Method and device for transmitting messages by background program
A background program, a technology for sending messages, used in security devices, messages/mailboxes/notifications, telephone communications, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] Embodiment 1. A method for background programs to send messages. Combine below figure 1 The method of this embodiment will be described.
[0022] figure 1 In S100, obtain the connection channel for sending messages from the background program;
[0023] The message sending by the background program in this embodiment and the following embodiments refers to an act of silently sending a message directly without calling a message interface. The background program refers to a program that is not directly contacted by the user, and the background program may be any program, or even a device that completes a corresponding function.
[0024] The connection channel through which the background program in this embodiment sends messages is the communication channel between the message construction process and the message sending process.
[0025] Wherein, in this embodiment, the system private interface is called as the connection channel for the background program to send mes...
Embodiment 2
[0052] Embodiment 2: Take the method for sending a message by a background program as an example in the scenario of changing a SIM card in a mobile phone. After the mobile phone is stolen, the new user will replace the SIM card. Therefore, the user replaces the mobile phone SIM as a scene for the background program in the mobile phone anti-theft to send a message. The background program sends a message to notify the designated recipient that the mobile phone may be stolen, thereby The existing contacts on the mobile phone can be prevented from being cheated, or the current mobile phone location can be located according to the message sent by the background program, so as to take further processing steps. This embodiment specifically includes:
[0053] First, when it is recognized that the SIM of the mobile phone has been replaced, the connection channel for the message sent by the background program is obtained, and the execution code for obtaining the connection channel for t...
Embodiment 3
[0068] Embodiment 3: Taking the background program sending message method applied to the scenario where the background program executes the user operation instruction and then replies to the message after the mobile phone is stolen as an example. When the user's mobile phone is stolen, some data stored in the mobile phone will be leaked, which is the last thing the mobile phone user wants to see. Therefore, after the mobile phone is stolen, the user can send a message to the original mobile phone to notify it to delete the specified data. content, such as deleting photos, videos and contacts stored in the mobile phone, the message can be sent through a preset specific command, and the mobile phone that receives the message recognizes the command and intercepts the message so that it will not be displayed to the user. , the mobile phone that receives the message needs to reply a message through the background program to notify it whether the command is executed successfully. Th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 