CN104052720A - Information authentication method and system thereof - Google Patents
Information authentication method and system thereof Download PDFInfo
- Publication number
- CN104052720A CN104052720A CN201310082244.4A CN201310082244A CN104052720A CN 104052720 A CN104052720 A CN 104052720A CN 201310082244 A CN201310082244 A CN 201310082244A CN 104052720 A CN104052720 A CN 104052720A
- Authority
- CN
- China
- Prior art keywords
- data item
- information
- record
- account
- blacklist
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an information verification method and a system thereof. The information verification method comprises a step of receiving the account registration information comprising a plurality of data items, a step of searching a record which is matched with the data items in the received account registration information in a pre-stored blacklist, and a step of sending the response of indicating authentication failure if the record is found. In a network promotion system, a merchant with violation history can be automatically prevented from continuing to register a new account by using other information and continuing to carry out a promotion behavior which violates national laws or damages the interests of consumers.
Description
Technical field
The application relates to a kind of Information Authentication method and system, relates in particular to a kind of method and system of account log-on message being carried out to checking, mates, thereby determine that refusal had the account of unlawful practice by Account Registration information with the information in blacklist.
Background technology
In network information extension system, advertiser need provide its Account Registration information and promotional content to network promotion business.The Account Registration information that first network promotion business will provide advertiser is examined, whether this registration certificate of submitting to comprising advertiser qualified, main web site of advertiser's registration whether effectively with and the popularization behavior that whether had unlawful practice, said unlawful practice to refer to violate state's laws rules, policy and network promotion business regulation.
In order to evade network promotion business's auditing rule, some illegal trade company is being rejected after popularization because of unlawful practice, often attempt to use the different different accounts of Account Registration information registering, this checking/audit to account log-on message is had higher requirement, to stop illegal trade company to carry out popularization activity on network.
Summary of the invention
The object of the present invention is to provide a kind of Information Authentication method and system, automatically each data item in the Account Registration information of user registration is mated with the blacklist of information that records the account of unlawful practice, thereby based on multinomial data, more effectively find the registration behavior of illegal trade company.
According to an aspect of the present invention, provide a kind of Information Authentication method, comprising: receive the Account Registration information that comprises a plurality of data item; In the blacklist of pre-stored, search the record mating with the data item in the Account Registration information receiving; If found the record of coupling, sent the response of indication authentication failed.
Preferably, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
Preferably, every of described blacklist record comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
Preferably, as long as found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response of indication authentication failed.
Preferably, in the blacklist of described pre-stored, search with the step of the record of the Account Registration information matches receiving and comprise: calculate data item in Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, determine the record having found with the Account Registration information matches receiving.
Preferably, described Information Authentication method also comprises: if do not find the record of coupling, send the response that indication is proved to be successful.
Preferably, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
According to a further aspect in the invention, provide a kind of information authentication system, comprising: the first module, for receiving the Account Registration information that comprises a plurality of data item; The second module, for searching the record mating with the data item in the Account Registration information receiving at the blacklist of pre-stored; The 3rd module, if for having found the record of coupling, send the response of indication authentication failed.
Preferably, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
Preferably, every of described blacklist record comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
Preferably, as long as the 3rd module has found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response of indication authentication failed.
Preferably, data item in the second module calculating Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, the 3rd module is determined the record having found with the Account Registration information matches receiving.
Preferably, described information authentication system also comprises: four module, if for not finding the record of coupling, sends the response that indication is proved to be successful.
Preferably, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
Accompanying drawing explanation
By the description of carrying out below in conjunction with accompanying drawing, above and other object of the present invention and feature will become apparent, wherein:
Fig. 1 is the flow chart illustrating according to the Information Authentication method of exemplary embodiment of the present invention;
Fig. 2 is the flow chart illustrating according to the Information Authentication method of another exemplary embodiment of the present invention.
Embodiment
Below, describe with reference to the accompanying drawings embodiments of the invention in detail.
Fig. 1 is the flow chart illustrating according to the Information Authentication method of exemplary embodiment of the present invention.In computer system, realize Information Authentication method of the present invention, Information Authentication method of the present invention can be embodied as an application in computer system or the software module of applying, and also can be embodied as the software module in a plurality of computers.For convenience of description, below, the main body of each step in described method is referred to as to computer system.
With reference to Fig. 1, at step S110, computer system receives the Account Registration information that comprises a plurality of data item.Described Account Registration information can be from same application or the Another Application of described computer system, also can be from another computer system connecting by network.Described Account Registration information includes, but are not limited to, at least one data item in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie etc.
At step S120, computer system is searched the record mating with the data item in the Account Registration information receiving in the blacklist of pre-stored.Described blacklist is produced and periodic maintenance by network promotion system, comprise the accounts information that unlawful practice occurred, its every record can comprise, but be not limited to name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in the data item such as cookie for registration.Described Account Registration packets of information, containing a plurality of data item, therefore, is used respectively a plurality of data item to mate with the corresponding data item in blacklist.
At step S130, computer system is determined the record that whether finds coupling.
If at step S130, determine the record that has found coupling, at step S150, computer system sends the response of indication authentication failed.According to exemplary embodiment of the present invention, at step S130, as long as found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response (step S150) of indication authentication failed.
For example, certain trade company once carried out violating the popularization activity of state's laws rules, thereby was forbidden proceeding described popularization by network promotion business, and was recorded in blacklist; Afterwards, this trade company is used different log-on message (as different names on account, address and network address etc.) to network promotion business, to register another account again.Now, according to the method for conventionally examining according to name on account or network address, can not find that there was unlawful practice in this trade company was prohibited, and while mating with blacklist according to other data item of the present invention (while registering as user use IP address), if this trade company is used the preceding account of same IP address registration and New Account, can find this violation trade company, and refuse its new registration behavior.
On the other hand, if at step S130, determine the record that does not find coupling, at step S140, computer system sends the response that indication is proved to be successful.
By above-mentioned, to the description of the exemplary embodiment shown in Fig. 1, can be found out, Information Authentication method of the present invention can be by comparing each data item of promoting user's Account Registration information with the blacklist that records violation merchant information, thereby by the information matches of fineness more, find in time this violation trade company, and forbid its registration New Account.
When mating, for some data item, do not need to mate completely and just can determine that the data item of comparison belongs to same trade company main body, each data item has matching degree required value separately simultaneously.For this reason, referring to Fig. 2, describe according to the Information Authentication method of another exemplary embodiment of the present invention.In the embodiment shown in Fig. 2, it is the pre-configured matching degree threshold value of each data item.
Step S210 in Fig. 2, S240 and S250 correspond respectively to step S110, S140 and the S150 in Fig. 1, and step S220 and S230 are equivalent to respectively distortion or the alternative of step S120 and S130.Therefore, the operation of step S220 and S230 will be specifically described.
At step S220, the data item in the Account Registration information that computer system calculating receives and the matching similarity of the corresponding data item in blacklist.
At step S230, whether computer system is defined as the matching similarity of each data item calculating higher than being the pre-configured matching degree threshold value of described data item.
If at step S230, be defined as the matching similarity of each data item calculating higher than being the pre-configured matching degree threshold value of described data item, computer system is determined the record having found with the Account Registration information matches receiving, and at step S250, computer system sends the response of indication authentication failed.
On the other hand, if at step S230, be defined as the matching similarity of each data item calculating not higher than being the pre-configured matching degree threshold value of described data item, computer system is determined the record not finding with the Account Registration information matches receiving, and at step S240, computer system sends the response that indication is proved to be successful.
According to a preferred embodiment of the invention, at step S150 and step S250, when computer system sends the response of indication authentication failed, the information that also comprises the data item of coupling in the response of the indication authentication failed sending, thus application or the system of the checking of request account qualification can be carried out different processing according to the character of matched data item and importance.
From above-mentioned, with reference to accompanying drawing, to the description of exemplary embodiment of the present invention, can find out, each data item of the Account Registration information that Information Authentication method of the present invention can automatically provide user is mated with the corresponding data item that records the information of violation account, thereby based on more data, effectively finds that there is the account of unlawful practice; In addition, the present invention also carries out similarity calculating to each data item, improves the discovery rate of account in violation of rules and regulations.In network promotion system, can automatically prevent that historical in violation of rules and regulations trade company from continuing to use other information registering New Accounts, proceed for example to violate the popularization behavior of state's laws or infringement consumers' rights and interests.
The present invention also provides a kind of information authentication system that uses said method.
It may be noted that according to the needs of implementing, each step of describing can be split as to more multi-step in the application, also the part operation of two or more steps or step can be combined into new step, to realize object of the present invention.
Above-mentioned the method according to this invention can be at hardware, in firmware, realize, or be implemented as and can be stored in recording medium (such as CD ROM, RAM, floppy disk, hard disk or magneto optical disk) in software or computer code, or be implemented the original storage downloaded by network in remote logging medium or nonvolatile machine readable media and by the computer code being stored in local record medium, thereby method described here can be stored in use all-purpose computer, such software on the recording medium of application specific processor or able to programme or specialized hardware (such as ASIC or FPGA) is processed.Be appreciated that, computer, processor, microprocessor controller or programmable hardware comprise can store or receive software or computer code memory module (for example, RAM, ROM, flash memory etc.), when described software or computer code are by computer, processor or hardware access and while carrying out, realize processing method described here.In addition,, when all-purpose computer access is used for realizing the code in the processing shown in this, the execution of code is converted to all-purpose computer for carrying out the special-purpose computer in the processing shown in this.
Although represent with reference to preferred embodiment and described the present invention, it should be appreciated by those skilled in the art that in the situation that do not depart from the spirit and scope of the present invention that are defined by the claims, can carry out various modifications and conversion to these embodiment.
Claims (14)
1. an Information Authentication method, comprising:
Reception comprises the Account Registration information of a plurality of data item;
In the blacklist of pre-stored, search the record mating with the data item in the Account Registration information receiving;
If found the record of coupling, sent the response of indication authentication failed.
2. Information Authentication method as claimed in claim 1, is characterized in that, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
3. Information Authentication method as claimed in claim 2, it is characterized in that, every record of described blacklist comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
4. Information Authentication method as claimed in claim 3, is characterized in that, as long as found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just sends the response of indication authentication failed.
5. Information Authentication method as claimed in claim 3, is characterized in that, searches with the step of the record of the Account Registration information matches receiving and comprise in the blacklist of described pre-stored:
Data item in calculating Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, determine the record having found with the Account Registration information matches receiving.
6. the Information Authentication method as described in any one in claim 1~5, also comprises: if do not find the record of coupling, send the response that indication is proved to be successful.
7. the Information Authentication method as described in any one in claim 1~5, is characterized in that, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
8. an information authentication system, comprising:
The first module, for receiving the Account Registration information that comprises a plurality of data item;
The second module, for searching the record mating with the data item in the Account Registration information receiving at the blacklist of pre-stored;
The 3rd module, if for having found the record of coupling, send the response of indication authentication failed.
9. information authentication system as claimed in claim 8, is characterized in that, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
10. information authentication system as claimed in claim 9, it is characterized in that, every record of described blacklist comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
11. information authentication systems as claimed in claim 10, is characterized in that, as long as the 3rd module has found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response of indication authentication failed.
12. information authentication systems as claimed in claim 10, it is characterized in that, data item in the second module calculating Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, the 3rd module is determined the record having found with the Account Registration information matches receiving.
13. information authentication systems as described in any one in claim 8~12, also comprise: four module, if for not finding the record of coupling, sends the response that indication is proved to be successful.
14. information authentication systems as described in any one in claim 8~12, is characterized in that, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310082244.4A CN104052720A (en) | 2013-03-14 | 2013-03-14 | Information authentication method and system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310082244.4A CN104052720A (en) | 2013-03-14 | 2013-03-14 | Information authentication method and system thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104052720A true CN104052720A (en) | 2014-09-17 |
Family
ID=51505092
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310082244.4A Pending CN104052720A (en) | 2013-03-14 | 2013-03-14 | Information authentication method and system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104052720A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016165540A1 (en) * | 2015-04-14 | 2016-10-20 | 阿里巴巴集团控股有限公司 | Data transfer method and device |
CN106453357A (en) * | 2016-11-01 | 2017-02-22 | 北京红马传媒文化发展有限公司 | Network ticket buying abnormal behavior recognition method and system and equipment |
CN107172392A (en) * | 2017-05-19 | 2017-09-15 | 苏州寅初信息科技有限公司 | A kind of control method and its system for being used to share bicycle intelligent docking |
CN108984773A (en) * | 2018-07-23 | 2018-12-11 | 杭州呯嘭智能技术有限公司 | Blacklist multidimensional information verification method and system and readable storage medium storing program for executing and equipment in the case of shortage of data |
CN113378128A (en) * | 2021-06-15 | 2021-09-10 | 河北时代电子有限公司 | E-government system network perception analysis platform system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222348A (en) * | 2007-01-10 | 2008-07-16 | 阿里巴巴公司 | Method and system for calculating number of website real user |
CN101605140A (en) * | 2009-07-16 | 2009-12-16 | 阿里巴巴集团控股有限公司 | The network user's identity verification Verification System and examine authentication method |
CN102055748A (en) * | 2009-11-05 | 2011-05-11 | 中兴通讯股份有限公司 | Electronic bulletin board management method and system |
CN102111343A (en) * | 2009-12-28 | 2011-06-29 | 中兴通讯股份有限公司 | Method for implementing instant messaging control and system adopting same |
CN102811213A (en) * | 2011-11-23 | 2012-12-05 | 北京安天电子设备有限公司 | Fuzzy hashing algorithm-based malicious code detection system and method |
US20130091058A1 (en) * | 2011-10-11 | 2013-04-11 | Phyllis A. HUSTER | Electronic Commerce System |
US20150188949A1 (en) * | 2013-12-31 | 2015-07-02 | Lookout, Inc. | Cloud-based network security |
-
2013
- 2013-03-14 CN CN201310082244.4A patent/CN104052720A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222348A (en) * | 2007-01-10 | 2008-07-16 | 阿里巴巴公司 | Method and system for calculating number of website real user |
CN101605140A (en) * | 2009-07-16 | 2009-12-16 | 阿里巴巴集团控股有限公司 | The network user's identity verification Verification System and examine authentication method |
CN102055748A (en) * | 2009-11-05 | 2011-05-11 | 中兴通讯股份有限公司 | Electronic bulletin board management method and system |
CN102111343A (en) * | 2009-12-28 | 2011-06-29 | 中兴通讯股份有限公司 | Method for implementing instant messaging control and system adopting same |
US20130091058A1 (en) * | 2011-10-11 | 2013-04-11 | Phyllis A. HUSTER | Electronic Commerce System |
CN102811213A (en) * | 2011-11-23 | 2012-12-05 | 北京安天电子设备有限公司 | Fuzzy hashing algorithm-based malicious code detection system and method |
US20150188949A1 (en) * | 2013-12-31 | 2015-07-02 | Lookout, Inc. | Cloud-based network security |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016165540A1 (en) * | 2015-04-14 | 2016-10-20 | 阿里巴巴集团控股有限公司 | Data transfer method and device |
KR20170137827A (en) * | 2015-04-14 | 2017-12-13 | 알리바바 그룹 홀딩 리미티드 | Data transfer method and device |
US10484342B2 (en) | 2015-04-14 | 2019-11-19 | Alibaba Group Holding Limited | Accuracy and security of data transfer to an online user account |
KR102370519B1 (en) | 2015-04-14 | 2022-03-03 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | Data transmission method and device |
CN106453357A (en) * | 2016-11-01 | 2017-02-22 | 北京红马传媒文化发展有限公司 | Network ticket buying abnormal behavior recognition method and system and equipment |
CN107172392A (en) * | 2017-05-19 | 2017-09-15 | 苏州寅初信息科技有限公司 | A kind of control method and its system for being used to share bicycle intelligent docking |
CN108984773A (en) * | 2018-07-23 | 2018-12-11 | 杭州呯嘭智能技术有限公司 | Blacklist multidimensional information verification method and system and readable storage medium storing program for executing and equipment in the case of shortage of data |
CN108984773B (en) * | 2018-07-23 | 2020-09-04 | 杭州呯嘭智能技术有限公司 | Method and system for verifying blacklist multidimensional information under data missing condition, readable storage medium and device |
CN113378128A (en) * | 2021-06-15 | 2021-09-10 | 河北时代电子有限公司 | E-government system network perception analysis platform system |
CN113378128B (en) * | 2021-06-15 | 2022-02-08 | 河北时代电子有限公司 | E-government system network perception analysis platform system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108810006B (en) | Resource access method, device, equipment and storage medium | |
US11095586B2 (en) | Detection of spam messages | |
EP3100171B1 (en) | Client authentication using social relationship data | |
US8666894B1 (en) | Systems and methods for remotely authenticating credit card transactions | |
CN101164333B (en) | Method and system for authorization and estimation for file | |
US9654510B1 (en) | Match signature recognition for detecting false positive incidents and improving post-incident remediation | |
US10091230B1 (en) | Aggregating identity data from multiple sources for user controlled distribution to trusted risk engines | |
CN109947855B (en) | Data synchronous processing method, device, server and storage medium | |
CN105101196A (en) | User account management method and device | |
CN108683667B (en) | Account protection method, device, system and storage medium | |
CN109120645A (en) | A kind of file uploading method, device, electronic equipment and medium | |
CN104052720A (en) | Information authentication method and system thereof | |
US11558531B2 (en) | Systems and methods for authenticating an image | |
CN110838971B (en) | Message sending method and device, electronic equipment and storage medium | |
CN114928452A (en) | Access request verification method, device, storage medium and server | |
KR101834808B1 (en) | Apparatus and method for protecting file from encryption | |
US8386775B2 (en) | Tolerant key verification method | |
CN113642239B (en) | Federal learning modeling method and system | |
US20170083721A1 (en) | Sustained data protection | |
CN108809909B (en) | Data processing method and data processing device | |
CN115828297A (en) | Sensitive information data processing method, device, equipment and storage medium | |
CN110943982B (en) | Document data encryption method and device, electronic equipment and storage medium | |
CN101364871B (en) | Method, system and apparatus for domain manager to carry out domain management to user equipment | |
JP5947358B2 (en) | Authentication processing apparatus, method and program | |
US20150310449A1 (en) | Management system and control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140917 |