[go: up one dir, main page]

CN108668282B - Information processing method, terminal and computer readable storage medium - Google Patents

Information processing method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN108668282B
CN108668282B CN201810270200.7A CN201810270200A CN108668282B CN 108668282 B CN108668282 B CN 108668282B CN 201810270200 A CN201810270200 A CN 201810270200A CN 108668282 B CN108668282 B CN 108668282B
Authority
CN
China
Prior art keywords
terminal
sending
service
communication
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810270200.7A
Other languages
Chinese (zh)
Other versions
CN108668282A (en
Inventor
王蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810270200.7A priority Critical patent/CN108668282B/en
Publication of CN108668282A publication Critical patent/CN108668282A/en
Application granted granted Critical
Publication of CN108668282B publication Critical patent/CN108668282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses an information processing method, wherein the method comprises the following steps: the method comprises the steps that a first terminal receives service stop indication information, a communication account corresponding to the first terminal is a first communication account, and the service stop indication information is used for indicating that communication service of the terminal with the corresponding communication account as the first communication account is paused; judging whether the first terminal is in a scheduled stop state, if not, sending service request information to a network side according to a preset first sending mode; the scheduled stop state is a state in which the first terminal expects to receive service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of which the corresponding communication account is the first communication account when receiving the service request information sent according to the first sending method. The embodiment of the invention also discloses a terminal and a computer readable storage medium. By implementing the scheme, the communication authority of the legal terminal can be prevented from being used by the illegal terminal.

Description

Information processing method, terminal and computer readable storage medium
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to an information processing method, a terminal, and a computer-readable storage medium.
Background
With the rapid development of mobile communication technology, the manufacture and design of network devices need to follow communication protocols in the field of mobile communication. Researchers find that some communication networks have protocol loopholes, and malicious members can simulate a legal terminal to access a core network through the protocol loopholes, so that the communication authority function of a legal terminal user is obtained and used.
How to avoid the communication authority of the legal terminal used by the illegal terminal becomes a problem which needs to be solved urgently.
Disclosure of Invention
In view of the above, embodiments of the present invention are directed to an information processing method, a terminal and a computer-readable storage medium, which can prevent an illegal terminal from using a communication right of a legal terminal.
The technical scheme of the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides an information processing method, where the method includes:
a first terminal receives service stop indication information, wherein a communication account corresponding to the first terminal is a first communication account, and the service stop indication information is used for indicating that communication services of the terminal with the corresponding communication account as the first communication account are suspended;
judging whether the first terminal is in a scheduled stop state or not, and if the first terminal is not in the scheduled stop state, sending service request information to a network side according to a preset first sending mode;
wherein the scheduled stop state is a state in which the first terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method.
In a second aspect, an embodiment of the present invention provides a terminal, where the terminal at least includes: a memory, a communication bus, and a processor, wherein:
the memory is used for storing an information processing program;
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is used for executing the information processing program stored in the memory so as to realize the following steps:
receiving service stop indication information, wherein the communication account corresponding to the terminal is a first communication account, and the service stop indication information is used for indicating that the communication service of the terminal of which the corresponding communication account is the first communication account is suspended;
judging whether the terminal is in a scheduled stop state, if not, sending service request information to a network side according to a preset first sending mode;
wherein, the scheduled stop state is a state in which the terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium, on which an information processing program is stored, and when the information processing program is executed by a processor, the information processing program realizes the steps of the information processing method as described above.
The embodiment of the invention provides an information processing method, a terminal and a computer readable storage medium, wherein a first terminal receives service stop indication information, a communication account corresponding to the first terminal is a first communication account, and the service stop indication information is used for indicating that communication service of the terminal of which the corresponding communication account is the first communication account is suspended; judging whether the first terminal is in a scheduled stop state or not, and if the first terminal is not in the scheduled stop state, sending service request information to a network side according to a preset first sending mode; the planned stop state is a state in which the first terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method; the technical scheme provided by the embodiment of the invention can avoid the communication authority of the legal terminal used by the illegal terminal.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
fig. 2 is a diagram of a communication network system architecture according to an embodiment of the present invention;
fig. 3 is a first flowchart illustrating an information processing method according to an embodiment of the present invention;
fig. 4 is a second flowchart illustrating an information processing method according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a prompt message on a first terminal according to an embodiment of the present invention;
fig. 6 is an interaction flow diagram of an information processing method according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, the present invention provides various embodiments of the method.
The terminal in the embodiment of the invention can be a terminal in a wireless communication network, such as a mobile terminal. In other embodiments of the present invention, the terminal may also be a terminal in a wired communication network, such as a fixed terminal. For example, the illegal terminal may utilize a protocol leak in a communication network protocol, and send a message to a network side of the communication network by using a wireless transmission mode or a wired transmission line, so that the network side instructs the legal terminal to drop from the communication network, and then the illegal terminal simulates the legal terminal to access the network side by using a communication account of the legal terminal, so as to use a communication function corresponding to the communication authority of the legal terminal. Even after the illegal terminal accesses the communication network by using the communication authority of the legal terminal, the illegal terminal can also acquire some verification codes of the legal terminal, such as the verification code of the bank transfer service, sent by the internet equipment through the communication network in the internet service operation process, thereby causing great loss of private information and property of the legal terminal. The embodiment of the invention aims to provide an information processing method to avoid the communication authority of a legal terminal used by an illegal terminal, so that personal information and property loss of a user of the legal terminal can be avoided.
The following describes an application scenario and an implementation of the information processing method provided by the embodiment of the present invention by taking a terminal as an example.
The embodiment of the invention provides an information processing method, wherein an execution main body of the embodiment of the invention is a first terminal, the first terminal can be a legal terminal, and in other embodiments of the invention, a second terminal can be an illegal terminal. Fig. 3 is a first schematic flow chart of an information processing method according to an embodiment of the present invention, as shown in fig. 3, the method may include the following steps:
step S301, the first terminal receives service stop instruction information, where the communication account corresponding to the first terminal is a first communication account, and the service stop instruction information is used to instruct to suspend the communication service of the terminal whose corresponding communication account is the first communication account.
In an embodiment of the present invention, the first communication account may be a legal communication account registered in the communication network by the first terminal. The first communication account may be a communication Number, such as an International Mobile Subscriber identity Number (IMSI) or the like. For example, when the first Communication account is a Communication account of a Global System for Mobile Communication (GSM) or a second Generation Mobile Communication technology (2G) network, the first Communication account may be recorded in a Subscriber Identity Module (SIM) card of the first terminal, and the first Communication account is a Communication account of a Long Term Evolution (LTE) network of a third Generation Mobile Communication technology (3G) network or a fourth Generation Mobile Communication technology (4G) network, or a Communication account of a fifth Generation Mobile Communication technology (5th-Generation, 5G) network, the first terminal account may be recorded in a Universal Subscriber Identity Module (USIM) card of the first terminal. The network side records the communication authority corresponding to the first communication account and provides a communication function corresponding to the communication authority when the first terminal accesses the communication network by using the first communication account. In other embodiments of the present invention, according to a network system of the communication network, the network side may store the communication right corresponding to the first communication account in a Home Location Register (HLR), a Home Subscriber Server (HSS), or a Unified Data Management (UDM). In other embodiments of the present invention, the first communication account may also be a user number or the like.
In the embodiment of the present invention, the service stop indication information received by the first terminal may be sent to the first terminal by the network side after receiving an illegal attack signaling sent by the second terminal. For example, if the second terminal desires to obtain the communication right of the first terminal, an attack signaling sent to the network side by using the protocol vulnerability may be used, for example, the second terminal may send terminal exception information to the network side by using the protocol vulnerability, where the terminal exception information is used to indicate that the terminal corresponding to the first communication account is abnormal or one or more services on the terminal are abnormal, after receiving the terminal exception information or the terminal service exception information, the network side may send service stop indication information to the terminal corresponding to the first communication account according to a protocol, and for example, the service stop indication information may be network drop indication information. In other embodiments of the present invention, the service stop indication information may indicate that the terminal corresponding to the first communication account suspends initiating the communication service corresponding to one or more communication permissions, such as suspending a voice service, suspending a data service, suspending a voice mailbox service, and the like.
Step S302, determining whether the first terminal is in a scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending manner.
The scheduled stop state is a state in which the first terminal expects to receive service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of which the corresponding communication account is the first communication account when receiving the service request information sent according to the first sending method.
In the embodiment of the present invention, after receiving the service stop instruction information, the first terminal may determine whether the first terminal encounters an illegal attack by determining whether the first terminal is in a scheduled stop state. If the first terminal is in a scheduled stop state, that is, a state where the first terminal expects to receive the service stop instruction information, it may be determined that the first terminal does not encounter an illegal attack, and it is normal to receive the service stop instruction information, and the first terminal may not need to execute sending the service request information to the network side according to the first sending method. If the first terminal is not in the scheduled stop state, that is, the first terminal does not expect to receive the service stop indication information in the current state, it can be determined that the first terminal may encounter an illegal attack.
For example, if the service stop indication information received by the first terminal is network drop indication information, where the network drop indication information is used to indicate that the corresponding communication account is a terminal network drop of the first communication account; the above-mentioned determining whether the first terminal is in the scheduled stop state may include: judging whether the first terminal is in a switching state or not; and if the first terminal is not in the switching state, sending service request information to a network side according to a first sending mode. Illustratively, the service request information may be network access request information.
In another embodiment of the present invention, the determining whether the first terminal is in the handover state may include: judging whether a cell where the first terminal is located changes within a preset first time period or not, or judging whether a moving distance of the first terminal within the preset first time period is larger than a preset distance range or not, and if the cell where the first terminal is located changes or the moving distance of the first terminal within the preset first time period is larger than the preset distance range, determining that the first terminal is in a switching state. It should be noted that, if the terminal is currently in the handover state, since the network drop of the terminal may be caused by an excessively fast moving speed of the terminal during the handover process, the first terminal may determine that the currently received network drop indication information is indication information issued by a legal service flow.
In other embodiments of the present invention, it may be determined whether the first terminal is in the handover state, or determined whether a handover command is received in a preset first time period, and if the handover command is received, it may be determined that the first terminal is in the handover state, and if the handover command is not received, it may be determined that the first terminal is not in the handover state. In other embodiments of the present invention, it may also be determined whether the first terminal is in the handover state by determining whether the handover command is received and whether the location of the first terminal changes. Whether the position of the first terminal changes may be determined according to at least one of whether the cell changes or whether the change in the moving distance exceeds a preset distance range.
In other embodiments of the present invention, determining whether the first terminal is in a scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending method may further include: and if the first terminal is in the switching state and the moving speed exceeds the speed threshold, sending service request information to a network side according to a preset first sending mode. By adopting the method, whether the first terminal is in the scheduled stop state can be more accurately judged, so that the situation that an illegal user steals the communication authority of a legal terminal when the legal terminal is disconnected in the utilization and switching process of certain cell boundaries can be avoided.
In the embodiment of the present invention, when receiving the service request information sent according to the first sending method, the network side prohibits the communication service initiated by the terminal whose corresponding communication account is the first communication account, and may be implemented by adding the first communication account corresponding to the first terminal to the blacklist. That is, the first sending method may be further configured to instruct the network side to add the first communication account to a blacklist. In other embodiments of the present invention, the network side may also add the first terminal to a blacklist, and for example, may add an International Mobile Equipment Identity (IMEI) of the first terminal to the blacklist. When the first communication account or the first terminal is added to the blacklist, the communication service initiated by using the first communication account is rejected. For example, when receiving a communication account in a blacklist or a communication service initiated by a terminal, the network side may return to the terminal that the communication account has been added to the blacklist or the terminal has been added to the blacklist as a reason for rejecting access.
In the embodiment of the present invention, the first sending method may be set according to a specification in a related communication protocol related to a communication service that the network side prohibits the terminal from communicating, for example, the sending of the service request information according to the first sending method may include: and sending the service request information according to a preset sending frequency, sending period or sending time interval change rule. For example, if the transmission frequency of the normal service request information does not exceed 1 time/second, and when the transmission frequency exceeds 2 times/second, the network side considers that the terminal is abnormal and will prohibit the communication service of the terminal, the first transmission mode may be set to transmit the service request information according to the transmission frequency greater than 2 times/second, so that the network side prohibits the communication service of the terminal corresponding to the first communication account. By adopting the method, the illegal second terminal can be prohibited from using the communication authority corresponding to the first communication account of the legal first terminal to use the communication function. That is, the preset transmission frequency is greater than the reasonable transmission frequency specified in the communication protocol, and the preset transmission period may be smaller than the reasonable transmission period specified in the communication protocol. The above-mentioned change rule of the transmission time interval may mean that the first terminal transmits the service request information in a legal transmission cycle first, if the first terminal still does not receive the service response information after several transmission cycles, the first terminal may gradually shorten the transmission cycle to transmit the service request information, and when the transmission cycle is smaller than the reasonable transmission cycle, the network side considers that the terminal corresponding to the first communication account is abnormal, and then prohibits the communication service of the terminal corresponding to the first communication account, so that the illegal terminal cannot use the communication service corresponding to the communication right of the first communication account.
In another embodiment of the present invention, the determining whether the first terminal is in a scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending method may also be implemented in the following manner:
judging whether the first terminal is in a scheduled stop state or not; if the first terminal is not in a planned stop state, sending service request information to the network side according to a second sending mode, wherein the second sending mode is used for allowing the network side equipment to allow the communication service initiated by the first terminal and send service response information to the first terminal when the network side equipment does not receive the service request information sent by the second terminal, and a communication account corresponding to the second terminal is the first communication account; and if the service response information sent by the network side is not received in a preset second time period, sending service request information to the network side according to the first sending mode. By adopting the method, the first terminal can try to recover the service first, and if the service can be recovered, the communication service of the local first terminal can be prevented from being disabled unnecessarily when an illegal second terminal is not accessed to the network.
In the embodiment of the present invention, with the above scheme, a first terminal receives service stop instruction information, where a communication account corresponding to the first terminal is a first communication account, and the service stop instruction information is used to instruct to suspend a communication service of the terminal whose corresponding communication account is the first communication account; judging whether the first terminal is in a scheduled stop state or not, and if the first terminal is not in the scheduled stop state, sending service request information to a network side according to a preset first sending mode; the planned stop state is a state in which the first terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method; the technical scheme provided by the embodiment of the invention can avoid the communication authority of the legal terminal used by the illegal terminal.
The embodiment of the invention also provides an information processing method. After the first terminal is judged not to be in the scheduled stop state, prompt information can be sent to the user using the first terminal, so that the user can select whether to prevent the communication authority from being stolen by sending the service request information to the network side according to the first sending mode. Fig. 4 is a flowchart illustrating a second information processing method according to an embodiment of the present invention. As shown in fig. 4, a method of an embodiment of the invention may include:
step S401, the first terminal receives service stop instruction information, the communication account corresponding to the first terminal is a first communication account, and the service stop instruction information is used for instructing to suspend the communication service of the terminal of which the corresponding communication account is the first communication account.
Wherein the step is similar to S301.
Step S402, determining whether the first terminal is in the scheduled stop state, if the first terminal is not in the scheduled stop state, executing step S403, and if the first terminal is not in the scheduled stop state, ending the processing flow.
Wherein the step of determining whether the first terminal is in the scheduled stop state is similar to S302.
Step S403, outputting a prompt message, where the prompt message is used to request to confirm whether to request to recover the service.
In the embodiment of the present invention, the operating system of the first terminal may display the prompt information on the display screen of the first terminal. Fig. 5 is a schematic diagram of a prompt message on a first terminal according to an embodiment of the present invention. As shown in fig. 5, the prompt message may include "the current terminal is suspected to encounter malicious network attack, the communication function is hijacked, whether to attempt to reactivate the network, and the network right of the attacker is shielded". In other embodiments of the present invention, after the prompt message is output, an audible and visual alarm message may be output to prompt the user using the first terminal to view the prompt message.
In other embodiments of the present invention, the manner of sending the service request indication information to the network side according to the first sending method may result in that the service of the local device is limited. For example, after receiving the service request indication information sent by the first sending method and determining that the terminal corresponding to the first terminal account is abnormal, the network side may disable the communication account corresponding to the first communication account permanently, or disable the communication account corresponding to the first communication account for a period of time, for example, 24 hours, so that the prompt information may further include "shielding attacker network right may cause the local service to be limited within 24 hours," asking for confirmation whether to activate "or" shielding attacker network right may cause the local service to be limited and requires re-handling the SIM card, "asking for confirmation whether to activate", and the like, which is not limited in this embodiment of the present invention.
Step S404, determining whether the indication information of resuming the service is received, if the indication information of resuming the service is received, executing step S405, and if the indication information of resuming the service is not received, ending the processing flow.
In the embodiment of the present invention, the user using the first terminal may choose to click the "activate" button to trigger the restoration of the service indication information. In other embodiments of the present invention, the user using the first terminal may click the "not active" button, and after selecting the "not active" button, the user may check by himself whether the service is actually masked or other means of recovering the service is attempted.
Step S405, sending the service request information to the network side according to the first sending method.
The scheduled stop state is a state in which the first terminal expects to receive service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of which the corresponding communication account is the first communication account when receiving the service request information sent according to the first sending method. Other technical details of this step are similar to S302.
Other technical scheme details and technical effects of the embodiment of the invention can refer to the relevant descriptions in other embodiments.
The embodiment of the invention also provides an information processing method. Fig. 6 is an interaction flow diagram of an information processing method according to an embodiment of the present invention. As shown in fig. 6, the method of the embodiment of the present invention may include:
step S601, the second terminal sends an attack signaling to the network side, where the attack signaling is used to indicate that the terminal corresponding to the first communication account is abnormal.
The second terminal may send the attack signaling to the network side by using the protocol vulnerability.
Step S602, the network side sends the indication information of network drop to the first terminal.
Wherein the step is similar to S301.
Step S603, the second terminal sends the network access request information to the network side by using the first communication account.
The second terminal can transmit the network access request information by using the first communication account by copying the information of the first communication account.
Step S604, the network side sends a network access request response message to the second terminal.
The network side checks and authenticates a first communication account carried by the second terminal, and the network side sends network access request response information to the second terminal to allow the network access request of the second terminal because the first communication account is a legal communication account.
In step S605, the first terminal determines whether it is in the handover state, and if it is in the handover state, executes step S606.
Wherein the step is similar to S302 and S402.
In step S606, the first terminal outputs first prompt information for requesting confirmation of whether to reactivate the network.
Wherein the step is similar to S403.
Step S607, the first terminal obtains the indication information of the activated network, and determines to send the network access request information according to the first sending method.
The manner of acquiring the activation network indication information is similar to the manner of acquiring the restoration service indication information in S404. The first sending method may be, for example, sending the 1 st network access request according to the reasonable sending period T, and according to T × 0.9N-1And sending the Nth network access request information.
Step S608, the first terminal sends the network access request information according to the first sending method.
Here, the step is similar to S302 and S405.
Step S609, the network side prohibits the communication service of the terminal corresponding to the first communication account.
After receiving the network access request information with the sending period lower than the reasonable sending period specified by the protocol according to the specification of the communication protocol, the network side confirms that the terminal corresponding to the first communication account is abnormal, and prohibits the communication service of the terminal corresponding to the first communication account.
In other embodiments of the present invention, if the second terminal has not sent the network entry request information to the network side before step S608, that is, steps S603 and S604 do not exist before step S608. After S608, after the network side receives the 1 st network access request sent according to the reasonable sending period T, the steps of the embodiment of the present invention may further include:
step S610, the network side sends a network access request response message to the first terminal.
The network side checks and authenticates a first communication account carried by the first terminal, and the network side sends network access request response information to the first terminal to allow the network access request of the first terminal because the first communication account is a legal communication account.
Step S611, the first terminal outputs a second prompt message to prompt that the network permission has been restored.
The first terminal can display the second prompt message on the display screen to inform that the communication authority of the first terminal is recovered.
Step S612, the first terminal stops sending the network access request information according to the first sending method.
The first terminal may set the subsequent network access request information to be sent according to a reasonable sending period specified by the protocol.
In an application scenario of the embodiment of the present invention, a communication network may include a terminal and a network side, and the network side may include a base station and a core network. Researchers find that a protocol leak exists in a 4G LTE network, a malicious member can attack a legal terminal user through the protocol leak and a signaling, so that a core network kicks the legal terminal user out of the network, the legal terminal user drops the network, and the malicious terminal simulates the legal terminal to access the core network, thereby obtaining and using the communication authority function of the legal terminal user, even obtaining a verification code received by the legal terminal user in some Internet services, and having very bad influence; at present, 4G is commercialized in a large scale, and 5G is still in a planning and deployment stage, so that the damage of the vulnerability to a legal end user is urgently prevented.
In the embodiment of the invention, the terminal can record the current cell information, the user position and the user state by utilizing the 4G network protocol characteristic, and when the terminal is disconnected, the terminal can detect the current user state of the terminal, judge whether the terminal carries out cell switching or not and judge whether a normal switching signaling is received or not. When the system judges that the user is in a normal switching state, such as high-speed rail and high-speed movement, the terminal cannot enter an abnormal alarm state; when the terminal judges that the user cell and the position do not change greatly, but suddenly receives an abnormal network drop signal and then drops the network, the terminal immediately triggers an alarm state, lights a system screen and informs a user using the terminal that the suspected malicious network is attacked by a malicious user, the communication function is hijacked, whether the network is tried to be reactivated or not is judged, and the network authority of an attacker is shielded; after the user confirms to activate the network, the terminal will periodically, gradually, rapidly and continuously send the network access request to the base station. If the base station receives the network access request of the terminal, the base station sends a network access request response to the terminal, the terminal stops sending the network access request, the terminal informs the user that the abnormity is recovered, and the user can normally use the terminal. If the terminal initiates a network access request and the base station is not processed all the time, the terminal judges that the terminal is simulated to access the network by the malicious node, the terminal starts to initiate the request continuously, the base station continuously receives a registration request initiated by the terminal in a short time, and the terminal is listed in a blacklist, so that a communication account corresponding to the terminal is listed in the blacklist. The communication account can be a terminal number, and after the terminal number is listed in a blacklist, the malicious member and the user can not register the network, so that the property safety of the user is ensured. When blacklisted, the terminal may output a prompt to prompt the user to use the terminal to "advise to re-transact the phone card to ensure property security".
Fig. 7 is a schematic structural diagram of a terminal provided in an embodiment of the present invention, and as shown in fig. 7, the terminal 700 at least includes: a processor 701, a memory 702, an interface 703 and a bus 704, wherein:
the memory 702 is used for storing information processing programs;
the bus 704 is used for realizing connection communication between the processor and the memory;
the processor 701 is configured to execute an information processing program stored in the memory, so as to implement the following steps:
receiving service stop indication information, wherein the communication account corresponding to the terminal is a first communication account, and the service stop indication information is used for indicating that the communication service of the terminal of which the corresponding communication account is the first communication account is suspended;
judging whether the terminal is in a scheduled stop state, if not, sending service request information to a network side according to a preset first sending mode;
wherein, the scheduled stop state is a state in which the terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method.
In the embodiment of the present invention, the terminal may be a mobile terminal or a fixed terminal.
It should be noted that the description of the terminal embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is not repeated. For technical details not disclosed in the terminal embodiments of the present invention, reference is made to the description of the method embodiments of the present invention for understanding.
An embodiment of the present invention provides a computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the steps of:
receiving service stop indication information, wherein the communication account corresponding to the terminal is a first communication account, and the service stop indication information is used for indicating that the communication service of the terminal of which the corresponding communication account is the first communication account is suspended;
judging whether the terminal is in a scheduled stop state, if not, sending service request information to a network side according to a preset first sending mode;
wherein, the scheduled stop state is a state in which the terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method.
In the embodiment of the invention, the method is applied to the terminal.
It should be noted that one or more programs in the embodiment of the present invention may be information processing programs used when information processing is performed in other embodiments.
It should be noted that the description of the computer-readable storage medium is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is not repeated. For technical details not disclosed in the embodiments of the computer-readable storage medium of the present invention, reference is made to the description of the embodiments of the method of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method described in the embodiments of the present invention.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An information processing method, characterized in that the method comprises:
the method comprises the steps that a first terminal receives service stop indication information, the service stop indication information is sent to the first terminal after a network side receives an attack signaling sent by an illegal second terminal, a communication account corresponding to the first terminal is a first communication account, and the service stop indication information is used for indicating that communication services of the terminal of which the corresponding communication account is the first communication account are paused;
judging whether the first terminal is in a scheduled stop state or not, and if the first terminal is not in the scheduled stop state, sending service request information to the network side according to a preset first sending mode;
wherein the scheduled stop state is a state in which the first terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method.
2. The method of claim 1,
the first terminal receiving service stop indication information includes: the first terminal receives network drop indication information, wherein the network drop indication information is used for indicating that a corresponding communication account is a terminal network drop of the first communication account;
the sending of the service request information to the network side according to the preset first sending mode includes: and sending network access request information to the network side according to the first sending mode.
3. The method according to claim 2, wherein the determining whether the first terminal is in a scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending method includes:
judging whether the first terminal is in a switching state or not;
and if the first terminal is not in the switching state, sending service request information to the network side according to the first sending mode.
4. The method of claim 3, wherein the determining whether the first terminal is in a handover state comprises:
and judging whether the cell where the first terminal is located changes within a preset time period or not, or judging whether the moving distance of the first terminal within the preset first time period is greater than a preset distance range or not.
5. The method according to claim 2, wherein the determining whether the first terminal is in a scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending method further comprises:
judging whether the first terminal is in a scheduled stop state or not;
if the first terminal is not in the plan stop state, outputting prompt information, wherein the prompt information is used for requesting and confirming whether business recovery is requested or not;
and if receiving the indication information of recovering the service, sending the service request information to the network side according to the first sending mode.
6. The method according to claim 1, wherein after the determining whether the first terminal is in the scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending method, the method further comprises:
and receiving the service response information sent by the network side, and stopping sending the service request information according to the first sending mode.
7. The method of claim 1, wherein the determining whether the first terminal is in a scheduled stop state, and if the first terminal is not in the scheduled stop state, sending the service request information to the network side according to a preset first sending method includes:
judging whether the first terminal is in a scheduled stop state or not;
if the first terminal is not in a planned stop state, sending service request information to the network side according to a second sending mode, wherein the second sending mode is used for allowing the network side equipment to allow the communication service initiated by the first terminal and send service response information to the first terminal when the network side equipment does not receive the service request information sent by the second terminal, and a communication account corresponding to the second terminal is the first communication account;
and if the service response information sent by the network side is not received in a preset second time period, sending service request information to the network side according to the first sending mode.
8. The method of claim 1, wherein the sending the service request information according to the first sending method comprises:
and sending the service request information according to a preset sending frequency, sending period or sending time interval change rule.
9. A terminal, characterized in that the terminal comprises at least: a memory, a communication bus, and a processor, wherein:
the memory is used for storing an information processing program;
the communication bus is used for realizing connection communication between the processor and the memory;
the processor is used for executing the information processing program stored in the memory so as to realize the following steps:
receiving service stop indication information, wherein the service stop indication information is sent to a first terminal by a network side after receiving an attack signaling sent by an illegal second terminal, a communication account corresponding to the terminal is a first communication account, and the service stop indication information is used for indicating to suspend the communication service of the terminal of which the corresponding communication account is the first communication account;
judging whether the terminal is in a scheduled stop state, if not, sending service request information to the network side according to a preset first sending mode;
wherein, the scheduled stop state is a state in which the terminal expects to receive the service stop indication information; the first sending method is used for enabling the network side to forbid the communication service initiated by the terminal of the corresponding communication account as the first communication account when receiving the service request information sent according to the first sending method.
10. A computer-readable storage medium, characterized in that an information processing program is stored thereon, which when executed by a processor implements the steps of the information processing method according to any one of claims 1 to 8.
CN201810270200.7A 2018-03-29 2018-03-29 Information processing method, terminal and computer readable storage medium Active CN108668282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810270200.7A CN108668282B (en) 2018-03-29 2018-03-29 Information processing method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810270200.7A CN108668282B (en) 2018-03-29 2018-03-29 Information processing method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108668282A CN108668282A (en) 2018-10-16
CN108668282B true CN108668282B (en) 2021-01-15

Family

ID=63782646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810270200.7A Active CN108668282B (en) 2018-03-29 2018-03-29 Information processing method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108668282B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636547B (en) * 2019-09-27 2022-03-22 腾讯科技(深圳)有限公司 Terminal execution method, corresponding terminal and computer readable storage medium
CN116232643B (en) * 2022-12-12 2024-08-02 海南视联通信技术有限公司 Terminal control method, device, electronic equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857916A (en) * 2012-08-23 2013-01-02 中国人民解放军信息工程大学 Method and system for detecting and managing mobile terminal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100703291B1 (en) * 2006-02-15 2007-04-03 삼성전자주식회사 Notification method according to communication service switching in mobile communication terminal
KR100830866B1 (en) * 2006-09-25 2008-05-21 삼성전자주식회사 Method and device for preventing illegal access using prohibition key in electronic devices
CN101841812B (en) * 2009-03-18 2012-11-07 华为终端有限公司 Terminal legality verifying method and device and communication system
US8302198B2 (en) * 2010-01-28 2012-10-30 Tenable Network Security, Inc. System and method for enabling remote registry service security audits
CN103312676B (en) * 2012-03-15 2017-06-20 宇龙计算机通信科技(深圳)有限公司 Terminal, server and terminal safety management method
CN103118360B (en) * 2012-12-21 2015-08-19 成都科来软件有限公司 A kind of system blocking mobile radio terminal
US9363090B1 (en) * 2013-09-25 2016-06-07 Sprint Communications Company L.P. Authorization of communication links between end user devices using intermediary nodes
CN104579831A (en) * 2014-12-26 2015-04-29 北京网秦天下科技有限公司 Data transmission processing method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102857916A (en) * 2012-08-23 2013-01-02 中国人民解放军信息工程大学 Method and system for detecting and managing mobile terminal

Also Published As

Publication number Publication date
CN108668282A (en) 2018-10-16

Similar Documents

Publication Publication Date Title
CN109151169B (en) Camera authority management method, mobile terminal and computer readable storage medium
CN111278106A (en) Paging indication method, paging method, terminal and network side device
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN107124718B (en) Data transmission method, mobile terminal and storage medium
CN109068167B (en) Screen recording interaction method, mobile terminal, wearable device and storage medium
CN108536383B (en) Game control method, game control equipment and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN108075899B (en) An authentication method, mobile terminal and computer-readable storage medium
CN110225462B (en) Method, system and device for preventing network congestion
CN110677851B (en) Terminal network access method and network access equipment access method
CN107172605B (en) Emergency call method, mobile terminal and computer readable storage medium
CN107622213A (en) A kind of data access method, terminal and computer-readable recording medium
CN109618377B (en) Call processing method, terminal, network side device and computer readable storage medium
CN112464208A (en) File access method, mobile terminal and computer readable storage medium
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN107682860B (en) Redirection control method, device, network equipment and mobile terminal
CN108668282B (en) Information processing method, terminal and computer readable storage medium
CN108108054B (en) Method, apparatus and computer-readable storage medium for predicting user sliding operation
CN109976644A (en) Using the implementation method and device of prompt operation, mobile terminal and storage medium
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
CN109818967B (en) Notification method, server, mobile terminal and computer readable storage medium
CN108400994B (en) User authentication method, mobile terminal, server, and computer-readable storage medium
CN113127820A (en) Terminal locking and unlocking method, MDM client and readable storage medium
CN108183833B (en) Response processing method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant