CN111726805A - Terminal and processing method - Google Patents

Terminal and processing method Download PDF

Info

Publication number
CN111726805A
CN111726805A CN201910214248.0A CN201910214248A CN111726805A CN 111726805 A CN111726805 A CN 111726805A CN 201910214248 A CN201910214248 A CN 201910214248A CN 111726805 A CN111726805 A CN 111726805A
Authority
CN
China
Prior art keywords
short message
verification code
code short
application program
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910214248.0A
Other languages
Chinese (zh)
Inventor
张博
朱晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201910214248.0A priority Critical patent/CN111726805A/en
Publication of CN111726805A publication Critical patent/CN111726805A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a terminal and a processing method, wherein the terminal comprises the following steps: an input unit configured to receive a touch operation from a user; a display unit configured to display a user interface; and a processor coupled with the input unit and the display unit, the processor configured to: determining that a verification code short message is received; and if the application program reading the verification code short message does not pass the safety authentication, determining the number for sending the verification code short message, and returning the latest non-verification code short message corresponding to the number to the application program. According to the invention, the application program reading the verification code short message is subjected to security authentication, and if the application program does not pass the security authentication, the latest non-verification code short message corresponding to the number sending the verification code short message is returned to the application program, so that the application program which does not pass the security authentication can not read the verification code short message, and the security of the verification code short message is greatly improved.

Description

Terminal and processing method
Technical Field
The present invention relates to the field of communications, and in particular, to a terminal and a processing method.
Background
With the development of internet technology, in order to ensure the security of internet user information, a background server is usually required to be constructed to perform security verification on the user information, so as to determine whether a user can correctly log in a network application or perform operations such as network transaction.
The mobile phone verification code is a most effective verification code system by sending the verification code to the mobile phone, and at present, many websites and application programs provide the function of the mobile phone short message verification code, so that the safety of user operation can be ensured accurately and safely, and the correctness of the user is verified. Some verification code access providers provide the short message verification code service of the mobile phone, each website sends a request to a server of the access provider through an interface, the server sends random numbers or letters to the mobile phone, and the server of the access provider uniformly verifies the verification codes.
At present, the short message content of the verification code in the system short message application can be easily read, intercepted and even tampered by some malicious third party applications, so that personal information is leaked, and even economic loss is brought to users.
Disclosure of Invention
The exemplary embodiment of the invention provides a terminal and a processing method, which can improve the safety of a verification code short message.
According to an aspect of the exemplary embodiments, there is provided a terminal including: an input unit configured to receive a touch operation from a user;
a display unit configured to display a user interface; and
a processor coupled with the input unit and the display unit, the processor configured to:
determining that a verification code short message is received;
and if the application program reading the verification code short message does not pass the safety authentication, determining the number for sending the verification code short message, and returning the latest non-verification code short message corresponding to the number to the application program.
In some exemplary embodiments, the returning of the last non-verification code short message corresponding to the number includes:
searching a nearest non-verification code short message corresponding to the number from a short message table;
and assigning the snippet corresponding to the number in the session table as the non-verification code short message.
In some exemplary embodiments, the sms table includes a field for characterizing whether the sms table is a verification code sms;
the searching the nearest non-verification code short message corresponding to the number from the short message table comprises: and searching the nearest non-verification code short message corresponding to the number according to the field.
In some exemplary embodiments, the last non-verification code short message corresponding to the number is sent to the local machine by the number.
In some exemplary embodiments, the last non-verification code short message corresponding to the number is sent to the number by the local computer.
In some exemplary embodiments, the processor is further configured to: and if the application program reading the verification code short message passes the security authentication, returning the verification code short message to the application program.
According to another aspect of the exemplary embodiments, there is provided a processing method including: at a terminal having one or more processors, memory, an input unit, and a display unit:
determining that a verification code short message is received;
and if the application program reading the verification code short message does not pass the safety authentication, determining the number for sending the verification code short message, and returning the latest non-verification code short message corresponding to the number to the application program.
In some exemplary embodiments, the returning of the last non-verification code short message corresponding to the number includes:
searching a nearest non-verification code short message corresponding to the number from a short message table;
and assigning the snippet corresponding to the number in the session table as the non-verification code short message.
In some exemplary embodiments, the method further comprises:
and if the application program reading the verification code short message passes the security authentication, returning the verification code short message to the application program.
According to a further aspect of the exemplary embodiments, there is provided a computer storage medium having stored therein computer program instructions which, when run on a computer, cause the computer to perform a processing method as described above.
On the basis of the common knowledge in the field, the above preferred conditions can be combined randomly to obtain the preferred embodiments of the invention.
The positive progress effects of the invention are as follows: according to the invention, the application program reading the verification code short message is subjected to security authentication, and if the application program does not pass the security authentication, the latest non-verification code short message corresponding to the number sending the verification code short message is returned to the application program, so that the application program which does not pass the security authentication can not read the verification code short message, and the security of the verification code short message is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 schematically illustrates a structure of a terminal provided in an embodiment of the present invention;
FIG. 2 illustrates a schematic diagram of a user interface on a terminal provided by an embodiment of the invention;
FIG. 3 illustrates a flow chart of a processing method provided by an embodiment of the invention;
fig. 4 exemplarily shows a schematic diagram that the display unit 140 displays a short message conversation interface between the background server of the feng nest express delivery cabinet and the local machine;
fig. 5 is a schematic diagram illustrating that the display unit 140 displays a short message conversation interface between the service hotline of the construction bank and the host computer;
fig. 6 exemplarily shows a frame diagram of an application reading short message database in an Android system;
fig. 7 is a diagram illustrating the display unit 140 displaying a session interface of a short message application in a terminal in an embodiment;
fig. 8 is a diagram illustrating that the display unit 140 displays a session interface of a third party sms application installed in the terminal in an embodiment;
fig. 9 is a diagram illustrating that the display unit 140 displays a session interface of a short message application in a terminal in another embodiment;
fig. 10 is a schematic diagram illustrating that the display unit 140 displays a session interface of a third party sms application installed in the terminal in another embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the exemplary embodiments of the present application clearer, the technical solutions in the exemplary embodiments of the present application will be clearly and completely described below with reference to the drawings in the exemplary embodiments of the present application, and it is obvious that the described exemplary embodiments are only a part of the embodiments of the present application, but not all the embodiments.
All other embodiments, which can be derived by a person skilled in the art from the exemplary embodiments shown in the present application without inventive effort, shall fall within the scope of protection of the present application. Moreover, while the disclosure herein has been presented in terms of exemplary one or more examples, it is to be understood that each aspect of the disclosure can be utilized independently and separately from other aspects of the disclosure to provide a complete disclosure.
It should be understood that the terms "first," "second," "third," and the like in the description and in the claims of the present application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used are interchangeable under appropriate circumstances and can be implemented in sequences other than those illustrated or otherwise described herein with respect to the embodiments of the application, for example.
Furthermore, the terms "comprises" and "comprising," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a product or device that comprises a list of elements is not necessarily limited to those elements explicitly listed, but may include other elements not expressly listed or inherent to such product or device.
The term "unit" as used herein refers to any known or later developed hardware, software, firmware, artificial intelligence, fuzzy logic, or combination of hardware and/or software code that is capable of performing the functionality associated with that element.
A block diagram of a hardware configuration of the terminal 100 according to an exemplary embodiment is exemplarily shown in fig. 1. As shown in fig. 1, the terminal 100 includes: a Radio Frequency (RF) circuit 110, a memory 120, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a Wireless Fidelity (Wi-Fi) module 170, a processor 180, a bluetooth module 181, and a power supply 190.
The RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and may receive downlink data of a base station and then send the downlink data to the processor 180 for processing; the uplink data may be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
The memory 120 may be used to store software programs and data. The processor 180 performs various functions of the terminal 100 and data processing by executing software programs or data stored in the memory 120. The memory 120 may include high speed random access memory and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. The memory 120 stores an operating system that enables the terminal 100 to operate. The memory 120 may store an operating system and various application programs, and may also store codes for performing the methods described in the embodiments of the present application.
The input unit 130, such as a touch screen, may be used to receive input numeric or character information, generate signal inputs related to user settings and function control of the terminal 100. Specifically, the input unit 130 may include a touch screen 131 disposed on a front surface of the terminal 100 and may collect a touch operation by a user thereon or nearby. The input unit 130 in this application may receive a touch operation of a user, such as clicking a button, dragging a scroll box, and the like.
The display unit 140 may be used to display information input by the user or information provided to the user and a Graphical User Interface (GUI) of various menus of the terminal 100. The display unit 140 may include a display screen 141 disposed on the front surface of the terminal 100. The display screen 141 may be configured in the form of a liquid crystal display, a light emitting diode, or the like. The display unit 140 may be used to display various graphical user interfaces described herein. The touch screen 131 may cover the display screen 141, or the touch screen 131 and the display screen 141 may be integrated to implement input and output functions of the terminal 100, and after the integration, the touch screen may be referred to as a touch display screen for short. In the present application, the display unit 140 may display the application programs and the corresponding operation steps.
The terminal 100 may also include at least one sensor 150, such as an acceleration sensor 155, a light sensor, a motion sensor. The terminal 100 may also be configured with other sensors such as a gyroscope, barometer, hygrometer, thermometer, infrared sensor, and the like.
Audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between a user and terminal 100. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161. The terminal 100 may also be provided with a volume button for adjusting the volume of the sound signal. On the other hand, the microphone 162 converts the collected sound signal into an electrical signal, converts the electrical signal into audio data after being received by the audio circuit 160, and outputs the audio data to the RF circuit 110 to be transmitted to, for example, another terminal or outputs the audio data to the memory 120 for further processing. In this application, the microphone 162 may capture the voice of the user.
Wi-Fi belongs to a short-distance wireless transmission technology, and the terminal 100 can help a user to send and receive e-mails, browse webpages, access streaming media, and the like through the Wi-Fi module 170, and provides wireless broadband internet access for the user.
The processor 180 is a control center of the terminal 100, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal 100 and processes data by running or executing software programs stored in the memory 120 and calling data stored in the memory 120. In some embodiments, processor 180 may include one or more processing units; the processor 180 may also integrate an application processor, which mainly handles operating systems, user interfaces, applications, etc., and a baseband processor, which mainly handles wireless communications. It will be appreciated that the baseband processor described above may not be integrated into the processor 180. In the present application, the processor 180 may run an operating system, an application program, a user interface display, and a touch response, and the processing method described in the embodiments of the present application. In addition, the processor 180 is coupled with the input unit 130 and the display unit 140.
And the bluetooth module 181 is configured to perform information interaction with other bluetooth devices having a bluetooth module through a bluetooth protocol. For example, the terminal 100 may establish a bluetooth connection with a wearable electronic device (e.g., a smart watch) having a bluetooth module via the bluetooth module 181, so as to perform data interaction.
The terminal 100 also includes a power supply 190 (e.g., a battery) to power the various components. The power supply may be logically connected to the processor 180 through a power management system to manage charging, discharging, power consumption, etc. through the power management system. The terminal 100 may also be configured with power buttons for powering the terminal on and off, and locking the screen.
Fig. 2 is a schematic diagram for illustrating a user interface on a terminal (e.g., terminal 100 of fig. 1). In some implementations, a user can open a corresponding application by touching an application icon on the user interface, or can open a corresponding folder by touching a folder icon on the user interface.
Fig. 3 is a flowchart for illustrating a processing method provided by an embodiment of the present invention. Specifically, the processing method provided by the embodiment of the present invention includes: at a terminal having one or more processors, memory, an input unit, and a display unit:
step 301, determining that a verification code short message is received.
In some implementations, when a user logs in a network application, performs network transaction or receives and sends an express, a background server of each website, each bank, or each express company and other institutions sends a short message of a verification code to the local computer.
In step 301, it is determined whether the received short message is a verification code short message. It should be understood that the verification code short message is a short message whose content includes a verification code.
In some implementations, at least one first keyword and at least one second keyword are obtained from the short message, and whether the short message is a verification code short message is judged according to whether the short message simultaneously comprises the first keyword and the second keyword. Specifically, if the short message simultaneously comprises a first keyword and a second keyword, determining that the short message is a verification code short message; otherwise, determining that the short message is a non-verification code short message. The first keyword may be an "authentication code", an "authorization code", a "check code", a "password", a "pick-up code", or the like. The second key may be a data string and/or an alphabetic string, for example, the second key may be "123456", "abcd", "123 abc", and so on.
In order to make the result of determining the verification code short message more accurate, in some implementations, it is determined whether the short message is the verification code short message according to a distance between a first keyword and a second keyword in the short message. Specifically, it is required to first determine whether the short message includes the first keyword and the second keyword, if so, obtain a distance between the first keyword and the second keyword, and if not, determine that the short message is not a verification code short message. The distance between the first keyword and the second keyword refers to the number of characters spaced between the first keyword and the second keyword. And respectively obtaining the distance between each first keyword and each second keyword, and obtaining the minimum distance from the plurality of distances, wherein if the minimum distance is smaller than a preset distance, the short message can be determined as a verification code short message, and otherwise, the short message is determined as a non-verification code short message.
Step 302, if the application program reading the verification code short message does not pass the security authentication, determining the number sending the verification code short message, and returning the latest non-verification code short message corresponding to the number to the application program.
In step 302, security authentication needs to be performed on the application program that reads the verification code short message, and if the application program fails the security authentication, the latest non-verification code short message corresponding to the number that sends the verification code short message is returned to the application program, so that the application program that fails the security authentication cannot read the verification code short message, and the security of the verification code short message is greatly improved.
In some implementations, applications that are deemed safe may be stored in a white list, which is securely authenticated in step 302 by determining whether the application is in the white list. Specifically, if the application is in the white list, the application may pass the security authentication; if the application is not in the white list, the application cannot pass the security authentication. The system application program may be stored in a white list, for example, some application programs developed by a terminal manufacturer, or some third party application programs considered to be safe may be stored in a white list, for example, a wechat, an online banking APP, and the like.
In some implementations, the security authentication is performed in step 302 by determining whether the signature of the application meets a predetermined condition. Specifically, if the signature of the application program meets the preset condition, the application program can pass the security authentication; if the signature of the application program does not meet the preset condition, the application program can not pass the safety certification. Wherein, the preset condition can be set according to the requirement. For example, if the signature of the application does not include "Hisense", the preset condition is considered to be not met, and if the signature of the application includes "Hisense", the preset condition is considered to be met.
In some implementations, the processing method further includes: and if the application program reading the verification code short message passes the security authentication, returning the verification code short message to the application program. In this implementation, the verification code short message can be read by the application program of the security authentication.
In some implementations, the last non-verification-code short message corresponding to the number sending the verification-code short message is sent to the local machine by the number. Fig. 4 is a diagram illustrating that the display unit 140 displays a short message conversation interface between the background server of the feng nest express delivery cabinet and the local machine. In step 302, it is determined that the number of the short message with the verification code (including the pickup code 798089) sent to the local computer is 10691238195102, and the latest short message with the non-verification code corresponding to the number is the short message which is sent by the local computer and is taken out by the express delivery person.
In some implementations, the last non-verification-code short message corresponding to the number sending the verification-code short message is sent to the number by the local computer. Fig. 5 is a diagram for illustrating the display unit 140 displaying the short message conversation interface between the service hotline of the construction bank and the host computer. In step 302, it is determined that the number of the short message with the verification code (including the authorization code 1504) sent to the local machine is the service hot line 95533 of the construction bank, and the latest short message with the non-verification code corresponding to the number is the authorization short message 88#88 sent to the number by the local machine.
Fig. 6 is a frame diagram for illustrating an application program in an Android system reading a short message database. In the Android system, an application program reads a short message database through a Provider, and specifically reads and returns short message data through an MmsSmsProvider and an SmsProvider. Wherein, the short message database comprises a short message table and a session table. The short message table (sms table) is used for storing all short message contents and comprises all short message items; the session table (threads table) is used for storing session contents, including a latest received or sent short message corresponding to each number, and specifically, the short message contents are represented by a snippet field.
In some implementations, the returning of the latest non-verification-code short message corresponding to the number in step 302 includes:
step 3021, searching a latest non-verification code short message corresponding to the number from a short message table;
and step 3022, assigning the snippet corresponding to the number in the session table as the non-verification code short message.
In some implementations, the sms table includes a field for indicating whether the sms table is a verification code sms; in step 3021, searching for the closest non-verification-code short message corresponding to the number from the short message table includes: and searching the nearest non-verification code short message corresponding to the number according to the field.
The above embodiments are described in detail below with reference to specific examples.
Table 1 is used to show the short message table. The is _ verify field in the dashed box is a field newly added in the embodiment of the present invention, and is used to characterize whether the is a verification code short message. Specifically, an is _ verify value of 1 indicates that the short message is a verification code short message, and an is _ verify value of 0 indicates that the short message is a non-verification code short message. In step 3021, the latest non-verification-code short message corresponding to the number of the verification-code short message is obtained by searching for the short message with the latest date and is _ verify of 0 from table 1.
TABLE 1
Number (I) Content providing method and apparatus Time of day is_verify
95559 Short message password: 984054, respectively; password sequence number: 2... 201903111605 1
95559 You can' t. 7689 card 10.10.03.10.. 201903111049 0
10690769888 [ transportation Bank Credit card ] you enjoy a big gift. 201903081706 0
10690769888 [ transportation Bank Credit card ] honored specially-chosen guest. 201903050905 0
1346686****(Wang Xiaoming) Tomorrow time? 201903012102 0
1346686****(Wang Xiaoming) The meeting was temporarily changed to three pm and informed. 201902280930 0
1588965****(Liu aunt) Aunt Xiexi Liu. 201903010825 0
1523448****(father) Get on the car and do not think. 201902281630 0
15216678523 Good, received. 201902151915 0
10086 Honored customers, your good! Welcome the use of Shandong. 201902121530 0
10086 Shandong mobile alert service: congratulating you participated. 201902111640 0
10086 Shandong mobile alert service: thank you for you to participate in the liter. 201902111315 0
。。。 。。。 。。。 。。。
Table 2 is used to show the session table. The snippet _ no _ verify field in the dashed line frame is a newly added field in the embodiment of the present invention, and is used for representing a latest received or sent non-verification code short message corresponding to each number. In step 3022, snippet corresponding to the number for sending the verification code short message in table 2 may be assigned as snippet _ no _ verify.
TABLE 2
Figure BDA0002001516220000101
Figure BDA0002001516220000111
Fig. 7 is a diagram for illustrating the display unit 140 displaying a session interface of a short message application in the terminal in the present embodiment. Fig. 8 is a session interface for displaying the third party sms application installed in the terminal by the display unit 140 in this embodiment. Referring to table 1 and table 2, and fig. 7 and fig. 8, it is assumed that the short message application program in the terminal is in the white list, and a third party short message application program installed in the terminal, for example, a go short message, is not in the white list. Determining that a verification code short message 'short message password' is received: 984054, respectively; password sequence number: if the short message application program reads the verification code short message, the reading result is shown as the short message in the rectangular frame in fig. 7; if the third party short message application program reads the verification code short message, the reading result is shown as the short message in the rectangular box in fig. 8, and it can be seen from table 1 that the short message is the latest non-verification code short message corresponding to the 95559 number.
In some implementations, the last non-verification-code sms corresponding to the number from which the verification-code sms was sent in step 302 is empty. Specifically, the following tables 3 and 4 can be referred to.
Table 3 is used to show a short message table, and an is _ verify field in a dashed line box is a field newly added in the embodiment of the present invention, and is used to characterize whether the short message is an authentication code short message. Specifically, an is _ verify value of 1 indicates that the short message is a verification code short message, and an is _ verify value of 0 indicates that the short message is a non-verification code short message. Referring to the first row of data in table 3, the short message corresponding to the 1069146000001.. number only has one verification code short message "[ quick delivery easy ] with a password of 5AJ192 to the family of ten thousand.", i.e., the latest non-verification code short message corresponding to the number sending the verification code short message is empty.
TABLE 3
Figure BDA0002001516220000112
Figure BDA0002001516220000121
Table 4 is used to show the session table. The snippet _ no _ verify field in the dashed line frame is a newly added field in the embodiment of the present invention, and is used for representing a latest received or sent non-verification code short message corresponding to each number. Referring to the first row of data in table 4, the snippet _ no _ verify field corresponding to the 1069146000001.
TABLE 4
Figure BDA0002001516220000122
Fig. 9 is a diagram for illustrating the display unit 140 displaying a session interface of a short message application in the terminal in the present embodiment. Fig. 10 is a diagram for illustrating that the display unit 140 displays a session interface of a third party sms application installed in the terminal in the present embodiment. Referring to table 3 and table 4, and fig. 9 and fig. 10, it is assumed that the short message application program in the terminal is in the white list, and the third party short message application program installed in the terminal, for example, the go short message, is not in the white list. Determining that the verification code short message is received (express delivery is easy) by the password 5AJ192 to the family, and if the short message application program reads the verification code short message, the reading result is shown as the short message in the rectangular frame in fig. 9; if the verification code short message is read by the third-party short message application program, and the reading result is null, the session interface of the third-party short message application program needs to be filled according to the short message category (specifically, the short message data corresponding to the 10086 number) which is not displayed in the session interface before in table 4, as shown by the short message in the rectangular frame in fig. 10.
An embodiment of the present invention further provides a computer storage medium, where computer program instructions are stored in the computer storage medium, and when the instructions are run on a computer, the instructions cause the computer to execute the processing method provided in the foregoing embodiment.
Since the terminal and the computer storage medium in the embodiment of the present invention may be applied to the processing method, reference may also be made to the method embodiment for obtaining technical effects, and details of the embodiment of the present invention are not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
While specific embodiments of the invention have been described above, it will be appreciated by those skilled in the art that these are by way of example only, and that the scope of the invention is defined by the appended claims. Various changes and modifications to these embodiments may be made by those skilled in the art without departing from the spirit and scope of the invention, and these changes and modifications are within the scope of the invention.

Claims (10)

1. A terminal, comprising:
an input unit configured to receive a touch operation from a user;
a display unit configured to display a user interface; and
a processor coupled with the input unit and the display unit, the processor configured to:
determining that a verification code short message is received;
and if the application program reading the verification code short message does not pass the safety authentication, determining the number for sending the verification code short message, and returning the latest non-verification code short message corresponding to the number to the application program.
2. The terminal of claim 1, wherein the returning of the last non-verification code short message corresponding to the number comprises:
searching a nearest non-verification code short message corresponding to the number from a short message table;
and assigning the snippet corresponding to the number in the session table as the non-verification code short message.
3. The terminal of claim 2, wherein the short message table includes a field for characterizing whether it is a verification code short message;
the searching the nearest non-verification code short message corresponding to the number from the short message table comprises: and searching the nearest non-verification code short message corresponding to the number according to the field.
4. The terminal of claim 1, wherein the last non-verification code short message corresponding to the number is sent from the number to the local computer.
5. The terminal of claim 1, wherein a last non-verification-code short message corresponding to the number is sent to the number by the local computer.
6. The terminal of any one of claims 1-5, wherein the processor is further configured to: and if the application program reading the verification code short message passes the security authentication, returning the verification code short message to the application program.
7. A method of processing, comprising:
at a terminal having one or more processors, memory, an input unit, and a display unit:
determining that a verification code short message is received;
and if the application program reading the verification code short message does not pass the safety authentication, determining the number for sending the verification code short message, and returning the latest non-verification code short message corresponding to the number to the application program.
8. The method of claim 7, wherein returning the most recent non-verification-code short message corresponding to the number comprises:
searching a nearest non-verification code short message corresponding to the number from a short message table;
and assigning the snippet corresponding to the number in the session table as the non-verification code short message.
9. The method of claim 7 or 8, wherein the method further comprises:
and if the application program reading the verification code short message passes the security authentication, returning the verification code short message to the application program.
10. A computer storage medium having computer program instructions stored therein which, when run on a computer, cause the computer to perform the method of any one of claims 7-9.
CN201910214248.0A 2019-03-20 2019-03-20 Terminal and processing method Pending CN111726805A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910214248.0A CN111726805A (en) 2019-03-20 2019-03-20 Terminal and processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910214248.0A CN111726805A (en) 2019-03-20 2019-03-20 Terminal and processing method

Publications (1)

Publication Number Publication Date
CN111726805A true CN111726805A (en) 2020-09-29

Family

ID=72563353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910214248.0A Pending CN111726805A (en) 2019-03-20 2019-03-20 Terminal and processing method

Country Status (1)

Country Link
CN (1) CN111726805A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105207775A (en) * 2014-05-30 2015-12-30 北京奇虎科技有限公司 Reading method and device for verification information
CN105912922A (en) * 2016-04-29 2016-08-31 北京小米移动软件有限公司 Information management method and device, and terminal
CN106682485A (en) * 2016-11-29 2017-05-17 维沃移动通信有限公司 Method for processing verification code and mobile terminal
CN107295179A (en) * 2017-06-29 2017-10-24 青岛海信移动通信技术股份有限公司 The method and apparatus that a kind of short message is shown
WO2017211205A1 (en) * 2016-06-07 2017-12-14 华为技术有限公司 Method and device for updating whitelist
CN108184025A (en) * 2018-01-16 2018-06-19 青岛海信移动通信技术股份有限公司 The processing method and processing device of identifying code short message
CN109245902A (en) * 2018-09-21 2019-01-18 厦门美图移动科技有限公司 The guard method of instant messaging message authentication codes and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105207775A (en) * 2014-05-30 2015-12-30 北京奇虎科技有限公司 Reading method and device for verification information
CN105912922A (en) * 2016-04-29 2016-08-31 北京小米移动软件有限公司 Information management method and device, and terminal
WO2017211205A1 (en) * 2016-06-07 2017-12-14 华为技术有限公司 Method and device for updating whitelist
CN106682485A (en) * 2016-11-29 2017-05-17 维沃移动通信有限公司 Method for processing verification code and mobile terminal
CN107295179A (en) * 2017-06-29 2017-10-24 青岛海信移动通信技术股份有限公司 The method and apparatus that a kind of short message is shown
CN108184025A (en) * 2018-01-16 2018-06-19 青岛海信移动通信技术股份有限公司 The processing method and processing device of identifying code short message
CN109245902A (en) * 2018-09-21 2019-01-18 厦门美图移动科技有限公司 The guard method of instant messaging message authentication codes and device

Similar Documents

Publication Publication Date Title
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
US20170352090A1 (en) Method, apparatus, and system for processing order information
CN110869907B (en) Method and terminal for browsing application page
US20210192094A1 (en) Security Adjustments in Mobile Devices
WO2016082194A1 (en) Message processing method and apparatus
CN110417543B (en) Data encryption method, device and storage medium
CN107493378B (en) Method and device for logging in application program, computer equipment and readable storage medium
CN107766747B (en) Method for verifying integrity of application program installation package, mobile terminal and server
CN103634294A (en) Information verifying method and device
CN104901805B (en) A kind of identification authentication methods, devices and systems
US11017066B2 (en) Method for associating application program with biometric feature, apparatus, and mobile terminal
CN105468952A (en) Authentication method and apparatus
CN104901806B (en) A kind of virtual resource processing method, device and system
CN104954126A (en) Sensitive operation verification method, device and system
WO2018082560A1 (en) Account number registration method, related device, and system
CN110474864B (en) Method for registering and logging in mobile application program and electronic equipment
WO2018121536A1 (en) Information security verification method and terminal
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN108122151B (en) Graphic code display method, graphic code processing method, device and system
CN110856173B (en) Network access method and device and electronic equipment
CN111726805A (en) Terminal and processing method
CN105791253B (en) Method and device for acquiring authentication information of website
CN109951604B (en) Message processing method, mobile terminal and user identity identification module
KR102558445B1 (en) Smishing message monitoring method and smishing level determination method
CN116993333A (en) Characteristic value transfer method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200929

RJ01 Rejection of invention patent application after publication