Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Terminal and security processing method for information contents

A processing method and safe processing technology, applied in the field of information security, can solve problems such as inconvenient use, increased risk of browsing web pages, inability to directly identify URLs, etc., and achieve the effect of avoiding normal use

Inactive Publication Date: 2012-11-28
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in today's increasingly rampant computer viruses, linking to illegal websites through web pages may lead to infection of computer viruses and Trojan horse programs, etc.
The popularity of smart phones also makes mobile phone viruses popular. Users often receive some information with link addresses, but they cannot distinguish the authenticity and legitimacy of the URLs.
Just like spam, when users face spam text messages or unidentifiable text messages, they cannot directly identify URLs like using computers on the Internet. The security of URLs viewed in the form of information cannot be confirmed, which not only causes users Inconvenient to use, but also increases the risk of browsing the web

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and security processing method for information contents
  • Terminal and security processing method for information contents
  • Terminal and security processing method for information contents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to be able to understand the above objectives, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that the embodiments of the application and the features in the embodiments can be combined with each other if there is no conflict.

[0033] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited to the specific details disclosed below. Limitations of the embodiment.

[0034] figure 1 A block diagram of a terminal according to an embodiment of the present invention is shown.

[0035] Such as figure 1 As shown, the terminal 100 according to the embodiment of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal, which comprises an information receiving unit, a content detection unit, a security judgment unit and a link processing unit, wherein the information receiving unit is used for receiving communication information; the content detection unit is used for detecting whether the communication information comprises a website link or not; the security judgment unit is used for judging the security of the website link in the communication information; and the link processing unit is used for performing corresponding security processing on the website link according to a judgment result of the security judgment unit. Correspondingly, the invention also discloses a security processing method for information contents. By using the technical scheme, the contents of the received communication information can be subjected to security detection to avoid the influence of insecure information on the normal use of a user.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular, to a terminal and a security processing method of information content. Background technique [0002] With the rapid development of science and technology, the Internet has increasingly affected people’s lives more and more widely. SMS, MMS, etc. play an important role in people’s daily lives. People often communicate in this way. Expansion, information sharing has become a new fashion. Share interesting content to your friends on Weibo, and you can forward them to friends and relatives when you see meaningful SMS and MMS. Sometimes I send some pictures, audios, videos, business cards, links or attachments to others through MMS. [0003] But today, when computer viruses are increasingly proliferating, linking to illegal websites through web pages may result in computer viruses and Trojan horse programs. The popularity of smartphones also makes mobile phone viruses p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/12H04W12/122
Inventor 高建平李俊郭斌
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products