CN102761531B - A kind of community authentication method and server - Google Patents

A kind of community authentication method and server Download PDF

Info

Publication number
CN102761531B
CN102761531B CN201110110623.0A CN201110110623A CN102761531B CN 102761531 B CN102761531 B CN 102761531B CN 201110110623 A CN201110110623 A CN 201110110623A CN 102761531 B CN102761531 B CN 102761531B
Authority
CN
China
Prior art keywords
community
user
white list
information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110110623.0A
Other languages
Chinese (zh)
Other versions
CN102761531A (en
Inventor
周旋
吴云林
赵建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201110110623.0A priority Critical patent/CN102761531B/en
Publication of CN102761531A publication Critical patent/CN102761531A/en
Application granted granted Critical
Publication of CN102761531B publication Critical patent/CN102761531B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of community authentication method and server, this community authentication method comprises: obtain user and add interconnection protocol IP information between the behavioral data of community, network; The IP white list of community according to described behavioral data and IP acquisition of information; When applying for when there being user adding described community, judging that whether the current IP of described user or common IP be the IP in the IP white list of described community, allowing when judged result is for being described user to add described community.Adopt the present invention, the competency for operation that whether can have community by the prior information learnt by background authentication user, greatly simplify authentication procedures.

Description

Community verification method and server
Technical Field
The invention relates to the technical field of internet communication, in particular to a community verification method and a server.
Background
Social Networking Services (SNS) is an internet application service that aims to help people establish a social network. Also refers to the existing information carriers which have been mature and popular in society, such as short message SMS service. In the internet communication technology, a social network site or a social network (i.e., social network site) may also be referred to as SNS.
The SNS websites have been developed to expand the social field of their applications from the initial circle of interest to today's social circles including various specific social relationships, such as communities based on specific social circles, e.g., corporate communities, campus communities, library communities, etc. Some SNS websites can guide users to fill in information of interests, friends and the like of the users, a few websites can also guide the users to fill in information of communities to which the users belong in sequence, and community-related services are provided, but most SNS websites do not provide a user authentication mechanism and cannot ensure the authenticity of the information of the user communities.
And some SNS websites launch a relationship network of two latitudes of "company" and "industry". Only users authenticated by the corporate community (proving that they are employees of the company) are eligible to use products and services at the latitude of the company. It provides a way for company email verification to determine the user's qualification, e.g., the user may apply for joining via company distributed email. And the SNS website sends an authentication mail to the mailbox after confirming the email suffix as the company mailbox suffix. The user receives the mail to prove that the mailbox is owned by the user. Click on the verification link in the mail to complete the verification.
However, the above-mentioned enterprise community verification steps are cumbersome, the problem of delay, delivery failure and the like may exist in the verification mail, and many users cannot open the company mailbox to check and receive the verification mail in non-working time/non-working place; for other types of communities, there may be no mailbox associated with a particular community, no way to verify user identity by authenticating mail, and so forth. Making it cumbersome for users of these communities to use, which require authentication of the user's identity.
Disclosure of Invention
The technical problem to be solved by the embodiment of the invention is to provide a community verification method and a server. Whether the user has the use qualification of the specific community or not can be verified by the background through the learned prior information or/and the preset prior information, and the user verification process is greatly simplified.
In order to solve the above technical problem, an embodiment of the present invention provides a community verification method, including:
acquiring behavior data of a user joining a community and Internet Protocol (IP) information between networks;
acquiring an IP white list of the community according to the behavior data and the IP information;
when a user applies for joining the community, judging whether the current IP or the common IP of the user is the IP in the IP white list of the community, and allowing the user to join the community if the judgment result is yes.
Wherein the obtaining the IP white list of the community according to the behavior data and the IP information comprises:
recording authentication IP information when a user successfully joins the community through a community mailbox authentication mode, and adding the authentication IP information into an IP white list of the community when the number of the user who successfully joins the community by using the authentication IP reaches a preset threshold value.
The obtaining the IP white list of the community according to the behavior data and the IP information may further include:
obtaining a community group by analyzing the name of the instant messaging group;
and counting the IP aggregation condition of the community group members in the working time period to obtain an IP white list of the community corresponding to the community group.
Meanwhile, the method may further include:
acquiring user ID information matched with the IP white list of the community, and adding the ID information into the ID white list of the community;
when a user applies for joining the community, judging whether the ID of the user is the ID in the ID white list of the community, and allowing the user to join the community if the judgment result is yes.
The community may include one or more of a group, forum, microblog belonging to a particular community.
Correspondingly, the embodiment of the invention also provides a community verification server, which comprises:
the information acquisition unit is used for acquiring behavior data and IP information of a user for joining the community;
a white list obtaining unit, configured to obtain an IP white list of the community according to the behavior data and the IP information;
and the IP verification unit is used for judging whether the current IP or the common IP of the user is the IP in the IP white list of the community when the user applies for joining the community, and allowing the user to join the community when the judgment result is yes.
The white list obtaining unit may include a white list obtaining unit,
the mailbox authentication recording subunit is used for recording authentication IP information when the user successfully joins the community through a community mailbox authentication mode;
a threshold judgment subunit, configured to judge whether the number of users who successfully join the community using the authentication IP reaches a predetermined threshold;
and the white list obtaining subunit is used for adding the authentication IP information into the IP white list of the community when the judgment result of the threshold judging subunit is positive.
The white list acquisition unit includes: the group analysis subunit is used for obtaining the community group by analyzing the instant messaging group name; and the group white list subunit is used for counting the IP aggregation conditions of the community group members in the working time period to obtain the IP white list of the community corresponding to the community group.
Further, the server may further include:
the ID white list acquisition unit is used for acquiring user ID information matched with the IP white list of the community and adding the ID information into the ID white list of the community;
and the ID verification unit is used for judging whether the ID of the user is the ID in the ID white list of the community when the user applies for joining the community, and allowing the user to join the community when the judgment result is yes.
Wherein the community comprises one or more of a group, a forum, a microblog belonging to a particular community.
In the embodiment of the invention, the IP white list is generated through the prior information of the user (including behavior data and IP information of the user successfully joining the community), when a new user behavior applying for joining the community exists, whether the user is allowed to join the community can be judged by only verifying whether the IP is the IP in the white list, the authenticity of user data and the purity of community members are ensured, meanwhile, the verification process of the user is greatly simplified, the verification operation threshold is reduced, and the use convenience is provided for the user.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic flow chart of a community verification method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of a method for verifying a white list of IDs;
FIG. 3 is a schematic flow chart of another embodiment of the community verification method;
FIG. 4 is a schematic diagram of a specific component of a community authentication server in an embodiment of the present invention;
fig. 5 is a schematic diagram of a specific composition of a white list obtaining unit in the embodiment of the present invention;
fig. 6 is another specific composition diagram of the community authentication server in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the invention, the community IP is obtained by collecting the behavior data of a small part of users and the Internet Protocol (IP) information between networks, and the community to which the identity of the large part of users belongs is identified through the community IP. The method can greatly simplify the complicated community verification process of the user, reduce the operation threshold of the community verification, provide great convenience for the user, and ensure the authenticity of user data and the purity of community members to a certain extent. The following specifically describes various embodiments of the present invention based on the above-described concept.
Fig. 1 is a schematic specific flowchart of a community verification method in an embodiment of the present invention, which includes the following steps.
101. And acquiring behavior data and IP information of a user for joining the community.
The community referred to in the embodiments of the present invention refers to a network resource provided in an SNS website or other types of network applications and used by a common specific user group, for example, an enterprise community (a forum, a microblog relationship, etc. established for a specific enterprise to allow employees of the specific enterprise to perform various communications), a school community, an internet cafe community, a library community, and the like. Members of these communities may have relatively fixed IP addresses or IP address ranges when logging in, for example, if an enterprise community user is likely to log in the community at an enterprise office, the IP address is likely to be the IP allocated by the internet for the internet access terminal within the office range. Then the purity of the user identity can be maintained by obtaining these IP addresses and performing user identity verification accordingly (i.e. the following IP white list verification method of the current IP); meanwhile, in order to provide convenience for the user, the user who has been verified to be successful although the current IP is not in the IP white list can be allowed to enter the community (i.e. the IP white list verification method and the user ID verification method of the common IP described below).
The behavior data includes a verification behavior that the user applies for joining a certain community, or other behaviors that the user may be related to the community to which the user belongs (for example, a behavior of joining a member of an instant communication group corresponding to the community), and the like, and the IP information refers to information such as an IP address used when the user performs the behavior (the IP address is a 32-bit address allocated to each host connected to the Internet, and may be a 64-bit address, a 128-bit address, and the like in the future as the network scale is continuously expanded).
102. And acquiring an IP white list of the community according to the behavior data and the IP information. There are various methods for generating the IP white list, for example, a user obtains the IP white list by verification that the user joins the community through a community mailbox authentication method, or obtains the IP white list by analyzing the group name and obtaining the community group member, or may directly set the IP white list through a method preset by a third party, and the following describes several methods for obtaining the IP white list.
The first method comprises the steps of recording authentication IP information when a user successfully joins a community through a community mailbox authentication mode, and adding the authentication IP information into an IP white list of the community when the number of the user who successfully joins the community by using the authentication IP reaches a preset threshold value. Of course, if the predetermined threshold is 1, it means that the IP address is added to the IP white list as long as the user has successfully added the IP address to the community. Meanwhile, the number of the users may be counted as the number of times that the same user ID or different user IDs join the community, for example, the number of times that the same user ID is successfully logged in using the IP may be counted, or the number of times that different user IDs are successfully logged in using the IP may be counted.
Moreover, for the generation of the IP white list, different IP filtering modes may be provided for different community types, for example, for an enterprise community, in order to avoid miscalculating the IP of a public place into the IP white list, a non-enterprise IP list may be preset on a background (i.e., a verification server), and only the IP not in the non-enterprise IP list is allowed to be added into the IP white list. That is, when adding the IP information to the white list, it may be further determined whether the authentication IP is an IP in a predetermined non-enterprise IP list, and when the determination result is no, the authentication IP information is added to the IP white list of the enterprise community. The IPs in the predetermined list of non-enterprise IPs include IPs assigned for use by public-profit locations and/or IPs assigned for use by public-non-profit locations, such as internet caf é IPs, school IPs, restaurant IPs external to the enterprise, and the like.
The second method is that the name of the instant communication group is analyzed to obtain a community group, and the community group is a group related to the specific community; and then, counting the IP aggregation condition of the community group members in the working time period to obtain an IP white list of the community corresponding to the community group. When the community group is obtained through analysis, the name of the group can be analyzed through the keyword, whether the group is the corresponding community group or not is judged, for example, if the community is a community of a certain library, the community with the name of the certain library can be identified as the community group.
And thirdly, acquiring the community IP through third party data and manual collection. That is, the rules for adding the IP whitelist may also be adjusted and set according to the needs of the user. For example, a manager of the community can set specific joining rules, and the manager can also manually add the IP address or the IP address segment on the basis of self-learning. Of course, the setting may be performed by an administrator of the community site in the background server. The "rule of adding to the IP white list" may further include a time when the user applies for adding to the community (for example, for the enterprise community, only the application of the working time is a reasonable application), a number of times, a frequency, and the like.
Acquiring all IP addresses of all members who have joined a certain community and log in the community; and counting all IP addresses logged in by all members, and when the number of certain IP addresses exceeds a certain threshold value, listing the IP addresses in an IP white list.
The above modes can coexist, and only one or more modes can be adopted to obtain the IP white list. Of course, there are other ways to obtain the white list, and the general principles can be understood as follows: the IP in the IP white list should be the IP used by the legal community member to ensure that the user who joins the community is finally verified to be the legal community member user.
103. And when a new user applies for joining the community, judging whether the current IP or the common IP of the user is the IP in the IP white list of the community, and allowing the user to join the community if the judgment result is yes. The current IP of the user refers to an IP address used when the user applies for joining the community, the common IP refers to an IP address frequently used when the user logs in other communities or groups of the website, and the current IP and the common IP may be different.
The user applying for joining the community in step 103 may be a new user or a user who has joined the community, and as long as the IP used by the user meets the rule in the step, the user can directly enter the community through background authentication without repeating the existing authentication mode including a large amount of user interaction.
Meanwhile, when a user browses the SNS website, whether the IP address of the user is the IP in the IP white list of a certain community in the website is judged, and if the IP address of the user is the IP in the IP white list of the certain community in the website, the community group can be recommended to the user.
It can be seen from the above steps that the background can collect prior knowledge through steps 101 to 102 to generate an IP white list, and the verification method for the user to join the community at this stage can adopt a traditional verification method. For the verification in the latter stage, i.e. the verification in step 103, it is sufficient to use these a priori knowledge to determine whether the IP of the user is in the IP white list.
The verification method in the embodiment of the invention has great flexibility, and the IP white list can be automatically changed according to the requirement, so that a new IP is added. When a user using a new IP joins, it can be properly added to the IP white list after several learning, facilitating the subsequent joining of the user using the IP.
In order to improve the flexibility of the verification, considering the inflexibility of a community verification mode of many communities, and allowing some users who successfully verify that the IP of the users is not necessarily the IP in the IP white list, the embodiment of the invention further provides a verification mechanism of the ID white list on the basis of the verification method. As shown in fig. 2, the embodiment of the present invention further includes the following steps.
201. And acquiring user ID information matched with the IP white list of the community, and adding the ID information into the ID white list of the community. This step may be performed together with the aforementioned step 102 or after the step 102, that is, when adding the appropriate IP information to the IP whitelist, the corresponding user ID information is added to the ID whitelist at the same time (or, based on the case of adding the IP whitelist, the corresponding ID is added to the ID whitelist). Then, at this time, the generation condition of the ID whitelist is identical to that of the IP whitelist.
202. When a user applies for joining the community, judging whether the ID of the user is the ID in the ID white list of the community, and allowing the user to join the community if the judgment result is yes.
As can be seen from the above description of steps, even if a user does not join a community within the address range of a specific community, the user can join the community as long as the user ID is correct. It should be noted that the user ID is not necessarily only the user ID for the community, but for example, for an SNS site, it may provide various types of communities for users to choose from, and a user may have a user ID for logging in the SNS site, and it is not necessary to separately apply for a user ID in each specific social network.
Meanwhile, the community may include one or more of a group, a forum, and a microblog for a specific object. The group, forum, and microblog applications may also be associated with an instant messaging application, and when a user logs in an instant messaging application with a certain ID, the ID may also be used as an ID in the group, forum, and microblog applications, and the verification method may adopt the method in the above embodiment of the present invention.
To further illustrate the above flow, an embodiment of the present invention further provides a verification method for an enterprise community, as shown in fig. 3, the verification method in this embodiment includes the following flow.
301. And acquiring the enterprise IP.
The user applies for joining a certain enterprise community, fills in a mailbox address allocated by the company, and receives the verification mail. Recording the current IP address of the user authentication. When the number of people using a certain IP reaches a certain threshold value and the IP is not the IP of the Internet bar/school, the IP is added to the white list of the IP of the company, namely the IP is considered as the IP of the company.
302. The user ID is acquired.
And recording the login IP of the user. When the login IP is matched with the enterprise IP (namely the IP white list), the user ID using the IP is recorded in the member white list of the enterprise, and when the user ID is subsequently used for applying for joining the company, even if the IP address is changed, the IP authentication can be passed through due to the record.
303. Enterprise IP/user ID authentication.
When a user applies for joining a company, whether the current IP or the common IP of the user is in an IP white list or not or whether the user ID is in a member white list is judged. If so, the authentication is passed.
In the embodiment of the invention, the IP white list is generated through the prior information of the user (including behavior data and IP information of the user successfully joining the community), when a new user behavior applying for joining the community exists, whether the user is allowed to join the community can be judged by only verifying whether the IP is the IP in the white list, the authenticity of user data and the purity of community members are ensured, meanwhile, the verification process of the user is greatly simplified, the verification operation threshold is reduced, and the use convenience is provided for the user.
As shown in fig. 4, an embodiment of the present invention further provides a community verification server, which includes the following units.
An information obtaining unit 41, configured to obtain behavior data and IP information of a user joining a community; a white list obtaining unit 43, configured to obtain an IP white list of the community according to the behavior data and the IP information; and the IP verification unit 45 is configured to determine whether the current IP or the common IP of the user is an IP in the IP white list of the community when the user applies for joining the community, and allow the user to join the community if the determination result is yes.
As shown in fig. 5, the white list obtaining unit 43 may include: a mailbox authentication recording subunit 431, configured to record authentication IP information when a user successfully joins the community through a community mailbox authentication manner; a threshold judging subunit 433, configured to judge whether the number of users who successfully join the community using the authentication IP reaches a predetermined threshold; a white list obtaining subunit 435, configured to add the authentication IP information to the IP white list of the community when the threshold value determining subunit determines that the threshold value is yes.
Alternatively, the white list obtaining unit 43 includes: the group analysis subunit is used for obtaining the community group by analyzing the instant messaging group name; and the group white list subunit is used for counting the IP aggregation conditions of the community group members in the working time period to obtain the IP white list of the community corresponding to the community group. These two subunits (not shown) may be present in parallel with the subunits shown in fig. 5 or may be present separately. That is, when acquiring the white list, the acquisition method corresponding to the composition structure shown in fig. 5 may be adopted, the acquisition method corresponding to the composition structure in this paragraph may be adopted, or both the methods may be adopted.
Further, as shown in fig. 6, the server may further include: an ID white list obtaining unit 44, configured to obtain user ID information matched with an IP white list of the community, and add the ID information to the ID white list of the community; and an ID verification unit 46, configured to determine whether the ID of the user is an ID in the ID white list of the community when the user applies for joining the community, and allow the user to join the community if the determination result is yes.
Wherein the community comprises one or more of a group, a forum, a microblog for a particular object.
In the embodiment of the invention, the IP white list is generated through the prior information of the user (including behavior data and IP information of the user successfully joining the community), when a new user behavior applying for joining the community exists, whether the user is allowed to join the community can be judged by only verifying whether the IP is the IP in the white list, the authenticity of user data and the purity of community members are ensured, meanwhile, the verification process of the user is greatly simplified, the verification operation threshold is reduced, and the use convenience is provided for the user.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), or the like.
While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (6)

1. A community authentication method, comprising:
acquiring behavior data of a user joining a community and Internet Protocol (IP) information between networks;
acquiring an IP white list of the community according to the behavior data and the IP information;
when a user applies for joining the community, judging whether the current IP or the common IP of the user is the IP in the IP white list of the community, and allowing the user to join the community if the judgment result is yes;
the obtaining the IP white list of the community according to the behavior data and the IP information comprises:
recording authentication IP information when a user successfully joins in a community through a community mailbox authentication mode, and adding the authentication IP information into an IP white list of the community when the number of the user who uses the authentication IP to successfully join in the community reaches a preset threshold value;
or,
obtaining a community group by analyzing the name of the instant messaging group; and counting the IP aggregation condition of the community group members in the working time period to obtain an IP white list of the community corresponding to the community group.
2. The community verification method of any one of claim 1, wherein the method further comprises:
acquiring user ID information matched with the IP white list of the community, and adding the ID information into the ID white list of the community;
when a user applies for joining the community, judging whether the ID of the user is the ID in the ID white list of the community, and allowing the user to join the community if the judgment result is yes.
3. The community verification method of claim 1 or 2, wherein the community comprises one or more of a group, a forum, a microblog belonging to a particular community.
4. A community authentication server, the server comprising:
the information acquisition unit is used for acquiring behavior data and IP information of a user for joining the community;
a white list obtaining unit, configured to obtain an IP white list of the community according to the behavior data and the IP information;
the IP verification unit is used for judging whether the current IP or the common IP of the user is the IP in the IP white list of the community when the user applies to join the community, and allowing the user to join the community when the judgment result is yes; the white list obtaining unit includes a white list obtaining unit,
the mailbox authentication recording subunit is used for recording authentication IP information when the user successfully joins the community through a community mailbox authentication mode;
a threshold judgment subunit, configured to judge whether the number of users who successfully join the community using the authentication IP reaches a predetermined threshold;
a white list obtaining subunit, configured to add the authentication IP information to the IP white list of the community when the threshold value determining subunit determines that the threshold value is positive;
or, the white list obtaining unit includes:
the group analysis subunit is used for obtaining the community group by analyzing the instant messaging group name;
and the group white list subunit is used for counting the IP aggregation conditions of the community group members in the working time period to obtain the IP white list of the community corresponding to the community group.
5. The server of claim 4, wherein the server further comprises:
the system comprises an ID white list acquisition unit, a community IP white list acquisition unit and a community IP white list acquisition unit, wherein the ID white list acquisition unit is used for acquiring user ID information matched with the community IP white list and adding the ID information into the ID white list of the community;
and the ID verification unit is used for judging whether the ID of the user is the ID in the ID white list of the community when the user applies for joining the community, and allowing the user to join the community when the judgment result is yes.
6. The server of any of claims 4 or 5, wherein the community comprises one or more of a group, a forum, a microblog belonging to a particular community.
CN201110110623.0A 2011-04-29 2011-04-29 A kind of community authentication method and server Active CN102761531B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110110623.0A CN102761531B (en) 2011-04-29 2011-04-29 A kind of community authentication method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110110623.0A CN102761531B (en) 2011-04-29 2011-04-29 A kind of community authentication method and server

Publications (2)

Publication Number Publication Date
CN102761531A CN102761531A (en) 2012-10-31
CN102761531B true CN102761531B (en) 2015-12-16

Family

ID=47055853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110110623.0A Active CN102761531B (en) 2011-04-29 2011-04-29 A kind of community authentication method and server

Country Status (1)

Country Link
CN (1) CN102761531B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9208781B2 (en) * 2013-04-05 2015-12-08 International Business Machines Corporation Adapting speech recognition acoustic models with environmental and social cues
CN104572757B (en) * 2013-10-24 2018-11-23 中兴通讯股份有限公司 Microblogging group processing method and processing device
CN105323221B (en) * 2014-07-11 2018-08-24 博雅网络游戏开发(深圳)有限公司 The method and system of the anti-cheating of online game
CN104796889B (en) * 2015-01-08 2018-03-13 北京思普崚技术有限公司 A kind of method of community network checking
WO2017214912A1 (en) * 2016-06-16 2017-12-21 汤美 School-based internet education method and system
CN106204847B (en) * 2016-07-18 2018-10-19 北京千丁互联科技有限公司 Access control system, background server and its self-learning method
CN109120605A (en) * 2018-07-27 2019-01-01 阿里巴巴集团控股有限公司 Authentication and account information variation and device
CN109617901A (en) * 2018-12-29 2019-04-12 上海点融信息科技有限责任公司 Determine the method and device thereof of white list
CN110011992B (en) * 2019-03-25 2022-07-26 联想(北京)有限公司 System login method and electronic equipment
CN111726330B (en) * 2019-06-28 2022-06-24 上海妃鱼网络科技有限公司 IP-based secure login control method and server
CN110781243A (en) * 2019-11-06 2020-02-11 杭州安恒信息技术股份有限公司 Incremental synchronization method and system for double main data of relational database

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136922A (en) * 2007-04-28 2008-03-05 华为技术有限公司 Service stream recognizing method, device and distributed refusal service attack defending method, system
CN101711029A (en) * 2009-12-17 2010-05-19 中国联合网络通信集团有限公司 Method and equipment for certifying access of terminal, and method for restoring equipment validity

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136922A (en) * 2007-04-28 2008-03-05 华为技术有限公司 Service stream recognizing method, device and distributed refusal service attack defending method, system
CN101711029A (en) * 2009-12-17 2010-05-19 中国联合网络通信集团有限公司 Method and equipment for certifying access of terminal, and method for restoring equipment validity

Also Published As

Publication number Publication date
CN102761531A (en) 2012-10-31

Similar Documents

Publication Publication Date Title
CN102761531B (en) A kind of community authentication method and server
US10778804B2 (en) Method and apparatus for providing control of social networking sites
US9154514B1 (en) Systems and methods for electronic message analysis
US10135766B2 (en) System and method for evaluating domains to send emails while maintaining sender reputation
US9838403B2 (en) System and method for identifying abusive account registration
US10104029B1 (en) Email security architecture
US8707407B2 (en) Account hijacking counter-measures
CN103916244B (en) Verification method and device
US8671453B2 (en) Social age verification engine
US8255983B2 (en) Method and apparatus for email communication
US20130124644A1 (en) Reputation services for a social media identity
US20150327205A1 (en) Simple mobile registration mechanism enabling automatic registration via mobile devices
US20130297375A1 (en) Software Service To Facilitate Organizational Testing Of Employees To Determine Their Potential Susceptibility To Phishing Scams
US8909707B2 (en) Method of virally expanding social networks
CN109698809A (en) A kind of recognition methods of account abnormal login and device
US20150067055A1 (en) Method and system of an anonymous online social network
US20120296988A1 (en) Email spam elimination using per-contact address
US10044735B2 (en) System and method for authentication of electronic communications
CN102404741A (en) Method and device for detecting abnormal online of mobile terminal
US20180046707A1 (en) Providing searching strategy in connection with answering question in message
US8170978B1 (en) Systems and methods for rating online relationships
US10243900B2 (en) Using private tokens in electronic messages associated with a subscription-based messaging service
US10116614B1 (en) Detection of abusive user accounts in social networks
Masoud et al. On tackling social engineering web phishing attacks utilizing software defined networks (SDN) approach
CN105577626A (en) User name registration and use method, system and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160104

Address after: The South Road in Guangdong province Shenzhen city Fiyta building 518057 floor 5-10 Nanshan District high tech Zone

Patentee after: Shenzhen Tencent Computer System Co., Ltd.

Address before: Shenzhen Futian District City, Guangdong province 518057 Zhenxing Road, SEG Science Park 2 East Room 403

Patentee before: Tencent Technology (Shenzhen) Co., Ltd.