A kind of method of hiding note
Technical field
The invention belongs to mobile communication technology field, relate to a kind of information concealing method, relate in particular to a kind of method of hiding note.
Background technology
Note belongs to the standard configuration of personal communication apparatus, preservation be content of text that communication is relevant, time, transmission number etc.But nowadays some Malwares can obtain short message content conventionally easily, people's privacy is obtained by undesirable, may bring very large property loss simultaneously.Because the network payment such as credit card, Alipay mode nowadays normally realizes checking by note, note brings a large amount of economic losses after being obtained by lawless person possibly.
Nowadays also good mode is effectively protected note without comparison, and note can be obtained by Malware often, brings economic loss.
In view of this, nowadays in the urgent need to designing a kind of protected mode of note, to overcome the defect that existing note is obtained easily by Malware.
How the note of specified conditions is hidden, made the application of other note class cannot receive and obtain relevant note, and specific note class can the hiding note of lookup operations after by safety verification, is the mode of a kind of protection information safety, privacy.
Summary of the invention
Technical problem to be solved by this invention is: a kind of method of hiding note is provided, can have solved responsive note and easily stolen by malicious application, to reach the object of protection user information safety.
For solving the problems of the technologies described above, the present invention adopts following technical scheme:
A method for hiding note, described method comprises:
User sets the condition of hiding note; Preserve the interface of the read-write of the file of hiding note and only specific note application is opened, do not open to the outside world; Mode and the password of safety verification are arranged by user.
As a preferred embodiment of the present invention, described method specifically comprises:
System receives note, judges whether note needs to hide according to imposing a condition, and if desired hides, and note is deposited in to privately owned file; Otherwise by the processing of normal note handling process;
Application-specific is checked while hiding note, needs through safety verification; If be verified, can normally check, operate note; Otherwise again verify or exit.
Beneficial effect of the present invention is: the method for the hiding note that the present invention proposes, can solve responsive note and easily stolen by malicious application, to reach the object of protection user information safety.
Brief description of the drawings
Fig. 1 is the judgement Stored Procedure figure that the present invention hides note.
Fig. 2 is the safety verification flow chart that the present invention hides note.
Embodiment
Describe the preferred embodiments of the present invention in detail below in conjunction with accompanying drawing.
Embodiment mono-
Refer to Fig. 1, Fig. 2, the present invention has disclosed a kind of method of hiding note, and described method comprises: user sets the condition of hiding note; Preserve the interface of the read-write of the file of hiding note and only specific note application is opened, do not open to the outside world; Mode and the password of safety verification are arranged by user.
As shown in Figure 1 and Figure 2, in the present embodiment, described method specifically comprises:
System receives note, judges whether note needs to hide according to imposing a condition, and if desired hides, and note is deposited in to privately owned file; Otherwise by the processing of normal note handling process;
Application-specific is checked while hiding note, needs through safety verification; If be verified, can normally check, operate note; Otherwise again verify or exit.
In sum, the method for the hiding note that the present invention proposes, can solve responsive note and easily stolen by malicious application, to reach the object of protection user information safety.
Here description of the invention and application is illustrative, not wants scope of the present invention to limit in the above-described embodiments.Here the distortion of disclosed embodiment and change is possible, and for those those of ordinary skill in the art, the various parts of the replacement of embodiment and equivalence are known.Those skilled in the art are noted that in the situation that not departing from spirit of the present invention or substantive characteristics, and the present invention can be with other form, structure, layout, ratio, and realize with other assembly, material and parts.In the situation that not departing from the scope of the invention and spirit, can carry out other distortion and change to disclosed embodiment here.