CN104202735A - Method of hiding short message - Google Patents

Method of hiding short message Download PDF

Info

Publication number
CN104202735A
CN104202735A CN201410391745.5A CN201410391745A CN104202735A CN 104202735 A CN104202735 A CN 104202735A CN 201410391745 A CN201410391745 A CN 201410391745A CN 104202735 A CN104202735 A CN 104202735A
Authority
CN
China
Prior art keywords
short message
note
hiding
hidden
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410391745.5A
Other languages
Chinese (zh)
Inventor
顾庆欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Electronic Technology Co Ltd
Original Assignee
SHANGHAI YIDUAN SCIENCE & TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI YIDUAN SCIENCE & TECHNOLOGY Co Ltd filed Critical SHANGHAI YIDUAN SCIENCE & TECHNOLOGY Co Ltd
Priority to CN201410391745.5A priority Critical patent/CN104202735A/en
Publication of CN104202735A publication Critical patent/CN104202735A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a method of hiding a short message. The method comprises the following steps of: setting conditions of hiding the short message by a user; only opening a read-write interface of a file for storing the hidden short message to a specific short message application and not opening outwards; and setting a manner of safety verification and a password by the user. The method specifically comprises the following steps of: after a system receives the short message, judging whether the short message needs to be hidden according to the set conditions, if the short message needs to be hidden, storing the short message into a private folder; otherwise, processing according to a normal short message processing process; when the specific application views the hidden short message, carrying out safety verification; if passing the verification, viewing and operating the short message normally; and otherwise, verifying again or quitting. According to the method of hiding the short message, which is provided by the invention, the problem that a sensitive short message is easily stolen by a malicious application is solved, so that the purpose of protecting information safety of the user is achieved.

Description

A kind of method of hiding note
Technical field
The invention belongs to mobile communication technology field, relate to a kind of information concealing method, relate in particular to a kind of method of hiding note.
Background technology
Note belongs to the standard configuration of personal communication apparatus, preservation be content of text that communication is relevant, time, transmission number etc.But nowadays some Malwares can obtain short message content conventionally easily, people's privacy is obtained by undesirable, may bring very large property loss simultaneously.Because the network payment such as credit card, Alipay mode nowadays normally realizes checking by note, note brings a large amount of economic losses after being obtained by lawless person possibly.
Nowadays also good mode is effectively protected note without comparison, and note can be obtained by Malware often, brings economic loss.
In view of this, nowadays in the urgent need to designing a kind of protected mode of note, to overcome the defect that existing note is obtained easily by Malware.
How the note of specified conditions is hidden, made the application of other note class cannot receive and obtain relevant note, and specific note class can the hiding note of lookup operations after by safety verification, is the mode of a kind of protection information safety, privacy.
Summary of the invention
Technical problem to be solved by this invention is: a kind of method of hiding note is provided, can have solved responsive note and easily stolen by malicious application, to reach the object of protection user information safety.
For solving the problems of the technologies described above, the present invention adopts following technical scheme:
A method for hiding note, described method comprises:
User sets the condition of hiding note; Preserve the interface of the read-write of the file of hiding note and only specific note application is opened, do not open to the outside world; Mode and the password of safety verification are arranged by user.
As a preferred embodiment of the present invention, described method specifically comprises:
System receives note, judges whether note needs to hide according to imposing a condition, and if desired hides, and note is deposited in to privately owned file; Otherwise by the processing of normal note handling process;
Application-specific is checked while hiding note, needs through safety verification; If be verified, can normally check, operate note; Otherwise again verify or exit.
Beneficial effect of the present invention is: the method for the hiding note that the present invention proposes, can solve responsive note and easily stolen by malicious application, to reach the object of protection user information safety.
Brief description of the drawings
Fig. 1 is the judgement Stored Procedure figure that the present invention hides note.
Fig. 2 is the safety verification flow chart that the present invention hides note.
Embodiment
Describe the preferred embodiments of the present invention in detail below in conjunction with accompanying drawing.
Embodiment mono-
Refer to Fig. 1, Fig. 2, the present invention has disclosed a kind of method of hiding note, and described method comprises: user sets the condition of hiding note; Preserve the interface of the read-write of the file of hiding note and only specific note application is opened, do not open to the outside world; Mode and the password of safety verification are arranged by user.
As shown in Figure 1 and Figure 2, in the present embodiment, described method specifically comprises:
System receives note, judges whether note needs to hide according to imposing a condition, and if desired hides, and note is deposited in to privately owned file; Otherwise by the processing of normal note handling process;
Application-specific is checked while hiding note, needs through safety verification; If be verified, can normally check, operate note; Otherwise again verify or exit.
In sum, the method for the hiding note that the present invention proposes, can solve responsive note and easily stolen by malicious application, to reach the object of protection user information safety.
Here description of the invention and application is illustrative, not wants scope of the present invention to limit in the above-described embodiments.Here the distortion of disclosed embodiment and change is possible, and for those those of ordinary skill in the art, the various parts of the replacement of embodiment and equivalence are known.Those skilled in the art are noted that in the situation that not departing from spirit of the present invention or substantive characteristics, and the present invention can be with other form, structure, layout, ratio, and realize with other assembly, material and parts.In the situation that not departing from the scope of the invention and spirit, can carry out other distortion and change to disclosed embodiment here.

Claims (2)

1. a method for hiding note, is characterized in that, described method comprises:
User sets the condition of hiding note; Preserve the interface of the read-write of the file of hiding note and only specific note application is opened, do not open to the outside world; Mode and the password of safety verification are arranged by user.
2. the method for hiding note according to claim 1, is characterized in that:
Described method specifically comprises:
System receives note, judges whether note needs to hide according to imposing a condition, and if desired hides, and note is deposited in to privately owned file; Otherwise by the processing of normal note handling process;
Application-specific is checked while hiding note, needs through safety verification; If be verified, can normally check, operate note; Otherwise again verify or exit.
CN201410391745.5A 2014-08-11 2014-08-11 Method of hiding short message Pending CN104202735A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410391745.5A CN104202735A (en) 2014-08-11 2014-08-11 Method of hiding short message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410391745.5A CN104202735A (en) 2014-08-11 2014-08-11 Method of hiding short message

Publications (1)

Publication Number Publication Date
CN104202735A true CN104202735A (en) 2014-12-10

Family

ID=52087948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410391745.5A Pending CN104202735A (en) 2014-08-11 2014-08-11 Method of hiding short message

Country Status (1)

Country Link
CN (1) CN104202735A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105260673A (en) * 2015-09-18 2016-01-20 小米科技有限责任公司 Short message reading method and apparatus
WO2016107024A1 (en) * 2014-12-31 2016-07-07 中兴通讯股份有限公司 Information protection and display method, device and terminal
WO2016145849A1 (en) * 2015-09-22 2016-09-22 中兴通讯股份有限公司 Short message security management method, device and terminal
US9998887B2 (en) 2015-09-18 2018-06-12 Xiaomi Inc. Short message service reading method and device
US10027629B2 (en) 2015-09-18 2018-07-17 Xiaomi Inc. Short message service reading method and device
US10419444B2 (en) 2015-08-24 2019-09-17 Cyberlink Corp. Systems and methods for protecting messages utilizing a hidden restriction mechanism

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572750A (en) * 2011-12-26 2012-07-11 中兴通讯股份有限公司 Method and terminal for protecting short messages
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment
CN103002124A (en) * 2012-11-01 2013-03-27 北京小米科技有限责任公司 Method, device and equipment for processing communication data
CN103619001A (en) * 2013-11-01 2014-03-05 宇龙计算机通信科技(深圳)有限公司 Short message processing method, device and mobile terminal
CN103763686A (en) * 2013-12-23 2014-04-30 北京奇虎科技有限公司 Processing method and device for short messages

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930221A (en) * 2011-08-09 2013-02-13 三星电子(中国)研发中心 Method for protecting data in handheld equipment
CN102572750A (en) * 2011-12-26 2012-07-11 中兴通讯股份有限公司 Method and terminal for protecting short messages
CN103002124A (en) * 2012-11-01 2013-03-27 北京小米科技有限责任公司 Method, device and equipment for processing communication data
CN103619001A (en) * 2013-11-01 2014-03-05 宇龙计算机通信科技(深圳)有限公司 Short message processing method, device and mobile terminal
CN103763686A (en) * 2013-12-23 2014-04-30 北京奇虎科技有限公司 Processing method and device for short messages

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016107024A1 (en) * 2014-12-31 2016-07-07 中兴通讯股份有限公司 Information protection and display method, device and terminal
US10419444B2 (en) 2015-08-24 2019-09-17 Cyberlink Corp. Systems and methods for protecting messages utilizing a hidden restriction mechanism
CN105260673A (en) * 2015-09-18 2016-01-20 小米科技有限责任公司 Short message reading method and apparatus
US9998887B2 (en) 2015-09-18 2018-06-12 Xiaomi Inc. Short message service reading method and device
US10021543B2 (en) 2015-09-18 2018-07-10 Xiaomi Inc. Short message service reading method and device
US10027629B2 (en) 2015-09-18 2018-07-17 Xiaomi Inc. Short message service reading method and device
WO2016145849A1 (en) * 2015-09-22 2016-09-22 中兴通讯股份有限公司 Short message security management method, device and terminal
CN106550357A (en) * 2015-09-22 2017-03-29 中兴通讯股份有限公司 A kind of note method for managing security, device and terminal

Similar Documents

Publication Publication Date Title
CN104202735A (en) Method of hiding short message
WO2015169158A1 (en) Information protection method and system
CN103327183B (en) Black box protecting method and system for private data of Android user based on tag
WO2010148832A1 (en) Entrance guard control and information display system, method and terminal
CN103619014B (en) The method and system for preventing application data from revealing
CN105025165A (en) Interface unlocking method and system corresponding to multiple passwords
CN103619001A (en) Short message processing method, device and mobile terminal
Moynihan et al. Restrictions on online freedom of expression in China
CN102413146A (en) Client authorized logon method based on dynamic codes
Perakovic et al. Research of security threats in the use of modern terminal devices
WO2017129008A1 (en) Application authentication method and apparatus for linux system based financial self-service device
CN106295423A (en) A kind of method for exhibiting data and client
CN102957706A (en) Safe anti-cracking method of data server
최휘민 et al. Efficient security method using mobile virtualization technology and trustzone of arm
Segal China, Encryption Policy, and International Influence
CN102110218A (en) Mobile-phone-information-encryption-based authentication method
CN205486466U (en) Automatic vending machine based on android system
Harshanath Privacy & Security in Mobile Devices, Social Network Services and Social Reform
Aaronson et al. Data Protection and Digital Trade in the Wake of the NSA Revelations
CN105848143A (en) Dual-system integrated smart mobile phone and private information processing method thereof
Schneier Security Needs
CN105488392B (en) A kind of system and method that camouflage peripheral hardware is defendd to carry out malicious attack
CN101335624A (en) Identity verifying method on basis of mobile phone signature
Parkes Turkey's refugee politics
Palmer How Bitcoin helped fuel an explosion in ransomware attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: SHANGHAI WENTAI ELECTRONIC SCIENCE + TECHNOLOGY CO

Free format text: FORMER OWNER: SHANGHAI YIDUAN SCIENCE + TECHNOLOGY CO., LTD.

Effective date: 20150618

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150618

Address after: 200001, Shanghai, Beijing East Road, No. 668, G District, building 6, Huangpu District

Applicant after: Shanghai Wentai Electronic Science & Technology Co., Ltd.

Address before: Zuchongzhi road in Pudong New Area Zhangjiang hi tech park Shanghai city 201203 2288 Lane 2, room 311

Applicant before: SHANGHAI YIDUAN SCIENCE & TECHNOLOGY CO., LTD.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141210