Counterfeit short message identification method, mobile phone terminal, server, and system

A technology of SMS server and mobile phone terminal, which is applied in the field of information security and can solve the problems of high threat to mobile phone user information and property security.

Active Publication Date: 2016-09-07
CHINA UNIONPAY
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a method for identifying counterfeit text messages, a mobile phone terminal, a server, and a system to solve the problem that there is current

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Counterfeit short message identification method, mobile phone terminal, server, and system
  • Counterfeit short message identification method, mobile phone terminal, server, and system
  • Counterfeit short message identification method, mobile phone terminal, server, and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0106] Such as figure 1 As shown, a method for identifying counterfeit text messages provided by the embodiment of the present invention is described with a mobile phone terminal as the execution subject, and the method includes:

[0107] Step 101, obtaining the content of the short message and the sender's number for sending the short message to the mobile terminal.

[0108] Step 102. Determine whether the sender's number belongs to the real and valid number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a counterfeit short message identification method, a mobile phone terminal, a server, and a system, relating to the technical field of information security. The method includes acquiring the short message content and sending the sender number of the short message to the mobile phone terminal; determining whether the sender number is a real effective number of an enterprise and whether the sender number is in an enterprise interest list; if the sender number is a real effective number of the enterprise and the sender number is in the enterprise interest list, generating the verification data related to the short message content; sending the verification request with the verification data to a server device; receiving the verification result transmitted by the server device; and based on the verification result, making a mark on the display interface of the mobile phone terminal to indicate whether the short message is a counterfeit message. Therefore, the problem that the counterfeit message is a big threat to the information and the property security of a mobile phone user can be solved.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for identifying counterfeit short messages, a mobile phone terminal, a server and a system. Background technique [0002] With the continuous development of telecommunication services, the current business exchanges between various enterprises and users are increasingly inseparable from information services. For example, users handle business with banks and telecom operators through SMS, and give feedback and evaluation to shopping websites. [0003] However, currently some lawbreakers use pseudo-base station technology to pretend to be others (such as banks and telecom operators) and send counterfeit text messages to users to achieve the purpose of defrauding users. Pseudo base station technology generally searches mobile phone card information centered on it and within a certain radius through SMS group senders, SMS transmitters and other related equipmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/14H04W12/12H04W12/128
CPCH04W4/14H04W12/12
Inventor 刘发章赵海何朔华锦芝杨阳
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products