Terminal control method and apparatus and terminal device

ABSTRACT

A method and an apparatus for starting an operating system. The method is: when a terminal determines that a currently received message is a broadcast message, determining whether the broadcast message is an unwanted broadcast message according to a user identifier included in the broadcast message; and when determining that the broadcast message is an unwanted broadcast message, reversely searching for a recipient identifier corresponding to the unwanted broadcast message, and removing the recipient identifier from a recipient identifier list, so that the recipient skips receiving the foregoing unwanted broadcast message.

CROSS REFERENCE TO RELATED APPLICATION

This application is a national stage of International Application No.PCT/CN2015/077803, filed on Apr. 29 2015, which is hereby incorporatedby reference in its entirety.

TECHNICAL FIELD

Embodiments of the present disclosure relate to the field of electronicproducts, and in particular, to a terminal control method and apparatus,and a terminal device.

BACKGROUND

With rapid development of electronic technologies, terminals such as asmartphone and a personal digital assistant (PDA) are widely applied byvirtue of their powerful functions.

An operating system and multiple types of application software arepreinstalled in a terminal. In addition, plenty of application softwaremay be downloaded to the terminal according to a user's instruction.After the application software is installed, the terminal may have morepowerful functions, and an operation is more convenient.

The terminal includes the operating system and various types ofapplication software. Therefore, when any application software has abroadcast message (such as a software update message) or the operatingsystem has a broadcast message (such as an operating system upgrademessage), the terminal needs to start the operating system and perform acorresponding operation according to the broadcast message.

When plenty of application software is installed in the terminal or theoperating system is frequently upgraded, the terminal frequentlyreceives a broadcast message. The terminal needs to start the operatingsystem each time when receiving a broadcast message. This causes aproblem that the terminal frequently starts the operating system andenergy consumption of the terminal is high.

SUMMARY

Embodiments of the present disclosure provide a terminal control methodand apparatus, and a terminal device, so as to resolve a current problemof high energy consumption that exists in a terminal and is caused byfrequent starting of an operating system.

Specific technical solutions provided in the embodiments of the presentdisclosure are as follows:

According to a first aspect, a terminal control method is provided,including: detecting a message received by a terminal from the outside;when detecting that the message is a broadcast message, determiningwhether the broadcast message is an unwanted broadcast message; and whenthe broadcast message is an unwanted broadcast message, if the terminalis in a standby state, prohibiting starting of an operating system ofthe terminal.

With reference to the first aspect, in a first possible implementationmanner, the detecting a message received by a terminal from the outsideincludes:

obtaining a user identifier included in the message, and if the useridentifier corresponds to any application software included in theterminal or the user identifier corresponds to the operating system ofthe terminal, determining that the message is a broadcast message; or

obtaining a message type included in the message, and when the messagetype is a broadcast message type, determining that the message is abroadcast message.

With reference to the first aspect or the first possible implementationmanner of the first aspect, in a second possible implementation manner,the determining whether the broadcast message is an unwanted broadcastmessage includes: searching a preset user identifier list forprohibiting starting of an operating system for the user identifierincluded in the broadcast message; and when the user identifier isincluded in the preset user identifier list for prohibiting starting ofan operating system, determining that the broadcast message is anunwanted broadcast message.

With reference to the first aspect, the first possible implementationmanner of the first aspect, or the second possible implementation mannerof the first aspect, in a third possible implementation manner, when thebroadcast message is an unwanted broadcast message, if the terminal isin a standby state, the prohibiting starting of an operating system ofthe terminal includes:

obtaining a process corresponding to the user identifier included in thebroadcast message; obtaining application software or an operating systemcorresponding to the process; obtaining status information correspondingto the application software or the operating system from a status listsaved in the terminal, where the status list is used to save statusinformation about whether each application software or the operatingsystem installed in the terminal is started; and when the statusinformation corresponding to the application software or the operatingsystem is the standby state, removing a recipient identifiercorresponding to the broadcast message from a recipient identifier listsaved in the terminal, so as to prohibit starting of the operatingsystem that is of the terminal and in the standby state, where therecipient identifier list is used to save a recipient identifiercorresponding to the message received by the terminal from the outside,and the recipient identifier corresponds to the application software orthe operating system installed in the terminal; or removing the useridentifier included in the broadcast message from a recipient identifierlist saved in the terminal, so as to prohibit starting of the operatingsystem that is of the terminal and in the standby state.

With reference to any one of the first aspect or the first possibleimplementation manner of the first aspect to the third possibleimplementation manner of the first aspect, in a fourth possibleimplementation manner, the method further includes:

when it is determined that the broadcast message is a wanted broadcastmessage, if the user identifier included in the broadcast messagecorresponds to the operating system, starting the operating system thatis of the terminal and in the standby state; or if the user identifierincluded in the broadcast message corresponds to any applicationsoftware installed in the terminal, starting the operating system thatis of the terminal and in the standby state, and starting the anyapplication software.

With reference to any one of the first aspect or the first possibleimplementation manner of the first aspect to the fourth possibleimplementation manner of the first aspect, in a fifth possibleimplementation manner, the method further includes:

if the terminal is in a started state, when the message is a wantedbroadcast message and the user identifier included in the messagecorresponds to any locally installed application software, starting theany application software; or when the message is an unwanted broadcastmessage and the user identifier included in the broadcast messagecorresponds to any application software installed in the terminal,prohibiting starting of the any application software.

According to a second aspect, a terminal control apparatus is provided,including:

a detection unit, configured to detect a message received by a terminalfrom the outside;

a determining unit, configured to receive a detection result sent by thedetection unit, and when the detection result is that the message is abroadcast message, determine whether the broadcast message is anunwanted broadcast message; and

a startup prohibiting unit, configured to receive a determining resultsent by the determining unit, and when the determining result is thatthe broadcast message is an unwanted broadcast message, prohibitstarting of an operating system of the terminal, if the terminal is in astandby state.

With reference to the second aspect, in a first possible implementationmanner, the detection unit is specifically configured to:

obtain a user identifier included in the message, and if the useridentifier corresponds to any application software included in theterminal or the user identifier corresponds to the operating system ofthe terminal, determine that the message is a broadcast message; or

obtain a message type included in the message, and when the message typeis a broadcast message type, determine that the message is a broadcastmessage.

With reference to the second aspect or the first possible implementationmanner of the second aspect, in a second possible implementation manner,when configured to determine whether the broadcast message is anunwanted broadcast message, the determining unit is specificallyconfigured to: search a preset user identifier list for prohibitingstarting of an operating system for the user identifier included in thebroadcast message; and when the user identifier is included in thepreset user identifier list for prohibiting starting of an operatingsystem, determine that the broadcast message is an unwanted broadcastmessage.

With reference to the second aspect, the first possible implementationmanner of the second aspect, or the second possible implementationmanner of the second aspect, in a third possible implementation manner,the startup prohibiting unit is specifically configured to: obtain aprocess corresponding to the user identifier included in the broadcastmessage; obtain application software or an operating systemcorresponding to the process; obtain status information corresponding tothe application software or the operating system from a status listsaved in the terminal, where the status list is used to save statusinformation about whether each application software or the operatingsystem installed in the terminal is started; and when the statusinformation corresponding to the application software or the operatingsystem is the standby state, remove a recipient identifier correspondingto the broadcast message from a recipient identifier list saved in theterminal, so as to prohibit starting of the operating system that is ofthe terminal and in the standby state, where the recipient identifierlist is used to save a recipient identifier corresponding to the messagereceived by the terminal from the outside, and the recipient identifiercorresponds to the application software or the operating system; orremove the user identifier included in the broadcast message from arecipient identifier list saved in the terminal, so as to prohibitstarting of the operating system that is of the terminal and in thestandby state.

With reference to any one of the second aspect or the first possibleimplementation manner of the second aspect to the third possibleimplementation manner of the second aspect, in a fourth possibleimplementation manner, the apparatus further includes a startup unit,configured to: when it is determined that the broadcast message is awanted broadcast message, if the user identifier included in thebroadcast message corresponds to the operating system, start theoperating system that is of the terminal and in the standby state; or ifthe user identifier included in the broadcast message corresponds to anyapplication software installed in the terminal, start the operatingsystem that is of the terminal and in the standby state, and start theany application software.

With reference to any one of the second aspect or the first possibleimplementation manner of the second aspect to the fourth possibleimplementation manner of the second aspect, in a fifth possibleimplementation manner, the apparatus further includes a processing unit,configured to: if the terminal is in a started state, when the messageis a wanted broadcast message and the user identifier included in themessage corresponds to any application software installed in theterminal, start the any application software; or when the message is anunwanted broadcast message and the user identifier included in thebroadcast message corresponds to any application software installed inthe terminal, prohibit starting of the any application software.

According to a third aspect, a terminal device is provided, including:

a radio frequency RF circuit, configured to receive a message from theoutside, and send the received message to a processor; a memory,configured to save a software program and a module; and

the processor, configured to run the software program and the modulethat are saved in the memory to perform the following operations:detecting the message received by the RF circuit; when detecting thatthe message is a broadcast message, determining whether the broadcastmessage is an unwanted broadcast message; and when determining that thebroadcast message is an unwanted broadcast message, if the terminaldevice is in a standby state, prohibiting starting of an operatingsystem of the terminal device.

With reference to the third aspect, in a first possible implementationmanner, the detecting the message received by the terminal from theoutside includes:

obtaining a user identifier included in the message, and if the useridentifier corresponds to any application software included in theterminal device or the user identifier corresponds to the operatingsystem of the terminal device, determining that the message is abroadcast message; or

obtaining a message type included in the message, and when the messagetype is a broadcast message type, determining that the message is abroadcast message.

With reference to the third aspect or the first possible implementationmanner of the third aspect, in a second possible implementation manner,when configured to determine whether the broadcast message is anunwanted broadcast message, the processor is specifically configured to:search a preset user identifier list for prohibiting starting of anoperating system for the user identifier included in the broadcastmessage; and when the user identifier is included in the preset useridentifier list for prohibiting starting of an operating system,determine that the broadcast message is an unwanted broadcast message.

With reference to the third aspect, the first possible implementationmanner of the third aspect, or the second possible implementation mannerof the third aspect, in a third possible implementation manner, when thebroadcast message is an unwanted broadcast message, if the terminal isin a standby state, the prohibiting starting of an operating system ofthe terminal includes: obtaining a process corresponding to the useridentifier included in the broadcast message; obtaining applicationsoftware or an operating system corresponding to the process; obtainingstatus information corresponding to the application software or theoperating system from a status list saved in the memory; and when thestatus information corresponding to the application software or theoperating system is the standby state, removing a recipient identifiercorresponding to the broadcast message from a recipient identifier list,so as to prohibit starting of the operating system that is of theterminal device and in the standby state, or removing the useridentifier included in the broadcast message from a recipient identifierlist saved in the terminal, so as to prohibit starting of the operatingsystem that is of the terminal and in the standby state.

With reference to any one of the third aspect or the first possibleimplementation manner of the third aspect to the third possibleimplementation manner of the third aspect, in a fourth possibleimplementation manner, the processor is further configured to performthe following operation: when it is determined that the broadcastmessage is a wanted broadcast message, if the user identifier includedin the broadcast message corresponds to the operating system, startingthe operating system that is of the terminal device and in the standbystate; or if the user identifier included in the broadcast messagecorresponds to any application software installed in the terminaldevice, starting the operating system that is of the terminal device andin the standby state, and starting the any application software.

With reference to any one of the third aspect or the first possibleimplementation manner of the third aspect to the fourth possibleimplementation manner of the third aspect, in a fifth possibleimplementation manner, the processor is further configured to performthe following operation: if the terminal device is in a started state,when the message is a wanted broadcast message and the user identifierincluded in the message corresponds to any application softwareinstalled in the terminal device, starting the any application software;or when the message is an unwanted broadcast message and the useridentifier included in the broadcast message corresponds to anyapplication software installed in the terminal device, prohibitingstarting of the any application software.

In the embodiments of the present disclosure, a terminal detects amessage received from the outside; and when determining that the messageis a broadcast message, determines whether to start an operating systemaccording to whether the broadcast message is a wanted broadcastmessage. By using the technical solutions of the present disclosure, theterminal determines whether the received broadcast message is a wantedbroadcast message; and when the broadcast message is an unwantedbroadcast message and the operating system of the terminal is in astandby state, prohibits starting of the operating system. Therefore, aprocess of frequently starting the operating system is avoided whenthere are plenty of broadcast messages. In addition, the operatingsystem being not frequently awakened can effectively reduce energyconsumption of the terminal.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a flowchart of controlling a terminal according to anembodiment of the present disclosure;

FIG. 2A and FIG. 2B are a first flowchart of controlling a terminal in aspecific application scenario according to an embodiment of the presentdisclosure;

FIG. 3A and FIG. 3B are a second flowchart of controlling a terminal ina specific application scenario according to an embodiment of thepresent disclosure;

FIG. 4 is a schematic structural diagram of a terminal control apparatusaccording to an embodiment of the present disclosure; and

FIG. 5 is a schematic structural diagram of a terminal device accordingto an embodiment of the present disclosure.

DESCRIPTION OF EMBODIMENTS

The following further describes the embodiments of the presentdisclosure in detail with reference to the accompanying drawings of thisspecification.

Referring to FIG. 1, in an embodiment of the present disclosure, amethod in which a terminal controls starting of an operating systemincludes the following steps.

Step 100: Detect a message received by a terminal from the outside.

In this embodiment of the present disclosure, the terminal may receivemultiple types of messages from the outside, such as a short messageservice message sent by another terminal, a short message servicemessage sent by an operator, a message sent by a base station or thelike, a message sent by an application software service provider, and amessage sent by an operating system service provider. In this embodimentof the present disclosure, the message sent by the application softwareservice provider and the message sent by the operating system serviceprovider may be used as broadcast messages.

The terminal receives the multiple types of messages. Therefore, whenreceiving a message, the terminal should detect the received message anddetermine, according to a detection result, whether to start anoperating system.

Step 110: When detecting that the message is a broadcast message,determine whether the broadcast message is an unwanted broadcastmessage.

In this embodiment of the present disclosure, the terminal locallypre-establishes an application program for controlling the operatingsystem; determines whether the received message is a broadcast messageby using the application program for controlling the operating system;and when determining that the received message is a broadcast message,determines whether the broadcast message is an unwanted broadcastmessage and whether to control the operating system to start.

Optionally, a method in which the terminal determines whether thereceived message is a broadcast message by using the application programfor controlling the operating system includes: The message received bythe terminal includes a field describing a user identifier, and theterminal obtains, by using the field that describes the user identifierand is included in the message, the user identifier included in themessage; because the user identifier corresponds to application softwareor the operating system installed in the terminal, the terminal candetermine a recipient of the message according to the obtained useridentifier, where the recipient is any application software or theoperating system installed in the terminal; the terminal saves anidentifier of the recipient into a local recipient identifier list, andonly when a recipient identifier corresponding to the message receivedby the terminal is in the recipient identifier list, the terminal sendsthe received message to the recipient corresponding to the message; whenit is determined that the user identifier corresponds to any applicationsoftware installed in the terminal or the user identifier corresponds tothe operating system of the terminal, it is determined that the messageis a broadcast message. For example, when the terminal determines thatthe user identifier included in the message corresponds to WeChatapplication software, the terminal searches a locally installedapplication program for the WeChat application software; and when theWeChat application software is locally installed in the terminal, it isdetermined that the message is a broadcast message. Alternatively, themessage received by the terminal includes a field describing a messagetype, and the terminal obtains the message type included in the message,and determines that the message is a broadcast message when the messagetype is a broadcast message type.

Further, because the operating system corresponds to a specificbroadcast message in a fixed quantity, when the message is the specificbroadcast message, it may be determined that the message is a broadcastmessage corresponding to the operating system.

By using the technical solution, by using the application program forcontrolling the operating system and according to a corresponding fieldincluded the message received by the terminal, the terminal determineswhether the received message is a broadcast message. A determiningprocess is convenient and efficient, and a determining result has highaccuracy.

Step 120: When the broadcast message is an unwanted broadcast message,if the terminal is in a standby state, prohibit starting of an operatingsystem of the terminal.

In this embodiment of the present disclosure, the terminal determineswhether the message is an unwanted broadcast message by using theapplication program for controlling the operating system; and if themessage is an unwanted broadcast message, prohibits starting of theoperating system; or if the message is not an unwanted broadcastmessage, starts the operating system.

Optionally, a method in which the terminal determines whether thebroadcast message is an unwanted broadcast message by using theapplication program for controlling the operating system includes:searching a preset user identifier list for prohibiting starting of anoperating system for the user identifier included in the broadcastmessage, where the user identifier list for prohibiting starting of anoperating system includes one or more user identifiers for prohibitingstarting, and the user identifiers for prohibiting starting are presetuser identifiers for which an operating system is not allowed to bestarted, or the user identifiers for prohibiting starting are useridentifiers corresponding to forcibly removed application software oroperating system, or the user identifiers for prohibiting starting areuser identifiers corresponding to application software thatautomatically exits because of an exception, or the applicationidentifiers for prohibiting starting are user identifiers correspondingto application software that is newly installed in the terminal andwhose setting about whether to allow an operating system to start is notconfirmed; and when the user identifier included in the broadcastmessage is included in the preset user identifier list for prohibitingstarting of an operating system, determining that the broadcast messageis an unwanted broadcast message.

Optionally, when it is determined that the broadcast message is anunwanted broadcast message, a method for prohibiting starting of theoperating system specifically includes: locally obtaining, from theterminal, a process corresponding to the user identifier included in thebroadcast message; performing a reverse search according to the obtainedprocess, so as to obtain application software or an operating systemcorresponding to the process; obtaining status information correspondingto the application software or the operating system from a locally savedstatus list, where the status list includes status informationcorresponding to each application software or the operating system; andwhen the status information corresponding to the application software orthe operating system is the standby state, removing the recipientidentifier included in the recipient identifier list, so that thebroadcast message is not sent to the application software or theoperating system corresponding to the user identifier, and starting ofthe operating system and the application software is prevented.Optionally, the foregoing recipient identifier list includes the useridentifier corresponding to the message received by the terminal fromthe outside, and the terminal determines, by using the user identifier,that the broadcast message is a message corresponding to applicationsoftware or the broadcast message is a message corresponding to theoperating system.

Further, when the status information corresponding to the applicationsoftware or the operating system is a started state, no processing isperformed on the started application software or operating system.

Further, when the terminal determines that the broadcast message is awanted broadcast message by using the application program forcontrolling the operating system, the operating system is started if theuser identifier included in the broadcast message corresponds to theoperating system and the operating system is in the standby state; or ifthe user identifier included in the broadcast message corresponds to anyapplication software and the operating system is in the standby state,the operating system is started and the any application software isstarted, where the any application software is application softwareinstalled in the terminal.

Further, if the terminal is in a started state, when the message is awanted broadcast message and the user identifier included in the messagecorresponds to any locally installed application software, the anyapplication software is started; or when the message is an unwantedbroadcast message and the user identifier included in the broadcastmessage corresponds to any application software installed in theterminal, starting of the any application software is prohibited.

By using the technical solution in this embodiment of the presentdisclosure, a terminal removes, by using an application program of anoperating system, a recipient identifier or a user identifier includedin a recipient identifier list, so that an unwanted broadcast messagecannot be sent to a corresponding recipient, and purposes ofintercepting the unwanted broadcast message and prohibiting starting ofthe operating system are achieved. Therefore, a quantity of times inwhich the operating system is awakened in a standby process of theterminal is reduced. This can effectively reduce power consumption andincrease standby time of the terminal.

Application Scenario 1

Based on the technical solution, referring to FIG. 2A and FIG. 2B, thefollowing describes in detail a method in which a terminal prohibitsstarting of an operating system, by using an example in which theterminal is in a standby state and with reference to a specificapplication scenario.

Step 200: The terminal receives a message.

Step 210: The terminal determines whether the message is a broadcastmessage; and if the message is a broadcast message, perform step 220; orif the message is not a broadcast message, return to step 200.

Step 220: The terminal determines whether a user identifier included inthe message is included in a locally saved user identifier list forprohibiting starting of an operating system; and if the user identifierincluded in the message is included in the locally saved user identifierlist for prohibiting starting of an operating system, perform step 240;or if the user identifier included in the message is not included in thelocally saved user identifier list for prohibiting starting of anoperating system, perform step 230.

In this embodiment of the present disclosure, the user identifier listfor prohibiting starting of an operating system includes one or moreuser identifiers for prohibiting starting, and the user identifiers forprohibiting starting are preset user identifiers for which an operatingsystem is not allowed to be started, or the user identifiers forprohibiting starting are user identifiers corresponding to forciblyremoved application software or operating system, or the useridentifiers for prohibiting starting are user identifiers correspondingto application software that automatically exits because of anexception, or the application identifiers for prohibiting starting areuser identifiers corresponding to application software that is newlyinstalled in the terminal and whose setting about whether to allow anoperating system to start is not confirmed; and when the user identifierincluded in the broadcast message is included in the preset useridentifier list for prohibiting starting of an operating system, it isdetermined that the broadcast message is an unwanted broadcast message.

Step 230: The terminal obtains a user identifier included in thebroadcast message; and if the user identifier included in the broadcastmessage corresponds to the operating system, starts the operatingsystem; or if the user identifier included in the broadcast messagecorresponds to any application software, starts the operating system,and starts the any application software.

Step 240: The terminal locally obtains a process corresponding to theuser identifier included in the broadcast message, and obtainsapplication software or an operating system corresponding to theprocess; and then perform step 250.

Step 250: The terminal obtains status information corresponding to theapplication software or the operating system from a locally saved statuslist, and determines whether the status information corresponding to theapplication software or the operating system is a started state; and ifthe status information corresponding to the application software or theoperating system is the started state, perform step 260; or if thestatus information corresponding to the application software or theoperating system is not the started state, perform step 270.

Step 260: The terminal skips processing the started process.

Step 270: The terminal removes a recipient identifier that iscorresponding to the application software or the operating system and isincluded in the recipient identifier list, so that the broadcast messagecannot be sent to the application software or the operating system, andthe broadcast message is prevented from triggering the operating system.

By using the foregoing technical solution, a terminal determines whethera received broadcast message is a wanted broadcast message; and when thebroadcast message is an unwanted broadcast message and an operatingsystem of the terminal is in a standby state, prohibits starting of theoperating system. Therefore, a process of frequently starting theoperating system is avoided when there are plenty of broadcast messages.In addition, the operating system being not frequently awakened caneffectively reduce energy consumption of the terminal.

Application Scenario 2

Based on the technical solution, referring to FIG. 3A and FIG. 3B, thefollowing describes in detail a method in which a terminal awakensapplication software, by using an example in which the terminal is in astarted state and with reference to a specific application scenario.

Step 300: The terminal receives a message.

Step 310: The terminal determines whether the message is a broadcastmessage; and if the message is a broadcast message, perform step 320; orif the message is not a broadcast message, return to step 300.

Step 320: The terminal determines whether a user identifier included inthe message is included in a locally saved user identifier list forprohibiting starting of an operating system; and if the user identifierincluded in the message is included in the locally saved user identifierlist for prohibiting starting of an operating system, perform step 340;or if the user identifier included in the message is not included in thelocally saved user identifier list for prohibiting starting of anoperating system, perform step 330.

Step 330: The terminal obtains the user identifier included in thebroadcast message; and if the user identifier included in the broadcastmessage corresponds to any application software, starts the anyapplication software.

Step 340: The terminal locally obtains a process corresponding to theuser identifier included in the broadcast message, and obtainsapplication software corresponding to the process; and then perform step350.

Step 350: The terminal obtains status information corresponding to theapplication software from a locally saved status list, and determineswhether the status information corresponding to the application softwareis a started state; and if the status information corresponding to theapplication software is the started state, perform step 360; or if thestatus information corresponding to the application software is not thestarted state, perform step 370.

Step 360: The terminal skips processing the started process.

Step 370: The terminal removes a recipient identifier that iscorresponding to the application software and is included in therecipient identifier list, so that the broadcast message cannot be sentto the application software, and the broadcast message is prevented fromtriggering the application software.

By using the foregoing technical solution, a terminal determines whethera received broadcast message is a wanted broadcast message; and when thebroadcast message is an unwanted broadcast message, and an operatingsystem of the terminal is in a started state, prohibits awakening ofapplication software corresponding to the broadcast message. Therefore,a process of frequently awakening the application software is avoidedwhen there are plenty of broadcast messages. In addition, theapplication software being not frequently awakened can effectivelyreduce energy consumption of the terminal.

Based on the technical solution, referring to FIG. 4, an embodiment ofthe present disclosure further provides a terminal control apparatus,including a detection unit 40, a determining unit 41, and a startupprohibiting unit 42.

The detection unit 40 is configured to detect a message received by aterminal from the outside.

The determining unit 41 is configured to receive a detection result sentby the detection unit 40, and when the detection result is that themessage is a broadcast message, determine whether the broadcast messageis an unwanted broadcast message.

The startup prohibiting unit 42 is configured to receive a determiningresult sent by the determining unit 41, and when the determining resultis that the broadcast message is an unwanted broadcast message, prohibitstarting of an operating system of the terminal, if the terminal is in astandby state.

Optionally, the detection unit 40 is specifically configured to: obtaina user identifier included in the message, and if the user identifiercorresponds to any application software included in the terminal or theuser identifier corresponds to the operating system of the terminal,determine that the message is a broadcast message; or obtain a messagetype included in the message, and when the message type is a broadcastmessage type, determine that the message is a broadcast message.

Optionally, when configured to determine whether the broadcast messageis an unwanted broadcast message, the determining unit 41 isspecifically configured to: search a preset user identifier list forprohibiting starting of an operating system for the user identifierincluded in the broadcast message; and when the user identifier isincluded in the preset user identifier list for prohibiting starting ofan operating system, determine that the broadcast message is an unwantedbroadcast message.

Optionally, the startup prohibiting unit 42 is specifically configuredto: obtain a process corresponding to the user identifier included inthe broadcast message; obtain application software or an operatingsystem corresponding to the process; obtain status informationcorresponding to the application software or the operating system from astatus list saved in the terminal, where the status list is used to savestatus information about whether each application software or theoperating system installed in the terminal is started; and when thestatus information corresponding to the application software or theoperating system is the standby state, remove a recipient identifiercorresponding to the broadcast message from a recipient identifier listsaved in the terminal, so as to prohibit starting of the operatingsystem that is of the terminal and in the standby state, where therecipient identifier list is used to save a recipient identifiercorresponding to the message received by the terminal from the outside,and the recipient identifier corresponds to the application software orthe operating system; or remove the user identifier included in thebroadcast message from a recipient identifier list saved in theterminal, so as to prohibit starting of the operating system that is ofthe terminal and in the standby state.

Further, a startup unit 43 is further included and is configured to:when it is determined that the broadcast message is a wanted broadcastmessage, if the user identifier included in the broadcast messagecorresponds to the operating system, start the operating system that isof the terminal and in the standby state; or if the user identifierincluded in the broadcast message corresponds to any applicationsoftware installed in the terminal, start the operating system that isof the terminal and in the standby state, and start the any applicationsoftware.

Further, a processing unit 44 is further included and is configured to:if the terminal is in a started state, when the message is a wantedbroadcast message and the user identifier included in the messagecorresponds to any application software installed in the terminal, startthe any application software; or when the message is an unwantedbroadcast message and the user identifier included in the broadcastmessage corresponds to any application software installed in theterminal, prohibit starting of the any application software.

Based on the technical solution, referring to FIG. 5, FIG. 5 is aschematic structural diagram of a terminal device according to anembodiment of the present disclosure. The terminal device provided inthis embodiment of the present disclosure may be configured to implementthe methods implemented in the embodiments of the present disclosurethat are shown in FIG. 1 to FIG. 3A and FIG. 3B. For ease ofdescription, only a part related to this embodiment of the presentdisclosure is shown. For specific technical details that are notdisclosed, refer to the embodiments of the present disclosure that areshown in FIG. 1 to FIG. 3A and FIG. 3B.

The mobile terminal may be a terminal device such as a mobile phone, atablet, a notebook computer, an Ultra-mobile Personal Computer (UMPC), anetbook, or a Personal Digital Assistant (PDA). In this embodiment ofthe present disclosure, that the mobile terminal is a mobile phone isused as an example for description. FIG. 5 shows a block diagram of apartial structure of a mobile phone 500 related to the embodiments ofthe present disclosure.

As shown in FIG. 5, the mobile phone 500 includes components such as aradio frequency (RF) circuit 520, a memory 530, an input unit 550, adisplay unit 550, a detection unit 560, an audio frequency circuit 570,a processor 580, and a power supply 590. Persons skilled in the art mayunderstand that the structure of the mobile phone shown in FIG. 5constitutes no limitation on the mobile phone, and instead the mobilephone may include components more or fewer than those shown in thefigure, or a combination of some components, or have different componentarrangements.

The following describes the components of the mobile phone 500 in detailwith reference to FIG. 5.

The RF circuit 520 may be configured to receive and send a signal in aninformation receiving and sending process or a call process; and inparticular, after receiving downlink information of a base station, sendthe downlink information to the processor 580 for processing; and inaddition, send uplink data to the base station. Generally, the RFcircuit 520 includes but is not limited to an antenna, at least oneamplifier, a transceiver, a coupler, a low noise amplifier (LNA), aduplexer, and the like. In addition, the RF circuit 520 may furthercommunicate with a network and another device by means of wirelesscommunications. The wireless communications may use any communicationstandard or protocol that includes but is not limited to Global Systemfor Mobile Communications (GSM), general packet radio service (GPRS),Code Division Multiple Access (CDMA), Wideband Code Division MultipleAccess (WCDMA), Long Term Evolution (LTE), email, short message servicemessage service (SMS), and the like.

The memory 530 may be configured to save a software program and amodule, and the processor 580 executes various functional applicationsof the mobile phone 500 and performs data processing by running thesoftware program and the module saved in the memory 530. The memory 530may mainly include a program storage area and a data storage area. Theprogram storage area may save an operating system, an applicationprogram required by at least one function (such as an audio playbackfunction or a video playback function), and the like. The data storagearea may save data (such as audio data, video data, or a phonebook)created according to use of the mobile phone 500, and the like. Inaddition, the memory 530 may include a high-speed random access memory,and may further include a non-volatile memory, such as at least onemagnetic disk storage device, a flash device, or another volatilesolid-state storage device.

The input unit 540 may be configured to receive entered digits orcharacter information, and generate key signal input related to usersetting and function control of the mobile phone 500. Specifically, theinput unit 540 may include a touchscreen 541 and another input device542. The touchscreen 541 is also referred to as a touch panel, and maycollect a touch operation (such as an operation performed by a user onthe touchscreen 541 or near the touchscreen 541 by using any properobject or accessory, such as a finger or a stylus) on or near thetouchscreen, and drive a corresponding connection apparatus according toa preset program. Optionally, the touchscreen 541 may include two parts:a touch detection apparatus and a touch controller. The touch detectionapparatus detects a touch position of the user, detects a signal broughtby the touch operation, and send the signal to the touch controller. Thetouch controller receives touch information from the touch detectionapparatus, converts the touch information into contact coordinates,sends the contact coordinates to the processor 580, and can receive andexecute a command sent by the processor 580. In addition, thetouchscreen 541 may be implemented in multiple types, such as aresistive type, a capacitive type, infrared, and a surface acousticwave. The input unit 540 may include the another input device 542 inaddition to the touchscreen 541. Specifically, the another input device542 may include but is not limited to one or more of a physicalkeyboard, a function key (such as a volume control key or a power switchkey), a trackball, a mouse, a joystick, or the like.

The display unit 550 may be configured to display information entered bythe user or information provided for the user, and various menus of themobile phone 500. The display unit 550 may include a display panel 551,and optionally, the display panel 551 may be configured in a form of aLiquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), orthe like. Further, the touchscreen 541 may cover the display panel 551.When detecting a touch operation on or near the touchscreen 541, thetouchscreen 541 transmits the touch operation to the processor 580 todetermine a type of a touch event, and then the processor 580 providescorresponding visual output on the display panel 551 according to thetype of a touch event. In FIG. 5, the touchscreen 541 and the displaypanel 551 are used as two independent components to implement input andoutput functions of the mobile phone 500. However, in some embodiments,the touchscreen 541 and the display panel 551 may be integrated toimplement the input and output functions of the mobile phone 500.

The detection unit 560 may be configured to identify a touch object,detect a location in which the touch object points to the mobile phoneand that is above the touchscreen 541, and obtain a distance between thetouch object and the touchscreen of the mobile phone. The detection unit560 may include several cameras installed in two horizontal and verticalframes that are mutually perpendicular and on a touchscreen edge on aterminal screen, so as to collect an image above the touchscreen andthen obtain the location in which the touch object points to thetouchscreen and the distance between the touch object and thetouchscreen. The detection unit 560 may further include infrared sensorsinstalled in two horizontal and vertical frames that are mutuallyperpendicular and on a touchscreen edge on the terminal screen, so as toobtain the location in which the touch object points to the touchscreenand the distance between the touch object and the touchscreen. Inaddition, the detection unit 560 may further include several capacitorplates installed below the touchscreen. When the touch object approachesthe touchscreen, the capacitor plates can obtain a correspondingcapacitor value; and when the touch object is located in differentlocations above the touchscreen, the capacitor value is detected bydifferent capacitor plates. When a distance in which the touch object islocated above the touchscreen changes, capacitor values corresponding tothe capacitor plates changes; and the distance between the touch objectand the touchscreen is obtained by detecting a change of the capacitorvalue. In addition, the detection unit 560 may further obtain thelocation in which the touch object points to the touchscreen and thedistance between the touch object and the touchscreen by using acomponent configured to measure inductance or magnetic field strengthand by means of an inductance change or a magnetic field change.

The mobile phone 500 may further include other various sensors, such asa light sensor and a gravity sensor. Specifically, a light sensor mayinclude an ambient light sensor and an optical proximity sensor. Theambient light sensor may adjust brightness of the display panel 551according to brightness of ambient light. The optical proximity sensormay detect whether there is an object approaching or touching the mobilephone, and may close the display panel 551 and/or backlight when themobile phone 500 approaches an ear. The gravity sensor (gravity sensor)may detect an acceleration value that is of the mobile phone and in eachdirection (generally three axes), may detect a value and a direction ofgravity when the gravity sensor is static, and may be applicable toapplications for identifying a mobile phone posture (such as a switchbetween landscape and portrait screens, related games, and magnetometerposture calibration), a function related to vibration recognition (apedometer or a knock), and the like. Other sensors such as a gyroscope,a barometer, a hygrometer, a thermometer, an infrared sensor may also bedisposed on the mobile phone 500, and details are not described herein.

An audio circuit 570, a loudspeaker 571, and a microphone 572 mayprovide audio interfaces between the user and the mobile phone 500. Theaudio circuit 570 may transmit an electrical signal that is convertedfrom received audio data to the loudspeaker 571, and the loudspeaker 571converts the electrical signal into a sound signal for output. On theother hand, the microphone 572 converts a collected sound signal into anelectrical signal; and the electrical signal is received by the audiocircuit 570 and is converted into audio data, and then the audio data isoutput to the RF circuit 520 and is sent to, for example, another mobilephone, or the audio data is output to the memory 530 for furtherprocessing.

The processor 580 is a control center of the mobile phone 500, and usesvarious interfaces and lines to connect all parts of the entire mobilephone. By running or executing a software program and/or a module savedin the memory 530 and invoking data saved in the memory 530, theprocessor 580 executes various functions of the mobile phone 500 andprocesses data so as to perform overall monitoring on the mobile phone.Optionally, the processor 580 may include one or more processing units.Preferably, an application processor and a modulation and demodulationprocessor may be integrated into the processor 580, where theapplication processor mainly processes an operating system, a userinterface, an application program, and the like; and the modulation anddemodulation processor mainly processes wireless communications. It maybe understood that the modulation and demodulation processor may not beintegrated into the processor 580.

The mobile phone 500 further includes the power supply 590 (such as abattery) that supplies power to each part. Preferably, the power supplymay be logically connected to the processor 580 by using a powermanagement system, so as to implement functions such as charging anddischarging management, and power consumption management by using thepower management system.

Although not shown, the mobile phone 500 may further include a WirelessFidelity (Wi-Fi) module, a Bluetooth module, and the like, and detailsare not described herein.

In this embodiment of the present disclosure, the RF circuit 520 isconfigured to receive a message from the outside, and send the receivedmessage to the processor 580.

The processor 580 is configured to detect the message received by the RFcircuit 520; when detecting that the message is a broadcast message,determine whether the broadcast message is an unwanted broadcastmessage; and when the broadcast message is an unwanted broadcastmessage, if the terminal device is in a standby state, prohibit startingof an operating system of the terminal device.

Optionally, when detecting the message received by the terminal from theoutside, the processor 580 is specifically configured to: obtain a useridentifier included in the message, and if the user identifiercorresponds to any application software included in the terminal deviceor the user identifier corresponds to the operating system of theterminal device, determine that the message is a broadcast message; orobtain a message type included in the message, and when the message typeis a broadcast message type, determine that the message is a broadcastmessage.

Optionally, the memory 530 is further configured to save a useridentifier list for prohibiting starting of an operating system. Theuser identifier list for prohibiting starting of an operating systemincludes a user identifier for which starting of an operating system isnot allowed to be triggered.

Optionally, when configured to determine whether the broadcast messageis an unwanted broadcast message, the processor 580 is specificallyconfigured to: search a preset user identifier list for prohibitingstarting of an operating system for the user identifier included in thebroadcast message; and when the user identifier is included in thepreset user identifier list for prohibiting starting of an operatingsystem, determine that the broadcast message is an unwanted broadcastmessage.

Optionally, the memory 530 is further configured to save a status list.The status list is used to save status information of each applicationsoftware or the operating system.

Optionally, the memory 530 is further configured to save the statuslist, where the status list is used to save status information aboutwhether each application software or the operating system installed inthe terminal device is started; and save a recipient identifier list,where the recipient identifier list is used to save a recipientidentifier corresponding to the message received by the terminal device,and the recipient identifier corresponds to the application software orthe operating system.

Optionally, when the broadcast message is an unwanted broadcast messageand the terminal is located in the standby state, that the processor 580prohibits starting of the operating system of the terminal isspecifically: The processor 580 obtains a process corresponding to theuser identifier included in the broadcast message; obtains applicationsoftware or an operating system corresponding to the process; andobtains status information corresponding to the application software orthe operating system from a status list saved in the memory 530; andwhen the status information corresponding to the application software orthe operating system is the standby state, removes a recipientidentifier corresponding to the broadcast message from the recipientidentifier list, so as to prohibit starting of the operating system thatis of the terminal device and in the standby state, or removes the useridentifier included in the broadcast message from the recipientidentifier list saved in the terminal, so as to prohibit starting of theoperating system that is of the terminal and in the standby state.

Further, the processor 580 is further configured to: when it isdetermined that the broadcast message is a wanted broadcast message, ifthe user identifier included in the broadcast message corresponds to theoperating system, start the operating system that is of the terminaldevice and in the standby state; or if the user identifier included inthe broadcast message corresponds to any application software installedin the terminal device, start the operating system that is of theterminal device and in the standby state, and start the any applicationsoftware.

Further, the processor 580 is further configured to: if the terminaldevice is in a started state, when the message is a wanted broadcastmessage and the user identifier included in the message corresponds toany application software installed in the terminal device, start the anyapplication software; or when the message is an unwanted broadcastmessage and the user identifier included in the broadcast messagecorresponds to any application software installed in the terminaldevice, prohibit starting of the any application software.

In conclusion, in this embodiment of the present disclosure, whendetermining that a currently received message is a broadcast message, aterminal determines whether the broadcast message is an unwantedbroadcast message according to a user identifier included in thebroadcast message; and when determining that the broadcast message is anunwanted broadcast message, reversely searches for a recipientidentifier corresponding to the unwanted broadcast message, and removesthe recipient identifier from a recipient identifier list, so that therecipient skips receiving the foregoing unwanted broadcast message. Thisavoids triggering starting of an operating system after applicationsoftware or the operating system receives the foregoing unwantedbroadcast message, thereby avoiding a problem of high system powerconsumption caused by frequent starting of the operating system,reducing the system power consumption, and extending usage time of theterminal.

Persons skilled in the art should understand that the embodiments of thepresent disclosure may be provided as a method, an operating system, ora computer program product. Therefore, the present disclosure may use aform of hardware only embodiments, software only embodiments, orembodiments with a combination of software and hardware. Moreover, thepresent disclosure may use a form of a computer program product that isimplemented on one or more computer-usable storage media (including butnot limited to a disk memory, a CD-ROM, an optical memory, and the like)that include computer-usable program code.

The present disclosure is described with reference to the flowchartsand/or block diagrams of the method, the device (operating system), andthe computer program product according to the embodiments of the presentdisclosure. It should be understood that computer program instructionsmay be used to implement each process and/or each block in theflowcharts and/or the block diagrams and a combination of a processand/or a block in the flowcharts and/or the block diagrams. Thesecomputer program instructions may be provided for a general-purposecomputer, a dedicated computer, an embedded processor, or a processor ofany other programmable data processing device to generate a machine, sothat the instructions executed by a computer or a processor of any otherprogrammable data processing device generate an apparatus forimplementing a specific function in one or more processes in theflowcharts and/or in one or more blocks in the block diagrams.

These computer program instructions may be saved in a computer readablememory that can instruct the computer or any other programmable dataprocessing device to work in a specific manner, so that the instructionssaved in the computer readable memory generate an artifact that includesan instruction apparatus. The instruction apparatus implements aspecific function in one or more processes in the flowcharts and/or inone or more blocks in the block diagrams.

These computer program instructions may be loaded onto a computer oranother programmable data processing device, so that a series ofoperations and steps are performed on the computer or the anotherprogrammable device, thereby generating computer-implemented processing.Therefore, the instructions executed on the computer or the anotherprogrammable device provide steps for implementing a specific functionin one or more processes in the flowcharts and/or in one or more blocksin the block diagrams.

Although some preferred embodiments of the present disclosure have beendescribed, persons skilled in the art can make changes and modificationsto these embodiments once they learn the basic inventive concept.Therefore, the following claims are intended to be construed as to coverthe preferred embodiments and all changes and modifications fallingwithin the scope of the present disclosure.

Obviously, persons skilled in the art can make various modifications andvariations to the embodiments of the present disclosure withoutdeparting from the spirit and scope of the embodiments of the presentdisclosure. The present disclosure is intended to cover thesemodifications and variations provided that they fall within the scope ofprotection defined by the following claims and their equivalenttechnologies.

1.-18. (canceled)
 19. A terminal control method, comprising: detecting,by the terminal, a message received by the terminal from a source thatis outside of the terminal; determining, by the terminal, whether themessage is an unwanted broadcast message when detecting that the messageis a broadcast message; and prohibiting, by the terminal, starting of anoperating system of the terminal when the message is an unwantedbroadcast message and the terminal is in a standby state.
 20. The methodaccording to claim 19, wherein detecting, by the terminal, the messagereceived by the terminal from a source that is outside of the terminalcomprises: obtaining, by the terminal, a user identifier comprised inthe message; and determining, by the terminal, that the message is abroadcast message when the user identifier corresponds to anyapplication software comprised in the terminal.
 21. The method accordingto claim 19, wherein detecting, by the terminal, the message received bythe terminal from a source that is outside of the terminal comprises:obtaining, by the terminal, a user identifier comprised in the message;and determining, by the terminal, that the message is a broadcastmessage when the user identifier corresponds to the operating system ofthe terminal.
 22. The method according to claim 19, wherein detecting,by the terminal, the message received by the terminal from a source thatis outside of the terminal comprises: obtaining, by the terminal, amessage type comprised in the message; and determining, by the terminal,that the message is a broadcast message when the message type is abroadcast message type.
 23. The method according to claim 19, whereindetermining, by the terminal, whether the message is an unwantedbroadcast message comprises: determining, by the terminal, whether apreset user identifier list for prohibiting starting of an operatingsystem comprises a user identifier comprised in the message; anddetermining, by the terminal, that the message is an unwanted broadcastmessage when the preset user identifier list comprises the useridentifier.
 24. The method according to claim 19, wherein prohibiting,by the terminal, starting of an operating system of the terminal whenthe message is an unwanted broadcast message and the terminal is in astandby state comprises: obtaining, by the terminal, a processcorresponding to a user identifier comprised in the message; obtaining,by the terminal, application software or an operating systemcorresponding to the process; obtaining, by the terminal, statusinformation corresponding to the application software or the operatingsystem from a status list saved in the terminal, wherein the status listis used to save status information about whether each applicationsoftware or the operating system installed in the terminal is started;and removing, by the terminal, the user identifier or a recipientidentifier corresponding to the message from a recipient identifier listsaved in the terminal when the status information corresponding to theapplication software or the operating system is the standby state, so asto prohibit starting of the operating system that is of the terminal andin the standby state, wherein the recipient identifier list is used tosave a recipient identifier corresponding to the message received by theterminal from the outside, and the recipient identifier corresponds tothe application software or the operating system installed in theterminal.
 25. The method according to claim 19, further comprising:starting, by the terminal, the operating system that is of the terminaland in the standby state when it is determined that the message is awanted broadcast message and a user identifier comprised in the messagecorresponds to the operating system.
 26. The method according to claim19, further comprising: starting, by the terminal, the operating systemthat is of the terminal and in the standby state, and starting anapplication software when it is determined that the message is a wantedbroadcast message and the user identifier comprised in the messagecorresponds to the application software installed in the terminal. 27.The method according to claim 19, further comprising: starting, by theterminal, an application software installed in the terminal when theterminal is in a started state, the message is a wanted broadcastmessage and a user identifier comprised in the message corresponds tothe application software.
 28. The method according to claim 19, furthercomprising: prohibiting, by the terminal, starting of an applicationsoftware installed in the terminal when the terminal is in a startedstate, the message is an unwanted broadcast message and a useridentifier comprised in the message corresponds to the applicationsoftware.
 29. A terminal device, comprising: a processor; a radiofrequency (RF) circuit, configured to receive a message from a sourcethat is outside of the terminal device and send the received message tothe processor; memory coupled to the processor, the memory configured tostore instructions that, when executed by the processor, cause theterminal device to: detect the message received by the RF circuit;determine whether the message is an unwanted broadcast message whendetecting that the message is a broadcast message; and prohibit startingof an operating system of the terminal device when the message is anunwanted broadcast message and the terminal device is in a standbystate.
 30. The terminal device according to claim 29, wherein the memoryis further configured to store instructions that, when executed by theprocessor, cause the terminal device to: obtain a user identifiercomprised in the message; and determine that the message is a broadcastmessage when the user identifier corresponds to any application softwarecomprised in the terminal device.
 31. The terminal device according toclaim 29, wherein the memory is further configured to store instructionsthat, when executed by the processor, cause the terminal device to:obtain a user identifier comprised in the message; and determine thatthe message is a broadcast message when the user identifier correspondsto the operating system of the terminal device.
 32. The terminal deviceaccording to claim 29, wherein the memory is further configured to storeinstructions that, when executed by the processor, cause the terminaldevice to: obtain a message type comprised in the message; and determinethat the message is a broadcast message when the message type is abroadcast message type.
 33. The terminal device according to claim 29,wherein the memory is further configured to store instructions that,when executed by the processor, cause the terminal device to: determinewhether a preset user identifier list for prohibiting starting of anoperating system comprises an user identifier comprised in the message;and determine that the message is an unwanted broadcast message when thepreset user identifier list comprises the user identifier.
 34. Theterminal device according to claim 29, wherein the memory is furtherconfigured to store instructions that, when executed by the processor,cause the terminal device to: obtain a process corresponding to an useridentifier comprised in the message; obtain application software or anoperating system corresponding to the process; obtain status informationcorresponding to the application software or the operating system from astatus list saved in the memory, wherein the status list is used to savestatus information about whether each application software or theoperating system installed in the terminal device is started; remove theuser identifier or a recipient identifier corresponding to the messagefrom a recipient identifier list saved in the terminal device when thestatus information corresponding to the application software or theoperating system is the standby state, so as to prohibit starting of theoperating system that is of the terminal device and in the standbystate; and wherein the recipient identifier list is used to save arecipient identifier corresponding to the message, and the recipientidentifier corresponds to the application software or the operatingsystem installed in the terminal device.
 35. The terminal deviceaccording to claim 29, wherein the memory is further configured to storeinstructions that, when executed by the processor, cause the terminaldevice to: start the operating system that is of the terminal device andin the standby state when it is determined that the message is a wantedbroadcast message and a user identifier comprised in the messagecorresponds to the operating system.
 36. The terminal device accordingto claim 29, wherein the memory is further configured to storeinstructions that, when executed by the processor, cause the terminaldevice to: start the operating system that is of the terminal device andin the standby state, and start an application software when it isdetermined that the message is a wanted broadcast message and the useridentifier comprised in the message corresponds to the applicationsoftware installed in the terminal device.
 37. The terminal deviceaccording to claim 27, wherein the memory is further configured to storeinstructions that, when executed by the processor, cause the terminaldevice to: start an application software installed in the terminaldevice when the terminal device is in a started state, the message is awanted broadcast message and an user identifier comprised in the messagecorresponds to the application software.
 38. The terminal deviceaccording to claim 27, wherein the memory is further configured to storeinstructions that, when executed by the processor, cause the terminaldevice to: prohibit starting of an application software installed in theterminal device when the terminal device is in a started state, themessage is an unwanted broadcast message and an user identifiercomprised in the message corresponds to the application software.