CN106161380B - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN106161380B
CN106161380B CN201510173444.XA CN201510173444A CN106161380B CN 106161380 B CN106161380 B CN 106161380B CN 201510173444 A CN201510173444 A CN 201510173444A CN 106161380 B CN106161380 B CN 106161380B
Authority
CN
China
Prior art keywords
content extraction
content
extraction code
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510173444.XA
Other languages
Chinese (zh)
Other versions
CN106161380A (en
Inventor
贺啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510173444.XA priority Critical patent/CN106161380B/en
Publication of CN106161380A publication Critical patent/CN106161380A/en
Application granted granted Critical
Publication of CN106161380B publication Critical patent/CN106161380B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses an information processing method and an information processing device, wherein the method comprises the steps of receiving and storing information sent by a server, wherein the information carries the content which is required to be sent to a client by the server; generating a corresponding content extraction code according to the content; the content extraction code is sent to the server side, so that the server side sends the content extraction code to the client side; receiving a content extraction request sent by a client, wherein the content extraction request carries a content extraction code; and sending corresponding content to the client according to the content extraction code. According to the embodiment of the invention, the client can acquire the corresponding information at the credible center through the content extraction code sent by the legal server, and compared with a mode of identifying information by subjective feeling, the false information can be accurately and effectively identified, the problem of money loss of a user is avoided, and the network security is greatly improved.

Description

Information processing method and device
Technical Field
The present invention belongs to the field of communication technologies, and in particular, to an information processing method and apparatus.
Background
With the rapid development of the internet technology, more and more places are provided for people to apply the internet technology in daily life and work, and great convenience is brought to people; meanwhile, the network security problem is becoming more and more obvious, and some lawbreakers steal website service data, such as user sensitive information like user name, password and the like, by imitating real websites or information, so that the purpose of imitating the users of official agencies and fraud can be achieved. For example: a user who has subscribed an air ticket in a carrying process receives a short message of 'flight cancelled and please contact customer service to quit the change sign' several hours before the airplane takes off, and the short message is a fraud behavior implemented by lawless persons in fact for stealing flight information of passengers.
In the research and practice process of the prior art, the inventor of the invention finds that the prior user can only recognize the received information by subjective feeling, can not accurately and effectively recognize false information, and has low safety, thereby being easy to be cheated and causing money loss.
Disclosure of Invention
The invention aims to provide an information processing method and an information processing device, aiming at improving the security of network data and accurately and effectively identifying false information so as to avoid phishing and money loss.
To solve the above technical problem, a first aspect of an embodiment of the present invention provides:
an information processing method, comprising:
receiving and storing information sent by a server, wherein the information carries the content which needs to be sent to a client by the server;
generating a corresponding content extraction code according to the content;
sending the content extraction code to the server side so that the server side sends the content extraction code to a client side;
receiving a content extraction request sent by a client, wherein the content extraction request carries the content extraction code;
and sending corresponding content to the client according to the content extraction code.
To solve the above technical problem, a second aspect of an embodiment of the present invention provides:
an information processing method, comprising:
sending the content to be sent to the client to a trusted center so that the trusted center generates a corresponding content extraction code according to the content;
and receiving a content extraction code sent by the trusted center, and sending the content extraction code to the client so that the client can obtain corresponding content at the trusted center according to the content extraction code.
To solve the above technical problem, a third aspect of the embodiments of the present invention provides:
an information processing method, comprising:
receiving a content extraction code sent by a server, wherein the content extraction code is generated by a trusted center according to the content to be sent to a client by the server;
sending a content extraction request to the trusted center, wherein the content extraction request carries the content extraction code;
and acquiring corresponding content sent by the trusted center according to the content extraction code.
To solve the above technical problem, a fourth aspect of the embodiments of the present invention provides:
the first receiving module is used for receiving and storing information sent by a server, wherein the information carries the content which needs to be sent to a client by the server;
the generating module is used for generating a corresponding content extraction code according to the content;
the first sending module is used for sending the content extraction code to the server so that the server sends the content extraction code to a client;
the second receiving module is used for receiving a content extraction request sent by a client, wherein the content extraction request carries the content extraction code;
and the second sending module is used for sending corresponding content to the client according to the content extraction code.
To solve the above technical problem, a fifth aspect of the embodiments of the present invention provides:
an information processing apparatus, comprising:
the third sending module is used for sending the content to be sent to the client to the trusted center so that the trusted center can generate a corresponding content extraction code according to the content;
the third receiving module is used for receiving the content extraction code sent by the trusted center;
and the fourth sending module is used for sending the content extraction code to the client so that the client can obtain corresponding content at the trusted center according to the content extraction code.
To solve the above technical problem, a sixth aspect of the embodiments of the present invention provides:
an information processing apparatus, comprising:
the fourth receiving module is used for receiving a content extraction code sent by the server, and the content extraction code is generated by the trusted center according to the content to be sent to the client by the server;
a fifth sending module, configured to send a content extraction request to the trusted center, where the content extraction request carries the content extraction code;
and the fifth receiving module is used for receiving the corresponding content sent by the trusted center according to the content extraction code.
To solve the above technical problem, a seventh aspect of the embodiments of the present invention provides:
an information processing system is characterized by comprising a trusted center, a server and a client, wherein the trusted center is the information processing apparatus of the fourth aspect, the server is the information processing apparatus of the fifth aspect, and the client is the information processing apparatus of the sixth aspect.
Compared with the prior art, in the embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to the trusted center to obtain the corresponding content. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Drawings
The technical solution and other advantages of the present invention will become apparent from the following detailed description of specific embodiments of the present invention, which is to be read in connection with the accompanying drawings.
Fig. 1 is a schematic flow chart of an information processing method according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating an information processing method according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating an information processing method according to a third embodiment of the present invention;
fig. 4 is a schematic flowchart of an information processing method according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an information processing apparatus according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of an information processing apparatus according to a sixth embodiment of the present invention;
fig. 7 is a schematic structural diagram of an information processing apparatus according to a seventh embodiment of the present invention;
FIG. 8a is a diagram illustrating an information processing system according to an eighth embodiment of the present invention;
fig. 8b is a flowchart illustrating a processing method based on an information processing system according to an eighth embodiment of the present invention.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements, the principles of the present invention are illustrated as being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be taken as limiting the invention with regard to other embodiments that are not detailed herein.
In the description that follows, specific embodiments of the present invention are described with reference to steps and symbols executed by one or more computers, unless otherwise indicated. Accordingly, these steps and operations will be referred to, several times, as being performed by a computer, the computer performing operations involving a processing unit of the computer in electronic signals representing data in a structured form. This operation transforms the data or maintains it at locations in the computer's memory system, which may be reconfigured or otherwise altered in a manner well known to those skilled in the art. The data maintains a data structure that is a physical location of the memory that has particular characteristics defined by the data format. However, while the principles of the invention have been described in language specific to above, it is not intended to be limited to the specific form set forth herein, but on the contrary, it is to be understood that various steps and operations described hereinafter may be implemented in hardware.
The term "module" as used herein may be considered a software object executing on the computing system. The various components, modules, engines, and services described herein may be viewed as objects implemented on the computing system. The apparatus and method described herein are preferably implemented in software, but may also be implemented in hardware, and are within the scope of the present invention.
First embodiment
Referring to fig. 1, fig. 1 is a flowchart illustrating an information processing method according to a first embodiment of the present invention. The method comprises the following steps:
in step S101, information sent by a server is received and stored, where the information carries content that the server needs to send to a client.
In step S102, a corresponding content extraction code is generated from the content.
The steps S101 and S102 may specifically be:
the information processing method can be operated based on a trusted center, the trusted center can be used as a management server and is mainly used for receiving and storing the content which is required to be sent to the client by the server, and randomly generating a corresponding content extraction code according to the content, wherein each content extraction code is not repeated, so that when the server provides service for the client, the client can identify information as official information or false information according to the content extraction code.
It is understood that the information carrier form of the content extraction code includes, but is not limited to, character, image, sound, video, etc., and the present invention is not limited thereto.
In step S103, the content extraction code is sent to the server, so that the server sends the content extraction code to the client.
In step S104, a content extraction request sent by a client is received, where the content extraction request carries the content extraction code.
In step S105, corresponding content is sent to the client according to the content extraction code.
The steps S103 and S105 may specifically be:
it can be understood that, after receiving the content extraction code of the server, the client verifies whether the content extraction code is true through the trusted center, and if the content extraction code is determined to be true, the trusted center sends corresponding content to the client according to the content extraction code.
Preferably, in some embodiments, in order to reduce the operation steps, software may be installed on the client, and the software automatically completes operations of acquiring corresponding content through the content extraction code, verifying whether the content extraction code is official information, and the like, so that manual confirmation by the user is not required, and the user experience is further improved.
As can be seen from the above, in the information processing method provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Second embodiment
Referring to fig. 2, fig. 2 is a flowchart illustrating an information processing method according to a second embodiment of the present invention. The information processing method is operated based on a trusted center, the trusted center can be used as a management server and is mainly used for receiving and storing contents which need to be sent to a client by a server, and randomly generating a corresponding content extraction code according to the contents, wherein each content extraction code is not repeated, so that when the server provides services for the client, the client can be official information or false information according to the content extraction code identification information.
Different from the first embodiment, the present embodiment mainly provides a detailed description of the verification process of the content extraction code. The method comprises the following steps:
in step S201, the information sent by the server is received and stored.
In step S202, a corresponding content extraction code is generated from the content.
The steps S101 and S102 may specifically be:
it can be understood that the trusted center in the embodiment of the present invention only interacts with the legitimate server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; before a server side provides service for a client side, information is required to be sent to a trusted center, the information carries content which the server side needs to send to the client side, and a corresponding content extraction code is generated randomly according to the content.
Preferably, in order to ensure that the legal server is not counterfeited and utilized by others, a login mechanism is established between the trusted center and the legal server, and each legal server is ensured to have an account and a password thereof for verification during interaction with the trusted center, so that each server cannot imitate information generated by other servers, and the counterfeit server can be effectively avoided.
It is easy to think that a content extraction code corresponding to the content and conforming to a preset information carrier form is generated according to the content, wherein the preset information carrier form comprises one or a combination of more than two of characters, images, sounds and videos, and is not limited in detail here.
In step S203, the content extraction code is sent to the server, so that the server sends the content extraction code to the client.
In step S204, a content extraction request sent by a client is received in a preset communication manner, where the content extraction request carries the content extraction code.
After the content extraction code is generated by the trusted center, the content and the content extraction code can be correspondingly stored in a table form. And simultaneously, the content extraction code is sent to the server, and the server sends the content extraction code to the client so that the client can verify the content extraction code at the trusted center.
It can be understood that the preset communication mode includes one or a combination of more than two of short messages, telephone calls, voice, mails, software and web pages; it is easy to think that, in some embodiments, the client may send the content extraction request to the trust center in the above communication manner, and the trust center determines, in the preset communication manner, the communication manner corresponding to the content extraction request to receive the content extraction request.
In step S205, the content extraction code is verified.
After receiving the content extraction code of the server, the client verifies whether the content extraction code is real through the trusted center, and if the content extraction code is determined to be real, the trusted center sends corresponding content to the client according to the content extraction code.
According to the verification result of the content extraction code, step S206a or step S206b is performed, respectively:
in step S206a, if the content extraction code meets the preset condition, it is determined that the content extraction code is verified, and the content corresponding to the content extraction code is sent to the client.
In step S206b, if the content extraction code does not meet the preset condition, it is determined that the content extraction code fails to be verified, and the indication information that the content extraction code is false is fed back to the client.
It can be understood that the trust center matches the received content extraction code with the pre-stored content extraction code, and if the matching is successful, it is determined that the content extraction code meets the preset condition, whereas if the matching is unsuccessful, it is determined that the content extraction code does not meet the preset condition.
Optionally, if the content extraction code passes the verification, the corresponding content is sent to the client in any one of a short message, a telephone, a voice, an image, a mail and a video according to the content extraction code.
Preferably, in some embodiments, in order to reduce the operation steps, software may be installed on the client, and the software automatically completes operations of acquiring corresponding content through the content extraction code, verifying whether the content extraction code is official information, and the like, so that manual confirmation by the user is not required, and the user experience is further improved.
In some embodiments, after the server obtains the content extraction code sent by the trusted center, the server can send the specific content and the content extraction code corresponding to the content to the client at the same time. The client determines whether to inquire the information of the credible center whether the information is real and effective.
If the client needs to inquire whether the information is true and valid from the trusted center, a verification message carrying the content extraction code needs to be sent to the trusted center, if the verification is confirmed to be passed, the content and the content extraction code sent by the representative server side are regular information, and if the verification is confirmed to be not passed, the trusted center feeds back an indication message that the content and the content extraction code are false information to the client.
As can be seen from the above, in the information processing method provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Third embodiment
Referring to fig. 3, fig. 3 is a flowchart illustrating an information processing method according to a third embodiment of the present invention.
Different from the first and second embodiments, the information processing method provided in this embodiment is based on a service end, where the service end is a service provider providing specific services to the client, such as china telecommunications, china mobile, and the like; the server is mainly used for storing the content to be sent to the client to the trusted center, acquiring the content extraction code and sending the content extraction code to the client.
The method comprises the following steps:
in step S301, the content to be sent to the client is sent to the trust center, so that the trust center generates a corresponding content extraction code according to the content.
In step S302, a content extraction code sent by the trusted center is received.
In step S303, the content extraction code is sent to the client, so that the client obtains the corresponding content according to the content extraction code.
Preferably, the service end can send the content extraction code to the client end in a short message, telephone or mail manner, and the client end can receive the content extraction code in a corresponding manner.
In one embodiment, the client acquires the corresponding content at the trusted center according to the content extraction code;
in another embodiment, the server may send the specific content and the content extraction code corresponding to the content to the client at the same time. The client determines whether to inquire the information of the credible center whether the information is real and effective.
If the client needs to inquire whether the information is true and valid from the trusted center, a verification message carrying the content extraction code needs to be sent to the trusted center, if the verification is confirmed to be passed, the content and the content extraction code sent by the representative server side are regular information, and if the verification is confirmed to be not passed, the trusted center feeds back an indication message that the content and the content extraction code are false information to the client.
It is to be understood that, for parts that are not described in detail in this embodiment, reference may be made to detailed descriptions corresponding to relevant steps in the first embodiment and the second embodiment, and details are not described here again.
As can be seen from the above, in the information processing method provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Fourth embodiment
Referring to fig. 4, fig. 4 is a flowchart illustrating an information processing method according to a fourth embodiment of the invention.
Different from the first, second and third embodiments, the information processing method provided in this embodiment is based on a client running on a terminal, and the client may be a terminal with computing capability, such as a notebook computer, a tablet pc (personal computer), a mobile phone, and the like, which has a storage unit and a microprocessor, and is not limited in this respect. The client is mainly used for sending the content extraction code sent by the server to the trusted center for verification, so that the information is recognized as official information or false information.
The method comprises the following steps:
in step S401, a content extraction code sent by a server is received, where the content extraction code is generated by a trusted center according to content to be sent to a client by the server.
In step S402, a content extraction request is sent to the trust center, where the content extraction request carries the content extraction code.
In step S403, the corresponding content sent by the trusted center according to the content extraction code is obtained.
Optionally, after the client receives the content extraction code, in order to learn the content, the client may include but is not limited to: and inquiring verification from the trusted center in modes of short messages, telephones, web pages, software and the like.
Preferably, in some embodiments, in order to reduce the operation steps, software may be installed on the client, and the software automatically completes operations of acquiring corresponding content through the content extraction code, verifying whether the content extraction code is official information, and the like, so that manual confirmation by the user is not required, and the user experience is further improved.
Further, the server may send the specific content and the content extraction code corresponding to the content to the client at the same time. The client determines whether to query the trusted center for whether the information is real and valid, and the examples herein do not limit the present invention.
It is understood that, for parts that are not described in detail in this embodiment, reference may be made to the detailed description corresponding to the relevant steps of the first, second, and third embodiments, and further description is omitted here.
As can be seen from the above, in the information processing method provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Fifth embodiment
In order to better implement the information processing method provided by the embodiment of the present invention, an embodiment of the present invention further provides an apparatus based on the information processing method. The terms are the same as those in the above-described information processing method, and details of implementation may refer to the description in the method embodiment.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present invention, where the information processing apparatus corresponds to the information processing method according to the first embodiment.
The information processing apparatus of this embodiment is used as a trusted center, and is used as a management server, and is mainly responsible for receiving and storing contents that a server needs to send to a client, and randomly generating a corresponding content extraction code according to the contents, where each content extraction code is not repeated, so that when the server provides services to the client, the client can be official information or false information according to the content extraction code identification information.
As shown in fig. 5, the information processing apparatus according to the present invention may include a first receiving module 501, a generating module 502, a first sending module 503, a second receiving module 504, and a second sending module 505.
The first receiving module 501 is configured to receive and store information sent by a server, where the information carries content that the server needs to send to a client; the generating module 502 is configured to generate a corresponding content extraction code according to the content.
It can be understood that the trusted center in the embodiment of the present invention only interacts with the legitimate server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; before a server side provides service for a client side, information is required to be sent to a trusted center, the information carries content which the server side needs to send to the client side, and a corresponding content extraction code is generated randomly according to the content.
Preferably, in order to ensure that the legal server is not counterfeited and utilized by others, a login mechanism is established between the trusted center and the legal server, and each legal server is ensured to have an account and a password thereof for verification during interaction with the trusted center, so that each server cannot imitate information generated by other servers, and the counterfeit server can be effectively avoided.
It is easy to think that a content extraction code corresponding to the content and conforming to a preset information carrier form is generated according to the content, wherein the preset information carrier form comprises one or a combination of more than two of characters, images, sounds and videos, and is not limited in detail here.
The first sending module 503 is configured to send the content extraction code to the server, so that the server sends the content extraction code to a client; the second receiving module 504 is configured to receive a content extraction request sent by a client, where the content extraction request carries the content extraction code; the second sending module 505 is configured to send corresponding content to the client according to the content extraction code.
After the content extraction code is generated by the trusted center, the content and the content extraction code can be correspondingly stored in a table form. And simultaneously, the content extraction code is sent to the server, and the server sends the content extraction code to the client so that the client can verify the content extraction code at the trusted center.
It can be understood that the preset communication mode includes one or a combination of more than two of short messages, telephone calls, voice, mails, software and web pages; it is easy to think that, in some embodiments, the client may send the content extraction request to the trust center in the above communication manner, and the trust center determines, in the preset communication manner, the communication manner corresponding to the content extraction request to receive the content extraction request.
Further, based on the information processing apparatus provided in fig. 5, the following preferable settings can also be made:
the second sending module 504 includes: a verification unit configured to verify the content extraction code; the sending unit is used for determining that the content extraction code passes verification if the content extraction code meets a preset condition, and sending content corresponding to the content extraction code to the client; and the feedback unit is used for determining that the content extraction code is not verified if the content extraction code does not meet the preset condition, and feeding back the indication information that the content extraction code is false to the client.
After receiving the content extraction code of the server, the client verifies whether the content extraction code is real through the trusted center, and if the content extraction code is determined to be real, the trusted center sends corresponding content to the client according to the content extraction code.
The credible center matches the received content extraction code with the pre-stored content extraction code, if the matching is successful, the content extraction code is determined to be in accordance with the preset condition, otherwise, if the matching is unsuccessful, the content extraction code is determined to be not in accordance with the preset condition.
It can be understood that the second sending module 504 can be specifically configured to send corresponding content to the client in any one of a short message, a telephone call, a voice, an image, an email, and a video according to the content extraction code. The generating module 502 may be specifically configured to generate a content extraction code corresponding to the content and conforming to a preset information carrier format, where the preset information carrier format includes one or a combination of two or more of characters, images, sounds, and videos. The second receiving module 504 may be specifically configured to receive a content extraction request sent by a client through a preset communication manner, where the preset communication manner includes one or a combination of two or more of a short message, a telephone call, a voice, an email, software, and a web page.
In addition, in a preferred embodiment, in order to reduce the operation steps, software may be installed on the client, and the software automatically completes the operations of acquiring corresponding content through the content extraction code, verifying whether the content extraction code is official information, and the like, so that the user does not need to manually confirm, and the user experience is further improved.
In some embodiments, after the server obtains the content extraction code sent by the trusted center, the server can send the specific content and the content extraction code corresponding to the content to the client at the same time. The client determines whether to inquire the information of the credible center whether the information is real and effective.
If the client needs to inquire whether the information is true and valid from the trusted center, a verification message carrying the content extraction code needs to be sent to the trusted center, if the verification is confirmed to be passed, the content and the content extraction code sent by the representative server side are regular information, and if the verification is confirmed to be not passed, the trusted center feeds back an indication message that the content and the content extraction code are false information to the client.
As can be seen from the above, in the information processing apparatus provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Sixth embodiment
Referring to fig. 6, fig. 6 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present invention, where the information processing apparatus corresponds to the information processing method according to the third embodiment.
The information processing apparatus of the present embodiment is used as a server, and the server is a service provider providing specific services to a client, such as china telecommunications, china mobile, and the like; the server is mainly used for storing the content to be sent to the client to the trusted center, acquiring the content extraction code and sending the content extraction code to the client.
As shown in fig. 6, the information processing apparatus according to the present invention may include a third sending module 601, a third receiving module 602, and a fourth sending module 603;
the third sending module 601 is configured to send content to be sent to the client to the trusted center, so that the trusted center generates a corresponding content extraction code according to the content; the third receiving module 602 is configured to receive a content extraction code sent by the trust center; the fourth sending module 603 is configured to send the content extraction code to the client, so that the client obtains corresponding content at the trust center according to the content extraction code.
Further, in some embodiments, the fourth sending module 604 may be specifically configured to send the content extraction code to the client in a short message, a telephone call, or an email mode.
Preferably, the service end can send the content extraction code to the client end in a short message, telephone or mail manner, and the client end can receive the content extraction code in a corresponding manner.
In one embodiment, the client acquires the corresponding content at the trusted center according to the content extraction code; in another embodiment, the server may send the specific content and the content extraction code corresponding to the content to the client at the same time. The client determines whether to inquire the information of the credible center whether the information is real and effective.
If the client needs to inquire whether the information is true and valid from the trusted center, a verification message carrying the content extraction code needs to be sent to the trusted center, if the verification is confirmed to be passed, the content and the content extraction code sent by the representative server side are regular information, and if the verification is confirmed to be not passed, the trusted center feeds back an indication message that the content and the content extraction code are false information to the client.
It is understood that, for parts that are not described in detail in this embodiment, reference may be made to the detailed description corresponding to the relevant steps in the above embodiments, and details are not described here.
As can be seen from the above, in the information processing apparatus provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Seventh embodiment
Referring to fig. 7, fig. 7 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present invention, where the information processing apparatus corresponds to the information processing method according to the fourth embodiment.
The information processing apparatus of the present embodiment is used as a client, and the client may be a terminal having a storage unit, a microprocessor, and an arithmetic capability, such as a notebook computer, a tablet PC, and a mobile phone, which is not limited in this respect. The client is mainly used for sending the content extraction code sent by the server to the trusted center for verification, so that the information is recognized as official information or false information.
As shown in fig. 7, the information processing apparatus according to the present invention may include a fourth receiving module 701, a fifth sending module 702, and a fifth receiving module 703;
the fourth receiving module 701 is configured to receive a content extraction code sent by a server, where the content extraction code is generated by a trusted center according to content that the server will need to send to a client; the fifth sending module 702 is configured to send a content extraction request to the trust center, where the content extraction request carries the content extraction code; the fifth receiving module 703 is configured to receive corresponding content sent by the trust center according to the content extraction code.
Optionally, after the client receives the content extraction code, in order to learn the content, the client may include but is not limited to: and inquiring verification from the trusted center in modes of short messages, telephones, web pages, software and the like.
Preferably, in some embodiments, in order to reduce the operation steps, software may be installed on the client, and the software automatically completes operations of acquiring corresponding content through the content extraction code, verifying whether the content extraction code is official information, and the like, so that manual confirmation by the user is not required, and the user experience is further improved.
Further, the server may send the specific content and the content extraction code corresponding to the content to the client at the same time. The client determines whether to query the trusted center for whether the information is real and valid, and the examples herein do not limit the present invention.
It is understood that, for parts that are not described in detail in this embodiment, reference may be made to the detailed description corresponding to the relevant steps in the above embodiments, and details are not described here.
As can be seen from the above, in the information processing apparatus provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
Eighth embodiment
Referring to fig. 8a, fig. 8a is a schematic structural diagram of an information processing system according to an embodiment of the present invention,
the information processing system includes: the information processing apparatus according to the fifth embodiment may be specifically configured as a trusted center, a server, and a client, where the trusted center is the information processing apparatus according to the sixth embodiment, the server is the information processing apparatus according to the seventh embodiment, and the client is the information processing apparatus according to the seventh embodiment.
FIG. 8b is a flowchart of a method based on the information handling system;
step S1, the server side sends the content to be sent to the client side to the credible center;
for example: "three, your points 12323 points, can be exchanged for an iPhone 6. "China Mobile", "Zhang three, you good! Your scheduled LSA23A flight is late for 2 hours, and is expected to take off at 10 am on 20 days 1 and 20 months 2015, and is ready for waiting. "service information, which may include any form of information such as text, images, sounds, videos, etc., is sent to the trust center.
Step S2, the trusted center generates a corresponding content extraction code according to the content;
for example, the content extraction code is presented in textual form as A3LFDN @% ¥ A.
Step S3, the server side sends the content extraction code to the client side;
the server side sends the content extraction code 'A3 LFDN @% ¥ A' to the client side (such as Zhang III), wherein the sending form includes but is not limited to short message, telephone, mail and the like.
Step S4, the client sends a content extraction request carrying the content extraction code to the trusted center;
and step S5, the trusted center sends the content corresponding to the content extraction code to the client.
After receiving a content extraction code of a server, a client verifies whether the content extraction code is real through a trusted center, and if the content extraction code is determined to be real, the trusted center sends corresponding content to the client according to the content extraction code; and if the content extraction code is determined to be not true, feeding back the indication information that the content extraction code is false to the client, so as to effectively and accurately identify the false information.
As can be seen from the above, in the information processing system provided in this embodiment, the server uploads the content sent to the client to the trusted center for storage, the trusted center generates the content extraction code according to the content and returns the content extraction code to the server, the server sends the content extraction code to the client, and the client uses the content extraction code to obtain the corresponding content from the trusted center. In the embodiment of the invention, the trusted center only interacts with the legal server, so that the information sent to the client by the lawbreaker cannot be verified in the trusted center; and the client can acquire the corresponding information at the trusted center through the content extraction code sent by the legal server, and can accurately and effectively identify false information, avoid the problem of money loss of users and greatly improve the network security compared with a mode of identifying information by subjective feeling.
In the above embodiments, the descriptions of the embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed description of the information processing method, and are not described herein again.
The information processing apparatus provided in the embodiment of the present invention is, for example, a computer, a tablet computer, a mobile phone with a touch function, and the like, and the information processing apparatus and the information processing method in the above embodiments belong to the same concept, and any method provided in the information processing method embodiment may be run on the information processing apparatus, and a specific implementation process thereof is described in the information processing method embodiment, and is not described herein again.
It should be noted that, for the information processing method of the present invention, a person skilled in the art may understand that all or part of the process of implementing the information processing method according to the embodiment of the present invention may be completed by controlling related hardware through a computer program, where the computer program may be stored in a computer readable storage medium, such as a memory of a terminal, and executed by at least one processor in the terminal, and during the execution process, the process of implementing the embodiment of the information processing method may include the process of the embodiment of the information processing method. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
In the information processing apparatus according to the embodiment of the present invention, each functional module may be integrated into one processing chip, each module may exist alone physically, or two or more modules may be integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, or the like.
The foregoing describes an information processing method and apparatus provided in an embodiment of the present invention in detail, and a specific example is applied in the present disclosure to explain the principle and the implementation of the present invention, and the above description of the embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (20)

1. An information processing method, which is operated based on a trust center, the method comprising:
the trusted center establishes a login mechanism with the legal server to configure a corresponding account and password for each legal server, and when the server logs in, the server is verified by using the account and the password corresponding to the server to ensure that the server is the legal server;
receiving and storing information sent by the server, wherein the information carries the content which needs to be sent to the client by the server;
generating a corresponding content extraction code according to the content;
sending the content extraction code to the server side so that the server side sends the content extraction code to a client side;
receiving a content extraction request sent by a client, wherein the content extraction request carries the content extraction code;
and sending corresponding content to the client according to the content extraction code.
2. The information processing method according to claim 1, wherein the sending the corresponding content to the client according to the content extraction code includes:
verifying the content extraction code;
and if the content extraction code meets the preset condition, determining that the content extraction code passes verification, and sending the content corresponding to the content extraction code to the client.
3. The information processing method according to claim 2, wherein after the verifying the content extraction code, further comprising:
and if the content extraction code does not meet the preset condition, determining that the content extraction code is not verified, and feeding back indication information that the content extraction code is false to the client.
4. The information processing method according to any one of claims 1 to 3, wherein the generating a corresponding content extraction code from the content includes:
and generating a corresponding content extraction code which accords with a preset information carrier form according to the content, wherein the preset information carrier form comprises one or more combinations of characters, images, sounds and videos.
5. The information processing method according to any one of claims 1 to 3, wherein the receiving of the content extraction request sent by the client includes:
and receiving a content extraction request sent by a client through a preset communication mode, wherein the preset communication mode comprises one or the combination of more than two of short messages, telephones, voices, mails, software and webpages.
6. The information processing method according to any one of claims 1 to 3, wherein the sending, to the client, the corresponding content according to the content extraction code includes:
and sending corresponding content to the client in any mode of short message, telephone, voice, image, mail and video according to the content extraction code.
7. An information processing method characterized by comprising:
the server establishes a login mechanism with a trusted center and is configured with a corresponding account and a password, so that when logging in the trusted center, the trusted center verifies the server by using the account and the password corresponding to the server to ensure that the server is a legal server;
sending the content to be sent to the client to a trusted center so that the trusted center generates a corresponding content extraction code according to the content;
and receiving a content extraction code sent by the trusted center, and sending the content extraction code to the client so that the client can obtain corresponding content at the trusted center according to the content extraction code.
8. The information processing method of claim 7, wherein the sending the content extraction code to a client comprises:
and sending the content extraction code to the client in a short message or telephone or mail mode.
9. An information processing method characterized by comprising:
receiving a content extraction code sent by a server, wherein the content extraction code is generated by a trusted center according to the content to be sent to a client by the server; a login mechanism is pre-established between the trusted center and the service end, and each legal service end is configured with a corresponding account and password so as to ensure that the service end is a legal service end by using the account and the password corresponding to the service end;
sending a content extraction request to the trusted center, wherein the content extraction request carries the content extraction code;
and acquiring corresponding content sent by the trusted center according to the content extraction code.
10. An information processing apparatus that is executed based on a trust center, the apparatus comprising:
the first receiving module is used for receiving and storing information sent by a server, wherein the information carries the content which needs to be sent to a client by the server; the trusted center establishes a login mechanism between the trusted center and a legal server in advance so as to configure a corresponding account and a password for each legal server, and when the servers log in, the accounts and the passwords corresponding to the servers are used for verifying the servers so as to ensure that the servers are legal servers;
the generating module is used for generating a corresponding content extraction code according to the content;
the first sending module is used for sending the content extraction code to the server so that the server sends the content extraction code to a client;
the second receiving module is used for receiving a content extraction request sent by a client, wherein the content extraction request carries the content extraction code;
and the second sending module is used for sending corresponding content to the client according to the content extraction code.
11. The information processing apparatus according to claim 10, wherein the second transmission module includes:
a verification unit configured to verify the content extraction code;
and the sending unit is used for determining that the content extraction code passes verification if the content extraction code meets a preset condition, and sending the content corresponding to the content extraction code to the client.
12. The information processing apparatus according to claim 11, wherein the second transmission module further includes:
and the feedback unit is used for determining that the content extraction code is not verified if the content extraction code does not meet the preset condition, and feeding back the indication information that the content extraction code is false to the client.
13. The information processing apparatus according to any one of claims 10 to 12, wherein the generating module is specifically configured to generate, according to the content, a content extraction code that corresponds to and conforms to a preset information carrier format, where the preset information carrier format includes one or a combination of two or more of characters, images, sounds, and videos.
14. The information processing apparatus according to any one of claims 10 to 12, wherein the second receiving module is specifically configured to receive a content extraction request sent by a client through a preset communication manner, where the preset communication manner includes one or a combination of two or more of a short message, a telephone call, a voice, an email, software, and a web page.
15. The information processing apparatus according to any one of claims 10 to 12, wherein the second sending module is specifically configured to send corresponding content to the client in any one of a short message, a telephone call, voice, an image, an email, and a video according to the content extraction code.
16. An information processing apparatus that is executed on a server side, the apparatus comprising:
the third sending module is used for sending the content to be sent to the client to the trusted center so that the trusted center can generate a corresponding content extraction code according to the content; the server establishes a login mechanism with a trusted center in advance, and is configured with a corresponding account and a password, so that when logging in the trusted center, the trusted center verifies the server by using the account and the password corresponding to the server to ensure that the server is a legal server;
the third receiving module is used for receiving the content extraction code sent by the trusted center;
and the fourth sending module is used for sending the content extraction code to the client so that the client can obtain corresponding content at the trusted center according to the content extraction code.
17. The information processing apparatus according to claim 16, wherein the fourth sending module is specifically configured to send the content extraction code to the client by a short message, a telephone call, or an email.
18. An information processing apparatus characterized by comprising:
the fourth receiving module is used for receiving a content extraction code sent by the server, and the content extraction code is generated by the trusted center according to the content to be sent to the client by the server; a login mechanism is pre-established between the trusted center and the service end, and each legal service end is configured with a corresponding account and password so as to ensure that the service end is a legal service end by using the account and the password corresponding to the service end;
a fifth sending module, configured to send a content extraction request to the trusted center, where the content extraction request carries the content extraction code;
and the fifth receiving module is used for receiving the corresponding content sent by the trusted center according to the content extraction code.
19. An information processing system comprising a trusted center, a server and a client, wherein the trusted center is the information processing apparatus according to any one of claims 9 to 15, the server is the information processing apparatus according to claim 16 or 17, and the client is the information processing apparatus according to claim 18.
20. A computer-readable storage medium storing a computer program, wherein the computer program causes a computer to perform the method according to any one of claims 1 to 6.
CN201510173444.XA 2015-04-14 2015-04-14 Information processing method and device Active CN106161380B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510173444.XA CN106161380B (en) 2015-04-14 2015-04-14 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510173444.XA CN106161380B (en) 2015-04-14 2015-04-14 Information processing method and device

Publications (2)

Publication Number Publication Date
CN106161380A CN106161380A (en) 2016-11-23
CN106161380B true CN106161380B (en) 2020-04-10

Family

ID=57337158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510173444.XA Active CN106161380B (en) 2015-04-14 2015-04-14 Information processing method and device

Country Status (1)

Country Link
CN (1) CN106161380B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754107A (en) * 2008-12-17 2010-06-23 北大方正集团有限公司 Method and system for real-time publishing and sharing files in mobile communication terminal
CN103745368A (en) * 2014-01-14 2014-04-23 浪潮电子信息产业股份有限公司 Method for realizing two-dimension code safe shopping on shopping platform
CN104104657A (en) * 2013-04-07 2014-10-15 腾讯科技(深圳)有限公司 Information validation method, server, terminal and system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198944A (en) * 2003-09-05 2008-06-11 杰出网络公司 Authentication of content download
US7593939B2 (en) * 2006-04-07 2009-09-22 Google Inc. Generating specialized search results in response to patterned queries
CN101547095B (en) * 2009-02-11 2011-05-18 广州杰赛科技股份有限公司 Application service management system and management method based on digital certificate
US8863252B1 (en) * 2012-07-25 2014-10-14 Sprint Communications Company L.P. Trusted access to third party applications systems and methods

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101754107A (en) * 2008-12-17 2010-06-23 北大方正集团有限公司 Method and system for real-time publishing and sharing files in mobile communication terminal
CN104104657A (en) * 2013-04-07 2014-10-15 腾讯科技(深圳)有限公司 Information validation method, server, terminal and system
CN103745368A (en) * 2014-01-14 2014-04-23 浪潮电子信息产业股份有限公司 Method for realizing two-dimension code safe shopping on shopping platform

Also Published As

Publication number Publication date
CN106161380A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
CN109831456B (en) Message pushing method, device, equipment and storage medium
US10200362B2 (en) Method and system for verifying an account operation
US9979721B2 (en) Method, server, client and system for verifying verification codes
CN110392054B (en) Login verification method, device, system, equipment and readable storage medium
EP3402136B1 (en) Information interaction method, client and device
CN107241336B (en) Identity verification method and device
WO2014040479A1 (en) User identity authenticating method and device for preventing malicious harassment
CN102546165B (en) Dynamic URL maker, generation method, based on the Verification System of dynamic URL and method
WO2008064403A1 (en) Remote service authentication method
CN109257321B (en) Secure login method and device
JP2019533915A (en) Incoming call management method and apparatus
US11757870B1 (en) Bi-directional voice authentication
CN111343162B (en) System secure login method, device, medium and electronic equipment
CN111092729A (en) Electronic signature and seal verification method and device
CN109525588B (en) Verification code processing method, device and system
CN105100005B (en) Identity verification method and device
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN105577621B (en) Business operation verification method, device and system
US9742776B2 (en) Contact identification validation via social invitation
CN106161380B (en) Information processing method and device
CN114095463B (en) Data processing method, device, equipment and medium based on instant messaging
EP3151519B1 (en) An intelligent system of unified content posting
US8681949B1 (en) System, method, and computer program for automated non-sound operations by interactive voice response commands
US10853789B2 (en) Dynamic digital consent
EP3644551A1 (en) Method and device for forwarding message, and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant