Method and device for processing short message sending request

文档序号:765740 发布日期:2021-04-06 浏览:24次 中文

阅读说明:本技术 一种短信发送请求的处理方法以及装置 (Method and device for processing short message sending request ) 是由 黄悦 于 2020-12-25 设计创作,主要内容包括:本发明提供了一种短信发送请求的处理方法以及装置,该方法包括:应用于移动终端,该方法包括:获取短信发送请求;在确定短信发送请求符合预设条件的情况下,判断移动终端是否发生非正常操作,其中,短信发送请求符合预设条件包括,短信内容和/或目标号码符合预设条件;在确定移动终端发生非正常操作的情况下,拦截短信发送请求。解决了在现有技术中,无法有效地避免手机被暗中操控从而向外发送短信的技术问题。(The invention provides a method and a device for processing a short message sending request, wherein the method comprises the following steps: the method is applied to the mobile terminal and comprises the following steps: acquiring a short message sending request; under the condition that the short message sending request is determined to accord with the preset conditions, judging whether the mobile terminal is abnormally operated or not, wherein the short message sending request accords with the preset conditions and comprises the short message content and/or the target number accords with the preset conditions; and intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined. The technical problem that in the prior art, the mobile phone cannot be effectively prevented from being controlled in the dark so as to send the short message to the outside is solved.)

1. A method for processing a short message sending request is applied to a mobile terminal, and the method comprises the following steps:

acquiring a short message sending request;

under the condition that the short message sending request is determined to accord with preset conditions, judging whether the mobile terminal is abnormally operated or not, wherein the short message sending request accords with the preset conditions and comprises short message contents and/or a target number;

and intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined.

2. The method of claim 1, wherein the determining that the short message sending request meets a preset condition comprises:

determining whether a preset number field is included according to a target number of the short message sending request; and/or

And determining whether the short message sending request comprises preset short message content according to the sending content of the short message sending request.

3. The method according to claim 1, characterized in that it comprises:

and generating short message early warning information under the condition that the mobile terminal is determined not to have abnormal operation.

4. The method of claim 1, wherein the determining that the mobile terminal is operating abnormally comprises:

and under the condition that the mobile terminal is detected to be in a screen-off and/or screen-locking state, determining that the mobile terminal is abnormally operated.

5. The method of claim 1, wherein the determining that the mobile terminal is operating abnormally comprises:

and under the condition that the mobile terminal is detected to have no short message operation record, determining that the mobile terminal is abnormally operated.

6. The method of claim 1, wherein the determining that the mobile terminal is operating abnormally comprises:

and under the condition that the screen of the mobile terminal is not detected to be touched, determining that the mobile terminal is abnormally operated.

7. The method of claim 1, wherein after intercepting the SMS transmission request, the method further comprises:

storing the short message sending request to a short message blacklist, wherein,

when a first short message sending request is received, the first short message sending request is intercepted under the condition that the first short message sending request is matched with the short message sending request.

8. The method of claim 5, wherein the detecting that the short message operation record does not exist in the mobile terminal comprises:

acquiring a buried point record of the short message application of the mobile terminal;

and determining that the mobile terminal does not have a short message operation record based on the buried point record.

9. The method of claim 8, wherein the determining that the short message operation record does not exist for the mobile terminal based on the buried point record comprises:

obtaining the running record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal according to the embedded point record;

and determining that no short message operation record exists in the mobile terminal based on the operation record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal.

10. A device for processing a short message sending request is applied to a mobile terminal, and comprises:

the acquisition unit is used for acquiring a short message sending request;

the judging unit is used for judging whether the mobile terminal is abnormally operated or not under the condition that the short message sending request is determined to accord with the preset condition, wherein the short message sending request accords with the preset condition and comprises short message content and/or a target number;

and the intercepting unit is used for intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined.

Technical Field

The application belongs to the field of mobile communication, and relates to a method and a device for processing a short message sending request.

Background

At present, mobile phones are used extremely widely, and various payment methods are derived, for example, a short message is sent to a third party to pay service cost, but the payment through the short message becomes a means for profit of lawless persons, and the short message is controlled by the mobile phones of users to send the short message outwards through some means, so that the user cost is deducted under the condition that the users do not know.

It should be noted that, in the prior art, it is impossible to effectively prevent the mobile phone from being operated in the dark so as to send the short message to the outside.

Disclosure of Invention

The invention provides a method and a device for processing a short message sending request, which aim to solve the technical problem that in the prior art, a mobile phone cannot be effectively prevented from being secretly controlled to send a short message outwards.

According to a first aspect of the present invention, a method for processing a short message sending request is provided, which is applied to a mobile terminal, and the method includes: acquiring a short message sending request; under the condition that the short message sending request is determined to accord with the preset conditions, judging whether the mobile terminal is abnormally operated or not, wherein the short message sending request accords with the preset conditions and comprises the short message content and/or the target number accords with the preset conditions; and intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined.

Further, the step of determining that the short message sending request meets the preset condition includes: determining whether a preset number field is included according to a target number of the short message sending request; and/or determining whether the content of the preset short message is included according to the sending content of the short message sending request.

Further, the method comprises: and generating short message early warning information under the condition that the mobile terminal is determined not to be abnormally operated.

Further, the determining that the abnormal operation of the mobile terminal occurs includes: and under the condition that the mobile terminal is detected to be in a screen-off and/or screen-locking state, determining that abnormal operation occurs to the mobile terminal.

Further, the determining that the abnormal operation of the mobile terminal occurs includes: and under the condition that the mobile terminal is detected to have no short message operation record, determining that the mobile terminal is abnormally operated.

Further, the determining that the abnormal operation of the mobile terminal occurs includes: and under the condition that the screen of the mobile terminal is not detected to be touched, determining that the mobile terminal is abnormally operated.

Further, the method further comprises: and storing the short message sending request to a short message blacklist, wherein when the first short message sending request is received, the first short message sending request is intercepted under the condition that the first short message sending request is matched with the short message sending request.

Further, the step of detecting that the short message operation record does not exist in the mobile terminal comprises: acquiring a buried point record of short message application of a mobile terminal; and determining that the short message operation record does not exist in the mobile terminal based on the buried point record.

Further, determining that the short message operation record does not exist in the mobile terminal based on the buried point record comprises: obtaining the running record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal according to the embedded point record; and determining that the short message operation record does not exist in the mobile terminal based on the operation record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal.

According to a second aspect of the present invention, there is provided a device for processing a short message sending request, the device being applied to a mobile terminal, the device comprising: the acquisition unit is used for acquiring a short message sending request; the mobile terminal comprises a judging unit, a judging unit and a judging unit, wherein the judging unit is used for judging whether the mobile terminal is abnormally operated or not under the condition that the short message sending request is determined to accord with the preset conditions, and the short message sending request accords with the preset conditions, including the short message content and/or the target number accords with the preset conditions; and the intercepting unit is used for intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined.

The invention provides a method and a device for processing a short message sending request, wherein the method comprises the following steps: the method is applied to the mobile terminal and comprises the following steps: acquiring a short message sending request; under the condition that the short message sending request is determined to accord with the preset conditions, judging whether the mobile terminal is abnormally operated or not, wherein the short message sending request accords with the preset conditions and comprises the short message content and/or the target number accords with the preset conditions; and intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined. The technical problem that in the prior art, the mobile phone cannot be effectively prevented from being controlled in the dark so as to send the short message to the outside is solved.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.

Drawings

In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.

Fig. 1 is a flowchart of a method for processing a short message sending request according to a first embodiment of the present invention;

fig. 2-6 are schematic diagrams of alternative methods for processing a short message sending request according to a first embodiment of the present invention; and

fig. 7 is a schematic diagram of a device for processing a short message sending request according to a second embodiment of the present invention.

Detailed Description

In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without making any creative effort, shall fall within the protection scope of the present application.

Example one

As shown in fig. 1, the present solution provides a method for processing a short message sending request, which is applied to a mobile terminal, and the method may include:

step S11, obtaining the short message sending request.

Step S13, under the condition that the short message sending request is determined to accord with the preset condition, judging whether the mobile terminal has abnormal operation, wherein the short message sending request accords with the preset condition, and the short message content and/or the target number accords with the preset condition;

and step S15, intercepting the short message sending request under the condition that the abnormal operation of the mobile terminal is determined.

Specifically, in this scheme, the mobile terminal may be a mobile terminal device such as a mobile phone capable of sending a short message, and for example, the mobile phone may obtain a short message sending request through a system short message sending interface, where the short message sending request may include a short message content and a target number, and the mobile phone may determine whether the mobile phone is abnormally operated through the short message content and/or the target number, intercept the short message sending request when it is determined that the mobile phone is abnormally operated, and in this scheme, when it is determined that the short message sending request meets a preset condition, it is determined that the mobile phone is abnormally operated, and finally intercept the short message sending request meeting the preset condition. It should be noted that the abnormal operation may be an operation performed by the mobile phone user under an unknown condition, for example, a method of implanting trojans into a third party, an intrusion, or the like, where the method of the intrusion or the implantation may directly control the system level interface to send the short message through a hook system interface or a method of directly obtaining root authority, and the scheme directly intercepts the short message sending request when it is determined that the mobile phone is abnormally operated. Therefore, the scheme solves the problem that in the prior art, the mobile phone cannot be effectively prevented from being controlled in the dark so as to send the short message to the outside.

It should be noted that, in the present solution, after it is determined that the short message sending request meets the preset condition, the short message sending request meeting the preset condition is intercepted only when the mobile terminal is abnormally operated, that is, the present solution does not directly intercept all the short message sending requests, but further considers whether to intercept the short message sending request meeting the preset condition, and the preset condition allows the user to configure according to the actual situation, for example, the determination condition of the charging short message is taken as the preset condition, that is, whether to intercept the short message sending request is considered when the short message sending request is about the charging short message sending request, so that the short message sending request can be intercepted more accurately and efficiently.

Optionally, the step of determining that the short message sending request meets the preset condition in step S13 includes:

step S131, determining whether a preset number field is included according to the target number of the short message sending request; and/or determining whether the short message sending request comprises preset short message content according to the sending content of the short message sending request.

Specifically, in the present solution, taking the mobile phone as an example below, the mobile phone may obtain a short message sending request through a system short message sending interface, where the short message sending request includes a target number (a target sending number) and a short message content, and the present solution may determine whether the short message sending request is a fee-deducting short message sending request according to the target number and/or the short message content (i.e., a sending content of the short message), for example, the short message content includes preset short message content, such as only numbers and letters and the number of the characters is within ten characters, and/or the target number of the short message includes a preset number field (such as 106), and the present solution determines that the short message sending request meets a preset condition.

The operator charging interface is typically at the beginning of 106 or a business number, and is clearly distinguished from the personal beginning number such as 13/14/15/16/17/18. If the beginning of the non-personal number is judged as the beginning of the commercial interface, the possibility of the fee-deducting short message is increased, and if the content of the short message is in accordance with the condition that the short message only contains numbers and letters and the number of the characters is within ten characters, the scheme determines that the short message is the fee-deducting short message.

It should be further noted that, in the present solution, on the basis of determining that the short message meets the preset condition (for example, a charging short message), the present solution continues to determine whether the mobile terminal performs an abnormal operation, which is, for example, a mobile phone in the mobile terminal, below, the abnormal operation may be a mobile phone being implicitly controlled to perform an operation, such as a non-manual operation. In the case that the mobile terminal is operated manually, the scheme directly intercepts the fee deduction short message and prohibits the sending of the fee deduction short message, and it should be noted that, because the mobile phone has a mode of being implanted into a trojan, an intrusion and the like by a third party, the mode of the intrusion and the implantation can directly control the system level interface to send the short message through a hook system interface or a mode of directly obtaining root authority, and a user is agnostic in the mode, and there is an artificial behavior (namely an abnormal operation behavior) of stealing the fee deduction short message. Therefore, the technical problem that in the prior art, the phenomenon of hidden fee deduction cannot be effectively avoided is solved.

Optionally, as shown in fig. 2, after step S15, the method provided in this embodiment may further include:

and step S16, generating short message early warning information under the condition that the mobile terminal does not operate abnormally.

Specifically, under the condition that the mobile terminal is determined not to be abnormally operated, the scheme generates short message early warning information to prompt the user that the short message can be a fee deduction short message.

Optionally, with reference to fig. 3, the step S15 of determining that the abnormal operation of the mobile terminal occurs includes:

and step S151, determining abnormal operation of the mobile terminal under the condition that the mobile terminal is detected to be in the screen-off and screen-locking states at the same time.

Specifically, if the mobile terminal is detected to be in the screen-off and screen-locking states at the same time, the mobile terminal is determined to be abnormally operated, and the fee-deducting short message is intercepted.

Optionally, with reference to fig. 3, the step S15 of determining whether the abnormal operation of the mobile terminal occurs includes:

and step S152, determining that the mobile terminal is abnormally operated under the condition that the mobile terminal is detected to have no short message operation record.

Specifically, if the scheme detects that no short message operation record (such as click operation or touch operation for a short message interface) exists in the short message application, the scheme determines that the mobile terminal is abnormally operated, and intercepts the fee-deducting short message.

Optionally, with reference to fig. 3, the step S15 of determining whether the abnormal operation of the mobile terminal occurs includes:

and step S153, determining that the mobile terminal is abnormally operated under the condition that the screen of the mobile terminal is not touched.

Specifically, in order to prevent the use of a key sprite and other simulation operations for clicking the interface, a touch screen coordinate record of the hardware is added, and if the hardware (i.e., the screen) does not send a click record of the key area, it is determined that the operation is not a manual operation. The condition of sending the fee deduction short message in a non-artificial dark mode is directly avoided from a hardware level.

Optionally, with reference to fig. 4, after intercepting the short message sending request in step S15, the method further includes:

step S17, storing the short message sending request to a short message blacklist, wherein, when the first short message sending request is received, the first short message sending request is intercepted under the condition that the first short message sending request is matched with the short message sending request.

Specifically, after intercepting the short message, the target number and the content corresponding to the short message sending request can be stored in the blacklist, when a new short message sending request (namely the first short message sending request) is obtained again next time, the scheme directly compares the content of the new short message passing through the blacklist, and if the short message number of the first short message and the short message content are detected to exist in the short message blacklist, the first short message is directly intercepted. Optionally, the scheme can also send the target number and the content corresponding to the intercepted short message back to the server for big data analysis and entry, and meanwhile, the local identification database of the mobile phone is updated regularly, so that the identification rate of the target number and the content is improved.

Optionally, with reference to fig. 5, the step S152 of detecting that the short message operation record does not exist in the mobile terminal includes:

step S1521, a buried point record of the short message application of the mobile terminal is obtained.

Step S1522, determining that the short message operation record does not exist in the mobile terminal based on the buried point record.

Specifically, the operation embedded point can be set in the short message application in advance so as to record the operation record aiming at the short message application, and if no operation aiming at the short message application, such as clicking an operation interface, no operation record exists.

Optionally, in step S1522, determining that the short message operation record does not exist in the mobile terminal based on the buried point record includes:

step S15221, obtaining the running record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal according to the buried point record.

Step S15222, determining that no short message operation record exists in the mobile terminal based on the operation record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal.

Specifically, in the scheme, the voice assistant may be an SIRI voice assistant or a xiaoliaochu, and the scheme may obtain an operation record of the voice assistant of the mobile terminal from the embedded point record, and may determine the starting time of the voice assistant through the operation record, if it is determined from the embedded point record that the voice assistant is started at the time of generating the short message sending request, that indicates that the user operates the mobile terminal when the short message sending request occurs, there is an operation record of the short message and no abnormal operation, and if it is determined from the embedded point record that the voice assistant is not started when the short message sending request is generated, that indicates that the user does not operate the mobile phone when the short message sending request occurs, and that there is no operation record of the short message and that abnormal operation occurs. According to the scheme, the record of the touch of the screen of the mobile terminal, such as touch time, the touch coordinates of the screen and the like, can be obtained from the embedded point record, if the mobile terminal screen is determined to be touched at the moment of generating the short message sending request through the embedded point record, it indicates that the user operates the mobile terminal when the short message sending request occurs, the short message operation record exists, abnormal operation does not exist, if it is determined from the embedded point record that the mobile terminal screen is not touched when the short message sending request is generated, it indicates that the user does not operate the mobile phone when the short message sending request occurs, the operation record of the short message does not exist, and the abnormal operation occurs to the mobile phone. It should be noted that, the above-mentioned determining that the short message operation record does not exist in the mobile terminal based on the operation record of the voice assistant of the mobile terminal or determining that the short message operation record does not exist in the mobile terminal based on the touch record of the screen of the mobile terminal is an optional embodiment of the present solution, and the present solution may also determine that the short message operation record does not exist in the mobile terminal according to the operation record of the voice assistant of the mobile terminal and/or the touch record of the screen of the mobile terminal.

An alternative embodiment of the present solution is described below with reference to fig. 6:

after finding that the short message is a suspected fee deduction sending request, judging whether the short message is sent artificially or not, adding a function of judging whether the short message is sent artificially or not into a system short message interface, calling the interface of a mobile phone system, checking whether the mobile phone is in a bright screen state or an unlocked state, if both the two items are not the same, proving that the short message is sent artificially, intercepting the short message and stopping sending, if the two items are not in a negative state at the same time, continuously judging whether the current short message application is in a display state, if the current short message application is not in the display state, judging that the short message is not sent artificially, intercepting the short message and stopping sending, if the current short message application is in the display state, continuously checking whether an operation buried point of the short message application is recorded or not, and if the current short message application is not in the display state, judging that the short message is not, intercepting the short message and stopping sending, if the short message is recorded, continuously checking the coordinate record of the hardware touch screen, and judging whether a click record exists in a short message sending key coordinate area, wherein the touch screen coordinate record of the hardware is increased for preventing a click interface from being simulated by using key sprites and the like, and if the click record of the key area is not sent by the hardware, the operation is judged to be non-manual operation. The condition of sending the fee deduction short message in a non-artificial dark mode is directly avoided from a hardware level. And finally, if the judgment is no problem, judging that the operation is artificial, and prompting the user that the short message can be a fee deduction short message.

Example two

As shown in fig. 7, the present invention provides a device for processing a short message sending request, which is applied to a mobile terminal, and a client of the device includes: the acquiring unit 30 is configured to acquire a short message sending request. The judging unit 32 is configured to judge whether the mobile terminal performs abnormal operation when it is determined that the short message sending request meets a preset condition, where the short message sending request meets the preset condition and includes that the short message content and/or the target number meets the preset condition; the intercepting unit 34 is configured to intercept the short message sending request when it is determined that the mobile terminal is operating abnormally. Through the plurality of units, the technical problem that the mobile phone cannot be effectively prevented from being controlled in the dark so as to send the short message to the outside is solved.

It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar contents in other embodiments may be referred to for the contents which are not described in detail in some embodiments.

It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present application, the meaning of "plurality" means at least two unless otherwise specified.

It will be understood that when an element is referred to as being "secured to" or "disposed on" another element, it can be directly on the other element or intervening elements may also be present; when an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present, and further, as used herein, connected may include wirelessly connected; the term "and/or" is used to include any and all combinations of one or more of the associated listed items.

Any process or method descriptions in flow charts or otherwise described herein may be understood as: represents modules, segments or portions of code which include one or more executable instructions for implementing specific logical functions or steps of a process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the embodiments of the present application.

It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.

It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.

In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.

The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.

In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.

Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

16页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种闹钟响铃控制方法、翻盖手机及计算机可读存储介质

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类