CN106028334A - Method and device for identifying information and terminal - Google Patents

Method and device for identifying information and terminal Download PDF

Info

Publication number
CN106028334A
CN106028334A CN201610274586.XA CN201610274586A CN106028334A CN 106028334 A CN106028334 A CN 106028334A CN 201610274586 A CN201610274586 A CN 201610274586A CN 106028334 A CN106028334 A CN 106028334A
Authority
CN
China
Prior art keywords
information
network address
legal
illegal
invalid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610274586.XA
Other languages
Chinese (zh)
Inventor
姜东亚
陈信吉
王广健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610274586.XA priority Critical patent/CN106028334A/en
Publication of CN106028334A publication Critical patent/CN106028334A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The invention discloses a method and a device for identifying information and a terminal. The method comprises the following steps of extracting a website and a principal name in the information when receiving the website included in the information; and determining the information as illegal information when the website is mismatched with a preset legal website corresponding to the principal name. Through application of the embodiments, the terminal extracts the website and the principal name for the received information including the website, and determines the information as the illegal information when the extracted website is mismatched with the legal website corresponding to the principal name, so that a defect of judging whether the information is fraud information through a number of an information sender in the correlation technique is solved and the accurate and the legality of the information can be judged accurately and fast.

Description

The recognition methods of information, device and terminal
Technical field
It relates to information discriminating technology field, particularly relate to the recognition methods of a kind of information, device and Terminal.
Background technology
In correlation technique, terminal allows user to be marked the number receiving information, such as, will send The number mark crossing swindle information is swindle number, then when other users receive the information of this number, Can enhance your vigilance according to its labelling, so as not to the network address clicked in information and swindled.But this There is following defect in the mode of kind: swindle side can change number easily, or uses pseudo-base station identity to send Swindle information, such terminal or server just cannot effectively identify sender number, thus can not sentence in time Disconnected swindle information.
Summary of the invention
For overcoming problem present in correlation technique, present disclose provides the recognition methods of a kind of information, dress Put and terminal.
First aspect according to disclosure embodiment, it is provided that the recognition methods of a kind of information, including:
When comprising network address in the information received, extract the main body name in described network address and described information Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute The information of stating is invalid information.
Optionally, the corresponding relation of legal principal name and legal network address is stored.
Optionally, the described legal network address in described network address and the corresponding described principal name pre-seted is not Timing, determines that described information is invalid information, including:
Read described corresponding relation;
The legal network address corresponding with the principal name extracted is determined based on described corresponding relation;
The network address extracted with determined by legal network address do not mate time, determine that described information is for illegal letter Breath.
Optionally, described the network address extracted with determined by legal network address do not mate time, determine described Information is invalid information, including:
The network address extracted with determined by legal network address do not mate time, read pre-stored illegal main body The illegal website information that title is corresponding;
When the network address extracted is mated with described illegal network address, determine that described information is invalid information.
Optionally, after the principal name in the described network address of described extraction and described information, described method Also include:
The network address extracted do not mate with described illegal network address and with determined by legal network address do not mate Time, determine that described information is doubtful invalid information.
Optionally, described determine that described information is invalid information after, described method also includes:
Export the information that described information is invalid information.
Optionally, after the described information of described output is the information of invalid information, described method is also wrapped Include:
Shield described invalid information.
Second aspect according to disclosure embodiment, it is provided that the identification device of a kind of information, including:
Extraction module, when being configured to comprise network address in the information received, extract described network address and Principal name in described information;
Determine module, be configured to the legal net in described network address with the corresponding described principal name pre-seted When location is not mated, determine that described information is invalid information.
Optionally, described device also includes:
Memory module, is configured to the corresponding relation storing legal principal name with legal network address.
Optionally, described determine that module includes:
First reading submodule, is configured to read described corresponding relation;
First determines submodule, is configured to determine and the principal name extracted based on described corresponding relation Corresponding legal network address;
Second determines submodule, be configured to the network address extracted with determined by legal network address do not mate Time, determine that described information is invalid information.
Optionally, described second determines that submodule includes:
Second reading submodule, be configured to the network address extracted with determined by legal network address do not mate Time, read the illegal website information that the illegal principal name of pre-stored is corresponding;
3rd determines submodule, is configured to when the network address extracted is mated with described illegal network address, really Fixed described information is invalid information.
Optionally, described device also includes:
4th determines submodule, be configured to not mate with described illegal network address in the network address extracted and When legal network address is not mated determined by with, determine that described information is doubtful invalid information.
Optionally, described device also includes:
Output module, is configured to export the information that described information is invalid information.
Optionally, described device also includes:
Shroud module, is configured to shield described invalid information.
The third aspect according to disclosure embodiment, it is provided that a kind of terminal, including: processor;For depositing The memorizer of storage processor executable;Wherein, described processor is configured to:
When comprising network address in the information received, extract the main body name in described network address and described information Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute The information of stating is invalid information.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
In the disclosure, terminal is for the information comprising network address received, and extracts network address and principal name, and The network address extracted with to should the legal network address of principal name do not mate time, determine that this information is illegal Information, thus, solve in correlation technique and judge whether information is swindleness by the number of information sender Deceive the defect of information, it is possible to the legitimacy of information is made and judges quickly and accurately.
In the disclosure, terminal can prestore the corresponding relation of legal principal name and legal network address, in order to In based on the network address in information, the legitimacy of information being judged.
In the disclosure, the network address in information can also be mated by terminal with the illegal network address of pre-stored, as Fruit coupling, it can be determined that this information is invalid information, thus improves the accuracy rate of judgement, it is to avoid leakage occurs Sentence or judge by accident.
Network address during terminal is also based on information in the disclosure and legal network address and illegal network address mate feelings Condition determines doubtful invalid information, in order to remind user with different brackets.
In the disclosure, terminal can export information for invalid information, to remind user to invalid information Enhance your vigilance, it is to avoid swindled because clicking illegal network address, lose property.
In the disclosure, terminal can also directly shield invalid information, beats to avoid invalid information to cause user Disturb.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe , the disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet these public affairs The embodiment opened, and for explaining the principle of the disclosure together with description.
Fig. 1 is the disclosure recognition methods flow chart according to a kind of information shown in an exemplary embodiment.
Fig. 2 is the disclosure recognition methods flow process according to the another kind of information shown in an exemplary embodiment Figure.
Fig. 3 is the disclosure applied field according to the recognition methods of a kind of information shown in an exemplary embodiment Scape schematic diagram.
Fig. 4 is the disclosure identification device block diagram according to a kind of information shown in an exemplary embodiment.
Fig. 5 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 6 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 7 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 8 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 9 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Figure 10 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Figure 11 is that the disclosure is according to a kind of identification device for information shown in an exemplary embodiment One structural representation.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following When description relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous Key element.Embodiment described in following exemplary embodiment does not represent the institute consistent with the disclosure There is embodiment.On the contrary, they only with as appended claims describes in detail, the one of the disclosure The example of the apparatus and method that a little aspects are consistent.
The term used in the disclosure is only merely for describing the purpose of specific embodiment, and is not intended to be limiting The disclosure." a kind of " of singulative used in disclosure and the accompanying claims book, " institute State " and " being somebody's turn to do " be also intended to include most form, unless context clearly shows that other implications.Also should Work as understanding, term "and/or" used herein refer to and comprise one or more be associated list item Any or all possible combination of purpose.
Although should be appreciated that may use term first, second, third, etc. various to describe in the disclosure Information, but these information should not necessarily be limited by these terms.These terms only be used for by same type of information that This distinguishes.Such as, without departing from the scope of this disclosure, the first information can also be referred to as Two information, similarly, the second information can also be referred to as the first information.Depend on linguistic context, as in this institute Use word " if " can be construed to " and ... time " or " when ... time " or " response In determining ".
As it is shown in figure 1, Fig. 1 is the recognition methods stream according to a kind of information shown in an exemplary embodiment Cheng Tu, the method may be used for, in terminal, comprising the following steps:
Step 101, when comprising network address in the information received, extract the master in network address and this information Body title.
Terminal in the disclosure can be any intelligent terminal with function of surfing the Net, for example, it is possible to specifically For mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant) etc..Its In, terminal can pass through WLAN couple in router, and by the service on router access public network Device.
The information that end-on receives, such as note are identified, if including URL in this information (Uniform Resoure Locator, URL) links, then extract this network address, and extract Principal name in information, principal name such as: Taobao, industrial and commercial bank, Construction Bank etc..
Step 102, the network address extracted with pre-set to should principal name legal network address not Timing, determines that this information is invalid information.
In disclosure embodiment, collect and store the corresponding pass of each legal principal name and legal network address in advance System.
In above-described embodiment, terminal, for the information comprising network address received, extracts network address and main body name Claim, and the network address extracted with to should the legal network address of principal name do not mate time, determine this information For invalid information, thus, solve in correlation technique and judge that information is by the number of information sender The no defect for swindle information, it is possible to the legitimacy of information is made and judges quickly and accurately.
As in figure 2 it is shown, Fig. 2 is the recognition methods according to the another kind of information shown in an exemplary embodiment Flow chart, the method may be used for, in terminal, comprising the following steps:
Step 201, receive information.
In disclosure embodiment, information illustrates as a example by note.
Step 202, judge receive information in whether comprise network address.
In disclosure embodiment, the character comprised in note is identified by terminal, meets specific format Character can be identified as network address, the statement such as started with " www. " or with " http: // " beginning Statement.
Step 203, when comprising network address in the information received, extract the master in network address and this information Body title.
In disclosure step, terminal can be pre-stored with legal principal name, and to the word in note Language extracts and mates, if matched with the legal principal name of pre-stored, can directly carry Take.
Step 204, the legal principal name of reading pre-stored and the corresponding relation of legal network address.
In disclosure embodiment, the correspondence of the legal network address of legal principal name and correspondence can be collected in advance Relation.Such as, for principal name Taobao, https: //www.taobao.com/, https://www.tmall.com/?The network address such as spm=a21bo.50862.201859.1.rIrOmU are all and wash in a pan The legal network address that precious net is corresponding, the carrying out of its correspondence is stored by terminal.
Step 205, determine the legal network address corresponding with the principal name extracted based on corresponding relation.
By inquiry corresponding relation, it may be determined that the legal network address corresponding with the principal name extracted.
Step 206, judge the network address extracted with determined by legal network address whether mate.
In disclosure embodiment, in order to obtain the trust of user, the principal name in information is legal master Body, the corresponding relation of legal principal name with legal network address by reading pre-stored, it is possible to determine and letter The legal network address that the principal name that extracts in breath is corresponding, then, if the network address extracted with determined Legal network address do not mate, it is possible to determine that this information is invalid information, i.e. swindle information.
Step 207, when being judged as not mating, read corresponding illegal of illegal principal name of pre-stored Network address.
In order to further determine that whether note is swindle information, it is also possible to will extract note in network address with The illegal network address of pre-stored is done and is mated.
Step 208, when the network address extracted is mated with illegal network address, determine that this information is invalid information.
It should be noted that if the network address in information is not mated with legal network address and illegal network address the most not Coupling, then this information can be defined as general information, or safety information, and terminal does not do any place Reason.
Step 209, export the prompting that this information is invalid information.
Terminal exports this prompting, it is possible to remind user in time, in order to avoid user clicks in note Illegal network address, is swindled, and loses property.
Additionally, terminal is also based on the setting of user, directly this invalid information is shielded, thus User will not be caused and bother.
For the information corresponding with legal network address and the illegal the most unmatched network address of network address, it can be determined that be doubtful Like invalid information, to doubtful invalid information, terminal can also export corresponding prompting, to remind user to carry High vigilant.
As it is shown on figure 3, Fig. 3 is the disclosure identification according to a kind of information shown in an exemplary embodiment The application scenarios schematic diagram of method.In the scene shown in Fig. 3, including: as the smart mobile phone of terminal.
After smart mobile phone receives the note that sender number is 95588, extract the field in note, to sentence Break and whether comprise network address statement, when being judged as comprising network address, extract this network address Www.wap95588con.cc, and extract the principal name industrial and commercial bank in note;Then, smart mobile phone The legal network address of inquiry pre-stored and the corresponding relation of legal principal name, with the main body name determined with extract Claim the legal network address that industrial and commercial bank is corresponding, and judge that network address www.wap95588con.cc extracted is with true Whether fixed legal network address mates, it is judged that result, for not mate, determines that this note is invalid information, output Corresponding prompting.It can thus be seen that sender number 95588 is possible for the number of pseudo-base station, and The number of non-industrial and commercial bank, in this case, if using entering based on sender number in correlation technique The scheme that row judges, then this information of None-identified is swindle information.
In application scenarios shown in Fig. 3, it is achieved the detailed process of the identification of information may refer to aforementioned to figure Description in 1-2, does not repeats them here.
Corresponding with the recognition methods embodiment of aforementioned information, the disclosure additionally provides the identification device of information And the embodiment of the terminal applied.
As shown in Figure 4, Fig. 4 is the disclosure identification according to a kind of information shown in an exemplary embodiment Device block diagram, described device can apply in the terminal, and may be used for the method shown in Fig. 1 that performs, This device may include that extraction module 410 and determines module 420.
Extraction module 410, when being configured to comprise network address in the information received, extract this network address with And the principal name in described information;
Determining module 420, the network address being configured to extract at extraction module 410 is corresponding main with pre-set When the legal network address of body title is not mated, determine that this information is invalid information.
In above-described embodiment, terminal, for the information comprising network address received, extracts network address and main body name Claim, and the network address extracted with to should the legal network address of principal name do not mate time, determine this information For invalid information, thus, solve in correlation technique and judge that information is by the number of information sender The no defect for swindle information, it is possible to the legitimacy of information is made and judges quickly and accurately.
As it is shown in figure 5, Fig. 5 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment Other device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 4, and this device can also include: Memory module 430.
Memory module 430, is configured to the corresponding relation storing legal principal name with legal network address.
As shown in Figure 6, Fig. 6 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment Other device block diagram, this embodiment, on the basis of aforementioned embodiment illustrated in fig. 5, determines that module 420 is permissible Including: the first reading submodule 421, first determine that submodule 422 and second determines submodule 423.
First reading submodule 421, is configured to read corresponding relation;
First determines submodule 422, is configured to the corresponding pass read based on the first reading submodule 421 System determines the legal network address corresponding with the principal name extracted;
Second determines submodule 423, is configured to determine submodule 422 in the network address extracted and first Determined by legal network address when not mating, determine that this information is invalid information.
In above-described embodiment, terminal can prestore the corresponding relation of legal principal name and legal network address, So that the legitimacy of information being judged based on the network address in information.
Fill as it is shown in fig. 7, Fig. 7 is the disclosure according to the identification of the another kind of information shown in an exemplary embodiment Putting block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 6, and second determines that submodule 423 can To include: the second reading submodule 424 and the 3rd determines submodule 425.
Second reading submodule 424, be configured to the network address extracted with determined by legal network address not During coupling, read the illegal website information that the illegal principal name of pre-stored is corresponding;
3rd determines submodule 425, is configured in the network address extracted and the second reading submodule 424 Illegal network address coupling time, determine that this information is invalid information.
In above-described embodiment, the illegal network address of the network address in information Yu pre-stored can also be carried out by terminal Join, if it does, may determine that this information is invalid information, thus improve the accuracy rate of judgement, it is to avoid Occur failing to judge or judging by accident.
As shown in Figure 8, Fig. 8 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment Other device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 6, and this determines module 420 also May include that the 4th determines submodule 426.
4th determines submodule 426, be configured to not mate with illegal network address in the network address extracted and When legal network address is not mated determined by with, determine that this information is doubtful invalid information.
In above-described embodiment, the network address that terminal is also based in information and legal network address and illegally network address Match condition determines doubtful invalid information, in order to remind user with different brackets.
As it is shown in figure 9, Fig. 9 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment Other device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 4, and this device can also include: Output module 440.
Output module 440, is configured to the information that output information is invalid information.
In above-described embodiment, terminal can export information for invalid information, to remind user to non- Method information is enhanced your vigilance, it is to avoid swindled because clicking illegal network address, loses property.
As shown in Figure 10, Figure 10 is that the disclosure is according to the another kind of information shown in an exemplary embodiment Identifying device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 9, and this device can also wrap Include: shroud module 450.
Shroud module 450, is configured to shield invalid information.
In above-described embodiment, terminal can also directly shield invalid information, to avoid invalid information to user Cause and bother.
The identification device embodiment of the information shown in above-mentioned Fig. 4 to Figure 10 can be applied in the terminal.
In said apparatus, the function of unit and the process that realizes of effect specifically refer in said method corresponding Step realize process, do not repeat them here.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part ginseng See that the part of embodiment of the method illustrates.Device embodiment described above is only schematically, The wherein said unit illustrated as separating component can be or may not be physically separate, makees The parts shown for unit can be or may not be physical location, i.e. may be located at a place, Or can also be distributed on multiple NE.Can select according to the actual needs part therein or The whole module of person realizes the purpose of disclosure scheme.Those of ordinary skill in the art are not paying creativeness In the case of work, i.e. it is appreciated that and implements.
Corresponding with Fig. 1, the disclosure also provides for a kind of terminal, and this terminal can include processor;With Memorizer in storage processor executable;Wherein, described processor is configured to:
When comprising network address in the information received, extract the main body name in described network address and described information Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute The information of stating is invalid information.
As shown in figure 11, Figure 11 be the disclosure according to the one shown in an exemplary embodiment for information Identify device 1100 a structural representation (end side).Such as, device 1100 can be to have The mobile phone of routing function, computer, digital broadcast terminal, messaging devices, game console, Tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 11, device 1100 can include following one or more assembly: processes assembly 1102, Memorizer 1104, power supply module 1106, multimedia groupware 1108, audio-frequency assembly 1110, input/output (I/O) interface 1112, sensor cluster 1114, and communications component 1116.
Process assembly 1102 and generally control the integrated operation of device 1100, such as with display, call, The operation that data communication, camera operation and record operation are associated.Process assembly 1102 and can include one Or multiple processor 1120 performs instruction, to complete all or part of step of above-mentioned method.Additionally, Process assembly 1102 and can include one or more module, it is simple to process assembly 1102 and other assemblies it Between mutual.Such as, process assembly 1102 and can include multi-media module, to facilitate multimedia groupware 1108 and process between assembly 1102 mutual.
Memorizer 1104 is configured to store various types of data to support the operation at device 1100. The example of these data includes any application program for operation on device 1100 or the instruction of method, Contact data, telephone book data, message, picture, video etc..Memorizer 1104 can be by any class The volatibility of type or non-volatile memory device or combinations thereof realize, such as static random access memory Device (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable programmable is only Reading memorizer (EPROM), programmable read only memory (PROM), read only memory (ROM), Magnetic memory, flash memory, disk or CD.
The various assemblies that power supply module 1106 is device 1100 provide electric power.Power supply module 1106 can wrap Include power-supply management system, one or more power supplys, and other generate with for device 1100, manage and distribute The assembly that electric power is associated.
One output interface of offer that multimedia groupware 1108 is included between described device 1100 and user Screen.In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP). If screen includes that touch panel, screen may be implemented as touch screen, to receive the input from user Signal.Touch panel includes that one or more touch sensor touches with sensing, slides and on touch panel Gesture.Described touch sensor can not only sense touch or the border of sliding action, but also detects The persistent period relevant to described touch or slide and pressure.In certain embodiments, multimedia group Part 1108 includes a front-facing camera and/or post-positioned pick-up head.When device 1100 is in operator scheme, During such as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive many matchmakers of outside Volume data.Each front-facing camera and post-positioned pick-up head can be a fixing optical lens system or tool There are focal length and optical zoom ability.
Audio-frequency assembly 1110 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1110 Including a mike (MIC), when device 1100 is in operator scheme, such as call model, record mould When formula and speech recognition mode, mike is configured to receive external audio signal.The audio frequency letter received Number can be further stored at memorizer 1104 or send via communications component 1116.Implement at some In example, audio-frequency assembly 1110 also includes a speaker, is used for exporting audio signal.
I/O interface 1112 is to process to provide interface between assembly 1102 and peripheral interface module, above-mentioned outside Enclosing interface module can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: homepage Button, volume button, start button and locking press button.
Sensor cluster 1114 includes one or more sensor, for providing each side for device 1100 The state estimation in face.Such as, what sensor cluster 1114 can detect device 1100 beats opening/closing shape State, the relative localization of assembly, the most described assembly is display and the keypad of device 1100, sensor Assembly 1114 can also detect device 1100 or the position change of 1,100 1 assemblies of device, user and dress Put the presence or absence of 1100 contacts, device 1100 orientation or acceleration/deceleration and the temperature of device 1100 Degree change.Sensor cluster 1114 can include proximity transducer, is configured to do not having any thing The existence of object near detection during reason contact.Sensor cluster 1114 can also include optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, should Sensor cluster 1114 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure Sensor, microwave remote sensor or temperature sensor.
Communications component 1116 is configured to facilitate wired or wireless mode between device 1100 and other equipment Communication.Device 1100 can access wireless network based on communication standard, such as WiFi, 2G or 3G, Or combinations thereof.In one exemplary embodiment, communications component 1116 receives via broadcast channel From broadcast singal or the broadcast related information of external broadcasting management system.In one exemplary embodiment, Described communications component 1116 also includes near-field communication (NFC) module, to promote junction service.Such as, Can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, Ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1100 can be by one or more application specific integrated circuits (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), can compile Journey logical device (PLD), field programmable gate array (FPGA), controller, microcontroller, micro- Processor or other electronic components realize, and are used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage including instruction is additionally provided Medium, such as, include the memorizer 1104 of instruction, and above-mentioned instruction can be by the processor 1120 of device 1100 Perform to complete said method.Such as, described non-transitory computer-readable recording medium can be ROM, Random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Disclosure embodiment additionally provides a kind of non-transitory computer-readable recording medium, when described storage When instruction in medium is performed by the processor of mobile terminal so that mobile terminal is able to carry out a kind of message Sending method, described method includes:
When comprising network address in the information received, extract the main body name in described network address and described information Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute The information of stating is invalid information.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to this Other embodiment disclosed.The disclosure is intended to any modification, purposes or the adaptability of the disclosure Change, these modification, purposes or adaptations are followed the general principle of the disclosure and include these public affairs Open undocumented common knowledge in the art or conventional techniques means.Description and embodiments only by Being considered as exemplary, the true scope of the disclosure and spirit are pointed out by claim below.
The foregoing is only the preferred embodiment of the disclosure, not in order to limit the disclosure, all at this Within disclosed spirit and principle, any modification, equivalent substitution and improvement etc. done, should be included in Within the scope of disclosure protection.

Claims (15)

1. the recognition methods of an information, it is characterised in that including:
When comprising network address in the information received, extract the main body name in described network address and described information Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute The information of stating is invalid information.
Method the most according to claim 1, it is characterised in that described method also includes:
Store the corresponding relation of legal principal name and legal network address.
Method the most according to claim 2, it is characterised in that described described network address with pre-set The legal network address of correspondence described principal name when not mating, determine that described information is invalid information, including:
Read described corresponding relation;
The legal network address corresponding with the principal name extracted is determined based on described corresponding relation;
The network address extracted with determined by legal network address do not mate time, determine that described information is for illegal letter Breath.
Method the most according to claim 3, it is characterised in that described in the network address extracted and institute When the legal network address determined is not mated, determine that described information is invalid information, including:
The network address extracted with determined by legal network address do not mate time, read pre-stored illegal main body The illegal website information that title is corresponding;
When the network address extracted is mated with described illegal network address, determine that described information is invalid information.
Method the most according to claim 4, it is characterised in that the described network address of described extraction and institute After stating the principal name in information, described method also includes:
The network address extracted do not mate with described illegal network address and with determined by legal network address do not mate Time, determine that described information is doubtful invalid information.
Method the most according to claim 1, it is characterised in that described determine that described information is illegal After information, described method also includes:
Export the information that described information is invalid information.
Method the most according to claim 6, it is characterised in that the described information of described output is illegal After the information of information, described method also includes:
Shield described invalid information.
8. the identification device of an information, it is characterised in that including:
Extraction module, when being configured to comprise network address in the information received, extract described network address and Principal name in described information;
Determine module, be configured to the legal net in described network address with the corresponding described principal name pre-seted When location is not mated, determine that described information is invalid information.
Device the most according to claim 8, it is characterised in that described device also includes:
Memory module, is configured to the corresponding relation storing legal principal name with legal network address.
Device the most according to claim 9, it is characterised in that described determine that module includes:
First reading submodule, is configured to read described corresponding relation;
First determines submodule, is configured to determine and the principal name extracted based on described corresponding relation Corresponding legal network address;
Second determines submodule, be configured to the network address extracted with determined by legal network address do not mate Time, determine that described information is invalid information.
11. devices according to claim 10, it is characterised in that described second determines submodule bag Include:
Second reading submodule, be configured to the network address extracted with determined by legal network address do not mate Time, read the illegal website information that the illegal principal name of pre-stored is corresponding;
3rd determines submodule, is configured to when the network address extracted is mated with described illegal network address, really Fixed described information is invalid information.
12. devices according to claim 11, it is characterised in that described determine that module also includes:
4th determines submodule, be configured to not mate with described illegal network address in the network address extracted and When legal network address is not mated determined by with, determine that described information is doubtful invalid information.
13. devices according to claim 8, it is characterised in that described device also includes:
Output module, is configured to export the information that described information is invalid information.
14. devices according to claim 13, it is characterised in that described device also includes:
Shroud module, is configured to shield described invalid information.
15. 1 kinds of terminals, it is characterised in that including: processor;For storing processor executable Memorizer;Wherein, described processor is configured to:
When comprising network address in the information received, extract the main body name in described network address and described information Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute The information of stating is invalid information.
CN201610274586.XA 2016-04-28 2016-04-28 Method and device for identifying information and terminal Pending CN106028334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610274586.XA CN106028334A (en) 2016-04-28 2016-04-28 Method and device for identifying information and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610274586.XA CN106028334A (en) 2016-04-28 2016-04-28 Method and device for identifying information and terminal

Publications (1)

Publication Number Publication Date
CN106028334A true CN106028334A (en) 2016-10-12

Family

ID=57081334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610274586.XA Pending CN106028334A (en) 2016-04-28 2016-04-28 Method and device for identifying information and terminal

Country Status (1)

Country Link
CN (1) CN106028334A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941673A (en) * 2017-02-28 2017-07-11 珠海市魅族科技有限公司 Fraud text message recognition methods and device
CN109039995A (en) * 2017-06-09 2018-12-18 腾讯科技(深圳)有限公司 A kind of invalid information recognition methods, device and equipment
CN109729185A (en) * 2018-12-26 2019-05-07 珠海市小源科技有限公司 A kind of short message port recognition methods and device based on network address
CN111093199A (en) * 2019-11-25 2020-05-01 维沃移动通信有限公司 Information prompting method and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790752A (en) * 2011-05-20 2012-11-21 盛乐信息技术(上海)有限公司 Fraud information filtering system and method on basis of feature identification
CN102801706A (en) * 2012-06-28 2012-11-28 宇龙计算机通信科技(深圳)有限公司 Terminal and security processing method for information contents
CN103220641A (en) * 2012-01-19 2013-07-24 联想(北京)有限公司 Information processing method and electronic terminal
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104185158A (en) * 2014-09-01 2014-12-03 北京奇虎科技有限公司 Malicious short message processing method and client based on false base station
CN105101213A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Information processing method and device
US20160007204A1 (en) * 2014-07-01 2016-01-07 Samsung Electronics Co., Ltd. Method and apparatus of notifying of smishing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790752A (en) * 2011-05-20 2012-11-21 盛乐信息技术(上海)有限公司 Fraud information filtering system and method on basis of feature identification
CN103220641A (en) * 2012-01-19 2013-07-24 联想(北京)有限公司 Information processing method and electronic terminal
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN102801706A (en) * 2012-06-28 2012-11-28 宇龙计算机通信科技(深圳)有限公司 Terminal and security processing method for information contents
US20160007204A1 (en) * 2014-07-01 2016-01-07 Samsung Electronics Co., Ltd. Method and apparatus of notifying of smishing
CN104185158A (en) * 2014-09-01 2014-12-03 北京奇虎科技有限公司 Malicious short message processing method and client based on false base station
CN105101213A (en) * 2015-06-26 2015-11-25 小米科技有限责任公司 Information processing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941673A (en) * 2017-02-28 2017-07-11 珠海市魅族科技有限公司 Fraud text message recognition methods and device
CN109039995A (en) * 2017-06-09 2018-12-18 腾讯科技(深圳)有限公司 A kind of invalid information recognition methods, device and equipment
CN109039995B (en) * 2017-06-09 2021-03-16 腾讯科技(深圳)有限公司 Illegal information identification method, device and equipment
CN109729185A (en) * 2018-12-26 2019-05-07 珠海市小源科技有限公司 A kind of short message port recognition methods and device based on network address
CN111093199A (en) * 2019-11-25 2020-05-01 维沃移动通信有限公司 Information prompting method and electronic equipment

Similar Documents

Publication Publication Date Title
CN106709399A (en) Fingerprint identification method and device
CN104159275B (en) Method for connecting network and device
CN104105169B (en) From method and the device of the WLAN (wireless local area network) that is dynamically connected
CN104216742B (en) Brush machine control method and device based on password
CN105847243A (en) Method and device for accessing smart camera
CN105654302A (en) Payment method and device
CN104834559A (en) Notification message display method and device
CN106028334A (en) Method and device for identifying information and terminal
CN105099841A (en) Information sending methods and devices, terminal and router
CN105550235A (en) Information acquisition method and information acquisition apparatuses
CN108021932A (en) Data detection method, device and electronic equipment
CN106293961A (en) Text message processing method and device
CN106126082A (en) Control the method for terminal, device and terminal
CN105808469A (en) Data processing method and apparatus, terminal and intelligent device
CN106201126A (en) Touch screen and fingerprint recognition realize device and terminal unit
CN105933502A (en) Method and device for marking message to be in read status
CN104951470A (en) Electric coupon content showing method and device
CN105187671A (en) Recording method and device
CN109525652A (en) Information sharing method, device, equipment and storage medium
CN106372943A (en) Message processing method and device
CN106331328A (en) Information prompting method and device
CN105912922A (en) Information management method and device, and terminal
CN106101464A (en) Number mark method and device
CN104636320A (en) Data processing method and device
CN106303017A (en) Alarm processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012