CN104333530A - Information credibility verifying method and apparatus - Google Patents

Information credibility verifying method and apparatus Download PDF

Info

Publication number
CN104333530A
CN104333530A CN201310307092.3A CN201310307092A CN104333530A CN 104333530 A CN104333530 A CN 104333530A CN 201310307092 A CN201310307092 A CN 201310307092A CN 104333530 A CN104333530 A CN 104333530A
Authority
CN
China
Prior art keywords
information
user
party
input
credibility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310307092.3A
Other languages
Chinese (zh)
Other versions
CN104333530B (en
Inventor
段文文
陆莉
陈旺林
刘杰
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310307092.3A priority Critical patent/CN104333530B/en
Publication of CN104333530A publication Critical patent/CN104333530A/en
Application granted granted Critical
Publication of CN104333530B publication Critical patent/CN104333530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Embodiments of the invention disclose an information credibility verifying method and apparatus, which belongs to the field of information processing. The method comprises: obtaining information inputted by a user, determining information of a third party associated with the user based on the information inputted by the user; according to the information of third parties, selecting at least one third party, and according to address information or identification information of the third party, sending the information inputted by the user or user information obtained according to the information inputted by the user to a terminal used by the selected third party, so that the third party verifies the information inputted by the user or the user information obtained according to the information inputted by the user; receiving a verification result transmitted by the selected third party by using the used terminal, and determining the credibility of the information inputted by the user according to the verification result. By providing reliable evidence by the assistance of a third party, the invention may perform verification of credibility of information inputted by a user automatically, effectively and accurately during the process of information credibility verification.

Description

Information credibility verification method and device
Technical field
The present invention relates to technical field of information processing, particularly a kind of information credibility verification method and device.
Background technology
In current network conditions, the identity majority of user is all anonymous, and these anonymous directly or by account logon mode can visit various network.Mostly need to input log-on message by user, such as user name, contact method etc., to become registered user when carrying out account registration.Registered user can be released news by approach such as webpage, note and multimedia messages, and can inquire into topic and shared resource with friends anywhere or anytime.
But the information that user inputs on network is not all trustworthy, and some information is also false.Therefore need to verify the confidence level of user's input information, confidence level is the one tolerance to trusting, and be people is genuine degree of faith to things or phenomenon.Such as, when account ownership judges, just need confidence level user being inputted to relevant information to verify, the information such as such as history password, cryptoguard, conventional login ground, to judge whether this number belongs to this user.
At present carry out verification method to the confidence level of information to be mostly and to introduce social status and user profile integrity degree etc. and carry out certification, but, in actual applications, even a famous person held a high place in society or the very complete authenticated user of a user profile, their information of input also may not be true and reliable, in fact, said method is only unilateral has investigated the confidence level of user's input information.Also do not have a kind of method more effectively, accurately to verify the confidence level of user's input information at present, to obtain the information with reference value, quote for user or inquire about.
Summary of the invention
The invention provides a kind of information credibility verification method and device, effectively, accurately can not carry out the problems such as trust verification to user's input information to solve existing information credibility verification method.
Particularly, embodiments provide a kind of information credibility verification method, described information credibility verification method, comprise: the information obtaining user's input, determine the third-party information be associated with user according to the information of user's input, third-party information comprises address information or identification information; At least one third party is chosen according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains; Receive the result that the third party chosen passes through used terminal transmission, and judge the confidence level of the information that user inputs according to the result.
In addition, embodiments provide a kind of information credibility demo plant, described information credibility demo plant, comprise: determination module, evidence obtaining module and Credibility judgement module, determination module, for obtaining the information of user's input, determine the third-party information be associated with user according to the information of user's input, third-party information comprises address information or identification information; Evidence obtaining module, for choosing at least one third party according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains; Credibility judgement module, passes through the result of used terminal transmission, and judges the confidence level of the information that user inputs according to the result for receiving the third party chosen.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By determining the third-party information be associated with user, at least one third party is chosen again according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains; And the confidence level of the information that user inputs is judged according to the result.Solve existing information credibility verification method and effectively, accurately can not carry out the problems such as trust verification to user's input information, adopt third party's assisted Extraction for the mode of admissible evidence, thus make in information credibility proof procedure, automatically effectively, accurately can carry out trust verification to the information of user's input.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of specification, and can become apparent to allow above and other object of the present invention, feature and advantage, below especially exemplified by preferred embodiment, and coordinate accompanying drawing, be described in detail as follows.
Accompanying drawing explanation
Fig. 1 is the flow chart of the information credibility verification method that one embodiment of the invention provides;
Fig. 2 is the flow chart of the information credibility verification method that another embodiment of the present invention provides;
Fig. 3 is the main frame block diagram of the information credibility demo plant that one embodiment of the invention provides;
Fig. 4 is the main frame block diagram of the information credibility demo plant that another embodiment of the present invention provides;
Fig. 5 is a kind of structured flowchart of terminal.
Embodiment
For further setting forth the present invention for the technological means reaching predetermined goal of the invention and take and effect, below in conjunction with accompanying drawing and preferred embodiment, to the information credibility verification method proposed according to the present invention and its embodiment of device, structure, feature and effect, be described in detail as follows.
Aforementioned and other technology contents, Characteristic for the present invention, can clearly present in following cooperation describes in detail with reference to graphic preferred embodiment.By the explanation of embodiment, when can to the present invention for the technological means reaching predetermined object and take and effect be able to more deeply and concrete understanding, however institute's accompanying drawings be only to provide with reference to and the use of explanation, be not used for being limited the present invention.
First embodiment
Please refer to Fig. 1, it illustrates the flow chart of the information credibility verification method that one embodiment of the invention provides.The method can information credibility proof procedure performed by information credibility demo plant; Described information credibility verification method, can comprise the following steps 101-105:
Step 101, obtains the information of user's input, and determine the third-party information be associated with user according to the information of user's input, third-party information comprises address information or identification information.
The information of user's input can comprise the information such as address name, user account, contact method, voice.The terminal (such as the equipment such as computer, mobile phone) that user can be used by it inputs relevant information, and information is submitted to, then information credibility demo plant can get the information of user's input.
Third party can be the user be associated with user, and the user be associated with user such as can pay close attention to people etc. for the good friend of user, acquaintance, microblogging.Illustrate, if the information of user's input is the chat application account of user, then information credibility demo plant can obtain the good friend of user in chat application according to the account of user's input, if the good friend in user's chat application account comprises 100, then can using these 100 users as third party.Third-party information can comprise the information such as third-party account information, email address information, phone number, age, name.
Address information comprises the address information or third-party email address information etc. of the terminal that third party uses.Identification information can be the login account information of third-party account information, such as, communications applications in the terminal that third party uses.
Step 103, at least one third party is chosen according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains.
Preferably, also can comprise in step 103:
If third-party address information is third-party email address information, then send to the first server corresponding to third-party email address information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that first server sends to the third party chosen to use, verifies the information that user inputs to make third party;
If third-party identification information is third-party account information, then send to the second server corresponding to third-party account information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that second server sends to the third party chosen to use, verifies the information that user inputs to make third party.
First server and second server are respectively the third-party email address information of management and manage the server of third-party account information.
At least one third party chosen is for producing evidence for investigated user.The third party relatively trusted can be chosen when choosing at least one third party or choose the third party etc. close with the Relationship Comparison of user.
Can be the information inputted according to this user and the user profile inferred according to the user profile that obtains of information of user's input, can by carrying out humongous search and obtain on network, the user profile obtained such as can for this reason user's register account number time submit to information, information that user issues on microblogging, voice messaging that user uploads, user's historical viewings information, user's login account time login ground information etc.Illustrate, if the information of user's input is be the phone number of Beijing area from the contact method in the time period in year March in January, 2010 to 2012, then whether can comprise user during this period of time in Beijing work or study according to the user profile that obtains of information of user's input.If the information of user's input is the account of user is 1235678, then can according to the account of user's input from the login ground logging in this account before the server (can be same equipment with information credibility demo plant) of management account obtains user.
Step 105, receives the result that the third party chosen passes through used terminal transmission, and judges the confidence level of the information that user inputs according to the result.
The result is namely to the information of user's input and the information after verifying the user profile that the information inputted according to user obtains.
In sum, the information credibility verification method that the present embodiment provides, by determining the third-party information be associated with user, at least one third party is chosen again according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains; And the confidence level of the information that user inputs is judged according to the result.Solve existing information credibility verification method and effectively, accurately can not carry out the problems such as trust verification to user's input information, adopt third party's assisted Extraction for the mode of admissible evidence, thus make in information credibility proof procedure, automatically effectively, accurately can carry out trust verification to the information of user's input.
Second embodiment
Please refer to Fig. 2, it illustrates the flow chart of the information credibility verification method that another embodiment of the present invention provides.Fig. 2 improves on the basis of Fig. 1.The method can information credibility proof procedure performed by information credibility demo plant; Described information credibility verification method, can comprise the following steps 201-207:
Step 201, obtains the information of user's input, and determine the third-party information be associated with user according to the information of user's input, third-party information comprises address information or identification information.
The information of user's input can comprise the information such as address name, user account, contact method, voice.The terminal (such as the equipment such as computer, mobile phone) that user can be used by it inputs relevant information, and information is submitted to, then information credibility demo plant can get the information of user's input.
Third party can be the user be associated with user, and the user be associated with user such as can pay close attention to people etc. for the good friend of user, acquaintance, microblogging.Illustrate, if the information of user's input is the chat application account of user, then information credibility demo plant can obtain the good friend of user in chat application according to the account of user's input, if the good friend in user's chat application account comprises 100, then can using these 100 users as third party.Third-party information can comprise the information such as third-party account information, email address information, phone number, age, name.
Address information comprises the address information or third-party email address information etc. of the terminal that third party uses.Identification information can be the login account information of third-party account information, such as, communications applications in the terminal that third party uses.
Step 203, at least one third party is chosen according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains.
Preferably, also can comprise in step 203:
If third-party address information is third-party email address information, then send to the first server corresponding to third-party email address information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that first server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified;
If third-party identification information is third-party account information, then send to the second server corresponding to third-party account information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that second server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified.
First server and second server are respectively the third-party email address information of management and manage the server of third-party account information.
At least one third party chosen is for producing evidence for investigated user.The third party relatively trusted can be chosen when choosing at least one third party or choose the third party etc. close with the Relationship Comparison of user.
The third party relatively trusted can judge according to the accuracy of third-party credit value, third party's history input information, such as, if third-party credit value is high or the accuracy higher (also can think that its credit value is high) of third party's history input information, be then judged to be that third party is the user relatively trusted.Can for it contacts user often with user with the closer third party of customer relationship, if such as user within nearest a period of time often and third party A contact, then can be judged as that third party A is the third party closer with customer relationship.
Can draw from above-mentioned analysis, preferably, in step 203, choose at least one third party according to third-party information, can comprise:
Choose credit value be greater than at least one third party of preset value or be chosen in a period of time at least one third party contacting number of times with user and be greater than threshold value, third-party information comprised third-party credit value, third party and contact number of times with user within a period of time.
Certainly, in embodiments of the present invention, also can alternate manner be adopted to choose at least one third party according to actual needs.Can be the information inputted according to this user and the user profile inferred according to the user profile that obtains of information of user's input, can by carrying out humongous search and obtain on network, the user profile obtained such as can for this reason user's register account number time submit to information, information that user issues on microblogging, voice messaging that user uploads, user's historical viewings information, user's login account time login ground information etc.Illustrate, if the information of user's input is be the phone number of Beijing area from the contact method in the time period in year March in January, 2010 to 2012, then whether can comprise user during this period of time in Beijing work or study according to the user profile that obtains of information of user's input.If the information of user's input is the account of user is 1235678, then can according to the account of user's input from the login ground logging in this account before the server (can be same equipment with information credibility demo plant) of management account obtains user.
As a rule, whether the biological characteristic (as retina, fingerprint, voice etc.) of people is difficult to copy and cost is higher, can be therefore one of evidence of user as distinguishing.Can utilize this recognition technology of voice, allow user initiatively provide voice messaging to information credibility demo plant, then voice are transmitted to third party by information credibility demo plant again, and allowing third party identify whether is the voice of user.
Step 205, receives the third party that chooses and passes through the result that used terminal sends, and the matching degree between the information calculating the result and user's input, obtains the confidence level of the information of user's input according to the matching degree calculated.
The result is namely to the information of user's input and the information after verifying the user profile that the information inputted according to user obtains.Third party can verify above-mentioned all user profile, if information has problem, then can revise its information and submit to information credibility demo plant; If information no problem, only need confirm to submit to information credibility demo plant.
Illustrate, if the information of user's input to be verified is 10, and the third-party quantity chosen is 5, the matching degree of the result that the third party then chosen sends and 10 information that user inputs is respectively 20%, 50%, 70%, 80%, 30%, represent in the result that these 5 third parties send have 2 respectively, 5, 7, 8, 10 information match that 3 information and user input, if these 5 third-party confidence levels are 0.2, the summation of the matching degree of 10 information that then the result that sends of these 5 third parties and user input is confidence level (the 20%+50%+70%+80%+30%)/5=50% of user's input information divided by 5.
Preferably, the confidence level obtaining the information of user's input according to the matching degree calculated in step 205, can comprise:
Preset the third-party confidence level chosen, obtain the confidence level of the information of user's input according to the matching degree calculated and the confidence level preset.
Illustrate, if the password loss of the chat application account of user, then user inputs following information to trust verification device (can be the server of management chat application account) and carries out appealing to give account for change.The information of user's input is as follows: the account of user is: 1235678,2012 so far account login ground be: Shanghai, phone number is: 13612345678, sex: man, and the area that trust verification device record display user logged in this account is in the past Guangzhou, the phone number of record display user is identical with the phone number that user inputs.If the result of 3 third party's transmissions is: within 2012, login ground is so far Guangzhou, the account of user is 1235678, sex is man, phone number is 13530090001, the login that login ground in the result of then this 3 third parties input input with user respectively with phone number and phone number do not match, can show that the matching degree of the result that 3 third parties chosen send and 4 information that user inputs is respectively 50%, 50%, 50%, if preset these 3 third-party confidence levels to be respectively 0.5, 0.3, 0.2, after the matching degree of 4 information that then the result that sends of these 3 third parties and user input is multiplied by the summation of respective confidence level, confidence level (the 50%*0.5+50%*0.3+50%*0.2)/3=50% of 4 information of user's input is again divided by 3.
Preferably, after step 205, also can comprise:
Step 207, judges whether the confidence level of user's input information reaches preset value, if confidence level reaches preset value, is then judged as that the information that user inputs is believable.
Preset value can for any number preset, and such as 80%.Still be described for the example of second in step 205, if preset value is 80%, because the confidence level 50% of 4 information of user's input is less than preset value 80%, then judge that the information of user's input is for this reason that incredible, this account does not belong to this user.
In sum, the information credibility verification method that the present embodiment provides, also by the matching degree between the information that calculates the result and user's input, obtain the confidence level of information of user's input according to the matching degree calculated, judge whether the confidence level of user's input information reaches preset value; If confidence level reaches preset value, be then judged as that the information that user inputs is believable.Thus automatically effectively can judge that whether the information that user inputs is credible.
Be below device embodiment of the present invention, the details of not detailed description in device embodiment, can with reference to the embodiment of the method for above-mentioned correspondence.
3rd embodiment
Please refer to Fig. 3, it illustrates the main frame block diagram of the information credibility demo plant that one embodiment of the invention provides.Described information credibility demo plant, comprising: determination module 301, evidence obtaining module 303 and Credibility judgement module 305.
Particularly, determination module 301, for obtaining the information of user's input, determine the third-party information be associated with user according to the information of user's input, third-party information comprises address information or identification information.
Evidence obtaining module 303, for choosing at least one third party according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains.
Preferably, described evidence obtaining module 303, also be greater than at least one third party of preset value for choosing credit value or be chosen in a period of time at least one third party contacting number of times with user and be greater than threshold value, third-party information comprised third-party credit value, third party and contact number of times with user within a period of time.
Preferably, described evidence obtaining module 303, if be also third-party email address information for third-party address information, then send to the first server corresponding to third-party email address information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that first server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified; If third-party identification information is third-party account information, then send to the second server corresponding to third-party account information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that second server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified.
Credibility judgement module 305, passes through the result of used terminal transmission, and judges the confidence level of the information that user inputs according to the result for receiving the third party chosen.
In sum, the information credibility demo plant that the present embodiment provides, by determining the third-party information be associated with user, at least one third party is chosen again according to third-party information, and according to third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains; And the confidence level of the information that user inputs is judged according to the result.Solving existing information credibility appraisal procedure can not effectively, accurately provide information to carry out the problems such as trust verification to user, adopt third party's assisted Extraction for the mode of admissible evidence, thus make in information credibility proof procedure, automatically effectively, accurately can carry out trust verification to the information of user's input.
4th embodiment
Please refer to Fig. 4, it illustrates the main frame block diagram of the information credibility demo plant that another embodiment of the present invention provides.Information credibility demo plant shown in its to Fig. 3 is similar, and its difference is, described Credibility judgement module, can also comprise: computing module 401 and judge module 403.
Computing module 401, for calculate the result and user's input information between matching degree, obtain the confidence level of information of user's input according to the matching degree calculated.
Preferably, computing module 401, also for presetting the third-party confidence level chosen, obtains the confidence level of the information of user's input according to the matching degree calculated and the confidence level preset.
Judge module 403, for judging whether the confidence level of user's input information reaches preset value; If confidence level reaches preset value, be then judged as that the information that user inputs is believable.
In sum, the information credibility demo plant that the present embodiment provides, also by the matching degree between the information that calculates the result and user's input, obtain the confidence level of information of user's input according to the matching degree calculated, judge whether the confidence level of user's input information reaches preset value; If confidence level reaches preset value, be then judged as that the information that user inputs is believable.Thus automatically effectively can judge that whether the information that user inputs is credible.
5th embodiment
Please refer to Fig. 5, it illustrates a kind of structured flowchart of terminal.This terminal is operated in exemplarily with information credibility demo plant, as shown in Figure 5, terminal comprises memory 502, storage control 504, one or more (only illustrating one in figure) processor 506, Peripheral Interface 508, radio-frequency module 510, photographing module 514, audio-frequency module 516, Touch Screen 518 and key-press module 520.These assemblies are by the mutual communication of one or more communication bus/holding wire.
Be appreciated that the structure shown in Fig. 5 is only signal, terminal also can comprise than assembly more or less shown in Fig. 5, or has the configuration different from shown in Fig. 5.Each assembly shown in Fig. 5 can adopt hardware, software or its combination to realize.
Memory 502 can be used for storing software program and module, program command/module as corresponding in the method for carrying out information credibility checking in terminal in the embodiment of the present invention, processor 502 is by running the software program and module that are stored in memory 504, thus perform the application of various function and data processing, namely realize the above-mentioned method of carrying out information credibility checking in terminal.
Memory 502 can comprise high speed random asccess memory, also can comprise nonvolatile memory, as one or more magnetic storage device, flash memory or other non-volatile solid state memories.In some instances, memory 502 can comprise the memory relative to the long-range setting of processor 506 further, and these remote memories can be connected to terminal by network.The example of above-mentioned network includes but not limited to the Internet, intranet, local area network (LAN), mobile radio communication and combination thereof.Processor 506 and other possible assemblies can carry out the access of memory 502 under the control of storage control 504.
Various input/output device is coupled to CPU and memory 502 by Peripheral Interface 508.Various softwares in processor 506 run memory 502, instruction are to perform the various function of terminal and to carry out data processing.
In certain embodiments, Peripheral Interface 508, processor 506 and storage control 504 can realize in one single chip.In some other example, they can respectively by independently chip realization.
Radio-frequency module 510, for receiving and sending electromagnetic wave, realizes the mutual conversion of electromagnetic wave and the signal of telecommunication, thus carries out communication with communication network or other equipment.Radio-frequency module 510 can comprise the various existing circuit element for performing these functions, such as, and antenna, radio-frequency (RF) transceiver, digital signal processor, encrypt/decrypt chip, subscriber identity module (SIM) card, memory etc.Radio-frequency module 510 can with various network as the Internet, intranet, wireless network carry out communication or carry out communication by wireless network and other equipment.Above-mentioned wireless network can comprise cellular telephone networks, WLAN (wireless local area network) or metropolitan area network.Above-mentioned wireless network can use various communication standard, agreement and technology, include, but are not limited to global system for mobile communications (Global System for Mobile Communication, GSM), enhancement mode mobile communication technology (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code division multiple access, W-CDMA), CDMA (Code Division Multiple Access) (Code division access, CDMA), tdma (time division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity, WiFi) (as IEEE-USA standard IEEE 802.11a, IEEE802.11b, IEEE802.11g and/or IEEE802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave access (Worldwide Interoperability for Microwave Access, Wi-Max), other are for mail, the agreement of instant messaging and short message, and any other suitable communications protocol, even can comprise those current agreements be developed not yet.
Photographing module 514 is for taking pictures or video.Photo or the video of shooting can be stored in memory 502, and send by radio-frequency module 510.
Audio-frequency module 516 provides audio interface to user, and it can comprise one or more microphone, one or more loud speaker and voicefrequency circuit.Voicefrequency circuit receives voice data from Peripheral Interface 508, voice data is converted to telecommunications breath, and telecommunications breath is transferred to loud speaker.Telecommunications breath is changed the sound wave can heard into people's ear by loud speaker.Voicefrequency circuit also from microphone receive telecommunications breath, convert electrical signals to voice data, and by data transmission in network telephony to Peripheral Interface 508 to be further processed.Voice data can obtain from memory 502 or by radio-frequency module 510.In addition, voice data also can be stored in memory 502 or by radio-frequency module 510 and send.In some instances, audio-frequency module 516 also can comprise an earphone and broadcast hole, for providing audio interface to earphone or other equipment.
Touch Screen 518 provides one to export and inputting interface between terminal and user simultaneously.Particularly, Touch Screen 518 exports to user's display video, and the content of these video frequency output can comprise word, figure, video and combination in any thereof.Some Output rusults correspond to some user interface object.Touch Screen 518 also receives the input of user, and the gesture operation such as click, slip of such as user, so that response is made in the input of user interface object to these users.The technology detecting user's input can be based on resistance-type, condenser type or other touch control detection technology possible arbitrarily.The instantiation of Touch Screen 518 display unit includes, but are not limited to liquid crystal display or light emitting polymer displays.
Key-press module 520 provides user to carry out the interface inputted to terminal equally, and user can perform different functions by pressing different buttons to make terminal.
In addition, the embodiment of the present invention also provides a kind of computer-readable recording medium, is stored with computer executable instructions, and above-mentioned computer-readable recording medium is such as nonvolatile memory such as CD, hard disk or flash memory.Above-mentioned computer executable instructions completes above-mentioned information credibility verification method for allowing computer or similar arithmetic unit.
The above, it is only preferred embodiment of the present invention, not any pro forma restriction is done to the present invention, although the present invention discloses as above with preferred embodiment, but and be not used to limit the present invention, any those skilled in the art, do not departing within the scope of technical solution of the present invention, make a little change when the technology contents of above-mentioned announcement can be utilized or be modified to the Equivalent embodiments of equivalent variations, in every case be do not depart from technical solution of the present invention content, according to any simple modification that technical spirit of the present invention is done above embodiment, equivalent variations and modification, all still belong in the scope of technical solution of the present invention.

Claims (12)

1. an information credibility verification method, is characterized in that, described information credibility verification method comprises:
Obtain the information of user's input, the information inputted according to described user determines the third-party information be associated with described user, and described third-party information comprises address information or identification information;
At least one third party is chosen according to described third-party information, and according to described third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains;
Receive the result that the third party chosen passes through used terminal transmission, and judge the confidence level of the information that described user inputs according to described the result.
2. information credibility verification method according to claim 1, is characterized in that, judges the confidence level of the information that described user inputs, comprising according to described the result:
Matching degree between the information calculating described the result and described user input, obtains the confidence level of information of described user input according to the matching degree calculated.
3. information credibility verification method according to claim 2, is characterized in that, after obtaining the confidence level of the information of described user input, also comprises according to the matching degree calculated:
Judge whether the confidence level of described user's input information reaches preset value;
If described confidence level reaches preset value, be then judged as that the information that described user inputs is believable.
4. information credibility verification method according to claim 2, is characterized in that, obtains the confidence level of the information of described user input, comprising according to the matching degree calculated:
Preset the third-party confidence level chosen, obtain the confidence level of the information of described user input according to the matching degree calculated and the confidence level preset.
5. information credibility verification method according to claim 1, is characterized in that, chooses at least one third party, comprising according to described third-party information:
Choose credit value be greater than at least one third party of preset value or be chosen in a period of time at least one third party contacting number of times with user and be greater than threshold value, described third-party information comprises third-party credit value and third party contacts number of times with user within a period of time.
6. information credibility verification method according to claim 1, it is characterized in that, at least one third party is chosen according to described third-party information, and according to described third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that the information of user's input obtains, the information inputted user to make third party or verify according to the user profile that the information of user's input obtains, comprising:
If third-party address information is third-party email address information, then send to the first server corresponding to third-party email address information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that first server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified;
If third-party identification information is third-party account information, then send to the second server corresponding to third-party account information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that second server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified.
7. an information credibility demo plant, is characterized in that, described information credibility demo plant, comprising:
Determination module, for obtaining the information of user's input, the information inputted according to described user determines the third-party information be associated with described user, and described third-party information comprises address information or identification information;
Evidence obtaining module, for choosing at least one third party according to described third-party information, and according to described third-party address information or identification information, the information that user is inputted or the terminal sending to the third party chosen to use according to the user profile that obtains of information of user's input, information user input to make third party or verify according to the user profile that the information that user inputs obtains;
Credibility judgement module, passes through the result of used terminal transmission, and judges the confidence level of the information that described user inputs according to described the result for receiving the third party chosen.
8. information credibility demo plant according to claim 7, is characterized in that, described Credibility judgement module, comprising:
Computing module, for calculate described the result and described user input information between matching degree, obtain the confidence level of information of described user input according to the matching degree calculated.
9. information credibility demo plant according to claim 8, is characterized in that, described Credibility judgement module, also comprises:
Judge module, for judging whether the confidence level of described user's input information reaches preset value; If described confidence level reaches preset value, be then judged as that the information that described user inputs is believable.
10. information credibility demo plant according to claim 8, it is characterized in that, described computing module, also for presetting the third-party confidence level chosen, obtains the confidence level of the information of described user input according to the matching degree calculated and the confidence level preset.
11. information credibility demo plants according to claim 7, it is characterized in that, described evidence obtaining module, also be greater than at least one third party of preset value for choosing credit value or be chosen in a period of time at least one third party contacting number of times with user and be greater than threshold value, described third-party information comprises third-party credit value and third party contacts number of times with user within a period of time.
12. information credibility demo plants according to claim 7, it is characterized in that, described evidence obtaining module, if be also third-party email address information for third-party address information, then send to the first server corresponding to third-party email address information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that first server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified; If third-party identification information is third-party account information, then send to the second server corresponding to third-party account information by the information of user's input or according to the user profile that the information of user's input obtains, the terminal that second server sends to the third party chosen to use, the user profile that the information inputted user to make third party or the information according to user's input obtain is verified.
CN201310307092.3A 2013-07-22 2013-07-22 Information credibility verification method and device Active CN104333530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310307092.3A CN104333530B (en) 2013-07-22 2013-07-22 Information credibility verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310307092.3A CN104333530B (en) 2013-07-22 2013-07-22 Information credibility verification method and device

Publications (2)

Publication Number Publication Date
CN104333530A true CN104333530A (en) 2015-02-04
CN104333530B CN104333530B (en) 2019-02-22

Family

ID=52408184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310307092.3A Active CN104333530B (en) 2013-07-22 2013-07-22 Information credibility verification method and device

Country Status (1)

Country Link
CN (1) CN104333530B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995150A (en) * 2016-10-27 2018-05-04 腾讯科技(深圳)有限公司 Auth method and device
CN108932646A (en) * 2017-05-26 2018-12-04 中移(杭州)信息技术有限公司 User tag verification method, device and electronic equipment based on operator
CN109067791A (en) * 2018-09-25 2018-12-21 阿里巴巴集团控股有限公司 Method for authenticating user identity and device in network
CN109325352A (en) * 2018-08-28 2019-02-12 全球能源互联网研究院有限公司 A kind of credible calculating platform framework
CN110413654A (en) * 2019-06-20 2019-11-05 平安科技(深圳)有限公司 A kind of method, apparatus, computer equipment and the storage medium of determining client's trusted contacts information
CN110888864A (en) * 2019-11-27 2020-03-17 北京国腾联信科技有限公司 Automatic user data collection method and device
CN110930244A (en) * 2019-11-27 2020-03-27 北京国腾联信科技有限公司 Method and device for calculating user credit investigation evaluation value
CN114448706A (en) * 2022-02-08 2022-05-06 恒安嘉新(北京)科技股份公司 Single package authorization method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080281622A1 (en) * 2007-05-10 2008-11-13 Mary Kay Hoal Social Networking System
CN101309190A (en) * 2008-06-30 2008-11-19 腾讯科技(深圳)有限公司 User organization management system and method thereof
CN101599993A (en) * 2009-06-30 2009-12-09 武汉中频科技有限公司 A kind of network social intercourse system of many identity and implementation method
CN101847143A (en) * 2009-03-25 2010-09-29 欧阳炳宇 Method for enhancing interaction authenticity experience in virtual human society
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN102339445A (en) * 2010-07-23 2012-02-01 阿里巴巴集团控股有限公司 Method and system for evaluating credibility of network trade user
CN103036869A (en) * 2011-10-08 2013-04-10 美国博通公司 Social device service and support via automatic group association

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080281622A1 (en) * 2007-05-10 2008-11-13 Mary Kay Hoal Social Networking System
CN101309190A (en) * 2008-06-30 2008-11-19 腾讯科技(深圳)有限公司 User organization management system and method thereof
CN101847143A (en) * 2009-03-25 2010-09-29 欧阳炳宇 Method for enhancing interaction authenticity experience in virtual human society
CN101599993A (en) * 2009-06-30 2009-12-09 武汉中频科技有限公司 A kind of network social intercourse system of many identity and implementation method
CN102339445A (en) * 2010-07-23 2012-02-01 阿里巴巴集团控股有限公司 Method and system for evaluating credibility of network trade user
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN103036869A (en) * 2011-10-08 2013-04-10 美国博通公司 Social device service and support via automatic group association

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995150A (en) * 2016-10-27 2018-05-04 腾讯科技(深圳)有限公司 Auth method and device
CN108932646A (en) * 2017-05-26 2018-12-04 中移(杭州)信息技术有限公司 User tag verification method, device and electronic equipment based on operator
CN108932646B (en) * 2017-05-26 2021-04-13 中移(杭州)信息技术有限公司 User tag verification method and device based on operator and electronic equipment
CN109325352A (en) * 2018-08-28 2019-02-12 全球能源互联网研究院有限公司 A kind of credible calculating platform framework
CN109067791A (en) * 2018-09-25 2018-12-21 阿里巴巴集团控股有限公司 Method for authenticating user identity and device in network
CN109067791B (en) * 2018-09-25 2020-05-12 阿里巴巴集团控股有限公司 User identity authentication method and device in network
CN110413654A (en) * 2019-06-20 2019-11-05 平安科技(深圳)有限公司 A kind of method, apparatus, computer equipment and the storage medium of determining client's trusted contacts information
CN110413654B (en) * 2019-06-20 2023-11-21 平安科技(深圳)有限公司 Method, device, computer equipment and storage medium for determining customer trusted contact information
CN110888864A (en) * 2019-11-27 2020-03-17 北京国腾联信科技有限公司 Automatic user data collection method and device
CN110930244A (en) * 2019-11-27 2020-03-27 北京国腾联信科技有限公司 Method and device for calculating user credit investigation evaluation value
CN114448706A (en) * 2022-02-08 2022-05-06 恒安嘉新(北京)科技股份公司 Single package authorization method and device, electronic equipment and storage medium
CN114448706B (en) * 2022-02-08 2024-05-17 恒安嘉新(北京)科技股份公司 Single package authorization method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN104333530B (en) 2019-02-22

Similar Documents

Publication Publication Date Title
CN104333530A (en) Information credibility verifying method and apparatus
US11658963B2 (en) Cooperative communication validation
US11768951B2 (en) Systems and methods of gesture triggered automatic erasure on a private network
US10659587B2 (en) Incoming call management method and apparatus
US10659453B2 (en) Dual channel identity authentication
US20150319137A1 (en) Techniques to monitor connection paths on networked devices
US8315595B2 (en) Providing trusted communication
US9911139B2 (en) System and method for sharing quotes in a social networking environment
CN104243517A (en) Content sharing method and device used between different terminals
CN104935744A (en) Verification code display method, verification code display device and mobile terminal
US11678136B1 (en) Techniques for sharing a device location via a messaging system
US20110138480A1 (en) Method and apparatus for providing mobile social networking privacy
US20180357403A1 (en) Method, apparatus, and system for providing temporary account information
CN106464502B (en) Method and system for authentication of a communication device
CN105577375A (en) Identity authentication method and device
CN110674481A (en) Account registration method, device, equipment and storage medium of application program
US9014634B2 (en) Social network based Wi-Fi connectivity
CN105574453B (en) Two-dimensional code processing method and mobile terminal
US9202016B2 (en) Management of private information
US9674235B2 (en) Creating a contact list and pre-populated user accounts
CN111447236B (en) Block chain-based communication authentication method and device, terminal equipment and storage medium
US20230177175A1 (en) Systems and methods for implementing mobile number security protections
US20230245109A1 (en) Billing account authentication enhancement from user authentication contexts
US11451498B2 (en) Omnichannel communication widget
US20230007005A1 (en) Systems and methods for anonymous pass-phrase authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant