CN104052720A - Information authentication method and system thereof - Google Patents

Information authentication method and system thereof Download PDF

Info

Publication number
CN104052720A
CN104052720A CN201310082244.4A CN201310082244A CN104052720A CN 104052720 A CN104052720 A CN 104052720A CN 201310082244 A CN201310082244 A CN 201310082244A CN 104052720 A CN104052720 A CN 104052720A
Authority
CN
China
Prior art keywords
data item
information
record
account
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310082244.4A
Other languages
Chinese (zh)
Inventor
张振平
程涛远
史岩芳
卓军辉
丁飞
赵芮
张素萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201310082244.4A priority Critical patent/CN104052720A/en
Publication of CN104052720A publication Critical patent/CN104052720A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides an information verification method and a system thereof. The information verification method comprises a step of receiving the account registration information comprising a plurality of data items, a step of searching a record which is matched with the data items in the received account registration information in a pre-stored blacklist, and a step of sending the response of indicating authentication failure if the record is found. In a network promotion system, a merchant with violation history can be automatically prevented from continuing to register a new account by using other information and continuing to carry out a promotion behavior which violates national laws or damages the interests of consumers.

Description

Information Authentication method and system
Technical field
The application relates to a kind of Information Authentication method and system, relates in particular to a kind of method and system of account log-on message being carried out to checking, mates, thereby determine that refusal had the account of unlawful practice by Account Registration information with the information in blacklist.
Background technology
In network information extension system, advertiser need provide its Account Registration information and promotional content to network promotion business.The Account Registration information that first network promotion business will provide advertiser is examined, whether this registration certificate of submitting to comprising advertiser qualified, main web site of advertiser's registration whether effectively with and the popularization behavior that whether had unlawful practice, said unlawful practice to refer to violate state's laws rules, policy and network promotion business regulation.
In order to evade network promotion business's auditing rule, some illegal trade company is being rejected after popularization because of unlawful practice, often attempt to use the different different accounts of Account Registration information registering, this checking/audit to account log-on message is had higher requirement, to stop illegal trade company to carry out popularization activity on network.
Summary of the invention
The object of the present invention is to provide a kind of Information Authentication method and system, automatically each data item in the Account Registration information of user registration is mated with the blacklist of information that records the account of unlawful practice, thereby based on multinomial data, more effectively find the registration behavior of illegal trade company.
According to an aspect of the present invention, provide a kind of Information Authentication method, comprising: receive the Account Registration information that comprises a plurality of data item; In the blacklist of pre-stored, search the record mating with the data item in the Account Registration information receiving; If found the record of coupling, sent the response of indication authentication failed.
Preferably, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
Preferably, every of described blacklist record comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
Preferably, as long as found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response of indication authentication failed.
Preferably, in the blacklist of described pre-stored, search with the step of the record of the Account Registration information matches receiving and comprise: calculate data item in Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, determine the record having found with the Account Registration information matches receiving.
Preferably, described Information Authentication method also comprises: if do not find the record of coupling, send the response that indication is proved to be successful.
Preferably, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
According to a further aspect in the invention, provide a kind of information authentication system, comprising: the first module, for receiving the Account Registration information that comprises a plurality of data item; The second module, for searching the record mating with the data item in the Account Registration information receiving at the blacklist of pre-stored; The 3rd module, if for having found the record of coupling, send the response of indication authentication failed.
Preferably, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
Preferably, every of described blacklist record comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
Preferably, as long as the 3rd module has found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response of indication authentication failed.
Preferably, data item in the second module calculating Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, the 3rd module is determined the record having found with the Account Registration information matches receiving.
Preferably, described information authentication system also comprises: four module, if for not finding the record of coupling, sends the response that indication is proved to be successful.
Preferably, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
Accompanying drawing explanation
By the description of carrying out below in conjunction with accompanying drawing, above and other object of the present invention and feature will become apparent, wherein:
Fig. 1 is the flow chart illustrating according to the Information Authentication method of exemplary embodiment of the present invention;
Fig. 2 is the flow chart illustrating according to the Information Authentication method of another exemplary embodiment of the present invention.
Embodiment
Below, describe with reference to the accompanying drawings embodiments of the invention in detail.
Fig. 1 is the flow chart illustrating according to the Information Authentication method of exemplary embodiment of the present invention.In computer system, realize Information Authentication method of the present invention, Information Authentication method of the present invention can be embodied as an application in computer system or the software module of applying, and also can be embodied as the software module in a plurality of computers.For convenience of description, below, the main body of each step in described method is referred to as to computer system.
With reference to Fig. 1, at step S110, computer system receives the Account Registration information that comprises a plurality of data item.Described Account Registration information can be from same application or the Another Application of described computer system, also can be from another computer system connecting by network.Described Account Registration information includes, but are not limited to, at least one data item in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie etc.
At step S120, computer system is searched the record mating with the data item in the Account Registration information receiving in the blacklist of pre-stored.Described blacklist is produced and periodic maintenance by network promotion system, comprise the accounts information that unlawful practice occurred, its every record can comprise, but be not limited to name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in the data item such as cookie for registration.Described Account Registration packets of information, containing a plurality of data item, therefore, is used respectively a plurality of data item to mate with the corresponding data item in blacklist.
At step S130, computer system is determined the record that whether finds coupling.
If at step S130, determine the record that has found coupling, at step S150, computer system sends the response of indication authentication failed.According to exemplary embodiment of the present invention, at step S130, as long as found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response (step S150) of indication authentication failed.
For example, certain trade company once carried out violating the popularization activity of state's laws rules, thereby was forbidden proceeding described popularization by network promotion business, and was recorded in blacklist; Afterwards, this trade company is used different log-on message (as different names on account, address and network address etc.) to network promotion business, to register another account again.Now, according to the method for conventionally examining according to name on account or network address, can not find that there was unlawful practice in this trade company was prohibited, and while mating with blacklist according to other data item of the present invention (while registering as user use IP address), if this trade company is used the preceding account of same IP address registration and New Account, can find this violation trade company, and refuse its new registration behavior.
On the other hand, if at step S130, determine the record that does not find coupling, at step S140, computer system sends the response that indication is proved to be successful.
By above-mentioned, to the description of the exemplary embodiment shown in Fig. 1, can be found out, Information Authentication method of the present invention can be by comparing each data item of promoting user's Account Registration information with the blacklist that records violation merchant information, thereby by the information matches of fineness more, find in time this violation trade company, and forbid its registration New Account.
When mating, for some data item, do not need to mate completely and just can determine that the data item of comparison belongs to same trade company main body, each data item has matching degree required value separately simultaneously.For this reason, referring to Fig. 2, describe according to the Information Authentication method of another exemplary embodiment of the present invention.In the embodiment shown in Fig. 2, it is the pre-configured matching degree threshold value of each data item.
Step S210 in Fig. 2, S240 and S250 correspond respectively to step S110, S140 and the S150 in Fig. 1, and step S220 and S230 are equivalent to respectively distortion or the alternative of step S120 and S130.Therefore, the operation of step S220 and S230 will be specifically described.
At step S220, the data item in the Account Registration information that computer system calculating receives and the matching similarity of the corresponding data item in blacklist.
At step S230, whether computer system is defined as the matching similarity of each data item calculating higher than being the pre-configured matching degree threshold value of described data item.
If at step S230, be defined as the matching similarity of each data item calculating higher than being the pre-configured matching degree threshold value of described data item, computer system is determined the record having found with the Account Registration information matches receiving, and at step S250, computer system sends the response of indication authentication failed.
On the other hand, if at step S230, be defined as the matching similarity of each data item calculating not higher than being the pre-configured matching degree threshold value of described data item, computer system is determined the record not finding with the Account Registration information matches receiving, and at step S240, computer system sends the response that indication is proved to be successful.
According to a preferred embodiment of the invention, at step S150 and step S250, when computer system sends the response of indication authentication failed, the information that also comprises the data item of coupling in the response of the indication authentication failed sending, thus application or the system of the checking of request account qualification can be carried out different processing according to the character of matched data item and importance.
From above-mentioned, with reference to accompanying drawing, to the description of exemplary embodiment of the present invention, can find out, each data item of the Account Registration information that Information Authentication method of the present invention can automatically provide user is mated with the corresponding data item that records the information of violation account, thereby based on more data, effectively finds that there is the account of unlawful practice; In addition, the present invention also carries out similarity calculating to each data item, improves the discovery rate of account in violation of rules and regulations.In network promotion system, can automatically prevent that historical in violation of rules and regulations trade company from continuing to use other information registering New Accounts, proceed for example to violate the popularization behavior of state's laws or infringement consumers' rights and interests.
The present invention also provides a kind of information authentication system that uses said method.
It may be noted that according to the needs of implementing, each step of describing can be split as to more multi-step in the application, also the part operation of two or more steps or step can be combined into new step, to realize object of the present invention.
Above-mentioned the method according to this invention can be at hardware, in firmware, realize, or be implemented as and can be stored in recording medium (such as CD ROM, RAM, floppy disk, hard disk or magneto optical disk) in software or computer code, or be implemented the original storage downloaded by network in remote logging medium or nonvolatile machine readable media and by the computer code being stored in local record medium, thereby method described here can be stored in use all-purpose computer, such software on the recording medium of application specific processor or able to programme or specialized hardware (such as ASIC or FPGA) is processed.Be appreciated that, computer, processor, microprocessor controller or programmable hardware comprise can store or receive software or computer code memory module (for example, RAM, ROM, flash memory etc.), when described software or computer code are by computer, processor or hardware access and while carrying out, realize processing method described here.In addition,, when all-purpose computer access is used for realizing the code in the processing shown in this, the execution of code is converted to all-purpose computer for carrying out the special-purpose computer in the processing shown in this.
Although represent with reference to preferred embodiment and described the present invention, it should be appreciated by those skilled in the art that in the situation that do not depart from the spirit and scope of the present invention that are defined by the claims, can carry out various modifications and conversion to these embodiment.

Claims (14)

1. an Information Authentication method, comprising:
Reception comprises the Account Registration information of a plurality of data item;
In the blacklist of pre-stored, search the record mating with the data item in the Account Registration information receiving;
If found the record of coupling, sent the response of indication authentication failed.
2. Information Authentication method as claimed in claim 1, is characterized in that, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
3. Information Authentication method as claimed in claim 2, it is characterized in that, every record of described blacklist comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
4. Information Authentication method as claimed in claim 3, is characterized in that, as long as found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just sends the response of indication authentication failed.
5. Information Authentication method as claimed in claim 3, is characterized in that, searches with the step of the record of the Account Registration information matches receiving and comprise in the blacklist of described pre-stored:
Data item in calculating Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, determine the record having found with the Account Registration information matches receiving.
6. the Information Authentication method as described in any one in claim 1~5, also comprises: if do not find the record of coupling, send the response that indication is proved to be successful.
7. the Information Authentication method as described in any one in claim 1~5, is characterized in that, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
8. an information authentication system, comprising:
The first module, for receiving the Account Registration information that comprises a plurality of data item;
The second module, for searching the record mating with the data item in the Account Registration information receiving at the blacklist of pre-stored;
The 3rd module, if for having found the record of coupling, send the response of indication authentication failed.
9. information authentication system as claimed in claim 8, is characterized in that, the data item of described Account Registration information comprises at least one in name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and historical cookie.
10. information authentication system as claimed in claim 9, it is characterized in that, every record of described blacklist comprises name on account, network address, registered address, telephone number, qualification registration certificate number, applicable IP address and at least one data item in cookie for registration.
11. information authentication systems as claimed in claim 10, is characterized in that, as long as the 3rd module has found the record mating with the arbitrary data item in the Account Registration information receiving in blacklist, just send the response of indication authentication failed.
12. information authentication systems as claimed in claim 10, it is characterized in that, data item in the second module calculating Account Registration information and the matching similarity of the corresponding data item in blacklist, if the matching similarity calculating is higher than being the pre-configured matching degree threshold value of described data item, the 3rd module is determined the record having found with the Account Registration information matches receiving.
13. information authentication systems as described in any one in claim 8~12, also comprise: four module, if for not finding the record of coupling, sends the response that indication is proved to be successful.
14. information authentication systems as described in any one in claim 8~12, is characterized in that, the response of the indication authentication failed of transmission also comprises the information of the data item of coupling.
CN201310082244.4A 2013-03-14 2013-03-14 Information authentication method and system thereof Pending CN104052720A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310082244.4A CN104052720A (en) 2013-03-14 2013-03-14 Information authentication method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310082244.4A CN104052720A (en) 2013-03-14 2013-03-14 Information authentication method and system thereof

Publications (1)

Publication Number Publication Date
CN104052720A true CN104052720A (en) 2014-09-17

Family

ID=51505092

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310082244.4A Pending CN104052720A (en) 2013-03-14 2013-03-14 Information authentication method and system thereof

Country Status (1)

Country Link
CN (1) CN104052720A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165540A1 (en) * 2015-04-14 2016-10-20 阿里巴巴集团控股有限公司 Data transfer method and device
CN106453357A (en) * 2016-11-01 2017-02-22 北京红马传媒文化发展有限公司 Network ticket buying abnormal behavior recognition method and system and equipment
CN107172392A (en) * 2017-05-19 2017-09-15 苏州寅初信息科技有限公司 A kind of control method and its system for being used to share bicycle intelligent docking
CN108984773A (en) * 2018-07-23 2018-12-11 杭州呯嘭智能技术有限公司 Blacklist multidimensional information verification method and system and readable storage medium storing program for executing and equipment in the case of shortage of data
CN113378128A (en) * 2021-06-15 2021-09-10 河北时代电子有限公司 E-government system network perception analysis platform system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222348A (en) * 2007-01-10 2008-07-16 阿里巴巴公司 Method and system for calculating number of website real user
CN101605140A (en) * 2009-07-16 2009-12-16 阿里巴巴集团控股有限公司 The network user's identity verification Verification System and examine authentication method
CN102055748A (en) * 2009-11-05 2011-05-11 中兴通讯股份有限公司 Electronic bulletin board management method and system
CN102111343A (en) * 2009-12-28 2011-06-29 中兴通讯股份有限公司 Method for implementing instant messaging control and system adopting same
CN102811213A (en) * 2011-11-23 2012-12-05 北京安天电子设备有限公司 Fuzzy hashing algorithm-based malicious code detection system and method
US20130091058A1 (en) * 2011-10-11 2013-04-11 Phyllis A. HUSTER Electronic Commerce System
US20150188949A1 (en) * 2013-12-31 2015-07-02 Lookout, Inc. Cloud-based network security

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222348A (en) * 2007-01-10 2008-07-16 阿里巴巴公司 Method and system for calculating number of website real user
CN101605140A (en) * 2009-07-16 2009-12-16 阿里巴巴集团控股有限公司 The network user's identity verification Verification System and examine authentication method
CN102055748A (en) * 2009-11-05 2011-05-11 中兴通讯股份有限公司 Electronic bulletin board management method and system
CN102111343A (en) * 2009-12-28 2011-06-29 中兴通讯股份有限公司 Method for implementing instant messaging control and system adopting same
US20130091058A1 (en) * 2011-10-11 2013-04-11 Phyllis A. HUSTER Electronic Commerce System
CN102811213A (en) * 2011-11-23 2012-12-05 北京安天电子设备有限公司 Fuzzy hashing algorithm-based malicious code detection system and method
US20150188949A1 (en) * 2013-12-31 2015-07-02 Lookout, Inc. Cloud-based network security

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016165540A1 (en) * 2015-04-14 2016-10-20 阿里巴巴集团控股有限公司 Data transfer method and device
KR20170137827A (en) * 2015-04-14 2017-12-13 알리바바 그룹 홀딩 리미티드 Data transfer method and device
US10484342B2 (en) 2015-04-14 2019-11-19 Alibaba Group Holding Limited Accuracy and security of data transfer to an online user account
KR102370519B1 (en) 2015-04-14 2022-03-03 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. Data transmission method and device
CN106453357A (en) * 2016-11-01 2017-02-22 北京红马传媒文化发展有限公司 Network ticket buying abnormal behavior recognition method and system and equipment
CN107172392A (en) * 2017-05-19 2017-09-15 苏州寅初信息科技有限公司 A kind of control method and its system for being used to share bicycle intelligent docking
CN108984773A (en) * 2018-07-23 2018-12-11 杭州呯嘭智能技术有限公司 Blacklist multidimensional information verification method and system and readable storage medium storing program for executing and equipment in the case of shortage of data
CN108984773B (en) * 2018-07-23 2020-09-04 杭州呯嘭智能技术有限公司 Method and system for verifying blacklist multidimensional information under data missing condition, readable storage medium and device
CN113378128A (en) * 2021-06-15 2021-09-10 河北时代电子有限公司 E-government system network perception analysis platform system
CN113378128B (en) * 2021-06-15 2022-02-08 河北时代电子有限公司 E-government system network perception analysis platform system

Similar Documents

Publication Publication Date Title
CN108810006B (en) Resource access method, device, equipment and storage medium
US11095586B2 (en) Detection of spam messages
EP3100171B1 (en) Client authentication using social relationship data
US8666894B1 (en) Systems and methods for remotely authenticating credit card transactions
CN101164333B (en) Method and system for authorization and estimation for file
US9654510B1 (en) Match signature recognition for detecting false positive incidents and improving post-incident remediation
US10091230B1 (en) Aggregating identity data from multiple sources for user controlled distribution to trusted risk engines
CN109947855B (en) Data synchronous processing method, device, server and storage medium
CN105101196A (en) User account management method and device
CN108683667B (en) Account protection method, device, system and storage medium
CN109120645A (en) A kind of file uploading method, device, electronic equipment and medium
CN104052720A (en) Information authentication method and system thereof
US11558531B2 (en) Systems and methods for authenticating an image
CN110838971B (en) Message sending method and device, electronic equipment and storage medium
CN114928452A (en) Access request verification method, device, storage medium and server
KR101834808B1 (en) Apparatus and method for protecting file from encryption
US8386775B2 (en) Tolerant key verification method
CN113642239B (en) Federal learning modeling method and system
US20170083721A1 (en) Sustained data protection
CN108809909B (en) Data processing method and data processing device
CN115828297A (en) Sensitive information data processing method, device, equipment and storage medium
CN110943982B (en) Document data encryption method and device, electronic equipment and storage medium
CN101364871B (en) Method, system and apparatus for domain manager to carry out domain management to user equipment
JP5947358B2 (en) Authentication processing apparatus, method and program
US20150310449A1 (en) Management system and control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140917