Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Short-message hijack prevention method applied to mobile terminal and device

A mobile terminal and short message technology, applied in the field of information security, can solve the problems of waste of development strategy development cost, enterprises cannot decrypt each other, etc., and achieve the effect of preventing short messages from being hijacked, with strong versatility and convenient operation.

Inactive Publication Date: 2018-06-29
WUHAN ANTIY MOBILE SECURITY
View PDF14 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The traditional solution to prevent SMS hijacking is to encrypt SMS content, which needs to be deployed on the server and mobile terminals at the same time and requires one-to-one correspondence. Different companies cannot decrypt each other. The development strategy of one-to-one correspondence has great limitations and will cause development problems. great waste of cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short-message hijack prevention method applied to mobile terminal and device
  • Short-message hijack prevention method applied to mobile terminal and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0031] Although the steps in the present invention are arranged with labels, they are not used to limit the order of the steps. Unless the order of the steps is clearly stated or the execution of a certain step requires other steps as a basis, the relative order of the steps can be adjusted.

[0032] Such as figure 1 As shown, the present invention discloses a method for preventing SMS hijacking applied to mobile terminals. As we all know, the operating systems of mobile terminals include Symbian, Android, IOS, etc., and the present invention uses Android as an example to illustrate. In some embodiments, the method for preventing SMS hijacking includes the following steps:

[0033] S01: Monitor the working status of the target APP, and when it is detected that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a short-message hijack prevention method applied to a mobile terminal. According to the method, potential environmental threat to a user in a predefined short-message hijack scene is found by monitoring the whole working state of a target APP, the security of a current use environment is ensured by forbidding corresponding functions of APPs possibly hijacking a target short-message, and the purpose of preventing the short-message from being hijacked is achieved. The method only needs to be deployed on the mobile terminal, is high in universality and suitable for varioususe scenes requiring short-message hijack prevention, does not influence a normal running process and use of a system and also has the advantages of being convenient to operate, low in cost and the like.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an anti-short message hijacking method and device applied to mobile terminals. Background technique [0002] With the rapid development of the mobile Internet, mobile payment has become an increasingly popular means of transaction. In the micropayment transactions of financial institutions such as banks, SMS verification codes are the most common virtual transaction authentication method. However, the security problems of mobile operating systems occur frequently, for example, the SMS hijacking virus for financial transactions has caused data leakage and the transfer of financial assets, which has brought a huge impact on social order and brought serious losses to people's lives and inconvenient. [0003] SMS verification is a credential given by the enterprise to consumers (users), and the identity is authenticated through the verification code of the SMS content....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 严志润宋正义马志远
Owner WUHAN ANTIY MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products