CN106060000B - Method and equipment for identifying verification information - Google Patents

Method and equipment for identifying verification information Download PDF

Info

Publication number
CN106060000B
CN106060000B CN201610298475.2A CN201610298475A CN106060000B CN 106060000 B CN106060000 B CN 106060000B CN 201610298475 A CN201610298475 A CN 201610298475A CN 106060000 B CN106060000 B CN 106060000B
Authority
CN
China
Prior art keywords
information
message
clause
target information
key information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610298475.2A
Other languages
Chinese (zh)
Other versions
CN106060000A (en
Inventor
张博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201610298475.2A priority Critical patent/CN106060000B/en
Priority to CN202010038902.XA priority patent/CN111277579B/en
Publication of CN106060000A publication Critical patent/CN106060000A/en
Application granted granted Critical
Publication of CN106060000B publication Critical patent/CN106060000B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Abstract

The invention relates to the technical field of electronics, in particular to a method and equipment for identifying verification information, which are used for solving the problems that the format requirement of the received information is relatively limited and the identification accuracy is relatively low in the prior art. The embodiment of the invention extracts the clauses containing the key information and the target information from the message, determines the distance between the key information and the target information in each clause, takes the target information in the clause with the minimum distance as the verification information, and determines the verification information from all the target information according to the distance between the target information in the clause and the key information in the clause, thereby being applicable to formats with more information and improving the identification accuracy.

Description

Method and equipment for identifying verification information
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a method and an apparatus for identifying verification information.
Background
With the rise of online transactions, the number of users conducting online transactions is increasing. In order to improve the shopping safety, large websites, particularly shopping websites, are provided with a short message verification code function of mobile phones, and the function can accurately and safely ensure the shopping safety and verify the correctness of users by sending verification codes to mobile phones, so that the system is the most effective verification code system.
In addition to the above-mentioned online shopping, there are many scenarios that the verification code is also used, such as registration, activation or login, etc., the corresponding website sends a notification verification short message to the designated mobile phone, the user fills the verification code in the short message into the website after receiving the notification short message, and the website verifies the verification code filled by the user.
However, the steps of the user from receiving the short message notification to viewing the short message, recognizing the verification code from the text of the short message, and filling the verification code in the corresponding place of the verification code interface are very complicated, and especially when the part for inputting the verification code is also finished on the same mobile device, the steps are more complicated, and the user needs to frequently switch between the short message application interface and the verification code interface.
One current solution is to identify more than 4 consecutive numbers, letters, or combinations thereof from the received message and fill the identified message in the captcha interface. But if there are a plurality of consecutive 4 or more digits, letters, or a combination thereof in the received message, the identification cannot be made.
In summary, the current requirement of the identification and verification information on the format of the received information is relatively limited, and the identification accuracy is relatively low.
Disclosure of Invention
The invention provides a method and equipment for identifying verification information, which are used for solving the problems that the format requirement of the received information is limited and the identification accuracy is low in the prior art.
The embodiment of the invention provides a method for identifying verification information, which comprises the following steps:
after receiving a message, extracting clauses containing key information and target information from the message;
determining the distance between the key information and the target information in each clause;
and taking the target information in the clause with the minimum distance as verification information.
The embodiment of the invention provides equipment for identifying verification information, which comprises:
the extraction module is used for extracting clauses containing key information and target information from the message after the message is received;
the distance determining module is used for determining the distance between the key information and the target information in each clause;
and the information determining module is used for taking the target information in the clause with the minimum distance as verification information. The method comprises the steps of extracting clauses containing key information and target information from a message, determining the distance between the key information and the target information in each clause, taking the target information in the clause with the minimum distance as verification information, extracting the clause containing each continuous number, letter or combination thereof from the whole information when the received information contains a plurality of continuous numbers, letters or combination thereof according to the distance between the target information in the clause and the key information in the clause, and taking the continuous numbers, letters or combination thereof contained in the clause with the minimum distance as the verification information, so that the method can be suitable for formats of more information and improves the identification accuracy.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating a method for identifying authentication information according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for extracting clauses according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a complete method for identifying authentication information according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for identifying authentication information according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a method for identifying authentication information according to an embodiment of the present invention includes:
step 100, after receiving a message, extracting clauses containing key information and target information from the message;
step 101, determining the distance between key information and target information in each clause;
and 102, taking the target information in the clause with the minimum distance as verification information.
The embodiment of the invention can set the format of the target information, and the information conforming to the format is used as the target information. For example, information in which N or more consecutive digits are all numbers, all letters, and a combination of numbers and letters can be used as the target information.
Taking N as an example of 4, if the message has 1234, determining that the message is the target information; if the message has ABCD, determining the message as target information; if 12B3CD exists in the message, the target information is determined.
The format of the above object information is only an example, and any format is a scheme using an embodiment of the present invention.
The key information of the embodiment of the present invention may be any information capable of indicating that the message has the verification information, such as: an activation code, a dynamic code, a check code, an authentication code, a confirmation code, a check code, an authentication code, an activation code, a check code, a dynamic code, a check code, a confirmation code, a short message password, a dynamic password, a transaction code, an internet access password, a dynamic login password, and the like.
The message of the embodiment of the invention can be any received message, such as a message received through instant messaging software, a short message received through a short message and the like.
Optionally, after receiving the message, it may be determined whether the received message is a notification message, and if the received message is a notification message, it is further determined whether the received message includes preset key information; if not, the solution of the embodiment of the present invention may not be executed.
And judging whether the messages in different forms are notification messages or not in different modes. Taking the short message as an example, the judgment can be made by the number of the short message.
The number head of the general person is 131, 138, 139, etc., and if the number head is not the number of the set person at the time of judgment, it can be determined that the number to which the message is sent is the notification number, and the message is the notification type message.
Optionally, after determining that the received message includes the key information and/or the target information, extracting a clause including the key information and the target information from the message.
Judging whether the message comprises key information and/or target information, wherein the judgment can be carried out after the message is determined to be a notification message; judgment can also be carried out simultaneously; or judging whether the message comprises the key information and/or the target information, and judging whether the message is the notification message after the key information and/or the target information are determined to exist.
Optionally, when a clause including key information and target information is extracted from the message, there are two ways:
extracting clauses containing key information from the message in a first extraction mode; and extracting clauses containing target information from the clauses containing the key information.
And if all clauses do not contain the clause of the target information, displaying the received message to the user, and determining the verification information by the user.
And if the clauses containing the target information exist in all the clauses, determining the distance between the target information in the clause and the key information in the clause aiming at the selected clause.
For example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, neither kill nor tell others the check code, which asks for the line 12345. "
The clause extracted from the message is "check code: 650717, neither the "kill" nor the "check code" to others, and "check code question hotline 12345". The clause containing the target information is' check code: 650717 "and" check code query hotline 12345 ".
Optionally, when a clause containing key information is extracted from a message, determining all key information included in the received message;
and aiming at one piece of key information, determining a preset mark positioned before the key information and a nearest preset mark positioned after the key information from the message, and taking the content between the two preset marks as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
Such as punctuation including commas and periods.
The received message is "[ AA ] welcome to use AA, 907050 (dynamic authentication code). Please fill in within 30 minutes to contact the phone 1008222. "
In this message, whether the short message is an authentication code short message or not can be judged through the "authentication code", if the short message contains the key information of the "authentication code", a comma or a period before the "authentication code" (generally, the first comma or period before) and a comma or a period after the "authentication code" (generally, the first comma or period after) are found, and the content between two preset marks is taken as a clause, namely 907050 (dynamic authentication code) is taken as a clause.
In practice, if the key information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
Also for example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, nothing to kill tells others the check code. "
Two clauses are obtained according to the scheme of extracting the clauses: "check code: 650717 "and" neither kill tells others a check code "
When a clause containing target information is selected from all clauses, as the ' death can not tell others about the check code ' does not contain the target information, the last sentence containing the target information is a ' check code: 650717".
Extracting a clause containing target information from the message in a second extraction mode; and extracting clauses containing key information from the clauses containing the target information.
And if all clauses do not contain clauses containing key information, displaying the received message to the user, and determining the verification information by the user.
And if the clauses containing the key information exist in all the clauses, determining the distance between the target information in the clause and the key information in the clause aiming at the selected clause.
Optionally, when a clause including target information is extracted from the message, determining all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
The specific extraction process is similar to the extraction method, and is not described herein again.
In practice, if the target information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
The specific extraction process is similar to the extraction method, and is not described herein again.
When the distance between the target information in the clause and the key information in the clause is determined for a selected clause, because the positions of the target information and the key information are different, the target information may be located in front of the key information or behind the key information, so that two distance determining modes are provided in the embodiment of the invention for different situations.
Determining a first mode, aiming at a selected clause, if the target information in the clause is positioned in front of the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
the p _ key is the distance between the first symbol of the key information in the message and the first symbol of the message.
Assume that the received message is "[ AA ]907050 (dynamic authentication code). Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 4; the length _ number of the target information "907050" is 6, and the position p _ keyword of the first symbol "mobile" of the key information "dynamic verification code" is 11; the distance is 11- (4+6) ═ 1.
And determining a second mode, aiming at the selected clause, if the target information in the clause is positioned behind the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
the p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
Assume that the received message is "[ AA ] (dynamic authentication code) 907050. Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 11; the length _ keyword of the key information 'dynamic verification code' is 5; the position p _ keyword of the first symbol "dynamic" of the key information "dynamic verification code" is 5; the distance is 11- (5+5) ═ 1.
The embodiment of the invention can take one letter, one number, one punctuation and one Chinese character as one symbol.
Optionally, when the verification information is determined from all the target information in the selected clause according to all the determined distances, the target information with the shortest distance to the key information is used as the verification information.
For example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, neither kill nor tell others the check code, which asks for the line 12345. "
The clause extracted from the message is "check code: 650717, neither the "kill" nor the "check code" to others, and "check code question hotline 12345".
And selecting a clause containing target information from all clauses as a check code: 650717 "and" check code query hotline 12345 ".
The check code is determined as above: 650717 "distance 23- (19+3) ═ 1;
the "check code query hotline 12345" distance is determined to be 50- (43+3) ═ 4 in the above manner.
Due to the check code: 650717 "distance (i.e., 1) is less than" check code query hot line 12345 "distance (i.e., 4), then" check code: 650717 "as verification information.
In implementation, after the verification information is determined, the page for verifying the verification information is determined, and the verification information is automatically filled in the position where the verification information is filled in the determined page. The page can be a webpage page, an application page, or a page opened in other forms.
As shown in fig. 2, the method for extracting clauses according to the embodiment of the present invention includes:
and step 200, receiving a message.
Step 201, judging whether the received message includes preset key information; if so, go to step 202, otherwise, go out of the flow.
Step 202, determining a piece of key information not extracted from the message.
Step 203, judging whether the determined key information is in brackets, if so, executing step 204; otherwise, step 205 is performed.
Step 204, find the first comma or period before the left brace and the first comma or period after the right brace, and perform step 206.
Step 205, find the first comma or period before the key information, and find the first comma or period after the key information, and perform step 206.
Step 206, the content between the first comma or period before the key information and the first comma or period after the key information is taken as a clause.
Step 207, judging whether key information which is not extracted exists, if so, returning to the step 202; otherwise, continuing to execute the subsequent step of selecting the clause containing the target information from all the clauses.
The following will illustrate the scheme of the present invention by taking the first extraction method as an example.
As shown in fig. 3, the complete method for identifying authentication information according to the embodiment of the present invention includes:
step 300, receiving a message.
Step 301, after determining that the received message includes preset key information, extracting at least one clause from the message. (see FIG. 2 for details of step 301)
Step 302, judging whether clauses containing target information exist in all clauses, and if yes, executing step 303; otherwise, the received message is displayed to the user.
Step 303, selecting a clause containing the target information from all clauses.
Step 304, judging whether the number of clauses containing target information is not less than 2; if so, go to step 305; otherwise, step 309 is performed.
Step 305, selecting a clause with undetermined distance from all clauses.
And step 306, determining the distance between each target information in the clause and the key information in the clause.
Step 307, judging whether all clauses determine the distance, if so, executing step 309; otherwise, the procedure returns to step 305.
And 308, taking the target information with the shortest distance to the key information as verification information.
And step 309, taking the target information in the clause as verification information.
Based on the same inventive concept, the embodiment of the present invention further provides a device for identifying verification information, and because the principle of solving the problem of the device is similar to the method for identifying verification information in the embodiment of the present invention, the implementation of the device may refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 4, the apparatus for identifying authentication information according to an embodiment of the present invention includes:
an extracting module 400, configured to extract a clause including key information and target information from a message after the message is received;
a distance determining module 401, configured to determine a distance between the key information and the target information in each clause;
an information determining module 402, configured to use the target information in the clause with the smallest distance as the verification information.
The embodiment of the invention can set the format of the target information, and the information conforming to the format is used as the target information. For example, information in which N or more consecutive digits are all numbers, all letters, and a combination of numbers and letters can be used as the target information.
Taking N as an example of 4, if the message has 1234, determining that the message is the target information; if the message has ABCD, determining the message as target information; if 12B3CD exists in the message, the target information is determined.
The format of the above object information is only an example, and any format is a scheme using an embodiment of the present invention.
The key information of the embodiment of the present invention may be any information capable of indicating that the message has the verification information, such as: the activation code, the dynamic code, the check code, the verification code, the confirmation code, the check code, the verification code, the activation code, the check code, the dynamic code, the check code, the confirmation code, the short message password, the dynamic password, the transaction code, decoding, activation decoding, decoding, decoding, decoding, decoding the activation code decoding of decoding, decoding, decoding, decoding, a network access password, a dynamic login password, and the like.
The message of the embodiment of the invention can be any received message, such as a message received through instant messaging software, a short message received through a short message and the like.
Optionally, after receiving the message, the extraction module 400 may first determine whether the received message is a notification message, and after determining that the received message is a notification message, receive the message; if not, the solution of the embodiment of the present invention may not be executed.
And judging whether the messages in different forms are notification messages or not in different modes. Taking the short message as an example, the judgment can be made by the number of the short message.
The number head of the general person is 131, 138, 139, etc., and if the number head is not the number of the set person at the time of judgment, it can be determined that the number to which the message is sent is the notification number, and the message is the notification type message.
Optionally, after determining that the received message includes the key information and/or the target information, the extracting module 400 extracts a clause including the key information and the target information from the message.
Judging whether the message comprises key information and/or target information, wherein the judgment can be carried out after the message is determined to be a notification message; judgment can also be carried out simultaneously; or judging whether the message comprises the key information and/or the target information, and judging whether the message is the notification message after the key information and/or the target information are determined to exist.
Optionally, when a clause including key information and target information is extracted from the message, there are two ways:
in the first extraction mode, the extraction module 400 extracts clauses containing key information from the message; and extracting clauses containing target information from the clauses containing the key information.
If all the clauses do not contain the clause of the target information, the extraction module 400 may display the received message to the user, and the user may determine the verification information.
If there is a clause containing target information in all the clauses, the distance determining module 401 determines the distance between the target information in the clause and the key information in the clause for the selected clause.
Optionally, when the extracting module 400 extracts a message containing key information, it determines all key information included in the received message; and aiming at one piece of key information, determining a preset mark positioned before the key information and a nearest preset mark positioned after the key information from the message, and taking the content between the two preset marks as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
Such as punctuation including commas and periods.
The received message is "[ AA ] welcome to use AA, 907050 (dynamic authentication code). Please fill in within 30 minutes to contact the phone 1008222. "
In this message, whether the short message is an authentication code short message or not can be judged through the "authentication code", if the short message contains the key information of the "authentication code", a comma or a period before the "authentication code" (generally, the first comma or period before) and a comma or a period after the "authentication code" (generally, the first comma or period after) are found, and the content between two preset marks is taken as a clause, namely 907050 (dynamic authentication code) is taken as a clause.
In practice, if the key information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
Also for example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, nothing to kill tells others the check code. "
Two clauses are obtained according to the scheme of extracting the clauses: "check code: 650717 "and" neither kill tells others a check code "
When a clause containing target information is selected from all clauses, as the ' death can not tell others about the check code ' does not contain the target information, the last sentence containing the target information is a ' check code: 650717".
An extraction mode II, an extraction module 400 extracts a clause containing target information from the message; and extracting clauses containing key information from the clauses containing the target information.
And if all clauses do not contain clauses containing key information, displaying the received message to the user, and determining the verification information by the user.
And if the clauses containing the key information exist in all the clauses, determining the distance between the target information in the clause and the key information in the clause aiming at the selected clause.
Optionally, when extracting the clause including the target information from the message, the extracting module 400 determines all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
The specific extraction process is similar to the extraction method, and is not described herein again.
In practice, if the target information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
The specific extraction process is similar to the extraction method, and is not described herein again.
When the distance between the target information in the clause and the key information in the clause is determined for a selected clause, because the positions of the target information and the key information are different, the target information may be located in front of the key information or behind the key information, so that two distance determining modes are provided in the embodiment of the invention for different situations.
In the first determination mode, for a selected clause, if the target information in the clause is located in front of the key information, the distance determination module 401 determines the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
the p _ key is the distance between the first symbol of the key information in the message and the first symbol of the message.
Assume that the received message is "[ AA ]907050 (dynamic authentication code). Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 4; the length _ number of the key information "907050" is 6, and the position p _ keyword of the first symbol "dynamic" of the target information "dynamic authentication code" is 11; the distance is 11- (4+6) ═ 1.
In the second determination method, for a selected clause, if the target information in the clause is located behind the key information, the distance determination module 401 determines the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
the p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
Assume that the received message is "[ AA ] (dynamic authentication code) 907050. Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 11; the length _ keyword of the key information 'dynamic verification code' is 5; the position p _ keyword of the first symbol "dynamic" of the key information "dynamic verification code" is 5; the distance is 11- (5+5) ═ 1.
The embodiment of the invention can take one letter, one number, one punctuation and one Chinese character as one symbol.
Optionally, when determining the verification information from all the target information in the selected clause according to all the determined distances, the information determining module 402 uses the target information with the shortest distance to the key information as the verification information.
For example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, neither kill nor tell others the check code, which asks for the line 12345. "
The clause extracted from the message is "check code: 650717, neither the "kill" nor the "check code" to others, and "check code question hotline 12345".
And selecting a clause containing target information from all clauses as a check code: 650717 "and" check code query hotline 12345 ".
The check code is determined as above: 650717 "distance 23- (19+3) ═ 1;
the "check code query hotline 12345" distance is determined to be 50- (43+3) ═ 4 in the above manner.
Due to the check code: 650717 "distance (i.e., 1) is less than" check code query hot line 12345 "distance (i.e., 4), then" check code: 650717 "as verification information.
In implementation, after the verification information is determined, the page for verifying the verification information is determined, and the verification information is automatically filled in the position where the verification information is filled in the determined page. The page can be a webpage page, an application page, or a page opened in other forms.
From the above, it can be seen that: the method comprises the steps of extracting clauses containing key information and target information from a message, determining the distance between the key information and the target information in each clause, taking the target information in the clause with the minimum distance as verification information, extracting the clause containing each continuous number, letter or combination thereof from the whole information when the received information contains a plurality of continuous numbers, letters or combination thereof according to the distance between the target information in the clause and the key information in the clause, then taking the continuous numbers, letters or combination thereof contained in the clause with the minimum distance as the verification information, and determining the verification information from all the target information, so that the method can be applied to formats of more information and improve the identification accuracy.
The present application is described above with reference to block diagrams and/or flowchart illustrations of methods, apparatus (systems) and/or computer program products according to embodiments of the application. It will be understood that one block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the subject application may also be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, the present application may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this application, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (14)

1. A method of identifying authentication information, the method comprising:
after receiving a message, extracting clauses containing key information indicating that the message contains verification information and target information conforming to a preset format from the message;
determining the distance between the key information and the target information in each clause;
and taking the target information in the clause with the minimum distance as the verification information.
2. The method of claim 1, wherein prior to extracting the clause including the key information and the target information from the message, further comprising:
and determining that the received message is a notification message.
3. The method of claim 1, wherein prior to extracting the clause including the key information and the target information from the message, further comprising:
and determining that the received message comprises key information and/or target information.
4. The method of claim 1, wherein said extracting the clause containing the key information and the target information from the message comprises:
extracting clauses containing key information from the message; extracting clauses containing target information from clauses containing key information; or
Extracting clauses containing target information from the message; and extracting clauses containing key information from the clauses containing the target information.
5. The method of claim 3, wherein said extracting a clause containing key information from said message comprises:
determining all key information included in the received message;
and determining a preset identifier positioned in front of the key information and a nearest preset identifier positioned behind the key information from the message, and taking the content between the two preset identifiers as a clause.
6. The method of claim 3, wherein said extracting the clause containing the target information from the message comprises:
determining all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
7. The method according to any one of claims 1 to 6, wherein the determining of the distance between the key information and the target information in each of the clauses comprises:
if the target information in the clause is positioned in front of the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
if the target information in the clause is positioned behind the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
8. An apparatus for identifying authentication information, the apparatus comprising:
the extraction module is used for extracting clauses containing key information indicating that the message contains verification information and target information conforming to a preset format from the message after the message is received;
the distance determining module is used for determining the distance between the key information and the target information in each clause;
and the information determining module is used for taking the target information in the clause with the minimum distance as the verification information.
9. The device of claim 8, wherein the extraction module is further to:
after the received message is determined to be the notification message, clauses containing key information and target information are extracted from the message.
10. The device of claim 8, wherein the extraction module is further to:
after determining that the received message comprises key information and/or target information, extracting clauses containing the key information and the target information from the message.
11. The device of claim 8, wherein the extraction module is specifically configured to:
extracting clauses containing key information from the message; extracting clauses containing target information from clauses containing key information; or
Extracting clauses containing target information from the message; and extracting clauses containing key information from the clauses containing the target information.
12. The device of claim 11, wherein the extraction module is specifically configured to:
determining all key information included in the received message;
and determining a preset identifier positioned in front of the key information and a nearest preset identifier positioned behind the key information from the message, and taking the content between the two preset identifiers as a clause.
13. The device of claim 11, wherein the extraction module is specifically configured to:
determining all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
14. The device of any one of claims 8 to 13, wherein the distance determining module is specifically configured to:
if the target information in the clause is positioned in front of the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
if the target information in the clause is positioned behind the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
CN201610298475.2A 2016-05-06 2016-05-06 Method and equipment for identifying verification information Active CN106060000B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610298475.2A CN106060000B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information
CN202010038902.XA CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610298475.2A CN106060000B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010038902.XA Division CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Publications (2)

Publication Number Publication Date
CN106060000A CN106060000A (en) 2016-10-26
CN106060000B true CN106060000B (en) 2020-02-07

Family

ID=57176835

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610298475.2A Active CN106060000B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information
CN202010038902.XA Active CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010038902.XA Active CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Country Status (1)

Country Link
CN (2) CN106060000B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106388713A (en) * 2016-10-31 2017-02-15 南昌大学 Intelligent sweeping robot
CN108270567B (en) * 2016-12-30 2021-09-28 阿里巴巴集团控股有限公司 Message source verification method, device and system and message sending method and device
CN116484841B (en) * 2023-05-10 2023-10-03 道有道科技集团股份公司 Information verification system and method based on automatic auditing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186857A (en) * 2011-12-31 2013-07-03 中国银联股份有限公司 Bank card payment method and system
CN104021376A (en) * 2014-06-05 2014-09-03 北京乐动卓越科技有限公司 Verification code identifying method and device
CN105117384A (en) * 2015-08-19 2015-12-02 小米科技有限责任公司 Classifier training method, and type identification method and apparatus
CN105488025A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Template construction method and apparatus and information identification method and apparatus

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7376893B2 (en) * 2002-12-16 2008-05-20 Palo Alto Research Center Incorporated Systems and methods for sentence based interactive topic-based text summarization
JP4647903B2 (en) * 2003-07-09 2011-03-09 株式会社東芝 Information communication apparatus, communication system, and data transmission control program
CN104283682A (en) * 2013-07-08 2015-01-14 深圳市腾讯计算机系统有限公司 Method, device and system conducting verification through verification codes
CN111787154A (en) * 2015-02-15 2020-10-16 联想(北京)有限公司 Information processing method and electronic equipment
CN104853329B (en) * 2015-04-27 2018-06-12 小米科技有限责任公司 The method and apparatus of identification number
CN105447750B (en) * 2015-11-17 2022-06-03 小米科技有限责任公司 Information identification method and device, terminal and server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103186857A (en) * 2011-12-31 2013-07-03 中国银联股份有限公司 Bank card payment method and system
CN104021376A (en) * 2014-06-05 2014-09-03 北京乐动卓越科技有限公司 Verification code identifying method and device
CN105117384A (en) * 2015-08-19 2015-12-02 小米科技有限责任公司 Classifier training method, and type identification method and apparatus
CN105488025A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Template construction method and apparatus and information identification method and apparatus

Also Published As

Publication number Publication date
CN111277579B (en) 2023-01-17
CN111277579A (en) 2020-06-12
CN106060000A (en) 2016-10-26

Similar Documents

Publication Publication Date Title
US10657243B2 (en) Variation analysis-based public turing test to tell computers and humans apart
US10795942B2 (en) Method and device for residing short message verification code
US20160014120A1 (en) Method, server, client and system for verifying verification codes
CN110516248A (en) Method for correcting error of voice identification result, device, storage medium and electronic equipment
EP2819351A1 (en) Information processing method, apparatus, and system
CN107682368B (en) Verification method, client, server and system based on interactive operation
EP2892003A1 (en) Method and apparatus for input verification
CN106060000B (en) Method and equipment for identifying verification information
CN107357824B (en) Information processing method, service platform and computer storage medium
US9692771B2 (en) System and method for estimating typicality of names and textual data
CN107943873B (en) Knowledge graph establishing method, knowledge graph establishing device, computer equipment and storage medium
CN105574398A (en) Verification code verification method and device
CN110113329B (en) Verification method and device for verification code
CN111787154A (en) Information processing method and electronic equipment
CN104301875A (en) Short message processing method and device
CN110990811A (en) Identity authentication method and device
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN109688109B (en) Verification method and device of verification code based on client information identification
CN109450646B (en) Verification request processing method and system
CN115344315A (en) Skin switching method and device of applet page and electronic equipment
CN107231330B (en) Password determination and login verification method and device
CN108882239B (en) Information sending method and device
CN105022547A (en) Text input method and apparatus
CN108200043A (en) Picture validation code verification method and picture validation code verification device
CN114036364A (en) Method, apparatus, device, medium and product for identifying a crawler

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee after: Qingdao Hisense Mobile Communication Technology Co.,Ltd.

Address before: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee before: HISENSE MOBILE COMMUNICATIONS TECHNOLOGY Co.,Ltd.