Reading method and device for verification information

A technology for verifying information and verifying terminals, which is applied in the field of controlling application programs to read verification information, so as to prevent the theft of verification information and ensure information security.

Active Publication Date: 2015-12-30
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For systems before Android 4.4 (most of the Android phones currently on the market), the Trojan horse can even delete the tex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reading method and device for verification information
  • Reading method and device for verification information
  • Reading method and device for verification information

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0039] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0040] As mentioned above, in the prior art, for example, using SMS to obtain verification information is the last security measure. However, because malicious Trojan horses can read SMS, this last so-called secure mobile phone SMS verification is not so secure. The core problem of this situation is that any application (or called: software, APP) may directly read the verification code short message, so that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reading method and device for verification information. The method comprises the steps that a safety APP strategy is set on a terminal for reading the verification information, wherein the verification information is a message used for verifying the identity or authority of a terminal or a user in a specific service execution process; after the terminal receives the verification information from a network device, application programs request to obtain the verification information; whether the application programs accord with the safety APP strategy is judged, and according to the judgment result, only the application programs according with the safety APP strategy are allowed to read the verification information; and the verification information is utilized to verify the identity or authority of the terminal or the user in the specific service execution process. According to the invention, the safety APP strategy is set in advance, only the APPs according with the safety APP strategy are allowed to access the verification information, and malicious application programs such as Trojan cannot read the verification information under the condition that the malicious application programs do not accord with the safety APP strategy, so that the invalid application programs are effectively prevented from stealing the accord with the verification information, and the information safety is ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for controlling application programs to read verification information. Background technique [0002] In existing mobile services, users are often required to use verification information to perform operations to ensure service security. Users can obtain verification information through text messages or emails. For example, when registering an account or making payment with a mobile phone, the server needs to send a short message to the current mobile phone number for identity verification, and the short message is sent in plain text. But at present some operating systems (such as Android) platforms are relatively open, and any software can read the text message content at will after registering the text message permission, which causes great hidden danger in safety. [0003] In many authentications, especially in the payment process, SMS verificatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04W4/14G06F21/62
CPCG06F21/35H04L9/3226H04L63/101H04L63/12H04L2209/80H04W12/08G06F21/56G06F2221/033
Inventor 胡宇光
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products