Short message reading method and apparatus

A technology for reading short messages and short messages, which is applied in the field of information security to avoid leakage and achieve the effect of permission control.

Active Publication Date: 2016-02-03
XIAOMI INC
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem that a third-party application can read the text message content in the text message component when it only has the text message reading permission at the operating system level, resulting in malicious Regarding the issue of authority, the present disclosure provides a method and device for reading short messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message reading method and apparatus
  • Short message reading method and apparatus
  • Short message reading method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0096] First, several nouns involved in this disclosure are briefly introduced:

[0097] Android operating system: a free and open-source operating system based on Linux produced by Google, the United States, mainly used in mobile terminals. The mobile terminal can be a mobile phone, a tablet computer, an electronic book reader, an MP3 player (MovingPictureExpertsGroupAudioLayerIII, moving picture experts compress standard audio layer 3), MP4 (MovingPictureExpertsGroupAudioLayerIV, moving picture experts compress standard audio layer 4) player and a laptop Laptops and more.

[0098] Application program: In the Android operating system, an application program usually includes at least one program component. Program components are divi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short message reading method and apparatus and belongs to the field of information security. The short message reading method comprises the following steps of receiving a short message reading request by a third party application program, detecting whether reading time for reading the request is within a short message forbidding visit period when the short message carries sensitive information, and making no respond to the reading request when the reading time belongs to the forbidding visit period. A problem can be solved that malignant application program acquires a permission for executing sensitive operations via reading verification codes in the short message when a third party application program can read short message content in a short message assembly when only owning a short message reading permission from the perspective of operation system. By the use of the method, the third party application program cannot read short message content in the forbidding visit period in light of short message carrying sensitive information, so sensitive information in the short message can be prevented from being leaked in the forbidding visiting period; and single short message granularity permission can be controlled.

Description

technical field [0001] The invention relates to the field of information security, in particular to a short message reading method and device. Background technique [0002] Using a verification code carried in a short message (English: ShortMessageService, abbreviation: SMS) for security verification is a common identity verification method at present. [0003] In the Android (English: Android) operating system, a third-party application program may have permission to read short messages. If the third-party application program is a malicious application program, the authority to perform sensitive operations, such as the authority to perform payment operations, the authority to perform registration and login, etc., can be obtained by reading the verification code in the short message. Contents of the invention [0004] In order to solve the problem that a third-party application can read the text message content in the text message component when it only has the text messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62H04W4/14
CPCG06F21/6209G06F21/6281G06F2221/2141H04W4/14H04L63/108H04W12/02H04W12/08H04W4/12H04W12/03G06Q20/322H04L63/04
Inventor 洪锋赵建凯杨万坤张建春
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products