CN101984692B - A kind of method and device for preventing Malware from sending data - Google Patents
A kind of method and device for preventing Malware from sending data Download PDFInfo
- Publication number
- CN101984692B CN101984692B CN201010546405.7A CN201010546405A CN101984692B CN 101984692 B CN101984692 B CN 101984692B CN 201010546405 A CN201010546405 A CN 201010546405A CN 101984692 B CN101984692 B CN 101984692B
- Authority
- CN
- China
- Prior art keywords
- process information
- data
- sending
- sending request
- data sending
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 161
- 230000005540 biological transmission Effects 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 230000001939 inductive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method for preventing Malware from sending data, including:Data interception sends request, and obtains the corresponding progress information of data sending request;The progress information of acquisition is matched with the progress information in the list data storehouse pre-set, according to matching result, the data sending request to interception send accordingly or discard processing.The present invention discloses a kind of device for preventing Malware from sending data, using the method and device of the present invention, Malware can be prevented to send data on backstage, and then expenses can be reduced, meet Consumer's Experience.
Description
Technical Field
The present invention relates to mobile terminal technologies, and in particular, to a method and an apparatus for preventing malicious software from sending data.
Background
With the development of science and technology, the use population of intelligent mobile terminals such as mobile phones is gradually civilized, the smart phones are no longer the special love of business people, and the user population scale is rapidly expanded. The smart phone has a remarkable characteristic that application software can be flexibly installed, and the characteristic attracts attention of some malicious software along with the continuous expansion of user groups, so that the malicious software which only appears on a computer before appears on the smart phone is started to appear on the smart phone. Since the handset involves a charge problem, namely: there is an economic benefit so malware on smartphones is more harmful than on computers. Generally, the malicious software is bound in some popular normal software, the normal software is used for inducing a user to download, and when the user downloads and installs the software package bound with the malicious software, the malicious software can be operated in a background in a stealing mode.
There are many types of malware behavior, one of which is sending short messages in the background, such as: the short message interface provided by the smart phone is used for ordering some consumption services and the like, or the short message is sent out continuously, the operations cause a great amount of loss of the telephone charge of the user, the loss is not easy to be discovered, some terminals can be discovered only by carefully inquiring the list at the operator, and the economic loss is generally difficult to recover. Therefore, how to find and preferably prevent the behavior of such malicious software in advance in time is particularly important, and thus the loss of telephone charge is prevented, which becomes an urgent need of users.
At present, no technical scheme for preventing malicious software from sending short messages exists.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and an apparatus for preventing malicious software from sending data, which can prevent the malicious software from sending data in the background and reduce the cost loss.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a method for preventing malicious software from sending data, which comprises the following steps:
intercepting a data sending request and acquiring process information corresponding to the data sending request;
and matching the acquired process information with the process information in a preset list database, and carrying out corresponding sending or discarding processing on the intercepted data sending request according to a matching result.
In the above scheme, the performing, according to the matching result, corresponding sending or discarding processing on the intercepted data sending request includes:
when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent;
when the acquired process information is matched with the process information in the blacklist, discarding the intercepted data sending request;
and when the acquired process information cannot be matched with the process information in the list database, displaying relevant information including data content and the acquired process information to a user.
In the above scheme, the method further comprises:
and after the relevant information containing the data content and the acquired process information is displayed to the user, corresponding processing is carried out according to the received command of the user.
In the above scheme, the performing corresponding processing according to the received user command includes:
if the received command is a command which is approved to be sent, sending the intercepted data sending request, and adding the acquired process information into the process information of the white list;
and if the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
In the above scheme, the method further comprises: and saving the sending record in a record database.
In the above scheme, the method further comprises: and saving the discarded data sending request to a record database.
The invention also provides a device for preventing malicious software from sending data, which comprises: the system comprises a data interception module, a list judgment module and a processing module; wherein,
the data interception module is used for intercepting a data sending request, acquiring process information corresponding to the data sending request and sending the acquired process information to the list judgment module;
the list judging module is used for matching the acquired process information with the process information in a preset list database after receiving the acquired process information sent by the data intercepting module and sending a matching result to the processing module;
and the processing module is used for carrying out corresponding sending or discarding processing on the intercepted data sending request according to the matching result after receiving the matching result sent by the list judging module.
In the foregoing scheme, the processing module is specifically configured to: and when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information comprising the data content and the acquired process information is displayed to a user.
In the above scheme, the processing module is further configured to send the intercepted data sending request after the received command is a command that agrees to be sent, and add the obtained process information to the process information of the white list; and after the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
In the above scheme, the apparatus further comprises: the recording module is used for storing the sending records into the record database after receiving the sending records sent by the processing module, or storing the discarded data sending requests into the record database after receiving the discarded data sending requests sent by the processing module and marking the discarded data sending requests as intercepted;
the processing module is further configured to send a sending record to the recording module after sending the intercepted data sending request, or send a discarded data sending request to the recording module after discarding the intercepted data sending request.
According to the scheme for preventing the malicious software from sending the data, the data sending request is intercepted, the corresponding process information is obtained, the obtained process information is matched with the process information in the preset list database, and the intercepted data sending request is correspondingly sent or discarded according to the matching result, so that the malicious software can be prevented from sending the data in the background, further the cost loss can be reduced, and the user experience can be met.
In addition, the sending records can be stored in the record database, so that the sending history records can be conveniently inquired by a user, and the user experience is further improved.
Drawings
FIG. 1 is a flowchart illustrating a method for preventing malicious software from sending data according to the present invention;
FIG. 2 is a flowchart illustrating a method for preventing malicious software from sending a short message according to an embodiment;
FIG. 3 is a schematic structural diagram of an apparatus for preventing malicious software from sending data according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The method for preventing malicious software from sending data, as shown in fig. 1, includes the following steps:
step 101: intercepting a data sending request and acquiring process information corresponding to the data sending request;
here, the data sending request may be a short message sending request, a multimedia message sending request, or other data packet sending requests;
if the intercepted data transmission request is a short message transmission request, the intercepted short message transmission request comprises short message content, a destination address of the short message, transmission time and the like;
in actual use, a data interception module of the intelligent mobile terminal needs to be arranged below a short message interface of the intelligent mobile terminal to intercept each short message sending request;
when application software such as malicious software or normal short message software sends a short message, a short message interface of an intelligent mobile terminal such as a mobile phone needs to be called, at the moment, process information for calling the short message interface of the mobile phone is stored in the process of the intelligent mobile phone, and therefore after the short message sending request is intercepted, process information corresponding to the short message sending request can be obtained from the process information stored in the process of the intelligent mobile phone;
if the intercepted data sending request is a multimedia message sending request, the intercepted multimedia message sending request comprises multimedia message content, a destination address of the multimedia message, sending time and the like;
if the intercepted data transmission request is a data packet transmission request, the intercepted data transmission request comprises a destination website of the data packet, the content of the data packet, transmission time and the like;
similarly, when the multimedia message or the data packet is sent, the corresponding interface of the smart phone needs to be called, at this time, the process information for calling the corresponding interface of the smart phone is stored in the process of the smart phone, so that after the data sending request is intercepted, the process information corresponding to the data sending request can be obtained from the process information stored in the process of the smart phone.
Step 102: matching the acquired process information with the process information in a preset list database, and carrying out corresponding sending or discarding processing on the intercepted data sending request according to a matching result;
here, the list database includes process information of a white list and process information of a black list; the process information of the white list is process information which can send data outwards, and the process information of the black list is process information which can not send data outwards;
the corresponding sending or discarding processing is performed on the intercepted data sending request according to the matching result, and specifically includes:
when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information containing the data content and the acquired process information is displayed to a user;
wherein, the data content can be short message content, multimedia message content or data packet content; the related information can also comprise a destination address, sending time or a destination website of a data packet, sending time and the like of the short message or the multimedia message; after relevant information containing data content and the acquired process information is displayed to a user, corresponding processing is carried out according to a received command of the user, specifically, if the received command is a command which is approved to be sent, the intercepted data sending request is sent, and if the received command is a command which is not approved to be sent, the intercepted data sending request is discarded; at this time, further, the acquired process information may be added to a list database, specifically, if the data transmission request is sent, the acquired process information is added to the process information of a white list, and if the intercepted data transmission request is discarded, the acquired process information is added to the process information of a black list;
when the intercepted data transmission request is a short message transmission request, the sending of the intercepted data transmission request specifically comprises:
calling a short message module of the mobile terminal, and sending a short message by the short message module; the specific processing flow of the short message module for sending the short message is completely the same as the existing processing flow;
after transmitting the intercepted data transmission request, the method may further include:
storing the sending record in a record database so that a user can inquire the sending history record afterwards; further, the discarded data sending request can also be stored in a record database and marked as intercepted; the transmission history record contains data content, corresponding process information and other contents.
Taking the short message as an example, as shown in fig. 2, the method for preventing malicious software from sending the short message in the embodiment includes the following steps:
step 201: intercepting a short message sending request and acquiring process information corresponding to the short message sending request;
here, the intercepted short message sending request includes the content of the short message, the destination address of the short message, the sending time, and the like.
Step 202: judging whether the acquired process information can be matched with the process information in a preset list database, wherein the list database comprises the process information of a white list and the process information of a black list, executing a step 203a if the acquired process information is matched with the process information in the white list, executing a step 203b if the acquired process information is matched with the process information in the black list, and executing a step 204 if the acquired process information cannot be matched with the process information in the list database.
Step 203 a: and sending the intercepted short message sending request, and then executing step 207.
Step 203 b: the intercepted sms message transmission request is discarded, and then step 208 is executed.
Step 204: displaying relevant information containing short message content and the acquired process information to a user, executing step 205 after receiving a command of agreeing to send, and executing step 206 after receiving a command of not agreeing to send;
here, the related information includes: the content of the short message, the acquired process information, the destination address of the short message, the sending time and the like.
Step 205: and sending the intercepted short message sending request, adding the acquired process information into the process information of the white list, and then executing step 207.
Step 206: discarding the intercepted short message sending request, adding the acquired process information to the process information of the blacklist, and then executing step 208.
Step 207: the transmission record is saved to the record database, after which step 209 is performed.
Step 208: the discarded intercepted sms message sending request is saved in the record database and marked as intercepted, and then step 209 is executed.
Step 209: the current processing flow is ended.
In order to implement the foregoing method, the present invention further provides an apparatus for preventing malware from sending data, where as shown in fig. 3, the apparatus includes: a data interception module 31, a list judgment module 32, and a processing module 33; wherein,
the data intercepting module 31 is configured to intercept a data sending request, acquire process information corresponding to the data sending request, and send the acquired process information to the list judging module 32;
the list judgment module 32 is configured to match the acquired process information with process information in a preset list database after receiving the acquired process information sent by the data interception module 31, and send a matching result to the processing module 33;
and the processing module 33 is configured to, after receiving the matching result sent by the list judging module 32, perform corresponding sending or discarding processing on the intercepted data sending request according to the matching result.
If the data interception module is used for intercepting the short messages, the data interception module 31 is arranged below a short message interface of the intelligent mobile terminal and intercepts each short message sending request.
The processing module 33 is specifically configured to:
and when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent, when the acquired process information is matched with the process information in the black list, the intercepted data sending request is discarded, and when the acquired process information cannot be matched with the process information in the list database, the relevant information comprising the data content and the acquired process information is displayed to a user.
The apparatus may further comprise: the recording module is used for storing the sending record into the record database after receiving the sending record sent by the processing module 33;
the processing module 33 is further configured to send a sending record to the recording module after sending the intercepted data sending request.
The processing module 33 is further configured to, after discarding the intercepted data sending request, send the discarded data sending request to the recording module;
and the recording module is further configured to, after receiving the discarded data sending request sent by the processing module 33, store the discarded data sending request into the recording database, and mark the discarded data sending request as intercepted.
The processing module 33 is further configured to send the intercepted data sending request after the received command is a command that agrees to be sent, and add the acquired process information to the process information of the white list; and after the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. that are within the spirit and principle of the present invention should be included in the present invention.
Claims (8)
1. A method for preventing malware from sending data, the method comprising:
intercepting a data sending request, and acquiring process information corresponding to the data sending request from process information stored in a process of the intelligent mobile terminal;
matching the acquired process information with the process information in a preset list database, and carrying out corresponding sending or discarding processing on the intercepted data sending request according to a matching result;
the corresponding sending or discarding process is carried out on the intercepted data sending request according to the matching result, and comprises the following steps: when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent; when the acquired process information is matched with the process information in the blacklist, discarding the intercepted data sending request; and when the acquired process information cannot be matched with the process information in the list database, displaying relevant information including data content and the acquired process information to a user.
2. The method of claim 1, further comprising:
and after the relevant information containing the data content and the acquired process information is displayed to the user, corresponding processing is carried out according to the received command of the user.
3. The method according to claim 2, wherein the corresponding processing according to the received user command is:
if the received command is a command which is approved to be sent, sending the intercepted data sending request, and adding the acquired process information into the process information of the white list;
and if the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
4. A method according to any one of claims 1 to 3, characterized in that the method further comprises:
and saving the sending record in a record database.
5. A method according to any one of claims 1 to 3, characterized in that the method further comprises:
and saving the discarded data sending request to a record database.
6. An apparatus for preventing malware from sending data, the apparatus comprising: the system comprises a data interception module, a list judgment module and a processing module; wherein,
the data interception module is used for intercepting a data sending request, acquiring process information corresponding to the data sending request from process information stored in a process of the intelligent mobile terminal, and sending the acquired process information to the list judgment module;
the list judging module is used for matching the acquired process information with the process information in a preset list database after receiving the acquired process information sent by the data intercepting module and sending a matching result to the processing module;
the processing module is used for carrying out corresponding sending or discarding processing on the intercepted data sending request according to the matching result after receiving the matching result sent by the list judging module; the method is specifically used for: when the acquired process information is matched with the process information in the white list, the intercepted data sending request is sent; when the acquired process information is matched with the process information in the blacklist, discarding the intercepted data sending request; and when the acquired process information cannot be matched with the process information in the list database, displaying relevant information including data content and the acquired process information to a user.
7. The apparatus according to claim 6, wherein the processing module is further configured to send the intercepted data sending request after the received command is a command that is approved to be sent, and add the obtained process information to process information of a white list; and after the received command is a command which is not approved to be sent, discarding the intercepted data sending request, and adding the acquired process information into the process information of the blacklist.
8. The apparatus of claim 6 or 7, further comprising: the recording module is used for storing the sending records into the record database after receiving the sending records sent by the processing module, or storing the discarded data sending requests into the record database after receiving the discarded data sending requests sent by the processing module and marking the discarded data sending requests as intercepted;
the processing module is further configured to send a sending record to the recording module after sending the intercepted data sending request, or send a discarded data sending request to the recording module after discarding the intercepted data sending request.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010546405.7A CN101984692B (en) | 2010-11-15 | 2010-11-15 | A kind of method and device for preventing Malware from sending data |
PCT/CN2011/071428 WO2012065381A1 (en) | 2010-11-15 | 2011-03-01 | Method and apparatus for preventing malicious softwares from transmitting data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010546405.7A CN101984692B (en) | 2010-11-15 | 2010-11-15 | A kind of method and device for preventing Malware from sending data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101984692A CN101984692A (en) | 2011-03-09 |
CN101984692B true CN101984692B (en) | 2017-07-28 |
Family
ID=43641862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010546405.7A Expired - Fee Related CN101984692B (en) | 2010-11-15 | 2010-11-15 | A kind of method and device for preventing Malware from sending data |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101984692B (en) |
WO (1) | WO2012065381A1 (en) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102209326B (en) * | 2011-05-20 | 2013-09-11 | 北京中研瑞丰信息技术研究所(有限合伙) | Malicious behavior detection method and system based on smartphone radio interface layer |
CN102547713A (en) * | 2011-12-21 | 2012-07-04 | 成都三零瑞通移动通信有限公司 | Anti-activating method aiming at X undercover software |
CN103218552B (en) * | 2012-01-19 | 2016-01-20 | 华为终端有限公司 | Based on method for managing security and the device of user behavior |
CN103220658A (en) * | 2012-01-19 | 2013-07-24 | 中国移动通信集团广东有限公司 | Fee deduction preventing method and method, device and system of fee deduction preventing detection |
CN102629909B (en) * | 2012-03-30 | 2015-09-16 | 北京奇虎科技有限公司 | Based on flow statistical method and the system of process |
CN102769703A (en) * | 2012-07-17 | 2012-11-07 | 青岛海信移动通信技术股份有限公司 | Mobile phone terminal and firewall monitoring method |
CN103874036A (en) * | 2012-12-13 | 2014-06-18 | 李卓桓 | Mobile phone message authentication method and apparatus |
CN103354540B (en) * | 2012-12-21 | 2016-05-18 | 北京安天电子设备有限公司 | A kind of malicious code detecting method of Android system and device |
CN103067923A (en) * | 2013-01-18 | 2013-04-24 | 浙江长天信息技术有限公司 | Secret short message detecting and alarming method |
CN104066090B (en) * | 2013-03-21 | 2018-12-14 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN103412793A (en) * | 2013-07-29 | 2013-11-27 | 北京奇虎科技有限公司 | Method, device and system for optimizing system resources |
CN104331406A (en) * | 2013-12-20 | 2015-02-04 | 乐视网信息技术(北京)股份有限公司 | Database capacity control method and database capacity control device |
CN104125546B (en) * | 2014-04-03 | 2018-05-04 | 上海粱江通信系统股份有限公司 | Short message subscribing service type concentrate tube prosecutor method and system |
CN104270763A (en) * | 2014-10-27 | 2015-01-07 | 中国建设银行股份有限公司 | Message protection method and system |
CN104639749B (en) * | 2015-02-04 | 2018-01-23 | 广东欧珀移动通信有限公司 | Short message sending control method and device |
CN106068014A (en) * | 2016-06-20 | 2016-11-02 | 广东欧珀移动通信有限公司 | Note monitor method and device |
CN106446675A (en) * | 2016-08-30 | 2017-02-22 | 维沃移动通信有限公司 | Short message processing method and mobile terminal |
CN108229151A (en) * | 2016-12-09 | 2018-06-29 | 武汉安天信息技术有限责任公司 | A kind of anti-short message applied to mobile terminal kidnaps method and device |
CN106650447A (en) * | 2016-12-28 | 2017-05-10 | 北京安天电子设备有限公司 | Method and system for preventing PowerShell malicious code execution |
CN106778276B (en) * | 2016-12-29 | 2020-06-19 | 北京安天网络安全技术有限公司 | Method and system for detecting malicious codes of entity-free files |
CN107592314A (en) * | 2017-09-20 | 2018-01-16 | 郑州云海信息技术有限公司 | A kind of order line authority control method and device |
CN112084502B (en) * | 2020-09-18 | 2024-06-21 | 珠海豹趣科技有限公司 | Software identification method and device, electronic equipment and storage medium |
CN112615961A (en) * | 2020-12-25 | 2021-04-06 | 珠海格力电器股份有限公司 | Method and device for processing short message sending request |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137100A (en) * | 2007-09-30 | 2008-03-05 | 中兴通讯股份有限公司 | Method of implementing handset multimedia message firewall |
US7640589B1 (en) * | 2009-06-19 | 2009-12-29 | Kaspersky Lab, Zao | Detection and minimization of false positives in anti-malware processing |
CN101771686A (en) * | 2009-12-31 | 2010-07-07 | 卓望数码技术(深圳)有限公司 | Communication method and network adapter |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1889423A (en) * | 2006-07-25 | 2007-01-03 | 华为技术有限公司 | Method for filtering short message and mobile terminal |
WO2010010060A2 (en) * | 2008-07-21 | 2010-01-28 | F-Secure Oyj | Telephony fraud prevention |
CN102088679A (en) * | 2009-12-08 | 2011-06-08 | 北京网秦天下科技有限公司 | Working method and system of intelligent short message firewall of self-learning mobile terminal |
-
2010
- 2010-11-15 CN CN201010546405.7A patent/CN101984692B/en not_active Expired - Fee Related
-
2011
- 2011-03-01 WO PCT/CN2011/071428 patent/WO2012065381A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137100A (en) * | 2007-09-30 | 2008-03-05 | 中兴通讯股份有限公司 | Method of implementing handset multimedia message firewall |
US7640589B1 (en) * | 2009-06-19 | 2009-12-29 | Kaspersky Lab, Zao | Detection and minimization of false positives in anti-malware processing |
CN101771686A (en) * | 2009-12-31 | 2010-07-07 | 卓望数码技术(深圳)有限公司 | Communication method and network adapter |
Also Published As
Publication number | Publication date |
---|---|
WO2012065381A1 (en) | 2012-05-24 |
CN101984692A (en) | 2011-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101984692B (en) | A kind of method and device for preventing Malware from sending data | |
US8204484B2 (en) | System and method for managing missed calls and unread messages | |
US10708726B2 (en) | Short message processing method and apparatus, and electronic device | |
CN101651731A (en) | Method and system for managing address book and mobile terminal | |
CN105262878B (en) | The processing method and mobile terminal of call automatic recording | |
CN103345696A (en) | Display method, device and mobile terminal of pushing information | |
CN105472581A (en) | Temporary address book setting method and apparatus | |
CN105472090A (en) | Address list contact person merging method and device | |
CN101610314B (en) | Communication event processing method and device thereof | |
CN104053132B (en) | A kind of method and device of information number identification | |
CN104113620A (en) | Contact list updating method, updating device and user terminal | |
CN104683454A (en) | Data interaction method and device | |
CN103024134B (en) | A kind of for the information processing method of communicating terminal, device and terminal | |
CN104394280B (en) | The menu option display methods and device of the communication information | |
CN106559766A (en) | Reservation type calling, answering method and device and server based on mobile phone terminal | |
CN103841172A (en) | Application download operation statistic method and device based on user terminal identification comparison | |
CN104796519A (en) | Terminal | |
CN100407811C (en) | Short message limitation storage realizing method and system | |
CN102655690A (en) | Information notifying method and device and electronic equipment | |
CN104506599A (en) | Information processing method, server and terminal | |
CN103338315A (en) | Information processing method and device | |
CN104506413A (en) | Information processing method, server and terminal | |
CN103841508A (en) | User information obtaining method and information aggregation platform | |
CN114025356A (en) | Malicious short message verification code identification method, related device and computer storage medium | |
CN104780252A (en) | Contact list management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170728 Termination date: 20201115 |
|
CF01 | Termination of patent right due to non-payment of annual fee |