CN112866474A - Short message management method and device and readable storage medium - Google Patents

Short message management method and device and readable storage medium Download PDF

Info

Publication number
CN112866474A
CN112866474A CN202110388906.5A CN202110388906A CN112866474A CN 112866474 A CN112866474 A CN 112866474A CN 202110388906 A CN202110388906 A CN 202110388906A CN 112866474 A CN112866474 A CN 112866474A
Authority
CN
China
Prior art keywords
short message
sensitive
sensitive short
setting component
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110388906.5A
Other languages
Chinese (zh)
Inventor
由帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN202110388906.5A priority Critical patent/CN112866474A/en
Publication of CN112866474A publication Critical patent/CN112866474A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The disclosure relates to a short message management method, a short message management device and a readable storage medium, wherein a sensitive short message management control is displayed in a first interface of an application program; and when the sensitive short message management control is detected to be opened, displaying a sensitive short message setting component in a second interface of the application program, wherein the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message. By providing the sensitive short message setting component, the user can conveniently carry out personalized configuration according to the sensitive short message setting component, thereby meeting the personalized requirements of the user on sensitive short message management.

Description

Short message management method and device and readable storage medium
Technical Field
The present disclosure relates to the field of mobile terminal technologies, and in particular, to a short message management method and apparatus, and a readable storage medium.
Background
The short message is a text or digital message sent or received by a user through a mobile phone or other mobile terminals. With the popularization of mobile terminals, short message service greatly facilitates communication between people, for example, service providers often send verification information, notification information, and the like to users through short messages, and friends interact important information through short messages. Because the short message contains a large amount of sensitive information, the safety of the short message is particularly important.
However, there are differences in sensitive information that users need to perform security protection, and therefore how to implement personalized short message security is a problem that needs to be solved urgently at present.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, the present disclosure provides a short message management method, device and readable storage medium.
In a first aspect, the present disclosure provides a short message management method, including:
displaying a sensitive short message management control in a first interface of an application program;
when the sensitive short message management control is detected to be opened, a sensitive short message setting component is displayed in a second interface of the application program; the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message.
In some possible designs, the method further comprises:
and when the operation of a first control in the sensitive short message setting component is detected, configuring a target short message type, wherein the short message of the target short message type is a sensitive short message.
In some possible designs, the method further comprises:
and when the operation of a second control contained in the sensitive short message setting component is detected, configuring a target sender number, wherein the short message sent by the target sender number is a sensitive short message.
In some possible designs, the method further comprises:
and when the operation of a third control contained in the sensitive short message setting component is detected, configuring a self-defined sensitive vocabulary, wherein the short message containing the self-defined sensitive vocabulary is a sensitive short message.
In some possible designs, the method further comprises:
and when the operation of a fourth control contained in the sensitive short message setting component is detected, configuring the reading permission of the sensitive short message.
In some possible designs, the method further comprises:
and when the operation of a fifth control contained in the sensitive short message setting component is detected, configuring a security access password of the sensitive short message.
In some possible designs, the method further comprises:
when the short message is detected to arrive, determining whether the short message is a sensitive short message or not according to the configuration of the sensitive short message setting component;
and if the short message is determined to be a sensitive short message, configuring relevant attribute information of the sensitive short message according to the sensitive short message setting component.
In some possible designs, the method further comprises:
displaying a password input window in a third interface of the application program;
when a password input operation aiming at a password input window is detected, determining whether an input password is matched with the security access password;
if the matching is successful, displaying a sensitive short message list in a fourth interface of the application program; if the matching fails, the sensitive short message list is not displayed;
and the sensitive short messages contained in the sensitive short message list are determined according to the configuration of the sensitive short message setting component.
In some possible designs, the method further comprises:
when the short message arrives and the short message is determined to be the sensitive short message according to the configuration of the sensitive short message setting component, displaying a prompt window in a fifth interface of the application program, wherein the prompt window comprises prompt information which is used for prompting the receiving of the sensitive information.
In some possible designs, the method further comprises:
and when the operation aiming at the prompt window is detected, displaying the third interface, wherein the third interface comprises a password input window.
In a second aspect, an embodiment of the present disclosure further provides a short message management apparatus, including:
and the display module is used for displaying the sensitive short message management control in a first interface of the application program.
The processing module is used for detecting whether the sensitive short message management control is opened or not; when the sensitive short message management control is detected to be opened, a sensitive short message setting component is displayed in a second interface of the application program; the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message.
In a third aspect, an embodiment of the present disclosure further provides an electronic device, including: memory, processor, and computer program instructions;
the memory is configured to store the computer program instructions;
the processor is configured to execute the computer program instructions to implement the method of any of the first aspects.
In a fourth aspect, an embodiment of the present disclosure further provides a readable storage medium, including: carrying out a procedure;
the program, when executed by a processor of an electronic device, is for implementing the method of any of the first aspects.
In a fifth aspect, the disclosed embodiments also provide a program product, which includes a computer program stored in a readable storage medium, from which the computer program can be read by at least one processor of the electronic device, and the execution of the computer program by the at least one processor causes the electronic device to implement the method according to any one of the first aspect.
The disclosed embodiment provides a short message management method, a short message management device and a readable storage medium, wherein a sensitive short message management control is displayed in a first interface of an application program; and when the sensitive short message management control is detected to be opened, displaying a sensitive short message setting component in a second interface of the application program, wherein the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message. By providing the sensitive short message setting component, the user can conveniently carry out personalized configuration according to the sensitive short message setting component, thereby meeting the personalized requirements of the user on sensitive short message management.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a flowchart of a short message management method according to an embodiment of the disclosure;
FIGS. 2A-2I are schematic diagrams of human-computer interaction interfaces provided by the present disclosure;
fig. 3 is a flowchart of a short message management method according to another embodiment of the disclosure;
fig. 4 is a flowchart of a short message management method according to another embodiment of the disclosure;
5A-5D are schematic diagrams of human-computer interaction interfaces provided by the present disclosure;
fig. 6 is a schematic structural diagram of a short message management apparatus according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
The disclosed embodiment provides a short message management method, a short message management device, an electronic device, a readable storage medium and a program product, wherein a sensitive short message management control is displayed in a first interface of an application program; and when the sensitive short message management control is detected to be opened, displaying a sensitive short message setting component in a second interface of the application program, wherein the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message. By providing the sensitive short message setting component, the user can conveniently carry out personalized configuration according to the sensitive short message setting component, thereby meeting the personalized requirements of the user on sensitive short message management.
The short message management method provided by the embodiment of the disclosure is executed by the electronic equipment. The electronic device may be a tablet computer, a mobile phone (e.g., a folding screen mobile phone, a large screen mobile phone, etc.), a wearable device, a vehicle-mounted device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), and other electronic devices having a short message function.
Fig. 1 is a flowchart of a short message management method according to an embodiment of the disclosure. In this embodiment, an execution subject is taken as an example of a terminal device. Referring to fig. 1, the method of the present embodiment includes:
s101, displaying a sensitive short message management control in a first interface of an application program.
The sensitive short message is a short message containing sensitive information. Among these, sensitive information includes but is not limited to: bank card number, identification card number, login password, dynamic verification code, payment password, home address, house number information, student status information, etc.
The sensitive short message management control is used for controlling the on and off of the sensitive short message management function. When the sensitive short message management control is opened, the terminal equipment starts a sensitive short message management function; and when the sensitive short message management control is closed, the terminal equipment closes the sensitive short message management function.
The sensitive short message management function is a function of automatically performing unified management on short messages containing sensitive information; specifically, the sensitive short message management function may uniformly manage an identification method of the sensitive short message, a reading authority of the sensitive short message, a security access method of the sensitive short message, and the like.
Optionally, the sensitive short message can be identified according to the content of the short message.
In a possible implementation manner, a terminal device stores a sensitive keyword set in advance, the sensitive keyword set includes at least one preset sensitive keyword, and a short message including the preset sensitive keyword is a sensitive short message.
In another possible implementation manner, the terminal device stores a configuration rule corresponding to the sensitive information in advance, the information conforming to the configuration rule is the sensitive information, and the short message containing the sensitive information is the sensitive short message.
Illustratively, the arrangement rule corresponding to the sensitive information pre-stored by the terminal device is as follows: text 1+ combination of characters and numbers + text 2. The content of the short message received by the terminal equipment is 'zhang, 158fxw, A city B street C cell 1 unit', the short message accords with the arrangement rule corresponding to the sensitive information, therefore, the terminal equipment can identify the short message as the sensitive short message.
The arrangement rule is not limited in the scheme and can be flexibly set according to the requirement.
In another possible implementation manner, the terminal device may further perform semantic analysis on the content of the short message, and determine whether the short message is a sensitive short message according to a result of the semantic analysis.
The above modes can be used alone or in combination, and the embodiment of the present disclosure does not limit this.
Optionally, in the present disclosure, the sensitive short message determined by the terminal device may be a read short message or an unread short message.
According to a possible implementation manner, the terminal device displays the sensitive short message management control in a first interface of an application program. The sensitive short message management control in the first interface can be in an open state or a closed state.
Optionally, the application is a setting application of the terminal device.
Wherein the first interface may be obtained in a number of ways:
for example, when detecting that the user does not start the sensitive short message management function currently, the terminal device displays a prompt window on an interface of the terminal device, where the prompt window includes a prompt message for prompting the user whether to start the sensitive short message management function, and when the user clicks an "open immediately" option in the prompt window, the terminal device displays a first interface.
For another example, the user enters a deep setting page by operating a setting application program of the terminal device, the deep setting page includes related controls set by the short message, and the terminal device displays the first interface by operating the related controls set by the short message in the deep setting interface.
For another example, the user may input voice information to the terminal device, the terminal device performs voice recognition on the voice information, and determines that the user wants to start the sensitive short message management function according to a voice recognition result, and the terminal device further displays the first interface.
For another example, the user may input a preset gesture to the terminal device, the terminal device recognizes the preset gesture, and determines that the user wants to start the sensitive short message management function according to a preset corresponding relationship between the preset gesture and the start of the sensitive short message management function, and the terminal device further displays the first interface.
In the scheme, the implementation mode of triggering the terminal device to display the first interface is not limited.
S102, when the sensitive short message management control is detected to be opened, a sensitive short message setting component is displayed in a second interface of the application program; the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message.
As described in S101, the sensitive short message management function may uniformly manage the identification manner of the sensitive short message, the reading authority of the sensitive short message, the security access manner of the sensitive short message, and the like; that is to say, the sensitive short message setting component provided by the present disclosure can configure attributes such as an identification method, a reading authority, a security access method, and the like of the sensitive short message.
The sensitive short message setting component may include a plurality of controls, and each control is used for configuring different attribute information of the sensitive short message.
Optionally, the sensitive short message setting component may include a first control configured to configure a target short message type, where the short messages of the target short message type are all sensitive short messages. The target short message type can be divided according to the short message content.
For example, the short message can be divided into a verification code short message (i.e. a short message containing a verification code), an identification card information short message (i.e. a short message containing identification card information), a payment password short message (i.e. a short message containing payment password information) and a conventional short message according to the content of the short message; the types of the target short message comprise: the short messages include three types of verification code short messages (namely short messages containing verification codes), identity card information short messages (namely short messages containing identity card information) and payment password short messages (namely short messages containing payment password information). Through the first control, the user can set the short message of the target type needing key protection according to the self, and therefore the personalized requirements of the user are met.
Optionally, the sensitive short message setting component may include a second control configured to configure a target sender number, where a short message sent by the target sender number is a sensitive short message. The number of the target sender can be imported through an address book or manually input by a user, and the implementation mode of inputting the number of the target sender is not limited by the disclosure. Through the second control, the user can independently set the short message sent by the target object which needs to be subjected to key protection, so that the personalized requirement of the user is met.
Optionally, the sensitive short message setting component may include a third control configured to configure a custom sensitive vocabulary, where the short message including the custom sensitive vocabulary is a sensitive short message.
Illustratively, the user can select or input one or more custom sensitive vocabularies through the third control, and the custom sensitive vocabularies can be determined by the user according to the needs of the user.
Therefore, the sensitive short message setting component can enable a user to set the identification mode of the sensitive short message in a personalized manner through the first control, the second control and the third control.
Optionally, the sensitive short message setting component may include a fourth control configured to configure a reading permission of the sensitive short message. When the fourth control is opened, other application programs installed on the terminal equipment can read the short message content and all related information of the sensitive short message; when the fourth control is closed, other application programs installed on the terminal device cannot read the short message content and all related information of the sensitive short message.
Illustratively, when the fourth control is opened, the clipboard installed on the terminal device can read the verification code in the verification code short message; when the fourth control is closed, the clipboard cannot read the verification code in the verification code short message.
Optionally, the sensitive short message setting component may include a fifth control for configuring a security access password of the sensitive short message. The number of the security access passwords may be one or more. For example, the secure access password may include: one or more of a digital password, a biometric password, a fingerprint password, and a pattern password.
And the security access password configured through the fifth control is stored in the terminal equipment, when the user needs to check the sensitive short message, the terminal equipment matches the detected password input by the user with the stored security access password, and when the matching is successful, the sensitive short message is displayed.
Therefore, the sensitive short message setting component can enable the user to set the access authority and the access mode of the sensitive short message in a personalized manner through the fourth control and the fifth control.
It should be noted that the first to fifth controls are not limited to the sensitive short message setting component. It should be understood that when the user has more personalized setting requirements, the sensitive short message setting component may further include other controls to configure the relevant attribute information of the sensitive short message.
Referring to the description in S101, the sensitive short message management control in the first interface may be in an open state or a closed state. When a sensitive short message management control in a first interface is in an open state, the first interface and a second interface are the same interface; when the sensitive short message management control in the first interface is in a closed state, and then the sensitive short message management control is switched from closed to open, a second interface is displayed, namely the second interface is different from the first interface.
In the embodiment, a sensitive short message management control is displayed in a first interface of an application program; and when the sensitive short message management control is detected to be opened, displaying a sensitive short message setting component in a second interface of the application program, wherein the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message. By providing the sensitive short message setting component, the user can conveniently carry out personalized configuration according to the sensitive short message setting component, thereby meeting the personalized requirements of the user on sensitive short message management.
Exemplarily, fig. 2A to 2I are schematic diagrams of human-computer interaction interfaces provided by the present disclosure. The man-machine interface shown in fig. 2A to 2I is a detailed description of the short message management method shown in the embodiment shown in fig. 1. For convenience of description, in fig. 2A to 2I, the terminal device is a mobile phone, and a setting application program (for short, setting) and a short message application program (for short, short message) are installed in the mobile phone.
Fig. 2A-2B exemplarily illustrate one implementation of a handset displaying a first interface.
Referring to fig. 2A, the user interface 11 may be an interface of a main screen of the mobile phone, and the user interface 11 includes an icon a1 corresponding to a setting (application).
When the handset detects a user operation (e.g., a click operation) icon a1, the handset displays a deep settings interface, illustratively the user interface 12 shown in FIG. 2B.
Illustratively, the user interface 12 includes setting controls corresponding to each application installed on the mobile phone and system settings of the mobile phone. The control 1201 is a setting control corresponding to a short message (application program). When the mobile phone detects a user operation (such as a click operation) control 1201, the mobile phone displays a first interface on the screen.
Fig. 2C illustrates another implementation of the handset displaying the first interface.
Referring to fig. 2C, when the mobile phone detects that the automatic management function for disabled short messages is not turned on, the user interface 13 is displayed, where the user interface 13 includes a prompt window C1, the prompt window C1 includes a region C2, and a text "do or not turn on the sensitive short message management function? ", to prompt the user that the sensitive short message management function is not started currently; the prompt window c1 of the user interface 13 further includes a region c3 and a region c4, the text "set later" may be displayed in the region c3, and the text "open soon" may be displayed in the region c 4. When the mobile phone detects an operation (such as a click operation) for the area c4, the mobile phone displays a first interface on the screen.
The schematic diagrams of the first interface and the second interface in two different cases are exemplarily shown below by fig. 2D to 2F.
In one case, the sensitive short message management control K1 and the sensitive short message setting component K2 are displayed in the same user interface.
Illustratively, referring to the user interface 14 in fig. 2D, the sensitive short message management control K1 is in the off state, and the sensitive short message setting component K2 is in the inoperable state.
Illustratively, referring to the user interface 15 in fig. 2E, when the sensitive short message management control K1 is in the open state, the sensitive short message setting component K2 is in the operable state.
In addition, when the mobile phone detects an operation on the sensitive short message management control K1 in fig. 2D, the sensitive short message setting component K2 is updated to an operable state, and the mobile phone can display the user interface 15 in fig. 2E.
In the case shown in fig. 2D and fig. 2E, if the number of controls included in the sensitive short message setting component K2 is large, part of the controls may be displayed in the user interface 14 and the user interface 15, and other controls may be in a hidden state. As shown in the user interface 14 and the user interface 15 are a first control K3, a second control K4, a third control K5, a fourth control K6, a fifth control K7, and a sixth control K8. Wherein, when the mobile phone detects an operation (such as a click operation) for the sixth control K8, more controls are displayed.
In another case, the sensitive short message management control K1 and the sensitive short message setting component K2 are displayed in different user interfaces, that is, the sensitive short message management control K1 is displayed in the first interface, and when the sensitive short message management control K1 is opened, the sensitive short message setting component K2 is displayed in the second interface.
Illustratively, referring to the user interface 16 in fig. 2F, a sensitive short message management control K1 is displayed in the user interface 16, and the sensitive short message management control K1 is in an off state. When the sensitive short message management control K1 is detected to be opened, the mobile phone displays the user interface 17 shown in fig. 2G, wherein the user interface 17 includes the sensitive short message setting component K2, and the user interface 17 is equivalent to the second interface described above.
Optionally, in the cases shown in fig. 2D to 2F, no matter whether the sensitive short message setting component K2 is in an operable state, each control included in the sensitive short message setting component K2 may correspond to default configuration information.
Illustratively, referring to fig. 2H, the target sms type setting control in the user interface 18 may include, by default: a verification code short message and an identity card information short message; if the user wants to add the target short message type, for example, the user can operate the area corresponding to the payment password short message.
Illustratively, referring to FIG. 2I, an input window 1901 and a control 1902 may be included in the user interface 19. If the mobile phone detects the operation on the input window 1901, an input soft keyboard can be displayed, and a user can manually input the number of the target sender through a numeric keyboard in the input soft keyboard; if the mobile phone detects the operation aiming at the control 1902, the mobile phone can jump to the mobile phone address book and display the contacts in the mobile phone address book, each contact can correspond to a tag area, the tag area is used for being selected by the user, and then the number of the contact selected by the user can be updated to be the number of the target sender.
Similarly, the number of the target sender can be defaulted to be absent, and when the user needs the number, the number of the target sender can be imported in an address list or a manual input mode; the custom sensitive vocabulary may be absent by default and may be entered in a third control shown in the user interface 15 when desired by the user.
Fig. 3 is a flowchart of a short message management method according to an embodiment of the disclosure. Referring to fig. 3, the method of the present embodiment includes:
s301, when the short message is detected to arrive, determining whether the short message is sensitive according to the configuration of the sensitive short message setting component.
On the basis of the embodiment shown in fig. 1, it is assumed that the sensitive short message setting component includes the first control to the fifth control, and the user has configured the first control to the fifth control in advance. When a short message reaches the terminal equipment, the terminal equipment determines whether the short message is a sensitive short message or not according to the configuration of the first control to the third control contained in the sensitive short message setting component. And after the short message is determined to be a sensitive short message, configuring the reading authority and the safe access password of the short message according to the fourth control and the fifth control.
Specifically, the terminal device may determine whether the short message is a sensitive short message according to the type of the target short message, the number of the target sender, and the user-defined sensitive vocabulary.
Exemplarily, the terminal device receives the short message a, classifies the short message a according to the content of the short message, and determines the type of the short message corresponding to the short message a; if the short message type corresponding to the short message A belongs to the target short message type, determining that the short message A is a sensitive short message; and if the short message type corresponding to the short message A does not belong to the target short message type, determining that the short message A is not a sensitive short message.
Exemplarily, the terminal device receives the short message a, and the terminal device determines whether the sender number of the short message a belongs to the target sender number; if the sender number of the short message A belongs to the target sender number, determining that the short message A is a sensitive short message; and if the sender number of the short message A does not belong to the target sender number, determining that the short message A is not a sensitive short message.
Exemplarily, the terminal device receives the short message a, and the terminal device determines whether the short message content of the short message a contains a user-defined sensitive vocabulary; if the short message content of the short message A contains the self-defined sensitive words, determining that the short message A is a sensitive short message; and if the short message content of the short message A does not contain the self-defined sensitive words, determining that the short message A is not a sensitive short message.
The short message A can be confirmed to be a sensitive short message through any one of the three modes, and if the short message A is confirmed not to be a sensitive short message through all the three modes, the short message A can be regarded as a conventional short message.
S302, if the short message is determined to be a sensitive short message, configuring relevant attribute information of the short message according to the sensitive short message setting component.
In this step, the related attribute information of the short message includes: the reading authority of the short message and the safe access password of the short message. Specifically, when the terminal device determines that the received short message is a sensitive short message, the terminal device configures the reading authority of the short message according to a fourth control in the sensitive short message setting component, and configures the security access password of the short message according to a fifth control in the sensitive short message setting component.
In this embodiment, when a short message arrives at a terminal device, whether the short message is a sensitive short message is identified through personalized identification attribute information configured by a sensitive short message setting component; when the received short message is determined to be a sensitive short message, the reading authority and the safe access password of the short message are configured through the personalized access attribute information configured by the sensitive short message setting component, so that personalized sensitive short message management is realized, and the personalized requirements of users are met.
Fig. 4 is a flowchart of a short message management method according to another embodiment of the disclosure. Referring to fig. 4, this embodiment may further include, after S302, on the basis of the embodiment shown in fig. 3:
s303, when the password input operation aiming at the password input window is detected, whether the input password is matched with the security access password is determined.
If the matching is successful, executing S304; if the matching fails, S305 is executed.
According to a possible implementation mode, when a new short message arrives at the terminal equipment, the terminal equipment displays a prompt window on a user interface. When an operation for the prompt window is detected, a user interface including a password input window is displayed.
In another possible implementation manner, when the user actively views the sensitive short messages in the short message inbox, the user can click the corresponding control to enable the terminal device to display a user interface containing a password input window.
Of course, this disclosure does not limit the specific implementation of having the terminal device display the password input window.
And S304, displaying a sensitive short message list in a fourth interface of the application program.
And S305, not displaying the sensitive short message list.
The sensitive short messages included in the sensitive short message lists in S304 and S305 are determined by the terminal device according to the configuration of the sensitive short message setting component.
In the embodiment, the sensitive short message is a short message which needs to be subjected to security protection, so that the sensitive short message list can be displayed only when the password input by the user is consistent with the preset security access password, and otherwise, the sensitive short message list is hidden and displayed, so that the security of the sensitive short message is ensured.
Illustratively, fig. 5A to 5D are schematic diagrams of human-computer interaction interfaces provided by the present disclosure. The human-computer interaction interfaces shown in fig. 5A to 5D are detailed descriptions of the methods shown in the embodiments shown in fig. 3 and 4.
For convenience of explanation, fig. 5A to 5D illustrate in detail a terminal device as an example of a mobile phone. And the mobile phone has successfully configured each control contained in the sensitive short message setting component.
With reference to fig. 2A to fig. 2I, specifically, configuring the target short message type through the first control includes: a verification code short message and an identity card information short message; the target senders are 'Xiaoming' and 'Zhanghong' configured through a second control; and configuring a self-defined sensitive vocabulary through the third control, wherein the self-defined sensitive vocabulary is an A project. The sensitive short message is configured through a fourth control and is not allowed to be read; the security access password which is configured with the sensitive short message through the fifth control is a digital password of '123456'.
Illustratively, referring to the user interface 20 shown in fig. 5A, the user interface 20 includes a password input window x1, when the mobile phone detects an operation on the password input window x1, an input method soft keyboard is further displayed in the user interface 20, and a user can input a password through the input method soft keyboard; the mobile phone acquires the password input by the user and matches the password input by the user with the pre-configured security access password '123456'.
When the matching is successful, a user interface 21 as shown in fig. 5B is exemplarily displayed. When the match fails, the user interface 20 may continue to be displayed.
Referring to the user interface 21 shown in fig. 5B, the user interface 21 includes a sensitive short message list, where the sensitive short messages in the sensitive short message list are identified according to the configurations of the first control to the third control. For example, the sensitive short message list shown in the user interface 21 includes short messages sent by "xiaoming" and "zhang", and includes short messages containing "item a" in the short message content.
Optionally, when the sensitive short message list is displayed, the sensitive short messages may be sorted according to the receiving time of each sensitive short message. For example, the sensitive short message list is arranged at a position before the receiving time is earlier and at a position after the receiving time is later, so that the user can check and select whether to delete or move the sensitive short message with the earlier receiving time out of the sensitive short message list; or, the receiving time later can be arranged at the front position, and the receiving time earlier can be arranged at the rear position, so that the user can conveniently select to view from near to far according to the receiving time.
Optionally, the sensitive short messages in the sensitive short message list may also be sorted according to a priority order, for example, when the priority of the verification code short message is higher than that of the identity card information short message, the verification code short message is arranged at a front position, and the identity card information short message is arranged behind the verification code short message. Or when the priority of the verification code short message is lower than that of the identity card information short message, the verification code short message is arranged at the position behind the verification code short message, and the identity card information short message is arranged at the position in front of the verification code short message.
Optionally, the senders can also be sorted according to the priority order; or, the messages can be sorted according to the priority order of the short message types; or, the sensitive short messages can be sorted according to the importance of the sensitive short messages, wherein the importance of the sensitive short messages can be determined according to senders, short message contents and the like.
Optionally, a control 2101, a control 2102, a control 2103, and a control 2104 may also be included in user interface 21.
The control 2101 is used for batch management of the sensitive short messages. If the label area y corresponding to the current sensitive short message is in the unselected state, when the mobile phone detects the operation aiming at the control 2101, the label area y corresponding to each sensitive short message can be updated to be in the selected state. If the label area y corresponding to the current sensitive short message is in the selected state, when the mobile phone detects the operation aiming at the control 2101, the label area corresponding to each sensitive short message can be updated to be in the unselected state.
Of course, the tag area y corresponding to each sensitive short message can also be operated separately.
Then, the user can delete the selected sensitive short messages in batch through the operation control 2103, or cancel the selected sensitive short messages through the operation control 2104.
Control 2102 is used to add new sensitive text messages. Specifically, when the mobile phone detects an operation on the control 2102, the mobile phone may display a conventional short message list, where each conventional short message corresponds to one tag area, and the conventional short message may be added to the sensitive short message list by operating the tag area of the conventional short message.
The method and the device for displaying the sensitive short message list do not limit the sorting mode of the sensitive short messages.
The user interface 20 shown in fig. 5A may be obtained by any one of the following methods:
in a possible implementation manner, in conjunction with the user interface 11 shown in fig. 2A, when the mobile phone detects an operation on the short message icon a2, the user interface 22 shown in fig. 5C is displayed, a control 2201 is included in the user interface 22, and when the user clicks the control 2201, the user interface 20 shown in fig. 5A is exemplarily displayed.
Certainly, if the pre-configured security access password is a fingerprint password, a face password, a voice password or other types of passwords, decryption can be performed in a corresponding manner.
Another possible implementation manner is that when a short message arrives, and the mobile phone determines that the short message is a sensitive short message according to the configurations of the first control to the third control, the mobile phone exemplarily displays a user interface 23 as shown in fig. 5D, the user interface 23 includes a prompt window 2301, characters "receiving a sensitive short message, please decrypt and view" can be displayed in the prompt window 2301, and when the user clicks any region of the prompt window 2301, the mobile phone exemplarily displays the user interface 20 as shown in fig. 5A.
As can be seen from the method embodiments shown in fig. 3 to 4 and the human-computer interaction interfaces exemplarily shown in fig. 5A to 5D, the short message management method provided by the embodiment of the present disclosure can implement personalized sensitive short message protection, and meet personalized requirements of users.
Fig. 6 is a schematic structural diagram of a short message management device according to an embodiment of the present disclosure. Referring to fig. 6, the short message management apparatus 600 provided in this embodiment includes: a display module 601 and a processing module 602.
The display module 601 is configured to display the sensitive short message management control in a first interface of the application program.
The processing module 602 is configured to detect whether a sensitive short message management control is opened; when the sensitive short message management control is detected to be opened, a sensitive short message setting component is displayed in a second interface of the application program; the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message.
In some possible designs, the processing module 602 is further configured to configure a target short message type when detecting an operation on the first control in the sensitive short message setting component, where a short message of the target short message type is a sensitive short message.
In some possible designs, the processing module 602 is further configured to configure a target sender number when detecting an operation on a second control included in the sensitive short message setting component, where a short message sent by the target sender number is a sensitive short message.
In some possible designs, the processing module 602 is further configured to configure a customized sensitive vocabulary when detecting an operation on a third control included in the sensitive short message setting component, where a short message including the customized sensitive vocabulary is a sensitive short message.
In some possible designs, the processing module 602 is further configured to configure a reading permission of the sensitive short message when detecting an operation on a fourth control included in the sensitive short message setting component.
In some possible designs, the processing module 602 is further configured to configure a security access password of the sensitive short message when detecting an operation on a fifth control included in the sensitive short message setting component.
In some possible designs, the processing module 602 is further configured to determine whether the short message is a sensitive short message according to the configuration of the sensitive short message setting component when the short message is detected to arrive.
In some possible designs, if it is determined that the short message is a sensitive short message, the processing module 602 is further configured to process the short message, and configure the related attribute information of the short message according to the sensitive short message setting component.
In some possible designs, the display module 601 is further configured to display a password input window in a third interface of the application program.
The processing module 602 is further configured to determine whether the input password matches the security access password when a password input operation for the password input window is detected.
The display module 601 is further configured to display a sensitive short message list in a fourth interface of the application program when the matching is successful; if the matching fails, the sensitive short message list is not displayed; and the sensitive short messages contained in the sensitive short message list are determined according to the configuration of the sensitive short message setting component.
In some possible designs, when a short message arrives and it is determined that the short message is a sensitive short message according to the configuration of the sensitive short message setting component, the display module 601 is further configured to display a prompt window in a fifth interface of the application program, where the prompt window includes prompt information, and the prompt information is used to prompt that sensitive information is received.
In some possible designs, the processing module 602 is further configured to control the display module 601 to display the third interface when detecting an operation on the prompt window, where the third interface includes a password input window.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 7, the electronic device 700 provided in the present embodiment includes: a memory 701 and a processor 702.
The memory 701 may be a separate physical unit, and may be connected to the processor 702 through a bus 703. The memory 701 and the processor 702 may also be integrated together, implemented by hardware, and the like.
The memory 701 is used to store program instructions that are called by the processor 702 to perform the operations of any of the above method embodiments.
Alternatively, when part or all of the methods of the above embodiments are implemented by software, the electronic device 700 may only include the processor 702. A memory 701 for storing programs is located outside the electronic device 700 and a processor 702 is connected to the memory via circuits/wires for reading and executing the programs stored in the memory.
The processor 702 may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
The processor 702 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
Memory 701 may include volatile memory (volatile memory), such as random-access memory (RAM); the memory may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD); the memory may also comprise a combination of memories of the kind described above.
In some possible designs, electronic device 700 further includes: display component 704 (not shown in FIG. 7) is configured to display the user interface described in the above-described embodiments of the method.
The present disclosure also provides a computer-readable storage medium comprising computer program instructions which, when executed by at least one processor of an electronic device, perform the solution of any of the above method embodiments.
The present disclosure also provides a program product comprising a computer program stored in a readable storage medium, from which the computer program can be read by at least one processor of the electronic device, the execution of which by the at least one processor causes the electronic device to carry out the solution of any of the above method embodiments.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A short message management method is characterized by comprising the following steps:
displaying a sensitive short message management control in a first interface of an application program;
when the sensitive short message management control is detected to be opened, a sensitive short message setting component is displayed in a second interface of the application program; the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message.
2. The method of claim 1, further comprising:
and when the operation of a first control in the sensitive short message setting component is detected, configuring a target short message type, wherein the short message of the target short message type is a sensitive short message.
3. The method of claim 1, further comprising:
and when the operation of a second control contained in the sensitive short message setting component is detected, configuring a target sender number, wherein the short message sent by the target sender number is a sensitive short message.
4. The method of claim 1, further comprising:
and when the operation of a third control contained in the sensitive short message setting component is detected, configuring a self-defined sensitive vocabulary, wherein the short message containing the self-defined sensitive vocabulary is a sensitive short message.
5. The method of claim 1, further comprising:
and when the operation of a fourth control contained in the sensitive short message setting component is detected, configuring the reading permission of the sensitive short message.
6. The method of claim 1, further comprising:
and when the operation of a fifth control contained in the sensitive short message setting component is detected, configuring a security access password of the sensitive short message.
7. The method according to any one of claims 1 to 6, further comprising:
when the short message is detected to arrive, determining whether the short message is a sensitive short message or not according to the configuration of the sensitive short message setting component;
and if the short message is determined to be a sensitive short message, configuring relevant attribute information of the sensitive short message according to the sensitive short message setting component.
8. A short message management device is characterized by comprising:
the display module is used for displaying the sensitive short message management control in a first interface of the application program;
the processing module is used for detecting whether the sensitive short message management control is opened or not;
the display module is further used for displaying a sensitive short message setting component in a second interface of the application program when the processing module detects that the sensitive short message management control is opened; the sensitive short message setting component is used for configuring relevant attribute information of the sensitive short message.
9. An electronic device, comprising: memory, processor, and computer program instructions;
the memory is configured to store the computer program instructions;
the processor is configured to execute the computer program instructions to cause the electronic device to implement the short message management method of any one of claims 1 to 7.
10. A readable storage medium, comprising: carrying out a procedure;
the program is executed by a processor of an electronic device to implement the short message management method of any one of claims 1 to 7.
CN202110388906.5A 2021-04-12 2021-04-12 Short message management method and device and readable storage medium Pending CN112866474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110388906.5A CN112866474A (en) 2021-04-12 2021-04-12 Short message management method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110388906.5A CN112866474A (en) 2021-04-12 2021-04-12 Short message management method and device and readable storage medium

Publications (1)

Publication Number Publication Date
CN112866474A true CN112866474A (en) 2021-05-28

Family

ID=75992514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110388906.5A Pending CN112866474A (en) 2021-04-12 2021-04-12 Short message management method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN112866474A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101178650A (en) * 2007-06-28 2008-05-14 腾讯科技(深圳)有限公司 Method and device for modifying control property based on response
CN104702782A (en) * 2015-02-05 2015-06-10 惠州Tcl移动通信有限公司 Short message management method and mobile terminal thereof
CN106020630A (en) * 2016-07-04 2016-10-12 北京小米移动软件有限公司 Method and device for processing short messages
CN107347117A (en) * 2017-08-07 2017-11-14 努比亚技术有限公司 A kind of message management method, mobile terminal and computer-readable recording medium
US20180075254A1 (en) * 2015-03-16 2018-03-15 Titus Inc. Automated classification and detection of sensitive content using virtual keyboard on mobile devices

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101178650A (en) * 2007-06-28 2008-05-14 腾讯科技(深圳)有限公司 Method and device for modifying control property based on response
CN104702782A (en) * 2015-02-05 2015-06-10 惠州Tcl移动通信有限公司 Short message management method and mobile terminal thereof
US20180075254A1 (en) * 2015-03-16 2018-03-15 Titus Inc. Automated classification and detection of sensitive content using virtual keyboard on mobile devices
CN106020630A (en) * 2016-07-04 2016-10-12 北京小米移动软件有限公司 Method and device for processing short messages
CN107347117A (en) * 2017-08-07 2017-11-14 努比亚技术有限公司 A kind of message management method, mobile terminal and computer-readable recording medium

Similar Documents

Publication Publication Date Title
EP2830296B1 (en) Method and apparatus for processing data and message
US8365282B2 (en) Security system based on input shortcuts for a computer device
US10528719B2 (en) OS security filter
WO2017032008A1 (en) Method for starting application, and mobile terminal
CN101682585B (en) Port discovery and message delivery in a portable electronic device
US9075828B2 (en) Electronic device and method of controlling the same
US20130347102A1 (en) Method, Apparatus and System for Access Mode Control of a Device
US20110287741A1 (en) Secure application control in mobile terminal using biometric sensor
EP3457308B1 (en) Method for improving information security and terminal
EP3352066B1 (en) Method and apparatus for displaying function interface
CN104182662A (en) Mobile terminal, system and method for hiding and starting hidden application programs
US10511594B2 (en) Verification information processing method and device
US20080160960A1 (en) Remote processing device management
EP3422228A1 (en) Icon processing method and device for applications
US9513779B2 (en) Device and method for improving efficiency of entering a password using a key-limited keyboard
CN112866474A (en) Short message management method and device and readable storage medium
CN111913773A (en) NFC card control method, NFC card control device and electronic equipment
WO2023082817A1 (en) Application program recommendation method
CA2637972C (en) Security system based on input shortcuts for a computer device
CN106131805A (en) The method of a kind of information transmission and terminal
EP3376420A1 (en) Interface processing method, electronic device and graphic user interface
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
CN113423107A (en) System and method for carrying out mobile phone number identity authentication based on 5G message
CN106446717A (en) Information processing method, device and terminal
CN107222608B (en) Contact person sharing method and user terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination