Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for sending and presenting message, an identity authentication method and apparatus

A technology for identity authentication and message sending, which is applied in the field of information processing and can solve problems such as unfavorable users, personal and property losses of recipients, and privacy leakage.

Active Publication Date: 2018-12-18
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional setting method cannot take into account the information of these two aspects
[0003] If it is set to no prompt, it is not conducive to the user to know the content of the received message in time; if it is set to prompt the sender and content of the message, when the social software is in the login state, once the message is received, the content of the message will be displayed directly. , anyone with a mobile phone can see the content of the message, which may lead to the leakage of privacy
[0004] In addition, many lawbreakers send dangerous messages through social software or even steal other people's accounts, which may cause the recipients to suffer personal and property losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for sending and presenting message, an identity authentication method and apparatus
  • Method and apparatus for sending and presenting message, an identity authentication method and apparatus
  • Method and apparatus for sending and presenting message, an identity authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0106] The first implementation mode: detecting whether at least one of the one or more phrases that make up the message matches at least one of the preset keywords; at least one of the one or more phrases matches the When at least one of the preset keywords matches, the authentication level of the message is determined according to the matched keywords.

[0107] The second implementation mode: detecting whether at least one of the one or more phrases that make up the message matches at least one of the preset keywords; at least one of the one or more phrases matches the When at least one of the preset keywords matches, prompting the user at the sending end to input an authentication level; determining the authentication level input by the user at the sending end as the authentication level of the message.

[0108] A third implementation manner: obtaining the user input authentication level of the sending end; determining the authentication level of the user input at the sendi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure relates to a method and apparatus for sending and presenting messages, an identity authentication method and apparatus. By the method provided by the present disclosure, the sender can ensure that only the receiver sees the sent message, thereby ensuring the privacy and security of the sender; In addition, the recipient can determine the authenticity of the received messageand avoid being harmed by the false message.

Description

technical field [0001] The present disclosure relates to the technical field of information processing, and in particular to a method and device for sending and displaying messages, and an identity authentication method and device. Background technique [0002] While mobile social software such as WeChat and QQ bring convenience to people, it also raises many information security issues. For ordinary messages, the user's greatest need is convenience, that is, to directly prompt the sender and content of the message; but for messages that are highly private or involve property and other information, the user's greatest need is security. The traditional setting method cannot take into account the news of these two aspects. [0003] If it is set to no prompt, it is not conducive to the user to know the content of the received message in time; if it is set to prompt the sender and content of the message, when the social software is in the login state, once the message is receiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/18H04L63/083H04L63/0861H04L51/52
Inventor 盖国朕
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products