Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting short message security

A short message and security technology, applied in the field of information security, can solve problems such as easy loss, leakage, interception of short messages, etc., and achieve the effect of meeting confidentiality requirements and ensuring security

Inactive Publication Date: 2016-06-08
BEIJING QIHOO TECH CO LTD +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the traditional informatization model, there are three major security risks in the BYOD environment: first, it is connected through a mobile network link, which is naturally in an open network, while traditional important information systems are connected through the enterprise intranet. secondly, the usage environment is different from the traditional informatization model, most of the traditional time is in a fixed office, and the possibility of device loss is very small, while BYOD usually uses mobile terminals, which are more likely to be lost; thirdly, BYOD uses Many personal APPs are often installed on personal devices at the same time, and there are a lot of malware in the personal APP market, which puts corporate data at risk of security
[0003] Therefore, in the process of enterprise employees using mobile terminals to send text messages, text messages may be intercepted and leaked.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting short message security
  • Method and device for protecting short message security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0048] figure 1 shows a flow chart of a method for protecting short message security according to an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0049] Step S110, when detecting a short message sending operation on the mobile terminal, it is judged whether the secure short message function is enabled.

[0050] That is to say, the secure short message function is optional. For example, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Method and device for protecting short message security. The method comprises following steps: when detecting a short message sending operation on a mobile terminal, judging whether a secure short message function is started; if the function is started, encrypting the short message data according to an encryption and decryption algorithm in an appointed storage module; sending the short message data to an opposite party through a mobile phone network; decrypting the opposite party short message data according to the encryption and decryption algorithm in the appointed storage module, wherein the opposite party short message data are received through the mobile phone network; in this way, the transmitted short message data in the short message process are encrypted; the security of the short message contents is ensured; and the confidentiality demands of enterprises can be satisfied.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and device for protecting short message security. Background technique [0002] With the maturity and popularity of mobile terminals, personal mobile terminals represented by mobile phones and tablet computers have gradually entered the enterprise field. This phenomenon is called Bring Your Own Device (BYOD). Compared with the traditional informatization model, there are three major security risks in the BYOD environment: first, it is connected through a mobile network link, which is naturally in an open network, while traditional important information systems are connected through the enterprise intranet. secondly, the usage environment is different from the traditional informatization model, most of the traditional time is in a fixed office, and the possibility of device loss is very small, while BYOD usually uses mobile terminals, which are more likely to be lost; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W4/14H04W12/033H04W12/0471H04W12/069
CPCH04W4/14H04W12/02H04W12/04H04W12/06
Inventor 郭雪奇杨智勇
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products