CN104333530B - Information credibility verification method and device - Google Patents
Information credibility verification method and device Download PDFInfo
- Publication number
- CN104333530B CN104333530B CN201310307092.3A CN201310307092A CN104333530B CN 104333530 B CN104333530 B CN 104333530B CN 201310307092 A CN201310307092 A CN 201310307092A CN 104333530 B CN104333530 B CN 104333530B
- Authority
- CN
- China
- Prior art keywords
- information
- user
- party
- input
- credibility
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
The embodiment of the invention discloses a kind of information credibility verification method and devices, belong to field of information processing.The method comprise the steps that obtaining the information of user's input, third-party information associated with the user is determined according to the information that user inputs;At least one third party is chosen according to third-party information, and according to third-party address information or identification information, the information of user's input or the obtained user information of information inputted according to user are sent to terminal used in the third party of selection, so as to information that third party input user or verify according to the user information that the information of user's input obtains;The verification result that the third party chosen is sent by used terminal is received, and judges the confidence level for the information that user inputs according to verification result.The present invention is in such a way that third party assists providing admissible evidence, so that effectively, accurately can carry out trust verification to the information of user's input automatically in information credibility verification process.
Description
Technical field
The present invention relates to technical field of information processing, in particular to a kind of information credibility verification method and device.
Background technique
The identity majority of user is all anonymous in current network environment, these anonymous can be directly or by account
Logon mode accesses various networks.It carries out requiring to input registration information by user greatly when account registration, such as user name, connection
It is mode etc., to become registration user.Registration user can be released news by approach such as webpage, short message and multimedia messages, and can
To inquire into topic and shared resource with friends anywhere or anytime.
But the information that user is inputted on network is not entirely trustworthy, some information is also untrue
Real.Therefore the confidence level for inputting information to user is needed to verify, it is people couple that confidence level, which is a kind of measurement to trust,
Things or phenomenon are genuine degree of faith.For example, when account ownership judges, it is necessary to input the credible of relevant information to user
Degree is verified, such as the information such as history password, cryptoguard, common login ground, to judge whether this number belongs to this
User.
At present to the confidence level of information carry out verification method be mostly introduce social status and user information integrity degree etc. into
Row certification, still, in practical applications, even a famous person to hold a high place in society or a user information are very complete
User is authenticated, the information that they input also is not necessarily true and reliable, in fact, the above method is only unilateral to have investigated user
Input the confidence level of information.There is presently no the confidence levels that a kind of method more effective, accurately can input information to user
It is verified, to obtain the information with reference value, quotes or inquire for user.
Summary of the invention
The present invention provides a kind of information credibility verification method and device, to solve existing information credibility verification method
The problems such as information carries out trust verification effectively, accurately cannot be inputted to user.
Specifically, the embodiment of the invention provides a kind of information credibility verification method, the information credibility authentications
Method, comprising: the information for obtaining user's input determines third-party information associated with the user according to the information that user inputs,
Third-party information includes address information or identification information;At least one third party is chosen according to third-party information, and according to
Third-party address information or identification information, by the information of user's input or the user information obtained according to the information that user inputs
It is sent to terminal used in the third party of selection, so that the information that third party inputs user or the information inputted according to user
Obtained user information is verified;The verification result that the third party that reception is chosen is sent by used terminal, and according to
Verification result judges the confidence level of the information of user's input.
In addition, the embodiment of the invention provides a kind of information credibilities to verify device, the information credibility verifies device,
Comprise determining that module, evidence obtaining module and Credibility judgement module, determining module, for obtaining the information of user's input, according to
The information of user's input determines that third-party information associated with the user, third-party information include address information or mark letter
Breath;Evidence obtaining module, for choosing at least one third party according to third-party information, and according to third-party address information or mark
Know information, the third party institute of selection is sent to by the information of user's input or according to the user information that the information that user inputs obtains
The terminal used, so as to information that third party inputs user or be tested according to the user information that the information that user inputs obtains
Card;Credibility judgement module, for receiving the verification result that sends by used terminal of third party chosen, and according to testing
Card result judges the confidence level of the information of user's input.
Technical solution provided in an embodiment of the present invention has the benefit that
By determination third-party information associated with the user, at least one third is chosen further according to third-party information
Side, and according to third-party address information or identification information, it is obtained by the information of user's input or according to the information that user inputs
User information be sent to terminal used in the third party of selection so that information that third party inputs user or according to user
The user information that the information of input obtains is verified;And the confidence level of the information of user's input is judged according to verification result.
Cannot effectively, accurately user's input information progress trust verification etc. be asked by solving existing information credibility verification method
Topic, in such a way that third party assists providing admissible evidence, so that can have automatically in information credibility verification process
Effect accurately carries out trust verification to the information of user's input.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects, features and advantages of the invention can
It is clearer and more comprehensible, it is special below to lift preferred embodiment, and cooperate attached drawing, detailed description are as follows.
Detailed description of the invention
Fig. 1 is the flow chart of information credibility verification method provided by one embodiment of the present invention;
Fig. 2 is the flow chart for the information credibility verification method that another embodiment of the present invention provides;
Fig. 3 is the main frame block diagram of information credibility verifying device provided by one embodiment of the present invention;
Fig. 4 is the main frame block diagram for the information credibility verifying device that another embodiment of the present invention provides;
Fig. 5 is a kind of structural block diagram of terminal.
Specific embodiment
It is of the invention to reach the technical means and efficacy that predetermined goal of the invention is taken further to illustrate, below in conjunction with
Attached drawing and preferred embodiment, to information credibility verification method proposed according to the present invention and device its specific embodiment, knot
Structure, feature and effect, detailed description is as follows.
For the present invention aforementioned and other technology contents, feature and effect refer to the preferable reality of schema in following cooperation
Applying can clearly be presented in example detailed description.By the explanation of specific embodiment, when predetermined mesh can be reached to the present invention
The technical means and efficacy taken be able to more deeply and it is specific understand, however institute's accompanying drawings are only to provide with reference to and say
It is bright to be used, it is not intended to limit the present invention.
First embodiment
Referring to FIG. 1, it illustrates the flow charts of information credibility verification method provided by one embodiment of the present invention.It should
Method can verify information credibility verification process performed by device as information credibility;The information credibility authentication
Method, it may include following steps 101-105:
Step 101, the information for obtaining user's input determines third party associated with the user according to the information that user inputs
Information, third-party information includes address information or identification information.
The information of user's input may include the information such as address name, user account, contact method, voice.User can be with
Relevant information is inputted by terminal (such as the equipment such as computer, mobile phone) used in it, and information is submitted, then information can
Trust verification device can get the information of user's input.
Third party can be user associated with the user, and user associated with the user can be for example the good of user
Friend, acquaintance, microblogging concern people etc..For example, information is credible if the information of user's input is the chat application account of user
The account that degree verifying device can be inputted according to user obtains the good friend of user in chat application, if in user's chat application account
Good friend include 100, then can be using this 100 users as third party.Third-party information may include third-party account
The information such as number information, email address information, phone number, age, name.
Address information includes the address information or third-party email address information etc. of terminal used in third party.Mark
Knowing information can be third-party account information, such as the login account letter of the communications applications in terminal used in third party
Breath.
Step 103, at least one third party is chosen according to third-party information, and according to third-party address information or mark
Know information, the third party institute of selection is sent to by the information of user's input or according to the user information that the information that user inputs obtains
The terminal used, so as to information that third party inputs user or be tested according to the user information that the information that user inputs obtains
Card.
Preferably, may also include that in step 103
If third-party address information is third-party email address information, by the information of user's input or according to user
The user information that the information of input obtains is sent to first server corresponding to third-party email address information, first service
Device is sent to terminal used in the third party of selection, so that the information that third party inputs user is verified;
If third-party identification information is third-party account information, inputted by the information of user's input or according to user
The obtained user information of information be sent to second server corresponding to third-party account information, second server is sent to
Terminal used in the third party of selection, so that the information that third party inputs user is verified.
First server and second server are respectively to manage third-party email address information and the third-party account of management
The server of number information.
At least one third party chosen is used to provide evidence for investigated user.It can when choosing at least one third party
To choose the third party relatively trusted or choose the third party etc. close with the Relationship Comparison of user.
The obtained user information of information inputted according to user can this user inputs according to information and be inferred to
User information can be obtained and carrying out humongous search on network, and obtained user information user can for example be infused thus
The information submitted, user issue on microblogging when volume account information, the voice messaging that user uploads, user's history browsing letter
Login when breath, user's login account ground information etc..For example, if the information of user's input is from January, 2010 to 2012
Contact method in the period in March in year is the phone number of Beijing area, the then user obtained according to the information that user inputs
Information may include whether user during this period of time works or learn in Beijing.If the information of user's input is the account of user
It is 1235678, then device (can be verified with information credibility from the server of management account according to the account that user inputs
For same equipment) on obtain the login that user logs in this account before.
Step 105, the verification result that the third party of selection is sent by used terminal is received, and according to verification result
Judge the confidence level of the information of user's input.
Verification result tests the information that user inputs with the user information obtained to the information inputted according to user
Information after card.
In conclusion information credibility verification method provided in this embodiment, passes through determination third associated with the user
The information of side is chosen at least one third party further according to third-party information, and is believed according to third-party address information or mark
Breath is used by the information of user's input or according to the third party that the user information that the information that user inputs obtains is sent to selection
Terminal, so as to information that third party inputs user or be verified according to the user information that the information that user inputs obtains;
And the confidence level of the information of user's input is judged according to verification result.Solving existing information credibility verification method cannot
Effectively, the problems such as information carries out trust verification accurately is inputted to user, assists providing the side of admissible evidence using third party
Formula, so that can effectively, accurately be carried out automatically to the information of user's input credible in information credibility verification process
Degree verifying.
Second embodiment
Referring to FIG. 2, the flow chart of the information credibility verification method provided it illustrates another embodiment of the present invention.
Fig. 2 is improved on the basis of Fig. 1.This method can verify information credibility performed by device as information credibility
Verification process;The information credibility verification method, it may include following steps 201-207:
Step 201, the information for obtaining user's input determines third party associated with the user according to the information that user inputs
Information, third-party information includes address information or identification information.
The information of user's input may include the information such as address name, user account, contact method, voice.User can be with
Relevant information is inputted by terminal (such as the equipment such as computer, mobile phone) used in it, and information is submitted, then information can
Trust verification device can get the information of user's input.
Third party can be user associated with the user, and user associated with the user can be for example the good of user
Friend, acquaintance, microblogging concern people etc..For example, information is credible if the information of user's input is the chat application account of user
The account that degree verifying device can be inputted according to user obtains the good friend of user in chat application, if in user's chat application account
Good friend include 100, then can be using this 100 users as third party.Third-party information may include third-party account
The information such as number information, email address information, phone number, age, name.
Address information includes the address information or third-party email address information etc. of terminal used in third party.Mark
Knowing information can be third-party account information, such as the login account letter of the communications applications in terminal used in third party
Breath.
Step 203, at least one third party is chosen according to third-party information, and according to third-party address information or mark
Know information, the third party institute of selection is sent to by the information of user's input or according to the user information that the information that user inputs obtains
The terminal used, so as to information that third party inputs user or be tested according to the user information that the information that user inputs obtains
Card.
Preferably, may also include that in step 203
If third-party address information is third-party email address information, by the information of user's input or according to user
The user information that the information of input obtains is sent to first server corresponding to third-party email address information, first service
Device is sent to terminal used in the third party of selection, so that information that third party inputs user or the letter inputted according to user
Obtained user information is ceased to be verified;
If third-party identification information is third-party account information, inputted by the information of user's input or according to user
The obtained user information of information be sent to second server corresponding to third-party account information, second server is sent to
Terminal used in the third party of selection, so as to information that third party inputs user or be obtained according to the information that user inputs
User information is verified.
First server and second server are respectively to manage third-party email address information and the third-party account of management
The server of number information.
At least one third party chosen is used to provide evidence for investigated user.It can when choosing at least one third party
To choose the third party relatively trusted or choose the third party etc. close with the Relationship Comparison of user.
Compare trust third party can according to third-party credit value, third party's history input information accuracy into
Row judgement, for example, if third-party credit value is high or the accuracy of third party's history input information it is higher (it is also assumed that its
Credit value is high), then it is determined as that third party is the user relatively trusted.Close third party can be compared with customer relationship
It contacts user often with user, if such as user often contacted with third party A within nearest a period of time, can
To be judged as that third party A is close third party compared with customer relationship.
From above-mentioned analysis it can be concluded that, it is preferable that at least one third is chosen according to third-party information in step 203
Side may include:
Selection credit value contacts with user secondary whithin a period of time greater than at least one third party of preset value or selection
Number be greater than threshold value at least one third party, third-party information include third-party credit value, third party whithin a period of time
Number is contacted with user.
Certainly, in embodiments of the present invention, can also according to actual needs and using other way choose at least one the
Tripartite.The obtained user information of information inputted according to user can this user inputs according to information and the user being inferred to
Information can be obtained and carrying out humongous search on network, and obtained user information for example can user's registration account thus
Number when the information submitted, user issued on microblogging information, the voice messaging that user uploads, user's history browsing information,
Login when user's login account ground information etc..For example, if the information of user's input is from January, 2010 to 2012 3
Contact method in the period of the moon is the phone number of Beijing area, the then user information obtained according to the information that user inputs
It may include whether user during this period of time works or learn in Beijing.If the account that the information of user's input is user is
1235678, then (can be with information credibility verifying device from the server of management account according to the account that user inputs
Same equipment) on obtain the login that user logs in this account before.
Usually, the biological characteristic (such as retina, fingerprint, voice) of people is very difficult to duplication and higher cost, therefore
It can be used as and discern whether it is one of evidence of user.It can use this identification technology of voice, user allowed actively to provide voice
Information gives information credibility to verify device, and then voice is transmitted to third party again by information credibility verifying device, allows third party
Identify whether be user voice.
Step 205, the verification result that the third party of selection is sent by used terminal is received, verification result is calculated
Matching degree between the information of user's input obtains the confidence level of the information of user's input according to calculated matching degree.
Verification result tests the information that user inputs with the user information obtained to the information inputted according to user
Information after card.Third party can verify above-mentioned all user informations, if information is problematic, can modify its information and mention
Give information credibility verifying device;If information no problem, it need to only confirm and submit to information credibility verifying device.
For example, if the information that user to be verified inputs is 10, and the third-party quantity chosen is 5, then
The matching degree of 10 information of verification result and user's input that the third party of selection sends is respectively 20%, 50%, 70%, 80%,
30%, respectively indicating has 2,5,7,8,3 information and user's input in the verification result of this 5 third parties transmission
10 information match, if this 5 third-party confidence levels are 0.2, verification result and user that this 5 third parties send
The summation of the matching degree of 10 information of input is divided by the confidence level (20%+50%+70%+80%+ that 5 be that user inputs information
30%)/5=50%.
Preferably, the confidence level of the information that user's input is obtained according to calculated matching degree in step 205, can wrap
It includes:
The third-party confidence level for presetting selection, obtains according to calculated matching degree and preset confidence level
The confidence level of the information of user's input.
For example, if the password loss of the chat application account of user, user (can be to trust verification device
Managing the server of chat application account) the following information of input appealed to give account for change.The information of user's input is as follows: using
The account at family is: the login of account so far in 1235678,2012 years are as follows: Shanghai, phone number are as follows: 13612345678, gender:
Male, and it is Guangzhou that trust verification device record display user, which logged in the area of this account in the past, the hand of record display user
Machine number is identical as the phone number that user inputs.If the verification result that 3 third parties send is equal are as follows: login so far in 2012
Ground is Guangzhou, and the account of user is 1235678, and gender is male, phone number 13530090001, then this 3 third party's inputs
Verification result in log in ground with phone number respectively with user input login and phone number do not match that, can obtain
The matching degree of 4 information of verification result and user's input that 3 third parties chosen send is respectively 50%, 50%, 50%, if
Presetting this 3 third-party confidence levels is respectively 0.5,0.3,0.2, then the verification result and use that this 3 third parties send
After summation of the matching degree multiplied by respective confidence level of 4 information of family input, then divided by 3 be user's input 4 information
Confidence level (50%*0.5+50%*0.3+50%*0.2)/3=50%.
Preferably, after step 205, may also include that
Step 207, judge whether the confidence level of user's input information reaches preset value, if confidence level reaches preset value,
It is judged as that the information of user's input is believable.
Preset value can be preset any number, such as 80%.Still by taking second example in step 205 as an example
It is illustrated, if preset value is 80%, since the confidence level 50% of 4 information of user's input is less than preset value 80%, is then determined as
This user input information be it is incredible, this account is not belonging to the user.
In conclusion information credibility verification method provided in this embodiment, also by calculating verification result and user
Matching degree between the information of input obtains the confidence level of the information of user's input according to calculated matching degree, judges user
Whether the confidence level of input information reaches preset value;If confidence level reaches preset value, be judged as user input information be can
Letter.Whether the information so as to automatically and efficiently judge user's input is credible.
The following are the device of the invention embodiments, and the details of not detailed description in Installation practice can refer to above-mentioned
Corresponding embodiment of the method.
3rd embodiment
Referring to FIG. 3, it illustrates the main frames of information credibility provided by one embodiment of the present invention verifying device
Block diagram.The information credibility verifies device, comprising: determining module 301, evidence obtaining module 303 and Credibility judgement module
305。
Specifically, it is determined that module 301 is determined and is used according to the information of user's input for obtaining the information of user's input
The associated third-party information in family, third-party information include address information or identification information.
Evidence obtaining module 303, for choosing at least one third party according to third-party information, and according to third-party address
Information or identification information are sent to selection by the information of user's input or according to the user information that the information that user inputs obtains
Terminal used in third party, so as to information that third party inputs user or be believed according to the user that the information that user inputs obtains
Breath is verified.
Preferably, the evidence obtaining module 303, be also used to choose credit value greater than preset value at least one third party or
It chooses and contacts at least one third party that number is greater than threshold value with user whithin a period of time, third-party information includes third party
Credit value, third party contact number with user whithin a period of time.
Preferably, the evidence obtaining module 303, if being also used to third-party address information as third-party email address letter
Breath is then sent to third-party email address by the information of user's input or according to the user information that the information that user inputs obtains
First server corresponding to information, first server is sent to terminal used in the third party of selection, so that third party couple
The information of user's input is verified according to the user information that the information that user inputs obtains;If third-party identification information is
The information of user's input or the obtained user information of information inputted according to user are then sent to the by third-party account information
Second server corresponding to the account information of tripartite, second server are sent to terminal used in the third party of selection, with
The information that inputs third party to user is verified according to the user information that the information that user inputs obtains.
Credibility judgement module 305, the verification result sent for receiving the third party chosen by used terminal,
And the confidence level of the information of user's input is judged according to verification result.
In conclusion information credibility provided in this embodiment verifies device, pass through determination third associated with the user
The information of side is chosen at least one third party further according to third-party information, and is believed according to third-party address information or mark
Breath is used by the information of user's input or according to the third party that the user information that the information that user inputs obtains is sent to selection
Terminal, so as to information that third party inputs user or be verified according to the user information that the information that user inputs obtains;
And the confidence level of the information of user's input is judged according to verification result.Solving existing information credibility appraisal procedure cannot
Effectively, the problems such as information carries out trust verification accurately is provided to user, assists providing the side of admissible evidence using third party
Formula, so that can effectively, accurately be carried out automatically to the information of user's input credible in information credibility verification process
Degree verifying.
Fourth embodiment
Referring to FIG. 4, the main frame of the information credibility verifying device provided it illustrates another embodiment of the present invention
Structure block diagram.It is similar to information credibility shown in Fig. 3 verifying device, the difference is that, the Credibility judgement module,
It can also include: computing module 401 and judgment module 403.
Computing module 401, for calculating the matching degree between verification result and the information of user's input, according to calculating
Matching degree obtain user input information confidence level.
Preferably, computing module 401 are also used to preset the third-party confidence level of selection, according to calculated
The confidence level of the information of user's input is obtained with degree and preset confidence level.
Judgment module 403, for judging whether the confidence level of user's input information reaches preset value;If confidence level reaches pre-
If value, then it is judged as that the information of user's input is believable.
In conclusion information credibility provided in this embodiment verifies device, also by calculating verification result and user
Matching degree between the information of input obtains the confidence level of the information of user's input according to calculated matching degree, judges user
Whether the confidence level of input information reaches preset value;If confidence level reaches preset value, be judged as user input information be can
Letter.Whether the information so as to automatically and efficiently judge user's input is credible.
5th embodiment
Referring to FIG. 5, it illustrates a kind of structural block diagrams of terminal.With information credibility verifying device operation in this terminal
As an example, as shown in figure 5, terminal includes memory 502, storage control 504, one or more (only showing one in figure)
Processor 506, Peripheral Interface 508, radio-frequency module 510, photographing module 514, audio-frequency module 516, Touch Screen 518 and key
Module 520.These components are mutually communicated by one or more communication bus/signal wire.
It is appreciated that structure shown in fig. 5 is only to illustrate, terminal may also include more or less than shown in Fig. 5
Component, or with the configuration different from shown in Fig. 5.Each component shown in Fig. 5 can be real using hardware, software, or its combination
It is existing.
Memory 502 can be used for storing software program and module, as carried out letter in the embodiment of the present invention in terminal
Corresponding program instruction/the module of method of trust verification is ceased, processor 502 is stored in soft in memory 504 by operation
Part program and module are realized thereby executing various function application and data processing and above-mentioned carry out information in terminal
The method of trust verification.
Memory 502 may include high speed random access memory, may also include nonvolatile memory, such as one or more magnetic
Property storage device, flash memory or other non-volatile solid state memories.In some instances, memory 502 can further comprise
The memory remotely located relative to processor 506, these remote memories can pass through network connection to terminal.Above-mentioned network
Example include but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.Processor 506 and its
He can carry out the access of memory 502 at possible component under the control of storage control 504.
Various input/output devices are couple CPU and memory 502 by Peripheral Interface 508.The operation of processor 506 is deposited
Various softwares, instruction in reservoir 502 are to execute the various functions of terminal and carry out data processing.
In some embodiments, Peripheral Interface 508, processor 506 and storage control 504 can be in one single chips
It realizes.In some other example, they can be realized by independent chip respectively.
Radio-frequency module 510 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus with
Communication network or other equipment are communicated.Radio-frequency module 510 may include various existing for executing the electricity of these functions
Circuit component, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card,
Memory etc..Radio-frequency module 510 can be communicated or be led to various networks such as internet, intranet, wireless network
Wireless network is crossed to be communicated with other equipment.Above-mentioned wireless network may include cellular telephone networks, WLAN or
Metropolitan Area Network (MAN).Various communication standards, agreement and technology can be used in above-mentioned wireless network, and including but not limited to the whole world is mobile logical
Letter system (Global System for Mobile Communication, GSM), enhanced mobile communication technology
(Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code division
Multiple access, W-CDMA), Code Division Multiple Access (Code division access, CDMA), time division multiple access technology
(time division multiple access, TDMA), bluetooth, adopting wireless fidelity technology (Wireless, Fidelity,
WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.11a, IEEE802.11b, IEEE802.11g and/or
IEEE802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses
(Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, Instant Messenger
The agreement and any other suitable communications protocol of news and short message, or even may include that those are not developed currently yet
Agreement.
Photographing module 514 is for shooting photo or video.The photo or video of shooting can store to memory 502
It is interior, and can be sent by radio-frequency module 510.
Audio-frequency module 516 provides a user audio interface, may include one or more microphones, one or more raises
Sound device and voicefrequency circuit.Voicefrequency circuit receives voice data from Peripheral Interface 508, and voice data is converted to power information,
Power information is transmitted to loudspeaker.Power information is converted to the sound wave that human ear can be heard by loudspeaker.Voicefrequency circuit is also from microphone
Place receive power information, convert electrical signals to voice data, and by data transmission in network telephony into Peripheral Interface 508 to carry out into one
The processing of step.Audio data can obtain from memory 502 or through radio-frequency module 510.In addition, audio data can also be with
It stores into memory 502 or is sent by radio-frequency module 510.In some instances, audio-frequency module 516 may also include
One earphone broadcasts hole, for providing audio interface to earphone or other equipment.
Touch Screen 518 provides an output and input interface simultaneously between terminal and user.Specifically, Touch Screen
518 show video output to user, and the content of these videos output may include text, figure, video and any combination thereof.One
A little outputs are the result is that correspond to some user interface objects.Touch Screen 518 also receives the input of user, such as the point of user
The gesture operations such as hit, slide, so that user interface object responds the input of these users.Detect the technology of user's input
It can be based on resistance-type, condenser type or any other possible touch control detection technology.The tool of 518 display unit of Touch Screen
Body example includes but is not limited to liquid crystal display or light emitting polymer displays.
Key module 520 equally provides the interface that is inputted to terminal of user, user can by press it is different by
Key is so that terminal executes different functions.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium, it is executable to be stored with computer
Instruction, above-mentioned computer readable storage medium is, for example, nonvolatile memory such as CD, hard disk or flash memory.It is above-mentioned
Computer executable instructions for allowing computer or similar arithmetic unit to complete above-mentioned information credibility verification method.
The above described is only a preferred embodiment of the present invention, be not intended to limit the present invention in any form, though
So the present invention has been disclosed as a preferred embodiment, and however, it is not intended to limit the invention, any technology people for being familiar with this profession
Member, without departing from the scope of the present invention, when the technology contents using the disclosure above make a little change or modification
It is right according to the technical essence of the invention for the equivalent embodiment of equivalent variations, but without departing from the technical solutions of the present invention
Any simple modification, equivalent change and modification made by above embodiments, all of which are still within the scope of the technical scheme of the invention.
Claims (12)
1. a kind of information credibility verification method, which is characterized in that the information credibility verification method includes:
The information for obtaining user's input determines third-party letter associated with the user according to the information that the user inputs
Breath, the third-party information includes address information or identification information;
At least one third party is chosen according to the third-party information, and is believed according to the third-party address information or mark
Breath is used by the information of user's input or according to the third party that the user information that the information that user inputs obtains is sent to selection
Terminal, so as to information that third party inputs user or be verified according to the user information that the information that user inputs obtains;
The verification result that the third party chosen is sent by used terminal is received, and institute is judged according to the verification result
State the confidence level of the information of user's input, wherein the third party of the selection is used to provide evidence for investigated user, described
Verification result is the information inputted to user or the user information that the information inputted according to user is obtained verify after use
Family information.
2. information credibility verification method according to claim 1, which is characterized in that judged according to the verification result
The confidence level of the information of user's input, comprising:
The matching degree between the verification result and the information of user input is calculated, is obtained according to calculated matching degree
The confidence level of the information of user's input.
3. information credibility verification method according to claim 2, which is characterized in that obtained according to calculated matching degree
After the confidence level of the information of user's input, further includes:
Judge whether the confidence level of user's input information reaches preset value;
If the confidence level reaches preset value, it is judged as that the information of user's input is believable.
4. information credibility verification method according to claim 2, which is characterized in that obtained according to calculated matching degree
The confidence level of the information of user's input, comprising:
The third-party confidence level for presetting selection obtains described according to calculated matching degree and preset confidence level
The confidence level of the information of user's input.
5. information credibility verification method according to claim 1, which is characterized in that selected according to the third-party information
Take at least one third party, comprising:
Credit value is chosen to be greater than at least one third party of preset value or choose that contact number with user whithin a period of time big
In at least one third party of threshold value, the third-party information include third-party credit value and third party whithin a period of time
Number is contacted with user.
6. information credibility verification method according to claim 1, which is characterized in that selected according to the third-party information
Take at least one third party, and according to the third-party address information or identification information, by the information of user's input or according to
The user information that the information of user's input obtains is sent to terminal used in the third party of selection, so that third party is defeated to user
The information that enters is verified according to the user information that the information that user inputs obtains, comprising:
If third-party address information is third-party email address information, inputted by the information of user's input or according to user
The obtained user information of information be sent to first server corresponding to third-party email address information, first server hair
Terminal used in the third party of selection is given, so as to information that third party inputs user or obtain according to the information that user inputs
To user information verified;
If third-party identification information is third-party account information, by the information of user's input or the letter inputted according to user
It ceases obtained user information and is sent to second server corresponding to third-party account information, second server is sent to selection
Third party used in terminal so that information that third party inputs user or the user obtained according to the information that user inputs
Information is verified.
7. a kind of information credibility verifies device, which is characterized in that the information credibility verifies device, comprising:
Determining module is related to the user according to the information determination of user input for obtaining the information of user's input
The third-party information of connection, the third-party information includes address information or identification information;
Collect evidence module, for choosing at least one third party according to the third-party information, and according to it is described third-partyly
Location information or identification information are sent to selection by the information of user's input or according to the user information that the information that user inputs obtains
Third party used in terminal so that information that third party inputs user or the user obtained according to the information that user inputs
Information is verified;
Credibility judgement module, the verification result sent for receiving the third party chosen by used terminal, and according to
The verification result judges the confidence level of the information of user's input, wherein the third party of the selection is used to be adjusted
The user looked into provides evidence, and the verification result is the information inputted to user or the use obtained to the information inputted according to user
Family information verified after user information.
8. information credibility according to claim 7 verifies device, which is characterized in that the Credibility judgement module, packet
It includes:
Computing module, for calculating the matching degree between the verification result and the information of user input, according to calculating
Matching degree out obtains the confidence level of the information of user's input.
9. information credibility according to claim 8 verifies device, which is characterized in that the Credibility judgement module, also
Include:
Judgment module, for judging whether the confidence level of user's input information reaches preset value;If the confidence level reaches
Preset value is then judged as that the information of user's input is believable.
10. information credibility according to claim 8 verifies device, which is characterized in that the computing module is also used to pre-
It is defeated to obtain the user according to calculated matching degree and preset confidence level for the third-party confidence level for first setting selection
The confidence level of the information entered.
11. information credibility according to claim 7 verifies device, which is characterized in that the evidence obtaining module is also used to select
It takes credit value to be greater than at least one third party of preset value or choose and contacts number with user whithin a period of time greater than threshold value
At least one third party, the third-party information include third-party credit value and third party whithin a period of time with user
Contact number.
12. information credibility according to claim 7 verifies device, which is characterized in that the evidence obtaining module, if being also used to
Third-party address information is third-party email address information, then by the information of user's input or the information inputted according to user
Obtained user information is sent to first server corresponding to third-party email address information, and first server is sent to choosing
Terminal used in the third party taken, so that the information that third party inputs user or the use obtained according to the information that user inputs
Family information is verified;If third-party identification information be third-party account information, by user input information or according to
The user information that the information of user's input obtains is sent to second server corresponding to third-party account information, second service
Device is sent to terminal used in the third party of selection, so that information that third party inputs user or the letter inputted according to user
Obtained user information is ceased to be verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310307092.3A CN104333530B (en) | 2013-07-22 | 2013-07-22 | Information credibility verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310307092.3A CN104333530B (en) | 2013-07-22 | 2013-07-22 | Information credibility verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104333530A CN104333530A (en) | 2015-02-04 |
CN104333530B true CN104333530B (en) | 2019-02-22 |
Family
ID=52408184
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310307092.3A Active CN104333530B (en) | 2013-07-22 | 2013-07-22 | Information credibility verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104333530B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107995150B (en) * | 2016-10-27 | 2020-08-28 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN108932646B (en) * | 2017-05-26 | 2021-04-13 | 中移(杭州)信息技术有限公司 | User tag verification method and device based on operator and electronic equipment |
CN109325352A (en) * | 2018-08-28 | 2019-02-12 | 全球能源互联网研究院有限公司 | A kind of credible calculating platform framework |
CN109067791B (en) * | 2018-09-25 | 2020-05-12 | 阿里巴巴集团控股有限公司 | User identity authentication method and device in network |
CN110413654B (en) * | 2019-06-20 | 2023-11-21 | 平安科技(深圳)有限公司 | Method, device, computer equipment and storage medium for determining customer trusted contact information |
CN110930244B (en) * | 2019-11-27 | 2022-11-25 | 北京国腾联信科技有限公司 | Method and device for calculating credit investigation evaluation value of user |
CN110888864B (en) * | 2019-11-27 | 2022-08-23 | 北京国腾联信科技有限公司 | Automatic user data collection method and device |
CN114448706A (en) * | 2022-02-08 | 2022-05-06 | 恒安嘉新(北京)科技股份公司 | Single package authorization method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309190A (en) * | 2008-06-30 | 2008-11-19 | 腾讯科技(深圳)有限公司 | User organization management system and method thereof |
CN101599993A (en) * | 2009-06-30 | 2009-12-09 | 武汉中频科技有限公司 | A kind of network social intercourse system of many identity and implementation method |
CN101847143A (en) * | 2009-03-25 | 2010-09-29 | 欧阳炳宇 | Method for enhancing interaction authenticity experience in virtual human society |
CN102035846A (en) * | 2010-12-22 | 2011-04-27 | 北京航空航天大学 | Social network user identity authentication method based on relation statement |
CN102339445A (en) * | 2010-07-23 | 2012-02-01 | 阿里巴巴集团控股有限公司 | Method and system for evaluating credibility of network trade user |
CN103036869A (en) * | 2011-10-08 | 2013-04-10 | 美国博通公司 | Social device service and support via automatic group association |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008141256A2 (en) * | 2007-05-10 | 2008-11-20 | Mary Kay Hoal | Social networking system |
-
2013
- 2013-07-22 CN CN201310307092.3A patent/CN104333530B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309190A (en) * | 2008-06-30 | 2008-11-19 | 腾讯科技(深圳)有限公司 | User organization management system and method thereof |
CN101847143A (en) * | 2009-03-25 | 2010-09-29 | 欧阳炳宇 | Method for enhancing interaction authenticity experience in virtual human society |
CN101599993A (en) * | 2009-06-30 | 2009-12-09 | 武汉中频科技有限公司 | A kind of network social intercourse system of many identity and implementation method |
CN102339445A (en) * | 2010-07-23 | 2012-02-01 | 阿里巴巴集团控股有限公司 | Method and system for evaluating credibility of network trade user |
CN102035846A (en) * | 2010-12-22 | 2011-04-27 | 北京航空航天大学 | Social network user identity authentication method based on relation statement |
CN103036869A (en) * | 2011-10-08 | 2013-04-10 | 美国博通公司 | Social device service and support via automatic group association |
Also Published As
Publication number | Publication date |
---|---|
CN104333530A (en) | 2015-02-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104333530B (en) | Information credibility verification method and device | |
US11002822B2 (en) | Service enhancements using near field communication | |
CN104243517B (en) | Content share method and device between different terminals | |
US11176237B2 (en) | Modifying security state with secured range detection | |
CA2919113C (en) | Processing electronic tokens | |
US11658963B2 (en) | Cooperative communication validation | |
CN103916244B (en) | Verification method and device | |
US10659453B2 (en) | Dual channel identity authentication | |
US8315595B2 (en) | Providing trusted communication | |
US20150319137A1 (en) | Techniques to monitor connection paths on networked devices | |
EP3150022A1 (en) | Client applications communicating via a user tunnel | |
CN105306204A (en) | Security verification method, device and system | |
CN104346560B (en) | A kind of safe verification method and device | |
CN108234124B (en) | Identity verification method, device and system | |
JP2013097650A (en) | Authentication system, authentication method and authentication server | |
CN103679000A (en) | Apparatus and method for remotely deleting critical information | |
CN105592005B (en) | Security verification method, device and system | |
CN104980420A (en) | Business processing method, device, terminal and server | |
CN104348655B (en) | The safe and healthy degree determination method of system and device | |
US20140215582A1 (en) | Verification system and verification method | |
KR20150079379A (en) | Apparatus, system, and method for identifying a man-in-the-middle connection | |
CN108306907A (en) | A kind of management method of terminal, network function and terminal | |
CN108234113B (en) | Identity verification method, device and system | |
CN108234412A (en) | Auth method and device | |
US9202016B2 (en) | Management of private information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |