CN104333530B - Information credibility verification method and device - Google Patents

Information credibility verification method and device Download PDF

Info

Publication number
CN104333530B
CN104333530B CN201310307092.3A CN201310307092A CN104333530B CN 104333530 B CN104333530 B CN 104333530B CN 201310307092 A CN201310307092 A CN 201310307092A CN 104333530 B CN104333530 B CN 104333530B
Authority
CN
China
Prior art keywords
information
user
party
input
credibility
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310307092.3A
Other languages
Chinese (zh)
Other versions
CN104333530A (en
Inventor
段文文
陆莉
陈旺林
刘杰
张磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201310307092.3A priority Critical patent/CN104333530B/en
Publication of CN104333530A publication Critical patent/CN104333530A/en
Application granted granted Critical
Publication of CN104333530B publication Critical patent/CN104333530B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The embodiment of the invention discloses a kind of information credibility verification method and devices, belong to field of information processing.The method comprise the steps that obtaining the information of user's input, third-party information associated with the user is determined according to the information that user inputs;At least one third party is chosen according to third-party information, and according to third-party address information or identification information, the information of user's input or the obtained user information of information inputted according to user are sent to terminal used in the third party of selection, so as to information that third party input user or verify according to the user information that the information of user's input obtains;The verification result that the third party chosen is sent by used terminal is received, and judges the confidence level for the information that user inputs according to verification result.The present invention is in such a way that third party assists providing admissible evidence, so that effectively, accurately can carry out trust verification to the information of user's input automatically in information credibility verification process.

Description

Information credibility verification method and device
Technical field
The present invention relates to technical field of information processing, in particular to a kind of information credibility verification method and device.
Background technique
The identity majority of user is all anonymous in current network environment, these anonymous can be directly or by account Logon mode accesses various networks.It carries out requiring to input registration information by user greatly when account registration, such as user name, connection It is mode etc., to become registration user.Registration user can be released news by approach such as webpage, short message and multimedia messages, and can To inquire into topic and shared resource with friends anywhere or anytime.
But the information that user is inputted on network is not entirely trustworthy, some information is also untrue Real.Therefore the confidence level for inputting information to user is needed to verify, it is people couple that confidence level, which is a kind of measurement to trust, Things or phenomenon are genuine degree of faith.For example, when account ownership judges, it is necessary to input the credible of relevant information to user Degree is verified, such as the information such as history password, cryptoguard, common login ground, to judge whether this number belongs to this User.
At present to the confidence level of information carry out verification method be mostly introduce social status and user information integrity degree etc. into Row certification, still, in practical applications, even a famous person to hold a high place in society or a user information are very complete User is authenticated, the information that they input also is not necessarily true and reliable, in fact, the above method is only unilateral to have investigated user Input the confidence level of information.There is presently no the confidence levels that a kind of method more effective, accurately can input information to user It is verified, to obtain the information with reference value, quotes or inquire for user.
Summary of the invention
The present invention provides a kind of information credibility verification method and device, to solve existing information credibility verification method The problems such as information carries out trust verification effectively, accurately cannot be inputted to user.
Specifically, the embodiment of the invention provides a kind of information credibility verification method, the information credibility authentications Method, comprising: the information for obtaining user's input determines third-party information associated with the user according to the information that user inputs, Third-party information includes address information or identification information;At least one third party is chosen according to third-party information, and according to Third-party address information or identification information, by the information of user's input or the user information obtained according to the information that user inputs It is sent to terminal used in the third party of selection, so that the information that third party inputs user or the information inputted according to user Obtained user information is verified;The verification result that the third party that reception is chosen is sent by used terminal, and according to Verification result judges the confidence level of the information of user's input.
In addition, the embodiment of the invention provides a kind of information credibilities to verify device, the information credibility verifies device, Comprise determining that module, evidence obtaining module and Credibility judgement module, determining module, for obtaining the information of user's input, according to The information of user's input determines that third-party information associated with the user, third-party information include address information or mark letter Breath;Evidence obtaining module, for choosing at least one third party according to third-party information, and according to third-party address information or mark Know information, the third party institute of selection is sent to by the information of user's input or according to the user information that the information that user inputs obtains The terminal used, so as to information that third party inputs user or be tested according to the user information that the information that user inputs obtains Card;Credibility judgement module, for receiving the verification result that sends by used terminal of third party chosen, and according to testing Card result judges the confidence level of the information of user's input.
Technical solution provided in an embodiment of the present invention has the benefit that
By determination third-party information associated with the user, at least one third is chosen further according to third-party information Side, and according to third-party address information or identification information, it is obtained by the information of user's input or according to the information that user inputs User information be sent to terminal used in the third party of selection so that information that third party inputs user or according to user The user information that the information of input obtains is verified;And the confidence level of the information of user's input is judged according to verification result. Cannot effectively, accurately user's input information progress trust verification etc. be asked by solving existing information credibility verification method Topic, in such a way that third party assists providing admissible evidence, so that can have automatically in information credibility verification process Effect accurately carries out trust verification to the information of user's input.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the invention can It is clearer and more comprehensible, it is special below to lift preferred embodiment, and cooperate attached drawing, detailed description are as follows.
Detailed description of the invention
Fig. 1 is the flow chart of information credibility verification method provided by one embodiment of the present invention;
Fig. 2 is the flow chart for the information credibility verification method that another embodiment of the present invention provides;
Fig. 3 is the main frame block diagram of information credibility verifying device provided by one embodiment of the present invention;
Fig. 4 is the main frame block diagram for the information credibility verifying device that another embodiment of the present invention provides;
Fig. 5 is a kind of structural block diagram of terminal.
Specific embodiment
It is of the invention to reach the technical means and efficacy that predetermined goal of the invention is taken further to illustrate, below in conjunction with Attached drawing and preferred embodiment, to information credibility verification method proposed according to the present invention and device its specific embodiment, knot Structure, feature and effect, detailed description is as follows.
For the present invention aforementioned and other technology contents, feature and effect refer to the preferable reality of schema in following cooperation Applying can clearly be presented in example detailed description.By the explanation of specific embodiment, when predetermined mesh can be reached to the present invention The technical means and efficacy taken be able to more deeply and it is specific understand, however institute's accompanying drawings are only to provide with reference to and say It is bright to be used, it is not intended to limit the present invention.
First embodiment
Referring to FIG. 1, it illustrates the flow charts of information credibility verification method provided by one embodiment of the present invention.It should Method can verify information credibility verification process performed by device as information credibility;The information credibility authentication Method, it may include following steps 101-105:
Step 101, the information for obtaining user's input determines third party associated with the user according to the information that user inputs Information, third-party information includes address information or identification information.
The information of user's input may include the information such as address name, user account, contact method, voice.User can be with Relevant information is inputted by terminal (such as the equipment such as computer, mobile phone) used in it, and information is submitted, then information can Trust verification device can get the information of user's input.
Third party can be user associated with the user, and user associated with the user can be for example the good of user Friend, acquaintance, microblogging concern people etc..For example, information is credible if the information of user's input is the chat application account of user The account that degree verifying device can be inputted according to user obtains the good friend of user in chat application, if in user's chat application account Good friend include 100, then can be using this 100 users as third party.Third-party information may include third-party account The information such as number information, email address information, phone number, age, name.
Address information includes the address information or third-party email address information etc. of terminal used in third party.Mark Knowing information can be third-party account information, such as the login account letter of the communications applications in terminal used in third party Breath.
Step 103, at least one third party is chosen according to third-party information, and according to third-party address information or mark Know information, the third party institute of selection is sent to by the information of user's input or according to the user information that the information that user inputs obtains The terminal used, so as to information that third party inputs user or be tested according to the user information that the information that user inputs obtains Card.
Preferably, may also include that in step 103
If third-party address information is third-party email address information, by the information of user's input or according to user The user information that the information of input obtains is sent to first server corresponding to third-party email address information, first service Device is sent to terminal used in the third party of selection, so that the information that third party inputs user is verified;
If third-party identification information is third-party account information, inputted by the information of user's input or according to user The obtained user information of information be sent to second server corresponding to third-party account information, second server is sent to Terminal used in the third party of selection, so that the information that third party inputs user is verified.
First server and second server are respectively to manage third-party email address information and the third-party account of management The server of number information.
At least one third party chosen is used to provide evidence for investigated user.It can when choosing at least one third party To choose the third party relatively trusted or choose the third party etc. close with the Relationship Comparison of user.
The obtained user information of information inputted according to user can this user inputs according to information and be inferred to User information can be obtained and carrying out humongous search on network, and obtained user information user can for example be infused thus The information submitted, user issue on microblogging when volume account information, the voice messaging that user uploads, user's history browsing letter Login when breath, user's login account ground information etc..For example, if the information of user's input is from January, 2010 to 2012 Contact method in the period in March in year is the phone number of Beijing area, the then user obtained according to the information that user inputs Information may include whether user during this period of time works or learn in Beijing.If the information of user's input is the account of user It is 1235678, then device (can be verified with information credibility from the server of management account according to the account that user inputs For same equipment) on obtain the login that user logs in this account before.
Step 105, the verification result that the third party of selection is sent by used terminal is received, and according to verification result Judge the confidence level of the information of user's input.
Verification result tests the information that user inputs with the user information obtained to the information inputted according to user Information after card.
In conclusion information credibility verification method provided in this embodiment, passes through determination third associated with the user The information of side is chosen at least one third party further according to third-party information, and is believed according to third-party address information or mark Breath is used by the information of user's input or according to the third party that the user information that the information that user inputs obtains is sent to selection Terminal, so as to information that third party inputs user or be verified according to the user information that the information that user inputs obtains; And the confidence level of the information of user's input is judged according to verification result.Solving existing information credibility verification method cannot Effectively, the problems such as information carries out trust verification accurately is inputted to user, assists providing the side of admissible evidence using third party Formula, so that can effectively, accurately be carried out automatically to the information of user's input credible in information credibility verification process Degree verifying.
Second embodiment
Referring to FIG. 2, the flow chart of the information credibility verification method provided it illustrates another embodiment of the present invention. Fig. 2 is improved on the basis of Fig. 1.This method can verify information credibility performed by device as information credibility Verification process;The information credibility verification method, it may include following steps 201-207:
Step 201, the information for obtaining user's input determines third party associated with the user according to the information that user inputs Information, third-party information includes address information or identification information.
The information of user's input may include the information such as address name, user account, contact method, voice.User can be with Relevant information is inputted by terminal (such as the equipment such as computer, mobile phone) used in it, and information is submitted, then information can Trust verification device can get the information of user's input.
Third party can be user associated with the user, and user associated with the user can be for example the good of user Friend, acquaintance, microblogging concern people etc..For example, information is credible if the information of user's input is the chat application account of user The account that degree verifying device can be inputted according to user obtains the good friend of user in chat application, if in user's chat application account Good friend include 100, then can be using this 100 users as third party.Third-party information may include third-party account The information such as number information, email address information, phone number, age, name.
Address information includes the address information or third-party email address information etc. of terminal used in third party.Mark Knowing information can be third-party account information, such as the login account letter of the communications applications in terminal used in third party Breath.
Step 203, at least one third party is chosen according to third-party information, and according to third-party address information or mark Know information, the third party institute of selection is sent to by the information of user's input or according to the user information that the information that user inputs obtains The terminal used, so as to information that third party inputs user or be tested according to the user information that the information that user inputs obtains Card.
Preferably, may also include that in step 203
If third-party address information is third-party email address information, by the information of user's input or according to user The user information that the information of input obtains is sent to first server corresponding to third-party email address information, first service Device is sent to terminal used in the third party of selection, so that information that third party inputs user or the letter inputted according to user Obtained user information is ceased to be verified;
If third-party identification information is third-party account information, inputted by the information of user's input or according to user The obtained user information of information be sent to second server corresponding to third-party account information, second server is sent to Terminal used in the third party of selection, so as to information that third party inputs user or be obtained according to the information that user inputs User information is verified.
First server and second server are respectively to manage third-party email address information and the third-party account of management The server of number information.
At least one third party chosen is used to provide evidence for investigated user.It can when choosing at least one third party To choose the third party relatively trusted or choose the third party etc. close with the Relationship Comparison of user.
Compare trust third party can according to third-party credit value, third party's history input information accuracy into Row judgement, for example, if third-party credit value is high or the accuracy of third party's history input information it is higher (it is also assumed that its Credit value is high), then it is determined as that third party is the user relatively trusted.Close third party can be compared with customer relationship It contacts user often with user, if such as user often contacted with third party A within nearest a period of time, can To be judged as that third party A is close third party compared with customer relationship.
From above-mentioned analysis it can be concluded that, it is preferable that at least one third is chosen according to third-party information in step 203 Side may include:
Selection credit value contacts with user secondary whithin a period of time greater than at least one third party of preset value or selection Number be greater than threshold value at least one third party, third-party information include third-party credit value, third party whithin a period of time Number is contacted with user.
Certainly, in embodiments of the present invention, can also according to actual needs and using other way choose at least one the Tripartite.The obtained user information of information inputted according to user can this user inputs according to information and the user being inferred to Information can be obtained and carrying out humongous search on network, and obtained user information for example can user's registration account thus Number when the information submitted, user issued on microblogging information, the voice messaging that user uploads, user's history browsing information, Login when user's login account ground information etc..For example, if the information of user's input is from January, 2010 to 2012 3 Contact method in the period of the moon is the phone number of Beijing area, the then user information obtained according to the information that user inputs It may include whether user during this period of time works or learn in Beijing.If the account that the information of user's input is user is 1235678, then (can be with information credibility verifying device from the server of management account according to the account that user inputs Same equipment) on obtain the login that user logs in this account before.
Usually, the biological characteristic (such as retina, fingerprint, voice) of people is very difficult to duplication and higher cost, therefore It can be used as and discern whether it is one of evidence of user.It can use this identification technology of voice, user allowed actively to provide voice Information gives information credibility to verify device, and then voice is transmitted to third party again by information credibility verifying device, allows third party Identify whether be user voice.
Step 205, the verification result that the third party of selection is sent by used terminal is received, verification result is calculated Matching degree between the information of user's input obtains the confidence level of the information of user's input according to calculated matching degree.
Verification result tests the information that user inputs with the user information obtained to the information inputted according to user Information after card.Third party can verify above-mentioned all user informations, if information is problematic, can modify its information and mention Give information credibility verifying device;If information no problem, it need to only confirm and submit to information credibility verifying device.
For example, if the information that user to be verified inputs is 10, and the third-party quantity chosen is 5, then The matching degree of 10 information of verification result and user's input that the third party of selection sends is respectively 20%, 50%, 70%, 80%, 30%, respectively indicating has 2,5,7,8,3 information and user's input in the verification result of this 5 third parties transmission 10 information match, if this 5 third-party confidence levels are 0.2, verification result and user that this 5 third parties send The summation of the matching degree of 10 information of input is divided by the confidence level (20%+50%+70%+80%+ that 5 be that user inputs information 30%)/5=50%.
Preferably, the confidence level of the information that user's input is obtained according to calculated matching degree in step 205, can wrap It includes:
The third-party confidence level for presetting selection, obtains according to calculated matching degree and preset confidence level The confidence level of the information of user's input.
For example, if the password loss of the chat application account of user, user (can be to trust verification device Managing the server of chat application account) the following information of input appealed to give account for change.The information of user's input is as follows: using The account at family is: the login of account so far in 1235678,2012 years are as follows: Shanghai, phone number are as follows: 13612345678, gender: Male, and it is Guangzhou that trust verification device record display user, which logged in the area of this account in the past, the hand of record display user Machine number is identical as the phone number that user inputs.If the verification result that 3 third parties send is equal are as follows: login so far in 2012 Ground is Guangzhou, and the account of user is 1235678, and gender is male, phone number 13530090001, then this 3 third party's inputs Verification result in log in ground with phone number respectively with user input login and phone number do not match that, can obtain The matching degree of 4 information of verification result and user's input that 3 third parties chosen send is respectively 50%, 50%, 50%, if Presetting this 3 third-party confidence levels is respectively 0.5,0.3,0.2, then the verification result and use that this 3 third parties send After summation of the matching degree multiplied by respective confidence level of 4 information of family input, then divided by 3 be user's input 4 information Confidence level (50%*0.5+50%*0.3+50%*0.2)/3=50%.
Preferably, after step 205, may also include that
Step 207, judge whether the confidence level of user's input information reaches preset value, if confidence level reaches preset value, It is judged as that the information of user's input is believable.
Preset value can be preset any number, such as 80%.Still by taking second example in step 205 as an example It is illustrated, if preset value is 80%, since the confidence level 50% of 4 information of user's input is less than preset value 80%, is then determined as This user input information be it is incredible, this account is not belonging to the user.
In conclusion information credibility verification method provided in this embodiment, also by calculating verification result and user Matching degree between the information of input obtains the confidence level of the information of user's input according to calculated matching degree, judges user Whether the confidence level of input information reaches preset value;If confidence level reaches preset value, be judged as user input information be can Letter.Whether the information so as to automatically and efficiently judge user's input is credible.
The following are the device of the invention embodiments, and the details of not detailed description in Installation practice can refer to above-mentioned Corresponding embodiment of the method.
3rd embodiment
Referring to FIG. 3, it illustrates the main frames of information credibility provided by one embodiment of the present invention verifying device Block diagram.The information credibility verifies device, comprising: determining module 301, evidence obtaining module 303 and Credibility judgement module 305。
Specifically, it is determined that module 301 is determined and is used according to the information of user's input for obtaining the information of user's input The associated third-party information in family, third-party information include address information or identification information.
Evidence obtaining module 303, for choosing at least one third party according to third-party information, and according to third-party address Information or identification information are sent to selection by the information of user's input or according to the user information that the information that user inputs obtains Terminal used in third party, so as to information that third party inputs user or be believed according to the user that the information that user inputs obtains Breath is verified.
Preferably, the evidence obtaining module 303, be also used to choose credit value greater than preset value at least one third party or It chooses and contacts at least one third party that number is greater than threshold value with user whithin a period of time, third-party information includes third party Credit value, third party contact number with user whithin a period of time.
Preferably, the evidence obtaining module 303, if being also used to third-party address information as third-party email address letter Breath is then sent to third-party email address by the information of user's input or according to the user information that the information that user inputs obtains First server corresponding to information, first server is sent to terminal used in the third party of selection, so that third party couple The information of user's input is verified according to the user information that the information that user inputs obtains;If third-party identification information is The information of user's input or the obtained user information of information inputted according to user are then sent to the by third-party account information Second server corresponding to the account information of tripartite, second server are sent to terminal used in the third party of selection, with The information that inputs third party to user is verified according to the user information that the information that user inputs obtains.
Credibility judgement module 305, the verification result sent for receiving the third party chosen by used terminal, And the confidence level of the information of user's input is judged according to verification result.
In conclusion information credibility provided in this embodiment verifies device, pass through determination third associated with the user The information of side is chosen at least one third party further according to third-party information, and is believed according to third-party address information or mark Breath is used by the information of user's input or according to the third party that the user information that the information that user inputs obtains is sent to selection Terminal, so as to information that third party inputs user or be verified according to the user information that the information that user inputs obtains; And the confidence level of the information of user's input is judged according to verification result.Solving existing information credibility appraisal procedure cannot Effectively, the problems such as information carries out trust verification accurately is provided to user, assists providing the side of admissible evidence using third party Formula, so that can effectively, accurately be carried out automatically to the information of user's input credible in information credibility verification process Degree verifying.
Fourth embodiment
Referring to FIG. 4, the main frame of the information credibility verifying device provided it illustrates another embodiment of the present invention Structure block diagram.It is similar to information credibility shown in Fig. 3 verifying device, the difference is that, the Credibility judgement module, It can also include: computing module 401 and judgment module 403.
Computing module 401, for calculating the matching degree between verification result and the information of user's input, according to calculating Matching degree obtain user input information confidence level.
Preferably, computing module 401 are also used to preset the third-party confidence level of selection, according to calculated The confidence level of the information of user's input is obtained with degree and preset confidence level.
Judgment module 403, for judging whether the confidence level of user's input information reaches preset value;If confidence level reaches pre- If value, then it is judged as that the information of user's input is believable.
In conclusion information credibility provided in this embodiment verifies device, also by calculating verification result and user Matching degree between the information of input obtains the confidence level of the information of user's input according to calculated matching degree, judges user Whether the confidence level of input information reaches preset value;If confidence level reaches preset value, be judged as user input information be can Letter.Whether the information so as to automatically and efficiently judge user's input is credible.
5th embodiment
Referring to FIG. 5, it illustrates a kind of structural block diagrams of terminal.With information credibility verifying device operation in this terminal As an example, as shown in figure 5, terminal includes memory 502, storage control 504, one or more (only showing one in figure) Processor 506, Peripheral Interface 508, radio-frequency module 510, photographing module 514, audio-frequency module 516, Touch Screen 518 and key Module 520.These components are mutually communicated by one or more communication bus/signal wire.
It is appreciated that structure shown in fig. 5 is only to illustrate, terminal may also include more or less than shown in Fig. 5 Component, or with the configuration different from shown in Fig. 5.Each component shown in Fig. 5 can be real using hardware, software, or its combination It is existing.
Memory 502 can be used for storing software program and module, as carried out letter in the embodiment of the present invention in terminal Corresponding program instruction/the module of method of trust verification is ceased, processor 502 is stored in soft in memory 504 by operation Part program and module are realized thereby executing various function application and data processing and above-mentioned carry out information in terminal The method of trust verification.
Memory 502 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 502 can further comprise The memory remotely located relative to processor 506, these remote memories can pass through network connection to terminal.Above-mentioned network Example include but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.Processor 506 and its He can carry out the access of memory 502 at possible component under the control of storage control 504.
Various input/output devices are couple CPU and memory 502 by Peripheral Interface 508.The operation of processor 506 is deposited Various softwares, instruction in reservoir 502 are to execute the various functions of terminal and carry out data processing.
In some embodiments, Peripheral Interface 508, processor 506 and storage control 504 can be in one single chips It realizes.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 510 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus with Communication network or other equipment are communicated.Radio-frequency module 510 may include various existing for executing the electricity of these functions Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, Memory etc..Radio-frequency module 510 can be communicated or be led to various networks such as internet, intranet, wireless network Wireless network is crossed to be communicated with other equipment.Above-mentioned wireless network may include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).Various communication standards, agreement and technology can be used in above-mentioned wireless network, and including but not limited to the whole world is mobile logical Letter system (Global System for Mobile Communication, GSM), enhanced mobile communication technology (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code division Multiple access, W-CDMA), Code Division Multiple Access (Code division access, CDMA), time division multiple access technology (time division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE802.11b, IEEE802.11g and/or IEEE802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, Instant Messenger The agreement and any other suitable communications protocol of news and short message, or even may include that those are not developed currently yet Agreement.
Photographing module 514 is for shooting photo or video.The photo or video of shooting can store to memory 502 It is interior, and can be sent by radio-frequency module 510.
Audio-frequency module 516 provides a user audio interface, may include one or more microphones, one or more raises Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data from Peripheral Interface 508, and voice data is converted to power information, Power information is transmitted to loudspeaker.Power information is converted to the sound wave that human ear can be heard by loudspeaker.Voicefrequency circuit is also from microphone Place receive power information, convert electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface 508 to carry out into one The processing of step.Audio data can obtain from memory 502 or through radio-frequency module 510.In addition, audio data can also be with It stores into memory 502 or is sent by radio-frequency module 510.In some instances, audio-frequency module 516 may also include One earphone broadcasts hole, for providing audio interface to earphone or other equipment.
Touch Screen 518 provides an output and input interface simultaneously between terminal and user.Specifically, Touch Screen 518 show video output to user, and the content of these videos output may include text, figure, video and any combination thereof.One A little outputs are the result is that correspond to some user interface objects.Touch Screen 518 also receives the input of user, such as the point of user The gesture operations such as hit, slide, so that user interface object responds the input of these users.Detect the technology of user's input It can be based on resistance-type, condenser type or any other possible touch control detection technology.The tool of 518 display unit of Touch Screen Body example includes but is not limited to liquid crystal display or light emitting polymer displays.
Key module 520 equally provides the interface that is inputted to terminal of user, user can by press it is different by Key is so that terminal executes different functions.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium, it is executable to be stored with computer Instruction, above-mentioned computer readable storage medium is, for example, nonvolatile memory such as CD, hard disk or flash memory.It is above-mentioned Computer executable instructions for allowing computer or similar arithmetic unit to complete above-mentioned information credibility verification method.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification It is right according to the technical essence of the invention for the equivalent embodiment of equivalent variations, but without departing from the technical solutions of the present invention Any simple modification, equivalent change and modification made by above embodiments, all of which are still within the scope of the technical scheme of the invention.

Claims (12)

1. a kind of information credibility verification method, which is characterized in that the information credibility verification method includes:
The information for obtaining user's input determines third-party letter associated with the user according to the information that the user inputs Breath, the third-party information includes address information or identification information;
At least one third party is chosen according to the third-party information, and is believed according to the third-party address information or mark Breath is used by the information of user's input or according to the third party that the user information that the information that user inputs obtains is sent to selection Terminal, so as to information that third party inputs user or be verified according to the user information that the information that user inputs obtains;
The verification result that the third party chosen is sent by used terminal is received, and institute is judged according to the verification result State the confidence level of the information of user's input, wherein the third party of the selection is used to provide evidence for investigated user, described Verification result is the information inputted to user or the user information that the information inputted according to user is obtained verify after use Family information.
2. information credibility verification method according to claim 1, which is characterized in that judged according to the verification result The confidence level of the information of user's input, comprising:
The matching degree between the verification result and the information of user input is calculated, is obtained according to calculated matching degree The confidence level of the information of user's input.
3. information credibility verification method according to claim 2, which is characterized in that obtained according to calculated matching degree After the confidence level of the information of user's input, further includes:
Judge whether the confidence level of user's input information reaches preset value;
If the confidence level reaches preset value, it is judged as that the information of user's input is believable.
4. information credibility verification method according to claim 2, which is characterized in that obtained according to calculated matching degree The confidence level of the information of user's input, comprising:
The third-party confidence level for presetting selection obtains described according to calculated matching degree and preset confidence level The confidence level of the information of user's input.
5. information credibility verification method according to claim 1, which is characterized in that selected according to the third-party information Take at least one third party, comprising:
Credit value is chosen to be greater than at least one third party of preset value or choose that contact number with user whithin a period of time big In at least one third party of threshold value, the third-party information include third-party credit value and third party whithin a period of time Number is contacted with user.
6. information credibility verification method according to claim 1, which is characterized in that selected according to the third-party information Take at least one third party, and according to the third-party address information or identification information, by the information of user's input or according to The user information that the information of user's input obtains is sent to terminal used in the third party of selection, so that third party is defeated to user The information that enters is verified according to the user information that the information that user inputs obtains, comprising:
If third-party address information is third-party email address information, inputted by the information of user's input or according to user The obtained user information of information be sent to first server corresponding to third-party email address information, first server hair Terminal used in the third party of selection is given, so as to information that third party inputs user or obtain according to the information that user inputs To user information verified;
If third-party identification information is third-party account information, by the information of user's input or the letter inputted according to user It ceases obtained user information and is sent to second server corresponding to third-party account information, second server is sent to selection Third party used in terminal so that information that third party inputs user or the user obtained according to the information that user inputs Information is verified.
7. a kind of information credibility verifies device, which is characterized in that the information credibility verifies device, comprising:
Determining module is related to the user according to the information determination of user input for obtaining the information of user's input The third-party information of connection, the third-party information includes address information or identification information;
Collect evidence module, for choosing at least one third party according to the third-party information, and according to it is described third-partyly Location information or identification information are sent to selection by the information of user's input or according to the user information that the information that user inputs obtains Third party used in terminal so that information that third party inputs user or the user obtained according to the information that user inputs Information is verified;
Credibility judgement module, the verification result sent for receiving the third party chosen by used terminal, and according to The verification result judges the confidence level of the information of user's input, wherein the third party of the selection is used to be adjusted The user looked into provides evidence, and the verification result is the information inputted to user or the use obtained to the information inputted according to user Family information verified after user information.
8. information credibility according to claim 7 verifies device, which is characterized in that the Credibility judgement module, packet It includes:
Computing module, for calculating the matching degree between the verification result and the information of user input, according to calculating Matching degree out obtains the confidence level of the information of user's input.
9. information credibility according to claim 8 verifies device, which is characterized in that the Credibility judgement module, also Include:
Judgment module, for judging whether the confidence level of user's input information reaches preset value;If the confidence level reaches Preset value is then judged as that the information of user's input is believable.
10. information credibility according to claim 8 verifies device, which is characterized in that the computing module is also used to pre- It is defeated to obtain the user according to calculated matching degree and preset confidence level for the third-party confidence level for first setting selection The confidence level of the information entered.
11. information credibility according to claim 7 verifies device, which is characterized in that the evidence obtaining module is also used to select It takes credit value to be greater than at least one third party of preset value or choose and contacts number with user whithin a period of time greater than threshold value At least one third party, the third-party information include third-party credit value and third party whithin a period of time with user Contact number.
12. information credibility according to claim 7 verifies device, which is characterized in that the evidence obtaining module, if being also used to Third-party address information is third-party email address information, then by the information of user's input or the information inputted according to user Obtained user information is sent to first server corresponding to third-party email address information, and first server is sent to choosing Terminal used in the third party taken, so that the information that third party inputs user or the use obtained according to the information that user inputs Family information is verified;If third-party identification information be third-party account information, by user input information or according to The user information that the information of user's input obtains is sent to second server corresponding to third-party account information, second service Device is sent to terminal used in the third party of selection, so that information that third party inputs user or the letter inputted according to user Obtained user information is ceased to be verified.
CN201310307092.3A 2013-07-22 2013-07-22 Information credibility verification method and device Active CN104333530B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310307092.3A CN104333530B (en) 2013-07-22 2013-07-22 Information credibility verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310307092.3A CN104333530B (en) 2013-07-22 2013-07-22 Information credibility verification method and device

Publications (2)

Publication Number Publication Date
CN104333530A CN104333530A (en) 2015-02-04
CN104333530B true CN104333530B (en) 2019-02-22

Family

ID=52408184

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310307092.3A Active CN104333530B (en) 2013-07-22 2013-07-22 Information credibility verification method and device

Country Status (1)

Country Link
CN (1) CN104333530B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107995150B (en) * 2016-10-27 2020-08-28 腾讯科技(深圳)有限公司 Identity verification method and device
CN108932646B (en) * 2017-05-26 2021-04-13 中移(杭州)信息技术有限公司 User tag verification method and device based on operator and electronic equipment
CN109325352A (en) * 2018-08-28 2019-02-12 全球能源互联网研究院有限公司 A kind of credible calculating platform framework
CN109067791B (en) * 2018-09-25 2020-05-12 阿里巴巴集团控股有限公司 User identity authentication method and device in network
CN110413654B (en) * 2019-06-20 2023-11-21 平安科技(深圳)有限公司 Method, device, computer equipment and storage medium for determining customer trusted contact information
CN110930244B (en) * 2019-11-27 2022-11-25 北京国腾联信科技有限公司 Method and device for calculating credit investigation evaluation value of user
CN110888864B (en) * 2019-11-27 2022-08-23 北京国腾联信科技有限公司 Automatic user data collection method and device
CN114448706A (en) * 2022-02-08 2022-05-06 恒安嘉新(北京)科技股份公司 Single package authorization method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309190A (en) * 2008-06-30 2008-11-19 腾讯科技(深圳)有限公司 User organization management system and method thereof
CN101599993A (en) * 2009-06-30 2009-12-09 武汉中频科技有限公司 A kind of network social intercourse system of many identity and implementation method
CN101847143A (en) * 2009-03-25 2010-09-29 欧阳炳宇 Method for enhancing interaction authenticity experience in virtual human society
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN102339445A (en) * 2010-07-23 2012-02-01 阿里巴巴集团控股有限公司 Method and system for evaluating credibility of network trade user
CN103036869A (en) * 2011-10-08 2013-04-10 美国博通公司 Social device service and support via automatic group association

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008141256A2 (en) * 2007-05-10 2008-11-20 Mary Kay Hoal Social networking system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309190A (en) * 2008-06-30 2008-11-19 腾讯科技(深圳)有限公司 User organization management system and method thereof
CN101847143A (en) * 2009-03-25 2010-09-29 欧阳炳宇 Method for enhancing interaction authenticity experience in virtual human society
CN101599993A (en) * 2009-06-30 2009-12-09 武汉中频科技有限公司 A kind of network social intercourse system of many identity and implementation method
CN102339445A (en) * 2010-07-23 2012-02-01 阿里巴巴集团控股有限公司 Method and system for evaluating credibility of network trade user
CN102035846A (en) * 2010-12-22 2011-04-27 北京航空航天大学 Social network user identity authentication method based on relation statement
CN103036869A (en) * 2011-10-08 2013-04-10 美国博通公司 Social device service and support via automatic group association

Also Published As

Publication number Publication date
CN104333530A (en) 2015-02-04

Similar Documents

Publication Publication Date Title
CN104333530B (en) Information credibility verification method and device
US11002822B2 (en) Service enhancements using near field communication
CN104243517B (en) Content share method and device between different terminals
US11176237B2 (en) Modifying security state with secured range detection
CA2919113C (en) Processing electronic tokens
US11658963B2 (en) Cooperative communication validation
CN103916244B (en) Verification method and device
US10659453B2 (en) Dual channel identity authentication
US8315595B2 (en) Providing trusted communication
US20150319137A1 (en) Techniques to monitor connection paths on networked devices
EP3150022A1 (en) Client applications communicating via a user tunnel
CN105306204A (en) Security verification method, device and system
CN104346560B (en) A kind of safe verification method and device
CN108234124B (en) Identity verification method, device and system
JP2013097650A (en) Authentication system, authentication method and authentication server
CN103679000A (en) Apparatus and method for remotely deleting critical information
CN105592005B (en) Security verification method, device and system
CN104980420A (en) Business processing method, device, terminal and server
CN104348655B (en) The safe and healthy degree determination method of system and device
US20140215582A1 (en) Verification system and verification method
KR20150079379A (en) Apparatus, system, and method for identifying a man-in-the-middle connection
CN108306907A (en) A kind of management method of terminal, network function and terminal
CN108234113B (en) Identity verification method, device and system
CN108234412A (en) Auth method and device
US9202016B2 (en) Management of private information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant