CN109787883B - Information processing method and device, electronic equipment and computer readable storage medium - Google Patents

Information processing method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN109787883B
CN109787883B CN201811654315.2A CN201811654315A CN109787883B CN 109787883 B CN109787883 B CN 109787883B CN 201811654315 A CN201811654315 A CN 201811654315A CN 109787883 B CN109787883 B CN 109787883B
Authority
CN
China
Prior art keywords
information
picture
instant messaging
graphic code
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811654315.2A
Other languages
Chinese (zh)
Other versions
CN109787883A (en
Inventor
张莉莉
马杰
朱旺南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huaduo Network Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN201811654315.2A priority Critical patent/CN109787883B/en
Publication of CN109787883A publication Critical patent/CN109787883A/en
Application granted granted Critical
Publication of CN109787883B publication Critical patent/CN109787883B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application discloses an information processing method, an information processing device, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: receiving instant messaging information containing pictures; judging whether the picture contains a graphic code according to a preset strategy; when the picture contains the graphic code, risk prompt information is generated and used for prompting the code scanning risk in a preset mode; and displaying the risk prompt information according to the historical communication information. According to the method and the device, when the message containing the two-dimension code is received in the instant messaging scene, the risk prompt information is generated and displayed according to the historical communication information, so that the risk prompt is carried out on the receiver of the two-dimension code, the two-dimension code fraud condition which easily appears in part of the instant messaging scene can be effectively prevented, the safety awareness of users is improved, and the loss of the users is avoided.

Description

Information processing method and device, electronic equipment and computer readable storage medium
Technical Field
The present application relates to the field of network communication technologies, and in particular, to an information processing method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the rapid development of network technologies, users can chat with friends through instant messaging applications or social networks to enhance feelings of the friends. Instant messaging is an instant messaging service based on the internet, and can provide a multi-user interactive communication mode for users. Public chat spaces such as different channels can be established through the instant messaging tool, for example, a live network platform.
The network live broadcast platform generally comprises a plurality of live broadcast rooms, each live broadcast room comprises a main broadcast and a user, and the users can interact with the main broadcast through the network live broadcast platform and can add other users as friends. However, in the instant communication scene provided by the live broadcast platform, more and more malicious molecules frequently add friends by using a special means, and a third party payment software two-dimensional code is sent on the chat interface, so that a user is induced to perform code scanning payment by purchasing a live broadcast platform virtual coin as a name, and communication fraud is implemented.
Disclosure of Invention
In view of the foregoing problems, the present application provides an information processing method, an information processing apparatus, an electronic device, and a computer-readable storage medium, which can effectively prevent code scanning fraud occurring in an instant messaging scene of a live broadcast platform.
In a first aspect, an embodiment of the present application provides an information processing method, where the method includes: receiving instant messaging information containing pictures; judging whether the picture contains a graphic code according to a preset strategy; when the picture contains the graphic code, risk prompt information is generated and used for prompting the code scanning risk in a preset mode; and displaying the risk prompt information according to the historical communication information.
In a second aspect, an embodiment of the present application provides an information processing apparatus, including: the receiving module is used for receiving instant messaging information containing pictures; the judging module is used for judging whether the picture contains the graphic code according to a preset strategy; the prompting module is used for generating risk prompting information when the picture contains the graphic code, and the risk prompting information is used for prompting the code scanning risk in a preset mode; and the display module is used for displaying the risk prompt information according to the historical communication information.
In a third aspect, embodiments of the present application provide an electronic device, which includes one or more processors, a memory, and one or more applications, where the one or more applications are stored in the memory and configured to be executed by the one or more processors, and the one or more programs are configured to perform the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium, in which program code is stored, and the program code can be called by a processor to execute the method according to the first aspect.
The information processing method, the information processing device, the electronic equipment and the computer readable storage medium provided by the embodiment of the application can receive instant messaging information containing a picture, judge whether the picture contains a graphic code according to a preset strategy, generate risk prompt information when the picture contains the graphic code, and display the risk prompt information according to historical communication information, wherein the risk prompt information is used for prompting code scanning risk in a preset mode. According to the method and the device, when the message containing the graphic code is received in the instant messaging scene, the risk prompt information is generated and displayed according to the historical messaging information, so that the risk prompt is carried out on the receiving party of the graphic code, the code scanning fraud condition which easily appears in the instant messaging scene of a part of live broadcast platforms can be effectively prevented, the safety consciousness of users is improved, and the loss of the users is avoided.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating an instant messaging scenario suitable for use in an embodiment of the present application;
FIG. 2 is a flow chart illustrating an information processing method according to an embodiment of the present application;
FIG. 3 is a flow chart illustrating an information processing method according to another embodiment of the present application;
fig. 4 is a schematic flowchart illustrating steps S208a and S208b in an information processing method according to yet another embodiment of the present application;
fig. 5 is a schematic diagram illustrating an implementation effect scenario of an information processing method according to yet another embodiment of the present application;
FIG. 6 shows a block diagram of an information processing apparatus provided in an embodiment of the present application;
fig. 7 is a block diagram of an electronic device for executing an information processing method according to an embodiment of the present application;
fig. 8 is a storage unit for storing or carrying program code implementing an information processing method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Instant messaging (IM for short) is a service for Instant messaging messages based on the internet, and with the rapid development of the internet, Instant messaging is also rapidly developed, and not only can Instant messaging be realized for two persons, but also Instant messaging can be realized for realizing Instant messaging among multiple persons. Instant messaging has also evolved multi-user chat communication services, such as chat rooms, groups, or live webcast platforms, where more and more users often chat with friends through instant messaging applications or social networks to enhance their feelings.
At present, with the development of the internet, the multimedia live broadcast is widely concerned by people due to novel form and rich content. With the rapid development of the live broadcast industry, the live broadcast platform is also continuously enriching the diversified viewing requirements of audiences, for example, providing an instant messaging function in live broadcast software.
The network live broadcast platform generally comprises a plurality of live broadcast rooms, each live broadcast room comprises a main broadcast and a user, and the user can interact with the main broadcast through the network live broadcast platform and can add other users as friends to perform instant messaging with the friends.
However, in an instant messaging scene provided by a live broadcast platform, more and more malicious molecules are used by special means, for example, a mode of plug-in or illegal protocol software is adopted to enter the platform to frequently add friends, and a mode of sending a third party payment software two-dimensional code is adopted in an instant messaging interface, so that a virtual currency of the live broadcast platform is discounted and purchased as a name, the platform customer service is disguised to induce a user to perform code scanning payment, communication fraud is implemented, user experience and the good feeling of the live broadcast platform are reduced, the live broadcast platform loses normal users, and the benefits of the user and the live broadcast platform are damaged to different degrees.
In order to solve the above problems, the inventors have studied and proposed an information processing method, an information processing apparatus, an electronic device, and a computer-readable storage medium in the embodiments of the present application.
In order to better understand the information processing method, the information processing apparatus, the electronic device, and the computer readable storage medium provided in the embodiments of the present application, an instant messaging scenario of a live broadcast platform suitable for the embodiments of the present application is described below.
Referring to fig. 1, fig. 1 is a schematic view of an instant messaging scenario applicable to an embodiment of the present application.
In this embodiment, the client corresponding to the instant messaging scenario shown in fig. 1 may be installed in a terminal such as a personal computer, a smart phone, a tablet computer, and a portable electronic device. As one way, the client corresponding to the instant messaging scenario may be a special instant messaging software client, such as MSN, QQ, WeChat, etc.; or may be a client of other application software integrated with the instant messaging function, such as a live platform software client of YY and the like. In some embodiments, the instant messaging scene shown in fig. 1 may also be loaded on a web page side, for example, an instant messaging scene on a web page side of a live platform.
As a manner, the instant messaging scene shown in fig. 1 may be displayed on a human-computer interaction interface of the terminal, such as a display screen, so that both parties of instant messaging can view the sent instant messaging information in real time.
As shown in fig. 1, in a general one-to-one instant messaging scene, an opposite party and one party are usually included, and after receiving instant messaging information sent by the opposite party, a software client may display the instant messaging information sent by the opposite party on an instant messaging page of the one party, or may send the instant messaging information input by the one party to the opposite party and display the instant messaging information on the same instant messaging page, so that both parties performing instant messaging can see the instant messaging information that both parties have sent.
The type of the instant messaging information can be various, such as text, pictures, audio, video, and the like. As a specific scenario, as shown in fig. 1, the current instant messaging page includes three pieces of instant messaging information, wherein the opposite party sends two pieces of instant messaging information, which are a text message and a picture, respectively, the picture is a two-dimensional code, and one party sends one text message. It can be understood that different types of instant messaging information may exist in the same instant messaging information, for example, two parties participating in instant messaging may only send information containing text or pictures alone, or may send information containing text and pictures at the same time.
In this embodiment, a plurality of terminals running the instant messaging software may be in communication connection with each other through the internet to implement instant messaging, or a server of an instant messaging software service provider may be used as a transmission medium to perform communication transmission with each other through the internet.
It can be understood that the instant messaging scenario diagram provided in the embodiment of the present application is only one possible scenario, which is convenient to understand, and the embodiment of the present application can also be applied to various other different instant messaging scenarios, so the scenario diagram is not limited to this scheme.
The information processing method, apparatus, electronic device, and storage medium provided by the embodiments of the present application will be described in detail below with specific embodiments.
Referring to fig. 2, fig. 2 is a schematic flow chart illustrating an information processing method according to an embodiment of the present application. The information processing method comprises the steps of receiving instant communication information containing a picture, judging whether the picture contains a graphic code according to a preset strategy, generating risk prompt information when the picture contains the graphic code, wherein the risk prompt information is used for prompting a code scanning risk in a preset mode, displaying the risk prompt information according to historical communication information, generating the risk prompt information when a message containing the graphic code is received in an instant communication scene, displaying the risk prompt information according to the historical communication information so as to prompt a receiver of the graphic code for risks, effectively preventing a code scanning fraud condition easily occurring in part of instant communication scenes of a live broadcast platform, improving safety consciousness of users, and avoiding loss of the users. In a specific embodiment, the information processing method is applicable to the information processing apparatus 300 shown in fig. 6 and the electronic device 100 (fig. 7) equipped with the information processing apparatus 300. The flow shown in fig. 2 will be described in detail below. The above-mentioned information processing method may specifically include the steps of:
step S101: and receiving instant messaging information containing the picture.
In this embodiment, the instant messaging information may be a message that is input by a user of the instant messaging client and sent to other participants in the instant messaging scenario. As one way, the kind of instant messaging information may be various, such as text, picture, audio, video, etc.
The same instant messaging message may only contain one type of message, such as an instant messaging message containing only text or pictures; it can also contain multiple types of messages, such as instant messaging messages containing both text and pictures.
In this embodiment, the instant messaging scenario may be a one-to-one private chat scenario, or a group chat scenario for multiple people.
Step S102: and judging whether the picture contains the graphic code according to a preset strategy.
In this embodiment, the graphic code may be a graphic carrying encoded information in a form of a picture, such as a one-dimensional code (bar code), a two-dimensional code (2-dimensional bar code), and the like.
The two-dimensional code is a black and white pattern which is distributed on a plane (in two-dimensional direction) according to a certain rule through a certain specific geometric figure and can be used for recording data symbol information. The two-dimensional code skillfully utilizes the concepts of '0' and '1' bit streams forming the internal logic basis of a computer in code programming, uses a plurality of geometric shapes corresponding to binary systems to represent character numerical value information, and realizes automatic information processing by automatically recognizing and reading through an image input device or an optoelectronic scanning device.
Two-dimensional codes are a more advanced bar code format than one-dimensional codes. One-dimensional codes can only express information in one direction (generally, the horizontal direction), while two-dimensional codes can store information in both the horizontal and vertical directions. The one-dimensional code only consists of numbers and letters, and the two-dimensional code can store information such as Chinese characters, numbers, pictures and the like, so that the application field of the two-dimensional code is much wider.
In this embodiment, the two-dimensional code most widely used in instant messaging is mainly taken as an example for description.
At present, most terminals have a function of identifying a graphic code (scanning the code), and by scanning the graphic code and identifying the graphic code, encoded information carried by the graphic code can be decoded to obtain information such as characters, images, web page links and the like.
In this embodiment, the preset policy for identifying the graphic code may be pre-configured in the client, and the image identification is performed on the picture included in the instant messaging information through a specific image identification algorithm, so as to determine whether the picture includes the graphic code.
In some embodiments, the received picture may not be a graphic code, and there may be other graphics and characters besides the graphic code in the picture, and when performing image recognition on the picture, it is only necessary to confirm whether the graphic code exists in the picture.
In this embodiment, when the picture includes the graphic code, the step S103 may be performed.
Step S103: and generating risk prompt information.
In this embodiment, the risk prompt information is used to prompt a code scanning risk in a preset manner.
In some cases involving graphical code fraud, the graphical code may carry dangerous information, such as malicious links, trojans or viruses, or Uniform Resource Locators (URLs) of phishing websites. Therefore, before the user scans the graphic code, the risk possibly existing in the scanning of the graphic code is prompted, and the benefit of the user can be effectively prevented from being damaged.
As one approach, the risk tip may include a risk tip text associated with the scan pattern code, such as "Note! This information contains the two-dimensional code, please scan again after confirming "," safety is reminded: the prompt information corresponding to characters such as two-dimensional codes sent by others is not required to be scanned at will. In other possible embodiments, the risk prompt information may also be a prompt image, a prompt voice, or the like.
After the risk prompt information is generated, the risk prompt information can remind the user receiving the message containing the graphic code in a mode supported by various terminals. For example, the risk prompt information can be displayed on the instant messaging page in a text or image mode; or the risk prompt information is played through a loudspeaker of the terminal in a voice broadcasting mode; or to alert the user holding the mobile terminal in a vibrating manner.
Step S104: and displaying the risk prompt information according to the historical communication information.
In this embodiment, the historical communication information may be a historical communication record between a sender and a receiver of the instant communication information including the picture, a historical communication record between the sender and other people of the picture, and an account status of the sender of the picture. It is understood that the historical communication information can be used to characterize whether the sender of the picture is trusted.
For example, when there are words such as "pay", "transaction", "purchase", "virtual currency", etc., which may have fraud risk, in a chat log before sending the picture, the sender and the receiver of the picture may directly display the generated risk prompt information on the current instant messaging interface. As one method, the account number of the sender of the picture may be weighted and scored according to various historical communication information, and the higher the score of the account number of the sender, the lower the fraud risk, i.e. the higher the confidence level.
As a mode, a special effect may be added to the displayed risk prompting information according to the score of the account of the picture sender, for example, when the score of the account of the picture sender is low, a red flashing special effect may be added to the displayed risk prompting information, and an additional warning statement may be displayed to prompt the picture receiver that the picture containing the graphic code has a high fraud risk and that the code scanning needs to be cautious.
In some embodiments, the instant messaging information sent by the sender can be processed according to the historical messaging information. For example, if the fraud risk of the picture sender is extremely high as determined from the historical communication information, the picture sent by the picture sender can be shielded and not displayed, and the receiver can be prompted to try to send the picture containing the graphic code. As a mode, after the receiver confirms the identity of the sender through the system and opens the authority of the sender for sending the graphic code, the shielding of the picture sent by the sender can be cancelled.
According to the information processing method provided by the embodiment of the application, when the message containing the graphic code is received in the instant messaging scene, the risk prompt information is generated and displayed according to the historical messaging information, so that the risk prompt is carried out on the receiving party of the graphic code, the code scanning fraud condition which is easy to occur in the instant messaging scene of part of live broadcast platforms can be effectively prevented, the safety consciousness of users is improved, and the loss of the users is avoided.
Referring to fig. 3, fig. 3 is a schematic flow chart illustrating an information processing method according to another embodiment of the present application. The flow shown in fig. 3 will be described in detail below. The above-mentioned information processing method may specifically include the steps of:
step S201: and receiving instant messaging information containing the picture.
In this embodiment, after receiving the instant messaging information including the picture sent by the instant messaging software, the user can accurately identify the picture through an algorithm pre-configured in the client.
As one way, after receiving the instant messaging information including the picture, the instant messaging information may not be displayed on the instant messaging page, but may be displayed after being recognized. Because the process of the identification processing is usually executed by a machine (computer), the operation speed of the machine is high, and the identification processing can be completed only by consuming short time in practice without generating negative influence on the use experience of a user.
Step S202: and carrying out image recognition on the picture to obtain the image characteristics of the picture.
In this embodiment, the image feature may be a geometric feature similar to the graphic code in the picture, for example, a rectangular region in the picture. As one mode, the image in the acquired instant messaging information can be converted into a pixel map through digital image processing, the edge in the image is acquired, the feature region is further divided according to the shape of the edge in the image, the image region similar to the image code is screened out and extracted as the image feature, and the image feature is subsequently identified. As a mode, since the distribution of the feature points (black and white pixel points) in the graphic code is generally regular, the distribution rule of the geometric figure in the picture can be extracted as the image feature.
Step S203: and performing feature matching on the image features and the graphic codes in the feature library to obtain the similarity between the image features and the graphic codes.
In this embodiment, the feature library may be configured in the local client, or may be configured in the cloud security service center. It can be understood that a large amount of pre-collected graphic code image information is stored in the feature library, and the similarity between the extracted image features and the pre-stored graphic codes in the feature library can be obtained by performing feature matching on the image features extracted from the pictures in the received instant messaging information and the graphic codes in the feature library.
As one mode, the similarity between the image feature and the graphic code may be considered as the probability that the image feature is the graphic code calculated after the recognition and matching.
Step S204: and judging whether the picture contains the graphic code or not according to the similarity.
In this embodiment, after obtaining the similarity between the image features extracted from the picture in the received instant messaging information and the graphic codes in the feature library, the threshold judgment on the similarity may be performed, and when the similarity is higher than a preset threshold, for example, 80%, it may be considered that the current picture has a high probability of containing the graphic codes; otherwise, when the similarity is lower than the preset threshold, it can be determined that the current picture does not contain the graphic code or does not contain the valid graphic code which can be used for identification.
In some other possible embodiments, the file feature information of the picture contained in the instant messaging information may be further matched with the file feature information of the graphic code pre-stored in the feature library. For example, the feature library stores feature information of the graphic code picture in advance, specifically including format header information, download address information and/or digital signature information of the graphic code picture, and if the format header information of the received picture file matches with the format header information of the preset graphic code picture, it is determined that the received file is the graphic code picture; or the address information of the received picture is matched with the address information of the preset graphic code picture, and the received picture is determined to be the graphic code picture; or the received digital signature information of the picture is matched with the preset digital signature information of the graphic code picture, and the received picture is determined to be the graphic code picture; and then, the matching result that the picture is the graphic code picture can be output for the client to obtain.
In this embodiment, when the picture includes the graphic code, step S205 may be further performed to further identify the graphic code.
Step S205: and identifying the graphic code in the picture, and acquiring the website information carried by the graphic code in the picture.
In this embodiment, when it is determined that the picture includes the graphic code, the graphic code in the picture may be identified by using a locally configured graphic code identification algorithm. It can be understood that different identification algorithms can be used for different types of graphic codes, for example, for a two-dimensional code, only the two-dimensional code identification algorithm can be used to read the coded information carried in the two-dimensional code.
In some cases of phishing through instant messaging software, a lawbreaker usually adds a normal user as a friend through various means and sends a graphic code carrying illegal information to the normal user, and the illegal information usually appears in a form of webpage link. The website information carried by the graphic code in the picture can be further judged by identifying and acquiring the website information, and whether the website information is a risk site or an illegal link is identified.
In this embodiment, the risky site may be a site that may be at risk of fraud, such as a payment website. The illegal links can be malicious links pointing to websites without security certificates, websites with high reported times, websites carrying trojans or viruses, phishing websites and the like.
Step S206: and matching the website information with the payment website domain name in the domain name library, and obtaining a matching result.
In this embodiment, after the website information carried by the graphic code in the picture is acquired, the website information may be queried in the domain name library to obtain a matching result between the website information and the domain name of the payment website.
As a mode, the domain name library may be configured in the local client, or may be configured in the cloud security service center. It can be understood that a large number of pre-collected risky website domain names are stored in the domain name library. After the website information carried by the graphic code in the picture is acquired, whether the website information is matched with a certain risk website domain name in a domain name library or not is inquired in the domain name library through the website information, so that whether the website information has fraud risk or not can be acquired, and the website information is presented in a matching result mode.
As one way, the collection and expansion of the domain name of the insurance website in the domain name library can be performed on an information publishing platform, a game platform, a live broadcast platform, a communication group, such as part-time service, leasing, goods transaction, and the like, by capturing the information of keywords such as part-time service, gold coins, low prices, and the like, and then performing information filtering and listing through preset manual rules (for example, the age of a communication object, the number of times of security detection requested within a preset time period, the location of a user requesting detection, transaction price abnormal information, online shopping abnormal information, and the like), or manually.
Step S207: and judging whether the graphic code in the picture carries a payment link or not according to the matching result.
In this embodiment, after the matching result is obtained, whether the graphic code carries the payment link or not can be determined according to the matching result. It can be understood that when the website information carried by the graphic code matches the domain name of the payment website in the domain name library, the graphic code can be considered to carry the payment link.
In this embodiment, the form of the webpage corresponding to the payment link may be a commodity purchase page of the payment website, a payment page of the third-party payment software, a payment confirmation page, and the like, and after the user scans and opens the pages, the user may make a wrong payment without careful examination, which may damage the benefit of the user.
In this embodiment, when the graphic code in the picture carries the payment link, step S208 may be performed.
Step S208: and generating risk prompt information.
In this embodiment, when the graphic code in the picture carries the payment link, the risk prompt message may be generated to remind the user who receives the graphic code.
In this embodiment, as shown in fig. 4, the step S208 may be further divided into a step S208a and a step S208 b.
Step S208 a: and obtaining payment content corresponding to the payment link carried by the graphic code in the picture.
In this embodiment, after the website information carried by the graphic code in the picture is obtained, the payment content corresponding to the payment link carried by the graphic code can be obtained according to the matching result between the website information and the payment website in the domain name library.
For example, when the payment link carried by the graphic code is a commodity purchase link of a commodity transaction platform (such as a Taobao network), the payment content corresponding to the payment link is a commodity purchase on the commodity transaction platform; and if the payment link carried by the graphic code is a virtual coin purchasing link of the live broadcast platform, the payment content corresponding to the payment link is the virtual coin purchasing on the live broadcast platform.
Step S208 b: and generating risk prompt information corresponding to the payment content.
In this embodiment, after obtaining the payment content corresponding to the payment link carried by the graphic code in the picture, the risk prompt information corresponding to the payment content may be generated.
For example, when the payment content corresponding to the payment link carried by the graphic code is a commodity purchase on the goods transaction platform, the risk prompt information may be prompt information such as "please pay attention to confirm whether the commodity on the commodity page is the commodity you want to purchase" and the like; when the payment content corresponding to the payment link carried by the graphic code is purchased by the virtual coin on the live broadcast platform, the risk prompt information can be prompt information such as 'when the virtual coin is purchased, please keep track of whether the account displayed on the payment page is the account that you need to recharge'.
By generating different risk prompt messages corresponding to different payment contents, a user can be helped to know the information of the graphic code before scanning the code and match the information with the requirement of the user, so that whether the graphic code has fraud risk or not can be quickly known. For example, when the user needs to recharge the virtual coin of the live broadcast platform, and the picture sent by the opposite party is the graphic code of the commodity payment page of the goods transaction platform, the user can quickly know that the graphic code sent by the opposite party has fraud risk after seeing the risk prompt information, and does not need to go to scan the code identification and enter the page for judgment, so that the user can prevent communication fraud in the bud.
In this embodiment, as shown in fig. 3, after the risk prompting information is generated, the generated risk prompting information may be displayed on an instant messaging page according to the historical messaging information, so as to prompt a risk to a receiver of the risky instant messaging information. In one embodiment, step S209 and step S210 may be performed simultaneously or alternatively.
Step S209: and displaying the risk prompt information on an instant messaging page according to the historical communication information, and adding a safety information link in the risk prompt information.
In this embodiment, the secure information link is used to provide detailed notes.
It can be understood that, because the display area capacity of the instant messaging page is limited, the displayed risk prompt message can be short and essential prompt words or images, and more security information about the risk can be provided in the displayed risk prompt message only as a security information link.
As a way, the detailed notice provided by the security information link may include various communication fraud cases that the current instant messaging platform may encounter, for the user to learn, so that the client can more accurately determine whether the currently received instant messaging information including the graphic code has fraud risk, thereby improving the security awareness of the user.
Step S210: and adding the risk prompt information into the instant messaging information according to the historical messaging information, and displaying the instant messaging information added with the risk prompt information on an instant messaging page.
In this embodiment, before displaying the received instant messaging information, the risk prompt information may be added to the instant messaging information, and the instant messaging information integrated with the risk prompt information is displayed on an instant messaging page.
It can be understood that when people conduct instant messaging, the most concerned is instant messaging information sent by the opposite party rather than system information displayed at other positions on an instant messaging page. When some careless users use instant messaging, the users may only pay attention to instant messaging information sent by the other users, risk prompt information displayed at other positions is omitted, the risk prompt information is added to the instant messaging information for display, the users can be forced to read the risk prompt information, the attention of the users to the risk prompt information is improved, and the users are prevented from omitting the risk prompt information.
In this embodiment, as one mode, the historical communication information may include at least one of a historical communication record of a sender and a historical communication record of a receiver of the picture, an account security status of the sender, and historical verification information of the sender.
The historical communication record (or chat record) may be instant communication information sent between the sender and the receiver of the picture. As one mode, the information contained in the historical communication records can be identified and detected through a pre-established text library, whether sensitive words with fraud risks exist or not is judged, and when the sensitive words exist, the risk prompt information can be displayed.
The security status of the account of the sender may be used to characterize whether the account of the sender is secure, and may include, for example, whether the current login address (IP address, device code, etc.) of the sender is a common address, whether the sender has been reported by other users, the time when the sender has joined the instant messaging platform, and the historical behavior of the sender (e.g., whether other accounts have been added in large quantities for instant messaging, whether friends have been added by an abnormal means, etc.). As a mode, the account of the sender can be detected according to the account security state of the sender, whether the account of the sender is an unsafe account or not is judged, and the risk prompt message can be displayed when the account of the sender is an unsafe account.
Historical authentication information may be used to characterize whether the identity of the sender has been authenticated by the recipient. For example, if the sender and the receiver have added friends and the time for participating in the session exceeds a preset time (e.g., three days, five days, a week, etc.), the identity of the sender may be considered to have been verified by the receiver. As a mode, whether the account of the sender is the trusted account of the receiver can be judged according to the historical verification information of the sender, and when the account of the sender is not verified by the receiver, the risk prompt information can be displayed.
In some embodiments, the risk prompt information may be displayed in any condition that the picture containing the graphic code is sent, and the risk prompt information may have a plurality of prompt levels, each having a different display effect. It can be understood that, when the fraud risk detected according to the historical communication information is higher, the level of the risk prompt information is higher, the risk prompt information with the high prompt level can deepen the prompt effect on the receiving party, and when the fraud risk is too high (for example, the sender account is unsafe and does not perform identity authentication), the picture sent by the sender can be shielded, or the instant communication information sent by the sender can be partially or completely shielded, so as to achieve timely suppression of fraud behaviors.
In this embodiment, referring to fig. 5, fig. 5 is a schematic diagram illustrating a possible scene effect after the information processing method in this embodiment is implemented.
In the instant messaging scenario shown in fig. 5, a segment of instant messaging information containing a two-dimensional code is sent to a party, and when the client receives the instant messaging information, the client can identify and judge the instant messaging information and generate corresponding risk prompt information. As described in step S209 and step S210, the client displays the generated risk prompting information at different positions: one part is that in the instant communication information sent by the other party, the risk prompt information is added at the tail of the original text and picture in the form of 'small tail'; and the other part is that the risk prompt information added with the safe information link is presented in the center of the instant messaging page below the instant messaging information in a more striking conversation frame mode.
It can be understood that the scenario shown in fig. 5 is only one possible application scenario of the information processing method provided in this embodiment, and the information processing method provided in this embodiment may also display the risk prompt information in other forms to achieve the purpose of reminding the user, which is not limited herein.
Compared with the information processing method shown in fig. 2, the information processing method provided in another embodiment of the present application further identifies the payment type graphic code accurately according to the information carried by the graphic code, and can prompt the risk information corresponding to the payment content, and further provides a secure link to help the user to learn and learn more comprehensive security information by setting multiple types of risk prompt information, so as to improve the security awareness of the user.
Referring to fig. 6, fig. 6 is a block diagram illustrating an information processing apparatus 300 according to an embodiment of the present application. As will be explained below with respect to the block diagram of the module shown in fig. 6, the information processing apparatus 300 includes: a receiving module 310, a determining module 320, a prompting module 330, and a displaying module 340, wherein:
the receiving module 310 is configured to receive an instant messaging message including a picture.
The determining module 320 is configured to determine whether the picture includes a graphic code according to a preset policy. Further, the determining module 320 includes:
and the characteristic identification unit is used for carrying out image identification on the picture and acquiring the image characteristics of the picture.
And the feature matching unit is used for performing feature matching on the image features and the graphic codes in the feature library to acquire the similarity between the image features and the graphic codes.
And the similarity judging unit is used for judging whether the picture contains the graphic code according to the similarity.
And the prompting module 330 is configured to generate risk prompting information when the picture contains the graphic code, where the risk prompting information is used for prompting a code scanning risk in a preset manner. Further, the prompt module 330 includes:
and the website identification unit is used for identifying the graphic code in the picture and acquiring website information carried by the graphic code in the picture.
And the domain name matching unit is used for matching the website information with the domain name of the payment website in the domain name library and obtaining a matching result.
And the payment link judging unit is used for judging whether the graphic code in the picture carries the payment link or not according to the matching result.
And the prompting unit is used for generating risk prompting information when the graphic code in the picture carries the payment link.
Further, the prompting unit includes:
and the acquisition subunit is used for acquiring the payment content corresponding to the payment link carried by the graphic code in the picture.
And the prompt subunit is used for generating risk prompt information corresponding to the payment content.
And the display module 340 is configured to display the risk prompt information according to the historical communication information. Further, the display module 340 includes:
the first display unit is used for displaying the risk prompt information on the instant messaging page according to the historical communication information, and adding a safety information link in the risk prompt information, wherein the safety information link is used for providing detailed notice.
And the second display unit is used for adding the risk prompt information into the instant messaging information according to the historical messaging information and displaying the instant messaging information added with the risk prompt information on an instant messaging page.
In this embodiment, the graphic code may be a two-dimensional code.
According to the information processing device provided by the embodiment of the application, when the message containing the graphic code is received in the instant messaging scene, the risk prompt information is generated so as to prompt the risk of the receiving party of the graphic code, the code scanning fraud condition which is easy to occur in the instant messaging scene of part of live broadcast platforms can be effectively prevented, the safety consciousness of users is improved, and the loss of the users is avoided.
Referring to fig. 7, a block diagram of an electronic device 100 according to an embodiment of the present disclosure is shown. The electronic device 100 may be a personal computer, a smart phone, a tablet computer, an electronic book, or other electronic devices capable of running an application. The electronic device 100 in the present application may include one or more of the following components: a processor 110, a memory 120, and one or more applications, wherein the one or more applications may be stored in the memory 120 and configured to be executed by the one or more processors 110, the one or more programs configured to perform a method as described in the aforementioned method embodiments.
Processor 110 may include one or more processing cores. The processor 110 connects various parts within the overall electronic device 100 using various interfaces and lines, and performs various functions of the electronic device 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and calling data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a communication chip.
The Memory 120 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the terminal 100 in use, such as a phonebook, audio-video data, chat log data, and the like.
Referring to fig. 8, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable medium 200 has stored therein a program code which can be called by a processor to execute the method described in the above-described method embodiments.
The computer-readable storage medium 200 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 200 includes a non-volatile computer-readable storage medium. The computer readable storage medium 200 has storage space for program code 210 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 210 may be compressed, for example, in a suitable form.
In summary, the information processing method, the information processing apparatus, the electronic device, and the computer-readable storage medium provided in the embodiments of the present application may receive instant messaging information including a picture, determine whether the picture includes a graphic code according to a preset policy, generate risk prompt information when the picture includes the graphic code, where the risk prompt information is used to prompt a code scanning risk in a preset manner, and finally display the risk prompt information according to historical messaging information. According to the method and the device, when the message containing the graphic code is received in the instant messaging scene, the risk prompt information is generated and displayed according to the historical messaging information, so that the risk prompt is carried out on the receiving party of the graphic code, the code scanning fraud condition which easily appears in the instant messaging scene of a part of live broadcast platforms can be effectively prevented, the safety consciousness of users is improved, and the loss of the users is avoided.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (9)

1. An information processing method, characterized in that the method comprises:
receiving instant messaging information containing pictures, wherein the instant messaging information containing the pictures is to be displayed;
judging whether the picture contains a graphic code according to a preset strategy;
when the picture contains the graphic code, risk prompt information is generated and used for prompting the code scanning risk in a preset mode;
displaying the risk prompt information according to historical communication information; determining that the risk level of a sender account corresponding to the instant messaging information containing the picture is higher than a set level threshold according to the historical messaging information, not displaying the instant messaging information containing the picture on an instant messaging page, and shielding the picture sent by the sender account; after a receiver confirms the identity of a sender through a system and opens the authority of the sender for sending the graphic code, the picture sent by the sender is not shielded;
the judging whether the picture contains the graphic code according to the preset strategy comprises the following steps:
carrying out image recognition on the picture to obtain the image characteristics of the picture; converting the picture into a pixel map through digital image processing, dividing characteristic regions according to the shape of the edge in the pixel map, and screening out the characteristic regions similar to the graphic code as image characteristics;
performing feature matching on the image features and the graphic codes in a feature library to obtain the similarity between the image features and the graphic codes;
and judging whether the picture contains a graphic code or not according to the similarity.
2. The method of claim 1, wherein when the picture contains a graphic code, the generating a risk hint comprises:
identifying the graphic code in the picture, and acquiring website information carried by the graphic code in the picture;
matching the website information with the payment website domain name in a domain name library, and obtaining a matching result;
judging whether the graphic code in the picture carries a payment link or not according to the matching result;
and generating risk prompt information when the graphic code in the picture carries the payment link.
3. The method of claim 2, wherein when the graphic code in the picture carries a payment link, the generating of the risk prompt message comprises:
obtaining payment content corresponding to a payment link carried by the graphic code in the picture;
and generating risk prompt information corresponding to the payment content.
4. The method of claim 1, wherein displaying the risk hint information based on historical communication information comprises:
and displaying the risk prompt information on an instant messaging page according to historical communication information, and adding a safety information link in the risk prompt information, wherein the safety information link is used for providing detailed notice.
5. The method of claim 1, wherein displaying the risk hint information based on historical communication information comprises:
and adding the risk prompt information into the instant messaging information according to historical messaging information, and displaying the instant messaging information added with the risk prompt information on an instant messaging page.
6. The method of claim 1, wherein the historical communications information includes at least one of:
historical communication records of a sender and a receiver of the picture;
the account security status of the sender;
the historical authentication information of the sender is used for representing whether the identity of the sender is authenticated by the receiver.
7. An information processing apparatus characterized in that the apparatus comprises:
the receiving module is used for receiving instant messaging information containing pictures, and the instant messaging information containing the pictures is to be displayed;
the judging module is used for judging whether the picture contains the graphic code according to a preset strategy;
the prompting module is used for generating risk prompting information when the picture contains the graphic code, and the risk prompting information is used for prompting the code scanning risk in a preset mode;
the display module is used for displaying the risk prompt information according to the historical communication information; determining that the risk level of a sender account corresponding to the instant messaging information containing the picture is higher than a set level threshold according to the historical messaging information, not displaying the instant messaging information containing the picture on an instant messaging page, and shielding the picture sent by the sender account; after a receiver confirms the identity of a sender through a system and opens the authority of the sender for sending the graphic code, the picture sent by the sender is not shielded;
wherein, the judging whether the picture contains the graphic code according to the preset strategy comprises:
carrying out image recognition on the picture to obtain the image characteristics of the picture; converting the picture into a pixel map through digital image processing, dividing characteristic regions according to the shape of the edge in the pixel map, and screening out the characteristic regions similar to the graphic code as image characteristics;
performing feature matching on the image features and the graphic codes in a feature library to obtain the similarity between the image features and the graphic codes;
and judging whether the picture contains a graphic code or not according to the similarity.
8. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-6.
9. A computer-readable storage medium, having stored thereon program code that can be invoked by a processor to perform the method according to any one of claims 1 to 6.
CN201811654315.2A 2018-12-28 2018-12-28 Information processing method and device, electronic equipment and computer readable storage medium Active CN109787883B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811654315.2A CN109787883B (en) 2018-12-28 2018-12-28 Information processing method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811654315.2A CN109787883B (en) 2018-12-28 2018-12-28 Information processing method and device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109787883A CN109787883A (en) 2019-05-21
CN109787883B true CN109787883B (en) 2022-01-21

Family

ID=66499674

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811654315.2A Active CN109787883B (en) 2018-12-28 2018-12-28 Information processing method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109787883B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114758327A (en) * 2020-02-25 2022-07-15 支付宝(杭州)信息技术有限公司 Method, device and equipment for identifying risks in code image
JP2022145215A (en) * 2021-03-19 2022-10-03 ヤフー株式会社 Reception apparatus, reception method, and reception program
CN113691440B (en) * 2021-08-02 2023-04-25 维沃移动通信有限公司 Message processing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733910A (en) * 2017-10-29 2018-02-23 西安守护神网络科技有限公司 A kind of the other user's safe class reminding method and system
CN108090391A (en) * 2017-12-29 2018-05-29 北京奇虎科技有限公司 The recognition methods of Quick Response Code and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100008481A1 (en) * 2006-06-12 2010-01-14 Zakarian Edouard T System and method for certifying and authenticating correspondence (ii)
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN104660481B (en) * 2013-11-18 2018-11-06 深圳市腾讯计算机系统有限公司 Instant communication information processing method and processing device
CN103647779A (en) * 2013-12-16 2014-03-19 北京奇虎科技有限公司 Method and device for detecting fishing fraud information through two-dimensional code
CN106570637A (en) * 2016-10-28 2017-04-19 努比亚技术有限公司 Information prompt device and information prompt method in two-dimensional code data acquisition
CN109089229B (en) * 2017-06-13 2022-06-14 腾讯科技(深圳)有限公司 Method, device, storage medium and terminal for risk prompt

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107733910A (en) * 2017-10-29 2018-02-23 西安守护神网络科技有限公司 A kind of the other user's safe class reminding method and system
CN108090391A (en) * 2017-12-29 2018-05-29 北京奇虎科技有限公司 The recognition methods of Quick Response Code and device

Also Published As

Publication number Publication date
CN109787883A (en) 2019-05-21

Similar Documents

Publication Publication Date Title
KR102066827B1 (en) Method and device for allocating augmented reality based virtual object
US10397210B2 (en) Method, device, client and server for interaction
CN109787883B (en) Information processing method and device, electronic equipment and computer readable storage medium
CN107528983B (en) Communication method, data processing platform and communication system
US9325659B2 (en) Method and apparatus for adding friend, and storage medium
WO2014048305A1 (en) Session establishment method, server, device, system and apparatus
CN104935500B (en) Friend recommendation method and device based on network call
CN111355681A (en) Address book-based authentication method, terminal device, server and storage medium
US11172258B1 (en) Protecting against an impersonation scam in a live video stream
CN105681257B (en) Information reporting method, device, equipment and system based on instant messaging interaction platform and computer storage medium
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
US9740835B2 (en) Systems and methods for creating and sharing protected content
Seng et al. Understanding users’ decision of clicking on posts in facebook with implications for phishing
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN111523106A (en) Input verification method based on Chinese character splitting
CN109831417B (en) Method, device, server and storage medium for processing account number for preventing harassment
KR101241365B1 (en) Push service system and method
CN114095463B (en) Data processing method, device, equipment and medium based on instant messaging
CN103905205A (en) Cross-equipment and cross-application digital signature and verification method based on data image coding
CN113824727A (en) Webpage login verification method, device, server and storage medium
CN112597529A (en) Multimedia content processing method and device, storage medium and electronic equipment
CN111325634A (en) User head portrait processing method, device and system
FR2961330A1 (en) Method for securing electronic transaction between user of e.g. personal computer and goods or service merchant during purchasing of train tickets, involves assuring coherence between constitutive elements of contract and signed message
CN106161380B (en) Information processing method and device
CN114979055A (en) Message transmission method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190521

Assignee: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000030

Denomination of invention: Information processing method, device, electronic equipment and computer readable storage medium

License type: Common License

Record date: 20210125

GR01 Patent grant
GR01 Patent grant