CN106713618A - Processing method of identifying code and mobile terminal - Google Patents
Processing method of identifying code and mobile terminal Download PDFInfo
- Publication number
- CN106713618A CN106713618A CN201611062947.0A CN201611062947A CN106713618A CN 106713618 A CN106713618 A CN 106713618A CN 201611062947 A CN201611062947 A CN 201611062947A CN 106713618 A CN106713618 A CN 106713618A
- Authority
- CN
- China
- Prior art keywords
- short message
- verification code
- mobile terminal
- identifying code
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 15
- 238000012795 verification Methods 0.000 claims abstract description 219
- 238000000034 method Methods 0.000 claims abstract description 43
- 230000015654 memory Effects 0.000 claims description 31
- 238000012545 processing Methods 0.000 claims description 16
- 238000001514 detection method Methods 0.000 claims description 9
- 239000000284 extract Substances 0.000 claims description 9
- 238000000605 extraction Methods 0.000 claims description 9
- 239000002131 composite material Substances 0.000 claims 1
- 230000005611 electricity Effects 0.000 claims 1
- 241000700605 Viruses Species 0.000 abstract description 39
- 238000013478 data encryption standard Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 9
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 241000699666 Mus <mouse, genus> Species 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72436—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明实施例提供了一种验证码的处理方法及移动终端。该方法包括:检测接收到的短信中是否存在预设关键词,其中,预设关键词为表示预设关键词所在的短信中包含验证码的词汇;若存在,则提取短信中的关键内容,关键内容包括验证码和短信发送端的电话号码;采用对称算法对关键内容进行加密,得到验证码密文。本发明通过预设关键词来检测接收的短信中是否包含验证码,而如果包含验证码,则对短信中的验证码和短信发送端的电话号码两个信息一起进行对称算法的加密。这样即便移动终端中存在拦截验证码的病毒程序,其仍然无法窃取已经经过高度加密的验证码。能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性。
Embodiments of the present invention provide a verification code processing method and a mobile terminal. The method includes: detecting whether there is a preset keyword in the received short message, wherein the preset keyword is a vocabulary indicating that the short message where the preset keyword is located contains a verification code; if it exists, extracting the key content in the short message, The key content includes the verification code and the phone number of the sending end of the short message; the key content is encrypted using a symmetric algorithm to obtain the ciphertext of the verification code. The present invention detects whether the received short message contains a verification code by preset keywords, and if it contains a verification code, then encrypts the verification code in the short message and the phone number of the sending end of the short message together with a symmetric algorithm. In this way, even if there is a virus program intercepting the verification code in the mobile terminal, it still cannot steal the highly encrypted verification code. It can ensure that the verification code is not stolen, avoid the loss of the user's property, and improve the security of the user's verification information.
Description
技术领域technical field
本发明涉及通信技术领域,尤其涉及一种验证码的处理方法及移动终端。The invention relates to the field of communication technology, in particular to a verification code processing method and a mobile terminal.
背景技术Background technique
随着移动终端的快速发展,移动终端带给用户的便利性越来越大。移动终端(例如手机)成为了人们生活的一部分。在这样的大背景下,人们对智能手机的安全性也就越来越在意了。With the rapid development of mobile terminals, the convenience brought by mobile terminals to users is increasing. Mobile terminals (such as mobile phones) have become a part of people's lives. In this context, people are becoming more and more concerned about the security of smartphones.
当用户的手机号、银行卡、身份证遭到泄漏后,短信验证码则成了最后一个安全屏障。无论在电脑还是手机上,验证码短信都是网络支付过程中最重要的一个安全验证环节,短信验证码有时已替代银行卡密码完成最后的安全验证手段。而有了验证码,黑客就可以大肆盗取网银。When the user's mobile phone number, bank card, and ID card are leaked, the SMS verification code becomes the last security barrier. Regardless of whether it is on a computer or a mobile phone, SMS verification codes are the most important security verification link in the online payment process. SMS verification codes have sometimes replaced bank card passwords to complete the final security verification method. With the verification code, hackers can wantonly steal online banking.
所以验证码的保护是个不容忽视的手机安全环节。而由于安卓系统是一个开源的系统,这一点和那些封闭的系统是不一样,因此安卓手机一直被诟病的焦点也是安全性偏差,面临的攻击也更多一些。那么手机一旦被植入了病毒,恶意程序就很容易拦击到用户的短信验证码,从而给用户的财产安全造成损害。Therefore, the protection of the verification code is a mobile phone security link that cannot be ignored. And because the Android system is an open source system, which is different from those closed systems, the focus of criticism on Android phones has always been security deviations, and they face more attacks. Then once the mobile phone is implanted with a virus, malicious programs can easily intercept the user's SMS verification code, thereby causing damage to the user's property security.
在现有技术中,为了保护用户短信验证码的安全,现有方案采用的是:在用户进入支付场景后,该方案可以对当前环境进行安全扫描,即检测是否存在与病毒库中的病毒相匹配的恶意程序,从而确保在接收短信验证码的环境是安全的。In the existing technology, in order to protect the security of the user SMS verification code, the existing solution adopts: after the user enters the payment scene, the solution can perform a security scan on the current environment, that is, to detect whether there is a virus related to the virus in the virus database. Matching malicious programs, so as to ensure that the environment for receiving SMS verification codes is safe.
但是,病毒的更新演变速度很快,而杀毒软件只能杀掉已知的病毒,拦截验证码短信的病毒木马会日益更新,那么如果一类新型病毒还未被杀毒软件所识别,即,移动终端上的病毒程序没有与病毒库中的病毒程序相匹配,那么就会漏掉一些新演变的病毒,从而造成该新型病毒窃取验证码的情况,使得用户财产遭受损失。However, the update and evolution of viruses is very fast, and antivirus software can only kill known viruses, and virus Trojan horses that intercept verification code text messages will be updated day by day. If the virus program on the terminal does not match the virus program in the virus database, some newly evolved viruses will be missed, which will cause the new virus to steal the verification code and cause the user's property to suffer losses.
显然,现有技术中的这种验证码保护方案存在一定的局限性,不能保证接收短信验证码环境的安全,无法避免验证码被窃取的情况,容易给用户造成财产损失。Obviously, this verification code protection scheme in the prior art has certain limitations, and cannot guarantee the security of the environment for receiving SMS verification codes, and cannot avoid the situation of verification codes being stolen, which may easily cause property losses to users.
发明内容Contents of the invention
本发明实施例提供一种验证码的处理方法及移动终端,以解决现有技术中的这种验证码保护方案所存在的不能保证接收短信验证码环境的安全,无法避免验证码被窃取的情况,容易给用户造成财产损失的问题。The embodiment of the present invention provides a verification code processing method and a mobile terminal to solve the problem that the verification code protection scheme in the prior art cannot guarantee the security of the verification code receiving SMS environment and cannot avoid the verification code being stolen , It is easy to cause property damage to users.
第一方面,本发明实施例提供了一种验证码的处理方法,应用于移动终端,所述方法包括:In the first aspect, an embodiment of the present invention provides a method for processing a verification code, which is applied to a mobile terminal, and the method includes:
检测接收到的短信中是否存在预设关键词,其中,所述预设关键词为表示所述预设关键词所在的短信中包含验证码的词汇;Detecting whether there is a preset keyword in the received short message, wherein the preset keyword is a vocabulary indicating that the short message where the preset keyword is located contains a verification code;
若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;If it exists, then extract the key content in the short message, the key content includes a verification code and the phone number of the short message sending end;
采用对称算法对所述关键内容进行加密,得到验证码密文。A symmetric algorithm is used to encrypt the key content to obtain a verification code ciphertext.
第二方面,本发明实施例还提供了一种移动终端,所述移动终端包括:In the second aspect, the embodiment of the present invention also provides a mobile terminal, the mobile terminal includes:
检测模块,用于检测接收到的短信中是否存在预设关键词,其中,所述预设关键词为表示所述预设关键词所在的短信中包含验证码的词汇;A detection module, configured to detect whether there is a preset keyword in the received short message, wherein the preset keyword is a vocabulary indicating that the short message where the preset keyword is located contains a verification code;
第一提取模块,用于若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;The first extraction module is used to extract the key content in the short message if it exists, and the key content includes a verification code and a phone number of the short message sending end;
加密模块,用于采用对称算法对所述关键内容进行加密,得到验证码密文。An encryption module, configured to encrypt the key content by using a symmetric algorithm to obtain a verification code ciphertext.
这样,本发明实施例通过预设关键词来检测接收的短信中是否包含验证码,而如果包含验证码,则对短信中的验证码和短信发送端的电话号码两个信息一起进行对称算法的加密。这样即便移动终端中存在拦截验证码的病毒程序,其仍然无法窃取已经经过高度加密的验证码。这样,本发明实施例从对系统中的病毒进行查杀的角度转而通过对验证码进行高度加密,这样即便移动终端中存在病毒库中没有存储的新型病毒时,仍然能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性。In this way, the embodiment of the present invention detects whether a verification code is included in the received text message by preset keywords, and if the verification code is included, the verification code in the text message and the phone number of the sending end of the text message are encrypted with a symmetric algorithm. . In this way, even if there is a virus program intercepting the verification code in the mobile terminal, it still cannot steal the highly encrypted verification code. In this way, the embodiments of the present invention turn to highly encrypted verification codes from the perspective of checking and killing viruses in the system, so that even if there are new types of viruses that are not stored in the virus database in the mobile terminal, it can still ensure that the verification codes will not be blocked. Stealing, avoiding the loss of users' property, and improving the security of users' verification information.
附图说明Description of drawings
为了更清楚地说明本发明实施例的技术方案,下面将对本发明实施例的描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following will briefly introduce the accompanying drawings that need to be used in the description of the embodiments of the present invention. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention , for those skilled in the art, other drawings can also be obtained according to these drawings without paying creative labor.
图1是本发明第一实施例的验证码的处理方法的流程图;FIG. 1 is a flowchart of a verification code processing method according to a first embodiment of the present invention;
图2是本发明第二实施例的验证码的处理方法的流程图;2 is a flowchart of a verification code processing method according to a second embodiment of the present invention;
图3是本发明第三实施例的验证码的处理方法的流程图;3 is a flowchart of a verification code processing method according to a third embodiment of the present invention;
图4是本发明第四实施例的移动终端的框图;FIG. 4 is a block diagram of a mobile terminal according to a fourth embodiment of the present invention;
图5是本发明第五实施例的移动终端的框图;FIG. 5 is a block diagram of a mobile terminal according to a fifth embodiment of the present invention;
图6是本发明第六实施例的移动终端的框图;FIG. 6 is a block diagram of a mobile terminal according to a sixth embodiment of the present invention;
图7是本发明第七实施例的移动终端的结构示意图。Fig. 7 is a schematic structural diagram of a mobile terminal according to a seventh embodiment of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
第一实施例first embodiment
参照图1,示出了本发明一个实施例的验证码的处理方法的流程图,所述方法具体可以包括如下步骤:Referring to FIG. 1 , it shows a flowchart of a verification code processing method according to an embodiment of the present invention, and the method may specifically include the following steps:
步骤101,检测接收到的短信中是否存在预设关键词;Step 101, detecting whether there is a preset keyword in the received short message;
其中,在移动终端的系统收到短信后,可以首先检测该短信的短信内容中是否包含预设关键词,该预设关键词为表示该关键词所在的短信内容中包含验证码的词汇。所谓验证码即4位或6位数字,当然验证码所包含的数字个数并不限于上述所列举的数量,现有技术中验证码所涉及的所有数字数量都在本发明的保护范围之内。Wherein, after the system of the mobile terminal receives the short message, it may first detect whether the short message content of the short message contains a preset keyword, and the preset keyword is a vocabulary indicating that the content of the short message containing the keyword contains a verification code. The so-called verification code is a 4-digit or 6-digit number. Of course, the number of numbers contained in the verification code is not limited to the number listed above. All the numbers involved in the verification code in the prior art are within the protection scope of the present invention .
步骤102,若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;Step 102, if it exists, then extract the key content in the short message, the key content includes a verification code and the phone number of the short message sending end;
那么,如果在接收的短信的短信内容中检测到预设设置的关键词,即,表示该短信为包含验证码的短信,那么就可以提取该短信中的验证码、以及短信发送端的电话号码,即发信号码。Then, if a preset keyword is detected in the short message content of the received short message, that is, it indicates that the short message is a short message containing a verification code, then the verification code in the short message and the phone number of the sending end of the short message can be extracted, The signal code is sent immediately.
步骤103,采用对称算法对所述关键内容进行加密,得到验证码密文。Step 103: Encrypt the key content using a symmetric algorithm to obtain a verification code ciphertext.
其中,由于对称算法为目前破译难度最高的加密算法,因此,可以采用对称算法来对从短信中提取的验证码和发信号码进行加密,从而得到验证码密文。Among them, since the symmetric algorithm is currently the most difficult encryption algorithm to decipher, the symmetric algorithm can be used to encrypt the verification code and the sending code extracted from the short message, so as to obtain the verification code ciphertext.
这样,本发明实施例通过预设关键词来检测接收的短信中是否包含验证码,而如果包含验证码,则对短信中的验证码和短信发送端的电话号码两个信息一起进行对称算法的加密。这样即便移动终端中存在拦截验证码的病毒程序,其仍然无法窃取已经经过高度加密的验证码。这样,本发明实施例从对系统中的病毒进行查杀的角度转而通过对验证码进行高度加密,这样即便移动终端中存在病毒库中没有存储的新型病毒时,仍然能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性。In this way, the embodiment of the present invention detects whether a verification code is included in the received text message by preset keywords, and if the verification code is included, the verification code in the text message and the phone number of the sending end of the text message are encrypted with a symmetric algorithm. . In this way, even if there is a virus program intercepting the verification code in the mobile terminal, it still cannot steal the highly encrypted verification code. In this way, the embodiments of the present invention turn to highly encrypted verification codes from the perspective of checking and killing viruses in the system, so that even if there are new types of viruses that are not stored in the virus database in the mobile terminal, it can still ensure that the verification codes will not be blocked. Stealing, avoiding the loss of users' property, and improving the security of users' verification information.
第二实施例second embodiment
参照图2,示出了本发明另一个实施例的验证码的处理方法的流程图,所述方法具体可以包括如下步骤:Referring to FIG. 2 , it shows a flow chart of a verification code processing method according to another embodiment of the present invention, and the method may specifically include the following steps:
步骤201,检测接收到的短信中是否存在预设关键词;Step 201, detecting whether there are preset keywords in the received short message;
其中,在移动终端的系统收到短信后,可以首先检测该短信的短信内容中是否包含预设关键词,该预设关键词为表示该关键词所在的短信内容中包含验证码的词汇。所谓验证码即4位或6位数字,当然验证码所包含的数字个数并不限于上述所列举的数量,现有技术中验证码所涉及的所有数字数量都在本发明的保护范围之内。Wherein, after the system of the mobile terminal receives the short message, it may first detect whether the short message content of the short message contains a preset keyword, and the preset keyword is a vocabulary indicating that the content of the short message containing the keyword contains a verification code. The so-called verification code is a 4-digit or 6-digit number. Of course, the number of numbers contained in the verification code is not limited to the number listed above. All the numbers involved in the verification code in the prior art are within the protection scope of the present invention .
步骤202,若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;Step 202, if it exists, then extract the key content in the short message, the key content includes the verification code and the phone number of the short message sending end;
那么,如果在接收的短信的短信内容中检测到预设设置的关键词,即,表示该短信为包含验证码的短信,那么就可以提取该短信中的验证码、以及短信发送端的电话号码,即发信号码。Then, if a preset keyword is detected in the short message content of the received short message, that is, it indicates that the short message is a short message containing a verification code, then the verification code in the short message and the phone number of the sending end of the short message can be extracted, The signal code is sent immediately.
步骤203,根据所述验证码的位数生成验证码标志位;Step 203, generating a verification code flag according to the number of digits of the verification code;
具体而言,如果该验证码的位数为3位,那么该验证码标志位的最后两位数字为03;如果该验证码的位数为6位,那么该验证码标志位的最后两位数字为06,最后两位用于标识验证码的位数。而验证码标志位的位数可以根据实际需要任意设置,只要遵循一定的规则,能够在解密时从一连串的数字中迅速找到该验证码标志位即可。Specifically, if the verification code has 3 digits, then the last two digits of the verification code flag are 03; if the verification code has 6 digits, then the last two digits of the verification code flag The number is 06, and the last two digits are used to identify the digits of the verification code. The number of digits of the verification code flag can be arbitrarily set according to actual needs, as long as certain rules are followed, the verification code flag can be quickly found from a series of numbers when decrypting.
步骤204,将所述电话号码、所述验证码标志位和所述验证码依次排序并进行组合,得到组合内容;Step 204, sequentially sort and combine the phone number, the verification code flag and the verification code to obtain the combined content;
即,可以将电话号码、验证码标志位和验证码做一个排序,并将排序后的三个信息进行组合,得到一组数据,即组合内容。That is, the phone number, the verification code flag and the verification code can be sorted, and the three sorted information can be combined to obtain a set of data, that is, the combined content.
步骤205,采用对称算法对所述组合内容进行加密,得到验证码密文。Step 205: Encrypt the combined content using a symmetric algorithm to obtain a verification code ciphertext.
其中,可以采用DES(Data Encryption Standard,即数据加密标准)对称算法对所述组合内容进行加密,得到验证码密文;Wherein, the combined content may be encrypted using a DES (Data Encryption Standard, i.e. data encryption standard) symmetric algorithm to obtain a verification code ciphertext;
其中,DES算法具有极高安全性,而56位长的密钥的穷举空间为256,这意味着如果一台计算机的速度是每一秒种检测一百万个密钥,则它搜索完全部密钥就需要将近2285年的时间,可见,DES算法的攻击难度极高。Among them, the DES algorithm has extremely high security, and the exhaustive space of a 56-bit long key is 256, which means that if a computer detects one million keys per second, it can search It takes nearly 2285 years for all the keys. It can be seen that the attack of the DES algorithm is extremely difficult.
借助于本发明上述实施例的技术方案,本发明实施例能够在对短信中的关键内容进行加密时,生成验证码标志位,从而能够在后续解密过程中,快速的确定所加密的组合内容中哪部分数据为验证码,从而快速还原短信。With the help of the technical solutions of the above-mentioned embodiments of the present invention, the embodiments of the present invention can generate verification code flags when encrypting the key content in the short message, so that in the subsequent decryption process, it is possible to quickly determine the key content of the encrypted combination. Which part of the data is the verification code, so as to quickly restore the text message.
第三实施例third embodiment
为了更好的理解本发明的上述技术方案,下面结合图3所示的具体实例来对上述技术方案进行详细阐述。In order to better understand the above-mentioned technical solution of the present invention, the above-mentioned technical solution will be described in detail below in conjunction with the specific example shown in FIG. 3 .
首先,移动终端的系统接收到短信;First, the system of the mobile terminal receives the short message;
然后,本发明实施例的系统会按照如下处理方法对接收到的短信进行处理,相比于移动终端的任意一个应用程序,该处理方法对接收到短信的处理优先级是最高的;Then, the system of the embodiment of the present invention will process the received short message according to the following processing method, compared with any application program of the mobile terminal, this processing method has the highest priority for processing the received short message;
即在接收到一条短信后,本发明实施例的处理方法是第一个对该短信进行处理的,而不论该短信中是否包含验证码。这样,就可以保证在短信中的关键内容被加密前,短信不会被病毒程序所拦截,从而使病毒程序无法窃取验证码,造成用户财产损失。That is, after receiving a short message, the processing method of the embodiment of the present invention is the first to process the short message, regardless of whether the short message contains a verification code or not. In this way, it can be ensured that before the key content in the short message is encrypted, the short message will not be intercepted by the virus program, so that the virus program cannot steal the verification code and cause the property loss of the user.
下面详述本发明实施例中提到的对接收的短信处理优先级最高的处理方法的处理流程:The processing flow of the processing method with the highest priority for processing the received short message mentioned in the embodiment of the present invention is described in detail below:
在系统接收到短信后,由于没有验证码等验证数据的短信不会造成用户隐私的窃取和财产的损失,因此,需要采用预设关键词来对短信内容进行检索,该关键词可以包括“验证码”、“校验码”等表示该关键词所在的短信中存在用于校验的数字串(即验证码)的词汇;After the system receives the text message, since the text message without verification code and other verification data will not cause the theft of user privacy and the loss of property, it is necessary to use preset keywords to retrieve the content of the text message, which can include "verification" Code", "verification code" and other words that indicate that there is a digital string (ie verification code) for verification in the text message where the keyword is located;
那么如果短信中不包含预设的任意一个关键词,那么说明该短信不涉及校验数字串信息,病毒程序一般也不会拦截,因此可以不作处理;Then if the short message does not contain any of the preset keywords, it means that the short message does not involve the verification number string information, and the virus program will generally not intercept it, so it can not be processed;
而如果短信中包含有预设的任意一个关键词,那么就说明该短信为校验短信,容易被窃取;And if the short message contains any preset keyword, it means that the short message is a verification short message, which is easy to be stolen;
所以需要提取该接收到的短信中的关键内容,这里包括验证码和短信发送端的电话号码;Therefore, it is necessary to extract the key content of the received SMS, including the verification code and the phone number of the SMS sending end;
因为,这两个数字信息(即验证码和短信发送端的电话号码)为容易影响用户财产安全的关键内容。Because these two digital information (that is, the verification code and the phone number of the sending end of the short message) are key contents that are likely to affect the security of the user's property.
接着,由于后续加密需要将这两个信息组合在一起加密,所以为了避免解密时无法区分这两个数字信息从属于哪个属性,即是电话号码还是验证码。这里需要根据所述验证码的位数生成验证码标志位,具体而言,如果该验证码的位数为3位,那么该验证码标志位的最后两位数字为03;如果该验证码的位数为6位,那么该验证码标志位的最后两位数字为06,最后两位用于标识验证码的位数。而验证码标志位的位数可以根据实际需要任意设置,只要遵循一定的规则,能够在解密时从一连串的数字中迅速找到该验证码标志位即可。Then, since the subsequent encryption needs to combine the two pieces of information together for encryption, in order to avoid being unable to distinguish which attribute the two pieces of digital information belong to when decrypting, that is, the phone number or the verification code. Here, it is necessary to generate a verification code flag according to the number of digits of the verification code. Specifically, if the number of digits of the verification code is 3, the last two digits of the verification code flag are 03; If the number of digits is 6, then the last two digits of the verification code flag are 06, and the last two digits are used to identify the number of digits of the verification code. The number of digits of the verification code flag can be arbitrarily set according to actual needs, as long as certain rules are followed, the verification code flag can be quickly found from a series of numbers when decrypting.
另外,需要注意的是,虽然在本实施例中,该验证码标志位的构成方式为最后两位数字为验证码的位数,但是,该验证码标志位存在的意义在于作为一个标帜,能够在一连串的数字中确定其所在位置,这样就可以确定位于其左侧和右侧的哪个数字串为验证码,以及哪个数字串是电话号码。因此,该验证码标志位的生成方式并不限于上述根据验证码的位数的生成方式,还可以根据电话号码的位数来生成验证码标志位的生成方式,当然,以各个数字串的位数为依据来生成验证码标志位的前提条件为各个数字串的位数不同。而该验证码标志位的生成方式当然也不限于根据数字串的位数来生成的方式,可以是一个具有标识的随机数,而电话号码和验证码的排列方式则需要遵循一定的规则,例如电话号码排在验证码标志位的左侧,而验证码排在验证码标志位的右侧等。In addition, it should be noted that although in this embodiment, the configuration of the verification code flag is such that the last two digits are the number of digits of the verification code, the significance of the existence of the verification code flag is as a flag, Being able to locate it within a series of numbers allows you to determine which string of numbers to the left and right of it is a verification code, and which string is a phone number. Therefore, the generation method of the verification code flag is not limited to the above-mentioned generation method according to the digits of the verification code, and the generation method of the verification code flag can also be generated according to the digits of the phone number. Of course, the digits of each digital string The precondition for generating the verification code flag bit based on the number is that the number of digits of each number string is different. Of course, the way to generate the verification code flag is not limited to the way of generating according to the number of digits in the number string. It can be a random number with an identifier, and the arrangement of the phone number and the verification code needs to follow certain rules, for example The phone number is arranged on the left side of the verification code sign, and the verification code is arranged on the right side of the verification code sign, etc.
然后,就可以将所述电话号码、所述验证码标志位和所述验证码依次排序并进行组合,得到组合内容;Then, the phone number, the verification code flag and the verification code can be sequentially sorted and combined to obtain the combined content;
接着,采用DES对称算法对所述组合内容进行加密,得到验证码密文;Then, adopt the DES symmetric algorithm to encrypt the combined content to obtain the verification code ciphertext;
其中,DES算法具有极高安全性,而56位长的密钥的穷举空间为256,这意味着如果一台计算机的速度是每一秒种检测一百万个密钥,则它搜索完全部密钥就需要将近2285年的时间,可见,DES算法的攻击难度极高。Among them, the DES algorithm has extremely high security, and the exhaustive space of a 56-bit long key is 256, which means that if a computer detects one million keys per second, it can search It takes nearly 2285 years for all the keys. It can be seen that the attack of the DES algorithm is extremely difficult.
而在采用DES对称算法对所述组合内容进行加密时,加密入口参数有三个:key、data、mode。其中,key为加密解密使用的密钥,data为加密解密的数据(即这里的组合内容),mode为其工作模式,分别为加密模式和解密模式。当工作模式为加密模式时,可以将组合数据的明文按照64位进行分组,形成明文组,key用于对数据加密;当工作模式为解密模式时,key用于对数据解密。实际运用中,密钥可以只用到64位中的56位,这样才具有高的安全性。When adopting the DES symmetric algorithm to encrypt the combined content, there are three encryption entry parameters: key, data, and mode. Among them, key is the key used for encryption and decryption, data is the encrypted and decrypted data (that is, the combined content here), and mode is its working mode, which are encryption mode and decryption mode respectively. When the working mode is the encryption mode, the plaintext of the combined data can be grouped according to 64 bits to form a plaintext group, and the key is used to encrypt the data; when the working mode is the decryption mode, the key is used to decrypt the data. In practical application, the key can only use 56 bits in 64 bits, so that it has high security.
当然,这里只是以DES对称算法为例来进行加密说明的,在其他实施例中,还可以采用其他的诸如3DES(三重数据加密算法,Triple Data Encryption Algorithm)和AES(高级加密标准,Advanced Encryption Standard)的对称算法来对组合数据的明文进行加密,在此不再赘述。Of course, here only the DES symmetric algorithm is used as an example to illustrate the encryption. In other embodiments, other algorithms such as 3DES (triple data encryption algorithm, Triple Data Encryption Algorithm) and AES (Advanced Encryption Standard, Advanced Encryption Standard) can also be used. ) symmetric algorithm to encrypt the plaintext of the combined data, which will not be repeated here.
在加密完成后,就可以将验证码密文和提取关键内容后的短信的剩余内容分别进行存储。具体存储步骤为:After the encryption is completed, the ciphertext of the verification code and the remaining content of the short message after extracting the key content can be stored separately. The specific storage steps are:
获取当前时间,以所述当前时间为标识,将所述验证码密文和提取所述关键内容后的短信的剩余文字内容分别存储至不同的数据库中。The current time is obtained, and the verification code ciphertext and the remaining text content of the short message after extracting the key content are respectively stored in different databases with the current time as an identifier.
其中,可以将验证码密文存储在操作权限更高的数据库中,而将上述剩余内容存储在一般权限的短信数据库中。这样,可以进一步提高验证码的安全性。而上述以当前时间为标识来将上述两个内容进行存储的意义在于,由于该当前时间连同上述两个内容也分别一起存储在了相应的数据库中,这样可以在对数据库中的上述两个内容进行提取时,可以根据当前时间这一标识来迅速确定两个内容在数据库中的存储位置。Wherein, the verification code ciphertext may be stored in a database with higher operation authority, and the above remaining content may be stored in a short message database with general authority. In this way, the security of the verification code can be further improved. The significance of storing the above two contents with the current time as the mark is that since the current time and the above two contents are also stored in the corresponding database respectively, the above two contents in the database can be When extracting, the storage locations of the two contents in the database can be quickly determined according to the identifier of the current time.
那么通过上述流程就将验证码的加密流程做出了详细阐述。下面继续对加密后的验证码显示在短信应用上以将验证码展示给用户查看的处理流程进行进一步阐述。Then, through the above process, the encryption process of the verification code is described in detail. The processing flow of displaying the encrypted verification code on the SMS application for displaying the verification code to the user will be further described below.
在将上述两个内容存储至各个数据库后,若检测到应用程序调用所述短信的读取接口,则对所述应用程序的权限进行验证;After the above two contents are stored in each database, if it is detected that the application program calls the reading interface of the short message, then the authority of the application program is verified;
其中,权限的验证方式可以但不限于:预设可以调用短信的读取接口的应用程序列表,如果调用该读取接口的应用程序属于该应用程序列表中的程序,则表示验证通过,否则不通过。Wherein, the permission verification method can be but not limited to: preset application program list that can call the reading interface of the short message, if the application program that calls the reading interface belongs to the program in the application program list, it means that the verification is passed, otherwise it is not pass.
这样,也可以保证恶意程序来对短信内容进行读取和显示。In this way, malicious programs can also be guaranteed to read and display the text message content.
若所述应用程序的权限验证通过(这里通过权限验证的程序为短信程序),则按照所述标识确定所述验证码密文和所述剩余文字内容的存储位置;If the authority verification of the application program passes (the program passing the authority verification here is a short message program), then determine the storage location of the verification code ciphertext and the remaining text content according to the identification;
这里,在前文已经做出了详细阐述,即上述当前时间作为标识,可以便于在数据库中查找上述验证码密文和上述剩余内容的存储位置;Here, it has been elaborated above, that is, the above-mentioned current time is used as an identifier, which can facilitate the storage location of the above-mentioned verification code ciphertext and the above-mentioned remaining content in the database;
对所述存储位置的所述验证码密文和所述剩余内容进行提取;Extracting the verification code ciphertext and the remaining content in the storage location;
采用所述DES对称算法对提取的所述验证码密文进行解密,得到所述关键内容;Using the DES symmetric algorithm to decrypt the extracted ciphertext of the verification code to obtain the key content;
其中,所谓对称算法,即加解密的秘钥相同,由于上述实例中加密采用的是DES算法,因此,解密时同样是DES算法,秘钥相同。Among them, the so-called symmetric algorithm means that the encryption and decryption keys are the same. Since the encryption in the above example is the DES algorithm, the decryption is also the DES algorithm and the encryption key is the same.
将解密得到的所述关键内容和提取的所述剩余文字内容进行组合,得到短信明文;Combining the key content obtained by decryption and the extracted remaining text content to obtain the plain text of the short message;
将所述短信明文返回给通过权限验证的短信程序;Returning the plaintext of the short message to the short message program that has passed the authority verification;
最后,短信程序就可以将接收的短信明文进行显示,用户就可以查看安全的验证码。Finally, the short message program can display the plain text of the received short message, and the user can view the safe verification code.
借助于本发明上述实施例的技术方案,本发明实施例可以在将接收到的具有验证码的短信内容返回给短信应用前,首先对短信中的验证码进行加密并存储在权限高级的数据库,这样能够避免在接收到包含验证码的短信时,验证码被移动终端中的恶意程序所窃取,造成用户财产损失。With the help of the technical solutions of the above-mentioned embodiments of the present invention, the embodiments of the present invention can first encrypt the verification code in the text message and store it in a database with high authority before returning the content of the received text message with the verification code to the text message application. In this way, when receiving a short message containing a verification code, the verification code is stolen by a malicious program in the mobile terminal, resulting in loss of property of the user.
第四实施例Fourth embodiment
参照图4,示出了本发明一个实施例的移动终端的框图。图4所示移动终端包括:Referring to FIG. 4, a block diagram of a mobile terminal according to an embodiment of the present invention is shown. The mobile terminal shown in Figure 4 includes:
检测模块31,用于检测接收到的短信中是否存在预设关键词;Detection module 31, is used for detecting whether there is preset keyword in the short message that receives;
第一提取模块32,用于若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;The first extracting module 32 is used to extract the key content in the short message if it exists, and the key content includes the phone number of the verification code and the short message sending end;
加密模块33,用于采用对称算法对所述关键内容进行加密,得到验证码密文。The encryption module 33 is configured to encrypt the key content using a symmetric algorithm to obtain a verification code ciphertext.
这样,本发明实施例通过预设关键词来检测接收的短信中是否包含验证码,而如果包含验证码,则对短信中的验证码和短信发送端的电话号码两个信息一起进行对称算法的加密。这样即便移动终端中存在拦截验证码的病毒程序,其仍然无法窃取已经经过高度加密的验证码。这样,本发明实施例从对系统中的病毒进行查杀的角度转而通过对验证码进行高度加密,这样即便移动终端中存在病毒库中没有存储的新型病毒时,仍然能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性。In this way, the embodiment of the present invention detects whether a verification code is included in the received text message by preset keywords, and if the verification code is included, the verification code in the text message and the phone number of the sending end of the text message are encrypted with a symmetric algorithm. . In this way, even if there is a virus program intercepting the verification code in the mobile terminal, it still cannot steal the highly encrypted verification code. In this way, the embodiments of the present invention turn to highly encrypted verification codes from the perspective of checking and killing viruses in the system, so that even if there are new types of viruses that are not stored in the virus database in the mobile terminal, it can still ensure that the verification codes will not be blocked. Stealing, avoiding the loss of users' property, and improving the security of users' verification information.
第五实施例fifth embodiment
参照图5,示出了本发明另一个实施例的移动终端的框图。图5所示移动终端包括:Referring to FIG. 5 , it shows a block diagram of a mobile terminal according to another embodiment of the present invention. The mobile terminal shown in Figure 5 includes:
检测模块31,用于检测接收到的短信中是否存在预设关键词,其中,所述预设关键词为表示所述预设关键词所在的短信中包含验证码的词汇;The detection module 31 is used to detect whether there is a preset keyword in the received short message, wherein the preset keyword is a vocabulary indicating that the short message where the preset keyword is located contains a verification code;
第一提取模块32,用于若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;The first extracting module 32 is used to extract the key content in the short message if it exists, and the key content includes the phone number of the verification code and the short message sending end;
加密模块33,用于采用对称算法对所述关键内容进行加密,得到验证码密文。The encryption module 33 is configured to encrypt the key content using a symmetric algorithm to obtain a verification code ciphertext.
其中,相比于移动终端的任意一个应用程序,所述移动终端(即本实施例中所示的各个模块、子模块)对所述短信的处理优先级最高。Wherein, compared with any application program of the mobile terminal, the mobile terminal (that is, each module and submodule shown in this embodiment) has the highest priority in processing the short message.
所述加密模块33包括:Described encryption module 33 comprises:
生成子模块331,用于根据所述验证码的位数生成验证码标志位;Generating sub-module 331, for generating verification code flags according to the number of digits of the verification code;
组合子模块332,用于将所述电话号码、所述验证码标志位和所述验证码依次排序并进行组合,得到组合内容;The combination sub-module 332 is used to sequentially sort and combine the phone number, the verification code flag and the verification code to obtain combined content;
加密子模块333,用于采用对称算法对所述组合内容进行加密,得到验证码密文。The encryption sub-module 333 is configured to encrypt the combined content by using a symmetric algorithm to obtain a verification code ciphertext.
获取模块34,用于获取当前时间;Obtaining module 34, for obtaining current time;
存储模块35,用于以所述当前时间为标识,将所述验证码密文和提取所述关键内容后的短信的剩余文字内容分别存储至不同区域。The storage module 35 is configured to store the ciphertext of the verification code and the remaining text content of the short message after extracting the key content in different areas, using the current time as an identifier.
验证模块36,用于若检测到应用程序调用所述短信的读取接口,则对所述应用程序的权限进行验证;The verification module 36 is used to verify the authority of the application program if it is detected that the application program calls the reading interface of the short message;
确定模块37,用于若所述应用程序的权限验证通过,则按照所述标识确定所述验证码密文和所述剩余文字内容的存储位置;A determining module 37, configured to determine the storage location of the verification code ciphertext and the remaining text content according to the identification if the authority verification of the application program is passed;
第二提取模块38,用于对所述存储位置的所述验证码密文和所述剩余内容进行提取;A second extraction module 38, configured to extract the verification code ciphertext and the remaining content in the storage location;
解密模块39,用于采用所述对称算法对提取的所述验证码密文进行解密,得到所述关键内容;A decryption module 39, configured to use the symmetric algorithm to decrypt the extracted ciphertext of the verification code to obtain the key content;
组合模块40,用于将解密得到的所述关键内容和提取的所述剩余文字内容进行组合,得到短信明文;The combination module 40 is used to combine the key content obtained by decryption and the extracted remaining text content to obtain the plaintext of the short message;
返回模块41,用于将所述短信明文返回给通过权限验证的所述应用程序。The return module 41 is used to return the plaintext of the short message to the application program that has passed the authority verification.
移动终端能够实现上述方法实施例中移动终端实现的从对系统中的病毒进行查杀的角度转而通过对验证码进行高度加密,这样即便移动终端中存在病毒库中没有存储的新型病毒时,仍然能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性的效果,为避免重复,这里不再赘述。The mobile terminal can implement the above-mentioned method embodiment from the perspective of scanning and killing viruses in the system to highly encrypt the verification code, so that even if there is a new type of virus that is not stored in the virus database in the mobile terminal, it can still be detected. It can ensure that the verification code is not stolen, avoid the loss of the user's property, and improve the security of the user's verification information. In order to avoid repetition, it will not be repeated here.
第六实施例Sixth embodiment
图6是本发明又一个实施例的移动终端的框图。图6所示的移动终端500包括:至少一个处理器501、存储器502、至少一个网络接口504和用户接口503。移动终端500中的各个组件通过总线系统505耦合在一起。可理解,总线系统505用于实现这些组件之间的连接通信。总线系统505除包括数据总线之外,还包括电源总线、控制总线和状态信号总线。但是为了清楚说明起见,在图6中将各种总线都标为总线系统505。Fig. 6 is a block diagram of a mobile terminal according to yet another embodiment of the present invention. The mobile terminal 500 shown in FIG. 6 includes: at least one processor 501 , a memory 502 , at least one network interface 504 and a user interface 503 . Various components in the mobile terminal 500 are coupled together through the bus system 505 . It can be understood that the bus system 505 is used to realize connection and communication between these components. In addition to the data bus, the bus system 505 also includes a power bus, a control bus and a status signal bus. However, the various buses are labeled as bus system 505 in FIG. 6 for clarity of illustration.
其中,用户接口503可以包括显示器、键盘或者点击设备(例如,鼠标,轨迹球(trackball)、触感板或者触摸屏等。Wherein, the user interface 503 may include a display, a keyboard, or a pointing device (for example, a mouse, a trackball (trackball), a touch panel, or a touch screen, and the like.
可以理解,本发明实施例中的存储器502可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data RateSDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(DirectRambus RAM,DRRAM)。本发明实施例描述的系统和方法的存储器502旨在包括但不限于这些和任意其它适合类型的存储器。It can be understood that the memory 502 in the embodiment of the present invention may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories. Wherein, the non-volatile memory may be a read-only memory (Read-Only Memory, ROM), a programmable read-only memory (Programmable ROM, PROM), an erasable programmable read-only memory (Erasable PROM, EPROM), an electronically programmable Erase Programmable Read-Only Memory (Electrically EPROM, EEPROM) or Flash. The volatile memory can be Random Access Memory (RAM), which acts as an external cache. By way of illustration and not limitation, many forms of RAM are available such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (Synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (Double Data RateSDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous connection dynamic random access memory (Synchlink DRAM, SLDRAM) and Direct memory bus random access memory (DirectRambus RAM, DRRAM). The memory 502 of the systems and methods described in embodiments of the present invention is intended to include, but is not limited to, these and any other suitable types of memory.
在一些实施方式中,存储器502存储了如下的元素,可执行模块或者数据结构,或者他们的子集,或者他们的扩展集:操作系统5021和应用程序5022。In some implementations, the memory 502 stores the following elements, executable modules or data structures, or their subsets, or their extended sets: an operating system 5021 and an application program 5022 .
其中,操作系统5021,包含各种系统程序,例如框架层、核心库层、驱动层等,用于实现各种基础业务以及处理基于硬件的任务。应用程序5022,包含各种应用程序,例如媒体播放器(Media Player)、浏览器(Browser)等,用于实现各种应用业务。实现本发明实施例方法的程序可以包含在应用程序5022中。Among them, the operating system 5021 includes various system programs, such as framework layer, core library layer, driver layer, etc., for realizing various basic services and processing tasks based on hardware. The application program 5022 includes various application programs, such as a media player (Media Player), a browser (Browser), etc., and is used to implement various application services. The program for realizing the method of the embodiment of the present invention may be included in the application program 5022 .
在本发明实施例中,通过调用存储器502存储的程序或指令,具体的,可以是应用程序5022中存储的程序或指令,处理器501用于检测接收到的短信中是否存在预设关键词,其中,所述预设关键词为表示所述预设关键词所在的短信中包含验证码的词汇;若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;采用对称算法对所述关键内容进行加密,得到验证码密文。In the embodiment of the present invention, the processor 501 is used to detect whether there is a preset keyword in the received short message by calling the program or instruction stored in the memory 502, specifically, the program or instruction stored in the application program 5022, Wherein, the preset keyword is a vocabulary that includes a verification code in the short message indicating that the preset keyword is located; if it exists, extract the key content in the short message, and the key content includes the verification code and the text message sending A phone number; using a symmetric algorithm to encrypt the key content to obtain a verification code ciphertext.
上述本发明实施例揭示的方法可以应用于处理器501中,或者由处理器501实现。处理器501可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法的各步骤可以通过处理器501中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器501可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(FieldProgrammable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本发明实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本发明实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器502,处理器501读取存储器502中的信息,结合其硬件完成上述方法的步骤。The methods disclosed in the foregoing embodiments of the present invention may be applied to the processor 501 or implemented by the processor 501 . The processor 501 may be an integrated circuit chip and has signal processing capabilities. In the implementation process, each step of the above method may be completed by an integrated logic circuit of hardware in the processor 501 or instructions in the form of software. The above-mentioned processor 501 may be a general-purpose processor, a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), an off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other available Program logic devices, discrete gate or transistor logic devices, discrete hardware components. Various methods, steps and logic block diagrams disclosed in the embodiments of the present invention may be implemented or executed. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, or the like. The steps of the methods disclosed in the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module can be located in a mature storage medium in the field such as random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, register. The storage medium is located in the memory 502, and the processor 501 reads the information in the memory 502, and completes the steps of the above method in combination with its hardware.
可以理解的是,本发明实施例描述的这些实施例可以用硬件、软件、固件、中间件、微码或其组合来实现。对于硬件实现,处理单元可以实现在一个或多个专用集成电路(Application Specific Integrated Circuits,ASIC)、数字信号处理器(Digital SignalProcessing,DSP)、数字信号处理设备(DSP Device,DSPD)、可编程逻辑设备(ProgrammableLogic Device,PLD)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、通用处理器、控制器、微控制器、微处理器、用于执行本申请所述功能的其它电子单元或其组合中。It can be understood that the embodiments described in the embodiments of the present invention may be implemented by hardware, software, firmware, middleware, microcode or a combination thereof. For hardware implementation, the processing unit can be implemented in one or more application specific integrated circuits (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing device (DSP Device, DSPD), programmable logic Device (Programmable Logic Device, PLD), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), general-purpose processor, controller, microcontroller, microprocessor, other electronic units for performing the functions described in this application or a combination thereof.
对于软件实现,可通过执行本发明实施例所述功能的模块(例如过程、函数等)来实现本发明实施例所述的技术。软件代码可存储在存储器中并通过处理器执行。存储器可以在处理器中或在处理器外部实现。For software implementation, the techniques described in the embodiments of the present invention may be implemented through modules (such as procedures, functions, etc.) that execute the functions described in the embodiments of the present invention. Software codes can be stored in memory and executed by a processor. Memory can be implemented within the processor or external to the processor.
其中,相比于移动终端的任意一个应用程序,所述处理器501对所述短信进行处理的优先级最高。Wherein, compared with any application program of the mobile terminal, the processing priority of the short message by the processor 501 is the highest.
可选地,处理器501还用于:根据所述验证码的位数生成验证码标志位;Optionally, the processor 501 is further configured to: generate a verification code flag according to the number of digits of the verification code;
将所述电话号码、所述验证码标志位和所述验证码依次排序并进行组合,得到组合内容;采用对称算法对所述组合内容进行加密,得到验证码密文。The phone number, the verification code flag and the verification code are sequentially sorted and combined to obtain combined content; the combined content is encrypted by using a symmetric algorithm to obtain a verification code ciphertext.
可选地,处理器501还用于:获取当前时间;以所述当前时间为标识,将所述验证码密文和提取所述关键内容后的短信的剩余文字内容分别存储至不同区域。Optionally, the processor 501 is further configured to: obtain the current time; and use the current time as an identifier to store the verification code ciphertext and the remaining text content of the short message after extracting the key content in different areas respectively.
可选地,处理器501还用于:若检测到应用程序调用所述短信的读取接口,则对所述应用程序的权限进行验证;若所述应用程序的权限验证通过,则按照所述标识确定所述验证码密文和所述剩余文字内容的存储位置;对所述存储位置的所述验证码密文和所述剩余内容进行提取;采用所述对称算法对提取的所述验证码密文进行解密,得到所述关键内容;将解密得到的所述关键内容和提取的所述剩余文字内容进行组合,得到短信明文;将所述短信明文返回给通过权限验证的所述应用程序。Optionally, the processor 501 is further configured to: if it is detected that the application program invokes the reading interface of the short message, verify the authority of the application program; Identify and determine the storage location of the verification code ciphertext and the remaining text content; extract the verification code ciphertext and the remaining content in the storage location; use the symmetric algorithm to extract the verification code Decrypting the ciphertext to obtain the key content; combining the key content obtained by decryption and the extracted remaining text content to obtain the plain text of the short message; returning the plain text of the short message to the application program that has passed the authority verification.
移动终端500能够实现前述实施例中移动终端实现的即便移动终端中存在拦截验证码的病毒程序,其仍然无法窃取已经经过高度加密的验证码。从对系统中的病毒进行查杀的角度转而通过对验证码进行高度加密,这样即便移动终端中存在病毒库中没有存储的新型病毒时,仍然能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性的效果,为避免重复,这里不再赘述。The mobile terminal 500 can realize the implementation of the mobile terminal in the foregoing embodiments, even if there is a virus program that intercepts the verification code in the mobile terminal, it still cannot steal the highly encrypted verification code. From the perspective of scanning and killing viruses in the system, the verification code is highly encrypted, so that even if there is a new type of virus in the mobile terminal that is not stored in the virus database, the verification code can still be guaranteed not to be stolen and the user’s property loss can be avoided. , to improve the security of the user's verification information, in order to avoid repetition, it will not be repeated here.
第七实施例Seventh embodiment
图7是本发明另一个实施例的移动终端的结构示意图。具体地,图7中的移动终端600可以为手机、平板电脑、个人数字助理(Personal Digital Assistant,PDA)、或车载电脑等。Fig. 7 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention. Specifically, the mobile terminal 600 in FIG. 7 may be a mobile phone, a tablet computer, a personal digital assistant (Personal Digital Assistant, PDA), or a vehicle-mounted computer.
图7中的移动终端600包括射频(Radio Frequency,RF)电路610、存储器620、输入单元630、显示单元640、处理器660、音频电路670、WiFi(Wireless Fidelity)模块680和电源690。Mobile terminal 600 in FIG.
其中,输入单元630可用于接收移动终端用户输入的数字或字符信息,以及产生与移动终端600的移动终端用户设置以及功能控制有关的信号输入。具体地,本发明实施例中,该输入单元630可以包括触控面板631。触控面板631,也称为触摸屏,可收集移动终端用户在其上或附近的触摸操作(比如移动终端用户使用手指、触笔等任何适合的物体或附件在触控面板631上的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板631可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测移动终端用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给该处理器660,并能接收处理器660发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板631。除了触控面板631,输入单元630还可以包括其他输入设备632,其他输入设备632可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。Wherein, the input unit 630 can be used to receive digital or character information input by the mobile terminal user, and generate signal input related to the mobile terminal user setting and function control of the mobile terminal 600 . Specifically, in the embodiment of the present invention, the input unit 630 may include a touch panel 631 . The touch panel 631, also referred to as a touch screen, can collect touch operations of the mobile terminal user on or near it (such as the operation of the mobile terminal user on the touch panel 631 using any suitable object or accessory such as a finger or a stylus), And drive the corresponding connection device according to the preset program. Optionally, the touch panel 631 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the touch orientation of the mobile terminal user, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, and converts it into contact coordinates , and send it to the processor 660, and can receive and execute the command sent by the processor 660. In addition, the touch panel 631 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 631, the input unit 630 may also include other input devices 632, which may include but not limited to physical keyboards, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, etc. one or more of.
其中,显示单元640可用于显示由移动终端用户输入的信息或提供给移动终端用户的信息以及移动终端600的各种菜单界面。显示单元640可包括显示面板641,可选的,可以采用LCD或有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板641。Wherein, the display unit 640 can be used to display information input by or provided to the mobile terminal user and various menu interfaces of the mobile terminal 600 . The display unit 640 may include a display panel 641. Optionally, the display panel 641 may be configured in the form of an LCD or an organic light-emitting diode (Organic Light-Emitting Diode, OLED).
应注意,触控面板631可以覆盖显示面板641,形成触摸显示屏,当该触摸显示屏检测到在其上或附近的触摸操作后,传送给处理器660以确定触摸事件的类型,随后处理器660根据触摸事件的类型在触摸显示屏上提供相应的视觉输出。It should be noted that the touch panel 631 can cover the display panel 641 to form a touch display screen. When the touch display screen detects a touch operation on or near it, it is sent to the processor 660 to determine the type of the touch event, and then the processor 660 provides corresponding visual output on the touch display screen according to the type of the touch event.
触摸显示屏包括应用程序界面显示区及常用控件显示区。该应用程序界面显示区及该常用控件显示区的排列方式并不限定,可以为上下排列、左右排列等可以区分两个显示区的排列方式。该应用程序界面显示区可以用于显示应用程序的界面。每一个界面可以包含至少一个应用程序的图标和/或widget桌面控件等界面元素。该应用程序界面显示区也可以为不包含任何内容的空界面。该常用控件显示区用于显示使用率较高的控件,例如,设置按钮、界面编号、滚动条、电话本图标等应用程序图标等。The touch display screen includes an application program interface display area and a common control display area. The arrangement of the display area of the application program interface and the display area of the commonly used controls is not limited, and may be an arrangement in which the two display areas can be distinguished, such as vertical arrangement, left-right arrangement, and the like. The application program interface display area can be used to display the interface of the application program. Each interface may include at least one interface element such as an icon of an application program and/or a widget desktop control. The application program interface display area can also be an empty interface without any content. The commonly used control display area is used to display controls with a high usage rate, for example, application icons such as setting buttons, interface numbers, scroll bars, and phonebook icons.
其中处理器660是移动终端600的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在第一存储器621内的软件程序和/或模块,以及调用存储在第二存储器622内的数据,执行移动终端600的各种功能和处理数据,从而对移动终端600进行整体监控。可选的,处理器660可包括一个或多个处理单元。Wherein the processor 660 is the control center of the mobile terminal 600, utilizes various interfaces and lines to connect the various parts of the whole mobile phone, by running or executing the software programs and/or modules stored in the first memory 621, and calling the software programs and/or modules stored in the second memory 621. The data in the memory 622 executes various functions of the mobile terminal 600 and processes data, so as to monitor the mobile terminal 600 as a whole. Optionally, the processor 660 may include one or more processing units.
在本发明实施例中,通过调用存储该第一存储器621内的软件程序和/或模块和/或该第二存储器622内的数据,处理器660用于检测接收到的短信中是否存在预设关键词,其中,所述预设关键词为表示所述预设关键词所在的短信中包含验证码的词汇;若存在,则提取所述短信中的关键内容,所述关键内容包括验证码和短信发送端的电话号码;采用对称算法对所述关键内容进行加密,得到验证码密文。In the embodiment of the present invention, the processor 660 is used to detect whether there is a preset in the received short message by calling the software program and/or module stored in the first memory 621 and/or the data in the second memory 622. Keyword, wherein, the preset keyword is a vocabulary indicating that the short message where the preset keyword is located contains a verification code; if it exists, extract the key content in the short message, and the key content includes a verification code and The phone number of the sending end of the short message; the key content is encrypted using a symmetric algorithm to obtain a verification code ciphertext.
其中,相比于移动终端的任意一个应用程序,所述处理器660对所述短信进行处理的优先级最高。Wherein, compared with any application program of the mobile terminal, the processor 660 has the highest priority for processing the short message.
可选地,处理器660还用于:根据所述验证码的位数生成验证码标志位;Optionally, the processor 660 is further configured to: generate a verification code flag according to the number of digits of the verification code;
将所述电话号码、所述验证码标志位和所述验证码依次排序并进行组合,得到组合内容;采用对称算法对所述组合内容进行加密,得到验证码密文。The phone number, the verification code flag and the verification code are sequentially sorted and combined to obtain combined content; the combined content is encrypted by using a symmetric algorithm to obtain a verification code ciphertext.
可选地,处理器660还用于:获取当前时间;以所述当前时间为标识,将所述验证码密文和提取所述关键内容后的短信的剩余文字内容分别存储至不同区域。Optionally, the processor 660 is further configured to: obtain the current time; and use the current time as an identifier to store the verification code ciphertext and the remaining text content of the short message after extracting the key content in different areas respectively.
可选地,处理器660还用于:若检测到应用程序调用所述短信的读取接口,则对所述应用程序的权限进行验证;若所述应用程序的权限验证通过,则按照所述标识确定所述验证码密文和所述剩余文字内容的存储位置;对所述存储位置的所述验证码密文和所述剩余内容进行提取;采用所述对称算法对提取的所述验证码密文进行解密,得到所述关键内容;将解密得到的所述关键内容和提取的所述剩余文字内容进行组合,得到短信明文;将所述短信明文返回给通过权限验证的所述应用程序。Optionally, the processor 660 is further configured to: if it is detected that the application program invokes the reading interface of the short message, then verify the authority of the application program; Identify and determine the storage location of the verification code ciphertext and the remaining text content; extract the verification code ciphertext and the remaining content in the storage location; use the symmetric algorithm to extract the verification code Decrypting the ciphertext to obtain the key content; combining the key content obtained by decryption and the extracted remaining text content to obtain the plain text of the short message; returning the plain text of the short message to the application program that has passed the authority verification.
可见,本发明实施例能够实现的即便移动终端中存在拦截验证码的病毒程序,其仍然无法窃取已经经过高度加密的验证码。从对系统中的病毒进行查杀的角度转而通过对验证码进行高度加密,这样即便移动终端中存在病毒库中没有存储的新型病毒时,仍然能够保证验证码不被窃取,避免用户财产损失,提升用户的校验信息的安全性的效果,为避免重复,这里不再赘述。It can be seen that even if there is a virus program that intercepts the verification code in the mobile terminal that can be realized by the embodiment of the present invention, it still cannot steal the highly encrypted verification code. From the perspective of scanning and killing viruses in the system, the verification code is highly encrypted, so that even if there is a new type of virus in the mobile terminal that is not stored in the virus database, the verification code can still be guaranteed not to be stolen and the user’s property loss can be avoided. , to improve the security of the user's verification information, in order to avoid repetition, it will not be repeated here.
本领域普通技术人员可以意识到,结合本发明实施例中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。Those of ordinary skill in the art can appreciate that the units and algorithm steps of the examples described in conjunction with the embodiments disclosed in the embodiments of the present invention can be implemented by electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are executed by hardware or software depends on the specific application and design constraints of the technical solution. Those skilled in the art may use different methods to implement the described functions for each specific application, but such implementation should not be regarded as exceeding the scope of the present invention.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。Those skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the above-described system, device and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here.
在本申请所提供的实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the embodiments provided in this application, it should be understood that the disclosed devices and methods may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or components can be combined or May be integrated into another system, or some features may be ignored, or not implemented. In another point, the mutual coupling or direct coupling or communication connection shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or units may be in electrical, mechanical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or may be distributed to multiple network units. Part or all of the units can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。If the functions described above are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, the essence of the technical solution of the present invention or the part that contributes to the prior art or the part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium, including Several instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the methods described in various embodiments of the present invention. The aforementioned storage medium includes: various media capable of storing program codes such as U disk, mobile hard disk, ROM, RAM, magnetic disk or optical disk.
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求的保护范围为准。The above is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Anyone skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present invention. Should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be based on the protection scope of the claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611062947.0A CN106713618A (en) | 2016-11-25 | 2016-11-25 | Processing method of identifying code and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611062947.0A CN106713618A (en) | 2016-11-25 | 2016-11-25 | Processing method of identifying code and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106713618A true CN106713618A (en) | 2017-05-24 |
Family
ID=58934893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611062947.0A Pending CN106713618A (en) | 2016-11-25 | 2016-11-25 | Processing method of identifying code and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106713618A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107317877A (en) * | 2017-07-31 | 2017-11-03 | 惠州市格农科技有限公司 | Computer based Rehabilitation data method for pushing |
CN107509180A (en) * | 2017-08-03 | 2017-12-22 | 惠州Tcl移动通信有限公司 | A kind of method, storage device and the mobile terminal of automatic Encrypted short message |
CN108874756A (en) * | 2018-06-29 | 2018-11-23 | 广东智媒云图科技股份有限公司 | A kind of identifying code optimization method |
CN109145552A (en) * | 2018-07-09 | 2019-01-04 | 维沃移动通信有限公司 | Information encryption method and terminal device |
CN109327811A (en) * | 2017-07-31 | 2019-02-12 | 中国电信股份有限公司 | Short message receiving and sending system, short message forwarding device, terminal and short message retransmission method |
WO2019085449A1 (en) * | 2017-10-31 | 2019-05-09 | 平安科技(深圳)有限公司 | Service short message pushing method, apparatus, computer device and storage medium |
CN109977692A (en) * | 2019-02-26 | 2019-07-05 | 北京三快在线科技有限公司 | Data processing method and device, storage medium and electronic equipment |
CN111385339A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Control method and device for vehicle-mounted intelligent equipment |
CN116368507A (en) * | 2020-12-29 | 2023-06-30 | 维萨国际服务协会 | Method and system for authenticating a payment transaction using a user device |
CN119653360A (en) * | 2024-11-11 | 2025-03-18 | 深圳市芯睿视科技有限公司 | Verification code acquisition method, electronic device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103763686A (en) * | 2013-12-23 | 2014-04-30 | 北京奇虎科技有限公司 | Processing method and device for short messages |
CN103781064A (en) * | 2014-01-02 | 2014-05-07 | 张鹏 | Short message verification system and verification method |
CN104301875A (en) * | 2014-09-23 | 2015-01-21 | 广东欧珀移动通信有限公司 | Short message processing method and device |
CN104320767A (en) * | 2014-11-10 | 2015-01-28 | 吴东辉 | Short message verification system and method |
US9197411B2 (en) * | 2007-06-05 | 2015-11-24 | Ims Health Incorporated | Protocol and method for client-server mutual authentication using event-based OTP |
CN105975867A (en) * | 2016-04-28 | 2016-09-28 | 东莞市华睿电子科技有限公司 | Data processing method |
-
2016
- 2016-11-25 CN CN201611062947.0A patent/CN106713618A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9197411B2 (en) * | 2007-06-05 | 2015-11-24 | Ims Health Incorporated | Protocol and method for client-server mutual authentication using event-based OTP |
CN103763686A (en) * | 2013-12-23 | 2014-04-30 | 北京奇虎科技有限公司 | Processing method and device for short messages |
CN103781064A (en) * | 2014-01-02 | 2014-05-07 | 张鹏 | Short message verification system and verification method |
CN104301875A (en) * | 2014-09-23 | 2015-01-21 | 广东欧珀移动通信有限公司 | Short message processing method and device |
CN104320767A (en) * | 2014-11-10 | 2015-01-28 | 吴东辉 | Short message verification system and method |
CN105975867A (en) * | 2016-04-28 | 2016-09-28 | 东莞市华睿电子科技有限公司 | Data processing method |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107317877A (en) * | 2017-07-31 | 2017-11-03 | 惠州市格农科技有限公司 | Computer based Rehabilitation data method for pushing |
CN109327811A (en) * | 2017-07-31 | 2019-02-12 | 中国电信股份有限公司 | Short message receiving and sending system, short message forwarding device, terminal and short message retransmission method |
CN107509180B (en) * | 2017-08-03 | 2020-06-09 | 惠州Tcl移动通信有限公司 | Method for automatically encrypting short message, storage device and mobile terminal |
CN107509180A (en) * | 2017-08-03 | 2017-12-22 | 惠州Tcl移动通信有限公司 | A kind of method, storage device and the mobile terminal of automatic Encrypted short message |
WO2019024882A1 (en) * | 2017-08-03 | 2019-02-07 | 捷开通讯(深圳)有限公司 | Method for automatically encrypting short message, storage device and mobile terminal |
US11516654B2 (en) | 2017-08-03 | 2022-11-29 | JRD Communication (Shenzhen) Ltd. | Method for automatically encrypting short message, storage device and mobile terminal |
WO2019085449A1 (en) * | 2017-10-31 | 2019-05-09 | 平安科技(深圳)有限公司 | Service short message pushing method, apparatus, computer device and storage medium |
CN108874756A (en) * | 2018-06-29 | 2018-11-23 | 广东智媒云图科技股份有限公司 | A kind of identifying code optimization method |
CN109145552A (en) * | 2018-07-09 | 2019-01-04 | 维沃移动通信有限公司 | Information encryption method and terminal device |
CN111385339A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Control method and device for vehicle-mounted intelligent equipment |
CN109977692B (en) * | 2019-02-26 | 2022-02-08 | 北京三快在线科技有限公司 | Data processing method and device, storage medium and electronic equipment |
CN109977692A (en) * | 2019-02-26 | 2019-07-05 | 北京三快在线科技有限公司 | Data processing method and device, storage medium and electronic equipment |
CN116368507A (en) * | 2020-12-29 | 2023-06-30 | 维萨国际服务协会 | Method and system for authenticating a payment transaction using a user device |
CN116368507B (en) * | 2020-12-29 | 2025-01-07 | 维萨国际服务协会 | Method and system for authenticating payment transactions using a user device |
CN119653360A (en) * | 2024-11-11 | 2025-03-18 | 深圳市芯睿视科技有限公司 | Verification code acquisition method, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106713618A (en) | Processing method of identifying code and mobile terminal | |
CN105354466B (en) | A kind of fingerprint identification method and mobile terminal | |
CN108769027B (en) | Secure communication method, device, mobile terminal and storage medium | |
CN106022196B (en) | A kind of method and intelligent terminal of information sharing | |
KR101900841B1 (en) | Method and apparatus for protecting application program password of mobile terminal | |
US20170005995A1 (en) | Confidential data management method and device, and security authentication method and system | |
CN107273736B (en) | Password input method, device, computer equipment and storage medium | |
CN102419805B (en) | Terminal equipment and method for encrypting user information | |
US10733594B1 (en) | Data security measures for mobile devices | |
TW201539247A (en) | Password input and verification method and system thereof | |
CN104239804A (en) | Data protecting method and device | |
CN105005731A (en) | A data encryption and decryption method and mobile terminal | |
WO2017147890A1 (en) | Verification code short message display method and mobile terminal | |
CN106503507A (en) | Method and mobile terminal that a kind of password shows | |
CN106203061A (en) | The encryption method of a kind of application program and mobile terminal | |
CN105975867A (en) | Data processing method | |
EP2973182B1 (en) | Methods and apparatus for securing user input in a mobile device | |
CN105426727A (en) | Fingerprint decryption method and mobile terminal | |
CN107124407B (en) | Data transmission method, device, readable storage medium, electronic equipment and system | |
CN106355109A (en) | File encryption method and mobile terminal | |
KR102375973B1 (en) | Security server using case based reasoning engine and storage medium for installing security function | |
CN106648370B (en) | A kind of encryption method and mobile terminal of sectional drawing | |
CN101383833A (en) | Apparatus and method for enhancing PIN code input security of intelligent cipher key apparatus | |
CN106529943A (en) | Method of guaranteeing payment security and mobile terminal | |
CN102819694A (en) | TCM (trusted cryptography module) chip, virus scanning method and device for operating TCM chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170524 |
|
RJ01 | Rejection of invention patent application after publication |