Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication

A technology of a mobile terminal and an implementation method, which is applied in the directions of wireless communication, message/mailbox/announcement, electrical components, etc., can solve the problems of message security protection methods that have not yet been seen in mobile terminals, and achieve the improvement of instant communication security, privacy protection and security. , the effect of broad application prospects

Inactive Publication Date: 2014-09-24
FUZHOU UNIV
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no relatively complete message security protection method for mobile terminals, especially the implementation method of time-reading protection and instant burning of messages for instant messaging on Android mobile terminals.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The method for implementing instant message protection and burning after reading of mobile terminal instant messaging in the present invention is to install a security protection module on the mobile terminal, and the security protection module is set in the application layer of the Android operating system of the mobile terminal, such as figure 1 As shown, the security protection module processes sensitive messages according to the following steps:

[0019] Step S1: When mobile terminal A sends a sensitive message that needs to be protected to mobile terminal B, mobile terminal A marks the sensitive message as a "protected while reading and burns after reading" message through its security protection module, and then sends to mobile terminal B;

[0020] Step S2: After the mobile terminal B receives the message, the security protection module on it judges whether the received message is a "protected while reading and burns after reading" message, and if so, starts the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing message protection in reading and message destruction after reading in mobile terminal instant communication. Sensitive message security protection modules are installed in mobile terminals. The working principle of the sensitive message security protection modules is that: (1) a mobile terminal A marks a sensitive message as a 'protection in reading and destruction after reading' message and sends the message to a mobile terminal B, (2) after the mobile terminal B receives the message, a safe reading mechanism is started, and the following whole process protection is carried out: (a) a screen reminds a user of the reception of the message, the message is stored in an encryption way, and a password is needed to be input in reading the message, (b) a small window is used to horizontally roll and display the message, reduce refresh frequency, and increase longitudinal rolling corrugation and the like to prevent the message to be seen or photographed secretly, a screen is locked and screenshot is prohibited, and button functions of forwarding, copying and pasting and the like are inhibited to prevent the propagation and storage of the message, and (c) after the message is read, the message is completely destroyed automatically. According to the method, the peeping, leakage and propagation of the sensitive message in the mobile phone are effectively prevented, and the security of instant communication content is improved.

Description

technical field [0001] The invention belongs to the technical field of instant messaging security protection, and in particular relates to a method for realizing time-reading protection and burning after reading of messages used in mobile terminal instant messaging. Background technique [0002] "Protect while reading and burn after reading" provide a security protection mechanism for sensitive messages on the instant messaging platform, which mainly means that after the security-sensitive messages designated by the sender of instant messaging messages or protected by security policies are sent, the receiving party When a message arrives, it is protected during reading and automatically burned after reading. This mechanism can effectively cut off sensitive information from malicious peeping, artificial leakage and dissemination from the source, which is of great significance to the security of instant communication. At present, there is no comparatively complete message sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/12H04W12/06H04W88/02
Inventor 陈明志李园园钟玲查昊迅贾福运吴青山吴迪鹏杨小权肖传奇
Owner FUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products