operations.
结合第二方面,在一种可能的设计方式中,处理器,用于若根据电话号码信息进行风险识别确定存在风险,和/或,根据环境信息进行风险识别确定存在风险,则确定存在风险;若根据电话号码进行风险识别确定不存在风险,且,根据环境信息进行风险识别确定不存在风险,则确定不存在风险。Combined with the second aspect, in a possible design approach, the processor is configured to determine that a risk exists if it is determined that a risk exists based on the phone number information, and/or if a risk is determined to exist based on the environmental information, and/or it is determined that a risk exists; If the risk identification based on the phone number determines that there is no risk, and the risk identification based on the environmental information determines that there is no risk, then it is determined that there is no risk.
可选地,电子设备还可以基于电话号码信息与环境信息进行结合风险识别,在基于电话号码信息确定当前不存在风险且基于环境信息确定当前不存在风险的情况下,才最终确定当前不存在风险;在基于电话号码信息确定当前存在风险,和/或,基于环境信息确定当前存在风险的情况下,最终确定存在风险。Optionally, the electronic device can also perform combined risk identification based on the phone number information and environmental information. Only when it is determined that there is currently no risk based on the phone number information and that there is currently no risk based on the environment information, it is finally determined that there is currently no risk. ; In the case where the current risk is determined based on the phone number information, and/or the current risk is determined based on the environmental information, the risk is finally determined to exist.
本实施例中,基于电话号码信息与环境信息的结合风险识别判断,使得风险识别更有保障,进一步提高了风险识别的有效性。In this embodiment, the risk identification judgment is based on the combination of telephone number information and environmental information, making risk identification more secure and further improving the effectiveness of risk identification.
第三方面,提供了一种电子设备,该电子设备包括存储器、显示屏和一个或多个处理器;所述存储器、所述显示屏与所述处理器耦合;所述存储器中存储有计算机程序代码,所述计算机程序代码包括计算机指令,当所述计算机指令被所述处理器执行时,使得所述电子设备执行如上述第一方面中任一项所述的方法。In a third aspect, an electronic device is provided. The electronic device includes a memory, a display screen, and one or more processors; the memory, the display screen, and the processor are coupled; and a computer program is stored in the memory. Code, the computer program code includes computer instructions, which when executed by the processor, cause the electronic device to perform the method according to any one of the above first aspects.
第四方面,提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在电子设备上运行时,使得电子设备可以执行上述第一方面中任一项所述的方法。In a fourth aspect, a computer-readable storage medium is provided. Instructions are stored in the computer-readable storage medium. When the computer-readable storage medium is run on an electronic device, the electronic device can execute any one of the above-mentioned first aspects. method.
第五方面,提供了一种包含指令的计算机程序产品,当其在电子设备上运行时,使得电子设备可以执行上述第一方面中任一项所述的方法。A fifth aspect provides a computer program product containing instructions that, when run on an electronic device, enables the electronic device to execute the method described in any one of the above first aspects.
可以理解地,上述提供的第二方面、第三方面及其任一种可能的设计方式所述的电子设备,第四方面所述的计算机可读存储介质,第五方面所述的计算机程序产品所能达到的有益效果,可参考第一方面及其任一种可能的设计方式中的有益效果,此处 不再赘述。It can be understood that the electronic device described in the second aspect, the third aspect and any possible design manner provided above, the computer readable storage medium described in the fourth aspect, and the computer program product described in the fifth aspect The beneficial effects that can be achieved can be referred to the first aspect and the beneficial effects in any possible design method, here No longer.
附图说明Description of drawings
图1为本申请实施例提供的一种风险预警场景中特定用户设置呼叫转移至特定号码的场景示意图;Figure 1 is a schematic diagram of a scenario in which a specific user sets a call transfer to a specific number in a risk warning scenario provided by an embodiment of the present application;
图2A为本申请实施例提供的一种基于电子设备交互界面设置呼叫转移的界面示意图;Figure 2A is a schematic diagram of an interface for setting call transfer based on an electronic device interactive interface provided by an embodiment of the present application;
图2B为本申请实施例提供的一种基于拨号方式设置呼叫转移的界面示意图;Figure 2B is a schematic diagram of an interface for setting call transfer based on dialing according to an embodiment of the present application;
图3为本申请实施例提供的一种风险识别方法的应用环境示意图;Figure 3 is a schematic diagram of the application environment of a risk identification method provided by the embodiment of the present application;
图4A为本申请实施例提供的一种电子设备的硬件结构示意图;Figure 4A is a schematic diagram of the hardware structure of an electronic device provided by an embodiment of the present application;
图4B为本申请实施例提供的一种电子设备的系统软件架构图;Figure 4B is a system software architecture diagram of an electronic device provided by an embodiment of the present application;
图5为本申请实施例提供的一种风险识别方法的流程图;Figure 5 is a flow chart of a risk identification method provided by an embodiment of the present application;
图6为本申请实施例提供的另一种电子设备的显示界面示意图;Figure 6 is a schematic diagram of a display interface of another electronic device provided by an embodiment of the present application;
图7为本申请实施例提供的另一种风险识别方法的流程图;Figure 7 is a flow chart of another risk identification method provided by an embodiment of the present application;
图8为本申请实施例提供的另一种风险识别方法的流程图;Figure 8 is a flow chart of another risk identification method provided by an embodiment of the present application;
图9为本申请实施例提供的另一种风险识别方法的流程图;Figure 9 is a flow chart of another risk identification method provided by an embodiment of the present application;
图10为本申请实施例提供的一种电子设备的结构示意图。FIG. 10 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
具体实施方式Detailed ways
以下,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本实施例的描述中,除非另有说明,“多个”的含义是两个或两个以上。Hereinafter, the terms “first” and “second” are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the quantity of indicated technical features. Therefore, features defined as "first" and "second" may explicitly or implicitly include one or more of these features. In the description of this embodiment, unless otherwise specified, "plurality" means two or more.
发明人在研究过程中发现,在一些具有风险的场景下,例如,在网络电信诈骗的场景下,特定用户在与普通用户通信过程中或通信之后,可能会诱导普通用户将手机设置为某些特定模式或设置特定的功能,以此来干扰或者阻碍工作人员对普通用户的风险预警工作。其中,特定用户可以理解为意图进行普通用户的财产转移、信息盗取等风险操作的诈骗人员。参考图1所示,电子设备1为普通用户所使用的电子设备,电子设备2为特定用户所使用的电子设备,电子设备3为工作人员所使用的电子设备。可选地,电子设备1、电子设备2、电子设备3均可以为智能手机、平板电脑、笔记本电脑、台式电脑等。During the research process, the inventor found that in some risky scenarios, for example, in the scenario of Internet telecommunications fraud, specific users may induce ordinary users to set their mobile phones to certain settings during or after communication with ordinary users. Specific modes or setting specific functions to interfere with or hinder staff's risk warning work for ordinary users. Among them, specific users can be understood as fraudsters who intend to carry out risky operations such as property transfer and information theft of ordinary users. Referring to FIG. 1 , electronic device 1 is an electronic device used by ordinary users, electronic device 2 is an electronic device used by specific users, and electronic device 3 is an electronic device used by staff. Optionally, the electronic device 1, the electronic device 2, and the electronic device 3 can each be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc.
以电子设备为手机为例来说明,特定用户诱导普通用户将手机设置为某些特定的模式或设置特定的功能可以包括,诱导普通用户将电子设备1设置呼叫转移至特定号码(电子设备2中使用的特定号码),使得工作人员对普通用户进行电话预警时被呼叫转移至该特定号码上,由特定用户冒充普通用户进行预警回复;或者,特定用户诱导普通用户将电子设备1设置为免打扰模式,或,诱导普通用户将电子设备1设置为拒接陌生号码模式等,以此使得工作人员与普通用户无法取得有效联系,阻碍工作人员对普通用户的风险预警工作。Taking the electronic device as a mobile phone as an example to illustrate, the specific user inducing the ordinary user to set the mobile phone to some specific modes or setting specific functions may include inducing the ordinary user to set the electronic device 1 to transfer the call to a specific number (electronic device 2). The specific number used), so that when the staff makes a phone warning to an ordinary user, the call is transferred to the specific number, and the specific user pretends to be an ordinary user to respond to the alert; or the specific user induces the ordinary user to set the electronic device 1 to do not disturb mode, or induce ordinary users to set the electronic device 1 to the mode of rejecting unknown numbers, etc., so that the staff cannot effectively contact ordinary users and hinder the staff's risk warning work for ordinary users.
其中,示例性地,呼叫转移功能指的是在电话无法接听或不愿接电话等某些特定场景下,将来电转移到设定的呼叫转移号码上。呼叫转移功能包括无条件呼叫转移、遇忙呼叫转移、无应答呼叫转移、用户不可及呼叫转移等。常见的呼叫转移设置方法 包括:第一种为通过手机交互界面提供的菜单进行设置,可参考图2A,用户可以基于交互界面10中设置的不同条件下的呼叫转移;第二种为通过电话应用的拨号盘输入人机界面(man-machine-interface,MMI)码进行呼叫转移设置,可参考图2B,用户可以基于电话应用的拨号盘界面20进行拨号呼叫转移设置,示例性的,拨号方式设置呼转包括以下几种方式:Among them, for example, the call forwarding function refers to transferring incoming calls to a set call forwarding number in certain specific scenarios such as being unable to answer the phone or unwilling to answer the phone. Call transfer functions include unconditional call transfer, busy call transfer, no-answer call transfer, user unreachable call transfer, etc. Common call forwarding settings Including: the first one is to set through the menu provided by the mobile phone interactive interface, please refer to Figure 2A, the user can transfer the call based on different conditions set in the interactive interface 10; the second one is to input human-machine input through the dial pad of the phone application The interface (man-machine-interface, MMI) code is used to perform call transfer settings. Refer to Figure 2B. The user can perform dial-up call transfer settings based on the dial pad interface 20 of the phone application. For example, the dialing mode setting call transfer includes the following. Way:
方式一:无条件呼叫转移,拨号**21*被呼叫号码#。Method 1: Unconditional call transfer, dial **21*called number#.
方式二:遇忙呼叫转移,拨号**67*被呼叫号码#。Method 2: To transfer the call when busy, dial **67*called number#.
方式三:无应答呼叫转移,拨号**61*被呼叫号码#。Method 3: To transfer calls without response, dial **61*called number#.
方式四:用户不可及呼叫转移,拨号**62*被呼叫号码#。Method 4: If the user cannot reach the call transfer, dial **62*called number#.
方式五:取消呼叫转移设置,拨号##002#。Method 5: Cancel the call forwarding setting and dial ##002#.
示例性地,在进行拨号进行无条件呼叫转移设置的过程中,手机在检测到用户输入**21*137********,并以“#”结束时,触发在拨号盘界面20显示提示信息界面21,参考图2B所示,该提醒信息界面可以包括用于表征提示用户是否无条件呼叫转移至137********的相关内容,以及,该提醒信息界面包括用于确定设置呼叫转移、用于取消设置呼叫转移的功能控件,参考界面21中所示,包括“确定”、“取消”两个功能按钮控件,以使用户确认设置呼叫转移操作或取消呼叫转移操作。For example, during the process of dialing for unconditional call forwarding settings, when the mobile phone detects that the user inputs **21*137******** and ends with "#", it triggers the dial pad interface 20 A prompt information interface 21 is displayed. As shown in FIG. 2B , the reminder information interface may include relevant content indicating whether to prompt the user to unconditionally transfer the call to 137********, and the reminder information interface may include The function controls for confirming the setting of call transfer and canceling the setting of call transfer are shown in the reference interface 21 and include two function button controls of "OK" and "Cancel" to enable the user to confirm the setting call transfer operation or cancel the call transfer operation.
可以理解的,用户还可以采用其他方式设置呼叫转移。本申请实施例不再赘述。It is understandable that users can also set up call forwarding in other ways. The embodiments of this application will not be described again in detail.
应该理解,无论是以上述哪种方式设置呼叫转移,手机在检测到确认设置呼叫转移操作之后,向运营商(服务器)发送携带本机号码、呼叫转移号码的呼叫转移设置请求,手机在接收到运营商(服务器)的应答之后,完成呼叫转移的设置操作。It should be understood that no matter which of the above methods is used to set call transfer, after the mobile phone detects the confirmation setting call transfer operation, it sends a call transfer setting request carrying the local number and call transfer number to the operator (server). After the operator (server) responds, the call forwarding setting operation is completed.
针对以上特定用户诱导普通用户将手机设置为某些特定的场景的情况,现有技术中并没有相应的技术方案对这些场景中可能存在的风险操作进行识别和预警,导致特定用户可以利用该特定场景进行风险操作,对普通用户的信息安全和财产安全造成一定的威胁,并且,干扰或阻碍了工作人员的风险预警工作。本实施例提供一种风险识别方法,来实现对如上风险操作的有效识别与用户提醒,从而避免特定用户对工作人员预警工作的干扰或妨碍,以此提高普通用户的信息安全和财产安全,本实施例提供的风险识别方法应用于如图3所示的实施环境中。请参考图3,该实施环境包括:电子设备100和服务器101,电子设备100与服务器101通过网络进行通信。In view of the above situation where specific users induce ordinary users to set their mobile phones to certain specific scenarios, there is no corresponding technical solution in the existing technology to identify and provide early warning for possible risky operations in these scenarios. As a result, specific users can take advantage of this specific scenario. Conducting risky operations in this scenario poses a certain threat to the information security and property security of ordinary users, and interferes with or hinders the risk warning work of staff. This embodiment provides a risk identification method to achieve effective identification and user reminders of the above risk operations, thereby avoiding specific users from interfering or hindering the staff's early warning work, thereby improving the information security and property security of ordinary users. This embodiment The risk identification method provided by the embodiment is applied in the implementation environment shown in Figure 3. Please refer to Figure 3. The implementation environment includes: an electronic device 100 and a server 101. The electronic device 100 and the server 101 communicate through a network.
其中,电子设备100可以理解为普通用户所使用的设备,在一些具有风险性的场景下,电子设备100也可以理解为受害人所使用的设备。该电子设备100可以为智能手机、平板电脑、笔记本电脑、台式电脑等具有通讯功能、设置呼叫转移、设置免打扰以及支付等功能的电子设备,本公开实施例不对电子设备100的产品类型作具体的限定。服务器101可以为与电子设备进行通信连接的运营商所对应的服务器,该服务器101可以为独立服务器,也可以为服务器集群,或者还可以为云端服务器,本公开实施例不对服务器101的产品类型作具体的限定。需要说明的是,该服务器101可以为电子设备100提供电话号码信息查询、电话号码功能设置等功能。The electronic device 100 can be understood as a device used by ordinary users. In some risky scenarios, the electronic device 100 can also be understood as a device used by the victim. The electronic device 100 can be a smart phone, a tablet computer, a notebook computer, a desktop computer, or other electronic device that has communication functions, call transfer settings, do not disturb settings, payment functions, etc. The embodiment of the present disclosure does not specify the product type of the electronic device 100 limitations. The server 101 can be a server corresponding to an operator that communicates with electronic devices. The server 101 can be an independent server, a server cluster, or a cloud server. The embodiment of the present disclosure does not make any changes to the product type of the server 101. Specific limitations. It should be noted that the server 101 can provide the electronic device 100 with functions such as telephone number information query and telephone number function setting.
示例性地,电子设备100可以向服务器101发送携带本机号码和呼叫转移号码的呼叫转移设置请求,服务器101响应于该呼叫转移设置请求,基于本机号码和呼叫转移号码进行呼叫转移设置,并向电子设备100返回设置应答,电子设备100在接收到 该设置应答之后,基于交互界面向用户展示呼叫转移设置成功的提示信息等。For example, the electronic device 100 may send a call forwarding setting request carrying the local number and the call forwarding number to the server 101. In response to the call forwarding setting request, the server 101 performs call forwarding settings based on the local number and the call forwarding number, and Return a setting response to the electronic device 100, and the electronic device 100 receives After the setting is answered, prompt information indicating successful call transfer setting is displayed to the user based on the interactive interface.
可选地,电子设备100还可以向服务器101发送携带本机号码和呼叫转移号码的属主查询请求,服务器101基于自身数据库获取与本机号码对应的本机属主信息、与呼叫转移号码对应的转移属主信息,从而向电子设备100返回携带本机属主信息与转移属主信息的查询应答,电子设备100在接收到该查询应答之后,基于交互界面向用户展示本机属主信息与转移属主信息等。其中,属主信息指的是与电话号码对应的用户的个人信息,例如,用户姓名、电话号码归属地等。Optionally, the electronic device 100 can also send an owner query request carrying the local number and the call forwarding number to the server 101. The server 101 obtains the local owner information corresponding to the local number and the call forwarding number based on its own database. transfer the owner information, thereby returning a query response carrying the local owner information and the transferred owner information to the electronic device 100. After receiving the query response, the electronic device 100 displays the local owner information and the transferred owner information to the user based on the interactive interface. Transfer owner information, etc. Among them, the owner information refers to the user's personal information corresponding to the phone number, such as the user's name, the location of the phone number, etc.
本申请实施例中的电子设备100可以为安装有电话应用,并且可以安装其他功能性应用的电子设备。其中,其他功能性应用可以包括具有支付功能的应用、具有通信功能的应用、具有管理电子设备系统功能的应用、具有实现远程控制电子设备功能的应用等。示例性地,电子设备可以为便携式计算机(如手机)、平板电脑、笔记本电脑、个人计算机(personal computer,PC)、可穿戴电子设备(如智能手表)、增强现实(augmented reality,AR)\虚拟现实(virtual reality,VR)设备、车载电脑等,以下实施例对该电子设备的具体形式不做特殊限制。The electronic device 100 in the embodiment of the present application may be an electronic device installed with a phone application and may be installed with other functional applications. Among them, other functional applications may include applications with payment functions, applications with communication functions, applications with functions of managing electronic device systems, applications with functions of remote control of electronic devices, etc. Illustratively, the electronic device can be a portable computer (such as a mobile phone), a tablet computer, a notebook computer, a personal computer (PC), a wearable electronic device (such as a smart watch), augmented reality (AR)\virtual Reality (virtual reality, VR) equipment, vehicle-mounted computers, etc. The following embodiments do not place special restrictions on the specific forms of the electronic equipment.
请参考图4A,其示出本申请实施例提供一种电子设备(如电子设备100)的结构框图。其中,电子设备100可以包括处理器310,外部存储器接口320,内部存储器321,通用串行总线(universal serial bus,USB)接口330,充电管理模块340,电源管理模块341,电池342,天线1,天线2,射频模块350,通信模块360,音频模块370,扬声器370A,受话器370B,麦克风370C,耳机接口370D,传感器模块380,按键390,马达391,指示器392,摄像头393,显示屏394,以及用户标识模块(subscriber identification module,SIM)卡接口395等。其中传感器模块380可以包括压力传感器380A,陀螺仪传感器380B,气压传感器380C,磁传感器380D,加速度传感器380E,距离传感器380F,接近光传感器380G,指纹传感器380H,温度传感器380J,触摸传感器380K,环境光传感器380L,骨传导传感器380M等。Please refer to FIG. 4A , which shows a structural block diagram of an electronic device (such as the electronic device 100) provided by an embodiment of the present application. The electronic device 100 may include a processor 310, an external memory interface 320, an internal memory 321, a universal serial bus (USB) interface 330, a charging management module 340, a power management module 341, a battery 342, and an antenna 1, Antenna 2, radio frequency module 350, communication module 360, audio module 370, speaker 370A, receiver 370B, microphone 370C, headphone interface 370D, sensor module 380, button 390, motor 391, indicator 392, camera 393, display screen 394, and Subscriber identification module (SIM) card interface 395, etc. The sensor module 380 may include a pressure sensor 380A, a gyro sensor 380B, an air pressure sensor 380C, a magnetic sensor 380D, an acceleration sensor 380E, a distance sensor 380F, a proximity light sensor 380G, a fingerprint sensor 380H, a temperature sensor 380J, a touch sensor 380K, and ambient light. Sensor 380L, bone conduction sensor 380M, etc.
本发明实施例示意的结构并不构成对电子设备100的限定。可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。The structure illustrated in the embodiment of the present invention does not constitute a limitation on the electronic device 100 . More or fewer components may be included than shown, or some components may be combined, or some components may be separated, or may be arranged differently. The components illustrated may be implemented in hardware, software, or a combination of software and hardware.
处理器310可以包括一个或多个处理单元。例如,处理器310可以包括应用处理器(application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。Processor 310 may include one or more processing units. For example, the processor 310 may include an application processor (application processor, AP), a modem processor, a graphics processing unit (GPU), an image signal processor (image signal processor, ISP), a controller, and a memory. , video codec, digital signal processor (DSP), baseband processor, and/or neural network processor (neural-network processing unit, NPU), etc. Among them, different processing units can be independent devices or integrated in one or more processors.
上述控制器可以是指挥电子设备100的各个部件按照指令协调工作的决策者。是电子设备100的神经中枢和指挥中心。控制器根据指令操作码和时序信号,产生操作控制信号,完成取指令和执行指令的控制。The above-mentioned controller may be a decision-maker that directs various components of the electronic device 100 to work in coordination according to instructions. It is the nerve center and command center of the electronic device 100. The controller generates operation control signals based on the instruction operation code and timing signals to complete the control of fetching and executing instructions.
处理器310中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器310中的存储器为高速缓冲存储器,可以保存处理器310刚用过或循环使用的指令或数据。如果处理器310需要再次使用该指令或数据,可从所述存储器中直接调用。 避免了重复存取,减少了处理器310的等待时间,因而提高了系统的效率。The processor 310 may also be provided with a memory for storing instructions and data. In some embodiments, the memory in the processor 310 is a cache memory that can save instructions or data that have just been used or recycled by the processor 310 . If processor 310 needs to use the instructions or data again, it can be called directly from the memory. Repeated access is avoided and the waiting time of the processor 310 is reduced, thus improving the efficiency of the system.
在一些实施例中,处理器310可以包括接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,SIM接口,和/或USB接口等。In some embodiments, processor 310 may include an interface. Interfaces may include integrated circuit (inter-integrated circuit, I2C) interface, integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, pulse code modulation (pulse code modulation, PCM) interface, universal asynchronous receiver and transmitter (universal asynchronous receiver/transmitter (UART) interface, mobile industry processor interface (MIPI), general-purpose input/output (GPIO) interface, SIM interface, and/or USB interface, etc.
USB接口330可以是Mini USB接口,Micro USB接口,USB Type C接口等。USB接口330可以用于连接充电器为电子设备100充电,也可以用于电子设备100与外围设备之间传输数据。也可以用于连接耳机,通过耳机播放音频。还可以用于连接其他电子设备,例如AR设备等。The USB interface 330 can be a Mini USB interface, a Micro USB interface, a USB Type C interface, etc. The USB interface 330 can be used to connect a charger to charge the electronic device 100, and can also be used to transmit data between the electronic device 100 and peripheral devices. It can also be used to connect headphones to play audio through them. It can also be used to connect other electronic devices, such as AR devices, etc.
本发明实施例示意的各模块间的接口连接关系,只是示意性说明,并不构成对电子设备100的结构限定。电子设备100可以采用本发明实施例中不同的接口连接方式,或多种接口连接方式的组合。The interface connection relationships between the modules illustrated in the embodiment of the present invention are only schematic illustrations and do not constitute a structural limitation on the electronic device 100 . The electronic device 100 may adopt different interface connection methods in the embodiment of the present invention, or a combination of multiple interface connection methods.
充电管理模块340用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块340可以通过USB接口330接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块340可以通过电子设备100的无线充电线圈接收无线充电输入。充电管理模块340为电池342充电的同时,还可以通过电源管理模块341为电子设备100供电。The charge management module 340 is used to receive charging input from the charger. Among them, the charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 340 may receive charging input from the wired charger through the USB interface 330 . In some wireless charging embodiments, the charging management module 340 may receive wireless charging input through the wireless charging coil of the electronic device 100 . While the charging management module 340 charges the battery 342, it can also provide power to the electronic device 100 through the power management module 341.
电源管理模块341用于连接电池342,充电管理模块340与处理器310。电源管理模块341接收所述电池342和/或充电管理模块340的输入,为处理器310,内部存储器321,外部存储器接口320,显示屏394,摄像头393,和通信模块360等供电。电源管理模块341还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在一些实施例中,电源管理模块341也可以设置于处理器310中。在一些实施例中,电源管理模块341和充电管理模块340也可以设置于同一个器件中。The power management module 341 is used to connect the battery 342, the charging management module 340 and the processor 310. The power management module 341 receives input from the battery 342 and/or the charging management module 340, and supplies power to the processor 310, the internal memory 321, the external memory interface 320, the display screen 394, the camera 393, the communication module 360, and the like. The power management module 341 can also be used to monitor battery capacity, battery cycle times, battery health status (leakage, impedance) and other parameters. In some embodiments, the power management module 341 may also be provided in the processor 310. In some embodiments, the power management module 341 and the charging management module 340 can also be provided in the same device.
电子设备100的无线通信功能可以通过天线1,天线2,射频模块350,通信模块360,调制解调器以及基带处理器等实现。The wireless communication function of the electronic device 100 can be implemented through the antenna 1, the antenna 2, the radio frequency module 350, the communication module 360, the modem, the baseband processor, and the like.
天线1和天线2用于发射和接收电磁波信号。电子设备100中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将蜂窝网天线复用为无线局域网分集天线。在一些实施例中,天线可以和调谐开关结合使用。Antenna 1 and Antenna 2 are used to transmit and receive electromagnetic wave signals. Each antenna in electronic device 100 may be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization. For example: a cellular network antenna can be reused as a wireless LAN diversity antenna. In some embodiments, antennas may be used in conjunction with tuning switches.
射频模块350可以提供应用在电子设备100上的包括2G/3G/4G/5G等无线通信的解决方案的通信处理模块。射频模块350可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。射频模块350由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调器进行解调。射频模块350还可以对经调制解调器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,射频模块350的至少部分功能模块可以被设置于处理器310中。在一些实施例中,射频模块350的至少部分功能模块可以与处理器310的至少部分模块被设置在同一个器件中。 The radio frequency module 350 may provide a communication processing module including solutions for wireless communication such as 2G/3G/4G/5G applied on the electronic device 100 . The radio frequency module 350 may include at least one filter, switch, power amplifier, low noise amplifier (LNA), etc. The radio frequency module 350 receives electromagnetic waves from the antenna 1, performs filtering, amplification and other processing on the received electromagnetic waves, and transmits them to the modem for demodulation. The radio frequency module 350 can also amplify the signal modulated by the modem and convert it into electromagnetic waves through the antenna 1 for radiation. In some embodiments, at least part of the functional modules of the radio frequency module 350 may be disposed in the processor 310 . In some embodiments, at least part of the functional modules of the radio frequency module 350 and at least part of the modules of the processor 310 may be provided in the same device.
调制解调器可以包括调制器和解调器。调制器用于将待发送的低频基带信号调制成中高频信号。解调器用于将接收的电磁波信号解调为低频基带信号。随后解调器将解调得到的低频基带信号传送至基带处理器处理。低频基带信号经基带处理器处理后,被传递给应用处理器。应用处理器通过音频设备(不限于扬声器370A,受话器370B等)输出声音信号,或通过显示屏394显示图像或视频。在一些实施例中,调制解调器可以是独立的器件。在一些实施例中,调制解调器可以独立于处理器310,与射频模块350或其他功能模块设置在同一个器件中。A modem may include a modulator and a demodulator. The modulator is used to modulate the low-frequency baseband signal to be transmitted into a medium-high frequency signal. The demodulator is used to demodulate the received electromagnetic wave signal into a low-frequency baseband signal. The demodulator then transmits the demodulated low-frequency baseband signal to the baseband processor for processing. After the low-frequency baseband signal is processed by the baseband processor, it is passed to the application processor. The application processor outputs sound signals through audio devices (not limited to speaker 370A, receiver 370B, etc.), or displays images or videos through display screen 394. In some embodiments, the modem may be a stand-alone device. In some embodiments, the modem may be independent of the processor 310 and may be provided in the same device as the radio frequency module 350 or other functional modules.
通信模块360可以提供应用在电子设备100上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(blue tooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案的通信处理模块。通信模块360可以是集成至少一个通信处理模块的一个或多个器件。通信模块360经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器310。通信模块360还可以从处理器310接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。The communication module 360 can provide applications on the electronic device 100 including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) network), Bluetooth (blue tooth, BT), and global navigation satellites. Communication processing module for wireless communication solutions such as global navigation satellite system (GNSS), frequency modulation (FM), near field communication (NFC), infrared technology (infrared, IR). The communication module 360 may be one or more devices integrating at least one communication processing module. The communication module 360 receives electromagnetic waves via the antenna 2 , frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 310 . The communication module 360 can also receive the signal to be sent from the processor 310, frequency modulate it, amplify it, and convert it into electromagnetic waves through the antenna 2 for radiation.
在一些实施例中,电子设备100的天线1和射频模块350耦合,天线2和通信模块360耦合,使得电子设备100可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(satellite based augmentation systems,SBAS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(BeiDou navigation satellite system,BDS),准天顶卫星系统(Quasi-Zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。In some embodiments, the antenna 1 of the electronic device 100 is coupled to the radio frequency module 350, and the antenna 2 is coupled to the communication module 360, so that the electronic device 100 can communicate with the network and other devices through wireless communication technology. The wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc. The GNSS may include global satellite positioning system (satellite based augmentation systems, SBAS), global navigation satellite system (global navigation satellite system, GLONASS), Beidou navigation satellite system (BeiDou navigation satellite system, BDS), quasi-zenith satellite system ( Quasi-Zenith satellite system (QZSS) and/or satellite based augmentation systems (SBAS).
电子设备100通过GPU,显示屏394,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏394和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器310可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。The electronic device 100 implements display functions through a GPU, a display screen 394, an application processor, and the like. The GPU is an image processing microprocessor and is connected to the display screen 394 and the application processor. GPUs are used to perform mathematical and geometric calculations for graphics rendering. Processor 310 may include one or more GPUs that execute program instructions to generate or alter display information.
显示屏394用于显示图像,视频等。例如,显示屏394可以显示来电提醒界面和语音通话界面。本申请实施例中,如果电子设备100接收到对端在第一应用中发起的应用内呼叫请求,电子设备100的显示屏394可以显示包括第一应用的业务信息的语音通话界面。显示屏394包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode,AMOLED),柔性发光二极管(flex light-emitting diode,FLED), Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,电子设备100可以包括1个或N个显示屏394,N为大于1的正整数。The display screen 394 is used to display images, videos, etc. For example, the display screen 394 can display an incoming call reminder interface and a voice call interface. In this embodiment of the present application, if the electronic device 100 receives an in-application call request initiated by the peer in the first application, the display screen 394 of the electronic device 100 may display a voice call interface including the business information of the first application. Display 394 includes a display panel. The display panel can use a liquid crystal display (LCD), an organic light-emitting diode (OLED), an active matrix organic light emitting diode or an active matrix organic light emitting diode (active-matrix organic light). emitting diode (AMOLED), flexible light-emitting diode (flex light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light emitting diodes (QLED), etc. In some embodiments, the electronic device 100 may include 1 or N display screens 394, where N is a positive integer greater than 1.
电子设备100可以通过ISP,摄像头393,视频编解码器,GPU,显示屏以及应用处理器等实现拍摄功能。The electronic device 100 can implement the shooting function through an ISP, camera 393, video codec, GPU, display screen, application processor, etc.
ISP用于处理摄像头393反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头393中。The ISP is used to process the data fed back by the camera 393. For example, when taking a photo, the shutter is opened, the light is transmitted to the camera sensor through the lens, the optical signal is converted into an electrical signal, and the camera sensor passes the electrical signal to the ISP for processing, and converts it into an image visible to the naked eye. ISP can also perform algorithm optimization on image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene. In some embodiments, the ISP may be provided in the camera 393.
摄像头393用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,电子设备100可以包括1个或N个摄像头393,N为大于1的正整数。Camera 393 is used to capture still images or video. The object passes through the lens to produce an optical image that is projected onto the photosensitive element. The photosensitive element can be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, and then passes the electrical signal to the ISP to convert it into a digital image signal. ISP outputs digital image signals to DSP for processing. DSP converts digital image signals into standard RGB, YUV and other format image signals. In some embodiments, the electronic device 100 may include 1 or N cameras 393, where N is a positive integer greater than 1.
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当电子设备100在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the electronic device 100 selects a frequency point, the digital signal processor is used to perform Fourier transform on the frequency point energy.
视频编解码器用于对数字视频压缩或解压缩。电子设备100可以支持一种或多种视频编解码器。这样,电子设备100可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。Video codecs are used to compress or decompress digital video. Electronic device 100 may support one or more video codecs. In this way, the electronic device 100 can play or record videos in multiple encoding formats, such as moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
NPU为神经网络(neural network,NN)计算处理器,通过借鉴生物神经网络结构,例如借鉴人脑神经元之间传递模式,对输入信息快速处理,还可以不断的自学习。通过NPU可以实现电子设备100的智能认知等应用,例如:图像识别,人脸识别,语音识别,文本理解等。NPU is a neural network (NN) computing processor. By drawing on the structure of biological neural networks, such as the transmission mode between neurons in the human brain, it can quickly process input information and can continuously learn by itself. Intelligent cognitive applications of the electronic device 100 can be implemented through the NPU, such as image recognition, face recognition, speech recognition, text understanding, etc.
外部存储器接口320可以用于连接外部存储卡,例如Micro SD卡,实现扩展电子设备100的存储能力。外部存储卡通过外部存储器接口320与处理器310通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。The external memory interface 320 can be used to connect an external memory card, such as a Micro SD card, to expand the storage capacity of the electronic device 100. The external memory card communicates with the processor 310 through the external memory interface 320 to implement the data storage function. Such as saving music, videos, etc. files in external memory card.
内部存储器321可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器310通过运行存储在内部存储器321的指令,从而执行电子设备100的各种功能应用以及数据处理。存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储电子设备100使用过程中所创建的数据(比如音频数据,电话本等)等。此外,存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,其他易失性固态存储器件,通用闪存存储器(universal flash storage,UFS)等。Internal memory 321 may be used to store computer executable program code, which includes instructions. The processor 310 executes instructions stored in the internal memory 321 to execute various functional applications and data processing of the electronic device 100 . The memory 121 may include a program storage area and a data storage area. Among them, the stored program area can store an operating system, at least one application program required for a function (such as a sound playback function, an image playback function, etc.). The storage data area may store data created during use of the electronic device 100 (such as audio data, phone book, etc.). In addition, the memory 121 may include high-speed random access memory, and may also include non-volatile memory, such as at least one disk storage device, a flash memory device, other volatile solid-state storage devices, universal flash storage (UFS), etc. .
电子设备100可以通过音频模块370,扬声器370A,受话器370B,麦克风370C, 耳机接口370D,以及应用处理器等实现音频功能。例如音乐播放,录音等。The electronic device 100 can use the audio module 370, the speaker 370A, the receiver 370B, the microphone 370C, Headphone interface 370D, and application processor implement audio functions. Such as music playback, recording, etc.
音频模块370用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块370还可以用于对音频信号编码和解码。在一些实施例中,音频模块370可以设置于处理器310中,或将音频模块370的部分功能模块设置于处理器310中。The audio module 370 is used to convert digital audio information into analog audio signal output, and is also used to convert analog audio input into digital audio signals. Audio module 370 may also be used to encode and decode audio signals. In some embodiments, the audio module 370 may be provided in the processor 310 , or some functional modules of the audio module 370 may be provided in the processor 310 .
扬声器370A,也称“喇叭”,用于将音频电信号转换为声音信号。电子设备100可以通过扬声器370A收听音乐,或收听免提通话。Speaker 370A, also called "speaker", is used to convert audio electrical signals into sound signals. Electronic device 100 can listen to music through speaker 370A, or listen to hands-free calls.
受话器370B,也称“听筒”,用于将音频电信号转换成声音信号。当电子设备100接听电话或语音信息时,可以通过将受话器370B靠近人耳接听语音。Receiver 370B, also called "earpiece", is used to convert audio electrical signals into sound signals. When the electronic device 100 answers a call or a voice message, the voice can be heard by bringing the receiver 370B close to the human ear.
麦克风370C,也称“话筒”,“传声器”,用于将声音信号转换为音频电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风370C发声,将声音信号输入到麦克风370C。电子设备100可以设置至少一个麦克风370C。在一些实施例中,电子设备100可以设置两个麦克风370C,除了采集声音信号,还可以实现降噪功能。在一些实施例中,电子设备100还可以设置三个,四个或更多麦克风370C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。Microphone 370C, also known as "microphone" and "microphone", is used to convert sound signals into audio electrical signals. When making a call or sending a voice message, the user can speak close to the microphone 370C with the human mouth and input the sound signal to the microphone 370C. The electronic device 100 may be provided with at least one microphone 370C. In some embodiments, the electronic device 100 may be provided with two microphones 370C, which in addition to collecting sound signals, may also implement a noise reduction function. In some embodiments, the electronic device 100 can also be equipped with three, four or more microphones 370C to collect sound signals, reduce noise, identify sound sources, and implement directional recording functions, etc.
耳机接口370D用于连接有线耳机。耳机接口370D可以是USB接口330,也可以是3.5mm的开放移动终端平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。The headphone interface 370D is used to connect wired headphones. The headphone interface 370D can be a USB interface 330, or a 3.5mm open mobile terminal platform (OMTP) standard interface, or a Cellular Telecommunications Industry Association of the USA (CTIA) standard interface.
按键390包括开机键,音量键等。按键390可以是机械按键。也可以是触摸式按键。电子设备100接收按键390输入,产生与电子设备100的用户设置以及功能控制有关的键信号输入。The buttons 390 include a power button, a volume button, etc. Key 390 may be a mechanical key. It can also be a touch button. The electronic device 100 receives key 390 input and generates key signal input related to user settings and function control of the electronic device 100 .
马达391可以产生振动提示。马达391可以用于来电振动提示,也可以用于触摸振动反馈。例如,作用于不同应用(例如拍照,音频播放等)的触摸操作,可以对应不同的振动反馈效果。作用于显示屏394不同区域的触摸操作,也可对应不同的振动反馈效果。不同的应用场景(例如:时间提醒,接收信息,闹钟,游戏等)也可以对应不同的振动反馈效果。触摸振动反馈效果还可以支持自定义。Motor 391 can produce vibration prompts. Motor 391 can be used for vibration prompts for incoming calls and can also be used for touch vibration feedback. For example, touch operations for different applications (such as taking pictures, audio playback, etc.) can correspond to different vibration feedback effects. Touch operations acting on different areas of the display screen 394 may also correspond to different vibration feedback effects. Different application scenarios (such as time reminders, receiving information, alarm clocks, games, etc.) can also correspond to different vibration feedback effects. The touch vibration feedback effect can also be customized.
指示器392可以是指示灯,可以用于指示充电状态,电量变化,也可以用于指示消息,未接来电,通知等。The indicator 392 may be an indicator light, which may be used to indicate charging status, power changes, or may be used to indicate messages, missed calls, notifications, etc.
SIM卡接口395用于连接SIM。SIM卡可以通过插入SIM卡接口395,或从SIM卡接口395拔出,实现和电子设备100的接触和分离。电子设备100可以支持1个或N个SIM卡接口,N为大于1的正整数。SIM卡接口395可以支持Nano SIM卡,Micro SIM卡,SIM卡等。同一个SIM卡接口395可以同时插入多张卡。所述多张卡的类型可以相同,也可以不同。SIM卡接口395也可以兼容不同类型的SIM卡。SIM卡接口395也可以兼容外部存储卡。电子设备100通过SIM卡和网络交互,实现通话以及数据通信等功能。在一些实施例中,电子设备100采用eSIM,即嵌入式SIM卡。eSIM卡可以嵌在电子设备100中,不能和电子设备100分离。SIM card interface 395 is used to connect SIM. The SIM card can be connected to or separated from the electronic device 100 by inserting it into the SIM card interface 395 or pulling it out from the SIM card interface 395 . The electronic device 100 can support 1 or N SIM card interfaces, where N is a positive integer greater than 1. SIM card interface 395 can support Nano SIM card, Micro SIM card, SIM card, etc. The same SIM card interface 395 can insert multiple cards at the same time. The types of the plurality of cards may be the same or different. The SIM card interface 395 is also compatible with different types of SIM cards. The SIM card interface 395 is also compatible with external memory cards. The electronic device 100 interacts with the network through the SIM card to implement functions such as calls and data communications. In some embodiments, the electronic device 100 employs an eSIM, an embedded SIM card. The eSIM card can be embedded in the electronic device 100 and cannot be separated from the electronic device 100 .
电子设备100的软件系统可以采用分层架构,事件驱动架构,微核架构,微服务架构,或云架构。本发明实施例以分层架构的Android系统为例,示例性说明电子设 备100的软件结构。The software system of the electronic device 100 may adopt a layered architecture, an event-driven architecture, a microkernel architecture, a microservice architecture, or a cloud architecture. The embodiment of the present invention takes the Android system with a layered architecture as an example to illustrate the electronic device Prepare the software structure of 100.
图4B是本发明实施例的电子设备100的软件结构框图。分层架构将软件分成若干个层,每一层都有清晰的角色和分工。层与层之间通过软件接口通信。在一些实施例中,将Android系统分为四层,从上至下分别为应用程序层,应用程序框架层,安卓运行时(Android runtime)和系统库,以及内核层。FIG. 4B is a software structure block diagram of the electronic device 100 according to the embodiment of the present invention. The layered architecture divides the software into several layers, and each layer has clear roles and division of labor. The layers communicate through software interfaces. In some embodiments, the Android system is divided into four layers, from top to bottom: application layer, application framework layer, Android runtime and system libraries, and kernel layer.
应用程序层可以包括一系列应用程序包。The application layer can include a series of application packages.
如图4B所示,应用程序包可以包括相机,图库,日历,电话(即本申请实施例中的“电话”应用),地图,导航,WLAN,蓝牙,音乐,视频,短信息等应用程序。As shown in Figure 4B, the application package may include applications such as camera, gallery, calendar, phone (i.e., the "phone" application in the embodiment of this application), map, navigation, WLAN, Bluetooth, music, video, short message, etc.
应用程序框架层为应用程序层的应用程序提供应用编程接口(application programming interface,API)和编程框架。应用程序框架层包括一些预先定义的函数。The application framework layer provides an application programming interface (API) and programming framework for applications in the application layer. The application framework layer includes some predefined functions.
如图4B所示,应用程序框架层可以包括窗口管理器,内容提供器,视图系统,电话管理器,资源管理器,通知管理器以及风险识别模块。As shown in Figure 4B, the application framework layer may include a window manager, a content provider, a view system, a phone manager, a resource manager, a notification manager, and a risk identification module.
风险识别模块可以通过与应用程序框架层的其他模块、应用程序层的各应用、系统库中各数据库、以及内核层的各驱动进行交互,来实现本实施例提供的风险识别方法。需要说明的是,本实施以风险识别模块布置在应用程序框架层为例进行说明。在另一些实施例中,风险识别模块可以部署在其他层,或者由其他模块实现。比如,本申请实施例所述风险识别模块的功能可以由“电话”应用实现或作为独立的应用实现。为了便于整体方案的描述,以下实施例中以执行主体为电子设备100为例进行介绍。The risk identification module can implement the risk identification method provided in this embodiment by interacting with other modules in the application framework layer, applications in the application layer, databases in the system library, and drivers in the kernel layer. It should be noted that this implementation takes the risk identification module arranged at the application framework layer as an example for explanation. In other embodiments, the risk identification module can be deployed in other layers or implemented by other modules. For example, the function of the risk identification module described in the embodiment of this application can be implemented by a "phone" application or as an independent application. In order to facilitate the description of the overall solution, the following embodiment is introduced by taking the execution subject as the electronic device 100 as an example.
窗口管理器用于管理窗口程序。窗口管理器可以获取显示屏大小,判断是否有状态栏,锁定屏幕,截取屏幕等。内容提供器用来存放和获取数据,并使这些数据可以被应用程序访问。所述数据可以包括视频,图像,音频,拨打和接听的电话,浏览历史和书签,电话簿等。视图系统包括可视控件,例如显示文字的控件,显示图片的控件等。视图系统可用于构建应用程序。显示界面可以由一个或多个视图组成的。例如,如图2B所示的拨号盘界面20以及提示信息界面21,示例性地,在拨号盘界面20中可以显示“拨号键盘”、被叫号码的视图、显示“拨打”图标以及其他功能性控件的视图。A window manager is used to manage window programs. The window manager can obtain the display size, determine whether there is a status bar, lock the screen, capture the screen, etc. Content providers are used to store and retrieve data and make this data accessible to applications. Said data can include videos, images, audio, calls made and received, browsing history and bookmarks, phone books, etc. The view system includes visual controls, such as controls that display text, controls that display pictures, etc. A view system can be used to build applications. The display interface can be composed of one or more views. For example, the dial pad interface 20 and the prompt information interface 21 are shown in Figure 2B. For example, the dial pad interface 20 can display a "dial pad", a view of the called number, a "dial" icon, and other functionalities. The view of the control.
电话管理器用于提供电子设备100的通信功能。例如,通话状态的管理(包括接通,挂断等)。资源管理器为应用程序提供各种资源,比如本地化字符串,图标,图片,布局文件,视频文件等等。通知管理器使应用程序可以在状态栏中显示通知信息,可以用于传达告知类型的消息,可以短暂停留后自动消失,无需用户交互。比如通知管理器被用于告知下载完成,消息提醒等。通知管理器还可以是以图表或者滚动条文本形式出现在系统顶部状态栏的通知,例如后台运行的应用程序的通知,还可以是以对话窗口形式出现在屏幕上的通知。例如在状态栏提示文本信息,发出提示音,电子设备振动,指示灯闪烁等。The phone manager is used to provide communication functions of the electronic device 100 . For example, call status management (including connected, hung up, etc.). The resource manager provides various resources to applications, such as localized strings, icons, pictures, layout files, video files, etc. The notification manager allows applications to display notification information in the status bar, which can be used to convey notification-type messages and can automatically disappear after a short stay without user interaction. For example, the notification manager is used to notify download completion, message reminders, etc. The notification manager can also be notifications that appear in the status bar at the top of the system in the form of charts or scroll bar text, such as notifications for applications running in the background, or notifications that appear on the screen in the form of conversation windows. For example, text information is prompted in the status bar, a beep sounds, the electronic device vibrates, the indicator light flashes, etc.
Android runtime包括核心库和虚拟机。Android runtime负责安卓系统的调度和管理。核心库包含两部分:一部分是java语言需要调用的功能函数,另一部分是安卓的核心库。Android runtime includes core libraries and virtual machines. Android runtime is responsible for the scheduling and management of the Android system. The core library contains two parts: one is the functional functions that need to be called by the Java language, and the other is the core library of Android.
应用程序层和应用程序框架层运行在虚拟机中。虚拟机将应用程序层和应用程序 框架层的java文件执行为二进制文件。虚拟机用于执行对象生命周期的管理,堆栈管理,线程管理,安全和异常的管理,以及垃圾回收等功能。The application layer and application framework layer run in virtual machines. The virtual machine combines the application layer and application The java files of the framework layer are executed as binary files. The virtual machine is used to perform object life cycle management, stack management, thread management, security and exception management, and garbage collection and other functions.
系统库可以包括多个功能模块。例如:表面管理器(surface manager),媒体库(media libraries),三维图形处理库(例如:openGL ES),2D图形引擎(例如:SGL)等。System libraries can include multiple functional modules. For example: surface manager (surface manager), media libraries (media libraries), 3D graphics processing libraries (for example: openGL ES), 2D graphics engines (for example: SGL), etc.
表面管理器用于对显示子系统进行管理,并且为多个应用程序提供了2D和3D图层的融合。媒体库支持多种常用的音频,视频格式回放和录制,以及静态图像文件等。媒体库可以支持多种音视频编码格式,例如:MPEG4,H.264,MP3,AAC,AMR,JPG,PNG等。三维图形处理库用于实现三维图形绘图,图像渲染,合成,和图层处理等。2D图形引擎是2D绘图的绘图引擎。The surface manager is used to manage the display subsystem and provides the fusion of 2D and 3D layers for multiple applications. The media library supports playback and recording of a variety of commonly used audio and video formats, as well as static image files, etc. The media library can support a variety of audio and video encoding formats, such as: MPEG4, H.264, MP3, AAC, AMR, JPG, PNG, etc. The 3D graphics processing library is used to implement 3D graphics drawing, image rendering, composition, and layer processing. 2D Graphics Engine is a drawing engine for 2D drawing.
内核层是硬件和软件之间的层。内核层至少包含显示驱动,摄像头驱动,音频驱动,传感器驱动。The kernel layer is the layer between hardware and software. The kernel layer contains at least display driver, camera driver, audio driver, and sensor driver.
基于图3所示的应用环境以及图4A、图4B所示的电子设备的硬件结构与电子设备的软件架构,以电子设备100执行本公开实施例为例,本公开实施例提供了一种风险识别方法,参见图5,本公开实施例提供的方法流程包括:Based on the application environment shown in Figure 3 and the hardware structure and software architecture of the electronic device shown in Figures 4A and 4B, taking the electronic device 100 executing the embodiment of the present disclosure as an example, the embodiment of the present disclosure provides a risk For the identification method, see Figure 5. The method flow provided by the embodiment of the present disclosure includes:
S501、在电子设备100检测到特定场景被触发的情况下,获取电子设备100产生的第一信息。S501. When the electronic device 100 detects that a specific scene is triggered, obtain the first information generated by the electronic device 100.
特定场景可以理解为电子设备100处于暂时无法进行通信连接的场景,示例性地,特定场景可以包括,电子设备100处于免打扰模式、电子设备100被设置呼叫转移、电子设备100被设置陌生来电拒接、电子设备100被设置飞行模式等。电子设备100可以通过监听应用进程的方式或监听交互界面的方式来检测特定场景是否被触发,例如,参考图2A,用户可以基于呼叫转移菜单交互界面10设置呼叫转移,电子设备100可以通过监听用户基于交互界面10的操作,检测是否产生设置呼叫转移操作。又例如,用户可以基于菜单设置交互界面设置是否开启免打扰模式,电子设备100可以通过监听菜单设置交互界面的操作,检测是否产生开启免打扰模式操作。The specific scenario can be understood as a scenario in which the electronic device 100 is temporarily unable to make a communication connection. For example, the specific scenario may include that the electronic device 100 is in a do not disturb mode, the electronic device 100 is set to call forwarding, and the electronic device 100 is set to reject unknown calls. Then, the electronic device 100 is set to airplane mode, etc. The electronic device 100 can detect whether a specific scene is triggered by monitoring the application process or monitoring the interactive interface. For example, referring to FIG. 2A , the user can set call transfer based on the call transfer menu interactive interface 10, and the electronic device 100 can detect whether the specific scene is triggered by monitoring the user interface. Based on the operation of the interactive interface 10, it is detected whether the setting call transfer operation occurs. For another example, the user can set whether to turn on the Do Not Disturb mode based on the menu setting interactive interface, and the electronic device 100 can detect whether the operation of turning on the Do Not Disturb mode occurs by monitoring the operation of the menu setting interactive interface.
第一信息可以为电子设备100在检测到第一时刻或第一时刻前预设时长内所产生的信息,这里第一时刻指的是特定场景被触发的时刻,示例性地,第一时刻前预设时长可以为第一时刻前5分钟、第一时刻前10分钟等。需要说明的是,本实施例所涉及到的第一信息、第一信息中的号码信息、第一信息中的环境信息均是指第一时刻或第一时刻前预设时长内产生的,本实施例对此不做限定。The first information may be information generated by the electronic device 100 when the first moment is detected or within a preset time period before the first moment. The first moment here refers to the moment when a specific scene is triggered. For example, before the first moment The preset time period can be 5 minutes before the first time, 10 minutes before the first time, etc. It should be noted that the first information, the number information in the first information, and the environmental information in the first information involved in this embodiment all refer to the first moment or the preset time period before the first moment. The embodiment does not limit this.
第一信息中包括特定环境所涉及的信息,例如,第一信息中包括特定环境为设置呼叫转移场景下产生的号码信息。第一信息中还可以包括特定环境为设置呼叫转移、免打扰模式等场景下产生的环境信息,环境信息可以为电话通话事件、应用运行事件和/或功能运行事件、应用下载事件或应用安装事件、应用交互事件等。需要说明的是,环境信息可以在任意一种特定环境下产生,例如,设置呼叫转移、设置免打扰模式、设置飞行模式、设置陌生来电拒接等;号码信息在涉及号码设置的特定环境下产生,例如,设置呼叫转移等。The first information includes information related to a specific environment. For example, the first information includes number information generated when the specific environment is a call transfer scenario. The first information may also include environmental information generated when the specific environment is setting call transfer, do not disturb mode, etc. The environmental information may be a phone call event, an application running event and/or a function running event, an application download event or an application installation event. , application interaction events, etc. It should be noted that environmental information can be generated in any specific environment, such as setting call forwarding, setting do not disturb mode, setting flight mode, setting rejection of unknown calls, etc.; number information is generated in a specific environment involving number settings. , for example, set up call forwarding, etc.
可选地,电话通话事件指的电子设备100的通话应用在第一时刻正在运行或者在第一时刻前预设时长内运行过。若确定通话应用正在运行,电子设备100获取通话应 用所产生的当前通话号码;若确定通话应用在第一时刻前预设时长内运行过,则电子设备100获取通话应用所产生的历史通话号码。其中,历史通话号码可以为第一时刻前预设时间(如10分钟)内的所有对端通话号码。Optionally, the phone call event refers to the call application of the electronic device 100 being running at the first moment or running within a preset time period before the first moment. If it is determined that the call application is running, the electronic device 100 obtains the call application The generated current call number is used; if it is determined that the call application has been run within the preset time period before the first moment, the electronic device 100 obtains the historical call number generated by the call application. Among them, the historical call numbers can be all the peer call numbers within the preset time (such as 10 minutes) before the first moment.
可选地,上述应用运行事件和/或功能运行事件指的是电子设备100中应用的正在运行或运行过,以及,应用对应的功能的正在运行或运行过。比如,在第一时刻应用A正在运行,或者,在第一时刻前预设时长内应用A曾运行过,或者,在第一时刻应用A对应的功能正在运行,或者,在第一时刻前预设时长内应用A对应的功能被运行过。在本实施例中,电子设备100可以通过查询当前进程,来确定是否有应用正在运行或是否正在处于某种功能模式中。可选地,电子设备还可以基于应用或功能的运行开始时刻、运行结束时刻等信息来确定第一时刻前预设时长内,应用是否运行过或电子设备100曾处于某种功能模式中。例如,应用A的最后运行开始时刻为在2022年6月16日17:38,其最后运行结束时刻为2022年6月16日17:50,第一时刻为2022年6月16日17:52,第一时刻前预设时长为第一时刻前30分钟,显然,应用A在第一时刻前30分钟运行过。需要说明的是,若某个应用只有最后运行开始时刻,而没有最后运行结束时刻,也可以说明该应用正在运行。可选地,该应用可以在前台运行,该应用也可以在后台运行。可选地,电子设备100还可以从各个应用对应的日志log中获取应用和/或功能运行事件。或者,还可以约定各个应用与电子设备100的风险识别模块的交互策略,该交互策略具体表现为在应用开始运行或结束运行时,和/或,应用的功能开启或关闭时,向风险识别模块发送该操作相应的操作时刻和操作类型,从而风险识别模块基于这些信息进行汇总得到应用运行事件和/或功能运行事件。Optionally, the above-mentioned application running event and/or function running event refers to the current running or running of the application in the electronic device 100, and the current running or running of the function corresponding to the application. For example, application A is running at the first moment, or application A has been run within the preset time period before the first moment, or the function corresponding to application A is running at the first moment, or preset before the first moment Assume that the function corresponding to application A has been run within the duration. In this embodiment, the electronic device 100 can determine whether an application is running or is in a certain functional mode by querying the current process. Optionally, the electronic device can also determine whether the application has been run or the electronic device 100 has been in a certain functional mode within a preset time period before the first time based on information such as the running start time and running end time of the application or function. For example, the last running start time of application A is 17:38 on June 16, 2022, its last running end time is 17:50 on June 16, 2022, and the first time is 17:52 on June 16, 2022 , the default duration before the first moment is 30 minutes before the first moment. Obviously, application A ran 30 minutes before the first moment. It should be noted that if an application only has the last running start time but no last running end time, it can also mean that the application is running. Optionally, the app can run in the foreground, and the app can also run in the background. Optionally, the electronic device 100 can also obtain application and/or function running events from the log corresponding to each application. Alternatively, an interaction strategy between each application and the risk identification module of the electronic device 100 can also be agreed upon. The interaction strategy is specifically expressed as sending a request to the risk identification module when the application starts running or ends running, and/or when the function of the application is turned on or off. The corresponding operation time and operation type of the operation are sent, so that the risk identification module summarizes and obtains application running events and/or function running events based on this information.
可选地,上述应用下载事件或应用安装事件指的是电子设备100中应用正在下载或安装,或者,应用完成下载或安装。可选地,电子设备100可以通过查询当前进程确定是否有应用正在下载或正在安装。或者,电子设备可以基于应用的下载开始时刻和结束时刻、安装开始时刻和结束时刻来确定是否有应用正在下载或安装。或者,电子设备可以基于应用的下载开始时刻和结束时刻、安装开始时刻和结束时刻来确定是否有应用在第一时刻前预设时长内完成下载或安装。Optionally, the above-mentioned application download event or application installation event refers to that the application in the electronic device 100 is being downloaded or installed, or that the application has completed downloading or installation. Alternatively, the electronic device 100 may determine whether an application is being downloaded or installed by querying the current process. Alternatively, the electronic device may determine whether an application is being downloaded or installed based on the download start time and end time, and the installation start time and end time of the application. Alternatively, the electronic device may determine whether an application has been downloaded or installed within a preset time period before the first time based on the download start time and end time, and the installation start time and end time of the application.
可选地,上述应用交互事件指的是应用将信息反馈至电子设备100的风险识别模块产生的交互,例如,具有风险识别与提醒的应用可在识别到风险操作时,产生风险提示信息发送至电子设备的风险识别模块中。电子设备100可实时检测是否产生了与应用的交互信息,从而基于这些交互信息来进行风险操作的识别。Optionally, the above-mentioned application interaction event refers to the interaction generated by the application feeding back information to the risk identification module of the electronic device 100. For example, an application with risk identification and reminder can generate risk prompt information and send it to In the risk identification module of electronic equipment. The electronic device 100 can detect in real time whether interaction information with the application is generated, and thereby identify risky operations based on the interaction information.
可选地,在设置呼叫转移的特定场景下,第一信息可以包括呼叫转移号码,或者,第一信号可以包括本机号码和呼叫转移号码,或者,第一信息可以包括用于指示本机号码的第一标识和呼叫转移号码。其中,第一标识可以为终端的IP地址、IMSI等可以关联本机号码的标识。示例性地,电子设备100可以向服务器发送携带第一标识和呼叫转移号码的呼叫转移设置请求,在这种情况下,服务器可以基于第一标识确定电子设备100的本机号码,从而基于本机号码和呼叫转移号码设置电子设备100中本机号码的呼叫转移功能。也即,第一标识用于使服务器确定与其关联的号码。示例性地,电子设备100向服务器发送的设置请求中的第一信息仅包含呼叫转移号码,此时服务器可以在与电子设备建立网络层的连接时直接提取电子设备对应的标识,如IP地址, 从而确定所对应的本机号码。可选地,第一信息中还可以包括其他可以为电子设备100提供风险识别的信息,本实施例对此不做限定。Optionally, in a specific scenario where call forwarding is set, the first information may include a call forwarding number, or the first signal may include the local number and the call forwarding number, or the first information may include a number indicating the local number. The first identification and call forwarding number. The first identifier may be the terminal's IP address, IMSI, or other identifier that can be associated with the local number. For example, the electronic device 100 can send a call forwarding setting request carrying a first identification and a call forwarding number to the server. In this case, the server can determine the local number of the electronic device 100 based on the first identification, thereby based on the local number. The number and call forwarding number set the call forwarding function of the local number in the electronic device 100 . That is, the first identification is used to enable the server to determine the number associated with it. For example, the first information in the setting request sent by the electronic device 100 to the server only contains the call forwarding number. At this time, the server can directly extract the identification corresponding to the electronic device, such as the IP address, when establishing a network layer connection with the electronic device. To determine the corresponding local number. Optionally, the first information may also include other information that can provide risk identification for the electronic device 100, which is not limited in this embodiment.
S502、电子设备100根据第一信息进行当前操作的风险识别,确定电子设备100是否存在风险操作。S502. The electronic device 100 performs risk identification of the current operation based on the first information, and determines whether the electronic device 100 has a risky operation.
根据获取到的不同的第一信息,电子设备100基于第一信息进行当前操作的风险识别包括多个方面:According to the obtained different first information, the risk identification of the current operation performed by the electronic device 100 based on the first information includes multiple aspects:
方面一:在电子设备100检测到进行设置呼叫转移操作的特定场景下,获取到的第一信息至少包括呼叫转移号码。电子设备100可以判断呼叫转移号码是否为安全号码,这里,安全号码可以理解为电子设备100中预先设定的白名单中的号码、或电子设备100的通讯录中的号码、或电子设备100中的另外一个本机SIM卡号码、或属主信息与本机号码的属主信息相同的号码。电子设备100基于以上条件确定呼叫转移号码为安全号码,则确定当前操作没有风险操作;若确定呼叫转移号码不是安全号码,则确定当前操作存在风险操作。又如,电子设备100还可以判断呼叫转移号码是否为风险号码,风险号码可以包括电子设备100中黑名单中的号码、或三方风险识别平台所标记的风险号码等。电子设备100基于以上条件确定呼叫转移号码为风险号码,则确定当前操作存在风险操作;若确定呼叫转移号码不是风险号码,则确定当前操作不存在风险操作。Aspect 1: In a specific scenario where the electronic device 100 detects a call forwarding setting operation, the obtained first information at least includes a call forwarding number. The electronic device 100 can determine whether the call forwarding number is a security number. Here, the security number can be understood as a number in a preset white list in the electronic device 100, or a number in the address book of the electronic device 100, or a number in the electronic device 100. Another local SIM card number, or a number whose owner information is the same as the owner information of this phone number. If the electronic device 100 determines that the call forwarding number is a safe number based on the above conditions, it determines that the current operation does not involve a risky operation; if it determines that the call forwarding number is not a safe number, it determines that the current operation involves a risky operation. For another example, the electronic device 100 can also determine whether the call forwarding number is a risk number. The risk number may include a number in a blacklist in the electronic device 100 or a risk number marked by a third-party risk identification platform. If the electronic device 100 determines that the call forwarding number is a risk number based on the above conditions, it determines that the current operation involves a risky operation; if it determines that the call forwarding number is not a risk number, it determines that the current operation does not involve a risky operation.
可选地,第一信息可以包括呼叫转移号码,或者,本机号码和呼叫转移号码,或者,与本机号码关联的第一标识和呼叫转移号码。针对上述电子设备100判断呼叫转移号码的属主信息与本机号码的属主信息是否一致的情况,电子设备100可以向服务器发送携带第一信息的属主信息查询请求,以使服务器在基于第一信息获取本机号码的属主信息和呼叫转移号码的属主信息之后,向电子设备100返回携带本机号码的属主信息和呼叫转移号码的属主信息的查询应答。电子设备100基于接收到的本机号码的属主信息和呼叫转移号码的属主信息进行比对,若二者一致,则确定当前操作不存在风险操作;若二者不一致,则确定当前操作存在风险操作。或者,电子设备100还可以向服务器发送携带第一信息的比对结果查询请求,以使服务器在基于第一信息获取本机号码的属主信息和呼叫转移号码的属主信息并进行比对,得到本机号码的属主信息和呼叫转移号码的属主信息是否一致的比对结果之后,向电子设备100返回携带比对结果的查询应答。若电子设备100确定接收到的比对结果表示二者一致,则确定当前操作不存在风险操作;若比对结果表示二者不一致,则确定当前操作存在风险操作。可选地,电子设备100还可以基于上述多种信息进行综合判断,来确定当前操作是否存在风险操作。Optionally, the first information may include a call forwarding number, or a local number and a call forwarding number, or a first identification associated with the local number and a call forwarding number. In the above situation where the electronic device 100 determines whether the owner information of the call forwarding number is consistent with the owner information of the local number, the electronic device 100 may send an owner information query request carrying the first information to the server, so that the server can query the owner information based on the first information. After acquiring the owner information of the local number and the call forwarding number, a query response carrying the owner information of the local number and the call forwarding number is returned to the electronic device 100 . The electronic device 100 compares the received owner information of the local number and the owner information of the call forwarding number. If the two are consistent, it is determined that there is no risky operation in the current operation; if the two are inconsistent, it is determined that the current operation exists. Risky operations. Alternatively, the electronic device 100 may also send a comparison result query request carrying the first information to the server, so that the server obtains the owner information of the local number and the owner information of the call forwarding number based on the first information and performs comparison. After obtaining the comparison result of whether the owner information of the local number and the call forwarding number are consistent, a query response carrying the comparison result is returned to the electronic device 100 . If the electronic device 100 determines that the received comparison result indicates that the two are consistent, it determines that the current operation does not include a risky operation; if the comparison result indicates that the two are inconsistent, it determines that the current operation includes a risky operation. Optionally, the electronic device 100 can also make a comprehensive judgment based on the above multiple types of information to determine whether the current operation involves a risky operation.
方面二:电子设备100可能处于上述任意一种特定场景下,其获取到的第一信息包括环境信息,电子设备100根据上述步骤S501中环境信息来确定当前操作是否为风险操作。Aspect 2: The electronic device 100 may be in any of the above specific scenarios, and the first information it obtains includes environmental information. The electronic device 100 determines whether the current operation is a risky operation based on the environmental information in step S501.
可选地,在一种情况下,环境信息为电话通话事件,其对应的风险操作为通话号码为风险号码,和/或,通话号码不是安全号码。电子设备100确定产生电话通话事件,则意味着通话应用正在运行,或者,通话应用在检测到第一时刻前预设时长内运行过。在这种情况下,以通话应用为“电话”来举例说明,电子设备100可以获取“电话” 应用的通话号码,例如,若“电话”应用正在运行,则获取当前通话号码;若“电话”应用在第一时刻前预设时长内运行过,则获取历史通话号码,或者,通过向“电话”应用获取其历史通话记录判断第一时刻前预设时长内是否发生过历史通话,以获取对应的历史通话号码。电子设备100基于当前通话号码和/或历史通话号码进行风险操作的识别,包括判断当前通话号码是否为安全号码、是否为风险号码,判断历史通话号码是否为安全号码、是否为风险号码,具体判断方法与上述方面一判断呼叫转移号码是否为安全号码、是否为风险号码。在电子设备100确定历史通话号码为安全号码,或者,确定历史通话号码不是风险号码,或者,确定历史通话号码既是安全号码又不是风险号码的情况下,确定不存在风险操作。在确定史通话号码不是安全号码,或者,确定历史通话号码是风险号码,或者,确定历史通话号码即不是安全号码又是风险号码,则确定当前操作是否存在风险操作。Optionally, in one case, the environmental information is a phone call event, and its corresponding risk operation is that the call number is a risk number, and/or the call number is not a safe number. If the electronic device 100 determines that a phone call event is generated, it means that the call application is running, or that the call application has been run within a preset time period before the first moment is detected. In this case, taking the call application as "phone" as an example, the electronic device 100 can obtain "phone" The call number of the application. For example, if the "Phone" application is running, the current call number is obtained; if the "Phone" application has been run within the preset time period before the first moment, the historical call number is obtained, or by requesting the "Phone" application. "The application obtains its historical call records to determine whether historical calls have occurred within the preset time period before the first moment, so as to obtain the corresponding historical call number. The electronic device 100 performs risk operation identification based on the current call number and/or the historical call number, including determining whether the current call number is a safe number or a risk number, and determining whether the historical call number is a safe number or a risk number. The specific determination is The method is the same as the above one: determine whether the call forwarding number is a safe number or a risk number. When the electronic device 100 determines that the historical call number is a safe number, or determines that the historical call number is not a risk number, or determines that the historical call number is both a safe number and not a risk number, it is determined that there is no risky operation. After it is determined that the historical call number is not a safe number, or it is determined that the historical call number is a risk number, or it is determined that the historical call number is both a safe number and a risk number, it is determined whether the current operation contains a risky operation.
可选地,电子设备100还可以获取通话应用的风险识别结果,例如,通话应用具备基于通话号码进行风险识别的功能,电子设备100在确定产生电话通话事件之后,向通话应用发出查询历史通话号码或者当前通话号码是否存在风险的请求,通话应用对通话号码进行风险识别,向电子设备100返回识别结果,从而电子设备100基于识别结果确定通话号码是否存在风险。Optionally, the electronic device 100 can also obtain the risk identification result of the call application. For example, the call application has the function of risk identification based on the call number. After determining that a phone call event occurs, the electronic device 100 sends a query history call number to the call application. Or to request whether the current call number is risky, the call application performs risk identification on the call number and returns the identification result to the electronic device 100, so that the electronic device 100 determines whether the call number is risky based on the identification result.
可选地,在另一种情况下,环境信息为应用运行事件和/或功能运行事件,其对应的风险操作指的是存在特定应用正在运行,或者,存在特定应用在第一时刻前预设时长内运行过,或者,存在特定应用的特定功能正在运行,或者,存在特定应用的特定功能在第一时刻前预设时长内运行过。这里特定应用可以为有共享屏幕或远程控制模式的应用,其相应的特定功能可以是共享屏幕或远程控制模式开启。可选地,特定应用也可以是支付类应用,相应的特定功能可以是支付或转账活动执行。可选地,特定功能还可以为电子设备的功能模式,例如,电子设备处于系统免打扰模式、系统共享桌面模式、系统远程控制模式。Optionally, in another case, the environment information is an application running event and/or a function running event, and the corresponding risk operation refers to the existence of a specific application running, or the existence of a specific application preset before the first moment. has been run within the time period, or there is a specific function of a specific application that is running, or there is a specific function of a specific application that has been run within the preset time period before the first moment. The specific application here can be an application with screen sharing or remote control mode, and its corresponding specific function can be enabled by screen sharing or remote control mode. Optionally, the specific application can also be a payment application, and the corresponding specific function can be the execution of payment or transfer activities. Optionally, the specific function may also be a functional mode of the electronic device, for example, the electronic device is in the system do not disturb mode, the system shared desktop mode, or the system remote control mode.
电子设备100可以通过查询当前进程,确定是否存在特定应用和/或功能运行事件。例如,电子设备100通过查询当前进程,确定电子设备通过具有共享功能的特定应用A正处于共享模式,则确定当前操作存在风险操作。又如,电子设备100通过查询当前进程,确定具有支付作用的特定应用B正在运行,则确定当前操作存在风险操作。可选地,电子设备100还可以根据特定应用的运行开始时刻、运行结束时刻,确定特定应用在第一时刻前预设时长内是否运行过,若确定特定应用在第一时刻前预设时长内运行过,则确定当前操作存在风险操作。The electronic device 100 can determine whether there is a specific application and/or function running event by querying the current process. For example, by querying the current process, the electronic device 100 determines that the electronic device is in the sharing mode through a specific application A with a sharing function, and then determines that the current operation involves a risky operation. For another example, the electronic device 100 determines that a specific application B with a payment function is running by querying the current process, and then determines that the current operation involves a risky operation. Optionally, the electronic device 100 can also determine whether the specific application has been run within the preset time period before the first time based on the running start time and the running end time of the specific application. If it is determined that the specific application has been run within the preset time period before the first time, If it has been run, it is determined that the current operation contains risky operations.
可选地,在又一种情况下,环境信息为应用下载事件或应用安装事件,其对应的风险操作指的是存在下载或安装风险应用的行为。本实施例中,电子设备100可以基于实时向三方风险识别平台查询的结果确定应用是否为风险应用;或者,电子设备100还可以直接向三方风险识别平台获取风险应用名单,根据风险应用名单来确定应用是否为风险应用;或者,电子设备还可以基于预先存储在本地的风险应用名单来确定应用是否为风险应用。示例性地,电子设备100可以通过查询当前进程以及进程日志,确定第一时刻或第一时刻前预设时长内是否存在下载或安装应用的行为,若存在下载或安装的应用,则判断该应用是否为风险应用,若是风险应用,则确定当前操作存在 风险操作;若该下载或安装的应用不是风险应用,则确定当前操作不存在风险操作。Optionally, in another case, the environment information is an application download event or an application installation event, and the corresponding risky operation refers to the behavior of downloading or installing a risky application. In this embodiment, the electronic device 100 can determine whether the application is a risk application based on the results of real-time query to the three-party risk identification platform; or, the electronic device 100 can also directly obtain the risk application list from the three-party risk identification platform and determine based on the risk application list. Whether the application is a risk application; alternatively, the electronic device can also determine whether the application is a risk application based on a pre-stored locally risk application list. For example, the electronic device 100 can determine whether there is a download or installation of an application at the first moment or within a preset time period before the first moment by querying the current process and the process log. If there is a downloaded or installed application, determine the application. Whether it is a risky application. If it is a risky application, determine whether the current operation exists. Risk operation; if the downloaded or installed application is not a risk application, it is determined that the current operation does not involve a risk operation.
可选地,在又一种情况下,环境信息为应用交互事件,其对应的风险操作指的是接收到特定应用发送的风险提示消息。这里特定应用可以为具有风险识别与风险提示的应用,例如,一些支付应用为保证支付操作的安全进行,一般这些支付应用具备支付环境的风险识别,若该支付应用在其支付环境中检测到风险,则向风险识别模块发送风险提示消息;又如,一些通讯类应用(如电话、短信、即时通讯软件等)在检测到用户使用电子设备与风险号码或账号通信时,向风险识别模块发送风险提示消息;再如,一些安全管理类应用(如手机卫士等)在检测到电子设备上存在特定风险行为时,向风险识别模块发送风险提示消息。电子设备100的风险识别模块若在第一时刻或第一时刻前预设时长内接受到这些特定应用发送的风险提示信息,则确定当前操作存在风险操作。Optionally, in another case, the environment information is an application interaction event, and the corresponding risk operation refers to receiving a risk warning message sent by a specific application. The specific application here can be an application with risk identification and risk prompts. For example, some payment applications ensure the safety of payment operations. Generally, these payment applications have risk identification of the payment environment. If the payment application detects risks in its payment environment, , then send a risk reminder message to the risk identification module; for another example, when some communication applications (such as phone calls, text messages, instant messaging software, etc.) detect that the user uses an electronic device to communicate with a risk number or account, they send a risk warning message to the risk identification module. Prompt messages; for another example, some security management applications (such as Mobile Guard, etc.) send risk prompt messages to the risk identification module when detecting specific risk behaviors on electronic devices. If the risk identification module of the electronic device 100 receives the risk reminder information sent by these specific applications at the first moment or within a preset time period before the first moment, it determines that the current operation contains a risky operation.
需要说明的是,特定应用与电子设备100的风险识别模块进行交互的前提是,电子设备100的风险识别模块与特定应用之间已明确交互策略,例如,特定应用在确定存在风险操作并产生风险提示信息之后,会基于交互策略,将风险提示信息反馈至风险识别模块,以使得风险识别模块基于风险提示信息进行风险识别操作,具体交互策略可根据实际情况确定,本实施例对此不做限定。It should be noted that the premise for a specific application to interact with the risk identification module of the electronic device 100 is that the interaction strategy has been clearly defined between the risk identification module of the electronic device 100 and the specific application. For example, the specific application determines that there is a risky operation and generates risks. After prompting the information, the risk prompt information will be fed back to the risk identification module based on the interaction strategy, so that the risk identification module performs risk identification operations based on the risk prompt information. The specific interaction strategy can be determined according to the actual situation, and this embodiment does not limit this .
方面三:电子设备100根据第一信息中的号码信息和环境信息,采用上述方面一和方面二提供的方式进行对应的风险识别,从而确定当前环境是否存在风险操作。可选地,电子设备100基于第一信息的不同内容进行风险识别的方式不局限于一种,电子设备100可以对不同风险识别的方式进行组合,按照一定的执行顺序或执行逻辑对当前环境进行风险识别,在多种风险识别方式中存在至少一种方式表明当前环境中存在风险操作的情况下,确定当前环境中存在风险操作;若多种风险识别方式中均表明当前环境中不存在风险操作,则确定当前环境中不存在风险操作。需要说明的是,本实施例中,对多种风险识别方式的执行逻辑不做限定,例如,多种风险识别方式可以全部同时并列执行;也可部分同时执行,部分顺序执行;也可全部顺序执行。其中,执行顺序根据实际情况确定,本实施例对此不做限定。Aspect 3: Based on the number information and environmental information in the first information, the electronic device 100 performs corresponding risk identification using the methods provided by aspects 1 and 2 above, thereby determining whether there is a risky operation in the current environment. Optionally, the way in which the electronic device 100 performs risk identification based on different contents of the first information is not limited to one. The electronic device 100 can combine different risk identification ways, and perform analysis on the current environment according to a certain execution sequence or execution logic. Risk identification, if at least one of the multiple risk identification methods indicates that there is a risky operation in the current environment, it is determined that there is a risky operation in the current environment; if multiple risk identification methods all indicate that there is no risky operation in the current environment , it is determined that there are no risky operations in the current environment. It should be noted that in this embodiment, the execution logic of multiple risk identification methods is not limited. For example, multiple risk identification methods can all be executed simultaneously and in parallel; some of them can be executed simultaneously and some of them sequentially; or all of them can be executed sequentially. implement. The execution sequence is determined according to actual conditions, and is not limited in this embodiment.
S503、在确定电子设备100存在风险操作的情况下,输出风险预警信息。S503. When it is determined that the electronic device 100 has a risky operation, output risk warning information.
其中,风险预警信息表示当前环境存在风险操作,目的在于提醒用户终止当前特定场景的设置操作,或,提醒用户当前特定场景的设置操作的风险性。在本实施例中,电子设备100在基于第一信息确定当前环境存在风险操作的情况下,可以通过多种方式输出风险预警信息。Among them, the risk warning information indicates that there are risky operations in the current environment, and the purpose is to remind the user to terminate the setting operation of the current specific scenario, or to remind the user of the risk of the setting operation of the current specific scenario. In this embodiment, when the electronic device 100 determines that a risky operation exists in the current environment based on the first information, the electronic device 100 may output the risk warning information in a variety of ways.
可选地,电子设备100可以在当前交互界面中显示风险预警信息。例如,在通过拨号设置呼叫转移功能的特定场景下,电子设备检测到设置呼叫转移功能被触发,电子设备100基于第一信息中的本机号码和呼叫转移号码137********,以及向服务器获取到的本机号码的属主信息和呼叫转移号码的属主信息,确定该呼叫转移号码为风险号码,电子设备可基于当前界面20显示风险预警信息界面22,可参考图6所示,风险预警信息界面22中包括“呼叫转移号码137********为风险号码”的风险预警信息,可选地,风险预警信息界面22还可以包括“请确定是否继续设置呼叫转移”的再次确定内容,在电子设备100检测到用户基于风险预警信息界面22触发“取消”控件 的情况下,电子设备100取消设置呼叫转移的操作。可选地,用户也可以选择继续设置呼叫转移,在电子设备100检测到用户基于风险预警信息界面22触发“确定”控件的情况下,电子设备100继续执行设置呼叫转移的操作。Optionally, the electronic device 100 can display risk warning information in the current interactive interface. For example, in a specific scenario of setting the call forwarding function by dialing, the electronic device detects that setting the call forwarding function is triggered, and the electronic device 100 bases the local number and the call forwarding number 137******** in the first information on , as well as the owner information of the local number and the owner information of the call forwarding number obtained from the server, it is determined that the call forwarding number is a risk number, and the electronic device can display the risk warning information interface 22 based on the current interface 20, please refer to Figure 6 As shown in the figure, the risk warning information interface 22 includes the risk warning information that "the call transfer number 137******** is a risk number". Optionally, the risk warning information interface 22 may also include the risk warning information of "Please confirm whether to continue setting.""Calltransfer" is re-determined when the electronic device 100 detects that the user triggers the "cancel" control based on the risk warning information interface 22 In this case, the electronic device 100 cancels the operation of setting call forwarding. Optionally, the user may also choose to continue setting call forwarding. When the electronic device 100 detects that the user triggers the "OK" control based on the risk warning information interface 22, the electronic device 100 continues to perform the operation of setting call forwarding.
又例如,在设置免打扰模式的场景下,电子设备100检测到设置免打扰模式被触发,获取第一信息,在这种场景下,电子设备100可以基于第一信息中的环境信息,确定当前环境中存在风险操作,可以在当前界面中显示风险预警信息界面,这里,风险预警信息界面中可以包括“当前操作存在风险,请确定是否继续”的提醒与进行二次确定的内容,类似地,该风险预警信息界面中也可以包括用于触发用户进行确定操作与取消操作的“确定”、“取消”的控件,若电子设备100检测到“取消”控件被触发,则取消设置免打扰模式;若电子设备100检测到“确定”控件被触发,则继续执行设置免打扰模式的操作。需要说明的是,用户还可以直接通过语音输入的方式进行二次确定或者取消操作,本实施例对用户进行二次确定与取消操作的具体实现方式不限定。For another example, in a scenario where the do-not-disturb mode is set, the electronic device 100 detects that the do-not-disturb mode is triggered and obtains the first information. In this scenario, the electronic device 100 can determine the current situation based on the environmental information in the first information. If there are risky operations in the environment, the risk warning information interface can be displayed in the current interface. Here, the risk warning information interface can include the reminder "The current operation is risky, please confirm whether to continue" and the content of secondary determination. Similarly, The risk warning information interface may also include "OK" and "Cancel" controls for triggering the user to confirm and cancel operations. If the electronic device 100 detects that the "Cancel" control is triggered, the do not disturb mode is cancelled; If the electronic device 100 detects that the "OK" control is triggered, it continues to perform the operation of setting the do not disturb mode. It should be noted that the user can also directly perform the secondary confirmation or cancellation operation through voice input. This embodiment does not limit the specific implementation method of the user's secondary confirmation or cancellation operation.
可选地,电子设备100还可以通过其他方式输出风险预警信息,例如,通过电子设备100中的扬声器、听筒等音频输出设备输出风险预警音频,该风险预警音频可以为蜂鸣声、警报声等,也可以为包括语音内容的音频。示例性地,在设置呼叫转移功能的特定场景,电子设备100确定呼叫转移号码为风险号码的情况下,电子设备100输出风险预警音频,该音频的语音内容可以包括“呼叫转移号码137********为风险号码,请确定是否继续设置呼叫转移”,进一步地,电子设备100同样可以在当前界面输出包括确定、取消的提示界面,用于用户进行再次确定,在用户选择确定或取消之后,解除风险预警音频提示,并基于用户所触发的操作进行相应的操作。在其他特定场景下,通过音频输出设备输出风险预警音频类似,本实施来不做赘述。Optionally, the electronic device 100 can also output risk warning information in other ways, for example, by outputting risk warning audio through audio output devices such as speakers and earpieces in the electronic device 100. The risk warning audio can be a buzzer, an alarm, etc. , which can also be audio including voice content. For example, in a specific scenario where the call forwarding function is set and the electronic device 100 determines that the call forwarding number is a risk number, the electronic device 100 outputs a risk warning audio, and the voice content of the audio may include "Call forwarding number 137*** ***** is a risk number, please confirm whether to continue setting up call forwarding". Further, the electronic device 100 can also output a prompt interface including confirmation and cancellation on the current interface for the user to confirm again. When the user selects OK or Cancel After cancellation, the risk warning audio prompt is released, and corresponding operations are performed based on the operation triggered by the user. In other specific scenarios, the risk warning audio output through the audio output device is similar, and will not be described in detail in this implementation.
可选地,其他方式还可以包括电子设备100触发身份验证操作并通过语音或者显示界面输出风险预警信息,示例性地,身份验证操作可以包括基于电子设备的当前界面进行人脸识别,将采集到的人脸特征与电子设备100中已有的人脸特征进行匹配,在匹配通过的情况下,通过语音或者显示界面输出风险预警信息,进一步地,电子设备100同样可以在当前界面输出包括确定、取消的提示界面,用于用户进行再次确定,在用户选择确定或取消之后,解除风险预警音频提示,并基于用户所触发的操作进行相应的操作;若电子设备100确定人脸特征匹配失败,则说明电子设备100可能处于丢失状态,此时电子设备100可以基于当前显示界面执行锁定屏幕操作,强制终止用户进行特定场景的设置操作。Optionally, other methods may also include the electronic device 100 triggering an identity verification operation and outputting risk warning information through voice or a display interface. For example, the identity verification operation may include performing face recognition based on the current interface of the electronic device, and collecting the collected information. The facial features of the electronic device 100 are matched with the existing facial features in the electronic device 100. If the matching is passed, the risk warning information is output through the voice or display interface. Furthermore, the electronic device 100 can also output the information including confirmation, The cancellation prompt interface is used for the user to confirm again. After the user selects confirmation or cancellation, the risk warning audio prompt is released, and corresponding operations are performed based on the operation triggered by the user; if the electronic device 100 determines that the facial feature matching fails, then It is noted that the electronic device 100 may be in a lost state. At this time, the electronic device 100 may perform a lock screen operation based on the current display interface and force the user to terminate the setting operation of a specific scene.
可选地,在上述用户再次确定的过程中,若电子设备100检测到用户触发取消操作,进一步地,电子设备100还可以在当前界面输出设置特定场景失败的信息。示例性地,在设置呼叫转移功能的特定场景下,电子设备100检测到用户触发取消操作,则可以在当前界面输出设置呼叫转移失败的信息;在设置免打扰模式的特定场景下,电子设备100检测到用户触发取消操作,则可以在当前界面输出设置免打扰模式失败的信息,本实施例对此不做限定。Optionally, during the above-mentioned user re-determination process, if the electronic device 100 detects that the user triggers a cancellation operation, the electronic device 100 may further output information on the current interface that the setting of the specific scene failed. For example, in a specific scenario of setting the call transfer function, if the electronic device 100 detects that the user triggers a cancellation operation, it can output information on the current interface that the call transfer failed to be set; in a specific scenario of setting the do not disturb mode, the electronic device 100 If it is detected that the user triggers the cancellation operation, information indicating that the setting of the do-not-disturb mode failed can be output on the current interface, which is not limited in this embodiment.
结合上述实施例的内容,可选地,在电子设备100输出风险预警信息之后,电子设备100还可执行以下步骤: Combined with the contents of the above embodiments, optionally, after the electronic device 100 outputs the risk warning information, the electronic device 100 may also perform the following steps:
S504、在电子设备100检测到取消操作时,输出设置失败的提示消息。S504. When the electronic device 100 detects the cancellation operation, output a prompt message indicating that the setting fails.
可选地,用户可以通过触发交互界面中取消控件来执行取消操作,用户还可以通过语音输入“取消”来执行取消操作,或者,用户还可以通过“home”键、音量键等指定按键进行双击等指定操作来执行取消操作,本实施例对此不做限定。在电子设备100检测到取消操作时,在输出设置失败的提示消息的同时,或,在输出设置失败的提示消息之后,或者,在输出设置失败的提示消息之前,电子设备100执行终止当前特定场景的设置操作,示例性地,若当前是在设置呼叫转移,则电子设备100终止向服务器101发送设置呼叫转移请求的操作;又例如,若当前是设置免打扰模式,则电子设备100终止将系统设置为免打扰模式操作,也即,电子设备100禁止开启免打扰模式。Optionally, the user can perform the cancellation operation by triggering the cancel control in the interactive interface. The user can also perform the cancellation operation by inputting "cancel" by voice. Alternatively, the user can also double-click the designated keys such as the "home" key and the volume key. Wait for the specified operation to perform the cancellation operation, which is not limited in this embodiment. When the electronic device 100 detects the cancellation operation, the electronic device 100 executes terminating the current specific scene while outputting the prompt message of the setting failure, or after outputting the prompt message of the setting failure, or before outputting the prompt message of the setting failure. For example, if the call forwarding is currently being set, the electronic device 100 terminates the operation of sending the call forwarding setting request to the server 101; for another example, if the do not disturb mode is currently being set, the electronic device 100 terminates the system. The electronic device 100 is set to operate in the do-not-disturb mode, that is, the electronic device 100 is prohibited from turning on the do-not-disturb mode.
S505、在电子设备100检测到确定操作时,输出设置成功的提示消息。S505. When the electronic device 100 detects the determination operation, output a prompt message indicating that the setting is successful.
相应地,用户可以通过触发交互界面中确定控件来执行二次确定操作,用户还可以通过语音输入“确定”或“确认”或“继续”等来执行二次确定操作,或者,用户还可以通过“home”键、音量键等指定按键进行双击等指定操作来执行二次确定操作,本实施例对此不做限定。在电子设备100检测到确定操作时,在输出设置成功的提示消息之前,电子设备100继续执行当前特定场景的设置操作,示例性地,若当前是在设置呼叫转移,则电子设备100继续向服务器102发送设置呼叫转移请求的操作,以完成设置呼叫转移操作;又例如,若当前是设置免打扰模式,则电子设备100执行开启免打扰模式的操作。Correspondingly, the user can perform the secondary determination operation by triggering the determination control in the interactive interface. The user can also perform the secondary determination operation by voice inputting "OK" or "Confirm" or "Continue". Alternatively, the user can also perform the secondary determination operation by Specific operations such as double-clicking on designated keys such as the "home" key and volume keys are performed to perform a secondary determination operation, which is not limited in this embodiment. When the electronic device 100 detects the determination operation, before outputting a prompt message indicating that the setting is successful, the electronic device 100 continues to perform the setting operation of the current specific scenario. For example, if the call transfer is currently being set, the electronic device 100 continues to send a message to the server. 102 sends an operation of setting a call transfer request to complete the operation of setting a call transfer; for another example, if the do-not-disturb mode is currently set, the electronic device 100 performs an operation of turning on the do-not-disturb mode.
可选地,对于特定场景成功设置后,电子设备还可以持续进行风险识别。在一种可选的实施例中,在特定场景成功设置后或者在成功设置后的预设时长内,若电子设备基于风险识别方法确定存在风险操作时,输出提醒信息,该提醒信息用于提醒用户取消相应的特定场景设置。Optionally, after successfully setting up a specific scenario, the electronic device can also continue to perform risk identification. In an optional embodiment, after the specific scene is successfully set or within a preset time period after the successful setting, if the electronic device determines that there is a risky operation based on the risk identification method, the reminder information is output, and the reminder information is used to remind The user cancels the corresponding specific scene settings.
可选地,电子设备可以在当前界面输出提醒信息,比如,在用户设置完呼叫转移功能之后的10分钟内,电子设备检测到存在风险操作,则输出提醒信息,该提醒信息为“当前场景存在风险操作,请取消呼叫转移功能的设置”。可选地,电子设备还可以通过播放语音提醒信息,例如,播放“当前场景存在风险操作,请取消呼叫转移功能的设置”的语音提醒信息。Optionally, the electronic device can output reminder information on the current interface. For example, if the electronic device detects a risky operation within 10 minutes after the user sets the call transfer function, the electronic device will output reminder information. The reminder information is "The current scene exists." Risky operation, please cancel the setting of call forwarding function." Optionally, the electronic device can also play a voice reminder message, for example, play a voice reminder message of "There are risky operations in the current scene, please cancel the setting of the call transfer function."
这是考虑到实际情况中,一些风险操作可能也发生在设置特定场景之后,基于这种情况下,在特定场景成功设置后,电子设备仍检测是否存在风险操作,可以进一步提高电子设备的设备安全,避免被诈骗分子利用。可以理解,电子设备在特定场景成功设置之后的风险识别方法可参考以上实施例所述,这里不做赘述。This is considering that in actual situations, some risky operations may also occur after setting a specific scene. Based on this situation, after the specific scene is successfully set, the electronic device still detects whether there are risky operations, which can further improve the device security of the electronic device. , to avoid being used by fraudsters. It can be understood that the risk identification method after the electronic device is successfully set up in a specific scenario can refer to the above embodiments, and will not be described again here.
在上述实施例提供的风险识别方法中,电子设备100在检测到某些特定场景被触发时,可以获取特定场景下产生的第一信息,该第一信息中包括了与特定场景对应的环境信息或号码信息,从而电子设备100可以基于第一信息确定当前环境中是否存在风险操作,在确定存在风险操作的情况下,及时输出风险预警信息,中止特定场景的设置操作,实现了在特定场景下风险操作的有效识别和风险预警,为用户提供了有效的风险提示,一定程度上降低了用户执行风险操作的概率,增强了用户的信息安全和财产安全。同时,阻止风险操作的进行,避免风险操作的发生,也一定程度上避免了 用户所使用的电子设备被特定用户利用的情况,避免了特定用户利用用户所使用的电子设备阻碍或干扰工作人员进行预警工作的问题。In the risk identification method provided in the above embodiments, when the electronic device 100 detects that certain specific scenarios are triggered, it can obtain the first information generated in the specific scenario. The first information includes environmental information corresponding to the specific scenario. or number information, so that the electronic device 100 can determine whether there is a risky operation in the current environment based on the first information, and if it is determined that there is a risky operation, promptly output the risk warning information, suspend the setting operation of the specific scenario, and realize the operation in the specific scenario. Effective identification of risky operations and risk early warning provide users with effective risk reminders, reduce the probability of users performing risky operations to a certain extent, and enhance users' information security and property security. At the same time, it prevents risky operations from occurring and avoids them to a certain extent. The situation where the electronic equipment used by the user is used by a specific user avoids the problem of a specific user using the electronic equipment used by the user to hinder or interfere with the staff's early warning work.
在一些实施例中,结合图5提供的实施例的方案,在第一信息包括号码信息的情况下,提供了实现风险识别方法的一种实现方式:In some embodiments, in conjunction with the solution of the embodiment provided in Figure 5, when the first information includes number information, an implementation method for implementing the risk identification method is provided:
在本实施中,电子设备100可以根据预设的识别方法对号码信息中的目标号码进行风险识别,预设的识别方法可以包括判断目标号码是否为安全号码,或者判断目标号码是否为风险号码这两个维度的识别判断。这里安全号码指的是在常规意义上不存在骚扰标注、或风险标注的号码,或自定义白名单号码,或与用户号码属主相同的号码等;风险号码指的是在用户或风险识别平台标注风险的号码,或预设黑名单中的号码等。In this implementation, the electronic device 100 can perform risk identification on the target number in the number information according to a preset identification method. The preset identification method can include determining whether the target number is a safe number, or determining whether the target number is a risk number. Identification judgments in two dimensions. The safe number here refers to a number that does not have harassment marking or risk marking in the conventional sense, or a custom whitelist number, or a number that has the same owner as the user number; risk number refers to a number that is registered on the user or risk identification platform Numbers marked with risks, or numbers in the preset blacklist, etc.
示例性地,在设置呼叫转移的特定场景下,目标号码为呼叫转移号码。For example, in a specific scenario of setting call forwarding, the target number is the call forwarding number.
以下分别从电子设备100判断目标号码是否为安全号码、判断目标号码是否为风险号码维度来进行阐述。The following descriptions will be made respectively from the dimensions of the electronic device 100 determining whether the target number is a safe number and whether the target number is a risk number.
维度一:在本实施例的一种可行方案中,电子设备100判断目标号码是否安全号码,包括以下几种方法:Dimension 1: In a feasible solution of this embodiment, the electronic device 100 determines whether the target number is a safe number, including the following methods:
方法一:电子设备100判断目标号码是否为本机SIM卡号码。Method 1: The electronic device 100 determines whether the target number is the local SIM card number.
示例性地,电子设备100可以直接判断目标号码是否为本机号码,电子设备100可以获取本机SIM卡号码信息,若目标号码与本机SIM卡号码信息中任意一个号码一致,则认为目标号码为安全号码;若目标号码与本机SIM卡号码信息中的所有号码都不一致,则认为目标号码不是安全号码。For example, the electronic device 100 can directly determine whether the target number is the local number. The electronic device 100 can obtain the local SIM card number information. If the target number is consistent with any number in the local SIM card number information, the target number is considered to be the same. It is a security number; if the target number is inconsistent with all the numbers in the local SIM card number information, the target number is considered not a security number.
方法二:电子设备100判断目标号码是否在本地通讯录中。Method 2: The electronic device 100 determines whether the target number is in the local address book.
在本实施例中,电子设备100可以从本地寄存器中获取本地通讯录信息,或者,电子设备100可以与“电话”应用进行信息交互,获取本地通讯录信息。可选地,本地通讯录信息中包括至少一个标注了姓名的已知号码。In this embodiment, the electronic device 100 can obtain the local address book information from the local register, or the electronic device 100 can interact with the "Phone" application to obtain the local address book information. Optionally, the local address book information includes at least one known number marked with a name.
示例性地,电子设备100在获取到目标号码之后,可以将目标号码与本地通讯录中的所有已知号码进行匹配,若匹配成功,即,本地通讯录中存在与目标号码一致的已知号码,则认为目标号码为安全号码;若匹配失败,即,本地通讯录中不存在于目标号码一致的已知号码,则目标号码不是安全号码。For example, after obtaining the target number, the electronic device 100 can match the target number with all known numbers in the local address book. If the matching is successful, that is, there is a known number consistent with the target number in the local address book. , the target number is considered a safe number; if the match fails, that is, there is no known number consistent with the target number in the local address book, the target number is not a safe number.
方法三:电子设备100判断目标号码是否在白名单中。Method 3: The electronic device 100 determines whether the target number is in the white list.
其中,白名单可以理解为电子设备100中预先存储的具有较高安全性的号码名单,电子设备100在获取到目标号码之后,将目标号码与白名单中的号码进行匹配,若匹配成功,即,白名单中存在与目标号码一致的号码,则认为目标号码为安全号码;若匹配失败,即,白名单中不存在与目标号码一致的号码,则认为目标号码不是安全号码。The white list can be understood as a list of numbers with higher security that is pre-stored in the electronic device 100. After obtaining the target number, the electronic device 100 matches the target number with the numbers in the white list. If the matching is successful, that is , if there is a number consistent with the target number in the whitelist, the target number is considered to be a safe number; if the matching fails, that is, if there is no number consistent with the target number in the whitelist, the target number is considered not to be a safe number.
或者,白名单也可以是电子设备100从第三方平台获取到的号码名单,电子设备100在获取到目标号码之后,向第三方平台获取白名单,在获取到白名单之后,将目标号码与白名单中的号码进行匹配,若匹配成功,即,白名单中存在与目标号码一致的号码,则认为目标号码为安全号码;若匹配失败,即,白名单中不存在与目标号码一致的号码,则认为目标号码不是安全号码。 Alternatively, the whitelist may also be a list of numbers obtained by the electronic device 100 from a third-party platform. After obtaining the target number, the electronic device 100 obtains the whitelist from the third-party platform. After obtaining the whitelist, the electronic device 100 combines the target number with the whitelist. If the match is successful, that is, there is a number consistent with the target number in the white list, the target number is considered a safe number; if the match fails, that is, there is no number consistent with the target number in the white list, It is considered that the target number is not a safe number.
方法四:电子设备100判断目标号码的属主信息是否与本机号码的属主信息相同。Method 4: The electronic device 100 determines whether the owner information of the target number is the same as the owner information of the local number.
示例性地,电子设备100可以向服务器102发送携带目标号码的查询请求,以接收服务器102返回的携带目标号码属主信息的应答,基于接收到的目标号码的属主信息与本机号码的属主信息,确定二者是否一致,例如,属主信息中包括具有唯一标识性的号码用户的姓名、用户身份证信息等信息,若二者属主信息中存在至少一项具有唯一标识性的信息一致,则认为目标号码的属主信息是否与本机号码的属主信息相同,该目标号码为安全号码;若二者属主信息中的任意一个信息均不一致,则认为目标号码的属主信息是否与本机号码的属主信息不相同,该目标号码不是安全号码。需要说明的是,本机号码的属主信息,可以是电子设备本地存储的,也可以是通过向服务器查询收到的,其中,后者方式可以是在查询请求中直接携带本机号码或指示本机号码的第一标识,也可以是服务器在与电子设备建立网络层连接时获取的第一标识等,本发明方案对此不进行限定。For example, the electronic device 100 may send a query request carrying the target number to the server 102 to receive a response returned by the server 102 carrying the owner information of the target number, based on the received owner information of the target number and the owner information of the local number. Master information to determine whether the two are consistent. For example, the owner information includes a uniquely identifying number, the user's name, user ID card information and other information. If there is at least one piece of uniquely identifying information in the two owner information If the owner information of the target number is consistent, it is considered that the owner information of the target number is the same as the owner information of the local number, and the target number is a safe number; if any of the two owner information is inconsistent, the owner information of the target number is considered to be the same. Whether the owner information of this number is different from that of the local number, the target number is not a safe number. It should be noted that the owner information of the local number can be stored locally on the electronic device, or it can be received by querying the server. The latter method can be to directly carry the local number or instruction in the query request. The first identifier of the local number may also be the first identifier obtained by the server when establishing a network layer connection with the electronic device, etc. The solution of the present invention is not limited to this.
可选地,电子设备100也可以向服务器102发送携带用于指示本机号码的第一标识、目标号码的查询请求,请求服务器102基于第一标识确定本机号码,基于本机号码和目标号码进行属主信息的匹配,以接收服务器102返回的携带属主信息匹配结果的应答,若接收到的属主信息匹配结果为匹配成功,则认为目标号码的属主信息是否与本机号码的属主信息相同,该目标号码为安全号码;若接收到的属主信息匹配结果为匹配失败,则认为目标号码的属主信息是否与本机号码的属主信息不相同,该目标号码不是安全号码。Optionally, the electronic device 100 can also send a query request carrying a first identifier and a target number used to indicate the own number to the server 102, requesting the server 102 to determine the own number based on the first identifier, and the local number and the target number based on the first identifier. The owner information is matched to receive a response carrying the owner information matching result returned by the server 102. If the received owner information matching result is a successful match, it is considered whether the owner information of the target number matches the owner information of the local number. If the main information is the same, the target number is a safe number; if the received owner information matching result is a match failure, it is considered that the owner information of the target number is different from the owner information of the local number, and the target number is not a safe number. .
可以理解的是,电子设备100从判断目标号码是否为安全号码的维度,执行上述四个方式,电子设备100可以将四个方法结合执行,这些方法的执行顺序和执行逻辑不做限定,可根据实际情况确定。在本实施例中,参考图7所示,给出了一种四个方式结合来确定目标号码是否为安全号码的实现方法,包括:It can be understood that the electronic device 100 performs the above four methods from the perspective of determining whether the target number is a safe number. The electronic device 100 can perform the four methods in combination. The execution order and execution logic of these methods are not limited and can be based on The actual situation is determined. In this embodiment, with reference to Figure 7, an implementation method for determining whether the target number is a safe number by combining four methods is provided, including:
S701、电子设备100获取目标号码。S701. The electronic device 100 obtains the target number.
S702、电子设备100判断目标号码是否为本机SIM卡号码;若是,则执行S706;若否,则执行S703。S702. The electronic device 100 determines whether the target number is the local SIM card number; if so, perform S706; if not, perform S703.
示例性地,采用上述方法一判断目标号码是否为本机SIM卡号码。For example, the above method 1 is used to determine whether the target number is the local SIM card number.
S703、电子设备100判断目标号码是否在本地通讯录中;若是,则执行S706;若否,则执行S704。S703. The electronic device 100 determines whether the target number is in the local address book; if so, execute S706; if not, execute S704.
示例性地,采用上述方法二判断目标号码是否在本地通讯录中。For example, the above method 2 is used to determine whether the target number is in the local address book.
S704、电子设备100判断目标号码是否在白名单中;若是,则执行S706;若否,则执行S705。S704. The electronic device 100 determines whether the target number is in the white list; if so, perform S706; if not, perform S705.
示例性地,采用上述方法三判断目标号码是否在白名单中。For example, the above method three is used to determine whether the target number is in the white list.
S705、电子设备100判断目标号码的属主信息是否与本机号码的属主信息相同,若是,则执行S706,若否,则执行S707。S705. The electronic device 100 determines whether the owner information of the target number is the same as the owner information of the local number. If yes, S706 is executed. If not, S707 is executed.
示例性地,采用上述方法四判断目标号码的属主信息是否与本机号码的属主信息相同。For example, the above method 4 is used to determine whether the owner information of the target number is the same as the owner information of the local number.
S706、确定目标号码为安全号码。S706. Confirm that the target number is a safe number.
S707、确定目标号码不是安全号码。 S707. Confirm that the target number is not a safe number.
在本实施例中,电子设备100先判断目标号码是否为本机SIM卡号码,若目标号码不是本机SIM卡号码,则不确定目标号码是否为安全号码;考虑到电子设备100丢失,SIM卡槽插入未知号码的情况下,若目标号码是本机SIM卡号码,该目标号码也可能不是安全号码,或者,电子设备中不一定有多张SIM卡,或者,用户设置的呼转号码对应的SIM卡可能插入了其他设备等等,因此,电子设备100还可以对目标号码进行本地通讯录以及白名单的判断,若目标号码不在本地通讯录中,则电子设备可以继续判断目标号码是否在白名单中,若该目标号码不在白名单中,则电子设备执行对目标号码进行属主信息的判断,在确定属主信息相同的情况下,确定目标号码为安全号码;否则,该目标号码不是安全号码。若目标号码在本地通讯录中,或者目标号码在白名单中,则确定目标号码为安全号码。In this embodiment, the electronic device 100 first determines whether the target number is the local SIM card number. If the target number is not the local SIM card number, it is not sure whether the target number is a security number; considering that the electronic device 100 is lost, the SIM card When an unknown number is inserted into the slot, if the target number is the local SIM card number, the target number may not be a safe number, or there may not be multiple SIM cards in the electronic device, or the call forwarding number set by the user may not be a safe number. The SIM card may be inserted into other devices, etc. Therefore, the electronic device 100 can also determine the target number in the local address book and whitelist. If the target number is not in the local address book, the electronic device can continue to determine whether the target number is in the whitelist. In the list, if the target number is not in the white list, the electronic device performs a judgment on the owner information of the target number. If the owner information is determined to be the same, the target number is determined to be a safe number; otherwise, the target number is not safe. Number. If the target number is in the local address book, or the target number is in the whitelist, the target number is determined to be a safe number.
经过上述执行顺序和执行逻辑的判断,可以进一步提高基于目标号码进行安全号码识别的有效性和准确性。Through the judgment of the above execution sequence and execution logic, the effectiveness and accuracy of security number identification based on the target number can be further improved.
需要说明的是,图7给出的实施例中涉及到的不同判断方式的执行顺序和执行逻辑,均为举例,本实际识别判断过程中,对于各个方式的执行顺序和执行逻辑不做限定。It should be noted that the execution sequence and execution logic of different judgment methods involved in the embodiment shown in Figure 7 are all examples. In this actual identification and judgment process, the execution sequence and execution logic of each method are not limited.
维度二:在本实施例的一种可行方案中,电子设备100判断目标号码是否为风险号码,包括以下几种方法:Dimension 2: In a feasible solution of this embodiment, the electronic device 100 determines whether the target number is a risk number, including the following methods:
方法五:电子设备100判断目标号码是否在黑名单中。Method 5: The electronic device 100 determines whether the target number is in the blacklist.
其中,黑名单可以理解为电子设备100中预先存储的具有风险性或骚扰性的骚扰号码名单,电子设备100在获取到目标号码之后,将目标号码与黑名单中的骚扰号码进行匹配,若匹配成功,即,黑名单中存在与目标号码一致的骚扰号码,则认为目标号码为风险号码;若匹配失败,即,黑名单中不存在与目标号码一致的骚扰号码,则认为目标号码不是风险号码。The blacklist can be understood as a list of risky or harassing harassing numbers pre-stored in the electronic device 100. After obtaining the target number, the electronic device 100 matches the target number with the harassing numbers in the blacklist. If they match, If the match is successful, that is, if there is a harassing number consistent with the target number in the blacklist, the target number is considered to be a risk number; if the match fails, that is, if there is no harassing number consistent with the target number in the blacklist, the target number is considered not to be a risk number. .
或者,黑名单也可以是电子设备100从第三方平台获取到的风险号码名单,电子设备100在获取到目标号码之后,向第三方平台获取黑名单,在获取到黑名单之后,将目标号码与黑名单中的风险号码进行匹配,若匹配成功,即,黑名单中存在与目标号码一致的风险号码,则认为目标号码为风险号码;若匹配失败,即,白名单中不存在与目标号码一致的风险号码,则认为目标号码不是风险号码。Alternatively, the blacklist may also be a list of risk numbers obtained by the electronic device 100 from a third-party platform. After obtaining the target number, the electronic device 100 obtains the blacklist from the third-party platform. After obtaining the blacklist, the electronic device 100 compares the target number with The risk number in the blacklist is matched. If the match is successful, that is, there is a risk number consistent with the target number in the blacklist, the target number is considered to be a risk number; if the match fails, that is, there is no consistent risk number with the target number in the whitelist. risk number, the target number is considered not to be a risk number.
方法六:电子设备100判断目标号码是否被标记风险。Method 6: The electronic device 100 determines whether the target number is marked as a risk.
示例性地,电子设备100可以向服务器102或者三方风险识别平台,发送携带目标号码的查询请求信息,以接收服务器102或者三方风险识别平台返回的携带目标号码是否被风险标记的应答信息,基于接收到的应答信息,确定目标号码是否为标记风险的号码,若是,认为目标号码为风险号码;若确定目标号码未被标记风险,则认为目标号码不是风险号码。For example, the electronic device 100 may send a query request information carrying a target number to the server 102 or a third-party risk identification platform to receive a response information returned by the server 102 or a third-party risk identification platform carrying the target number as to whether the target number is marked for risk. Based on the received The response information received determines whether the target number is a risk-marked number. If so, the target number is considered to be a risk number; if it is determined that the target number is not marked for risk, the target number is considered not to be a risk number.
可以理解的是,电子设备100从判断目标号码是否为风险号码的维度,执行上述方式五和/或方法六,电子设备100可以执行方法五或者方法六,也可以将方法五和方法六结合执行,这些方式的执行顺序和执行逻辑不做限定,可根据实际情况确定。It can be understood that the electronic device 100 performs the above-mentioned method five and/or method six from the perspective of determining whether the target number is a risk number. The electronic device 100 may perform method five or method six, or may perform method five and method six in combination. , the execution sequence and execution logic of these methods are not limited and can be determined according to the actual situation.
结合上述实施例中给出的确定目标号码是否为风险号码的方法,参考图8所示,给出了一种多个方式结合来确定目标号码是否为风险号码的实现方法,包括: Combined with the method for determining whether the target number is a risk number given in the above embodiment, with reference to Figure 8, an implementation method for determining whether the target number is a risk number by combining multiple methods is provided, including:
S801、电子设备100获取目标号码。S801. The electronic device 100 obtains the target number.
S802、电子设备100判断目标号码是否在黑名单中;若是,则执行S805;若否,则执行S803。S802. The electronic device 100 determines whether the target number is in the blacklist; if so, perform S805; if not, perform S803.
示例性的,采用上述方法五判断目标号码是否在黑名单中。For example, the above method 5 is used to determine whether the target number is in the blacklist.
S803、电子设备100判断目标号码是否被标记风险;若是,则执行S805;若否,则执行S804。S803. The electronic device 100 determines whether the target number is marked as a risk; if so, perform S805; if not, perform S804.
示例性的,采用上述方法六判断目标号码是否被标记风险。For example, the above-mentioned method six is used to determine whether the target number is marked as a risk.
S804、确定目标号码不是风险号码;S804. Confirm that the target number is not a risk number;
S805、确定目标号码为风险号码。S805. Determine the target number as a risk number.
在本实施例中,电子设备100先判断目标号码是否在黑名单中,若目标号码在黑名单中,则说明该目标号码为风险号码,若目标号码不在黑名单中,为了进一步确定目标号码的安全性,电子设备100可以判断该目标号码是否被标记风险,若该目标号码被标记风险,则确定该目标号码为风险号码,若该目标号码未被标记风险,则说明该目标号码不是风险号码。In this embodiment, the electronic device 100 first determines whether the target number is in the blacklist. If the target number is in the blacklist, it means that the target number is a risk number. If the target number is not in the blacklist, in order to further determine the target number Security, the electronic device 100 can determine whether the target number is marked as a risk. If the target number is marked as a risk, it is determined that the target number is a risk number. If the target number is not marked as a risk, it means that the target number is not a risk number. .
经过上述执行顺序和执行逻辑的判断,可以进一步提高基于目标号码进行风险号码识别的有效性和准确性。Through the judgment of the above execution sequence and execution logic, the effectiveness and accuracy of risk number identification based on the target number can be further improved.
需要说明的是,图8给出的实施例中涉及到的不同判断方式的执行顺序和执行逻辑,均为举例,本实际识别判断过程中,对于各个方式的执行顺序和执行逻辑不做限定。It should be noted that the execution sequence and execution logic of different judgment methods involved in the embodiment shown in Figure 8 are all examples. In this actual identification and judgment process, the execution sequence and execution logic of each method are not limited.
在本实施例的一种可行方案中,电子设备100可以结合上述判断目标号码是否为安全号码、判断目标号码是否为风险号码两个维度,确定目标号码的安全性。In a feasible solution of this embodiment, the electronic device 100 can determine the security of the target number by combining the two dimensions of determining whether the target number is a safe number and determining whether the target number is a risk number.
示例性地,电子设备100可以基于上述方法一至方法四中一个或多个方法来确定目标号码是否为安全号码,例如,电子设备100可以基于图7提供的实施例来确定目标号码是否为安全号码,若目标号码是安全号码,则确定当前环境不存在风险操作,若目标号码不是安全号码,则电子设备100基于上述方法五和方法六中一个或多个方法来确定目标号码是否为风险号码,若目标号码不是风险号码,则确定当前环境不存在风险操作,若目标号码是风险号码,则确定当前环境存在风险操作。Exemplarily, the electronic device 100 can determine whether the target number is a safe number based on one or more of the above methods one to four. For example, the electronic device 100 can determine whether the target number is a safe number based on the embodiment provided in Figure 7 , if the target number is a safe number, it is determined that there is no risky operation in the current environment. If the target number is not a safe number, the electronic device 100 determines whether the target number is a risk number based on one or more of the above method five and method six, If the target number is not a risk number, it is determined that there is no risky operation in the current environment; if the target number is a risk number, it is determined that there is a risky operation in the current environment.
又如,电子设备100可以基于上述方法五和方法六中一个或多个方法来确定目标号码是否为风险号码,例如,电子设备100可以基于图8提供的实施例来确定目标号码是否为风险号码,若目标号码是风险号码,则确定当前环境存在风险操作,若目标号码不是风险号码,则电子设备100可以基于上述方法一至方法四中一个或多个方法来确定目标号码是否为安全号码,若目标号码是安全号码,则确定当前环境不存在风险操作,若目标号码不是安全号码,则确定当前环境存在风险操作。As another example, the electronic device 100 can determine whether the target number is a risk number based on one or more of the above-mentioned method five and method six. For example, the electronic device 100 can determine whether the target number is a risk number based on the embodiment provided in FIG. 8 , if the target number is a risk number, it is determined that a risky operation exists in the current environment. If the target number is not a risk number, the electronic device 100 can determine whether the target number is a safe number based on one or more of the above methods one to four. If If the target number is a safe number, it is determined that there is no risky operation in the current environment. If the target number is not a safe number, it is determined that there is a risky operation in the current environment.
或者,电子设备100可以基于上述方法一至方法四中一个或多个方法来确定目标号码是否为安全号码,例如,电子设备100可以基于图7提供的实施例来确定目标号码不是安全号码,或者,电子设备100可以基于上述方法五和方法六中一个或多个方法来确定目标号码是否为风险号码,例如,电子设备100可以基于图8提供的实施例来确定目标号码为风险号码,在确定目标号码为安全号码或者确定目标号码不是风险号码情况下,确定当前环境不存在风险操作;若确定目标号码不是安全号码或者确定 目标号码是风险号码,则均确定当前环境存在风险操作。Alternatively, the electronic device 100 may determine whether the target number is a safe number based on one or more of the above methods one to four. For example, the electronic device 100 may determine whether the target number is not a safe number based on the embodiment provided in FIG. 7 , or, The electronic device 100 can determine whether the target number is a risk number based on one or more of the above-mentioned method five and method six. For example, the electronic device 100 can determine whether the target number is a risk number based on the embodiment provided in Figure 8. After determining the target number If the number is a safe number or it is determined that the target number is not a risk number, it is determined that there is no risky operation in the current environment; if it is determined that the target number is not a safe number or it is determined If the target number is a risk number, it is determined that there is a risky operation in the current environment.
本实施例给出的风险识别方法中,基于第一信息中的目标号码进行当前环境是否存在风险操作的识别判断的技术方案,可以适用于电子设备100被设置呼叫转移的特定场景、或者其他涉及到号码信息的特定场景下。在本实施例中,在涉及号码信息的特定场景中,目标号码作为可以直接获取的信息,获取方式比较便捷,电子设备100基于获取到的目标号码进行当前环境的风险性识别判断,可以有效且快速地确定当前环境的操作是否具有风险性,从而在确定当前环境中存在风险操作的情况下进行风险提醒,增强了用户的信息安全,优化用户体验。In the risk identification method given in this embodiment, the technical solution of identifying and judging whether there is a risky operation in the current environment based on the target number in the first information can be applied to specific scenarios where the electronic device 100 is set to call transfer, or other situations involving to the specific scenario of number information. In this embodiment, in a specific scenario involving number information, the target number is information that can be obtained directly, and the acquisition method is relatively convenient. The electronic device 100 performs risk identification and judgment of the current environment based on the obtained target number, which can be effective and Quickly determine whether the operations in the current environment are risky, so as to provide risk reminders when it is determined that there are risky operations in the current environment, which enhances the user's information security and optimizes the user experience.
在另一些实施例中,结合图5提供的实施例的方案,提供了实现风险识别方法的另一种实现方式,在第一信息包括环境信息的场景下,该风险识别方法包括:In other embodiments, in conjunction with the solution of the embodiment provided in Figure 5, another implementation manner of implementing the risk identification method is provided. In the scenario where the first information includes environmental information, the risk identification method includes:
电子设备100获取环境信息,根据环境信息判断在第一时刻或第一时刻前预设时长内是否存在风险操作;其中,第一时刻为接收到用户设置特定场景的操作的时刻。The electronic device 100 obtains the environment information, and determines based on the environment information whether there is a risky operation at the first moment or within a preset time period before the first moment; wherein the first moment is the moment when the user's operation to set a specific scene is received.
可选地,第一时刻前预设时长内可以为特定场景的操作的时刻前的5分钟、10分钟、30分钟等。Optionally, the preset time period before the first time may be 5 minutes, 10 minutes, 30 minutes, etc. before the operation time of the specific scene.
可选地,环境信息可以包括当前操作发生时或发生前预设时间内电子设备上所产生的不同事件。例如,环境信息可以为电话通话事件、应用和/或功能运行事件、应用下载或安装事件、终端与应用的交互事件等,电子设备100基于环境信息判断在第一时刻或第一时刻前预设时长内是否存在风险操作,以下实施例具体描述如何进行风险操作识别判断。Optionally, the environmental information may include different events that occur on the electronic device when the current operation occurs or within a preset time before the current operation occurs. For example, the environment information may be a phone call event, an application and/or function running event, an application download or installation event, an interaction event between the terminal and the application, etc. The electronic device 100 determines whether to preset at the first moment or before the first moment based on the environmental information. Whether there are risky operations within the time period, the following embodiment specifically describes how to identify and judge risky operations.
基于不同的环境信息,确定电子设备100是否存在风险操作包括以下几种方法:Based on different environmental information, determining whether the electronic device 100 has risky operations includes the following methods:
方法七:若环境信息为应用运行事件和/或功能运行事件,电子设备100根据特定应用和/或其对应的特定功能是否被运行,确定当前环境是否存在风险操作。Method 7: If the environment information is an application running event and/or a function running event, the electronic device 100 determines whether there is a risky operation in the current environment based on whether the specific application and/or its corresponding specific function is run.
其中,特定应用可以是有共享屏幕或远程控制模式的应用,相应的特定功能可以是共享屏幕或远程控制模式开启。比如,特定应用也可以是支付类应用,相应的特定功能可以是支付或转账活动执行。可选地,可以预先在电子设备100中设置特定应用名单。电子设备100可以基于特定应用名单,通过查询当前进程,确定是否有特定应用正在进行;相应地,电子设备100也可以通过查询当前进程,确定电子设备100是否处于特定应用的特定功能模式中。可选地,电子设备100还可以基于特定应用的运行开始时刻和/或运行结束时刻,确定该特定应用是否正在运行或者该特定应用是否在第一时刻前预设时长内运行过。需要说明的是,在应用结束运行时均会记录应用运行结束时刻,若没有运行结束时刻,则说明该应用应在运行。The specific application may be an application with screen sharing or remote control mode, and the corresponding specific function may be enabled by screen sharing or remote control mode. For example, a specific application can also be a payment application, and the corresponding specific function can be the execution of payment or transfer activities. Optionally, a specific application list may be set in the electronic device 100 in advance. The electronic device 100 can determine whether a specific application is in progress by querying the current process based on the specific application list; accordingly, the electronic device 100 can also determine whether the electronic device 100 is in a specific functional mode of a specific application by querying the current process. Optionally, the electronic device 100 may also determine whether the specific application is running or whether the specific application has been run within a preset time period before the first time based on the running start time and/or the running end time of the specific application. It should be noted that the application end time will be recorded when the application ends. If there is no end time, it means that the application should be running.
示例性地,若电子设备100通过查询当前进程,确定特定应用A正在运行,则确定当前操作存在风险操作。或者,若电子设备100通过查询当前进程,确定电子设备100正处于特定应用A的特定功能模式中,则确定当前操作存在风险操作。或者,若电子设备100确定特定应用A没有最后运行结束时刻,则确定该特定应用A正在运行,则确定当前环境存在风险操作。或者,若电子设备100确定特定应用A的最后开始运行时刻为2022年6月16日17:38,最后运行开始时刻为在2022年6月16日17:50,而电子设备100检测到第一时刻为2022年6月16日17:52,以第一时刻前预设时长为30分钟来举例说明,显然,该特定应用A在第一时刻前30分钟内运行过,在这种 情况下,确定当前操作存在风险操作;若电子设备确定特定应用A的最后开始运行时刻为2022年6月16日10:38,最后运行开始时刻为在2022年6月16日11:50,显然,该特定应用A在第一时刻前30分钟内没有运行,则确定当前操作不存在风险操作。For example, if the electronic device 100 determines that the specific application A is running by querying the current process, it is determined that the current operation involves a risky operation. Alternatively, if the electronic device 100 determines that the electronic device 100 is in a specific functional mode of the specific application A by querying the current process, it is determined that the current operation involves a risky operation. Alternatively, if the electronic device 100 determines that the specific application A does not have a final execution end time, then determines that the specific application A is running, and determines that a risky operation exists in the current environment. Alternatively, if the electronic device 100 determines that the last start time of specific application A is 17:38 on June 16, 2022, the last start time is 17:50 on June 16, 2022, and the electronic device 100 detects the first The time is 17:52 on June 16, 2022. Take the preset time before the first time as 30 minutes as an example. Obviously, the specific application A has been run within 30 minutes before the first time. In this case, In this case, it is determined that the current operation contains risky operations; if the electronic device determines that the last start time of specific application A is 10:38 on June 16, 2022, and the last start time is 11:50 on June 16, 2022, obviously , if the specific application A did not run within 30 minutes before the first moment, it is determined that the current operation does not involve risky operations.
应该理解,上述实施例以1个特定应用举例说明,若存在多个特定应用,则基于逻辑或原则进行判断,也即,若确定第一时刻或第一时刻前预设时长内存在至少一个特定应用正在运行或运行过,则确定当前操作存在风险操作。若确定第一时刻或第一时刻前预设时长内不存在任意一个特定应用正在运行且也没有任意一个特定应用运行过,则确定当前操作不存在风险操作。It should be understood that the above embodiment uses one specific application as an example. If there are multiple specific applications, the judgment will be made based on logic or principles. That is, if it is determined that at least one specific application exists at the first moment or the preset time period before the first moment. If the application is running or has been run before, it is determined that the current operation contains risky operations. If it is determined that no specific application is running and no specific application has been run at the first moment or within the preset time period before the first moment, it is determined that the current operation does not include a risky operation.
可选地,特定功能也可以包括电子设备100的系统功能模式,例如电子设备100的工作模式、免打扰模式、远程控制模式、桌面共享模式、飞行模式、静音模式、会议模式等等。这里特定功能指的是可能存在信息泄露、无法通话风险,且具有远程控制、通信功能的模式。示例性地,电子设备100若查询当前进程,确定在第一时刻前预设时长内曾开启远程控制模式,则确定当前操作存在风险操作。或者,电子设备100还可以基于特定功能的执行时刻来确定是否存在风险操作。例如,确定远程控制模式的开启时刻为2022年6月16日17:38,没有结束时刻,则说明当前仍处于远程控制模式,这种情况也可以确定当前操作存在风险操作。若远程控制模式的开启时刻为2022年6月13日10:38,结束时刻为2022年6月13日11:50,而第一时刻为2022年6月16日17:40,以第一时刻前30分钟来检测风险操作,显然,虽然远程控制模式曾被开启过,但是其开始时刻并不在检测到特定场景被触发前30分钟内,在这种情况下,确定当前操作不存在风险操作。Optionally, the specific functions may also include system function modes of the electronic device 100, such as working mode, do not disturb mode, remote control mode, desktop sharing mode, flight mode, silent mode, conference mode, etc. of the electronic device 100. The specific functions here refer to modes that may have risks of information leakage, inability to make calls, and have remote control and communication functions. For example, if the electronic device 100 queries the current process and determines that the remote control mode has been turned on within a preset time period before the first moment, it determines that the current operation involves a risky operation. Alternatively, the electronic device 100 may also determine whether there is a risky operation based on the execution time of a specific function. For example, if it is determined that the start time of the remote control mode is 17:38 on June 16, 2022, and there is no end time, it means that it is still in the remote control mode. In this case, it can also be determined that the current operation is a risky operation. If the start time of the remote control mode is 10:38 on June 13, 2022, the end time is 11:50 on June 13, 2022, and the first time is 17:40 on June 16, 2022, the first time The first 30 minutes are used to detect risky operations. Obviously, although the remote control mode has been turned on, its start time is not within 30 minutes before the detection of a specific scenario being triggered. In this case, it is determined that the current operation does not contain risky operations.
在本实施例中,特别是针对具有支付功能的特定应用,这些具有支付功能的应用一般部署具有支付软件开发工具包(Software Development Kit,SDK),可选地,电子设备100还可以根据各个应用的运行日志,判断其支付SDK是否被调用,若在检测第一时刻或第一时刻前预设时长内支付SDK被调用,则确定当前操作存在风险操作。这里,电子设备100的风险识别模块可以从各个应用的寄存器中获取各个应用的运行日志,该运行日志主要记录各个应用自身的运行数据,例如,该应用在什么时刻获取了什么信息、在什么时刻产生了什么信息等。In this embodiment, especially for specific applications with payment functions, these applications with payment functions are generally deployed with a payment software development kit (SDK). Optionally, the electronic device 100 can also be configured according to each application. The operation log is used to determine whether the payment SDK has been called. If the payment SDK is called at the first moment of detection or within the preset time period before the first moment, it is determined that the current operation is a risky operation. Here, the risk identification module of the electronic device 100 can obtain the running log of each application from the register of each application. The running log mainly records the running data of each application itself, for example, at what time the application obtained what information, and at what time What information was generated, etc.
方法八:若环境信息为应用下载事件或应用安装事件,电子设备100根据风险应用是否被下载或风险应用是否被安装,确定是否存在风险操作。Method 8: If the environmental information is an application download event or an application installation event, the electronic device 100 determines whether there is a risky operation based on whether the risky application is downloaded or whether the risky application is installed.
其中,风险应用可以是具有风险标记的应用,可以预先在电子设备100中设置具有风险标记的应用的名单,电子设备100也可以实时从三方风险识别平台获取的具有风险标记的应用的名单,或者,电子设备100还可以实时向三方风险识别平台获取应用的风险查询结果,根据风险查询结果来确定查询的应用是否为风险应用。电子设备100可以通过查询当前进程,或者通过与特定应用(如安装器应用、应用市场或其他有应用分发功能的应用)交互,确定是否有应用正在下载或正在安装,若存在正在下载或正在安装的应用,则判断该应用是否为风险应用,若确定是风险应用,则确定当前操作存在风险操作。或者,电子设备100还可以查询进程日志等方式确定第一时刻前预设时长内是否存在下载或安装应用的行为,若存在下载或安装应用的行为,则确定该应用是否为风险应用,在确定该应用为风险应用的情况下确定当前操作存在风险 操作。或者,电子设备100还可以根据各个应用的下载开始时刻、下载完成时刻、安装开始时刻、安装完成时刻,确定第一时刻前预设时长内是否有应用存在下载或者安装行为。示例性地,第一时刻为2022年6月16日17:50,第一时刻前预设时长为第一时刻前30分钟,应用C的下载开始时刻为2022年6月16日17:38,电子设备100确定应用C在第一时刻前30分钟存在下载行为,则对应用C进行风险应用识别,若应用C在电子设备100中设置具有风险标记的应用的名单内,或者,应用C在从三方风险识别平台获取的具有风险标记的应用的名单内,或者,电子设备100向三方风险识别平台获取应用C的风险查询结果,该结果显示为应用C为风险应用,在这些情况下,则确定当前操作存在风险操作。The risk application may be an application with a risk mark, and a list of applications with a risk mark may be set in the electronic device 100 in advance. The electronic device 100 may also obtain the list of applications with a risk mark from a third-party risk identification platform in real time, or , the electronic device 100 can also obtain the risk query results of the application from the third-party risk identification platform in real time, and determine whether the queried application is a risk application based on the risk query results. The electronic device 100 can determine whether an application is being downloaded or installed by querying the current process or by interacting with a specific application (such as an installer application, an application market, or other applications with application distribution functions). application, it is determined whether the application is a risky application. If it is determined to be a risky application, it is determined that the current operation contains risky operations. Alternatively, the electronic device 100 may also query the process log or other methods to determine whether there is a behavior of downloading or installing an application within a preset time period before the first moment. If there is a behavior of downloading or installing an application, it is determined whether the application is a risky application. After determining If the application is a risky application, it is determined that the current operation is risky. operate. Alternatively, the electronic device 100 may also determine whether there is a download or installation behavior for an application within a preset time period before the first time based on the download start time, download completion time, installation start time, and installation completion time of each application. For example, the first time is 17:50 on June 16, 2022, the preset time before the first time is 30 minutes before the first time, and the download start time of application C is 17:38 on June 16, 2022. The electronic device 100 determines that application C has a download behavior 30 minutes before the first time, and then performs risk application identification on application C. If application C is in the list of applications with risk marks set in the electronic device 100, or application C is in the The list of applications with risk marks obtained by the third-party risk identification platform, or the electronic device 100 obtains the risk query result of application C from the third-party risk identification platform, and the result shows that application C is a risk application. In these cases, it is determined The current operation involves risky operations.
应该理解,上述实施例以存在下载1个风险应用的行为举例说明,若确定第一时刻或第一时刻前预设时长内存在多个应用下载或安装的行为,则基于逻辑或原则分别对多个应用进行风险应用识别判断,存在至少一个应用为风险应用,则确定当前操作存在风险操作;若所有下载或安装的应用均不是风险应用,则确定当前环境不存在风险操作。It should be understood that the above embodiments take the behavior of downloading one risky application as an example. If it is determined that there are multiple applications downloading or installing behaviors within the first moment or within the preset time period before the first moment, then multiple applications will be downloaded or installed based on logic or principles. If at least one application is a risky application, it is determined that there is a risky operation in the current operation; if all downloaded or installed applications are not risky applications, it is determined that there is no risky operation in the current environment.
方法九:若环境信息为电话通话事件,电子设备100根据电话通话事件的通话号码,确定是否存在风险操作。Method nine: If the environmental information is a phone call event, the electronic device 100 determines whether there is a risky operation based on the call number of the phone call event.
在本实施例中,若电子设备100确定通话应用正在运行,则获取当前通话号码,基于上述方法二、方法三、方法五以及方法六对当前通话号码进行风险识别,若确定当前通话号码是安全号码,和/或,确定当前通话号码不是风险号码,则确定当前操作不存在风险操作;若确定当前通话号码不是安全号码,和/或,确定当前通话号码是风险号码,则确定当前操作存在风险操作。若电子设备100确定在第一时刻前预设时长内通话应用运行过,则获取在第一时刻前预设时长内的历史通话号码,基于上述方法二、方法三、方法五以及方法六逐一对历史通话号码进行风险识别,若确定所有历史通话号码都是安全号码,和/或,确定所有历史通话号码都不是风险号码,则确定当前操作不存在风险操作;若确定至少一个历史通话号码不是安全号码,和/或,确定至少一个历史通话号码是风险号码,则确定当前操作存在风险操作。In this embodiment, if the electronic device 100 determines that the call application is running, it obtains the current call number, and performs risk identification on the current call number based on the above method two, three, five and six. If it is determined that the current call number is safe number, and/or, it is determined that the current call number is not a risk number, then it is determined that the current operation does not have a risk operation; if it is determined that the current call number is not a safe number, and/or, it is determined that the current call number is a risk number, then it is determined that the current operation is risky. operate. If the electronic device 100 determines that the call application has been run within the preset time period before the first time, it obtains the historical call numbers within the preset time period before the first time, and pairs them one by one based on the above-mentioned method two, method three, method five and method six. Historical call numbers are used for risk identification. If it is determined that all historical call numbers are safe numbers, and/or, it is determined that all historical call numbers are not risky numbers, then it is determined that there is no risk operation in the current operation; if it is determined that at least one historical call number is not safe number, and/or, if it is determined that at least one historical call number is a risk number, it is determined that the current operation involves a risky operation.
方法十:环境信息为应用交互事件,电子设备100基于特定应用交互信息,确定当前操作是否存在风险操作。Method 10: The environmental information is an application interaction event, and the electronic device 100 determines whether the current operation involves a risky operation based on the specific application interaction information.
在本实施例中,特定应用可以为具有风险识别与风险提示的应用,特定应用基于用户操作进行风险操作识别,确定存在风险操作并产生风险提示信息之后,基于交互策略,特定应用将风险提示信息反馈至风险识别模块。示例性地,若电子设备100的风险识别模块确定第一时刻,或者,在第一时刻前预设时长内接收到特定应用发送的风险提醒信息,则确定当前操作存在风险操作;若电子设备100的风险识别模块在第一时刻以及第一时刻前预设时长内,均没有接收到风险提醒信息,则确定当前操作中不存在风险操作。In this embodiment, the specific application can be an application with risk identification and risk prompts. The specific application identifies risky operations based on user operations. After determining that there are risky operations and generating risk prompt information, based on the interaction strategy, the specific application generates the risk prompt information. Feedback to the risk identification module. For example, if the risk identification module of the electronic device 100 determines the first moment, or receives risk reminder information sent by a specific application within a preset time period before the first moment, it determines that the current operation involves a risky operation; if the electronic device 100 If the risk identification module does not receive risk reminder information at the first moment and within the preset time period before the first moment, it is determined that there is no risky operation in the current operation.
结合上述实施例方法七至方法十给出的基于环境信息确定当前操作是否为风险操作的方法,参考图9所示,给出了一种通过多个方式结合来确定是否存在风险操作的实现方法,包括:Combined with the method for determining whether the current operation is a risky operation based on environmental information provided by methods seven to ten of the above embodiments, as shown in Figure 9, an implementation method for determining whether a risky operation exists by combining multiple methods is provided. ,include:
S901、电子设备100获取环境信息。 S901. The electronic device 100 obtains environmental information.
S902、电子设备100确定特定应用正在运行或在检测到特定场景被触发前的一段时间运行过;若是,则执行S909;若否,则执行S903。S902. The electronic device 100 determines that the specific application is running or has been run for a period of time before detecting that the specific scene is triggered; if so, perform S909; if not, perform S903.
示例性地,可采用上述方法七来确定特定应用正在运行或在检测到特定场景被触发前的一段时间运行过。For example, the above-mentioned method seven can be used to determine that a specific application is running or has been running for a period of time before detecting that a specific scenario is triggered.
S903、电子设备100确定通话应用是否正在运行或在检测到特定场景被触发前的一段时间运行过,若是,则执行S904;若否,则执行S905。S903. The electronic device 100 determines whether the call application is running or has been run for a period of time before detecting that the specific scene is triggered. If so, perform S904; if not, perform S905.
S904、电子设备100基于通话应用产生的通话信息判断当前通话号码或历史通话号码是否为安全号码;若是,则执行S905;若否,则执行S909。S904. The electronic device 100 determines whether the current call number or the historical call number is a safe number based on the call information generated by the call application; if so, perform S905; if not, perform S909.
示例性地,可采用上述方法九来确定当前通话号码或历史通话号码是否为安全号码。For example, the above-mentioned method nine can be used to determine whether the current call number or historical call number is a safe number.
S905、电子设备100确定风险应用正在被下载或安装,或在检测到特定场景被触发前的一段时间被下载或安装过;若是,则执行S909;若否,则执行S906。S905. The electronic device 100 determines that the risky application is being downloaded or installed, or has been downloaded or installed a period of time before detecting that the specific scene is triggered; if so, perform S909; if not, perform S906.
示例性地,可采用上述方法八来确定风险应用正在被下载或安装,或在检测到特定场景被触发前的一段时间被下载或安装过。For example, the above-mentioned method eight can be used to determine that the risky application is being downloaded or installed, or has been downloaded or installed a period of time before it is detected that a specific scenario is triggered.
S906、电子设备100确定在检测到特定场景被触发的当前时刻或前一段时间是否开启风险模式;若是,则执行S909;若否,则执行S907。S906. The electronic device 100 determines whether the risk mode is turned on at the current moment when the specific scene is detected to be triggered or a period of time ago; if so, perform S909; if not, perform S907.
示例性地,可采用上述方法七来确定在检测到特定场景被触发的当前时刻或前一段时间是否开启风险模式。For example, the above-mentioned method seven can be used to determine whether the risk mode is turned on at the current moment or a period of time before a specific scene is detected to be triggered.
S907、电子设备100在检测到特定场景被触发的当前时刻或前一段时间是否接收到特定应用的风险提醒信息;若是,则执行S909;若否,则执行S908。S907. Whether the electronic device 100 receives the risk reminder information of the specific application at the current moment when the specific scene is detected or a period of time ago; if so, perform S909; if not, perform S908.
示例性地,可采用上述方法十来确定在检测到特定场景被触发的当前时刻或前一段时间是否接收到风险提醒信息。For example, the above-mentioned method ten can be used to determine whether risk reminder information is received at the current moment or a period of time before a specific scene is detected to be triggered.
S908、确定当前环境中不存在风险操作。S908. Determine that there are no risky operations in the current environment.
S909、确定当前环境中存在风险操作。S909. Determine whether there are risky operations in the current environment.
本实施例给出的风险识别方法中,基于第一信息中的环境信息进行当前环境是否存在风险操作的识别判断的技术方案,可以适用于任意一种特定场景的设置场景中,例如,电子设备100被设置呼叫转移的特定场景、或电子设备100被设置免打扰模式、或电子设备100被设置飞行模式、或电子设备100被设置陌生来电拒接模式等等,或者其他可能造成电子设备100暂时失去通信能力的场景。在本实施例中,电子设备100基于环境信息先后判断在检测到特定场景被触发的当前时刻或前一段时间,特定应用是否被打开或正在运行、在通话应用被打开或者正在运行的情况下基于通话信息确定电子设备是否存在与风险号码之间的通话、确定是否下载或安装了风险应用、系统是否开启了风险模式以及是否产生了风险提示信息等多个方面进行风险识别判断,方方面面多个维度确定当前环境中是否存在风险操作,进一步提高基于环境信息进行风险识别的有效性和准确性。In the risk identification method given in this embodiment, the technical solution of identifying and judging whether there is a risky operation in the current environment based on the environmental information in the first information can be applied to any specific scenario setting scenario, for example, electronic equipment 100 is set to a specific scenario of call forwarding, or the electronic device 100 is set to do not disturb mode, or the electronic device 100 is set to airplane mode, or the electronic device 100 is set to reject unknown calls mode, etc., or other things that may cause the electronic device 100 to temporarily Scenario where communication capability is lost. In this embodiment, based on the environment information, the electronic device 100 successively determines whether a specific application is opened or running at the current moment or a period of time before the specific scene is detected to be triggered. If the call application is opened or running, based on The call information determines whether there is a call between the electronic device and the risk number, determines whether the risk application has been downloaded or installed, whether the risk mode is turned on in the system, and whether risk warning information is generated. Risk identification and judgment are carried out in all aspects and multiple dimensions. Determine whether there are risky operations in the current environment, and further improve the effectiveness and accuracy of risk identification based on environmental information.
需要说明的是,图8给出的实施例中涉及到的不同判断方式的执行顺序和执行逻辑,均为举例,本实际识别判断过程中,对于各个方式的执行顺序和执行逻辑不做限定。It should be noted that the execution sequence and execution logic of different judgment methods involved in the embodiment shown in Figure 8 are all examples. In this actual identification and judgment process, the execution sequence and execution logic of each method are not limited.
可以理解,方面一给出了基于第一信息中号码信息对号码风险性进行识别的方法 一至方法六;方面二给得出了基于第一信息中环境信息从应用、系统模式、风险提示信息等方法进行风险识别的方法七至方法十。It can be understood that aspect one provides a method for identifying the risk of a number based on the number information in the first information. One to method six; aspect two provides methods seven to ten for risk identification based on the environmental information in the first information from applications, system models, risk warning information and other methods.
在另外一些实施例中,对当前环境进行风险操作识别,还可以通过上述方面三的识别方法进行识别,方面三提供的方式实际上就是结合上述方面一与方面二进行识别判断。示例性地,若电子设备100可以基于方面一中方法一至方法六的结合对号码信息进行号码风险性判断,确定号码信息中目标号码为风险号码,和,电子设备100基于方面二中方法七至方法十的结合对环境信息进行风险性识别,确定当前环境存在风险操作,则最终确定当前环境存在风险操作;又例如,若电子设备100可以基于方面一中方法一至方法六的结合对号码信息进行号码风险性判断,确定号码信息中目标号码为风险号码,或者,电子设备100基于方面二中方法七至方法十的结合对环境信息进行风险性识别,确定当前环境存在风险操作,则最终确定当前环境存在风险操作。In some other embodiments, the risk operation identification of the current environment can also be carried out through the identification method of the above-mentioned aspect three. The method provided by the aspect three is actually a combination of the above-mentioned aspects one and two for identification and judgment. For example, if the electronic device 100 can perform number risk judgment on the number information based on the combination of methods one to six in aspect one, and determine that the target number in the number information is a risk number, and, the electronic device 100 can determine the number risk based on the combination of methods seven to six in aspect two. The combination of method ten is used to identify risks in environmental information, and it is determined that there are risky operations in the current environment, and then it is finally determined that there are risky operations in the current environment; for another example, if the electronic device 100 can perform the risk identification on the number information based on the combination of methods one to six in aspect one. Number risk judgment determines that the target number in the number information is a risk number, or the electronic device 100 performs risk identification on the environmental information based on the combination of methods seven to ten in aspect two and determines that there are risky operations in the current environment, and then finally determines the current There are risky operations in the environment.
可选地,在结合方面一和方面二的识别方法中,电子设备100执行方面一中方法一至方法六的识别方法,与执行方面二方法七至方法十的识别方法的顺序不做限定,可以理解,方面一与方面二的识别方法也可以并列执行,本实施例对此不做限定。Optionally, in combining the identification methods of aspects one and two, the electronic device 100 performs the identification methods of method one to method six in aspect one, and the order of performing the identification methods of method seven to method ten of aspect two is not limited. It is understood that the identification methods of aspect one and aspect two can also be executed in parallel, and this embodiment does not limit this.
在本实施例中,电子设备100基于第一信息中的号码信息进行当前操作涉及到的目标号码的风险性识别,基于环境信息中的多种信息进行当前操作所处环境的风险性识别,提高了第一信息中各种信息的利用率,且,基于不同的信息进行风险识别,可以进一步提高电子设备当前操作的风险识别的有效性和准确性,提高风险拦截的成功率,优化用户体验。In this embodiment, the electronic device 100 performs risk identification of the target number involved in the current operation based on the number information in the first information, and performs risk identification of the environment in which the current operation is based on a variety of information in the environmental information, thereby improving The utilization rate of various information in the first information is improved, and risk identification based on different information can further improve the effectiveness and accuracy of risk identification of the current operation of the electronic device, improve the success rate of risk interception, and optimize the user experience.
图10示出了上述实施例中所涉及的电子设备的一种可能的结构示意图。该电子设备1000包括:处理器1001、显示屏1002和通信模块1003。FIG. 10 shows a possible structural diagram of the electronic device involved in the above embodiment. The electronic device 1000 includes: a processor 1001, a display screen 1002 and a communication module 1003.
其中,处理器1001用于对电子设备1000的动作进行控制管理。显示屏1002用于显示处理器1001生成的图像。通信模块1003用于支持电子设备1000与其他网络实体(如服务器)的通信。Among them, the processor 1001 is used to control and manage the actions of the electronic device 1000 . The display screen 1002 is used to display images generated by the processor 1001. The communication module 1003 is used to support communication between the electronic device 1000 and other network entities (such as servers).
处理器1001,用于接收到用户设置特定场景的操作,获取第一信息;根据第一信息进行风险识别,如果确定存在风险,向显示屏输出风险预警信息;显示屏1002,用于显示风险预警信息。The processor 1001 is used to receive the user's operation of setting a specific scene and obtain the first information; perform risk identification based on the first information, and if it is determined that there is a risk, output the risk warning information to the display screen; the display screen 1002 is used to display the risk warning information.
在可选的实施例中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,处理器1001,用于如果确定呼叫转移号码不是安全号码,则确定存在风险。In an optional embodiment, when the specific scenario is call forwarding, the phone number information at least includes the call forwarding number, and the processor 1001 is configured to determine that a risk exists if it is determined that the call forwarding number is not a safe number.
在可选的实施例中,确定呼叫转移号码是安全号码包括:确定呼叫转移号码是本机SIM卡号码;或者,确定呼叫转移号码在本地通讯录中;或者,确定呼叫转移号码在预设的白名单中;或者,确定呼叫转移号码的属主信息与本机号码的属主信息相同。In an optional embodiment, determining that the call forwarding number is a security number includes: determining that the call forwarding number is the local SIM card number; or determining that the call forwarding number is in the local address book; or determining that the call forwarding number is in a preset in the whitelist; or, make sure that the owner information of the call forwarding number is the same as the owner information of the local number.
在可选的实施例中,通信模块1003,用于向服务器发送携带本机号码或本机号码的第一标识、呼叫转移号码的第一查询请求;第一查询请求用于指示服务器基于本机号码和呼叫转移号码查询本机属主信息和呼叫转移属主信息;接收服务器返回的携带本机属主信息与呼叫转移属主信息的第一查询应答;如果确定本机属主信息与呼叫转移属主信息匹配成功,则确定呼叫转移号码的属主信息与本机号码的属主信息相同。In an optional embodiment, the communication module 1003 is configured to send a first query request carrying the local number or the first identifier of the local number and the call transfer number to the server; the first query request is used to instruct the server to base the The number and call transfer number query the owner information of the local machine and the call transfer owner information; receive the first query response returned by the server carrying the owner information of the local machine and the call transfer owner information; if it is determined that the owner information of the local machine and the call transfer owner information are If the owner information matches successfully, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
在可选的实施例中,通信模块1003,用于向服务器发送携带本机号码或本机号码 的第一标识、呼叫转移号码的第二查询请求;第二查询请求用于指示服务器确定本机号码的属主信息与呼叫转移号码的属主信息的匹配结果;接收服务器返回的携带匹配结果的第二查询应答;如果确定匹配结果为匹配成功,则确定呼叫转移号码的属主信息与本机号码的属主信息相同。In an optional embodiment, the communication module 1003 is used to send a message carrying the local number or the local number to the server. The first identifier and the second query request of the call forwarding number; the second query request is used to instruct the server to determine the matching result of the owner information of the local number and the owner information of the call forwarding number; receive the matching result returned by the server Second query response; if the matching result is determined to be successful, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
在可选的实施例中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,处理器1001,用于如果确定呼叫转移号码是风险号码,则确定存在风险。In an optional embodiment, when the specific scenario is call forwarding, the phone number information at least includes the call forwarding number, and the processor 1001 is configured to determine that a risk exists if the call forwarding number is determined to be a risk number.
在可选的实施例中,确定呼叫转移号码是风险号码包括:确定呼叫转移号码在预设的黑名单中;或者,确定呼叫转移号码为已被标注风险的号码。In an optional embodiment, determining that the call forwarding number is a risk number includes: determining that the call forwarding number is in a preset blacklist; or determining that the call forwarding number is a number that has been marked as a risk.
在可选的实施例中,在特定场景为呼叫转移的场景下,电话号码信息至少包括呼叫转移号码,处理器1001,用于如果确定呼叫转移号码不是安全号码,并且确定呼叫转移号码是风险号码,则确定存在风险。In an optional embodiment, in the specific scenario of call forwarding, the phone number information at least includes the call forwarding number, and the processor 1001 is configured to determine that the call forwarding number is not a safe number and determine that the call forwarding number is a risk number. , then it is determined that there is a risk.
在可选的实施例中,上述风险预警信息中包括指示用户执行取消设置特定场景或执行确定设置特定场景的内容。基于此,处理器1001,用于获取用户触发的设置操作,在设置操作为取消设置特定场景的情况下,向显示屏输出设置失败的提示消息,在设置操作为确定设置特定场景的情况下,向显示屏1002输出设置成功的提示消息。In an optional embodiment, the risk warning information includes content instructing the user to cancel the setting of a specific scenario or to confirm the setting of a specific scenario. Based on this, the processor 1001 is used to obtain the setting operation triggered by the user. When the setting operation is to cancel the setting of a specific scene, output a prompt message of setting failure to the display screen. When the setting operation is to confirm the setting of a specific scene, A prompt message indicating that the setting is successful is output to the display screen 1002.
显示屏1002,用于显示设置失败的提示消息,或者,显示设置成功的提示消息。The display screen 1002 is used to display a prompt message indicating that the setting fails, or to display a prompt message indicating that the setting is successful.
在可选的实施例中,通信模块1003,还用于向服务器发送呼叫转移的设置请求;并接收服务器返回的设置应答,将设置应答反馈至处理器。In an optional embodiment, the communication module 1003 is also configured to send a call transfer setting request to the server; receive a setting response returned by the server, and feed the setting response back to the processor.
处理器1001,用于基于该反馈应答,向显示屏输出设置成功的提示消息。The processor 1001 is configured to output a prompt message indicating that the setting is successful based on the feedback response to the display screen.
显示屏1002,用于显示设置成功的提示消息。The display screen 1002 is used to display a prompt message indicating that the setting is successful.
在可选的实施例中,处理器1001,用于根据环境信息判断在第一时刻或第一时刻前预设时长内是否存在风险操作;其中,第一时刻为接收到用户设置特定场景的操作的时刻。In an optional embodiment, the processor 1001 is configured to determine whether there is a risky operation at the first moment or within a preset time period before the first moment according to the environmental information; wherein the first moment is when the operation of setting a specific scene by the user is received. moment.
在可选的实施例中,环境信息为电话通话事件,风险操作包括电话通话事件的通话号码是风险号码,和/或,电话通话事件的通话号码不是安全号码。In an optional embodiment, the environmental information is a phone call event, and the risk operation includes that the call number of the phone call event is a risk number, and/or the call number of the phone call event is not a safe number.
在可选的实施例中,环境信息为应用运行事件和/或功能运行事件,风险操作包括特定应用运行和/或特定应用的特定功能被运行。In an optional embodiment, the environment information is an application running event and/or a function running event, and the risk operation includes running a specific application and/or running a specific function of a specific application.
在可选的实施例中,环境信息为应用下载事件,风险操作包括存在下载风险应用的行为;环境信息为应用安装事件,风险操作包括存在安装风险应用的行为。In an optional embodiment, the environment information is an application download event, and the risk operation includes the behavior of downloading a risky application; the environment information is an application installation event, and the risk operation includes the behavior of installing a risky application.
在可选的实施例中,环境信息为应用交互事件,风险操作包括接收到特定应用发送的风险提示消息。In an optional embodiment, the environment information is an application interaction event, and the risk operation includes receiving a risk reminder message sent by a specific application.
在可选的实施例中,处理器1001,用于若根据电话号码信息进行风险识别确定存在风险,和/或,根据环境信息进行风险识别确定存在风险,则确定存在风险;否则确定不存在风险。In an optional embodiment, the processor 1001 is configured to determine that a risk exists if the risk is identified based on the phone number information, and/or if the risk is identified based on the environmental information, then determine that the risk exists; otherwise, determine that the risk does not exist. .
其中,处理器1001可以是中央处理器(central processing unit,CPU),数字信号处理器(digital signal processor,DSP),专用集成电路(application-specific integrated circuit,ASIC),现场可编程门阵列(field programmable gate array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。处理器可以包括应用处理器和基带处理器。其可以实现或执行结合本申请公开内容所描述 的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信模块1003可以是收发器、收发电路等。存储模块可以是存储器。The processor 1001 may be a central processing unit (CPU), a digital signal processor (DSP), an application-specific integrated circuit (ASIC), or a field programmable gate array (field programmable gate array). programmable gate array (FPGA) or other programmable logic devices, transistor logic devices, hardware components, or any combination thereof. Processors may include application processors and baseband processors. It may be implemented or performed as described in connection with the disclosure of this application various illustrative logic blocks, modules and circuits. The processor may also be a combination that implements computing functions, such as a combination of one or more microprocessors, a combination of a DSP and a microprocessor, and so on. The communication module 1003 may be a transceiver, a transceiver circuit, etc. The storage module may be a memory.
例如,处理器1001可以为如图4A所示的处理器3210,通信模块1003包括射频模块(如图4A所示的射频模块350)。通信模块还可以包括Wi-Fi模块和蓝牙模块、射频模块350等通信模块。存储模块可以为存储器(如图4A所示的内部存储器221)。显示屏1002可以为如图4A所示的显示屏394,该显示屏394可以为触摸屏,该触摸屏中可以集成显示面板和触控面板。本申请实施例所提供的终端可以为图4A所示的电子设备100。其中,上述处理器和显示器等可以连接在一起,例如通过总线连接。For example, the processor 1001 can be the processor 3210 as shown in Figure 4A, and the communication module 1003 includes a radio frequency module (the radio frequency module 350 as shown in Figure 4A). The communication module may also include a Wi-Fi module, a Bluetooth module, a radio frequency module 350 and other communication modules. The storage module may be a memory (internal memory 221 as shown in Figure 4A). The display screen 1002 may be a display screen 394 as shown in FIG. 4A , the display screen 394 may be a touch screen, and the touch screen may integrate a display panel and a touch panel. The terminal provided by the embodiment of the present application may be the electronic device 100 shown in Figure 4A. The above-mentioned processor, display, etc. may be connected together, for example, through a bus.
本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质包括计算机指令,当所述计算机指令在上述电子设备上运行时,使得该电子设备执行上述方法实施例中电子设备100执行的各个功能或者步骤。Embodiments of the present application also provide a computer-readable storage medium. The computer-readable storage medium includes computer instructions. When the computer instructions are run on the above-mentioned electronic device, the electronic device causes the electronic device to execute the electronic device 100 in the above-mentioned method embodiment. Each function or step performed.
本申请实施例还提供一种计算机程序产品,当所述计算机程序产品在计算机上运行时,使得所述计算机执行上述方法实施例中电子设备100执行的各个功能或者步骤。例如,该计算机可以是上述电子设备100。An embodiment of the present application also provides a computer program product. When the computer program product is run on a computer, it causes the computer to perform each function or step performed by the electronic device 100 in the above method embodiment. For example, the computer may be the electronic device 100 described above.
通过以上实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。Through the description of the above embodiments, those skilled in the art can clearly understand that for the convenience and simplicity of description, only the division of the above functional modules is used as an example. In practical applications, the above functions can be allocated according to needs. Different functional modules are completed, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of modules or units is only a logical function division. In actual implementation, there may be other division methods, for example, multiple units or components may be The combination can either be integrated into another device, or some features can be omitted, or not implemented. On the other hand, the coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, and the indirect coupling or communication connection of the devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated. The components shown as units may be one physical unit or multiple physical units, that is, they may be located in one place, or they may be distributed to multiple different places. . Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present application can be integrated into one processing unit, each unit can exist physically alone, or two or more units can be integrated into one unit. The above integrated units can be implemented in the form of hardware or software functional units.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等 各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a readable storage medium. Based on this understanding, the technical solutions of the embodiments of the present application are essentially or contribute to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the software product is stored in a storage medium , including several instructions to cause a device (which can be a microcontroller, a chip, etc.) or a processor to execute all or part of the steps of the methods described in various embodiments of this application. The aforementioned storage media include: U disk, mobile hard disk, read only memory (ROM), random access memory (RAM), magnetic disk or optical disk, etc. Various media that can store program code.
以上内容,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。 The above contents are only specific implementation modes of the present application, but the protection scope of the present application is not limited thereto. Any changes or substitutions within the technical scope disclosed in the present application shall be covered by the protection scope of the present application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (16)

  1. 一种风险识别方法,其特征在于,应用于终端,所述方法包括:A risk identification method, characterized in that it is applied to a terminal, and the method includes:
    接收到用户设置特定场景的操作,获取第一信息;所述特定场景包括呼叫转移、免打扰模式或飞行模式;所述第一信息包括特定场景中涉及的电话号码信息和环境信息中至少一个;Receive the user's operation to set a specific scene and obtain the first information; the specific scene includes call transfer, do not disturb mode or airplane mode; the first information includes at least one of the phone number information and environmental information involved in the specific scene;
    根据所述第一信息进行风险识别;Perform risk identification based on the first information;
    如果确定存在风险,输出风险预警信息。If it is determined that a risk exists, risk warning information is output.
  2. 根据权利要求1所述的方法,其特征在于,所述特定场景为呼叫转移,所述电话号码信息包括呼叫转移号码,所述根据所述第一信息进行风险识别包括:The method according to claim 1, wherein the specific scenario is call transfer, the phone number information includes a call transfer number, and the risk identification based on the first information includes:
    如果确定所述呼叫转移号码不是安全号码,和/或,如果确定所述呼叫转移号码是风险号码,则确定存在风险。If it is determined that the call forwarding number is not a safe number, and/or if it is determined that the call forwarding number is a risk number, it is determined that a risk exists.
  3. 根据权利要求2所述的方法,其特征在于,确定呼叫转移号码是安全号码的判断条件包括以下一项或多项:The method according to claim 2, characterized in that the judgment conditions for determining that the call forwarding number is a security number include one or more of the following:
    确定所述呼叫转移号码是本机SIM卡号码;Determine that the call forwarding number is the local SIM card number;
    确定所述呼叫转移号码在本地通讯录中;Confirm that the call forwarding number is in the local address book;
    确定所述呼叫转移号码在预设的白名单中;Determine that the call forwarding number is in a preset white list;
    确定所述呼叫转移号码的属主信息与本机号码的属主信息相同。It is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
  4. 根据权利要求3所述的方法,其特征在于,所述确定所述呼叫转移号码的属主信息与本机号码的属主信息相同,包括:The method according to claim 3, characterized in that determining that the owner information of the call forwarding number is the same as the owner information of the local number includes:
    向服务器发送携带第一标识和所述呼叫转移号码的第一查询请求;所述第一标识用于指示所述终端的本机号码;所述第一查询请求用于指示所述服务器基于所述第一标识和所述呼叫转移号码查询本机属主信息和呼叫转移属主信息;Send a first query request carrying a first identification and the call transfer number to the server; the first identification is used to indicate the local number of the terminal; the first query request is used to indicate the server based on the The first identifier and the call forwarding number query the owner information of the local machine and the call forwarding owner information;
    接收所述服务器返回的携带所述本机属主信息与所述呼叫转移属主信息的第一查询应答;Receive the first query response returned by the server carrying the local owner information and the call transfer owner information;
    如果确定所述本机属主信息与所述呼叫转移属主信息匹配成功,则确定所述呼叫转移号码的属主信息与本机号码的属主信息相同。If it is determined that the owner information of the local phone and the call forwarding owner information match successfully, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
  5. 根据权利要求3所述的方法,其特征在于,所述确定所述呼叫转移号码的属主信息与本机号码的属主信息相同,包括:The method according to claim 3, characterized in that determining that the owner information of the call forwarding number is the same as the owner information of the local number includes:
    向服务器发送携带第一标识和所述呼叫转移号码的第二查询请求;所述第一标识用于指示所述终端的本机号码;所述第二查询请求用于指示所述服务器确定所述本机号码的属主信息与所述呼叫转移号码的属主信息的匹配结果;Send a second query request carrying a first identifier and the call transfer number to the server; the first identifier is used to indicate the local number of the terminal; the second query request is used to instruct the server to determine the The matching result between the owner information of the local number and the owner information of the call forwarding number;
    接收所述服务器返回的携带匹配结果的第二查询应答;Receive a second query response carrying a matching result returned by the server;
    如果确定所述匹配结果为匹配成功,则确定所述呼叫转移号码的属主信息与本机号码的属主信息相同。If it is determined that the matching result is successful, it is determined that the owner information of the call forwarding number is the same as the owner information of the local number.
  6. 根据权利要求2所述的方法,其特征在于,所述确定呼叫转移号码是风险号码包括:The method according to claim 2, wherein determining that the call forwarding number is a risk number includes:
    确定所述呼叫转移号码在预设的黑名单中;或者,Determine that the call forwarding number is in a preset blacklist; or,
    通过向三方风险识别平台查询的方式,确定所述呼叫转移号码为已被标注风险的号码。 By querying the third-party risk identification platform, it is determined that the call forwarding number is a number that has been marked with risk.
  7. 根据权利要求2所述的方法,其特征在于,所述方法还包括:The method of claim 2, further comprising:
    如果确定不存在风险,向服务器发送设置呼叫转移的设置请求;If it is determined that there is no risk, send a setting request to set call forwarding to the server;
    接收所述服务器返回的设置应答,并输出设置成功的提示消息;Receive the setting response returned by the server, and output a prompt message indicating that the setting is successful;
    其中,所述设置请求中携带第一标识和呼叫转移号码,所述第一标识用于指示所述终端的本机号码;所述设置请求用于指示所述服务器根据所述本机号码和所述呼叫转移号码,将所述本机号码呼叫转移至所述呼叫转移号码。Wherein, the setting request carries a first identifier and a call transfer number, and the first identifier is used to indicate the local number of the terminal; the setting request is used to instruct the server to use the local number and the call forwarding number according to the local number and the call transfer number. The call forwarding number is used to forward calls from the local number to the call forwarding number.
  8. 根据权利要求1所述的方法,其特征在于,所述根据所述第一信息进行风险识别,包括:The method according to claim 1, wherein the risk identification based on the first information includes:
    根据所述环境信息判断在第一时刻或第一时刻前预设时长内是否存在风险操作;其中,所述第一时刻为接收到用户设置特定场景的操作的时刻。It is determined based on the environmental information whether there is a risky operation at the first moment or within a preset time period before the first moment; wherein the first moment is the moment when the user's operation to set a specific scene is received.
  9. 根据权利要求8所述的方法,其特征在于,所述环境信息为电话通话事件,The method according to claim 8, characterized in that the environmental information is a telephone call event,
    所述风险操作包括:The risky operations include:
    所述电话通话事件的通话号码是风险号码,和/或,所述电话通话事件的通话号码不是安全号码。The call number of the phone call event is a risk number, and/or the call number of the phone call event is not a safe number.
  10. 根据权利要求8所述的方法,其特征在于,所述环境信息为应用运行事件和/或功能运行事件;The method according to claim 8, characterized in that the environmental information is an application running event and/or a function running event;
    所述风险操作包括特定应用运行和/或所述特定应用的特定功能被运行。The risk operations include running a specific application and/or running a specific function of the specific application.
  11. 根据权利要求8所述的方法,其特征在于,所述环境信息为应用下载事件,所述风险操作包括存在下载风险应用的行为;或者,所述环境信息为应用安装事件,所述风险操作包括存在安装风险应用的行为。The method according to claim 8, wherein the environmental information is an application download event, and the risky operation includes the behavior of downloading a risky application; or the environmental information is an application installation event, and the risky operation includes There is a behavior of installing risky applications.
  12. 根据权利要求8所述的方法,其特征在于,所述环境信息为应用交互事件,所述风险操作包括接收到特定应用发送的风险提示消息。The method according to claim 8, wherein the environmental information is an application interaction event, and the risk operation includes receiving a risk reminder message sent by a specific application.
  13. 根据权利要求1-12中任一项所述的方法,其特征在于,所述根据所述第一信息进行风险识别,包括:The method according to any one of claims 1-12, characterized in that the risk identification based on the first information includes:
    若根据所述电话号码信息进行风险识别确定存在风险,和/或,根据所述环境信息进行风险识别确定存在风险,则确定存在风险。If risk identification is performed based on the telephone number information and it is determined that a risk exists, and/or risk identification is performed based on the environmental information and a risk is determined to exist, then it is determined that a risk exists.
  14. 根据权利要求1-12中任一项所述的方法,其特征在于,所述根据所述第一信息进行风险识别,包括:The method according to any one of claims 1-12, characterized in that the risk identification based on the first information includes:
    若根据所述电话号码进行风险识别确定不存在风险,和/或,根据所述环境信息进行风险识别确定不存在风险,则确定不存在风险。If risk identification is performed based on the phone number and it is determined that there is no risk, and/or risk identification is performed based on the environmental information and it is determined that there is no risk, then it is determined that there is no risk.
  15. 一种电子设备,其特征在于,所述电子设备包括存储器、显示屏和一个或多个处理器;所述存储器、所述显示屏与所述处理器耦合;所述存储器中存储有计算机程序代码,所述计算机程序代码包括计算机指令,当所述计算机指令被所述处理器执行时,使得所述电子设备执行如权利要求1-14中任一项所述的方法。An electronic device, characterized in that the electronic device includes a memory, a display screen and one or more processors; the memory, the display screen and the processor are coupled; computer program code is stored in the memory , the computer program code includes computer instructions, which when executed by the processor, cause the electronic device to perform the method according to any one of claims 1-14.
  16. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求1-14中任一项所述的方法。 A computer-readable storage medium, characterized by comprising computer instructions, which when the computer instructions are run on an electronic device, cause the electronic device to perform the method according to any one of claims 1-14.
PCT/CN2023/088202 2022-08-02 2023-04-13 Risk identification method and electronic device WO2024027199A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210922242.0 2022-08-02
CN202210922242.0A CN117544717A (en) 2022-08-02 2022-08-02 Risk identification method and electronic equipment

Publications (1)

Publication Number Publication Date
WO2024027199A1 true WO2024027199A1 (en) 2024-02-08

Family

ID=89792494

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/088202 WO2024027199A1 (en) 2022-08-02 2023-04-13 Risk identification method and electronic device

Country Status (2)

Country Link
CN (1) CN117544717A (en)
WO (1) WO2024027199A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117893215A (en) * 2024-03-18 2024-04-16 花瓣支付(深圳)有限公司 Risk control method, electronic device, server and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6925162B1 (en) * 1999-09-16 2005-08-02 Mci, Inc. Method and system for negotiated call forwarding
CN101043751A (en) * 2007-03-28 2007-09-26 华为技术有限公司 Method and system for restraining calling transfer
CN104935762A (en) * 2015-06-23 2015-09-23 中国联合网络通信集团有限公司 Call forwarding setting prompting method and network side equipment
CN105101132A (en) * 2015-06-23 2015-11-25 中国联合网络通信集团有限公司 Call forwarding setting prompting method and terminal
CN110267219A (en) * 2019-07-02 2019-09-20 中国联合网络通信集团有限公司 Call forwarding report method, register, user terminal and block chain network
CN110312221A (en) * 2019-07-02 2019-10-08 中国联合网络通信集团有限公司 Call forwarding setting method, home location register and block chain network system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6925162B1 (en) * 1999-09-16 2005-08-02 Mci, Inc. Method and system for negotiated call forwarding
CN101043751A (en) * 2007-03-28 2007-09-26 华为技术有限公司 Method and system for restraining calling transfer
CN104935762A (en) * 2015-06-23 2015-09-23 中国联合网络通信集团有限公司 Call forwarding setting prompting method and network side equipment
CN105101132A (en) * 2015-06-23 2015-11-25 中国联合网络通信集团有限公司 Call forwarding setting prompting method and terminal
CN110267219A (en) * 2019-07-02 2019-09-20 中国联合网络通信集团有限公司 Call forwarding report method, register, user terminal and block chain network
CN110312221A (en) * 2019-07-02 2019-10-08 中国联合网络通信集团有限公司 Call forwarding setting method, home location register and block chain network system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117893215A (en) * 2024-03-18 2024-04-16 花瓣支付(深圳)有限公司 Risk control method, electronic device, server and storage medium

Also Published As

Publication number Publication date
CN117544717A (en) 2024-02-09

Similar Documents

Publication Publication Date Title
US11385857B2 (en) Method for displaying UI component and electronic device
CN111404802A (en) Notification processing system and method and electronic equipment
CN110177074B (en) Method for sending conversation message and electronic equipment
CN112422874B (en) Camera control method and electronic equipment
WO2020155014A1 (en) Smart home device sharing system and method, and electronic device
WO2020119492A1 (en) Message processing method and related apparatus
WO2020150917A1 (en) Application permission management method and electronic device
CN113170019B (en) Incoming call display method and terminal equipment based on application
WO2021052204A1 (en) Address book-based device discovery method, audio and video communication method, and electronic device
WO2020006711A1 (en) Message playing method and terminal
US20220159453A1 (en) Method for Using Remote SIM Module and Electronic Device
WO2022037407A1 (en) Method and system for replying to message, and electronic device
EP3893529B1 (en) Communication method based on bluetooth low energy
WO2020107463A1 (en) Electronic device control method and electronic device
WO2021223681A1 (en) Intelligent reminding method and device
CN113821767A (en) Application program authority management method and device and electronic equipment
WO2024045801A1 (en) Method for screenshotting, and electronic device, medium and program product
WO2024027199A1 (en) Risk identification method and electronic device
WO2023071940A1 (en) Cross-device method and apparatus for synchronizing navigation task, and device and storage medium
CN115174727A (en) Information transmission method and electronic equipment
WO2024066837A1 (en) Incoming call alert method and electronic device
CN115087134B (en) Bluetooth connection method and electronic equipment
CN116027933B (en) Method and device for processing service information
WO2023155583A1 (en) Cross-device application management method, electronic device, and system
WO2023071558A1 (en) Method and apparatus for using cellular communication function

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23848910

Country of ref document: EP

Kind code of ref document: A1