Website login method and terminal

A login method and website technology, applied in the electronic field, can solve problems such as money theft and information leakage, and achieve the effect of protecting security and improving security

Inactive Publication Date: 2017-05-31
SHENZHEN GIONEE COMM EQUIP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since mobile phone users cannot choose to receive text messages, they are mandatory and passive. The text messages sent by scammers to mobile phone users can compel users to receive them. Such text messages often contain URL links of Trojan horse programs. Inadvertently click on the URL link in such a text message to log in to the website, so your information will be leaked or your money will be stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website login method and terminal
  • Website login method and terminal
  • Website login method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0027] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a website login method and a terminal. The method comprises steps: if a short message is received, whether a website link exists in the short message content is detected; if the website link exists in the short message content, whether the website link is a safe website link or an illegal website link is recognized; and a prompt interface is generated according to operation on the short message by the user to prevent the user from clicking on the illegal website link to open the illegal website link. According to the embodiment of the invention, whether the website link exists in the short message content received by the terminal is detected, whether the website link is a safe website link or an illegal website link is recognized, the prompt interface is generated according to operation information of the user and the user can be effectively prevented from opening the illegal website link to log in to the illegal website through the prompt interface, and thus, the terminal communication safety is improved, and the privacy of the user and the safety of the money are further protected.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a website login method and a terminal. Background technique [0002] At present, there are endless fraudulent means to obtain money or private information of mobile phone users through SMS channels, such as setting traps for winning prizes, publishing lottery winning information, and stealing bank card information. These fraudulent methods mainly use the method of short message transmission, and the transmission of short messages is characterized by convenience and speed. Scammers can use specialized tools such as bulk SMS senders to send mass text messages to thousands of mobile phone users in a short period of time. Since mobile phone users cannot choose to receive text messages, they are mandatory and passive. The text messages sent by scammers to mobile phone users can compel users to receive them. Such text messages often contain URL links of Trojan horse programs. Ina...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04L29/06
CPCH04L63/1416H04L63/1441H04M1/7243H04M1/72436H04M1/72454H04M1/72463
Inventor 刘海强
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products