Short message reading method and apparatus

A technology for reading short messages and short messages, which is applied in the field of information security to avoid leakage and achieve the effect of permission control.

Active Publication Date: 2016-02-03
XIAOMI INC
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that a third-party application can read the text message content in the text message component when it only has the text message reading pe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message reading method and apparatus
  • Short message reading method and apparatus
  • Short message reading method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0095] In order to make the objectives, technical solutions and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.

[0096] First, a few terms involved in the present disclosure are briefly introduced:

[0097] Android operating system: A Linux-based free and open source operating system produced by Google, which is mainly used in mobile terminals. The mobile terminal may be a mobile phone, a tablet computer, an e-book reader, an MP3 player (MovingPictureExpertsGroupAudioLayerIII, the standard audio layer 3 of the moving picture expert compression), MP4 (MovingPictureExpertsGroupAudioLayerIV, the standard audio layer 4 of the moving picture expert compression) player and a laptop Laptops, etc.

[0098] Application: In the Android operating system, an application usually includes at least one program component. Program components are divided into four type...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short message reading method and apparatus and belongs to the field of information security. The short message reading method comprises the following steps of receiving a short message reading request by a third party application program, detecting whether reading time for reading the request is within a short message forbidding visit period when the short message carries sensitive information, and making no respond to the reading request when the reading time belongs to the forbidding visit period. A problem can be solved that malignant application program acquires a permission for executing sensitive operations via reading verification codes in the short message when a third party application program can read short message content in a short message assembly when only owning a short message reading permission from the perspective of operation system. By the use of the method, the third party application program cannot read short message content in the forbidding visit period in light of short message carrying sensitive information, so sensitive information in the short message can be prevented from being leaked in the forbidding visiting period; and single short message granularity permission can be controlled.

Description

technical field [0001] The invention relates to the field of information security, in particular to a short message reading method and device. Background technique [0002] Using a verification code carried in a short message (English: ShortMessageService, abbreviation: SMS) for security verification is a common identity verification method at present. [0003] In the Android (English: Android) operating system, a third-party application program may have permission to read short messages. If the third-party application program is a malicious application program, the authority to perform sensitive operations, such as the authority to perform payment operations, the authority to perform registration and login, etc., can be obtained by reading the verification code in the short message. Contents of the invention [0004] In order to solve the problem that a third-party application can read the text message content in the text message component when it only has the text messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04W4/14
CPCG06F21/6209G06F21/6281G06F2221/2141H04W4/14H04L63/108H04W12/02H04W12/08H04W4/12H04W12/03G06Q20/322H04L63/04
Inventor 洪锋赵建凯杨万坤张建春
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products