Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious short message processing method and client based on false base station

An information processing method and short message technology, which are applied in the malicious short message processing method and client field based on pseudo-base stations, can solve the problems of user property loss, ensure user information and property security, and cannot process malicious short messages

Inactive Publication Date: 2014-12-03
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, criminals defraud users of financial information by sending advertising information or posing as people they know well, resulting in the loss of users' property
In the prior art, it is only possible to determine whether the short message received by the mobile terminal is a malicious short message based on judging whether the sender of the short message is a malicious short message sender, but when the short message is sent in combination with a pseudo base station, it is impossible to determine whether the short message is a malicious short message. Malicious short messages, and thus unable to deal with malicious short messages combined with fake base stations to ensure the safety of user information and property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious short message processing method and client based on false base station
  • Malicious short message processing method and client based on false base station
  • Malicious short message processing method and client based on false base station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] In order to clarify the methods for processing malicious short messages based on pseudo-base stations in the above embodiments, a preferred embodiment is now provided to receive the method for processing malicious short messages based on pseudo-base stations provided by the embodiments of the present invention. It should be noted that, in order to illustrate this preferred embodiment more clearly, in this example, the mobile terminal is set to be a mobile phone.

[0067] Figure 5 A processing flowchart of a method for processing malicious short messages based on a pseudo base station according to a preferred embodiment of the present invention is shown. see Figure 5 , the process includes at least step S502 to step S516.

[0068] Step S502, judging whether the sending number of the short message exists in the sending number whitelist. If yes, execute step S504; if not, execute step S516.

[0069] Specifically, in order to ensure high accuracy when determining whet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious short message processing method and client based on a false base station. The method comprises the following steps that whether a short message received by a mobile terminal contains features of the false base station is judged; if the short message received by the mobile terminal contains the features of the false base station, whether the features of the false base station are features of a malicious false base station is judged according to a malicious false base station list stored in databases, wherein the databases comprise the local database and / or the cloud server database; when it is determined that the short message is a malicious short message according to the determination result, safety processing operations are carried out on the malicious short message. According to the malicious short message processing method and client based on the false base station, the malicious short message sent with the combination of the false base station can be judged in time, the malicious short message can be processed in time, and therefore the defect that a user cannot judge the malicious short message sent with the combination of the false base station by himself, and consequently the user is deceived and has property losses is overcome.

Description

technical field [0001] The invention relates to the field of short message processing, in particular to a malicious short message processing method based on a pseudo-base station and a client. Background technique [0002] With the popularity of mobile terminals and the development of intelligent mobile terminals, people are more and more accustomed to performing various operations related to production and life through mobile terminals. For example, financial operations such as credit card repayment and shopping payment are performed through the mobile terminal. In the same way, merchants are becoming more and more accustomed to notifying or publishing event information or important notices through mobile terminals to improve the convenience of customer operations. For example, bank merchants regularly send short messages to corresponding mobile terminals to remind users that they need to repay credit card payments on time, or remind users that their credit card points can...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/12
CPCH04W4/14
Inventor 孟齐源陈亮高祎玮
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products