[go: up one dir, main page]

WO2015032326A1 - Information processing method, system and terminal device - Google Patents

Information processing method, system and terminal device Download PDF

Info

Publication number
WO2015032326A1
WO2015032326A1 PCT/CN2014/085846 CN2014085846W WO2015032326A1 WO 2015032326 A1 WO2015032326 A1 WO 2015032326A1 CN 2014085846 W CN2014085846 W CN 2014085846W WO 2015032326 A1 WO2015032326 A1 WO 2015032326A1
Authority
WO
WIPO (PCT)
Prior art keywords
sender
information
malicious message
terminal device
party
Prior art date
Application number
PCT/CN2014/085846
Other languages
French (fr)
Inventor
Rong Chen
Meng Chen
Dechun Li
Liang Dong
Yanping TANG
Zengxin SUN
Yuanbin CHEN
Feifei LIU
Original Assignee
Tencent Technology (Shenzhen) Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology (Shenzhen) Company Limited filed Critical Tencent Technology (Shenzhen) Company Limited
Publication of WO2015032326A1 publication Critical patent/WO2015032326A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks

Definitions

  • the disclosure relates to the field of Internet technology, and particularly, to an information processing method, a system and a terminal device.
  • malicious message detection software is installed to terminal devices for detecting malicious messages.
  • the malicious message detection software detects the message and determines whether the message is matched with a message in an information characteristic library of the malicious message detection software. If yes, the message that has been received is a malicious message.
  • the malicious message detection software in the existing technology can prevent the malicious activities to some extent, but for the terminal devices that have not been installed with the malicious message detection software, the malicious activities will not able to be effectively prevented.
  • Embodiments of the present invention provide an information processing method, which can solve the problem that malicious activity cannot be effectively prevented for terminal devices which have not been installed with the malicious message detection software.
  • the malicious activities will not able to be effectively prevented.
  • One embodiment of the invention provides an information processing method, the method comprising:
  • Another embodiment of the invention provides a terminal device, comprising:
  • an information obtaining unit configured to determine a sender of a malicious message and obtain information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device;
  • an information transmitting unit configured to convert the information of the sender of the malicious message into corresponding audio data, and send out the audio data by the way of playing.
  • Yet another embodiment of the invention provides an information processing system, comprising:
  • the first party and/or the second party configured to determine a sender of a malicious message, and obtain information of the sender of the malicious message when the malicious message is determined to exist in communication messages between two terminal devices, and convert the information of the sender of the malicious message into corresponding audio data, and send the audio data to a third party by the way of playing.
  • the beneficial effects of the present disclosure are: in the embodiments of the present disclosure, when the first party and/or the second party detect (s) that there is a malicious message in communication messages of the first party or the second party, the first party and/or the second party can determine the sender of the malicious message and obtain information of the sender of the malicious message, and can convert the information of the sender of the malicious message into audio date, and then transmit the audio data to the third party by the way of playing.
  • the third party which has not been installed with the malicious information detection software can also obtain the information of the sender of the malicious message at any time, thus effectively preventing malicious activities and improving the security of network.
  • the audio data can be transmitted by way of playing, but not depend on complicated cable connections or Bluetooth matching connections, which is easy for implementations and achievement.
  • FIG. 1 is a network structure diagram of an information processing system according to one embodiment of the invention.
  • FIG. 2 is a flowchart of an information processing method according to one embodiment of the present invention.
  • FIG. 3 is a structure diagram of a terminal device according to one embodiment of the invention.
  • FIG. 4 is a structure diagram of a terminal device according to another embodiment of the invention.
  • FIG. 1 it is a network structure diagram of an information processing system 00 according to one embodiment of the invention.
  • the information processing system 00 includes a first party 1 and a second party 2.
  • the information processing system 00 further includes at least one third party 3 and a server 4.
  • the first party 1 can be any terminal device that includes an audio output unit 11
  • the second party 2 can be any terminal device that includes an audio output unit 21
  • the at least one third party 3 can be any terminal device that includes an audio input unit 31.
  • the terminal device includes, but not limited to: a mobile phone, a tablet PC (personal computer), alaptop, etc.
  • the audio input unit includes, but not limited to: a microphone.
  • the audio output unit includes, but not limited to: a speaker.
  • the server 4 can be a single server, and can also be a server group consisting of several function servers.
  • the first party 1 and/or the second party 2 when the first party 1 and/or the second party 2 detect (s) that there is a malicious message in communication messages during a communication between the first party 1 and the second party 2, the first party 1 and/or the second party 2 can determine a sender of the malicious message and obtain information of the sender of the malicious message. The first party 1 and/or the second party 2 can convert the information of the sender of the malicious message into audio date, and send out the audio data to the at least one third party 3 by the way of playing.
  • a malicious message is detected to exist in the communication messages, that is, the first party 1 and/or the second party 2 can determines that the malicious message exists in communication messages.
  • the particular instruction is an instruction that can be generated when the server 4 detects that the information of the first party 1 and/or the second party 2 is matched with the information prestored in a blacklist database.
  • the malicious message is detected in the communication messages of the first party 1 and/or the second party 2
  • the first party 1 and/or the second party 2 can determine themselves/itself whether both or either of the first party 1and the second party 2 are/is the sender (s) of the malicious message or not.
  • the information of the sender of the malicious message can be formed into an information structure (exemplary, the information structure can be: “a unique identifier of the sender of the malicious message” “+” “the level of malicious” “+” “transmission time of the malicious message” ) by the first party 1 and/or the second party 2 according to a preset rule.
  • the information structure is converted into corresponding audio data within a specific frequency range, in detail, the information structure is converted into corresponding data that is represented by the scale by the first party 1 and/or the second party 2, and each data that is represented by the scale is converted to generate corresponding audio data within a specific frequency range (optional, 5000 ⁇ 10000Hz), and then the audio data is transmitted to the at least one third party 3 through the audio output unit.
  • the data that is represented by the scale can be quaternary data, seven hexadecimal data, octal data, decimal data, ten binary data, or hexadecimal data.
  • the at least one third party 3 can receive, through the audio input unit, the audio data sent by the first party 1 and/or the second party 2, and convert the audio data into corresponding data that is represented by the scale, and then convert the data that is represented by the scale into the information of the sender of the malicious message.
  • the at least one third party 3 can send the information of the sender of the malicious message to the user corresponding to the at least one third party 3, and the information of the sender of the malicious message is stored into the preset blacklist database.
  • the way of playing includes: radio broadcasting (namely, no specified receiver and all being broadcasted), multicast (multiple specified receivers) or unicast (one specified receiver) .
  • radio broadcasting namely, no specified receiver and all being broadcasted
  • multicast multiple specified receivers
  • unicast one specified receiver
  • a user A communicates with a user B using an instant messaging (IM) software (the information processing method of the embodiment can be implemented by the IM software, and the information processing method can be integrated into the IM software in the form of software), when the IM software detects a malicious message sent by the user A, then the IM software of the user A is forced to close, thereby terminating current communication.
  • IM instant messaging
  • the application scenario includes a first party, a second party and a third party.
  • Each of the first party and the second party is equipped with a speaker, and the third party is equipped with a microphone.
  • the first party and the second party still are installed with malicious information detection software, but the third party fails to install the malicious information detection software.
  • the malicious information detection software can detect that there is a malicious message in communication messages, the first party and the second party figure out the sender of the malicious message, and then obtain information of the sender of the malicious message (the information of the sender includes an unique identifier of the sender, a level of malicious, types of malicious activities, a transmission time of the malicious message, etc. ) .
  • the first party and the second party can convert the information of the sender of the malicious message into corresponding audio data (such as audio two-dimension codes) , and transmit the audio two-dimension codes to the third party through the speaker; the third party can receive the audio two-dimension codes through the microphone, and convert the audio two-dimension codes into the corresponding information of the sender of the malicious message.
  • the third party can provide the information of the sender of the malicious message to a user of the third party, and enable the information of the sender of the malicious message to be stored into the preset blacklist database.
  • the information of the sender of the malicious message is transmitted to the third party in the form of the audio two-dimension codes, so that the third party that fails to install the malicious information detection software can obtain the information of the sender of the malicious message at any time, thereby effectively preventing malicious activities and improving the security of network.
  • each of the first party, the second party and the third party of the present embodiment refers to a terminal; “the first, the second, and the third” is used here just for the sake of expression and description, and used to distinguish different terminals, but does not mean that the present disclosure must have a first party, a second party and a third party corresponding to “the first, the second, and the third” in the embodiments.
  • the system, the first party, the second party and third party in FIG. 1 only show parts related to the embodiments of the disclosure.
  • the system, the first party, the second party and the third party as shown in FIG. 1 are just one embodiment, whose configurations and structures are not specifically limited.
  • the system, the first party, the second party and the third party in FIG. 1 can include more parts or fewer parts than that as shown in the FIG. 1, or combinations of some parts, or arrangements of different parts.
  • each of the first party, the second party and the third party may include an audio input device and an audio output device.
  • each process of the information processing method of the embodiment can executed by the first party 1 and/or the second party 2 of the information processing system shown in FIG. 1.
  • the information processing method at least includes steps as follows.
  • step S201 a terminal device determining a sender of a malicious message and obtaining information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device.
  • the terminal device when the terminal device receives the communication messages, the terminal device can determine whether there is a message matched with a message prestored in a malicious message feature library; if yes, the terminal device determines that the malicious message exists in the communication message.
  • the malicious message feature library may include: behavior characteristics, content characteristics, etc.
  • the behavior characteristics may include: frequencies of message transmission, amounts of message transmission, success rates of message transmission, etc.
  • the content characteristics may include: phishing sites, blacklist accounts, etc.
  • the terminal device can determine that the communication messages include the malicious message when the message received by the terminal device meets at least one condition as follow: the frequency of message transmission being greater than a first threshold value, the amount of message transmission being greater than a second threshold, the success rate of message transmission being greater than a third threshold, the message received by the terminal device including phishing sites, the message including blacklist accounts,
  • the terminal device determining that malicious massage exists in the communication messages further includes:
  • the terminal device receives a particular instruction sent by a server, a malicious message is detected in the communication messages by the terminal device, wherein, the particular instruction is an instruction that is generated when the server detects that the information of the first party and/or the second party is matched with the information prestored in a blacklist database.
  • the server can obtain historical behavior information of a user, and divide the historical behavior information into one or more than one documents related to the behavior information of the user based on a preset rule.
  • the server can obtain corresponding analysis model by use of statistical learning theory according to the one or more than one documents, and analyze or predict behavior information of the user according to the analysis model, and add the users who have malicious behaviors or potential malicious behaviors to the blacklist database.
  • the historical behavior information of the user may include but not limited to at least one of at follow: login IP addresses, forwarding information, original information that has been published, information that has been commented, etc.
  • the server When the server detects that the information of the terminal device is matched with the information prestored in the blacklist database, the server can send a particular instruction to a sender and/or a receiver during a communication, to prompt the user that the malicious messages exist in the communication messages.
  • a malicious message feature library can be prestored in the server in the present embodiment.
  • the server detects that there is the same message in the communication messages as the message in the malicious message feature library, that is,a malicious message exists in the communication messages, the server can transmit the particular instruction to both sides of the communication, prompting the user that the malicious messages exist in the communication messages.
  • the malicious message feature database can be updated in real time by the server.
  • the terminal device when the terminal device receives the particular instruction sent by the server, then the terminal device can determine the sender of the malicious message, and obtain the information of the sender of malicious message.
  • the malicious message when the malicious message is detected in the communication messages of the first party and/or the second party, the first party and/or the second party can determine themselves/itself whether both or either of the first party and the second party are/is the sender of the malicious message or not. If yes, the current communication is terminated, and the information of the sender of the malicious message is obtained; if no,a user is prompted that the first party or the second party (namely, the opposite side of the first party 1) is the sender of the malicious message, the information of the sender of the malicious message is obtained and stored in the preset blacklist database.
  • the sender of the malicious message can be the first party or the second party.
  • the information of the sender of the malicious message includes but not limited to: a unique identifier of the sender of the malicious message.
  • the information of the sender of the malicious message further includes but not limited to at least one of as follow: levels of the malicious, types of malicious activities (such as,fraud information, viruses information, junk information), and transmission time of the malicious message, etc.
  • the information of the sender of the malicious message is stored in a preset blacklist database, so that the message in the communication messages can be first matched with the message prestored in the blacklist database at the nest communication, thereby quickly determining whether there is a malicious message in the communication messages or not.
  • step S202 the terminal device converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data to the third party by the way of playing.
  • the information of the sender of the malicious message can be formed into an information structure according to a preset rule by the terminal device, exemplary, the information structure can be: “a unique identifier of the sender of the malicious message” “+” “the level of malicious” “+” “transmission time of the malicious message” .
  • the terminal device can convert the information structure into corresponding data that is represented by the scale, and enable each data that is represented by the scale to generate corresponding audio data within a specific frequency range, and transmit out the audio data to the third party by the way of playing.
  • the data that is represented by the scale can be quaternary data, seven hexadecimal data, octal data, decimal data, ten binary data, or hexadecimal data.
  • the way of converting the information structure into the data that is represented by the scale can effectively shorten the codes and be convenient for data transmission.
  • the third party can be a terminal device outside two parties (namely, the first party and the second party) .
  • the specific frequency range is preferable 5000 ⁇ 10000 Hz,namely, the audio two-dimension code.
  • the way of playing includes: radio broadcasting, multicast or unicast.
  • the third party analyzes the audio data by using the Fourier transform to converts the audio data into corresponding data that is represented by the scale, and further converts the data that is represented by the scale into the information of the sender of the malicious message.
  • the third party can store the information of the sender of the malicious message into the preset blacklist database, and prompt the information of the sender of the malicious message to the user of the third party, thereby achieving the goal of effectively guarding against malicious activities.
  • the third party that is not equipped with malicious message detection software can also obtain the information of the sender of the malicious message, which can effectively prevent malicious activities and improve the security of network.
  • the audio data (preferably, the audio two-dimension code) can be transmitted by way of playing, but do not need to depend on complicated cable connections or Bluetooth matching connections, which is easy for implementations and achievement.
  • FIG. 3 is a structure diagram of a terminal device according to one embodiment of the invention.
  • the terminal device can be applied to the information processing system as shown in FIG. 1, and correspond to the first party and/or the second party of the information processing system as shown in FIG. 1.
  • the terminal device includes: an information obtaining unit 31 and an information transmitting unit 32. Wherein, the specific function of each unit is described as follow.
  • the information obtaining unit 31 is configured to determine a sender of a malicious message and obtain information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages during a communication between two terminal devices.
  • the information transmitting unit 32 is configured to convert the information of the sender of the malicious message into corresponding audio data, and send out the audio data to a third party by the way of playing.
  • the information transmitting unit 32 includes: a first converting module 321 and a second converting module 322.
  • the first converting module 321, is configured to form the information of the sender of the malicious message into an information structure according to a preset rule.
  • the second converting module 322 is configured to convert the information structure into corresponding data that is represented by the scale, and enable each data that is represented by the scale to generate corresponding audio data within a specific frequency range, and transmit out the audio data to the third party by the way of playing.
  • the information obtaining unit 31 includes: a judging module 311, a first processing module 312 and a second processing module 313.
  • the judging module 311, is configured to, when the malicious message is detected in the communication messages between two terminal devices, determine both or either of the two terminal devices are/is the sender of the malicious message or not.
  • the first processing module 312 is configured to terminate current communication between the two terminal devices and obtain the information of the sender of the malicious message when the judging module 311 provides a positive judgment result (namely, the judging module 311 confirms that the terminal device is the sender of the malicious message) .
  • the second processing module 313, is configured to prompt a user that one of the two terminal devices is the sender of the malicious message, obtain the information of the sender of the malicious message, and store the information of the sender of the malicious message into a preset blacklist database when the judging module 311 provides a negative judgment result (namely, the judging module 311 confirms the terminal device is not the sender of the malicious message) .
  • the information obtaining unit 31 is further configured to, after a particular instruction from the server is received, determine that a malicious message exists in the communication messages; wherein, the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
  • the way of playing includes: radio broadcasting, multicast or unicast.
  • FIG. 4 is a structure diagram of a terminal device according to another embodiment of the invention.
  • the terminal device is provided to implement the information processing method of the mentioned embodiment.
  • the terminal device can include: a radio frequency (RF) circuit 710, one or more than one storage 720 with computer readable storage medium, an input unit 730, a display unit 740, a sensor 750, an audio circuit 760, a transmission module 770, one or more than one processors 780 (just one shown in FIG. 4), and a power supply 790.
  • RF radio frequency
  • the terminal device cannot be limited by the detailed structure of the terminal device as shown in FIG. 4, it can include more or fewer elements, or combinations of some elements, or arrangements of different elements than those of the of the terminal device as shown in FIG. 4.
  • the RF circuit 710 is used to receive and send electromagnetic wave, implement signal conversion between the electromagnetic wave and corresponding electric signal to communicate with communication networks or other equipments.
  • the RF circuit 710 may further include circuit components used for performing different functions, such as, an antenna, a RF transceiver, a digital signal processor, a user identity module (SIM) card, an encryption/decryption chip, a memory, etc.
  • the RF circuit 100 may communicate with networks such as Internet, Intranet, wireless network, or communicate with other devices through wireless communication.
  • the wireless communication may use, but not limited to any communication standard, protocol and technology, such as global system of mobile communication (GSM) , enhanced data rate for GSM evolution (EDGE), wideband code division multiple access (W-CDMA), code division multiple access (CDMA), time division multiple access (TDMA), Wireless Fidelity (Wi-Fi) (such as, the American association of electrical and electronics engineers IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), Voice over Internet protocol (VoIP), worldwide interoperability for microwave access (Wi-Max), and other protocols for E-mail, instant messaging and short message, and any other appropriate communication protocols, and even the protocol that has not been developed currently.
  • GSM global system of mobile communication
  • EDGE enhanced data rate for GSM evolution
  • W-CDMA wideband code division multiple access
  • CDMA code division multiple access
  • TDMA time division multiple access
  • Wi-Fi Wireless Fidelity
  • VoIP Voice over Internet protocol
  • Wi-Max worldwide interoperability for microwave access
  • the storage 720 may be used to store software programs and modules, such as the program instructions and modules corresponding to the information processing method and terminal device of the above-mentioned embodiments.
  • the processor 780 can run the software programs and the modules stored in the storage 720, to execute corresponding function applications and process the corresponding data, thus realizing the function of detecting malicious message during communication between two communication parties.
  • the storage720 may include a high-speed random access memory, may also include a nonvolatile memory, such as one or more magnetic storage device, flash, or other nonvolatile solid-state memory.
  • the storage 720 may further include a plurality of remote memories remotely set relative to the processor 780, and the plurality of remote memories can be connected to the terminal device through the network. Understandably, the above-mentioned network includes but not limited to: Internet, Intranet, local area network (LAN), mobile communication network and any combination of the Internet, the Intranet, the LAN and the mobile communication network.
  • the input unit 730 may be used to receive input number or character information, and also used to be a keyboard, a mouse, an operation rob, an optical input device or a trackball signal input device which can generate signals related to user setup and function control.
  • the input unit 730 may include a touch sensitive surface 731 and an input device 732.
  • the touch sensitive surface 731 may be defined as a touch screen panel or a touchpad, which is used to receive an instruction generated by a touch operation on or around the touch sensitive surface 731 (such as, an operation touching on or around the touch sensitive surface 731 using a finger, a stylus or any suitable object or accessory by a user), and drives a connection device according to a predetermined program.
  • the touch operation may be an operation of an object (such as a figure or a stylus) moving on or around the touch sensitive surface 731.
  • the touch sensitive surface 731 may include a touch detection device and a touch controller.
  • the touch detection device detects a touch location when the user touching the touch sensitive surface 731, and detects a signal generated by the touch operation, and transmits the signal to the touch controller.
  • the touch controller receives the signal from the touch detection device, and converts the signal into a coordinate, and transmits the coordinate to the processor 780.
  • the touch controller can receive an instruction from the processor 780 and execute the instruction.
  • the touch sensitive surface 731 may be a resistive touch screen panel or touchpad, a capacitive touch screen panel or touchpad, an infrared touch screen panel or touchpad, a surface acoustic wave touch screen panel or touchpad, or other types of touch screen panels or touch pads.
  • the input unit 730 further includes other input devices 732.
  • Each of the other input devices 732 may include but not be limited to one or more of a physical keyboard, function keys (such as a volume control key for controlling the volume of the terminal device, a switch key, and so on), atrackball, a mouse, an operation rob, etc.
  • the display unit 740 may be used to display information input by the user or information supplied to the user, and display all kinds of graphical user interfaces (GUIs) of the terminal device.
  • GUIs graphical user interfaces
  • the GUIs may consist of graphs, texts, icons, videos, and any combination of the graphs, the texts, the icons, and the videos.
  • the display unit 740 may include a display panel 741.
  • the display panel 741 may be a liquid crystal display (LCD) panel or a organic light-emitting diode (OLED) panel.
  • the touch sensitive surface 731 can cover on the display panel 741.
  • the touch sensitive surface 731 When the touch sensitive surface 731 detects the touch operation on or around the touch sensitive surface 731, the touch sensitive surface 731 transmits the instruction corresponding to the touch operation to the processor 780, to make the processor 780 determine a type of the touch operation. After the processor 780 determines the type of the touch operation, the processor 780 provides corresponding visual output on the display panel 741 according to the type of the touch operation.
  • touch sensitive surface 731 and the display panel 741 are two independent elements to respectively realize the input function and the output function
  • the touch sensitive surface 731 can be integrated with the display panel 741 to realize the input function and the output function.
  • the terminal device further may include at least one sensor 750, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 741 according to ambient light.
  • the proximity sensor can turn off the display panel 741 and/or backlight when the terminal device moves to any ear of the user.
  • a gravity sensor can be used to detect accelerations from every direction (generally the directions of three axles) , and detect the gravity and a direction of the gravity.
  • the gravity sensor also can be used to identify posture changes of a mobile phone (such as a switch from a landscape mode of the mobile phone to a portrait mode, games related to the posture changes, a magnetometer pose calibration), and detect functions related to vibration (such as pedometer, knock) .
  • the terminal device can also be equipped with a gyroscope, a barometer, a hygrometer, a hygrometer, a thermometer, an infrared sensor, or other sensors, which is no longer repeated here.
  • Each of an audio circuit 760, a loudspeaker 761, and a microphone 762 has an audio interface.
  • the audio circuit 760 may receive audio data and converts the audio data into an electrical signal, and transmit the electrical signal to the loudspeaker 761.
  • the loudspeaker 761 converts the electrical signal into a sound signal, and outputs the sound signal.
  • the microphone 762 can receive a sound signal, converts the sound signal into an electrical signal, and outputs the electrical signal to the audio circuit 760.
  • the audio circuit 760 receives the electrical signal, converts the electrical signal into an audio signal, and outputs the audio signal to the processor 780.
  • the processor 780 processes the audio signal and outputs processed audio signal to another terminal device by the RF circuit 710, or transmits processed audio signal to the storage 720 to be stored and further processed.
  • the audio circuit 760 may also include a headphone jack, to connect to an external headphone to make the external headphone communicate with the terminal device.
  • the terminal device can help the user to receive and send email, browse web pages and access to streaming media through the transmission module 770 (such as a Wi-Fi module), and provide the user with wireless broadband Internet access.
  • the transmission module 770 is provided and showed in FIG. 4, it also can be understood that the transmission module 770 is not a necessary element of the terminal device, and can be omitted according to need and without changing the nature and the scope of the present disclosure.
  • the processor 780 is a control center of the terminal device, and is connected to every portion of the mobile phone using all kinds of interfaces and cables.
  • the processor 780 executes various functions and processes data of the terminal device to monitor the mobile phone by way of running or executing the software programs and/or modules stored in the storage 720, or calling data stored in the storage 720.
  • the processor 780 may include one or more processing cores.
  • an application processor and a modem processor can be integrated into the processor 780.
  • the application processor mainly processes the operation system, the user interface, the application programs, etc.
  • the modem processor mainly processes the wireless communication. It can be understood that, the modem processor may not be integrated into the processor 780.
  • the terminal device further includes a power supply 790 such as a battery for powering other elements of the terminal device.
  • the power supply 7900 is connected to the processor 780 through a power management system.
  • the power management system is used to charge or discharge the power supply 790, and manages power consumption of the power supply 790, and so on.
  • the power supply 790 may also include one or more than one direct current (DC) power or alternative current (AC) power, rechargeable battery system, power converter, inverter, or power status indicator or any combination of the one or more than one DC power or AC power, rechargeable battery system, fault detection circuit, converter, or inverter, power state indicator.
  • DC direct current
  • AC alternative current
  • the terminal device further may include a camera, a Bluetooth module, which are not shown in the drawings and are no longer repeated.
  • the display unit of the terminal device is a touch screen display
  • the terminal device further includes a memory, and one or more than one program, wherein, the one or more than one program is stored in the memory, and one or more than one processor is configured to execute instructions included in the one or more than one program and used for performing the following operations:
  • the memory of the terminal device further includes instructions used for performing the following operations:
  • the memory of the terminal device further includes instructions used for performing the following operations:
  • the memory of the terminal device further includes instructions used for performing the following operations:
  • the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
  • the memory of the terminal device further includes instructions used for performing the following operations:
  • the way of playing includes: radio broadcasting, multicast or unicast.
  • the first party and/or the second party when the first party and/or the second party detect (s) that there is a malicious message in communication messages of the first party or the second party, the first party and/or the second party can determine the sender of the malicious message and obtain information of the sender of the malicious message, and can convert the information of the sender of the malicious message into audio date, and then transmit the audio data to the third party by the way of playing.
  • the third party which has not been installed with the malicious information detection software can also obtain the information of the sender of the malicious message at any time, thus effectively preventing malicious activities and improving the security of network.
  • the audio data can be transmitted by way of playing, but not depend on complicated cable connections or Bluetooth matching connections, which is easy for implementations and achievement.
  • the audio data can be transmitted to multiple third parties, thereby improving the efficiency of information transmission.
  • the program may be stored in a computer readable storage medium. When executed, the program may execute processes in the above-mentioned embodiments of methods.
  • the storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), aRandom Access Memory (RAM) , et al.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

An information processing method, system and terminal device are disclosed by the present invention, which belongs to the field of Internet technology. The method includes: determining a sender of a malicious message and obtaining information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device; and converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing. In the embodiments of the present invention, the third party which has not been installed with the malicious information detection software can also obtain the information of the sender of the malicious message at any time, thus effectively preventing malicious activities and improving the security of network.

Description

INFORMATION PROCESSING METHOD, SYSTEM AND TERMINAL DEVICE
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the priority benefit of Chinese Patent Application No. 201310395217.2, filed September 3, 2013, the content of which is incorporated by reference herein in its entirety for all purposes.
FIELD
The disclosure relates to the field of Internet technology, and particularly, to an information processing method, a system and a terminal device.
BACKGROUND
With the popularization of the network, malicious activities (such as, network fraud, sending viruses, junk information, and the like) on the network are increasingly rampant. For example, more and more illegal users can obtain the number of an instant messaging (IM) software (such as QQ, WeChart) of other legitimate users by using illegal means, and log in the IM software, and pretend to be the true identities of legitimate users. Therefore, the illegal users can send fraud information to friends of the legitimate users to defraud their property.
In existing technology, malicious message detection software is installed to terminal devices for detecting malicious messages. When the malicious message detection software receives a message, the malicious message detection software then detects the message and determines whether the message is matched with a message in an information characteristic library of the malicious message detection software. If yes, the message that has been received is a malicious message. Although the  malicious message detection software in the existing technology can prevent the malicious activities to some extent, but for the terminal devices that have not been installed with the malicious message detection software, the malicious activities will not able to be effectively prevented.
SUMMARY
Embodiments of the present invention provide an information processing method, which can solve the problem that malicious activity cannot be effectively prevented for terminal devices which have not been installed with the malicious message detection software.
for the terminal devices that have not been installed the detection software, the malicious activities will not able to be effectively prevented.
One embodiment of the invention provides an information processing method, the method comprising:
determining a sender of a malicious message and obtaining information of the sender of the malicious message by a terminal device when the terminal device determines that the malicious message exists in communication messages of the terminal device; and
converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing by the terminal device.
Another embodiment of the invention provides a terminal device, comprising:
an information obtaining unit, configured to determine a sender of a malicious message and obtain information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device; and
an information transmitting unit, configured to convert the information of the sender  of the malicious message into corresponding audio data, and send out the audio data by the way of playing.
Yet another embodiment of the invention provides an information processing system, comprising:
a first party;
a second party; and
the first party and/or the second party, configured to determine a sender of a malicious message, and obtain information of the sender of the malicious message when the malicious message is determined to exist in communication messages between two terminal devices, and convert the information of the sender of the malicious message into corresponding audio data, and send the audio data to a third party by the way of playing.
Compared with the existing technology, the beneficial effects of the present disclosure are: in the embodiments of the present disclosure, when the first party and/or the second party detect (s) that there is a malicious message in communication messages of the first party or the second party, the first party and/or the second party can determine the sender of the malicious message and obtain information of the sender of the malicious message, and can convert the information of the sender of the malicious message into audio date, and then transmit the audio data to the third party by the way of playing. Moreover, the third party which has not been installed with the malicious information detection software can also obtain the information of the sender of the malicious message at any time, thus effectively preventing malicious activities and improving the security of network. In addition, in the embodiment of the present disclosure, the audio data can be transmitted by way of playing, but not depend on complicated cable connections or Bluetooth matching connections, which is easy for implementations and achievement. 
BRIEF DESCRIPTION OF THE DRAWINGS
In order to illustrate the embodiments or existing technical solutions more clearly, a brief description of drawings that assists the description of embodiments of the invention or existing art will be provided below. It would be apparent that the drawings in the following description are only for some of the embodiments of the invention. A person having ordinary skills in the art will be able to obtain other drawings on the basis of these drawings without paying any creative work.
FIG. 1 is a network structure diagram of an information processing system according to one embodiment of the invention;
FIG. 2 is a flowchart of an information processing method according to one embodiment of the present invention;
FIG. 3 is a structure diagram of a terminal device according to one embodiment of the invention; and
FIG. 4 is a structure diagram of a terminal device according to another embodiment of the invention.
DETAILED DESCRIPTION
The following in conjunction with the accompanying drawings according to various embodiments, clearly describes technical proposals according to various embodiments. It would be obvious that the described embodiments are part but not all of embodiments. All other embodiments obtained by persons having ordinary skills without paying any creative work based on the illustrated embodiments should all be within the protection scope according to various embodiments.
In order to describe the technical solution of the present disclosure more clearly, detailed embodiments are used as below to illustrate the technical solution of the  present disclosure.
Referring to FIG. 1, it is a network structure diagram of an information processing system 00 according to one embodiment of the invention. For illustrative purposes, only parts related to the present disclosure are showed and described in the FIG. 1. Wherein, the information processing system 00 includes a first party 1 and a second party 2. Optionally, the information processing system 00 further includes at least one third party 3 and a server 4.
Wherein, the first party 1 can be any terminal device that includes an audio output unit 11, the second party 2 can be any terminal device that includes an audio output unit 21; the at least one third party 3 can be any terminal device that includes an audio input unit 31. In detail, the terminal device includes, but not limited to: a mobile phone, a tablet PC (personal computer), alaptop, etc. The audio input unit includes, but not limited to: a microphone. The audio output unit includes, but not limited to: a speaker.
The server 4 can be a single server, and can also be a server group consisting of several function servers.
In order to solve the existing problem that malicious activities cannot be effectively prevented for a terminal device which has not been installed with any malicious message detection software. In one embodiment, when the first party 1 and/or the second party 2 detect (s) that there is a malicious message in communication messages during a communication between the first party 1 and the second party 2, the first party 1 and/or the second party 2 can determine a sender of the malicious message and obtain information of the sender of the malicious message. The first party 1 and/or the second party 2 can convert the information of the sender of the malicious message into audio date, and send out the audio data to the at least one third party 3 by the way of playing.
Specifically, after the first party 1 and/or the second party 2 receive (s) a particular instruction, a malicious message is detected to exist in the communication messages, that is, the first party 1 and/or the second party 2 can determines that the malicious  message exists in communication messages. Wherein, the particular instruction is an instruction that can be generated when the server 4 detects that the information of the first party 1 and/or the second party 2 is matched with the information prestored in a blacklist database. When the malicious message is detected in the communication messages of the first party 1 and/or the second party 2, the first party 1 and/or the second party 2 can determine themselves/itself whether both or either of the first party 1and the second party 2 are/is the sender (s) of the malicious message or not. If yes, current communication is terminated, and the information of the sender of the malicious message is obtained; if no, a user is prompted that the first party 1 or the second party 2 (namely, the opposite side of the first party 1) is the sender of the malicious message, the information of the sender of the malicious message is obtained and stored in the preset blacklist database. The information of the sender of the malicious message can be formed into an information structure (exemplary, the information structure can be: “a unique identifier of the sender of the malicious message” “+” “the level of malicious” “+” “transmission time of the malicious message” ) by the first party 1 and/or the second party 2 according to a preset rule. The information structure is converted into corresponding audio data within a specific frequency range, in detail, the information structure is converted into corresponding data that is represented by the scale by the first party 1 and/or the second party 2, and each data that is represented by the scale is converted to generate corresponding audio data within a specific frequency range (optional, 5000~10000Hz), and then the audio data is transmitted to the at least one third party 3 through the audio output unit. In this embodiment, the data that is represented by the scale can be quaternary data, seven hexadecimal data, octal data, decimal data, ten binary data, or hexadecimal data. The at least one third party 3 can receive, through the audio input unit, the audio data sent by the first party 1 and/or the second party 2, and convert the audio data into corresponding data that is represented by the scale, and then convert the data that is represented by the scale into the information of the sender of the malicious message. The at least one third party 3 can send the information of the sender of the malicious  message to the user corresponding to the at least one third party 3, and the information of the sender of the malicious message is stored into the preset blacklist database.
Wherein, the way of playing includes: radio broadcasting (namely, no specified receiver and all being broadcasted), multicast (multiple specified receivers) or unicast (one specified receiver) . During the process of multicast and unicast, the unique identifier of the specified receiver needs to be carried.
It should be noted that, in order to improve the security of communication in the embodiment, when the first party 1 and/or the second party 2 are/is the sender (s) of the malicious message, then the current communication is forced to terminate. For example, a user A communicates with a user B using an instant messaging (IM) software (the information processing method of the embodiment can be implemented by the IM software, and the information processing method can be integrated into the IM software in the form of software), when the IM software detects a malicious message sent by the user A, then the IM software of the user A is forced to close, thereby terminating current communication.
In order to better understand the present invention, an application scenario adapted to the information processing method of the present embodiment is provided as follow.
The application scenario includes a first party, a second party and a third party. Each of the first party and the second party is equipped with a speaker, and the third party is equipped with a microphone. The first party and the second party still are installed with malicious information detection software, but the third party fails to install the malicious information detection software. During the process of communication between the first party and the second party, the malicious information detection software can detect that there is a malicious message in communication messages, the first party and the second party figure out the sender of the malicious message, and then obtain information of the sender of the malicious message (the information of the sender includes an unique identifier of the sender, a level of malicious, types of malicious activities, a transmission time of the malicious message, etc. ) . The first party and the second party can convert the information of the sender of the malicious  message into corresponding audio data (such as audio two-dimension codes) , and transmit the audio two-dimension codes to the third party through the speaker; the third party can receive the audio two-dimension codes through the microphone, and convert the audio two-dimension codes into the corresponding information of the sender of the malicious message. The third party can provide the information of the sender of the malicious message to a user of the third party, and enable the information of the sender of the malicious message to be stored into the preset blacklist database.
It should be understood that, according to the application scenario, when the first party and/or the second party detect (s) the malicious message, the information of the sender of the malicious message is transmitted to the third party in the form of the audio two-dimension codes, so that the third party that fails to install the malicious information detection software can obtain the information of the sender of the malicious message at any time, thereby effectively preventing malicious activities and improving the security of network.
It should be noted that the application scenario provided in the embodiment can only be used to explain the present disclosure, and will not restrict the protection scope of the present disclosure.
In addition, each of the first party, the second party and the third party of the present embodiment refers to a terminal; “the first, the second, and the third” is used here just for the sake of expression and description, and used to distinguish different terminals, but does not mean that the present disclosure must have a first party, a second party and a third party corresponding to “the first, the second, and the third” in the embodiments.
In order to describe and explain the embodiment of the present disclosure more conveniently, the system, the first party, the second party and third party in FIG. 1 only show parts related to the embodiments of the disclosure. However, it should be understood for a person having ordinary skill in the art that the system, the first party, the second party and the third party as shown in FIG. 1 are just one embodiment,  whose configurations and structures are not specifically limited. In addition, the system, the first party, the second party and the third party in FIG. 1 can include more parts or fewer parts than that as shown in the FIG. 1, or combinations of some parts, or arrangements of different parts. For example, each of the first party, the second party and the third party may include an audio input device and an audio output device.
Based on the network structure diagram of an information processing system shown in FIG. 1, an information processing system is provided in an embodiment of the present disclosure. Referring to FIG. 2, each process of the information processing method of the embodiment can executed by the first party 1 and/or the second party 2 of the information processing system shown in FIG. 1. The information processing method at least includes steps as follows.
In step S201, a terminal device determining a sender of a malicious message and obtaining information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device.
In one embodiment, when the terminal device receives the communication messages, the terminal device can determine whether there is a message matched with a message prestored in a malicious message feature library; if yes, the terminal device determines that the malicious message exists in the communication message. Wherein, the malicious message feature library may include: behavior characteristics, content characteristics, etc., the behavior characteristics may include: frequencies of message transmission, amounts of message transmission, success rates of message transmission, etc. , the content characteristics may include: phishing sites, blacklist accounts, etc.
The terminal device can determine that the communication messages include the malicious message when the message received by the terminal device meets at least one condition as follow: the frequency of message transmission being greater than a first threshold value, the amount of message transmission being greater than a second  threshold, the success rate of message transmission being greater than a third threshold, the message received by the terminal device including phishing sites, the message including blacklist accounts,
Preferably, the terminal device determining that malicious massage exists in the communication messages further includes:
after the terminal device receives a particular instruction sent by a server, a malicious message is detected in the communication messages by the terminal device, wherein, the particular instruction is an instruction that is generated when the server detects that the information of the first party and/or the second party is matched with the information prestored in a blacklist database.
In one embodiment, the server can obtain historical behavior information of a user, and divide the historical behavior information into one or more than one documents related to the behavior information of the user based on a preset rule. The server can obtain corresponding analysis model by use of statistical learning theory according to the one or more than one documents, and analyze or predict behavior information of the user according to the analysis model, and add the users who have malicious behaviors or potential malicious behaviors to the blacklist database. Wherein, the historical behavior information of the user may include but not limited to at least one of at follow: login IP addresses, forwarding information, original information that has been published, information that has been commented, etc.
When the server detects that the information of the terminal device is matched with the information prestored in the blacklist database, the server can send a particular instruction to a sender and/or a receiver during a communication, to prompt the user that the malicious messages exist in the communication messages.
Furthermore, a malicious message feature library can be prestored in the server in the present embodiment. When the server detects that there is the same message in the communication messages as the message in the malicious message feature library, that is,a malicious message exists in the communication messages, the server can transmit the particular instruction to both sides of the communication, prompting the user that  the malicious messages exist in the communication messages. Additionally, in order to improve accuracy of detection, the malicious message feature database can be updated in real time by the server.
In this embodiment, when the terminal device receives the particular instruction sent by the server, then the terminal device can determine the sender of the malicious message, and obtain the information of the sender of malicious message. In detail, when the malicious message is detected in the communication messages of the first party and/or the second party, the first party and/or the second party can determine themselves/itself whether both or either of the first party and the second party are/is the sender of the malicious message or not. If yes, the current communication is terminated, and the information of the sender of the malicious message is obtained; if no,a user is prompted that the first party or the second party (namely, the opposite side of the first party 1) is the sender of the malicious message, the information of the sender of the malicious message is obtained and stored in the preset blacklist database.
In one embodiment, the sender of the malicious message can be the first party or the second party. The information of the sender of the malicious message includes but not limited to: a unique identifier of the sender of the malicious message. Optionally, the information of the sender of the malicious message further includes but not limited to at least one of as follow: levels of the malicious, types of malicious activities (such as,fraud information, viruses information, junk information), and transmission time of the malicious message, etc.
In this embodiment of the present disclosure, the information of the sender of the malicious message is stored in a preset blacklist database, so that the message in the communication messages can be first matched with the message prestored in the blacklist database at the nest communication, thereby quickly determining whether there is a malicious message in the communication messages or not.
In step S202, the terminal device converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data to  the third party by the way of playing.
In one embodiment, the information of the sender of the malicious message can be formed into an information structure according to a preset rule by the terminal device, exemplary, the information structure can be: “a unique identifier of the sender of the malicious message” “+” “the level of malicious” “+” “transmission time of the malicious message” .
The terminal device can convert the information structure into corresponding data that is represented by the scale, and enable each data that is represented by the scale to generate corresponding audio data within a specific frequency range, and transmit out the audio data to the third party by the way of playing. In this embodiment, the data that is represented by the scale can be quaternary data, seven hexadecimal data, octal data, decimal data, ten binary data, or hexadecimal data.
In this embodiment, the way of converting the information structure into the data that is represented by the scale can effectively shorten the codes and be convenient for data transmission.
Wherein, the third party can be a terminal device outside two parties (namely, the first party and the second party) . The specific frequency range is preferable 5000~10000 Hz,namely, the audio two-dimension code. The way of playing includes: radio broadcasting, multicast or unicast.
Furthermore, after the third party receives the audio data sent by the terminal device, then the third party analyzes the audio data by using the Fourier transform to converts the audio data into corresponding data that is represented by the scale, and further converts the data that is represented by the scale into the information of the sender of the malicious message. The third party can store the information of the sender of the malicious message into the preset blacklist database, and prompt the information of the sender of the malicious message to the user of the third party, thereby achieving the goal of effectively guarding against malicious activities.
In the embodiment of the information processing method, the third party that is not equipped with malicious message detection software can also obtain the information  of the sender of the malicious message, which can effectively prevent malicious activities and improve the security of network. Moreover, in the embodiment of the present disclosure, the audio data (preferably, the audio two-dimension code) can be transmitted by way of playing, but do not need to depend on complicated cable connections or Bluetooth matching connections, which is easy for implementations and achievement.
Referring to FIG. 3, FIG. 3 is a structure diagram of a terminal device according to one embodiment of the invention. In the embodiment, for illustration purposes, only the parts related to the embodiment of the present disclosure are provided and shown. The terminal device can be applied to the information processing system as shown in FIG. 1, and correspond to the first party and/or the second party of the information processing system as shown in FIG. 1.
In one embodiment, the terminal device includes: an information obtaining unit 31 and an information transmitting unit 32. Wherein, the specific function of each unit is described as follow.
The information obtaining unit 31, is configured to determine a sender of a malicious message and obtain information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages during a communication between two terminal devices.
The information transmitting unit 32, is configured to convert the information of the sender of the malicious message into corresponding audio data, and send out the audio data to a third party by the way of playing.
Furthermore, the information transmitting unit 32 includes: a first converting module 321 and a second converting module 322.
The first converting module 321, is configured to form the information of the sender of the malicious message into an information structure according to a preset rule.
The second converting module 322, is configured to convert the information structure into corresponding data that is represented by the scale, and enable each data that is represented by the scale to generate corresponding audio data within a specific  frequency range, and transmit out the audio data to the third party by the way of playing.
Furthermore, the information obtaining unit 31 includes: a judging module 311, a first processing module 312 and a second processing module 313.
The judging module 311, is configured to, when the malicious message is detected in the communication messages between two terminal devices, determine both or either of the two terminal devices are/is the sender of the malicious message or not.
The first processing module 312, is configured to terminate current communication between the two terminal devices and obtain the information of the sender of the malicious message when the judging module 311 provides a positive judgment result (namely, the judging module 311 confirms that the terminal device is the sender of the malicious message) .
The second processing module 313, is configured to prompt a user that one of the two terminal devices is the sender of the malicious message, obtain the information of the sender of the malicious message, and store the information of the sender of the malicious message into a preset blacklist database when the judging module 311 provides a negative judgment result (namely, the judging module 311 confirms the terminal device is not the sender of the malicious message) .
Moreover, the information obtaining unit 31 is further configured to, after a particular instruction from the server is received, determine that a malicious message exists in the communication messages; wherein, the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
In one embodiment, the way of playing includes: radio broadcasting, multicast or unicast.
It should be clearly understood, for a person having ordinary skill in the art, that for the sake of convenient and concise descriptions, only the above mentioned functional units and modules are taken here as an embodiment to disclose the present disclosure.  In practical applications, the above mentioned functions can be implemented by different functional units or modules as required, that is, the internal structure of the terminal device can be divided into different functional units or modules, to achieve the above described all or part of the functions. Each functional unit or module of the embodiments can integrated into a processing unit, or can also be a separate physical existence, or two or more than two functional units or modules are integrated into a unit. The above integrated units or modules can be either implemented in the form of hardware, and can also be implemented in the form of software functional units. In addition, the name of the each functional unit or module is used here to facilitate the distinction between each other, but not intended to limit the protection scope of the present invention. The detailed working processes of the units or modules of the terminal device can refer to corresponding processes of the information processing method of the embodiment, which is no longer repeated here. Referring to FIG. 4, FIG. 4 is a structure diagram of a terminal device according to another embodiment of the invention. The terminal device is provided to implement the information processing method of the mentioned embodiment.
Preferably, referring to FIG. 4, the terminal device can include: a radio frequency (RF) circuit 710, one or more than one storage 720 with computer readable storage medium, an input unit 730, a display unit 740, a sensor 750, an audio circuit 760, a transmission module 770, one or more than one processors 780 (just one shown in FIG. 4), and a power supply 790. It should be understood for a person having ordinary skill in the art that the terminal device cannot be limited by the detailed structure of the terminal device as shown in FIG. 4, it can include more or fewer elements, or combinations of some elements, or arrangements of different elements than those of the of the terminal device as shown in FIG. 4.
The RF circuit 710 is used to receive and send electromagnetic wave, implement signal conversion between the electromagnetic wave and corresponding electric signal to communicate with communication networks or other equipments. The RF circuit 710 may further include circuit components used for performing different functions,  such as, an antenna, a RF transceiver, a digital signal processor, a user identity module (SIM) card, an encryption/decryption chip, a memory, etc. In addition, the RF circuit 100 may communicate with networks such as Internet, Intranet, wireless network, or communicate with other devices through wireless communication. The wireless communication may use, but not limited to any communication standard, protocol and technology, such as global system of mobile communication (GSM) , enhanced data rate for GSM evolution (EDGE), wideband code division multiple access (W-CDMA), code division multiple access (CDMA), time division multiple access (TDMA), Wireless Fidelity (Wi-Fi) (such as, the American association of electrical and electronics engineers IEEE 802.11a, IEEE 802.11b, IEEE802.11g and/or IEEE 802.11n), Voice over Internet protocol (VoIP), worldwide interoperability for microwave access (Wi-Max), and other protocols for E-mail, instant messaging and short message, and any other appropriate communication protocols, and even the protocol that has not been developed currently.
The storage 720 may be used to store software programs and modules, such as the program instructions and modules corresponding to the information processing method and terminal device of the above-mentioned embodiments. The processor 780 can run the software programs and the modules stored in the storage 720, to execute corresponding function applications and process the corresponding data, thus realizing the function of detecting malicious message during communication between two communication parties. The storage720 may include a high-speed random access memory, may also include a nonvolatile memory, such as one or more magnetic storage device, flash, or other nonvolatile solid-state memory. In some embodiments, the storage 720 may further include a plurality of remote memories remotely set relative to the processor 780, and the plurality of remote memories can be connected to the terminal device through the network. Understandably, the above-mentioned network includes but not limited to: Internet, Intranet, local area network (LAN), mobile communication network and any combination of the Internet, the Intranet, the LAN and the mobile communication network.
The input unit 730 may be used to receive input number or character information, and also used to be a keyboard, a mouse, an operation rob, an optical input device or a trackball signal input device which can generate signals related to user setup and function control. In detail, the input unit 730 may include a touch sensitive surface 731 and an input device 732. The touch sensitive surface 731 may be defined as a touch screen panel or a touchpad, which is used to receive an instruction generated by a touch operation on or around the touch sensitive surface 731 (such as, an operation touching on or around the touch sensitive surface 731 using a finger, a stylus or any suitable object or accessory by a user), and drives a connection device according to a predetermined program. The touch operation may be an operation of an object (such as a figure or a stylus) moving on or around the touch sensitive surface 731. Optionally, the touch sensitive surface 731 may include a touch detection device and a touch controller. The touch detection device detects a touch location when the user touching the touch sensitive surface 731, and detects a signal generated by the touch operation, and transmits the signal to the touch controller. The touch controller receives the signal from the touch detection device, and converts the signal into a coordinate, and transmits the coordinate to the processor 780. The touch controller can receive an instruction from the processor 780 and execute the instruction. In addition, the touch sensitive surface 731 may be a resistive touch screen panel or touchpad, a capacitive touch screen panel or touchpad, an infrared touch screen panel or touchpad, a surface acoustic wave touch screen panel or touchpad, or other types of touch screen panels or touch pads. The input unit 730 further includes other input devices 732. Each of the other input devices 732 may include but not be limited to one or more of a physical keyboard, function keys (such as a volume control key for controlling the volume of the terminal device, a switch key, and so on), atrackball, a mouse, an operation rob, etc.
The display unit 740 may be used to display information input by the user or information supplied to the user, and display all kinds of graphical user interfaces (GUIs) of the terminal device. The GUIs may consist of graphs, texts, icons, videos,  and any combination of the graphs, the texts, the icons, and the videos. The display unit 740 may include a display panel 741. Optionally, the display panel 741 may be a liquid crystal display (LCD) panel or a organic light-emitting diode (OLED) panel. Furthermore, the touch sensitive surface 731 can cover on the display panel 741. When the touch sensitive surface 731 detects the touch operation on or around the touch sensitive surface 731, the touch sensitive surface 731 transmits the instruction corresponding to the touch operation to the processor 780, to make the processor 780 determine a type of the touch operation. After the processor 780 determines the type of the touch operation, the processor 780 provides corresponding visual output on the display panel 741 according to the type of the touch operation.
Although the touch sensitive surface 731 and the display panel 741, as shown in FIG. 4,are two independent elements to respectively realize the input function and the output function, in some embodiments, the touch sensitive surface 731 can be integrated with the display panel 741 to realize the input function and the output function.
The terminal device further may include at least one sensor 750, such as a light sensor, a motion sensor, and other sensors. In detail, the light sensor may include an ambient light sensor and a proximity sensor. The ambient light sensor can adjust the brightness of the display panel 741 according to ambient light. The proximity sensor can turn off the display panel 741 and/or backlight when the terminal device moves to any ear of the user. As one of the motion sensors, a gravity sensor can be used to detect accelerations from every direction (generally the directions of three axles) , and detect the gravity and a direction of the gravity. The gravity sensor also can be used to identify posture changes of a mobile phone (such as a switch from a landscape mode of the mobile phone to a portrait mode, games related to the posture changes, a magnetometer pose calibration), and detect functions related to vibration (such as pedometer, knock) . The terminal device can also be equipped with a gyroscope, a barometer, a hygrometer, a hygrometer, a thermometer, an infrared sensor, or other sensors, which is no longer repeated here.
Each of an audio circuit 760, a loudspeaker 761, and a microphone 762 has an audio interface. The audio circuit 760 may receive audio data and converts the audio data into an electrical signal, and transmit the electrical signal to the loudspeaker 761. The loudspeaker 761 converts the electrical signal into a sound signal, and outputs the sound signal. On the other hand, the microphone 762 can receive a sound signal, converts the sound signal into an electrical signal, and outputs the electrical signal to the audio circuit 760. The audio circuit 760 receives the electrical signal, converts the electrical signal into an audio signal, and outputs the audio signal to the processor 780. The processor 780 processes the audio signal and outputs processed audio signal to another terminal device by the RF circuit 710, or transmits processed audio signal to the storage 720 to be stored and further processed. The audio circuit 760 may also include a headphone jack, to connect to an external headphone to make the external headphone communicate with the terminal device.
The terminal device can help the user to receive and send email, browse web pages and access to streaming media through the transmission module 770 (such as a Wi-Fi module), and provide the user with wireless broadband Internet access. Although the transmission module 770 is provided and showed in FIG. 4, it also can be understood that the transmission module 770 is not a necessary element of the terminal device, and can be omitted according to need and without changing the nature and the scope of the present disclosure.
The processor 780 is a control center of the terminal device, and is connected to every portion of the mobile phone using all kinds of interfaces and cables. The processor 780 executes various functions and processes data of the terminal device to monitor the mobile phone by way of running or executing the software programs and/or modules stored in the storage 720, or calling data stored in the storage 720. Optionally, the processor 780 may include one or more processing cores. Preferably, an application processor and a modem processor can be integrated into the processor 780. The application processor mainly processes the operation system, the user interface, the application programs, etc. The modem processor mainly processes the  wireless communication. It can be understood that, the modem processor may not be integrated into the processor 780.
The terminal device further includes a power supply 790 such as a battery for powering other elements of the terminal device. Preferably, the power supply 7900 is connected to the processor 780 through a power management system. The power management system is used to charge or discharge the power supply 790, and manages power consumption of the power supply 790, and so on. The power supply 790 may also include one or more than one direct current (DC) power or alternative current (AC) power, rechargeable battery system, power converter, inverter, or power status indicator or any combination of the one or more than one DC power or AC power, rechargeable battery system, fault detection circuit, converter, or inverter, power state indicator.
The terminal device further may include a camera, a Bluetooth module, which are not shown in the drawings and are no longer repeated. In the present embodiment, the display unit of the terminal device is a touch screen display, and the terminal device further includes a memory, and one or more than one program, wherein, the one or more than one program is stored in the memory, and one or more than one processor is configured to execute instructions included in the one or more than one program and used for performing the following operations:
determining a sender of a malicious message and obtaining information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device; and
converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing.
Assuming that the above-mentioned description is a first possible embodiment, in a second possible embodiment which is provided according to the first possible embodiment, the memory of the terminal device, further includes instructions used for performing the following operations:
forming the information of the sender of the malicious message into an information  structure according to a preset rule; and
converting the information structure into corresponding audio data within a specific frequency range, and transmit out the audio data by the way of playing by the terminal device.
Assuming that the above-mentioned description is a first possible embodiment, in a third possible embodiment which is provided according to the first possible embodiment, the memory of the terminal device, further includes instructions used for performing the following operations:
Determining whether or not the terminal device is the sender of the malicious message, when the malicious message is detected in the communication messages during a communication between two terminal devices;
terminating current communication between the two terminal devices and obtaining the information of the sender of the malicious message when the terminal device is the sender of the malicious message; and
prompting a user that the other terminal device is the sender of the malicious message, obtaining the information of the sender of the malicious message, and storing the information of the sender of the malicious message into a preset blacklist database when the terminal device is not the sender of the malicious message.
Assuming that the above-mentioned description is a first possible embodiment, in a fourth possible embodiment which is provided according to the first possible embodiment, the memory of the terminal device, further includes instructions used for performing the following operations:
determining that a malicious message exists in the communication messages after a particular instruction from the server is received; wherein, the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
Assuming that the above-mentioned description is a first possible embodiment, in a fifth possible embodiment which is provided according to the first possible  embodiment, the memory of the terminal device, further includes instructions used for performing the following operations:
the way of playing includes: radio broadcasting, multicast or unicast.
In summary, in the embodiments of the present disclosure, when the first party and/or the second party detect (s) that there is a malicious message in communication messages of the first party or the second party, the first party and/or the second party can determine the sender of the malicious message and obtain information of the sender of the malicious message, and can convert the information of the sender of the malicious message into audio date, and then transmit the audio data to the third party by the way of playing. Moreover, the third party which has not been installed with the malicious information detection software can also obtain the information of the sender of the malicious message at any time, thus effectively preventing malicious activities and improving the security of network. In addition, in the embodiment of the present disclosure, the audio data can be transmitted by way of playing, but not depend on complicated cable connections or Bluetooth matching connections, which is easy for implementations and achievement. Moreover, the audio data can be transmitted to multiple third parties, thereby improving the efficiency of information transmission.
A person having ordinary skills in the art can realize that part or whole of the processes in the methods according to the above embodiments may be implemented by a computer program instructing relevant hardware. The program may be stored in a computer readable storage medium. When executed, the program may execute processes in the above-mentioned embodiments of methods. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), aRandom Access Memory (RAM) , et al.
The foregoing descriptions are merely exemplary embodiments of the present invention, but not intended to limit the protection scope of the present invention. Any variation or replacement made by persons of ordinary skills in the art without departing from the spirit of the present invention shall fall within the protection scope  of the present invention. Therefore, the scope of the present invention shall be subject to be appended claims.

Claims (20)

  1. An information processing method, comprising:
    determining a sender of a malicious message and obtaining information of the sender of the malicious message by a terminal device when the terminal device determines that the malicious message exists in communication messages of the terminal device; and
    converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing by the terminal device.
  2. The information processing method according to claim 1, wherein the step of converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing by the terminal device, comprises:
    forming the information of the sender of the malicious message into an information structure according to a preset rule by the terminal device; and
    converting the information structure into corresponding audio data within a specific frequency range, and sending out the audio data by the way of playing by the terminal device.
  3. The information processing method according to claim 1, wherein the step of determining a sender of a malicious message and obtaining information of the sender of the malicious message by a terminal device when the terminal device determines that the malicious message exists in communication messages of the terminal device, comprises:
    determining whether or not the terminal device is the sender of the malicious message when the malicious message is detected in the communication messages during a communication between two terminal devices;
    terminating current communication between the two terminal devices and obtaining the information of the sender of the malicious message when the terminal device is the sender of the malicious message; and
    prompting a user that the other terminal device is the sender of the malicious message, obtaining the information of the sender of the malicious message, and storing the information of the sender of the malicious message into a preset blacklist database when the terminal device is not the sender of the malicious message.
  4. The information processing method according to claim 1, wherein the step of when the terminal device determines that the malicious message exists in communication messages of the terminal device, comprises:
    determining that a malicious message exists in the communication messages after a particular instruction from the server is received; wherein, the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
  5. The information processing method according to any one of claims 1-4, wherein the way of playing comprises: radio broadcasting, multicast or unicast.
  6. A terminal device, comprising:
    an information obtaining unit, configured to determine a sender of a malicious message and obtain information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device; and
    an information transmitting unit, configured to convert the information of the sender of the malicious message into corresponding audio data, and send out the audio data by the way of playing.
  7. The terminal device according to claim 6, wherein the information transmitting unit comprises:
    a first converting module, configured to form the information of the sender of the malicious message into an information structure according to a preset rule; and
    a second converting module, configured to convert the information structure into corresponding audio data within a specific frequency range, and send out the audio data by the way of playing.
  8. The terminal device according to claim 6, wherein the information obtaining unit comprises:
    a judging module, configured to determine whether or not the terminal device is the sender of the malicious message when the malicious message is detected in the communication messages during a communication between two terminal devices;
    a first processing module, configured to terminate current communication between the two terminal devices and obtain the information of the sender of the malicious message when the terminal device is the sender of the malicious message; and
    a second processing module, configured to prompt a user that the other terminal device is the sender of the malicious message, obtain the information of the sender of the malicious message, and store the information of the sender of the malicious message into a preset blacklist database when the terminal device is not the sender of the malicious message.
  9. The terminal device according to claim 6, wherein the information obtaining unit if further configured to determine that a malicious message exists in the communication messages after a particular instruction from the server is received; wherein, the particular instruction is an instruction that can be generated when the server detects  that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
  10. The terminal device according to any of claims 6-9, wherein the way of playing comprises: radio broadcasting, multicast or unicast.
  11. An information processing system, comprising:
    a first party;
    a second party; and
    the first party and/or the second party, configured to determine a sender of a malicious message, and obtain information of the sender of the malicious message when the malicious message is determined to exist in communication messages between two terminal devices, and convert the information of the sender of the malicious message into corresponding audio data, and send the audio data to a third party by the way of playing.
  12. The information processing system according to claim 11, wherein the first party and/or the second party, configured to:
    form the information of the sender of the malicious message into an information structure according to a preset rule; and
    convert the information structure into corresponding audio data within a specific frequency range, and transmit out the audio data by the way of playing.
  13. The information processing system according to claim 11, wherein the first party and/or the second party, configured to:
    determine whether or not the terminal device is the sender of the malicious message when the malicious message is detected in the communication messages  during a communication between two terminal devices;
    terminate current communication between the two terminal devices and obtain the information of the sender of the malicious message when the terminal device is the sender of the malicious message; and
    prompt a user that the other terminal device is the sender of the malicious message, obtain the information of the sender of the malicious message, and store the information of the sender of the malicious message into a preset blacklist database when the terminal device is not the sender of the malicious message.
  14. The information processing system according to claim 11, wherein the first party and/or the second party, configured to determine that a malicious message exists in the communication messages after a particular instruction from the server is received; wherein, the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
  15. The information processing system according to claim 11, further comprising a third party, the third party configured to receive the audio data sent by the first party and/or the second party, and convert the audio data into the information of the sender of the malicious message, and send the information of the sender of the malicious message to the user corresponding to the third party, and transmit the information of the sender of the malicious message to the preset blacklist database to be stored.
  16. The information processing system according to any of claims 11-15, wherein the way of playing comprises: radio broadcasting, multicast or unicast.
  17. A non-transitory computer readable storage medium, storing one or more programs for execution by one or more processors of a computer having a display, the one or more programs comprising instructions for:
    determining a sender of a malicious message and obtaining information of the sender of the malicious message by a terminal device when the terminal device determines that the malicious message exists in communication messages of the terminal device; and
    converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing by the terminal device.
  18. The non-transitory computer readable storage medium according to claim 17, wherein the step of converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing by the terminal device, comprises:
    forming the information of the sender of the malicious message into an information structure according to a preset rule by the terminal device; and
    converting the information structure into corresponding audio data within a specific frequency range, and sending out the audio data by the way of playing by the terminal device.
  19. The non-transitory computer readable storage medium according to claim 17, wherein the step of determining a sender of a malicious message and obtaining information of the sender of the malicious message by a terminal device when the terminal device determines that the malicious message exists in communication messages of the terminal device, comprises:
    determining whether or not the terminal device is the sender of the malicious  message when the malicious message is detected in the communication messages during a communication between two terminal devices;
    terminating current communication between the two terminal devices and obtaining the information of the sender of the malicious message when the terminal device is the sender of the malicious message; and
    prompting a user that the other terminal device is the sender of the malicious message, obtaining the information of the sender of the malicious message, and storing the information of the sender of the malicious message into a preset blacklist database when the terminal device is not the sender of the malicious message.
  20. The non-transitory computer readable storage medium according to claim 17, wherein the step of when the terminal device determines that the malicious message exists in communication messages of the terminal device, comprises:
    determining that a malicious message exists in the communication messages after a particular instruction from the server is received; wherein, the particular instruction is an instruction that can be generated when the server detects that the information of a sender and/or a receiver during a communication is matched with the information prestored in a blacklist database.
PCT/CN2014/085846 2013-09-03 2014-09-03 Information processing method, system and terminal device WO2015032326A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310395217.2 2013-09-03
CN201310395217.2A CN104426882B (en) 2013-09-03 2013-09-03 Information processing method, system and terminal equipment

Publications (1)

Publication Number Publication Date
WO2015032326A1 true WO2015032326A1 (en) 2015-03-12

Family

ID=52627811

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/085846 WO2015032326A1 (en) 2013-09-03 2014-09-03 Information processing method, system and terminal device

Country Status (2)

Country Link
CN (1) CN104426882B (en)
WO (1) WO2015032326A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918552B (en) * 2019-01-23 2024-03-12 平安科技(深圳)有限公司 Method for identifying aversion group complaint trend personnel, server and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257652A (en) * 2007-12-28 2008-09-03 深圳市戴文科技有限公司 Method and system for early warning of mobile phone malevolence incoming call and malevolence SMS
US7756535B1 (en) * 2006-07-07 2010-07-13 Trend Micro Incorporated Lightweight content filtering system for mobile phones
CN102158584A (en) * 2011-04-07 2011-08-17 华为终端有限公司 Method, device and system for automatically identifying phone number of communication initiator

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1714741A (en) * 2004-06-30 2006-01-04 乐金电子(中国)研究开发中心有限公司 Method and system for monitoring body conditions
CN102393761B (en) * 2011-10-26 2013-07-03 广州杰赛科技股份有限公司 Environment monitoring system
CN103166920B (en) * 2011-12-13 2016-01-20 腾讯科技(深圳)有限公司 A kind of method and system limiting fallacious message and propagate
KR101308351B1 (en) * 2012-02-24 2013-09-17 주식회사 팬택 Terminal and method for assigning a permission to application
CN103166681A (en) * 2013-03-13 2013-06-19 北京搜狗科技发展有限公司 Information transmission method and system in short-distance scene

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7756535B1 (en) * 2006-07-07 2010-07-13 Trend Micro Incorporated Lightweight content filtering system for mobile phones
CN101257652A (en) * 2007-12-28 2008-09-03 深圳市戴文科技有限公司 Method and system for early warning of mobile phone malevolence incoming call and malevolence SMS
CN102158584A (en) * 2011-04-07 2011-08-17 华为终端有限公司 Method, device and system for automatically identifying phone number of communication initiator

Also Published As

Publication number Publication date
CN104426882B (en) 2019-05-24
CN104426882A (en) 2015-03-18

Similar Documents

Publication Publication Date Title
CN104580167B (en) A kind of methods, devices and systems transmitting data
WO2015090248A1 (en) Server overload protection method and device
US20170316781A1 (en) Remote electronic service requesting and processing method, server, and terminal
WO2017118437A1 (en) Service processing method, device, and system
WO2017185711A1 (en) Method, apparatus and system for controlling smart device, and storage medium
WO2016150270A1 (en) Method and apparatus for processing group session message
CN103634294A (en) Information verifying method and device
CN104518875A (en) A method for identity verification and account acquisition, and a mobile terminal
CN106982097A (en) Radio frequency interference elimination method, device, storage medium and terminal
CN106603548A (en) Application registration method and mobile terminal
CN106096393A (en) Application program control method and device
CN111615198B (en) Resource determination method, resource indication method, terminal and network side equipment
CN104852802A (en) Authentication method, device and system
CN106453839A (en) Antenna adjusting method and mobile terminal
CN106603740A (en) Network connection abnormality processing method and terminal equipment
CN106534093A (en) Terminal data processing method, device and system
CN109086595B (en) Service account switching method, system, device and server
CN104702678B (en) Document transmission method and device
CN108270764B (en) Application login method, server and mobile terminal
CN104092657A (en) Information transmission method, device and system
CN106874045A (en) A kind of startup method of application program, device and mobile terminal
CN104104508A (en) Verification method and device, and terminal equipment
CN106686210B (en) Incoming call processing method, device and system
CN110198560A (en) A kind of power distribution method and terminal
CN104954414A (en) Method of information exchange, terminal, server and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14841670

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 29/07/2016)

122 Ep: pct application non-entry in european phase

Ref document number: 14841670

Country of ref document: EP

Kind code of ref document: A1