CN109309668A - Website verification method, device, system, computer equipment and storage medium - Google Patents
Website verification method, device, system, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109309668A CN109309668A CN201811002625.6A CN201811002625A CN109309668A CN 109309668 A CN109309668 A CN 109309668A CN 201811002625 A CN201811002625 A CN 201811002625A CN 109309668 A CN109309668 A CN 109309668A
- Authority
- CN
- China
- Prior art keywords
- information
- website
- user
- checked
- matching result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The present invention is suitable for information security field more particularly to a kind of website verification method, device, system, computer equipment and storage medium based on block chain technology;Wherein this method is applied to processing end, includes the following steps: the information to be checked for receiving user's typing;The information to be checked is matched with the character pair information of the website information in presupposed information set, obtains matching result information;The matching result information is exported by output end to user.By the way that website is stored in preset storage end, when user inputs information to be checked, it can be matched in the storage end, and the true and false of website identity corresponding to information to be checked is judged according to match condition, the present invention effectively can be identified and be reminded to illegal contents such as pseudo- official website, duplicity website, fishing websites, and a degree of prevention is carried out, it exchanges, browse on the internet for user, query information provides safety guarantee.
Description
Technical field
The invention belongs to information security fields, more particularly to a kind of website authentication based on block chain technology
Method, device, system, computer equipment and storage medium.
Background technique
The malfeasance palm off in real life, cheat, deceived never stopped, with the flourishing hair of network
Exhibition, in recent years these malfeasances are constantly invaded to fields such as internet, mobile Internets;And internet has become people's tentacle
Can and resource, the chance of people's contact network is more and more, and the approach and probability having dust thrown into the eyes also are increasing.
Currently, many people or enterprise are frequently encountered fake site and cause in browsing or search inquiry content
Economic loss, therefore a kind of effective method is needed to contain this behavior.
Summary of the invention
Based on this, it is necessary to for above-mentioned problem, provide a kind of website verification method based on block chain technology,
Device, system, computer equipment and storage medium.
A kind of website verification method based on block chain technology in one of the embodiments, is applied to processing end,
The described method includes:
Receive the information to be checked of user's typing;
The information to be checked is matched with the character pair information of the website information in presupposed information set, is obtained
Matching result information;
The matching result information is exported by output end to user.
In one embodiment, a kind of website based on block chain technology verifies device, is applied to processing end, described
Device includes:
Receiving unit, for receiving the information to be checked of user's typing;
Processing unit, for by the character pair information of the website information in the information to be checked and presupposed information set
It is matched, obtains matching result;
Output unit, for exporting the matching result to user.
In one embodiment, a kind of website based on block chain technology verifies system, the system comprises: storage
End, input terminal, processing end and output end;
The storage end, for storing website information, the website information, which includes at least, to be had for unique identification institute
State the characteristic information of website;
The input terminal, for being sent to the processing end for user's typing information to be checked, and by the information to be checked;
The processing end, receive user's typing can unique identification target network website information to be checked;Will it is described to
Query information is matched with the character pair information of the website information in presupposed information set, obtains matching result;It will
The matching result is exported to user;
The output end, for exporting the processing result to user.
In one embodiment, a kind of computer equipment, including memory and processor are stored with meter in the memory
Calculation machine program, when the computer program is executed by the processor, so that processor execution is described in any of the above embodiments
The step of website verification method.
In one embodiment, a kind of computer readable storage medium is stored on the computer readable storage medium
Computer program, when the computer program is executed by processor, so that the processor executes net described in any of the above embodiments
The step of network website verification method.
In above-mentioned website verification method, device, system, computer equipment and storage medium, by by website
It is stored in preset storage end, when user inputs information to be checked, can be matched in the storage end, and according to matching
Situation judges the true and false of website identity corresponding to information to be checked, the present invention can to pseudo- official website, duplicity website,
The illegal content such as fishing website is effectively identified and is reminded, and carries out a degree of prevention, is the intelligence such as mobile phone, computer
Equipment is exchanged on the internet, is browsed energy, query information provides safety guarantee.
Detailed description of the invention
Fig. 1 is a kind of implementation environment of website verification method based on block chain technology provided in an embodiment of the present invention
Figure;
Fig. 2 is a kind of flow chart of website verification method based on block chain technology provided in an embodiment of the present invention;
Fig. 3 is a kind of structure chart of website verifying device based on block chain technology provided in an embodiment of the present invention;
Fig. 4 is a kind of structure chart of website verifying system based on block chain technology provided in an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
It is appreciated that term " first " used in this application, " second " etc. can be used to describe various elements herein,
But unless stated otherwise, these elements should not be limited by these terms.These terms are only used to by first element and another yuan
Part is distinguished.For example, in the case where not departing from scope of the present application, the first xx script can be known as the 2nd xx script,
And similarly, the 2nd xx script can be known as the first xx script.
Website is stored in preset storage end by the embodiment of the present invention, can when user inputs information to be checked
It is matched in the storage end, and judges the true of website identity corresponding to information to be checked according to match condition
Puppet, the present invention effectively can be identified and be reminded to illegal contents such as pseudo- official website, duplicity website, fishing websites, and
A degree of prevention is carried out, exchanges, browse on the internet for user, query information provides safety guarantee.
Embodiment one
Fig. 1 is the implementation environment figure of the website verification method provided in one embodiment, as shown in Figure 1, the implementation environment
System shown in figure includes:
Storage end 10, input terminal 20, processing end 30, output end 40 and internet 50.
Wherein, storage end 10 is the computer equipment for storing web site information;
Processing end 30 can be communicated to connect with input terminal 10 and output end 40, can receive the query information of the input of input terminal 10, and
Cooperate storage end 10 to carry out data processing, processing result is exported by output end 40 again later.
Wherein, storage end 10 is generally made of computer equipment with processing end 30, which can be independent
Physical server or terminal are also possible to the server cluster that multiple physical servers are constituted, can be to provide Cloud Server, cloud
The Cloud Server of the basis such as database, cloud storage and CDN cloud computing service.
Input terminal 20 and output end 40 can be the same equipment, are also possible to different equipment, can be intelligent hand
Machine, tablet computer, laptop, desktop computer, intelligent sound box, smartwatch etc., however, it is not limited to this.Input terminal
20, output end 40 can be attached with computer equipment 120 by network, and the present invention is herein with no restrictions.It is input terminal 20, defeated
Website in accessible 50 net of interconnection of outlet 40, and the website in the identification internet 50 of processing end 30 can be passed through
The true and false.
Embodiment two
As shown in Fig. 2, in one embodiment it is proposed that a kind of website verification method based on block chain technology, this reality
The processing end 30 that example is mainly applied in this way in above-mentioned Fig. 1 is applied to come for example, can specifically include following steps:
Step S201 receives the information to be checked of user's typing;
Step S202 carries out the character pair information of the website information in the information to be checked and presupposed information set
Matching, obtains matching result information;
Step S203 exports the matching result information by output end to user.
Above-mentioned presupposed information set can be in storage end 10 for storing the database of website information.
In one embodiment of the invention, website information can include but is not limited to following characteristics information: domain name
Information, name information, link information, main information, unique features information of identification code, network operator's information, record information, change letter
The interrelated information of the affiliated information of breath, violation information, product and above-mentioned each information.
Information to be checked is user by the information with keyword of 20 typing of input terminal, the keyword be used for it is above-mentioned
Characteristic information carry out Corresponding matching.Wherein input terminal 20 can be with typing text information, pictorial information, OCR(Optical
Character Recognition, optical character identification) conversion identification information, clipbook detection identification information (be common in
The information of input is pasted by duplication) etc., specifically it is not construed as limiting.
Wherein, feature information of identification code can be used for the corresponding website of unique identification, and this feature information of identification code is
The identification code applied from website main body to this system is stored on certified official website website after applying, with
The true and false of website for examination.
In one embodiment of the invention, the corresponding relationship of the domain name of website and link, main information and puts on record
The corresponding relationship of information, the corresponding relationship of unique features information of identification code (need to individually apply) and website, modification information are believed in violation of rules and regulations
Breath etc. can be used as above-mentioned correlation information preservation in storage end with information such as the corresponding relationships of website.
In one embodiment of the invention, the website information of storage end can only be increased newly, Status Change, without
It can carry out other modifications, delete, which can be dedicated storage equipment.Preferably, which is the node of block chain,
Data storage is carried out by the distributed node of district center, data is avoided by modification and deletes, substantially increase the peace of information
Quan Xing.
In one embodiment of the invention, processing end 30 can receive the information to be checked of the transmission of input terminal 20, and should
Information to be checked is matched with the character pair information of the website information in presupposed information set, and obtains matching knot
Fruit;Matching result includes exactly matching and non-fully matching, specifically, if keyword is matched to corresponding feature letter in storage end
Breath, and the two content is identical, then it is assumed that exact matching if the two content is not exactly the same, will generally pass through both the matching analysis
Similarity degree.
Wherein, keyword and the judgment method of the similarity degree of corresponding characteristic information are as follows:
Keyword in information to be checked is matched with the character pair information in presupposed information set;
Analyze the information that is matched in the keyword with corresponding characteristic information how many, i.e. comparison keyword and this feature is believed
Breath has how much identical texts or character;
If the information content to match is more, and the continuity of the information to match is higher, then the two similarity degree is also higher.
It should be noted that carrying out similarity mode by unique features information of identification code, completely the same is considered as completely
Matching, inconsistent is considered as mismatch.
Others, by domain name carry out similarity mode, keyword and domain name it is completely the same be considered as exact matching, according to
The key word information quantity that matches carries out similarity degree matching;Similarity mode, keyword and link are carried out by link
Completely the same is considered as exact matching, carries out similarity degree matching according to the key word information quantity to match;Pass through main body
Information carry out similarity mode, keyword and main information it is completely the same be considered as exact matching, according to the keyword to match
Information content carries out similarity degree matching;Similarity mode, keyword and modification information complete one are carried out by modification information
What is caused is considered as exact matching, carries out similarity degree matching according to the key word information quantity to match;By record information into
Row similarity mode, keyword and record information it is completely the same be considered as exact matching, according to the key word information number to match
Amount is to carry out similarity degree matching;Similarity mode is carried out by violation report information, keyword and violation report information are complete
It is consistent to be considered as exact matching, similarity degree matching is carried out according to the key word information quantity to match;Pass through some product
Belonging relation, carry out similarity mode, keyword and some product is consistent is considered as exact matching, according to the key to match
Word information quantity carries out similarity degree matching.
In a preferred embodiment of the invention, step S203, i.e., it is described that the matching result is exported it to user
After further include following steps:
Judge whether the target network website is safe according to the matching result;
If it is determined that the target network website is dangerous, then prompt information is exported to user.
In embodiments of the present invention, if matching result is ideal, such as some net in information to be checked and storage end
The characteristic information of network website exactly matches or similarity degree reaches pre-set level, it can be determined that website safety, if similar
Degree is not up to pre-set level, then judging that the website belongs to dangerous website, then processing end can not only pass through output
It holds to user and exports matching result, can also export prompt information to user according to the situation, which can combine user
Appraisement system shows the information that the website was reported by how many people to show, such as to user;The net can also be prompted the user with
It is the analysis information of personation, swindle, fishing website etc. that, which there are much probabilities at station,;Preferably, if the website is the network of personation
Website, then the method for the present invention can also export the real site address of the website or link information to user.
In a preferred embodiment of the invention, above-mentioned if it is determined that the target network website is dangerous, then to
Further include following steps after family exports prompt information:
If it is determined that the target network website is dangerous, and it is dangerous to monitor that user has carried out in the target network website
Operation, then start preset Security mechanism and prevent the unsafe act of the target network website.
In the embodiment of the present invention, in order to avoid user has stepped on into being judged as unsafe target network website, this hair
Security mechanism can be set in advance in bright method, which can detecte the target network station that user is logged in
The illegal act of point, if user has carried out uneasy full operation in the target network website, then Security mechanism will open
It is dynamic, and illegal act to target network website or unsafe movement prevent, and can be effectively avoided on user in this way
When being deceived.
The above embodiment of the present invention is by the way that website to be stored in preset storage end, when user's input is to be checked
When information, it can be matched in the storage end, and website corresponding to information to be checked is judged according to match condition
The true and false of identity, the present invention the illegal contents such as pseudo- official website, duplicity website, fishing website can effectively be identified and
It reminds, and carries out a degree of prevention, exchange, browse on the internet, inquiring letter by terminals such as mobile phone, computers for user
Breath provides safety guarantee.
Embodiment three
As shown in figure 3, in one embodiment it is proposed that a kind of website based on block chain technology verifies device, this reality
The processing end 30 that example is mainly applied in this way in above-mentioned Fig. 1 is applied to come for example, can specifically include:
Receiving unit 210, for receiving the information to be checked of user's typing;
Processing unit 220, for by the character pair of the website information in the information to be checked and presupposed information set
Information is matched, and matching result information is obtained;
Output unit 230, for exporting the matching result information to user by output end.
Above-mentioned presupposed information set can be in storage end 10 for storing the database of website information.
In one embodiment of the invention, website information can include but is not limited to following characteristics information: domain name
Information, name information, link information, main information, unique features information of identification code, network operator's information, record information, change letter
The interrelated information of the affiliated information of breath, violation information, product and above-mentioned each information.
Information to be checked is user by the information with keyword of 20 typing of input terminal, the keyword be used for it is above-mentioned
Characteristic information carry out Corresponding matching.Wherein input terminal 20 can be with typing text information, pictorial information, OCR(Optical
Character Recognition, optical character identification) conversion identification information, clipbook detection identification information (be common in
The information of input is pasted by duplication) etc., specifically it is not construed as limiting.
Wherein, feature information of identification code can be used for the corresponding website of unique identification, and this feature information of identification code is
The identification code applied from website main body to this system is stored on certified official website website after applying, with
The true and false of website for examination.
In one embodiment of the invention, the corresponding relationship of the domain name of website and link, main information and puts on record
The corresponding relationship of information, the corresponding relationship of unique features information of identification code (need to individually apply) and website, modification information are believed in violation of rules and regulations
Breath etc. can be used as above-mentioned correlation information preservation in storage end with information such as the corresponding relationships of website.
In one embodiment of the invention, the website information of storage end can only be increased newly, Status Change, without
It can carry out other modifications, delete, which can be dedicated storage equipment.Preferably, which is the node of block chain,
Data storage is carried out by the distributed node of district center, data is avoided by modification and deletes, substantially increase the peace of information
Quan Xing.
In one embodiment of the invention, processing end 30 can receive the information to be checked of the transmission of input terminal 20, and should
Information to be checked is matched with the character pair information of the website information in presupposed information set, and obtains matching knot
Fruit;Matching result includes exactly matching and non-fully matching, specifically, if keyword is matched to corresponding feature letter in storage end
Breath, and the two content is identical, then it is assumed that exact matching if the two content is not exactly the same, will generally pass through both the matching analysis
Similarity degree.
Wherein, keyword and the judgment method of the similarity degree of corresponding characteristic information are as follows:
Keyword in information to be checked is matched with the character pair information in presupposed information set;
Analyze the information that is matched in the keyword with corresponding characteristic information how many, i.e. comparison keyword and this feature is believed
Breath has how much identical texts or character;
If the information content to match is more, and the continuity of the information to match is higher, then the two similarity degree is also higher.
It should be noted that carrying out similarity mode by unique features information of identification code, completely the same is considered as completely
Matching, inconsistent is considered as mismatch.
Others, by domain name carry out similarity mode, keyword and domain name it is completely the same be considered as exact matching, according to
The key word information quantity that matches carries out similarity degree matching;Similarity mode, keyword and link are carried out by link
Completely the same is considered as exact matching, carries out similarity degree matching according to the key word information quantity to match;Pass through main body
Information carry out similarity mode, keyword and main information it is completely the same be considered as exact matching, according to the keyword to match
Information content carries out similarity degree matching;Similarity mode, keyword and modification information complete one are carried out by modification information
What is caused is considered as exact matching, carries out similarity degree matching according to the key word information quantity to match;By record information into
Row similarity mode, keyword and record information it is completely the same be considered as exact matching, according to the key word information number to match
Amount is to carry out similarity degree matching;Similarity mode is carried out by violation report information, keyword and violation report information are complete
It is consistent to be considered as exact matching, similarity degree matching is carried out according to the key word information quantity to match;Pass through some product
Belonging relation, carry out similarity mode, keyword and some product is consistent is considered as exact matching, according to the key to match
Word information quantity carries out similarity degree matching.
In a preferred embodiment of the invention, output unit is also used to:
Judge whether the target network website is safe according to the matching result;
If it is determined that the target network website is dangerous, then prompt information is exported to user.
In embodiments of the present invention, if matching result is ideal, such as some net in information to be checked and storage end
The characteristic information of network website exactly matches or similarity degree reaches pre-set level, it can be determined that website safety, if similar
Degree is not up to pre-set level, then judging that the website belongs to dangerous website, then processing end can not only pass through output
It holds to user and exports matching result, can also export prompt information to user according to the situation, which can combine user
Appraisement system shows the information that the website was reported by how many people to show, such as to user;The net can also be prompted the user with
It is the analysis information of personation, swindle, fishing website etc. that, which there are much probabilities at station,;Preferably, if the website is the network of personation
Website, then the method for the present invention can also export the real site address of the website or link information to user.
In a preferred embodiment of the invention, website verifying device is also used to:
If it is determined that the target network website is dangerous, and it is dangerous to monitor that user has carried out in the target network website
Operation, then start preset Security mechanism and prevent the unsafe act of the target network website.
In the embodiment of the present invention, in order to avoid user has stepped on into being judged as unsafe target network website, this hair
Security mechanism can be set in advance in bright method, which can detecte the target network station that user is logged in
The illegal act of point, if user has carried out uneasy full operation in the target network website, then Security mechanism will open
It is dynamic, and illegal act to target network website or unsafe movement prevent, and can be effectively avoided on user in this way
When being deceived.
The above embodiment of the present invention is by the way that website to be stored in preset storage end, when user's input is to be checked
When information, it can be matched in the storage end, and website corresponding to information to be checked is judged according to match condition
The true and false of identity, the present invention the illegal contents such as pseudo- official website, duplicity website, fishing website can effectively be identified and
It reminds, and carries out a degree of prevention, exchange, browse on the internet, inquiring letter by terminals such as mobile phone, computers for user
Breath provides safety guarantee.
Example IV
As shown in figure 4, in one embodiment it is proposed that a kind of website based on block chain technology verifies system, specifically
It may include: storage end 10, input terminal 20, processing end 30 and output end 40;
The storage end 10, for storing website information, the website information, which includes at least, to be had for unique identification
The characteristic information of the website;
The input terminal 20, for being sent to the processing end for user's typing information to be checked, and by the information to be checked;
The processing end 30, receive user's typing can unique identification target network website information to be checked;It will be described
Information to be checked is matched with the character pair information of the website information in presupposed information set, obtains matching result;
The matching result is exported to user;
The output end 40, for exporting the processing result to user.
Wherein, in conjunction with the embodiments one, input terminal 20 and output end 40 can be separated distinct device, or same
A equipment, such as smart phone, tablet computer, laptop, desktop computer, intelligent sound box, smartwatch etc..
Above-mentioned presupposed information set can be in storage end 10 for storing the database of website information.
In one embodiment of the invention, website information can include but is not limited to following characteristics information: domain name
Information, name information, link information, main information, unique features information of identification code, network operator's information, record information, change letter
The interrelated information of the affiliated information of breath, violation information, product and above-mentioned each information.
Information to be checked is user by the information with keyword of 20 typing of input terminal, the keyword be used for it is above-mentioned
Characteristic information carry out Corresponding matching.Wherein input terminal 20 can be with typing text information, pictorial information, OCR(Optical
Character Recognition, optical character identification) conversion identification information, clipbook detection identification information (be common in
The information of input is pasted by duplication) etc., specifically it is not construed as limiting.
Wherein, feature information of identification code can be used for the corresponding website of unique identification, and this feature information of identification code is
The identification code applied from website main body to this system is stored on certified official website website after applying, with
The true and false of website for examination.
In one embodiment of the invention, the corresponding relationship of the domain name of website and link, main information and puts on record
The corresponding relationship of information, the corresponding relationship of unique features information of identification code (need to individually apply) and website, modification information are believed in violation of rules and regulations
Breath etc. can be used as above-mentioned correlation information preservation in storage end with information such as the corresponding relationships of website.
In one embodiment of the invention, the website information in storage end 10 can only be increased newly, Status Change,
And be not available for other modifications, delete, which can be dedicated storage equipment.Preferably, which is block
The node of chain carries out data storage by the distributed node of district center, avoids data by modification and delete, substantially increase
The safety of information.
In one embodiment of the invention, processing end 30 can receive the information to be checked of the transmission of input terminal 20, and should
Information to be checked is matched with the character pair information of the website information in presupposed information set, and obtains matching knot
Fruit;Matching result includes exactly matching and non-fully matching, specifically, if keyword is matched to corresponding feature letter in storage end
Breath, and the two content is identical, then it is assumed that exact matching if the two content is not exactly the same, will generally pass through both the matching analysis
Similarity degree.
Wherein, keyword and the judgment method of the similarity degree of corresponding characteristic information are as follows:
Keyword in information to be checked is matched with the character pair information in presupposed information set;
Analyze the information that is matched in the keyword with corresponding characteristic information how many, i.e. comparison keyword and this feature is believed
Breath has how much identical texts or character;
If the information content to match is more, and the continuity of the information to match is higher, then the two similarity degree is also higher.
It should be noted that carrying out similarity mode by unique features information of identification code, completely the same is considered as completely
Matching, inconsistent is considered as mismatch.
Others, by domain name carry out similarity mode, keyword and domain name it is completely the same be considered as exact matching, according to
The key word information quantity that matches carries out similarity degree matching;Similarity mode, keyword and link are carried out by link
Completely the same is considered as exact matching, carries out similarity degree matching according to the key word information quantity to match;Pass through main body
Information carry out similarity mode, keyword and main information it is completely the same be considered as exact matching, according to the keyword to match
Information content carries out similarity degree matching;Similarity mode, keyword and modification information complete one are carried out by modification information
What is caused is considered as exact matching, carries out similarity degree matching according to the key word information quantity to match;By record information into
Row similarity mode, keyword and record information it is completely the same be considered as exact matching, according to the key word information number to match
Amount is to carry out similarity degree matching;Similarity mode is carried out by violation report information, keyword and violation report information are complete
It is consistent to be considered as exact matching, similarity degree matching is carried out according to the key word information quantity to match;Pass through some product
Belonging relation, carry out similarity mode, keyword and some product is consistent is considered as exact matching, according to the key to match
Word information quantity carries out similarity degree matching.
In a preferred embodiment of the invention, processing end 30 also proceeds as follows:
Judge whether the target network website is safe according to the matching result;
If it is determined that the target network website is dangerous, then prompt information is exported to user.
In embodiments of the present invention, if matching result is ideal, such as some net in information to be checked and storage end
The characteristic information of network website exactly matches or similarity degree reaches pre-set level, it can be determined that website safety, if similar
Degree is not up to pre-set level, then judging that the website belongs to dangerous website, then processing end can not only pass through output
It holds to user and exports matching result, can also export prompt information to user according to the situation, which can combine user
Appraisement system shows the information that the website was reported by how many people to show, such as to user;The net can also be prompted the user with
It is the analysis information of personation, swindle, fishing website etc. that, which there are much probabilities at station,;Preferably, if the website is the network of personation
Website, then the method for the present invention can also export the real site address of the website or link information to user.
In a preferred embodiment of the invention, above-mentioned if it is determined that the target network website in processing end 30
It is dangerous, then further include following steps after exporting prompt information to user:
If it is determined that the target network website is dangerous, and it is dangerous to monitor that user has carried out in the target network website
Operation, then start preset Security mechanism and prevent the unsafe act of the target network website.
In the embodiment of the present invention, in order to avoid user has stepped on into being judged as unsafe target network website, this hair
Security mechanism can be set in advance in bright method, which can detecte the target network station that user is logged in
The illegal act of point, if user has carried out uneasy full operation in the target network website, then Security mechanism will open
It is dynamic, and illegal act to target network website or unsafe movement prevent, and can be effectively avoided on user in this way
When being deceived.
The above embodiment of the present invention is by the way that website to be stored in preset storage end, when user's input is to be checked
When information, it can be matched in the storage end, and website corresponding to information to be checked is judged according to match condition
The true and false of identity, the present invention the illegal contents such as pseudo- official website, duplicity website, fishing website can effectively be identified and
It reminds, and carries out a degree of prevention, exchange, browse on the internet, inquiring letter by terminals such as mobile phone, computers for user
Breath provides safety guarantee.
Embodiment five
In one embodiment of the invention, a kind of computer equipment is proposed, the computer equipment includes memory, processing
Device and it is stored in the computer program that can be run on the memory and on the processor, the processor executes the meter
Step described in any website verification method in embodiment two is realized when calculation machine program.
In one embodiment of the invention, a kind of computer readable storage medium, computer readable storage medium are provided
On be stored with computer program, when computer program is executed by processor so that processor execute embodiment two in any network
Step described in website verification method.
Although should be understood that various embodiments of the present invention flow chart in each step according to arrow instruction successively
It has been shown that, but these steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein,
There is no stringent sequences to limit for the execution of these steps, these steps can execute in other order.Moreover, each embodiment
In at least part step may include that perhaps these sub-steps of multiple stages or stage are not necessarily multiple sub-steps
Completion is executed in synchronization, but can be executed at different times, the execution in these sub-steps or stage sequence is not yet
Necessarily successively carry out, but can be at least part of the sub-step or stage of other steps or other steps in turn
Or it alternately executes.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read
In storage medium, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, provided herein
Each embodiment used in any reference to memory, storage, database or other media, may each comprise non-volatile
And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled
Journey ROM(EPROM), electrically erasable ROM(EEPROM) or flash memory.Volatile memory may include random access memory
(RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM
(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM(SLDRAM), memory bus (Rambus) direct RAM(RDRAM), it is straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
Limitations on the scope of the patent of the present invention therefore cannot be interpreted as.It should be pointed out that for those of ordinary skill in the art
For, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to guarantor of the invention
Protect range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (10)
1. a kind of website verification method based on block chain technology is applied to processing end, which is characterized in that the method packet
It includes:
Receive the information to be checked of user's typing;
The information to be checked is matched with the character pair information of the website information in presupposed information set, is obtained
Matching result information;
The matching result information is exported by output end to user.
2. the method as described in claim 1, which is characterized in that the characteristic information are as follows: domain-name information, name information, link
Information, main information, unique features information of identification code, network operator's information, record information, modification information, violation information, product institute
Belong to the interrelated information of information or above-mentioned each information.
3. the method as described in claim 1, which is characterized in that described to further include later to user's output by the matching result
Following steps:
Judge whether the target network website is safe according to the matching result;
If it is determined that the target network website is dangerous, then prompt information is exported to user.
4. method as claimed in claim 3, which is characterized in that it is described if it is determined that the target network website is dangerous, then to
Further include following steps after user exports prompt information:
If it is determined that the target network website is dangerous, and it is dangerous to monitor that user has carried out in the target network website
Operation, then start preset Security mechanism and prevent the unsafe act of the target network website.
5. a kind of website based on block chain technology verifies device, it is applied to processing end, which is characterized in that described device packet
It includes:
Receiving unit, for receiving the information to be checked of user's typing;
Processing unit, for by the character pair information of the website information in the information to be checked and presupposed information set
It is matched, obtains matching result;
Output unit, for exporting the matching result to user.
6. a kind of website based on block chain technology verifies system, which is characterized in that the system comprises: storage ends, defeated
Enter end, processing end and output end;
The storage end, for storing website information, the website information, which includes at least, to be had for unique identification institute
State the characteristic information of website;
The input terminal, for being sent to the processing end for user's typing information to be checked, and by the information to be checked;
The processing end, receive user's typing can unique identification target network website information to be checked;Will it is described to
Query information is matched with the character pair information of the website information in presupposed information set, obtains matching result;It will
The matching result is exported to user;
The output end, for exporting the processing result to user.
7. system as claimed in claim 6, which is characterized in that the receivable information of input terminal includes but is not limited to: text
Word information, pictorial information, the information of OCR conversion identification, the information of clipbook detection identification.
8. system as claimed in claim 6, which is characterized in that the storage end is block chain node.
9. a kind of computer equipment, which is characterized in that including memory and processor, computer journey is stored in the memory
Sequence, when the computer program is executed by the processor, so that processor perform claim requirement 1 ~ 4 is described in any item
The step of website verification method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program, when the computer program is executed by processor, so that the processor perform claim requires 1 ~ 4 described in any item nets
The step of network website verification method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811002625.6A CN109309668A (en) | 2018-08-30 | 2018-08-30 | Website verification method, device, system, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811002625.6A CN109309668A (en) | 2018-08-30 | 2018-08-30 | Website verification method, device, system, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109309668A true CN109309668A (en) | 2019-02-05 |
Family
ID=65224412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811002625.6A Pending CN109309668A (en) | 2018-08-30 | 2018-08-30 | Website verification method, device, system, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109309668A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110516173A (en) * | 2019-08-28 | 2019-11-29 | 腾讯科技(深圳)有限公司 | A kind of illegal website recognition methods, device, equipment and medium |
CN113783855A (en) * | 2021-08-30 | 2021-12-10 | 北京百度网讯科技有限公司 | Site evaluation method, site evaluation device, electronic apparatus, storage medium, and program product |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102737183A (en) * | 2012-06-12 | 2012-10-17 | 腾讯科技(深圳)有限公司 | Method and device for webpage safety access |
CN103856437A (en) * | 2012-11-28 | 2014-06-11 | 深圳市金蝶中间件有限公司 | Site security detection method and system |
WO2017023203A1 (en) * | 2015-08-03 | 2017-02-09 | Mastercard Asia/Pacific Pte Ltd | Method and system for website verification |
CN108023863A (en) * | 2016-11-03 | 2018-05-11 | 北京国双科技有限公司 | Differentiate the method and device whether website forges |
-
2018
- 2018-08-30 CN CN201811002625.6A patent/CN109309668A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102737183A (en) * | 2012-06-12 | 2012-10-17 | 腾讯科技(深圳)有限公司 | Method and device for webpage safety access |
CN103856437A (en) * | 2012-11-28 | 2014-06-11 | 深圳市金蝶中间件有限公司 | Site security detection method and system |
WO2017023203A1 (en) * | 2015-08-03 | 2017-02-09 | Mastercard Asia/Pacific Pte Ltd | Method and system for website verification |
CN108023863A (en) * | 2016-11-03 | 2018-05-11 | 北京国双科技有限公司 | Differentiate the method and device whether website forges |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110516173A (en) * | 2019-08-28 | 2019-11-29 | 腾讯科技(深圳)有限公司 | A kind of illegal website recognition methods, device, equipment and medium |
CN110516173B (en) * | 2019-08-28 | 2024-04-26 | 腾讯科技(深圳)有限公司 | Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium |
CN113783855A (en) * | 2021-08-30 | 2021-12-10 | 北京百度网讯科技有限公司 | Site evaluation method, site evaluation device, electronic apparatus, storage medium, and program product |
CN113783855B (en) * | 2021-08-30 | 2023-07-21 | 北京百度网讯科技有限公司 | Site evaluation method, apparatus, electronic device, storage medium, and program product |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alam et al. | Phishing attacks detection using machine learning approach | |
US11630918B2 (en) | Systems and methods of determining compromised identity information | |
CN107872436B (en) | Account identification method, device and system | |
Zhang et al. | A domain-feature enhanced classification model for the detection of Chinese phishing e-Business websites | |
CN106453061B (en) | A kind of method and system identifying network fraudulent act | |
Rao et al. | A heuristic technique to detect phishing websites using TWSVM classifier | |
Chen et al. | Ai@ ntiphish—machine learning mechanisms for cyber-phishing attack | |
CN107302586A (en) | A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing | |
Jothi et al. | An efficient SQL injection detection system using deep learning | |
Wang et al. | Identity theft detection in mobile social networks using behavioral semantics | |
EP2779520A1 (en) | A process for obtaining candidate data from a remote storage server for comparison to a data to be identified | |
CN111680013A (en) | Data sharing method based on block chain, electronic equipment and device | |
CN109309668A (en) | Website verification method, device, system, computer equipment and storage medium | |
CN110572302B (en) | Diskless local area network scene identification method and device and terminal | |
Razaque et al. | Blockchain-enabled deep recurrent neural network model for clickbait detection | |
CN110213202A (en) | Mark encryption matching process and device, identification processing method and device | |
Gong et al. | CECoR-Net: A character-level neural network model for web attack detection | |
Weller | Compromised account detection based on clickstream data | |
Luo et al. | Botgraph: Web bot detection based on sitemap | |
Yao et al. | Topic-based rank search with verifiable social data outsourcing | |
Tsikerdekis et al. | Detecting online content deception | |
CN114861076A (en) | Information processing method, information processing device, computer equipment and storage medium | |
Tayyab et al. | A review: Phishing detection using URLs and hyperlinks information by machine learning approach | |
Wang et al. | An empirical study: automated subdomain takeover threat detection | |
Wang et al. | Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190205 |