CN106060000B - Method and equipment for identifying verification information - Google Patents
Method and equipment for identifying verification information Download PDFInfo
- Publication number
- CN106060000B CN106060000B CN201610298475.2A CN201610298475A CN106060000B CN 106060000 B CN106060000 B CN 106060000B CN 201610298475 A CN201610298475 A CN 201610298475A CN 106060000 B CN106060000 B CN 106060000B
- Authority
- CN
- China
- Prior art keywords
- information
- message
- clause
- target information
- key information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Abstract
The invention relates to the technical field of electronics, in particular to a method and equipment for identifying verification information, which are used for solving the problems that the format requirement of the received information is relatively limited and the identification accuracy is relatively low in the prior art. The embodiment of the invention extracts the clauses containing the key information and the target information from the message, determines the distance between the key information and the target information in each clause, takes the target information in the clause with the minimum distance as the verification information, and determines the verification information from all the target information according to the distance between the target information in the clause and the key information in the clause, thereby being applicable to formats with more information and improving the identification accuracy.
Description
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a method and an apparatus for identifying verification information.
Background
With the rise of online transactions, the number of users conducting online transactions is increasing. In order to improve the shopping safety, large websites, particularly shopping websites, are provided with a short message verification code function of mobile phones, and the function can accurately and safely ensure the shopping safety and verify the correctness of users by sending verification codes to mobile phones, so that the system is the most effective verification code system.
In addition to the above-mentioned online shopping, there are many scenarios that the verification code is also used, such as registration, activation or login, etc., the corresponding website sends a notification verification short message to the designated mobile phone, the user fills the verification code in the short message into the website after receiving the notification short message, and the website verifies the verification code filled by the user.
However, the steps of the user from receiving the short message notification to viewing the short message, recognizing the verification code from the text of the short message, and filling the verification code in the corresponding place of the verification code interface are very complicated, and especially when the part for inputting the verification code is also finished on the same mobile device, the steps are more complicated, and the user needs to frequently switch between the short message application interface and the verification code interface.
One current solution is to identify more than 4 consecutive numbers, letters, or combinations thereof from the received message and fill the identified message in the captcha interface. But if there are a plurality of consecutive 4 or more digits, letters, or a combination thereof in the received message, the identification cannot be made.
In summary, the current requirement of the identification and verification information on the format of the received information is relatively limited, and the identification accuracy is relatively low.
Disclosure of Invention
The invention provides a method and equipment for identifying verification information, which are used for solving the problems that the format requirement of the received information is limited and the identification accuracy is low in the prior art.
The embodiment of the invention provides a method for identifying verification information, which comprises the following steps:
after receiving a message, extracting clauses containing key information and target information from the message;
determining the distance between the key information and the target information in each clause;
and taking the target information in the clause with the minimum distance as verification information.
The embodiment of the invention provides equipment for identifying verification information, which comprises:
the extraction module is used for extracting clauses containing key information and target information from the message after the message is received;
the distance determining module is used for determining the distance between the key information and the target information in each clause;
and the information determining module is used for taking the target information in the clause with the minimum distance as verification information. The method comprises the steps of extracting clauses containing key information and target information from a message, determining the distance between the key information and the target information in each clause, taking the target information in the clause with the minimum distance as verification information, extracting the clause containing each continuous number, letter or combination thereof from the whole information when the received information contains a plurality of continuous numbers, letters or combination thereof according to the distance between the target information in the clause and the key information in the clause, and taking the continuous numbers, letters or combination thereof contained in the clause with the minimum distance as the verification information, so that the method can be suitable for formats of more information and improves the identification accuracy.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a flowchart illustrating a method for identifying authentication information according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for extracting clauses according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a complete method for identifying authentication information according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for identifying authentication information according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a method for identifying authentication information according to an embodiment of the present invention includes:
and 102, taking the target information in the clause with the minimum distance as verification information.
The embodiment of the invention can set the format of the target information, and the information conforming to the format is used as the target information. For example, information in which N or more consecutive digits are all numbers, all letters, and a combination of numbers and letters can be used as the target information.
Taking N as an example of 4, if the message has 1234, determining that the message is the target information; if the message has ABCD, determining the message as target information; if 12B3CD exists in the message, the target information is determined.
The format of the above object information is only an example, and any format is a scheme using an embodiment of the present invention.
The key information of the embodiment of the present invention may be any information capable of indicating that the message has the verification information, such as: an activation code, a dynamic code, a check code, an authentication code, a confirmation code, a check code, an authentication code, an activation code, a check code, a dynamic code, a check code, a confirmation code, a short message password, a dynamic password, a transaction code, an internet access password, a dynamic login password, and the like.
The message of the embodiment of the invention can be any received message, such as a message received through instant messaging software, a short message received through a short message and the like.
Optionally, after receiving the message, it may be determined whether the received message is a notification message, and if the received message is a notification message, it is further determined whether the received message includes preset key information; if not, the solution of the embodiment of the present invention may not be executed.
And judging whether the messages in different forms are notification messages or not in different modes. Taking the short message as an example, the judgment can be made by the number of the short message.
The number head of the general person is 131, 138, 139, etc., and if the number head is not the number of the set person at the time of judgment, it can be determined that the number to which the message is sent is the notification number, and the message is the notification type message.
Optionally, after determining that the received message includes the key information and/or the target information, extracting a clause including the key information and the target information from the message.
Judging whether the message comprises key information and/or target information, wherein the judgment can be carried out after the message is determined to be a notification message; judgment can also be carried out simultaneously; or judging whether the message comprises the key information and/or the target information, and judging whether the message is the notification message after the key information and/or the target information are determined to exist.
Optionally, when a clause including key information and target information is extracted from the message, there are two ways:
extracting clauses containing key information from the message in a first extraction mode; and extracting clauses containing target information from the clauses containing the key information.
And if all clauses do not contain the clause of the target information, displaying the received message to the user, and determining the verification information by the user.
And if the clauses containing the target information exist in all the clauses, determining the distance between the target information in the clause and the key information in the clause aiming at the selected clause.
For example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, neither kill nor tell others the check code, which asks for the line 12345. "
The clause extracted from the message is "check code: 650717, neither the "kill" nor the "check code" to others, and "check code question hotline 12345". The clause containing the target information is' check code: 650717 "and" check code query hotline 12345 ".
Optionally, when a clause containing key information is extracted from a message, determining all key information included in the received message;
and aiming at one piece of key information, determining a preset mark positioned before the key information and a nearest preset mark positioned after the key information from the message, and taking the content between the two preset marks as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
Such as punctuation including commas and periods.
The received message is "[ AA ] welcome to use AA, 907050 (dynamic authentication code). Please fill in within 30 minutes to contact the phone 1008222. "
In this message, whether the short message is an authentication code short message or not can be judged through the "authentication code", if the short message contains the key information of the "authentication code", a comma or a period before the "authentication code" (generally, the first comma or period before) and a comma or a period after the "authentication code" (generally, the first comma or period after) are found, and the content between two preset marks is taken as a clause, namely 907050 (dynamic authentication code) is taken as a clause.
In practice, if the key information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
Also for example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, nothing to kill tells others the check code. "
Two clauses are obtained according to the scheme of extracting the clauses: "check code: 650717 "and" neither kill tells others a check code "
When a clause containing target information is selected from all clauses, as the ' death can not tell others about the check code ' does not contain the target information, the last sentence containing the target information is a ' check code: 650717".
Extracting a clause containing target information from the message in a second extraction mode; and extracting clauses containing key information from the clauses containing the target information.
And if all clauses do not contain clauses containing key information, displaying the received message to the user, and determining the verification information by the user.
And if the clauses containing the key information exist in all the clauses, determining the distance between the target information in the clause and the key information in the clause aiming at the selected clause.
Optionally, when a clause including target information is extracted from the message, determining all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
The specific extraction process is similar to the extraction method, and is not described herein again.
In practice, if the target information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
The specific extraction process is similar to the extraction method, and is not described herein again.
When the distance between the target information in the clause and the key information in the clause is determined for a selected clause, because the positions of the target information and the key information are different, the target information may be located in front of the key information or behind the key information, so that two distance determining modes are provided in the embodiment of the invention for different situations.
Determining a first mode, aiming at a selected clause, if the target information in the clause is positioned in front of the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
the p _ key is the distance between the first symbol of the key information in the message and the first symbol of the message.
Assume that the received message is "[ AA ]907050 (dynamic authentication code). Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 4; the length _ number of the target information "907050" is 6, and the position p _ keyword of the first symbol "mobile" of the key information "dynamic verification code" is 11; the distance is 11- (4+6) ═ 1.
And determining a second mode, aiming at the selected clause, if the target information in the clause is positioned behind the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
the p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
Assume that the received message is "[ AA ] (dynamic authentication code) 907050. Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 11; the length _ keyword of the key information 'dynamic verification code' is 5; the position p _ keyword of the first symbol "dynamic" of the key information "dynamic verification code" is 5; the distance is 11- (5+5) ═ 1.
The embodiment of the invention can take one letter, one number, one punctuation and one Chinese character as one symbol.
Optionally, when the verification information is determined from all the target information in the selected clause according to all the determined distances, the target information with the shortest distance to the key information is used as the verification information.
For example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, neither kill nor tell others the check code, which asks for the line 12345. "
The clause extracted from the message is "check code: 650717, neither the "kill" nor the "check code" to others, and "check code question hotline 12345".
And selecting a clause containing target information from all clauses as a check code: 650717 "and" check code query hotline 12345 ".
The check code is determined as above: 650717 "distance 23- (19+3) ═ 1;
the "check code query hotline 12345" distance is determined to be 50- (43+3) ═ 4 in the above manner.
Due to the check code: 650717 "distance (i.e., 1) is less than" check code query hot line 12345 "distance (i.e., 4), then" check code: 650717 "as verification information.
In implementation, after the verification information is determined, the page for verifying the verification information is determined, and the verification information is automatically filled in the position where the verification information is filled in the determined page. The page can be a webpage page, an application page, or a page opened in other forms.
As shown in fig. 2, the method for extracting clauses according to the embodiment of the present invention includes:
and step 200, receiving a message.
The following will illustrate the scheme of the present invention by taking the first extraction method as an example.
As shown in fig. 3, the complete method for identifying authentication information according to the embodiment of the present invention includes:
And step 306, determining the distance between each target information in the clause and the key information in the clause.
And 308, taking the target information with the shortest distance to the key information as verification information.
And step 309, taking the target information in the clause as verification information.
Based on the same inventive concept, the embodiment of the present invention further provides a device for identifying verification information, and because the principle of solving the problem of the device is similar to the method for identifying verification information in the embodiment of the present invention, the implementation of the device may refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 4, the apparatus for identifying authentication information according to an embodiment of the present invention includes:
an extracting module 400, configured to extract a clause including key information and target information from a message after the message is received;
a distance determining module 401, configured to determine a distance between the key information and the target information in each clause;
an information determining module 402, configured to use the target information in the clause with the smallest distance as the verification information.
The embodiment of the invention can set the format of the target information, and the information conforming to the format is used as the target information. For example, information in which N or more consecutive digits are all numbers, all letters, and a combination of numbers and letters can be used as the target information.
Taking N as an example of 4, if the message has 1234, determining that the message is the target information; if the message has ABCD, determining the message as target information; if 12B3CD exists in the message, the target information is determined.
The format of the above object information is only an example, and any format is a scheme using an embodiment of the present invention.
The key information of the embodiment of the present invention may be any information capable of indicating that the message has the verification information, such as: the activation code, the dynamic code, the check code, the verification code, the confirmation code, the check code, the verification code, the activation code, the check code, the dynamic code, the check code, the confirmation code, the short message password, the dynamic password, the transaction code, decoding, activation decoding, decoding, decoding, decoding, decoding the activation code decoding of decoding, decoding, decoding, decoding, a network access password, a dynamic login password, and the like.
The message of the embodiment of the invention can be any received message, such as a message received through instant messaging software, a short message received through a short message and the like.
Optionally, after receiving the message, the extraction module 400 may first determine whether the received message is a notification message, and after determining that the received message is a notification message, receive the message; if not, the solution of the embodiment of the present invention may not be executed.
And judging whether the messages in different forms are notification messages or not in different modes. Taking the short message as an example, the judgment can be made by the number of the short message.
The number head of the general person is 131, 138, 139, etc., and if the number head is not the number of the set person at the time of judgment, it can be determined that the number to which the message is sent is the notification number, and the message is the notification type message.
Optionally, after determining that the received message includes the key information and/or the target information, the extracting module 400 extracts a clause including the key information and the target information from the message.
Judging whether the message comprises key information and/or target information, wherein the judgment can be carried out after the message is determined to be a notification message; judgment can also be carried out simultaneously; or judging whether the message comprises the key information and/or the target information, and judging whether the message is the notification message after the key information and/or the target information are determined to exist.
Optionally, when a clause including key information and target information is extracted from the message, there are two ways:
in the first extraction mode, the extraction module 400 extracts clauses containing key information from the message; and extracting clauses containing target information from the clauses containing the key information.
If all the clauses do not contain the clause of the target information, the extraction module 400 may display the received message to the user, and the user may determine the verification information.
If there is a clause containing target information in all the clauses, the distance determining module 401 determines the distance between the target information in the clause and the key information in the clause for the selected clause.
Optionally, when the extracting module 400 extracts a message containing key information, it determines all key information included in the received message; and aiming at one piece of key information, determining a preset mark positioned before the key information and a nearest preset mark positioned after the key information from the message, and taking the content between the two preset marks as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
Such as punctuation including commas and periods.
The received message is "[ AA ] welcome to use AA, 907050 (dynamic authentication code). Please fill in within 30 minutes to contact the phone 1008222. "
In this message, whether the short message is an authentication code short message or not can be judged through the "authentication code", if the short message contains the key information of the "authentication code", a comma or a period before the "authentication code" (generally, the first comma or period before) and a comma or a period after the "authentication code" (generally, the first comma or period after) are found, and the content between two preset marks is taken as a clause, namely 907050 (dynamic authentication code) is taken as a clause.
In practice, if the key information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
Also for example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, nothing to kill tells others the check code. "
Two clauses are obtained according to the scheme of extracting the clauses: "check code: 650717 "and" neither kill tells others a check code "
When a clause containing target information is selected from all clauses, as the ' death can not tell others about the check code ' does not contain the target information, the last sentence containing the target information is a ' check code: 650717".
An extraction mode II, an extraction module 400 extracts a clause containing target information from the message; and extracting clauses containing key information from the clauses containing the target information.
And if all clauses do not contain clauses containing key information, displaying the received message to the user, and determining the verification information by the user.
And if the clauses containing the key information exist in all the clauses, determining the distance between the target information in the clause and the key information in the clause aiming at the selected clause.
Optionally, when extracting the clause including the target information from the message, the extracting module 400 determines all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
The preset identifier may be set according to experience, and the preset identifier may include part or all of the following information:
punctuation, white space (applicable to the case where there is no punctuation in front of the key information, such as the key information being at the top of the received message).
The punctuation herein may include one or more. And the specific method can be determined according to language habits and the format of the message containing the verification information. In specific implementation, a large number of messages can be collected for perfection, and the preset identification can be updated through a network.
The specific extraction process is similar to the extraction method, and is not described herein again.
In practice, if the target information is located in parentheses (e.g., middle parentheses, small parentheses, large parentheses, etc.), one comma or period before the left parentheses (typically the first comma or period before) and one comma or period after the right parentheses (typically the first comma or period before) may be found, and the content between the two predetermined identifiers is taken as a clause.
The specific extraction process is similar to the extraction method, and is not described herein again.
When the distance between the target information in the clause and the key information in the clause is determined for a selected clause, because the positions of the target information and the key information are different, the target information may be located in front of the key information or behind the key information, so that two distance determining modes are provided in the embodiment of the invention for different situations.
In the first determination mode, for a selected clause, if the target information in the clause is located in front of the key information, the distance determination module 401 determines the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
the p _ key is the distance between the first symbol of the key information in the message and the first symbol of the message.
Assume that the received message is "[ AA ]907050 (dynamic authentication code). Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 4; the length _ number of the key information "907050" is 6, and the position p _ keyword of the first symbol "dynamic" of the target information "dynamic authentication code" is 11; the distance is 11- (4+6) ═ 1.
In the second determination method, for a selected clause, if the target information in the clause is located behind the key information, the distance determination module 401 determines the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
the p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
Assume that the received message is "[ AA ] (dynamic authentication code) 907050. Please fill in 30 minutes. One of the clauses is "[ AA ]907050 (dynamic verification code)", and the distance of the branch is:
defining the position of the first symbol "[" in the message as 0, and sequentially adding 1 to the subsequent positions, so that the position p _ number of the first symbol "9" of the target information "907050" is 11; the length _ keyword of the key information 'dynamic verification code' is 5; the position p _ keyword of the first symbol "dynamic" of the key information "dynamic verification code" is 5; the distance is 11- (5+5) ═ 1.
The embodiment of the invention can take one letter, one number, one punctuation and one Chinese character as one symbol.
Optionally, when determining the verification information from all the target information in the selected clause according to all the determined distances, the information determining module 402 uses the target information with the shortest distance to the key information as the verification information.
For example, the content of the received message is "your account is undergoing 206.00 dollar transactions, check code: 650717, neither kill nor tell others the check code, which asks for the line 12345. "
The clause extracted from the message is "check code: 650717, neither the "kill" nor the "check code" to others, and "check code question hotline 12345".
And selecting a clause containing target information from all clauses as a check code: 650717 "and" check code query hotline 12345 ".
The check code is determined as above: 650717 "distance 23- (19+3) ═ 1;
the "check code query hotline 12345" distance is determined to be 50- (43+3) ═ 4 in the above manner.
Due to the check code: 650717 "distance (i.e., 1) is less than" check code query hot line 12345 "distance (i.e., 4), then" check code: 650717 "as verification information.
In implementation, after the verification information is determined, the page for verifying the verification information is determined, and the verification information is automatically filled in the position where the verification information is filled in the determined page. The page can be a webpage page, an application page, or a page opened in other forms.
From the above, it can be seen that: the method comprises the steps of extracting clauses containing key information and target information from a message, determining the distance between the key information and the target information in each clause, taking the target information in the clause with the minimum distance as verification information, extracting the clause containing each continuous number, letter or combination thereof from the whole information when the received information contains a plurality of continuous numbers, letters or combination thereof according to the distance between the target information in the clause and the key information in the clause, then taking the continuous numbers, letters or combination thereof contained in the clause with the minimum distance as the verification information, and determining the verification information from all the target information, so that the method can be applied to formats of more information and improve the identification accuracy.
The present application is described above with reference to block diagrams and/or flowchart illustrations of methods, apparatus (systems) and/or computer program products according to embodiments of the application. It will be understood that one block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the subject application may also be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, the present application may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this application, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (14)
1. A method of identifying authentication information, the method comprising:
after receiving a message, extracting clauses containing key information indicating that the message contains verification information and target information conforming to a preset format from the message;
determining the distance between the key information and the target information in each clause;
and taking the target information in the clause with the minimum distance as the verification information.
2. The method of claim 1, wherein prior to extracting the clause including the key information and the target information from the message, further comprising:
and determining that the received message is a notification message.
3. The method of claim 1, wherein prior to extracting the clause including the key information and the target information from the message, further comprising:
and determining that the received message comprises key information and/or target information.
4. The method of claim 1, wherein said extracting the clause containing the key information and the target information from the message comprises:
extracting clauses containing key information from the message; extracting clauses containing target information from clauses containing key information; or
Extracting clauses containing target information from the message; and extracting clauses containing key information from the clauses containing the target information.
5. The method of claim 3, wherein said extracting a clause containing key information from said message comprises:
determining all key information included in the received message;
and determining a preset identifier positioned in front of the key information and a nearest preset identifier positioned behind the key information from the message, and taking the content between the two preset identifiers as a clause.
6. The method of claim 3, wherein said extracting the clause containing the target information from the message comprises:
determining all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
7. The method according to any one of claims 1 to 6, wherein the determining of the distance between the key information and the target information in each of the clauses comprises:
if the target information in the clause is positioned in front of the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
if the target information in the clause is positioned behind the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
8. An apparatus for identifying authentication information, the apparatus comprising:
the extraction module is used for extracting clauses containing key information indicating that the message contains verification information and target information conforming to a preset format from the message after the message is received;
the distance determining module is used for determining the distance between the key information and the target information in each clause;
and the information determining module is used for taking the target information in the clause with the minimum distance as the verification information.
9. The device of claim 8, wherein the extraction module is further to:
after the received message is determined to be the notification message, clauses containing key information and target information are extracted from the message.
10. The device of claim 8, wherein the extraction module is further to:
after determining that the received message comprises key information and/or target information, extracting clauses containing the key information and the target information from the message.
11. The device of claim 8, wherein the extraction module is specifically configured to:
extracting clauses containing key information from the message; extracting clauses containing target information from clauses containing key information; or
Extracting clauses containing target information from the message; and extracting clauses containing key information from the clauses containing the target information.
12. The device of claim 11, wherein the extraction module is specifically configured to:
determining all key information included in the received message;
and determining a preset identifier positioned in front of the key information and a nearest preset identifier positioned behind the key information from the message, and taking the content between the two preset identifiers as a clause.
13. The device of claim 11, wherein the extraction module is specifically configured to:
determining all target information included in the received message;
and determining a preset identifier positioned in front of the target information and a nearest preset identifier positioned behind the target information from the message, and taking the content between the two preset identifiers as a clause.
14. The device of any one of claims 8 to 13, wherein the distance determining module is specifically configured to:
if the target information in the clause is positioned in front of the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_keyword-(p_number+length_number);
if the target information in the clause is positioned behind the key information, determining the distance between the target information in the clause and the key information in the clause according to the following formula:
distance=p_number-(p_keyword+length_keyword);
wherein, distance is the distance between the target information in the clause and the key information in the clause;
p _ number is the distance between the first symbol of the target information in the clause and the first symbol of the message;
length _ number is the length of the target information;
p _ keyword is the distance between the first symbol of the key information in the message and the first symbol of the message;
the length _ key is the length of the key information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610298475.2A CN106060000B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
CN202010038902.XA CN111277579B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610298475.2A CN106060000B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010038902.XA Division CN111277579B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106060000A CN106060000A (en) | 2016-10-26 |
CN106060000B true CN106060000B (en) | 2020-02-07 |
Family
ID=57176835
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610298475.2A Active CN106060000B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
CN202010038902.XA Active CN111277579B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010038902.XA Active CN111277579B (en) | 2016-05-06 | 2016-05-06 | Method and equipment for identifying verification information |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN106060000B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106388713A (en) * | 2016-10-31 | 2017-02-15 | 南昌大学 | Intelligent sweeping robot |
CN108270567B (en) * | 2016-12-30 | 2021-09-28 | 阿里巴巴集团控股有限公司 | Message source verification method, device and system and message sending method and device |
CN116484841B (en) * | 2023-05-10 | 2023-10-03 | 道有道科技集团股份公司 | Information verification system and method based on automatic auditing |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103186857A (en) * | 2011-12-31 | 2013-07-03 | 中国银联股份有限公司 | Bank card payment method and system |
CN104021376A (en) * | 2014-06-05 | 2014-09-03 | 北京乐动卓越科技有限公司 | Verification code identifying method and device |
CN105117384A (en) * | 2015-08-19 | 2015-12-02 | 小米科技有限责任公司 | Classifier training method, and type identification method and apparatus |
CN105488025A (en) * | 2015-11-24 | 2016-04-13 | 小米科技有限责任公司 | Template construction method and apparatus and information identification method and apparatus |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7376893B2 (en) * | 2002-12-16 | 2008-05-20 | Palo Alto Research Center Incorporated | Systems and methods for sentence based interactive topic-based text summarization |
JP4647903B2 (en) * | 2003-07-09 | 2011-03-09 | 株式会社東芝 | Information communication apparatus, communication system, and data transmission control program |
CN104283682A (en) * | 2013-07-08 | 2015-01-14 | 深圳市腾讯计算机系统有限公司 | Method, device and system conducting verification through verification codes |
CN111787154A (en) * | 2015-02-15 | 2020-10-16 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104853329B (en) * | 2015-04-27 | 2018-06-12 | 小米科技有限责任公司 | The method and apparatus of identification number |
CN105447750B (en) * | 2015-11-17 | 2022-06-03 | 小米科技有限责任公司 | Information identification method and device, terminal and server |
-
2016
- 2016-05-06 CN CN201610298475.2A patent/CN106060000B/en active Active
- 2016-05-06 CN CN202010038902.XA patent/CN111277579B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103186857A (en) * | 2011-12-31 | 2013-07-03 | 中国银联股份有限公司 | Bank card payment method and system |
CN104021376A (en) * | 2014-06-05 | 2014-09-03 | 北京乐动卓越科技有限公司 | Verification code identifying method and device |
CN105117384A (en) * | 2015-08-19 | 2015-12-02 | 小米科技有限责任公司 | Classifier training method, and type identification method and apparatus |
CN105488025A (en) * | 2015-11-24 | 2016-04-13 | 小米科技有限责任公司 | Template construction method and apparatus and information identification method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN111277579B (en) | 2023-01-17 |
CN111277579A (en) | 2020-06-12 |
CN106060000A (en) | 2016-10-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10657243B2 (en) | Variation analysis-based public turing test to tell computers and humans apart | |
US10795942B2 (en) | Method and device for residing short message verification code | |
US20160014120A1 (en) | Method, server, client and system for verifying verification codes | |
CN110516248A (en) | Method for correcting error of voice identification result, device, storage medium and electronic equipment | |
EP2819351A1 (en) | Information processing method, apparatus, and system | |
CN107682368B (en) | Verification method, client, server and system based on interactive operation | |
EP2892003A1 (en) | Method and apparatus for input verification | |
CN106060000B (en) | Method and equipment for identifying verification information | |
CN107357824B (en) | Information processing method, service platform and computer storage medium | |
US9692771B2 (en) | System and method for estimating typicality of names and textual data | |
CN107943873B (en) | Knowledge graph establishing method, knowledge graph establishing device, computer equipment and storage medium | |
CN105574398A (en) | Verification code verification method and device | |
CN110113329B (en) | Verification method and device for verification code | |
CN111787154A (en) | Information processing method and electronic equipment | |
CN104301875A (en) | Short message processing method and device | |
CN110990811A (en) | Identity authentication method and device | |
CN111651749A (en) | Method and device for finding account based on password, computer equipment and storage medium | |
CN109688109B (en) | Verification method and device of verification code based on client information identification | |
CN109450646B (en) | Verification request processing method and system | |
CN115344315A (en) | Skin switching method and device of applet page and electronic equipment | |
CN107231330B (en) | Password determination and login verification method and device | |
CN108882239B (en) | Information sending method and device | |
CN105022547A (en) | Text input method and apparatus | |
CN108200043A (en) | Picture validation code verification method and picture validation code verification device | |
CN114036364A (en) | Method, apparatus, device, medium and product for identifying a crawler |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11 Patentee after: Qingdao Hisense Mobile Communication Technology Co.,Ltd. Address before: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11 Patentee before: HISENSE MOBILE COMMUNICATIONS TECHNOLOGY Co.,Ltd. |