Short message reading method and apparatus

A text message reading and text message technology, applied in the field of information security, to achieve the effect of avoiding the leakage of sensitive information

Inactive Publication Date: 2016-01-20
XIAOMI INC
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that a third-party application can read the text message content in the text message component when it only has the text message reading permission at the operating system level, resulting in malicious Regarding the issue of authority, the present disclosure provides a method and device for reading short messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message reading method and apparatus
  • Short message reading method and apparatus
  • Short message reading method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0098] First, several nouns involved in this disclosure are briefly introduced:

[0099] Android operating system: a free and open-source operating system based on Linux produced by Google, the United States, mainly used in mobile terminals. The mobile terminal can be a mobile phone, a tablet computer, an electronic book reader, an MP3 player (MovingPictureExpertsGroupAudioLayerIII, m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a short message reading method and apparatus, and belongs to the field of information security. The short message reading method comprises: receiving a reading request of a third-party application to a short message; if the short message carries sensitive information, performing invisible processing on the sensitive information in the short message; and feeding back the processed short message to the third-party application. The problem that a malicious application obtains a right of executing a sensitive operation by reading a verification code in the short message due to the fact that the third-party application can read short message content in a short message component only when having a short message reading right of an operation system level is solved; and the effect of forbidding the third-party application to read the short message carrying the sensitive information so as to avoid leakage of the sensitive information in the short message is achieved, and meanwhile the effect of right control on single short message granularity is achieved.

Description

technical field [0001] The present disclosure relates to the field of information security, in particular to a short message reading method and device. Background technique [0002] Using a verification code carried in a short message (English: ShortMessageService, abbreviation: SMS) for security verification is a common identity verification method at present. [0003] In the Android (English: Android) operating system, a third-party application program may have permission to read short messages. If the third-party application program is a malicious application program, the authority to perform sensitive operations, such as the authority to perform payment operations, the authority to perform registration and login, etc., can be obtained by reading the verification code in the short message. Contents of the invention [0004] In order to solve the problem that a third-party application can read the text message content in the text message component when it only has the t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6209G06F21/6281G06F2221/2141G06F21/42G06F21/6245G06Q20/3255G06Q20/385H04L63/0838H04L63/0853H04L63/18H04W12/08H04L63/0428H04W4/14H04W4/18G06F21/6218H04W12/02H04L63/0846
Inventor 鲍协浩张建春赵建凯
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products