CN106878963B - Method and device for preventing short message from being tampered - Google Patents

Method and device for preventing short message from being tampered Download PDF

Info

Publication number
CN106878963B
CN106878963B CN201510916584.1A CN201510916584A CN106878963B CN 106878963 B CN106878963 B CN 106878963B CN 201510916584 A CN201510916584 A CN 201510916584A CN 106878963 B CN106878963 B CN 106878963B
Authority
CN
China
Prior art keywords
short message
tampered
user
application layer
displayed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510916584.1A
Other languages
Chinese (zh)
Other versions
CN106878963A (en
Inventor
宋鹏
王贤伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Anyun Century Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Anyun Century Technology Co Ltd filed Critical Beijing Anyun Century Technology Co Ltd
Priority to CN201510916584.1A priority Critical patent/CN106878963B/en
Publication of CN106878963A publication Critical patent/CN106878963A/en
Application granted granted Critical
Publication of CN106878963B publication Critical patent/CN106878963B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a method and a device for preventing short messages from being tampered, wherein the method for preventing short messages from being tampered comprises the following steps: storing and backing up the received first short message; analyzing the first short message to obtain a second short message; and sending the second short message to an application layer for preprocessing so as to determine whether the first short message is tampered. By the technical scheme of the invention, the safety monitoring of the storage and viewing processes after the short message is received can be realized, and the short message is effectively prevented from being falsified after being received, so that the user experience is improved.

Description

Method and device for preventing short message from being tampered
Technical Field
The invention relates to the technical field of terminals, in particular to a short message tamper-proofing method and a short message tamper-proofing device.
Background
At present, aiming at the problem that a Short Message is at risk of being tampered during transmission, the existing tamper-resistant scheme for SMS (Short Message Service) content generally adopts a mode of information content digital signature, or encrypts received information content at a communication module of a terminal, and an application layer decrypts the received encrypted information content to obtain actually sent information content, specifically:
(I) Prior Art scheme I
Based on the mode of adopting the digital signature of the information content, when the short message is sent, the sent content is digitally signed, the receiving end verifies the digital signature of the received content, the received content is considered as the effective information content only if the digital signature is verified, otherwise, the received content is considered as the tampered information content;
(II) Prior Art scheme II
The received content is encrypted at the terminal communication module, the encrypted content is uploaded to the application layer through the communication module, and the application layer decrypts the encrypted content to obtain the correct short message content, so that the possibility that the short message content is tampered in the transmission process from the receiving module to the application layer is solved.
Although the technical scheme solves the problem that the information content is tampered in the process of receiving the short message by the terminal, the following defects still exist:
(I) the defects of the first technical scheme
Although the scheme can realize the function of preventing the information content from being tampered from the sending end to the receiving end, the size of the sent information content can be increased due to the adoption of the digital signature, the control requirement of the short message on the word number of the content is higher (if the short message is a long short message, the cost of sending the short message by a user can be increased), in addition, the mobile terminals used by the user are not necessarily of the same brand, and the protocols for encrypting and decrypting the digital signatures of the sending end and the receiving end can not be consistent, so that the decryption cannot be effectively carried out, and the mobile terminals cannot be widely used when a unified standard protocol does not exist;
(II) the defects of the second prior art scheme
Although the scheme solves the problem that the information content is tampered in the process of receiving the short message by the terminal, the content after receiving the data cannot be monitored in a tamper-proof manner, and particularly for most of the existing open terminals, malicious programs or viruses can tamper with the received data, so that a user can check wrong information.
Therefore, how to solve the safety monitoring problem of the short message content received by the communication module in the later application data storage and viewing process and prevent the short message content from being tampered on the receiving mobile terminal becomes a technical problem to be solved urgently.
Disclosure of Invention
Based on the technical problems, the invention provides a new technical scheme, which can realize the safety monitoring of the storage and viewing processes after receiving the short message, and effectively prevent the short message from being falsified after receiving, thereby improving the user experience.
In view of the above, a first aspect of the present invention provides a method for preventing short message from being tampered, including: storing and backing up the received first short message; analyzing the first short message to obtain a second short message; and sending the second short message to an application layer for preprocessing so as to determine whether the first short message is tampered.
In the technical scheme, after the terminal receives the short message (the first short message), the short message is firstly stored and backed up, then the short message is analyzed and the analyzed short message (the second short message) is sent to the application layer of the terminal, so that the application layer can obtain the information content which can be understood by a user, and the analyzed short message is further preprocessed at the application layer to determine whether the short message received by the terminal is tampered.
In the foregoing technical solution, preferably, the sending the second short message to an application layer for preprocessing, so as to determine whether the first short message is tampered specifically includes: storing the second short message in the application layer; detecting whether the second short message needs to be displayed to a user; and determining whether to pre-process the second short message before displaying the second short message to the user according to the detection result.
In the technical solution, the process of preprocessing the parsed short message (second short message) at the application layer of the terminal specifically includes: the method comprises the steps of firstly storing the analyzed short message, and then determining whether to preprocess the analyzed short message before displaying the analyzed short message to a user according to the detection result of whether the analyzed short message needs to be displayed to the user.
In any of the above technical solutions, preferably, the determining whether to perform the preprocessing on the second short message before displaying the second short message to the user according to the detection result specifically includes: when the second short message is detected to be displayed to the user, the second short message is reversely packaged before being displayed to the user to obtain a third short message; judging whether the third short message is the same as the first short message or not; and determining whether the first short message is tampered according to the judgment result.
In the technical solution, determining whether to pre-process the parsed short message before displaying the parsed short message to the user according to a detection result of whether to display the parsed short message (second short message) to the user specifically includes: when it is detected that the analyzed short message needs to be displayed to the user, the analyzed message is reversely packaged before being displayed, that is, a third short message is obtained through reverse processing, and whether the first short message is tampered in the storage and checking processes after being received is determined according to the judgment result that whether the third short message is the same as the first short message, so that wrong information can be effectively prevented from being displayed to the user, and user experience is improved.
In any one of the above technical solutions, preferably, the determining whether the first short message is tampered according to the determination result specifically includes: when the judgment result is the same, displaying the second short message to the user; and when the judgment results are different, reminding the user that the first short message is tampered.
In the technical solution, determining whether the first short message is tampered in the storage and viewing processes after receiving according to the determination result whether the third short message is the same as the first short message specifically includes: if the judgment results are the same, it is indicated that the short message received by the terminal is not tampered, and the analyzed short message (second short message) can be displayed to the user, otherwise, if the judgment results are different, it is indicated that the short message received by the terminal is tampered in the storing and checking processes, a prompt needs to be sent to the user, so as to avoid other potential safety hazards caused by checking the tampered short message.
In any of the above technical solutions, preferably, the method further includes: and when the first short message is determined to be tampered, the first short message is acquired again so as to show correct short message content to a user.
In the technical scheme, when the short message received by the terminal is judged to be falsified in the storing and checking processes, a series of steps of acquiring the first short message and the like need to be executed again in order to show the correct short message to the user after the prompt is sent to the user, so that the user is prevented from checking the falsified short message, the correct short message content can be finally acquired, and the use experience of the user is ensured.
According to a second aspect of the present invention, a short message tamper-resistant device is provided, which includes: the first storage module is used for storing and backing up the received first short message; the analysis module is used for analyzing the first short message to obtain a second short message; and the sending module is used for sending the second short message to an application layer for preprocessing so as to determine whether the first short message is tampered.
In the technical scheme, after the terminal receives the short message (the first short message), the short message is firstly stored and backed up, then the short message is analyzed and the analyzed short message (the second short message) is sent to the application layer of the terminal, so that the application layer can obtain the information content which can be understood by a user, and the analyzed short message is further preprocessed at the application layer to determine whether the short message received by the terminal is tampered.
In the above technical solution, preferably, the method further includes: a second storage module, configured to store the second short message in the application layer; the detection module is used for detecting whether the second short message needs to be displayed to a user or not; and the processing module is used for determining whether to preprocess the second short message before displaying the second short message to the user according to the detection result.
In the technical solution, the process of preprocessing the parsed short message (second short message) at the application layer of the terminal specifically includes: the method comprises the steps of firstly storing the analyzed short message, and then determining whether to preprocess the analyzed short message before displaying the analyzed short message to a user according to the detection result of whether the analyzed short message needs to be displayed to the user.
In any one of the above technical solutions, preferably, the processing module specifically includes: the encapsulation module is used for reversely encapsulating the second short message before the second short message is displayed to the user to obtain a third short message when the fact that the second short message needs to be displayed to the user is detected; the judging module is used for judging whether the third short message is the same as the first short message or not; and the determining module is used for determining whether the first short message is tampered according to the judgment result.
In the technical solution, determining whether to pre-process the parsed short message before displaying the parsed short message to the user according to a detection result of whether to display the parsed short message (second short message) to the user specifically includes: when it is detected that the analyzed short message needs to be displayed to the user, the analyzed message is reversely packaged before being displayed, that is, a third short message is obtained through reverse processing, and whether the first short message is tampered in the storage and checking processes after being received is determined according to the judgment result that whether the third short message is the same as the first short message, so that wrong information can be effectively prevented from being displayed to the user, and user experience is improved.
In any one of the above technical solutions, preferably, the determining module is specifically configured to: when the judgment result is the same, displaying the second short message to the user; and when the judgment results are different, reminding the user that the first short message is tampered.
In the technical solution, determining whether the first short message is tampered in the storage and viewing processes after receiving according to the determination result whether the third short message is the same as the first short message specifically includes: if the judgment results are the same, it is indicated that the short message received by the terminal is not tampered, and the analyzed short message (second short message) can be displayed to the user, otherwise, if the judgment results are different, it is indicated that the short message received by the terminal is tampered in the storing and checking processes, a prompt needs to be sent to the user, so as to avoid other potential safety hazards caused by checking the tampered short message.
In any of the above technical solutions, preferably, the method further includes: and the acquisition module is used for reacquiring the first short message after the first short message is determined to be tampered so as to show correct short message content to a user.
In the technical scheme, when the short message received by the terminal is judged to be falsified in the storing and checking processes, a series of steps of acquiring the first short message and the like need to be executed again in order to show the correct short message to the user after the prompt is sent to the user, so that the user is prevented from checking the falsified short message, the correct short message content can be finally acquired, and the use experience of the user is ensured.
In a third aspect of the present invention, a terminal is provided, which includes the apparatus for preventing short message from being tampered according to any of the above technical solutions, so that the terminal has the same technical effects as the apparatus for preventing short message from being tampered according to any of the above technical solutions, and details thereof are not repeated herein.
Through the technical scheme, the safety monitoring of the storage and viewing processes after the short message is received can be realized, the short message is effectively prevented from being tampered after being received, and therefore the user experience is improved.
Drawings
Fig. 1 shows a flow diagram of a method for tamper-proofing a short message according to an embodiment of the invention;
FIG. 2 shows a block diagram of a short message tamper resistant apparatus according to one embodiment of the invention;
FIG. 3 shows a block diagram of a terminal according to one embodiment of the invention;
FIG. 4 shows an overall framework diagram of a short message tamper resistant system according to another embodiment of the invention;
fig. 5 is a flow chart illustrating a method for preventing short message from being tampered according to another embodiment of the invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
Fig. 1 shows a flow diagram of a method for preventing short messages from being tampered according to an embodiment of the invention.
As shown in fig. 1, a method for preventing short message from being tampered according to an embodiment of the present invention includes: 102, storing and backing up the received first short message; step 104, analyzing the first short message to obtain a second short message; and 106, sending the second short message to an application layer for preprocessing so as to determine whether the first short message is tampered.
In the technical scheme, after the terminal receives the short message (the first short message), the short message is firstly stored and backed up, then the short message is analyzed and the analyzed short message (the second short message) is sent to the application layer of the terminal, so that the application layer can obtain the information content which can be understood by a user, and the analyzed short message is further preprocessed at the application layer to determine whether the short message received by the terminal is tampered.
In the above technical solution, preferably, the step 106 specifically includes: storing the second short message in the application layer; detecting whether the second short message needs to be displayed to a user; and determining whether to pre-process the second short message before displaying the second short message to the user according to the detection result.
In the technical solution, the process of preprocessing the parsed short message (second short message) at the application layer of the terminal specifically includes: the method comprises the steps of firstly storing the analyzed short message, and then determining whether to preprocess the analyzed short message before displaying the analyzed short message to a user according to the detection result of whether the analyzed short message needs to be displayed to the user.
In any of the above technical solutions, preferably, the determining whether to perform the preprocessing on the second short message before displaying the second short message to the user according to the detection result specifically includes: when the second short message is detected to be displayed to the user, the second short message is reversely packaged before being displayed to the user to obtain a third short message; judging whether the third short message is the same as the first short message or not; and determining whether the first short message is tampered according to the judgment result.
In the technical solution, determining whether to pre-process the parsed short message before displaying the parsed short message to the user according to a detection result of whether to display the parsed short message (second short message) to the user specifically includes: when it is detected that the analyzed short message needs to be displayed to the user, the analyzed message is reversely packaged before being displayed, that is, a third short message is obtained through reverse processing, and whether the first short message is tampered in the storage and checking processes after being received is determined according to the judgment result that whether the third short message is the same as the first short message, so that wrong information can be effectively prevented from being displayed to the user, and user experience is improved.
In any one of the above technical solutions, preferably, the determining whether the first short message is tampered according to the determination result specifically includes: when the judgment result is the same, displaying the second short message to the user; and when the judgment results are different, reminding the user that the first short message is tampered.
In the technical solution, determining whether the first short message is tampered in the storage and viewing processes after receiving according to the determination result whether the third short message is the same as the first short message specifically includes: if the judgment results are the same, it is indicated that the short message received by the terminal is not tampered, and the analyzed short message (second short message) can be displayed to the user, otherwise, if the judgment results are different, it is indicated that the short message received by the terminal is tampered in the storing and checking processes, a prompt needs to be sent to the user, so as to avoid other potential safety hazards caused by checking the tampered short message.
In any of the above technical solutions, preferably, the method further includes: and when the first short message is determined to be tampered, the first short message is acquired again so as to show correct short message content to a user.
In the technical scheme, when the short message received by the terminal is judged to be falsified in the storing and checking processes, a series of steps of acquiring the first short message and the like need to be executed again in order to show the correct short message to the user after the prompt is sent to the user, so that the user is prevented from checking the falsified short message, the correct short message content can be finally acquired, and the use experience of the user is ensured.
Fig. 2 shows a block diagram of a short message tamper-resistant apparatus according to an embodiment of the invention.
As shown in fig. 2, the apparatus 200 for preventing short message from being tampered according to an embodiment of the present invention includes: a first storage module 202, a parsing module 204, and a sending module 206.
The first storage module 202 is configured to store and backup the received first short message; an analyzing module 204, configured to analyze the first short message to obtain a second short message; a sending module 206, configured to send the second short message to an application layer for preprocessing, so as to determine whether the first short message is tampered.
In the technical scheme, after the terminal receives the short message (the first short message), the short message is firstly stored and backed up, then the short message is analyzed and the analyzed short message (the second short message) is sent to the application layer of the terminal, so that the application layer can obtain the information content which can be understood by a user, and the analyzed short message is further preprocessed at the application layer to determine whether the short message received by the terminal is tampered.
In the above technical solution, preferably, the method further includes: a second storage module 208, a detection module 210, and a processing module 212.
Wherein, the second storage module 208 is configured to store the second short message in the application layer; a detecting module 210, configured to detect whether the second short message needs to be displayed to a user; the processing module 212 is configured to determine whether to perform the preprocessing on the second short message before displaying the second short message to the user according to the detection result.
In the technical solution, the process of preprocessing the parsed short message (second short message) at the application layer of the terminal specifically includes: the method comprises the steps of firstly storing the analyzed short message, and then determining whether to preprocess the analyzed short message before displaying the analyzed short message to a user according to the detection result of whether the analyzed short message needs to be displayed to the user.
In any of the above technical solutions, preferably, the processing module 212 specifically includes: an encapsulation module 2122, a determination module 2124, and a determination module 2126.
The encapsulating module 2122 is configured to, when it is detected that the second short message needs to be presented to the user, perform reverse encapsulation on the second short message before the second short message is presented to the user, so as to obtain a third short message; a judging module 2124, configured to judge whether the third short message is the same as the first short message; a determining module 2126, configured to determine whether the first short message is tampered with according to the determination result.
In the technical solution, determining whether to pre-process the parsed short message before displaying the parsed short message to the user according to a detection result of whether to display the parsed short message (second short message) to the user specifically includes: when it is detected that the analyzed short message needs to be displayed to the user, the analyzed message is reversely packaged before being displayed, that is, a third short message is obtained through reverse processing, and whether the first short message is tampered in the storage and checking processes after being received is determined according to the judgment result that whether the third short message is the same as the first short message, so that wrong information can be effectively prevented from being displayed to the user, and user experience is improved.
In any of the above technical solutions, preferably, the determining module 2126 is specifically configured to: when the judgment result is the same, displaying the second short message to the user; and when the judgment results are different, reminding the user that the first short message is tampered.
In the technical solution, determining whether the first short message is tampered in the storage and viewing processes after receiving according to the determination result whether the third short message is the same as the first short message specifically includes: if the judgment results are the same, it is indicated that the short message received by the terminal is not tampered, and the analyzed short message (second short message) can be displayed to the user, otherwise, if the judgment results are different, it is indicated that the short message received by the terminal is tampered in the storing and checking processes, a prompt needs to be sent to the user, so as to avoid other potential safety hazards caused by checking the tampered short message.
In any of the above technical solutions, preferably, the method further includes: an obtaining module 214, configured to, after it is determined that the first short message is tampered, re-obtain the first short message, so as to show correct short message content to a user.
In the technical scheme, when the short message received by the terminal is judged to be falsified in the storing and checking processes, a series of steps of acquiring the first short message and the like need to be executed again in order to show the correct short message to the user after the prompt is sent to the user, so that the user is prevented from checking the falsified short message, the correct short message content can be finally acquired, and the use experience of the user is ensured.
Fig. 3 shows a block diagram of a terminal according to an embodiment of the invention.
As shown in fig. 3, the terminal 300 according to an embodiment of the present invention includes the apparatus 200 for preventing short message from being tampered with according to any of the above technical solutions, and therefore, the terminal 300 has the same technical effects as the apparatus 200 for preventing short message from being tampered with according to any of the above technical solutions, and is not described herein again.
The technical solution of the present invention will be described in detail with reference to fig. 4 and 5.
Fig. 4 shows an overall block diagram of a short message tamper resistant system according to another embodiment of the present invention.
Fig. 5 is a flow chart illustrating a method for preventing short message from being tampered according to another embodiment of the invention.
As shown in fig. 4, the overall framework of the short message tamper-resistant system according to another embodiment of the present invention mainly includes: the communication module 402 and the application module 404, specifically:
(1) the communication module 402 is mainly used for receiving short message content (first short message) in a wireless environment, storing the short message content original data (first short message) after the module port receives the short message content original data (first short message), then analyzing the short message original data so that an application layer can obtain information content (second short message) which can be understood by a user, and comparing the data (third short message) after reverse encapsulation processing with the short message content original data stored in the communication module 402 after the analyzed short message original data (second short message) is reversely encapsulated according to a protocol in the application layer, wherein the comparison is mainly performed between a short message code and the short message content.
(2) The application module 404 is mainly configured to receive the analyzed short message content original data reported by the communication module 402, store the analyzed short message content original data in an application local database, read the analyzed short message content original data in the local database for preprocessing (i.e., reverse encapsulation processing) before displaying data in an application layer, call a data comparison interface provided by the communication module 402 to compare the analyzed short message content original data with the short message content original data, and alert a user to the tampered short message content and display correct content to the user if the comparison result indicates that the short message content original data has been tampered.
The specific implementation steps are shown in fig. 5, and include:
step 502, the communication module 402 receives a short message content (a first short message) from the wireless environment;
step 504, for the received short message content, the communication module 402 stores a copy of the short message content locally in the communication module 402, specifically, in the original data storage module of the bottom module, so as to facilitate later-period data comparison and use;
step 506, the communication module 402 analyzes the received short message content according to the short message protocol to obtain the short message content (second short message) that can be understood by the user;
step 508, the application layer receives the content of the short message (second short message) analyzed by the communication module 402 and stores the content of the received and analyzed short message in the local database;
step 510, before checking the analyzed content of the short message, the user preprocesses the data acquired from the local database of the application layer through the application module 404, wherein the preprocessing mainly includes acquiring the analyzed content of the short message from the local data of the application layer, calling a reverse encapsulation interface of the communication module 402 to perform encapsulation processing to obtain "secondary original data" (third short message), and comparing the "secondary original data" with the original data (content of the short message) in the communication module 402;
step 512, performing discrimination processing on the comparison result, namely judging whether the content of the short message is tampered, if the comparison result is consistent, indicating that the data is not tampered, ending the process, and if the comparison result is inconsistent, executing step 514;
step 514, if the comparison result is inconsistent, it indicates that the content of the short message is tampered, and the user is warned that the risk exists;
in step 516, the correct short message content is retrieved and displayed to the user, and a display of tampered content is provided.
In summary, the technical solution of the present invention can solve the problem of security monitoring in the aspect of storing and checking the application data received by the communication module 402 in the later period, prevent the short message content from being tampered on the receiving mobile terminal, and can warn the user of the tampered short message content and recover the original normal information content.
The technical scheme of the invention is explained in detail in combination with the attached drawings, so that the safety monitoring of the storage and viewing processes after the short message is received can be realized, the short message is effectively prevented from being tampered after being received, and the user experience is improved.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method for preventing short message from being tampered, which is characterized by comprising the following steps:
storing and backing up the received first short message;
analyzing the first short message to obtain a second short message;
sending the second short message to an application layer for preprocessing so as to determine whether the first short message is tampered;
wherein the sending the second short message to an application layer for preprocessing to determine whether the first short message is tampered specifically includes:
reversely packaging the second short message to obtain a third short message;
judging whether the third short message is the same as the first short message or not;
and determining whether the first short message is tampered according to the judgment result.
2. The method of claim 1, wherein before the reverse encapsulation of the second short message to obtain a third short message, the method further comprises: storing the second short message in the application layer;
detecting whether the second short message needs to be displayed to a user;
the reverse encapsulation of the second short message to obtain a third short message further comprises: and when the second short message is detected to be required to be displayed to the user, reversely packaging the second short message before the second short message is displayed to the user to obtain a third short message.
3. The method for preventing the falsification of the short message according to claim 1, wherein the determining whether the first short message is falsified according to the determination result specifically includes:
when the judgment results are the same, displaying the second short message to a user;
and when the judgment results are different, reminding the user that the first short message is tampered.
4. A method for preventing short message tampering as claimed in any one of claims 1 to 3, further comprising:
and when the first short message is determined to be tampered, the first short message is acquired again so as to show correct short message content to a user.
5. A short message tamper-resistant apparatus, comprising:
the first storage module is used for storing and backing up the received first short message;
the analysis module is used for analyzing the first short message to obtain a second short message;
the sending module is used for sending the second short message to an application layer for preprocessing so as to determine whether the first short message is tampered;
wherein the sending the second short message to an application layer for preprocessing to determine whether the first short message is tampered specifically includes: reversely packaging the second short message to obtain a third short message;
judging whether the third short message is the same as the first short message or not;
and determining whether the first short message is tampered according to the judgment result.
6. The apparatus for preventing short message tampering as defined in claim 5, further comprising:
a second storage module, configured to store the second short message in the application layer;
the detection module is used for detecting whether the second short message needs to be displayed to a user or not;
the sending module is further configured to: and when the second short message is detected to be required to be displayed to the user, reversely packaging the second short message before the second short message is displayed to the user to obtain a third short message.
7. The apparatus for preventing short message from being tampered according to claim 5, wherein the determining whether the first short message is tampered according to the determination result specifically comprises:
when the judgment results are the same, displaying the second short message to a user;
and when the judgment results are different, reminding the user that the first short message is tampered.
8. The apparatus for preventing the short message from being tampered with according to any of the claims 5 to 7, further comprising:
and the acquisition module is used for reacquiring the first short message after the first short message is determined to be tampered so as to show correct short message content to a user.
CN201510916584.1A 2015-12-10 2015-12-10 Method and device for preventing short message from being tampered Active CN106878963B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510916584.1A CN106878963B (en) 2015-12-10 2015-12-10 Method and device for preventing short message from being tampered

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510916584.1A CN106878963B (en) 2015-12-10 2015-12-10 Method and device for preventing short message from being tampered

Publications (2)

Publication Number Publication Date
CN106878963A CN106878963A (en) 2017-06-20
CN106878963B true CN106878963B (en) 2020-11-13

Family

ID=59176890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510916584.1A Active CN106878963B (en) 2015-12-10 2015-12-10 Method and device for preventing short message from being tampered

Country Status (1)

Country Link
CN (1) CN106878963B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110750735A (en) * 2019-10-23 2020-02-04 腾讯科技(深圳)有限公司 False event identification method, device, equipment and storage medium based on block chain network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068384A (en) * 2007-06-18 2007-11-07 中兴通讯股份有限公司 Method for realizing selective receiving short message at communication terminal and communication terminal
CN101370305A (en) * 2008-09-23 2009-02-18 中兴通讯股份有限公司 Method and system for protecting data traffic security
CN103997483A (en) * 2013-02-20 2014-08-20 联想(北京)有限公司 Information safety control method and apparatus, and electronic device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070076743A (en) * 2006-01-19 2007-07-25 주식회사 팬택 Method and system for backup and recovery of short message
CN100563360C (en) * 2007-06-15 2009-11-25 福建鑫诺通讯技术有限公司 The method of short message content interpolation-preventing
CN101626368A (en) * 2008-07-11 2010-01-13 中联绿盟信息技术(北京)有限公司 Device, method and system for preventing web page from being distorted
CN103619001A (en) * 2013-11-01 2014-03-05 宇龙计算机通信科技(深圳)有限公司 Short message processing method, device and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068384A (en) * 2007-06-18 2007-11-07 中兴通讯股份有限公司 Method for realizing selective receiving short message at communication terminal and communication terminal
CN101370305A (en) * 2008-09-23 2009-02-18 中兴通讯股份有限公司 Method and system for protecting data traffic security
CN103997483A (en) * 2013-02-20 2014-08-20 联想(北京)有限公司 Information safety control method and apparatus, and electronic device

Also Published As

Publication number Publication date
CN106878963A (en) 2017-06-20

Similar Documents

Publication Publication Date Title
CN109299135B (en) Abnormal query recognition method, recognition equipment and medium based on recognition model
EP3241303B1 (en) Methods, systems and apparatus for recognizing genuine products
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
CN110351281B (en) Universal data frame analysis method, device and equipment
US20180365818A1 (en) Seal Tamper Detection
CN113903476A (en) System, method and storage medium for inputting text and travel safety management epidemic prevention
CN112199644A (en) Mobile terminal application program safety detection method, system, terminal and storage medium
CN110969723B (en) Data management method, detection device, server, and computer-readable storage medium
CN104464114A (en) System and method for managing and monitoring safety of application of financial terminals
CN112346904A (en) Smart electric meter calibration method and device, smart electric meter and storage medium
CN106878963B (en) Method and device for preventing short message from being tampered
JP6677169B2 (en) Communication monitoring system, importance calculation device and calculation method thereof, presentation device, and computer program
CN106899977B (en) Abnormal flow detection method and device
CN110365656B (en) Data management method, data management device and environment-friendly detection equipment
CN101826994B (en) Method and device for acquiring information invading source host
CN104599097B (en) A kind of method and device of fortune paper money bag electronic sealing monitoring
CN113449269B (en) Core module activation method and device and storage medium
CN115292246A (en) Document transcoding method and device and electronic equipment
CN107086918A (en) A kind of client validation method and server
JP6099381B2 (en) In-vehicle device
CN109858293B (en) Intrusion processing method and device for lighting control machine
CN113098587B (en) Satellite-ground link communication system and data processing method
CN114978737B (en) Comprehensive management system for Doppler weather radar data
CN108134656A (en) Insurance data retransmission method, device, server and storage medium
CN110365689B (en) Port detection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170810

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant