CN108156315A - A kind of short message guard method and device - Google Patents
A kind of short message guard method and device Download PDFInfo
- Publication number
- CN108156315A CN108156315A CN201711330062.9A CN201711330062A CN108156315A CN 108156315 A CN108156315 A CN 108156315A CN 201711330062 A CN201711330062 A CN 201711330062A CN 108156315 A CN108156315 A CN 108156315A
- Authority
- CN
- China
- Prior art keywords
- short message
- user information
- message application
- database
- safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Environmental & Geological Engineering (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides a kind of short message guard method and device, this method include:User information is obtained by short message application;If the user information of the short message application meets safe trigger condition; the user information is then stored in the safety database of the short message application; wherein; the safety database is pre-created based on the short message application; and the URI of the safety database is different from the URI of the default database of short message application described in operating system, to achieve the purpose that the information that user is protected to wish protection.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of short message guard method and devices.
Background technology
As the development of network technology and the promotion of terminal device (for example, mobile phone, tablet computer) performance, user pass through
The frequency that terminal device interacts (for example, transmitting-receiving short message) with the external world is higher and higher, and bulk information is generated in interactive process, these
Often there are the information that user to wish protection in information, for example, identifying code, payment information, business information for communicating with client etc.,
Once information leakage can cause serious loss to user.
For above-mentioned information security issue, solution relatively conventional at present is:To being deposited in information database
The need information setting security identifier to be protected (for example, addition special field) put, when user by security password or compares
When hidden entrance accesses, allow to check the information (abbreviation security information) with security identifier, otherwise, can only check general information
(without the information of security identifier).But in some systems (for example, android system) information database URI
(Uniform Resource Identifier, uniform resource identifier) is usually all fixed, if disabled user is solid based on this
Fixed URI is that can get the information of entire information database using library mode is dragged, and therefore, user is caused to wish protection
Information cannot be protected.
Invention content
The purpose of the present invention is to provide a kind of short message guard method and device, user to be protected to wish the letter of protection
Breath.
For achieving the above object, the present invention provides following technical solutions:
On the one hand, the present invention provides a kind of short message guard method, the method includes:
User information is obtained by short message application;
If the user information of the short message application meets safe trigger condition, the user information is stored in the short message should
Safety database;
Wherein, the safety database is pre-created based on the short message application, and the URI of the safety database
Different from the URI of the default database of the application of short message described in operating system.
On the other hand, the present invention provides a kind of short message protective device, and described device includes:
Acquiring unit, for obtaining user information by short message application;
Unit is stored in, if the user information for short message application meets safe trigger condition, the user is believed
Breath is stored in the safety database of the short message application;Wherein, the safety database is pre-created based on the short message application
, and the URI of the safety database is different from the URI of the default database of short message application described in operating system.
User by being wished that the information of protection is stored in URI and default database by the present invention it can be seen from above description
The different safety databases of URI, make other application that can not be got when accessing default database in safety database and preserve
User information, both made disabled user by the way of library is dragged or the user information in default database can only be got, so as to
Play the role of the user information that user is protected to wish protection.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some embodiments of the present invention, for
For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is a kind of short message guard method flow chart shown in the embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of user information editing interface shown in the embodiment of the present invention;
Fig. 3 is a kind of schematic diagram at session list interface shown in the embodiment of the present invention;
Fig. 4 is a kind of schematic diagram of security information list interface shown in the embodiment of the present invention;
Fig. 5 is a kind of schematic diagram of user information display interface shown in the embodiment of the present invention;
Fig. 6 is the structure diagram of the user equipment shown in the embodiment of the present invention;
Fig. 7 is a kind of structure diagram of short message protective device shown in the embodiment of the present invention.
Specific embodiment
Here exemplary embodiment will be illustrated in detail, example is illustrated in the accompanying drawings.Following description is related to
During attached drawing, unless otherwise indicated, the same numbers in different attached drawings represent the same or similar element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects being described in detail in claims, of the invention.
It is only merely for the purpose of description specific embodiment in terminology used in the present invention, is not intended to limit the invention.
It is also intended in the present invention and " one kind " of singulative used in the attached claims, " described " and "the" including majority
Form, unless context clearly shows that other meanings.It is also understood that term "and/or" used herein refers to and wraps
Containing one or more associated list items purposes, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the present invention
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, not departing from
In the case of the scope of the invention, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
It is one embodiment flow chart of short message guard method of the present invention referring to Fig. 1, which protects short message
Process is described.
Step 101, user information is obtained by short message application.
By taking Android (Android) system as an example, short message applies the database for having acquiescence in android system, this is silent
The URI for recognizing database is fixed as content://sms (path)/XX (message identification), if other application is based on the default data
The URI in library accesses the database of short message application, then can get all short messages being stored in the database and (wish including user
The short message of protection), both make to be directed to the short message setting access rights for wishing to protect, if disabled user's use drags the modes such as library to be based on being somebody's turn to do
The URI of default database still can copy out all short messages in database, so as to ensure that user wishes to protect
Short message safety.
For this purpose, the database new for short message application establishment of the invention, abbreviation safety database, the safety database
URI is different from the URI of the default database that short message is applied in operating system, for example, safety database is created for short message application, it should
The URI of safety database is content://safe-sms/XX, at this point, corresponding two databases of short message application, one is operation
The default database of system, one is for storing the safety database that user wishes the short message of protection.
Step 102, if the user information of short message application meets safe trigger condition, the user information is stored in
The safety database of the short message application.
Specifically, when receiving user information by short message application, if the peer user for sending the user information is this
The preset secret user in ground (for example, contact person a certain in address list is set as secret user), alternatively, being included in user information
The user information received is then stored in safety database by preset secure content (for example, identifying code), otherwise, deposit acquiescence
In database, the user information deposit safety database of protection will be wished, be not required to user information deposit acquiescence number to be protected
According to library.
When sending user information by short message application, refer to if receiving safety on the editing interface of user information and sending
Enable, for example, as shown in Fig. 2, user click editing interface on safe send button, then user information is stored in safety database
And it sends;If not receiving safety sends instruction, user information is stored in default database and is sent.
When the user information in query safe database, the session list interface of short message application is initially entered, such as Fig. 3 institutes
Show, the user information being stored in safety database classification (is shown as pacifying by display safety information entry in session list interface
Full information), it clicks security information entry and enters security information list interface, as shown in figure 4, the user in display safety database
Information list clicks the display interface that a certain user information in the list enters the user information, as shown in figure 5, the user
Security identifier is shown on the display interface of information, to prompt user that the information has been in safeguard protection state.
Further, since corresponding two databases of short message application, therefore, notified in execution information number statistical, new information etc.
During operation, need to be counted and inquired for two databases;And user information support is converted between two databases, i.e.,
Information in default database, which can be clipped in safety database, to be preserved, and the information in safety database can clip to default data
It is preserved in library;Meanwhile increase to the caching of user information in safety database (for example, session cache, rough draft caching etc.), to carry
Rise information reading speed;It is, of course, also possible to encryption further is made to safety database, to strengthen the guarantor to user information
Shield, which is not described herein again.
It can be seen from the above description that the URI of the invention by for short message application one URI of establishment and default database is not
Same safety database, makes other application that can not perceive the presence of the safety database, therefore, when it accesses default database
The user information preserved in safety database can not be got, both made disabled user by the way of library is dragged or can only be got silent
The user information in database is recognized, so as to play the role of the user information that protection is deposited in safety database.
Now by taking the short message application in the mobile phone for running android system as an example, short message protection process is discussed in detail.
The URI for the default database that short message is applied is content in android system://sms/XX;For short message application
Safety database is created, the URI of the safety database is content://safe-sms/XX.
Private contact is set by cell phone address book, for example, setting " Zhang San " is private contact;Default security strategy
For:If the short message of private contact transmission is received, alternatively, receiving the short message comprising verification code information is saved in secure data
In library.
When receiving short message, determine whether the short message that private contact is sent, that is, send the telephone number of the short message
It is whether consistent with the telephone number of preset private contact, if unanimously, the short message being currently received is stored in safety database
In;If inconsistent, short message content can be further parsed, if the short message is stored in comprising verification code information in the short message content
Safety database;Otherwise, by the default database of short message deposit short message application.
When needing to send short message, on short message editing interface after editing short message content, click to send safely shown in Fig. 2 and press
Button, current short message deposit safety database are simultaneously sent, if not clicking safe send button (clicks common send button, in Fig. 2 not
Show), then short message is stored in default database and sends.
When needing to check the short message deposited in safety database, into session list interface shown in Fig. 3, safety is clicked
Data entries enter security information list interface shown in Fig. 4, and click Article 2 short message entry enters short message content shown in Fig. 5 and shows
Interface shows security identifier on the display interface, shows that the short message is in safeguard protection state.
When third-party application accesses the database of short message application, since third-party application just knows that the acquiescence of short message application
The URI of database, therefore, it is impossible to the short message stored in safety database be got, so as to play to short message in safety database
Protective effect.
Corresponding with the embodiment of aforementioned short message guard method, the present invention also provides the implementations of short message protective device
Example.
The embodiment of short message protective device of the present invention can be applied on a user device.Device embodiment can be by soft
Part is realized, can also be realized by way of hardware or software and hardware combining.For implemented in software, as a logical meaning
On device, be that corresponding computer program instructions are formed in the processor run memory by equipment where it.From hard
For part level, as shown in fig. 6, a kind of hardware structure diagram for short message protective device of the present invention place equipment, in addition to Fig. 6 institutes
Except the processor and nonvolatile memory that show, equipment in embodiment where device is generally according to the practical work(of the equipment
Can, other hardware can also be included, this is repeated no more.
Fig. 7 is please referred to, is the structure diagram of the short message protective device in one embodiment of the invention.The short message is protected
Protection unit includes acquiring unit 701 and deposit unit 702, wherein:
Acquiring unit 701, for obtaining user information by short message application;
Unit 702 is stored in, if the user information for short message application meets safe trigger condition, by the user
Information is stored in the safety database of the short message application;Wherein, the safety database is created in advance based on short message application
It builds, and the URI of the safety database is different from the URI of the default database of short message application described in operating system.
Further,
The deposit unit 702, specifically for when receiving user information by the short message application, if described in sending
The peer user of user information is preset secret user, alternatively, then will in the user information comprising preset secure content
The user information is stored in the safety database of the short message application.
Further,
It is described deposit unit 702, specifically for when by the short message application send user information when, if in the user
Safety is received on the editing interface of information and sends instruction, then the user information is stored in the secure data of the short message application
Library is simultaneously sent.
Further, described device further includes:
Display unit, for when checking the user information in the safety database, in the display of the user information
Security identifier is shown on interface.
Further, the operating system is android system.
The function of each unit and the realization process of effect specifically refer to and step are corresponded in the above method in above device
Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related part is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separating component
The unit of explanation may or may not be physically separate, and the component shown as unit can be or can also
It is not physical unit, you can be located at a place or can also be distributed in multiple network element.It can be according to reality
It needs that some or all of module therein is selected to realize the purpose of the present invention program.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and implement.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
God and any modification, equivalent substitution, improvement and etc. within principle, done, should be included within the scope of protection of the invention.
Claims (10)
1. a kind of short message guard method, which is characterized in that the method includes:
User information is obtained by short message application;
If the user information of the short message application meets safe trigger condition, the user information is stored in the short message application
Safety database;
Wherein, the safety database is pre-created based on the short message application, and the URI of the safety database is different
The URI for the default database that the short message described in operating system is applied.
2. the method as described in claim 1, which is characterized in that touched if the user information of short message application meets safety
The user information is then stored in the safety database of the short message application by clockwork spring part, including:
When receiving user information by the short message application, if the peer user for sending the user information is preset private
Close user, alternatively, the user information then is stored in the short message application comprising preset secure content in the user information
Safety database.
3. the method as described in claim 1, which is characterized in that touched if the user information of short message application meets safety
The user information is then stored in the safety database of the short message application by clockwork spring part, including:
When sending user information by short message application, if receiving safe hair on the editing interface of the user information
Instruction is sent, then the user information is stored in safety database and the transmission of the short message application.
4. method as described in any one of claims 1-3, which is characterized in that described to answer the user information deposit short message
After safety database, further include:
When checking the user information in the safety database, safety post is shown on the display interface of the user information
Know.
5. the method as described in claim 1, which is characterized in that the operating system is android system.
6. a kind of short message protective device, which is characterized in that described device includes:
Acquiring unit, for obtaining user information by short message application;
Unit is stored in, if the user information for short message application meets safe trigger condition, the user information is deposited
Enter the safety database of the short message application;Wherein, the safety database is pre-created based on the short message application, and
The URI of the safety database is different from the URI of the default database of short message application described in operating system.
7. device as claimed in claim 6, it is characterised in that:
The deposit unit, specifically for when receiving user information by the short message application, believing if sending the user
The peer user of breath is preset secret user, alternatively, comprising preset secure content in the user information, then by the use
Family information is stored in the safety database of the short message application.
8. device as claimed in claim 6, it is characterised in that:
The deposit unit, specifically for when by the short message application send user information when, if in the user information
Safety is received on editing interface and sends instruction, then the safety database that the user information is stored in the short message application is concurrent
It send.
9. the device as described in claim 6-8 is any, which is characterized in that described device further includes:
Display unit, for when checking the user information in the safety database, in the display interface of the user information
Upper display security identifier.
10. device as claimed in claim 6, which is characterized in that the operating system is android system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711330062.9A CN108156315A (en) | 2017-12-13 | 2017-12-13 | A kind of short message guard method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711330062.9A CN108156315A (en) | 2017-12-13 | 2017-12-13 | A kind of short message guard method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108156315A true CN108156315A (en) | 2018-06-12 |
Family
ID=62466733
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711330062.9A Pending CN108156315A (en) | 2017-12-13 | 2017-12-13 | A kind of short message guard method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108156315A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112532790A (en) * | 2019-08-29 | 2021-03-19 | 中兴通讯股份有限公司 | Short message processing method, system, terminal device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105391677A (en) * | 2014-09-09 | 2016-03-09 | 宇龙计算机通信科技(深圳)有限公司 | Information transmission method and mobile terminal |
CN106550357A (en) * | 2015-09-22 | 2017-03-29 | 中兴通讯股份有限公司 | A kind of note method for managing security, device and terminal |
-
2017
- 2017-12-13 CN CN201711330062.9A patent/CN108156315A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105391677A (en) * | 2014-09-09 | 2016-03-09 | 宇龙计算机通信科技(深圳)有限公司 | Information transmission method and mobile terminal |
CN104517069A (en) * | 2015-01-12 | 2015-04-15 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN106550357A (en) * | 2015-09-22 | 2017-03-29 | 中兴通讯股份有限公司 | A kind of note method for managing security, device and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112532790A (en) * | 2019-08-29 | 2021-03-19 | 中兴通讯股份有限公司 | Short message processing method, system, terminal device and storage medium |
CN112532790B (en) * | 2019-08-29 | 2023-03-31 | 中兴通讯股份有限公司 | Short message processing method, system, terminal device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11252171B2 (en) | Methods and systems for detecting abnormal user activity | |
US10375116B2 (en) | System and method to provide server control for access to mobile client data | |
US10223524B1 (en) | Compromised authentication information clearing house | |
US9846776B1 (en) | System and method for detecting file altering behaviors pertaining to a malicious attack | |
US9838384B1 (en) | Password-based fraud detection | |
US8112799B1 (en) | Method, system, and computer program product for avoiding cross-site scripting attacks | |
US10176318B1 (en) | Authentication information update based on fraud detection | |
US9747455B1 (en) | Data protection using active data | |
US20160267290A1 (en) | Information viewing method, device, system and storage medium | |
US10382620B1 (en) | Protecting confidential conversations on devices | |
US9781143B1 (en) | Systems and methods for detecting near field communication risks | |
WO2016101384A1 (en) | Dual-system switch based data security processing method and apparatus | |
US20120042365A1 (en) | Disposable browser for commercial banking | |
WO2019153857A1 (en) | Asset protection method and apparatus for digital wallet, electronic device, and storage medium | |
FR2885424A1 (en) | DATA PROCESSING DEVICE, TELECOMMUNICATION TERMINAL AND DATA PROCESSING METHOD USING DATA PROCESSING DEVICE. | |
CN105308614B (en) | Policy enforcement delay | |
CN105095758B (en) | Screen locking applied program processing method, device and mobile terminal | |
WO2017190436A1 (en) | Data processing method and apparatus | |
US20040205354A1 (en) | System and method for detecting malicious applications | |
Vecchiato et al. | The perils of Android security configuration | |
KR101834808B1 (en) | Apparatus and method for protecting file from encryption | |
CN104853030A (en) | Information processing method and mobile terminal | |
CN108156315A (en) | A kind of short message guard method and device | |
US10652276B1 (en) | System and method for distinguishing authentic and malicious electronic messages | |
YUSUF et al. | CYBER SECURITY AND ITS IMPLICATION ON LIBRARY USERS’ PRIVACY |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180612 |
|
RJ01 | Rejection of invention patent application after publication |