Message reading method and apparatus thereof

A message and message identification technology, applied in the computer field, can solve problems such as personal privacy or business secret leakage, user life or work safety hazards, etc., to achieve the effect of protecting messages, high security, and improving security

Inactive Publication Date: 2017-05-31
BEIJING QIHOO TECH CO LTD +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the mobile phone is lost, the party who finds it can directly open the mobile phone to obtain all the text message content on the mobile phone, or if the email account is stolen, the thief only needs to click to log in to the email account to obtain all the email content, which is easy Leakage of personal privacy or business secrets, which will cause some security risks to users' lives or work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message reading method and apparatus thereof
  • Message reading method and apparatus thereof
  • Message reading method and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0062] In order to solve the above technical problem, an embodiment of the present invention provides a message reading method. figure 1 A processing flowchart of a message reading method according to an embodiment of the present invention is shown. see figure 1 , the method at least includes the following steps S102 to S108.

[0063] First, the embodiment of the present invention executes step S102 to display at least one received...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a message reading method and an apparatus thereof. The method comprises the following steps of displaying at least one received message on a terminal interface as a contracted form of a message identification, wherein the message in a terminal is provided with a reading threshold corresponding to a special-purpose eID; when a reading operation initiated aiming at the message identification is received, determining whether there is eID input; if there is the eID input, carrying out identity verification on the input eID; and if the input eID passes the identity verification and matches with the special-purpose eID, determining that the input eID passes the reading threshold, playing a specific content of the at least one received message on the interface so that a user can read. By using the method of the invention, the message received by the terminal is protected and a condition that a received message content is easily acquired by other users and even malicious users is avoided, and high safety is possessed.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a method and device for reading messages. Background technique [0002] With the rapid development of communication technology and network technology, users can use terminals, mobile terminals, or instant messaging applications (Applications, APPs) running on terminals to receive messages. For example, users directly receive text or Picture information; users can receive messages in various forms such as text, images, and sounds sent by other network users through the email client. [0003] In the prior art, after a user receives a message from a terminal or instant messaging APP, he only needs to click to open the corresponding terminal or instant messaging APP, and then he can read all the contents of the message. Among them, the messages read by the user often include some personal privacy information or business secrets, such as ID number, bank card number, home address, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04L9/32H04M1/72409H04M1/72436
CPCH04L9/3234H04M1/72409H04M1/72436
Inventor 王务志王军
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products