Instant messaging information verification code protection method and device

A technology of communication information and verification code, which is applied in the field of protection of instant messaging information verification code, can solve the problem of information being stolen by rogue software, and achieve the effect of ensuring security

Inactive Publication Date: 2019-01-18
XIAMEN MEITU MOBILE TECH CO LTD
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The object of the present invention is to provide a method and device for protecting verification codes of instant messaging information in order to solve the problem that information including verification codes is stolen by rogue software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instant messaging information verification code protection method and device
  • Instant messaging information verification code protection method and device
  • Instant messaging information verification code protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments.

[0051] The present application provides a method for protecting verification codes of instant messaging information, so as to prevent information containing verification codes from being maliciously attacked. The execution subject of this method may be various terminal devices, such as mobile phones, tablet computers, wearable devices, etc., which are not limited in this application.

[0052] figure 1 A schematic flow diagram of a protection method for an instant messaging verification code provided by this application, as shown in figure 1 As sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an instant messaging information verification code protection method and device, and relates to the field of communication. The method includes the steps: identifying whether to-be-processed instant messaging information includes a preset verification code identifier or not; determining an application program associated with the to-be-processed instant messaging informationif the to-be-processed instant messaging information includes the preset verification code identifier; receiving a verification code reading request sent by the server, wherein the verification code reading request includes an application identifier; enabling the server to send the verification code information in the to-be-processed instant messaging information if the application identifier indicates the application program associated with the to-be-processed instant messaging information or a default authorization application program. Compared with the prior art, the method guarantees the security of a mobile phone application or a personal account, and guarantees that the SMS verification code c not stolen by the rogue software.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a method and device for protecting instant messaging information verification codes. Background technique [0002] With the popularity of mobile phones, mobile phones have replaced computers to a large extent, but there are also a large number of security risks in the use of mobile phones, such as banking software, payment software, or other application software, and computer website login accounts, which are easily hacked. Lawbreakers log in on other terminal devices and perform operations that infringe on user rights. [0003] In order to increase the difficulty for others to illegally log in to the user account, the application adds a verification code verification process. Specifically, when the user logs in to the account, the user enters the mobile phone number in the application program, and the terminal feeds back the mobile phone number to the background ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/58H04L29/06G06F21/10
CPCG06F21/105H04L9/3226H04L51/046H04L63/12
Inventor 汤志锋
Owner XIAMEN MEITU MOBILE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products