CN106028334A - Method and device for identifying information and terminal - Google Patents
Method and device for identifying information and terminal Download PDFInfo
- Publication number
- CN106028334A CN106028334A CN201610274586.XA CN201610274586A CN106028334A CN 106028334 A CN106028334 A CN 106028334A CN 201610274586 A CN201610274586 A CN 201610274586A CN 106028334 A CN106028334 A CN 106028334A
- Authority
- CN
- China
- Prior art keywords
- information
- network address
- legal
- illegal
- invalid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Abstract
The invention discloses a method and a device for identifying information and a terminal. The method comprises the following steps of extracting a website and a principal name in the information when receiving the website included in the information; and determining the information as illegal information when the website is mismatched with a preset legal website corresponding to the principal name. Through application of the embodiments, the terminal extracts the website and the principal name for the received information including the website, and determines the information as the illegal information when the extracted website is mismatched with the legal website corresponding to the principal name, so that a defect of judging whether the information is fraud information through a number of an information sender in the correlation technique is solved and the accurate and the legality of the information can be judged accurately and fast.
Description
Technical field
It relates to information discriminating technology field, particularly relate to the recognition methods of a kind of information, device and
Terminal.
Background technology
In correlation technique, terminal allows user to be marked the number receiving information, such as, will send
The number mark crossing swindle information is swindle number, then when other users receive the information of this number,
Can enhance your vigilance according to its labelling, so as not to the network address clicked in information and swindled.But this
There is following defect in the mode of kind: swindle side can change number easily, or uses pseudo-base station identity to send
Swindle information, such terminal or server just cannot effectively identify sender number, thus can not sentence in time
Disconnected swindle information.
Summary of the invention
For overcoming problem present in correlation technique, present disclose provides the recognition methods of a kind of information, dress
Put and terminal.
First aspect according to disclosure embodiment, it is provided that the recognition methods of a kind of information, including:
When comprising network address in the information received, extract the main body name in described network address and described information
Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute
The information of stating is invalid information.
Optionally, the corresponding relation of legal principal name and legal network address is stored.
Optionally, the described legal network address in described network address and the corresponding described principal name pre-seted is not
Timing, determines that described information is invalid information, including:
Read described corresponding relation;
The legal network address corresponding with the principal name extracted is determined based on described corresponding relation;
The network address extracted with determined by legal network address do not mate time, determine that described information is for illegal letter
Breath.
Optionally, described the network address extracted with determined by legal network address do not mate time, determine described
Information is invalid information, including:
The network address extracted with determined by legal network address do not mate time, read pre-stored illegal main body
The illegal website information that title is corresponding;
When the network address extracted is mated with described illegal network address, determine that described information is invalid information.
Optionally, after the principal name in the described network address of described extraction and described information, described method
Also include:
The network address extracted do not mate with described illegal network address and with determined by legal network address do not mate
Time, determine that described information is doubtful invalid information.
Optionally, described determine that described information is invalid information after, described method also includes:
Export the information that described information is invalid information.
Optionally, after the described information of described output is the information of invalid information, described method is also wrapped
Include:
Shield described invalid information.
Second aspect according to disclosure embodiment, it is provided that the identification device of a kind of information, including:
Extraction module, when being configured to comprise network address in the information received, extract described network address and
Principal name in described information;
Determine module, be configured to the legal net in described network address with the corresponding described principal name pre-seted
When location is not mated, determine that described information is invalid information.
Optionally, described device also includes:
Memory module, is configured to the corresponding relation storing legal principal name with legal network address.
Optionally, described determine that module includes:
First reading submodule, is configured to read described corresponding relation;
First determines submodule, is configured to determine and the principal name extracted based on described corresponding relation
Corresponding legal network address;
Second determines submodule, be configured to the network address extracted with determined by legal network address do not mate
Time, determine that described information is invalid information.
Optionally, described second determines that submodule includes:
Second reading submodule, be configured to the network address extracted with determined by legal network address do not mate
Time, read the illegal website information that the illegal principal name of pre-stored is corresponding;
3rd determines submodule, is configured to when the network address extracted is mated with described illegal network address, really
Fixed described information is invalid information.
Optionally, described device also includes:
4th determines submodule, be configured to not mate with described illegal network address in the network address extracted and
When legal network address is not mated determined by with, determine that described information is doubtful invalid information.
Optionally, described device also includes:
Output module, is configured to export the information that described information is invalid information.
Optionally, described device also includes:
Shroud module, is configured to shield described invalid information.
The third aspect according to disclosure embodiment, it is provided that a kind of terminal, including: processor;For depositing
The memorizer of storage processor executable;Wherein, described processor is configured to:
When comprising network address in the information received, extract the main body name in described network address and described information
Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute
The information of stating is invalid information.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
In the disclosure, terminal is for the information comprising network address received, and extracts network address and principal name, and
The network address extracted with to should the legal network address of principal name do not mate time, determine that this information is illegal
Information, thus, solve in correlation technique and judge whether information is swindleness by the number of information sender
Deceive the defect of information, it is possible to the legitimacy of information is made and judges quickly and accurately.
In the disclosure, terminal can prestore the corresponding relation of legal principal name and legal network address, in order to
In based on the network address in information, the legitimacy of information being judged.
In the disclosure, the network address in information can also be mated by terminal with the illegal network address of pre-stored, as
Fruit coupling, it can be determined that this information is invalid information, thus improves the accuracy rate of judgement, it is to avoid leakage occurs
Sentence or judge by accident.
Network address during terminal is also based on information in the disclosure and legal network address and illegal network address mate feelings
Condition determines doubtful invalid information, in order to remind user with different brackets.
In the disclosure, terminal can export information for invalid information, to remind user to invalid information
Enhance your vigilance, it is to avoid swindled because clicking illegal network address, lose property.
In the disclosure, terminal can also directly shield invalid information, beats to avoid invalid information to cause user
Disturb.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe
, the disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet these public affairs
The embodiment opened, and for explaining the principle of the disclosure together with description.
Fig. 1 is the disclosure recognition methods flow chart according to a kind of information shown in an exemplary embodiment.
Fig. 2 is the disclosure recognition methods flow process according to the another kind of information shown in an exemplary embodiment
Figure.
Fig. 3 is the disclosure applied field according to the recognition methods of a kind of information shown in an exemplary embodiment
Scape schematic diagram.
Fig. 4 is the disclosure identification device block diagram according to a kind of information shown in an exemplary embodiment.
Fig. 5 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 6 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 7 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 8 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Fig. 9 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Figure 10 is the disclosure identification device block diagram according to the another kind of information shown in an exemplary embodiment.
Figure 11 is that the disclosure is according to a kind of identification device for information shown in an exemplary embodiment
One structural representation.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Following
When description relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous
Key element.Embodiment described in following exemplary embodiment does not represent the institute consistent with the disclosure
There is embodiment.On the contrary, they only with as appended claims describes in detail, the one of the disclosure
The example of the apparatus and method that a little aspects are consistent.
The term used in the disclosure is only merely for describing the purpose of specific embodiment, and is not intended to be limiting
The disclosure." a kind of " of singulative used in disclosure and the accompanying claims book, " institute
State " and " being somebody's turn to do " be also intended to include most form, unless context clearly shows that other implications.Also should
Work as understanding, term "and/or" used herein refer to and comprise one or more be associated list item
Any or all possible combination of purpose.
Although should be appreciated that may use term first, second, third, etc. various to describe in the disclosure
Information, but these information should not necessarily be limited by these terms.These terms only be used for by same type of information that
This distinguishes.Such as, without departing from the scope of this disclosure, the first information can also be referred to as
Two information, similarly, the second information can also be referred to as the first information.Depend on linguistic context, as in this institute
Use word " if " can be construed to " and ... time " or " when ... time " or " response
In determining ".
As it is shown in figure 1, Fig. 1 is the recognition methods stream according to a kind of information shown in an exemplary embodiment
Cheng Tu, the method may be used for, in terminal, comprising the following steps:
Step 101, when comprising network address in the information received, extract the master in network address and this information
Body title.
Terminal in the disclosure can be any intelligent terminal with function of surfing the Net, for example, it is possible to specifically
For mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant) etc..Its
In, terminal can pass through WLAN couple in router, and by the service on router access public network
Device.
The information that end-on receives, such as note are identified, if including URL in this information
(Uniform Resoure Locator, URL) links, then extract this network address, and extract
Principal name in information, principal name such as: Taobao, industrial and commercial bank, Construction Bank etc..
Step 102, the network address extracted with pre-set to should principal name legal network address not
Timing, determines that this information is invalid information.
In disclosure embodiment, collect and store the corresponding pass of each legal principal name and legal network address in advance
System.
In above-described embodiment, terminal, for the information comprising network address received, extracts network address and main body name
Claim, and the network address extracted with to should the legal network address of principal name do not mate time, determine this information
For invalid information, thus, solve in correlation technique and judge that information is by the number of information sender
The no defect for swindle information, it is possible to the legitimacy of information is made and judges quickly and accurately.
As in figure 2 it is shown, Fig. 2 is the recognition methods according to the another kind of information shown in an exemplary embodiment
Flow chart, the method may be used for, in terminal, comprising the following steps:
Step 201, receive information.
In disclosure embodiment, information illustrates as a example by note.
Step 202, judge receive information in whether comprise network address.
In disclosure embodiment, the character comprised in note is identified by terminal, meets specific format
Character can be identified as network address, the statement such as started with " www. " or with " http: // " beginning
Statement.
Step 203, when comprising network address in the information received, extract the master in network address and this information
Body title.
In disclosure step, terminal can be pre-stored with legal principal name, and to the word in note
Language extracts and mates, if matched with the legal principal name of pre-stored, can directly carry
Take.
Step 204, the legal principal name of reading pre-stored and the corresponding relation of legal network address.
In disclosure embodiment, the correspondence of the legal network address of legal principal name and correspondence can be collected in advance
Relation.Such as, for principal name Taobao, https: //www.taobao.com/,
https://www.tmall.com/?The network address such as spm=a21bo.50862.201859.1.rIrOmU are all and wash in a pan
The legal network address that precious net is corresponding, the carrying out of its correspondence is stored by terminal.
Step 205, determine the legal network address corresponding with the principal name extracted based on corresponding relation.
By inquiry corresponding relation, it may be determined that the legal network address corresponding with the principal name extracted.
Step 206, judge the network address extracted with determined by legal network address whether mate.
In disclosure embodiment, in order to obtain the trust of user, the principal name in information is legal master
Body, the corresponding relation of legal principal name with legal network address by reading pre-stored, it is possible to determine and letter
The legal network address that the principal name that extracts in breath is corresponding, then, if the network address extracted with determined
Legal network address do not mate, it is possible to determine that this information is invalid information, i.e. swindle information.
Step 207, when being judged as not mating, read corresponding illegal of illegal principal name of pre-stored
Network address.
In order to further determine that whether note is swindle information, it is also possible to will extract note in network address with
The illegal network address of pre-stored is done and is mated.
Step 208, when the network address extracted is mated with illegal network address, determine that this information is invalid information.
It should be noted that if the network address in information is not mated with legal network address and illegal network address the most not
Coupling, then this information can be defined as general information, or safety information, and terminal does not do any place
Reason.
Step 209, export the prompting that this information is invalid information.
Terminal exports this prompting, it is possible to remind user in time, in order to avoid user clicks in note
Illegal network address, is swindled, and loses property.
Additionally, terminal is also based on the setting of user, directly this invalid information is shielded, thus
User will not be caused and bother.
For the information corresponding with legal network address and the illegal the most unmatched network address of network address, it can be determined that be doubtful
Like invalid information, to doubtful invalid information, terminal can also export corresponding prompting, to remind user to carry
High vigilant.
As it is shown on figure 3, Fig. 3 is the disclosure identification according to a kind of information shown in an exemplary embodiment
The application scenarios schematic diagram of method.In the scene shown in Fig. 3, including: as the smart mobile phone of terminal.
After smart mobile phone receives the note that sender number is 95588, extract the field in note, to sentence
Break and whether comprise network address statement, when being judged as comprising network address, extract this network address
Www.wap95588con.cc, and extract the principal name industrial and commercial bank in note;Then, smart mobile phone
The legal network address of inquiry pre-stored and the corresponding relation of legal principal name, with the main body name determined with extract
Claim the legal network address that industrial and commercial bank is corresponding, and judge that network address www.wap95588con.cc extracted is with true
Whether fixed legal network address mates, it is judged that result, for not mate, determines that this note is invalid information, output
Corresponding prompting.It can thus be seen that sender number 95588 is possible for the number of pseudo-base station, and
The number of non-industrial and commercial bank, in this case, if using entering based on sender number in correlation technique
The scheme that row judges, then this information of None-identified is swindle information.
In application scenarios shown in Fig. 3, it is achieved the detailed process of the identification of information may refer to aforementioned to figure
Description in 1-2, does not repeats them here.
Corresponding with the recognition methods embodiment of aforementioned information, the disclosure additionally provides the identification device of information
And the embodiment of the terminal applied.
As shown in Figure 4, Fig. 4 is the disclosure identification according to a kind of information shown in an exemplary embodiment
Device block diagram, described device can apply in the terminal, and may be used for the method shown in Fig. 1 that performs,
This device may include that extraction module 410 and determines module 420.
Extraction module 410, when being configured to comprise network address in the information received, extract this network address with
And the principal name in described information;
Determining module 420, the network address being configured to extract at extraction module 410 is corresponding main with pre-set
When the legal network address of body title is not mated, determine that this information is invalid information.
In above-described embodiment, terminal, for the information comprising network address received, extracts network address and main body name
Claim, and the network address extracted with to should the legal network address of principal name do not mate time, determine this information
For invalid information, thus, solve in correlation technique and judge that information is by the number of information sender
The no defect for swindle information, it is possible to the legitimacy of information is made and judges quickly and accurately.
As it is shown in figure 5, Fig. 5 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment
Other device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 4, and this device can also include:
Memory module 430.
Memory module 430, is configured to the corresponding relation storing legal principal name with legal network address.
As shown in Figure 6, Fig. 6 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment
Other device block diagram, this embodiment, on the basis of aforementioned embodiment illustrated in fig. 5, determines that module 420 is permissible
Including: the first reading submodule 421, first determine that submodule 422 and second determines submodule 423.
First reading submodule 421, is configured to read corresponding relation;
First determines submodule 422, is configured to the corresponding pass read based on the first reading submodule 421
System determines the legal network address corresponding with the principal name extracted;
Second determines submodule 423, is configured to determine submodule 422 in the network address extracted and first
Determined by legal network address when not mating, determine that this information is invalid information.
In above-described embodiment, terminal can prestore the corresponding relation of legal principal name and legal network address,
So that the legitimacy of information being judged based on the network address in information.
Fill as it is shown in fig. 7, Fig. 7 is the disclosure according to the identification of the another kind of information shown in an exemplary embodiment
Putting block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 6, and second determines that submodule 423 can
To include: the second reading submodule 424 and the 3rd determines submodule 425.
Second reading submodule 424, be configured to the network address extracted with determined by legal network address not
During coupling, read the illegal website information that the illegal principal name of pre-stored is corresponding;
3rd determines submodule 425, is configured in the network address extracted and the second reading submodule 424
Illegal network address coupling time, determine that this information is invalid information.
In above-described embodiment, the illegal network address of the network address in information Yu pre-stored can also be carried out by terminal
Join, if it does, may determine that this information is invalid information, thus improve the accuracy rate of judgement, it is to avoid
Occur failing to judge or judging by accident.
As shown in Figure 8, Fig. 8 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment
Other device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 6, and this determines module 420 also
May include that the 4th determines submodule 426.
4th determines submodule 426, be configured to not mate with illegal network address in the network address extracted and
When legal network address is not mated determined by with, determine that this information is doubtful invalid information.
In above-described embodiment, the network address that terminal is also based in information and legal network address and illegally network address
Match condition determines doubtful invalid information, in order to remind user with different brackets.
As it is shown in figure 9, Fig. 9 is the disclosure knowledge according to the another kind of information shown in an exemplary embodiment
Other device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 4, and this device can also include:
Output module 440.
Output module 440, is configured to the information that output information is invalid information.
In above-described embodiment, terminal can export information for invalid information, to remind user to non-
Method information is enhanced your vigilance, it is to avoid swindled because clicking illegal network address, loses property.
As shown in Figure 10, Figure 10 is that the disclosure is according to the another kind of information shown in an exemplary embodiment
Identifying device block diagram, this embodiment is on the basis of aforementioned embodiment illustrated in fig. 9, and this device can also wrap
Include: shroud module 450.
Shroud module 450, is configured to shield invalid information.
In above-described embodiment, terminal can also directly shield invalid information, to avoid invalid information to user
Cause and bother.
The identification device embodiment of the information shown in above-mentioned Fig. 4 to Figure 10 can be applied in the terminal.
In said apparatus, the function of unit and the process that realizes of effect specifically refer in said method corresponding
Step realize process, do not repeat them here.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part ginseng
See that the part of embodiment of the method illustrates.Device embodiment described above is only schematically,
The wherein said unit illustrated as separating component can be or may not be physically separate, makees
The parts shown for unit can be or may not be physical location, i.e. may be located at a place,
Or can also be distributed on multiple NE.Can select according to the actual needs part therein or
The whole module of person realizes the purpose of disclosure scheme.Those of ordinary skill in the art are not paying creativeness
In the case of work, i.e. it is appreciated that and implements.
Corresponding with Fig. 1, the disclosure also provides for a kind of terminal, and this terminal can include processor;With
Memorizer in storage processor executable;Wherein, described processor is configured to:
When comprising network address in the information received, extract the main body name in described network address and described information
Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute
The information of stating is invalid information.
As shown in figure 11, Figure 11 be the disclosure according to the one shown in an exemplary embodiment for information
Identify device 1100 a structural representation (end side).Such as, device 1100 can be to have
The mobile phone of routing function, computer, digital broadcast terminal, messaging devices, game console,
Tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 11, device 1100 can include following one or more assembly: processes assembly 1102,
Memorizer 1104, power supply module 1106, multimedia groupware 1108, audio-frequency assembly 1110, input/output
(I/O) interface 1112, sensor cluster 1114, and communications component 1116.
Process assembly 1102 and generally control the integrated operation of device 1100, such as with display, call,
The operation that data communication, camera operation and record operation are associated.Process assembly 1102 and can include one
Or multiple processor 1120 performs instruction, to complete all or part of step of above-mentioned method.Additionally,
Process assembly 1102 and can include one or more module, it is simple to process assembly 1102 and other assemblies it
Between mutual.Such as, process assembly 1102 and can include multi-media module, to facilitate multimedia groupware
1108 and process between assembly 1102 mutual.
Memorizer 1104 is configured to store various types of data to support the operation at device 1100.
The example of these data includes any application program for operation on device 1100 or the instruction of method,
Contact data, telephone book data, message, picture, video etc..Memorizer 1104 can be by any class
The volatibility of type or non-volatile memory device or combinations thereof realize, such as static random access memory
Device (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable programmable is only
Reading memorizer (EPROM), programmable read only memory (PROM), read only memory (ROM),
Magnetic memory, flash memory, disk or CD.
The various assemblies that power supply module 1106 is device 1100 provide electric power.Power supply module 1106 can wrap
Include power-supply management system, one or more power supplys, and other generate with for device 1100, manage and distribute
The assembly that electric power is associated.
One output interface of offer that multimedia groupware 1108 is included between described device 1100 and user
Screen.In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).
If screen includes that touch panel, screen may be implemented as touch screen, to receive the input from user
Signal.Touch panel includes that one or more touch sensor touches with sensing, slides and on touch panel
Gesture.Described touch sensor can not only sense touch or the border of sliding action, but also detects
The persistent period relevant to described touch or slide and pressure.In certain embodiments, multimedia group
Part 1108 includes a front-facing camera and/or post-positioned pick-up head.When device 1100 is in operator scheme,
During such as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive many matchmakers of outside
Volume data.Each front-facing camera and post-positioned pick-up head can be a fixing optical lens system or tool
There are focal length and optical zoom ability.
Audio-frequency assembly 1110 is configured to output and/or input audio signal.Such as, audio-frequency assembly 1110
Including a mike (MIC), when device 1100 is in operator scheme, such as call model, record mould
When formula and speech recognition mode, mike is configured to receive external audio signal.The audio frequency letter received
Number can be further stored at memorizer 1104 or send via communications component 1116.Implement at some
In example, audio-frequency assembly 1110 also includes a speaker, is used for exporting audio signal.
I/O interface 1112 is to process to provide interface between assembly 1102 and peripheral interface module, above-mentioned outside
Enclosing interface module can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: homepage
Button, volume button, start button and locking press button.
Sensor cluster 1114 includes one or more sensor, for providing each side for device 1100
The state estimation in face.Such as, what sensor cluster 1114 can detect device 1100 beats opening/closing shape
State, the relative localization of assembly, the most described assembly is display and the keypad of device 1100, sensor
Assembly 1114 can also detect device 1100 or the position change of 1,100 1 assemblies of device, user and dress
Put the presence or absence of 1100 contacts, device 1100 orientation or acceleration/deceleration and the temperature of device 1100
Degree change.Sensor cluster 1114 can include proximity transducer, is configured to do not having any thing
The existence of object near detection during reason contact.Sensor cluster 1114 can also include optical sensor, as
CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, should
Sensor cluster 1114 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure
Sensor, microwave remote sensor or temperature sensor.
Communications component 1116 is configured to facilitate wired or wireless mode between device 1100 and other equipment
Communication.Device 1100 can access wireless network based on communication standard, such as WiFi, 2G or 3G,
Or combinations thereof.In one exemplary embodiment, communications component 1116 receives via broadcast channel
From broadcast singal or the broadcast related information of external broadcasting management system.In one exemplary embodiment,
Described communications component 1116 also includes near-field communication (NFC) module, to promote junction service.Such as,
Can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology,
Ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1100 can be by one or more application specific integrated circuits
(ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), can compile
Journey logical device (PLD), field programmable gate array (FPGA), controller, microcontroller, micro-
Processor or other electronic components realize, and are used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage including instruction is additionally provided
Medium, such as, include the memorizer 1104 of instruction, and above-mentioned instruction can be by the processor 1120 of device 1100
Perform to complete said method.Such as, described non-transitory computer-readable recording medium can be ROM,
Random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Disclosure embodiment additionally provides a kind of non-transitory computer-readable recording medium, when described storage
When instruction in medium is performed by the processor of mobile terminal so that mobile terminal is able to carry out a kind of message
Sending method, described method includes:
When comprising network address in the information received, extract the main body name in described network address and described information
Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute
The information of stating is invalid information.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to this
Other embodiment disclosed.The disclosure is intended to any modification, purposes or the adaptability of the disclosure
Change, these modification, purposes or adaptations are followed the general principle of the disclosure and include these public affairs
Open undocumented common knowledge in the art or conventional techniques means.Description and embodiments only by
Being considered as exemplary, the true scope of the disclosure and spirit are pointed out by claim below.
The foregoing is only the preferred embodiment of the disclosure, not in order to limit the disclosure, all at this
Within disclosed spirit and principle, any modification, equivalent substitution and improvement etc. done, should be included in
Within the scope of disclosure protection.
Claims (15)
1. the recognition methods of an information, it is characterised in that including:
When comprising network address in the information received, extract the main body name in described network address and described information
Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute
The information of stating is invalid information.
Method the most according to claim 1, it is characterised in that described method also includes:
Store the corresponding relation of legal principal name and legal network address.
Method the most according to claim 2, it is characterised in that described described network address with pre-set
The legal network address of correspondence described principal name when not mating, determine that described information is invalid information, including:
Read described corresponding relation;
The legal network address corresponding with the principal name extracted is determined based on described corresponding relation;
The network address extracted with determined by legal network address do not mate time, determine that described information is for illegal letter
Breath.
Method the most according to claim 3, it is characterised in that described in the network address extracted and institute
When the legal network address determined is not mated, determine that described information is invalid information, including:
The network address extracted with determined by legal network address do not mate time, read pre-stored illegal main body
The illegal website information that title is corresponding;
When the network address extracted is mated with described illegal network address, determine that described information is invalid information.
Method the most according to claim 4, it is characterised in that the described network address of described extraction and institute
After stating the principal name in information, described method also includes:
The network address extracted do not mate with described illegal network address and with determined by legal network address do not mate
Time, determine that described information is doubtful invalid information.
Method the most according to claim 1, it is characterised in that described determine that described information is illegal
After information, described method also includes:
Export the information that described information is invalid information.
Method the most according to claim 6, it is characterised in that the described information of described output is illegal
After the information of information, described method also includes:
Shield described invalid information.
8. the identification device of an information, it is characterised in that including:
Extraction module, when being configured to comprise network address in the information received, extract described network address and
Principal name in described information;
Determine module, be configured to the legal net in described network address with the corresponding described principal name pre-seted
When location is not mated, determine that described information is invalid information.
Device the most according to claim 8, it is characterised in that described device also includes:
Memory module, is configured to the corresponding relation storing legal principal name with legal network address.
Device the most according to claim 9, it is characterised in that described determine that module includes:
First reading submodule, is configured to read described corresponding relation;
First determines submodule, is configured to determine and the principal name extracted based on described corresponding relation
Corresponding legal network address;
Second determines submodule, be configured to the network address extracted with determined by legal network address do not mate
Time, determine that described information is invalid information.
11. devices according to claim 10, it is characterised in that described second determines submodule bag
Include:
Second reading submodule, be configured to the network address extracted with determined by legal network address do not mate
Time, read the illegal website information that the illegal principal name of pre-stored is corresponding;
3rd determines submodule, is configured to when the network address extracted is mated with described illegal network address, really
Fixed described information is invalid information.
12. devices according to claim 11, it is characterised in that described determine that module also includes:
4th determines submodule, be configured to not mate with described illegal network address in the network address extracted and
When legal network address is not mated determined by with, determine that described information is doubtful invalid information.
13. devices according to claim 8, it is characterised in that described device also includes:
Output module, is configured to export the information that described information is invalid information.
14. devices according to claim 13, it is characterised in that described device also includes:
Shroud module, is configured to shield described invalid information.
15. 1 kinds of terminals, it is characterised in that including: processor;For storing processor executable
Memorizer;Wherein, described processor is configured to:
When comprising network address in the information received, extract the main body name in described network address and described information
Claim;
When the legal network address of described network address with the corresponding described principal name pre-seted is not mated, determine institute
The information of stating is invalid information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610274586.XA CN106028334A (en) | 2016-04-28 | 2016-04-28 | Method and device for identifying information and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610274586.XA CN106028334A (en) | 2016-04-28 | 2016-04-28 | Method and device for identifying information and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106028334A true CN106028334A (en) | 2016-10-12 |
Family
ID=57081334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610274586.XA Pending CN106028334A (en) | 2016-04-28 | 2016-04-28 | Method and device for identifying information and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106028334A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106941673A (en) * | 2017-02-28 | 2017-07-11 | 珠海市魅族科技有限公司 | Fraud text message recognition methods and device |
CN109039995A (en) * | 2017-06-09 | 2018-12-18 | 腾讯科技(深圳)有限公司 | A kind of invalid information recognition methods, device and equipment |
CN109729185A (en) * | 2018-12-26 | 2019-05-07 | 珠海市小源科技有限公司 | A kind of short message port recognition methods and device based on network address |
CN111093199A (en) * | 2019-11-25 | 2020-05-01 | 维沃移动通信有限公司 | Information prompting method and electronic equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790752A (en) * | 2011-05-20 | 2012-11-21 | 盛乐信息技术(上海)有限公司 | Fraud information filtering system and method on basis of feature identification |
CN102801706A (en) * | 2012-06-28 | 2012-11-28 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and security processing method for information contents |
CN103220641A (en) * | 2012-01-19 | 2013-07-24 | 联想(北京)有限公司 | Information processing method and electronic terminal |
CN103391520A (en) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | Method, terminal, server and system for intercepting malicious short message |
CN104185158A (en) * | 2014-09-01 | 2014-12-03 | 北京奇虎科技有限公司 | Malicious short message processing method and client based on false base station |
CN105101213A (en) * | 2015-06-26 | 2015-11-25 | 小米科技有限责任公司 | Information processing method and device |
US20160007204A1 (en) * | 2014-07-01 | 2016-01-07 | Samsung Electronics Co., Ltd. | Method and apparatus of notifying of smishing |
-
2016
- 2016-04-28 CN CN201610274586.XA patent/CN106028334A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790752A (en) * | 2011-05-20 | 2012-11-21 | 盛乐信息技术(上海)有限公司 | Fraud information filtering system and method on basis of feature identification |
CN103220641A (en) * | 2012-01-19 | 2013-07-24 | 联想(北京)有限公司 | Information processing method and electronic terminal |
CN103391520A (en) * | 2012-05-08 | 2013-11-13 | 腾讯科技(深圳)有限公司 | Method, terminal, server and system for intercepting malicious short message |
CN102801706A (en) * | 2012-06-28 | 2012-11-28 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and security processing method for information contents |
US20160007204A1 (en) * | 2014-07-01 | 2016-01-07 | Samsung Electronics Co., Ltd. | Method and apparatus of notifying of smishing |
CN104185158A (en) * | 2014-09-01 | 2014-12-03 | 北京奇虎科技有限公司 | Malicious short message processing method and client based on false base station |
CN105101213A (en) * | 2015-06-26 | 2015-11-25 | 小米科技有限责任公司 | Information processing method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106941673A (en) * | 2017-02-28 | 2017-07-11 | 珠海市魅族科技有限公司 | Fraud text message recognition methods and device |
CN109039995A (en) * | 2017-06-09 | 2018-12-18 | 腾讯科技(深圳)有限公司 | A kind of invalid information recognition methods, device and equipment |
CN109039995B (en) * | 2017-06-09 | 2021-03-16 | 腾讯科技(深圳)有限公司 | Illegal information identification method, device and equipment |
CN109729185A (en) * | 2018-12-26 | 2019-05-07 | 珠海市小源科技有限公司 | A kind of short message port recognition methods and device based on network address |
CN111093199A (en) * | 2019-11-25 | 2020-05-01 | 维沃移动通信有限公司 | Information prompting method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106709399A (en) | Fingerprint identification method and device | |
CN104159275B (en) | Method for connecting network and device | |
CN104105169B (en) | From method and the device of the WLAN (wireless local area network) that is dynamically connected | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN105847243A (en) | Method and device for accessing smart camera | |
CN105654302A (en) | Payment method and device | |
CN104834559A (en) | Notification message display method and device | |
CN106028334A (en) | Method and device for identifying information and terminal | |
CN105099841A (en) | Information sending methods and devices, terminal and router | |
CN105550235A (en) | Information acquisition method and information acquisition apparatuses | |
CN108021932A (en) | Data detection method, device and electronic equipment | |
CN106293961A (en) | Text message processing method and device | |
CN106126082A (en) | Control the method for terminal, device and terminal | |
CN105808469A (en) | Data processing method and apparatus, terminal and intelligent device | |
CN106201126A (en) | Touch screen and fingerprint recognition realize device and terminal unit | |
CN105933502A (en) | Method and device for marking message to be in read status | |
CN104951470A (en) | Electric coupon content showing method and device | |
CN105187671A (en) | Recording method and device | |
CN109525652A (en) | Information sharing method, device, equipment and storage medium | |
CN106372943A (en) | Message processing method and device | |
CN106331328A (en) | Information prompting method and device | |
CN105912922A (en) | Information management method and device, and terminal | |
CN106101464A (en) | Number mark method and device | |
CN104636320A (en) | Data processing method and device | |
CN106303017A (en) | Alarm processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |