CN106332024A - Insecure short message recognition method and related equipment - Google Patents
Insecure short message recognition method and related equipment Download PDFInfo
- Publication number
- CN106332024A CN106332024A CN201610796204.XA CN201610796204A CN106332024A CN 106332024 A CN106332024 A CN 106332024A CN 201610796204 A CN201610796204 A CN 201610796204A CN 106332024 A CN106332024 A CN 106332024A
- Authority
- CN
- China
- Prior art keywords
- note
- information
- url link
- link
- feedback information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses an insecure short message recognition method and related equipment. The method comprises the steps of receiving a short message; judging whether the content of the received short message contains sensitive information or not, wherein the sensitive information refers keywords related with privacy information of a user; under the condition that the content of the short message contains keywords, extracting target information from the short message, wherein the target information comprises at least one of a sending number of the short message or the content of the short message; sending the target information to a network security server; receiving first feedback information which is fed back by the network security server after verification for the target information, wherein the first feedback information is used for indicating whether the short message is a secure short message or not; and not displaying the short message to the user under the condition that the first feedback information indicates that the short message is an insecure short message. The method disclosed by the embodiment of the invention can perform verification on short messages received by a mobile terminal so as to determine whether the short messages are secure short messages or not, thereby avoiding the user from suffering economic losses. The embodiment of the invention further provides a mobile terminal and a network security server.
Description
Technical field
The present invention relates to moving communicating field, particularly relate to a kind of method identifying non-security note and relevant device.
Background technology
Continuous progressive along with society, the mobile terminal such as mobile phone becomes communication equipment indispensable in people's life.Pass through
The built-in short message module of mobile terminal carries out the transmitting-receiving of short message, and in people's daily life, utilization rate is the highest especially one is led to
Telecommunication function.But, short message swindle also becomes the severely afflicated area swindling at present case, and lawless person utilizes short message to carry out swindling
Case is of common occurrence, and such as, a lot of lawless persons can utilize pseudo-base station, sends swindle note to user.
Pseudo-base station, also known as false base station, false base station, is a kind of illegal wireless electrical communication equipment, be typically placed at automobile or
The place that one comparison of person is hidden, it is possible to search the SIM card information taken centered by it, in the range of certain radius, when pseudo-base station is transported
During row, the user mobile phone signal in pseudo-base station coverage is forced to be connected on this equipment, it is impossible to be connected to public telecommunication network
Network, to affect the normal use of cellphone subscriber.Then, pseudo-base station can arbitrarily falsely use other people phone number by force to user mobile phone
Send the refuse messages such as swindle, distribution.
Further, comprising fishing chained address inside swindle note, user once accesses, and will steal user profile,
The economic interests of infringement user.
Summary of the invention
Embodiments provide a kind of method identifying non-security note and relevant device, be used for identifying non-security short
Letter, can effectively reduce user due to the safety of None-identified note, guide according to the content of secure short message after operating
The loss caused.
Embodiments provide a kind of method identifying non-security note and relevant device, for verifying the peace of note
Quan Xing, it is to avoid user is due to the safety of None-identified note, and suffers economic loss.
First aspect, the embodiment of the present invention provides a kind of method identifying non-security note, and the method may include that movement
Terminal receive note, this note be probably sms center send secure short message, it is also possible to by pseudo-base station send non-security
Note.Therefore, when mobile terminal receives note, this mobile terminal can't show this note, but first has to determine this
Whether note comprises sensitive information.This sensitive information refers to the keyword relevant to user privacy information.If this short breath includes
Sensitive information then shows that this note exists risk, it may be possible to the non-security note that pseudo-base station sends.In the content of this note
In the case of this keyword, extracting target information from this note, this target information includes: send the transmission number of this note
Code, or, at least one in the content of this note.This target information is sent to network security server;Then, this net is received
The first feedback information that network security server verifies this target information and feeds back, this first feedback information is used for indicating this note be
No for secure short message;In the case of this first feedback information indicates this note to be non-security note, do not display to the user that this is short
Letter.The embodiment of the present invention, can effectively determine whether the note that mobile terminal receives is secure short message, in this first feedback letter
Breath indicates in the case of this note is non-security note, do not display to the user that this note, it is to avoid user is according to non-security note
Guide operate, and lost by economic interests.
In a kind of possible implementation, in the case of this first feedback information indicates this note to be secure short message,
Display to the user that this note.Mobile terminal note after user shows verification, effectively raises the degree of safety of this note.
In a kind of possible implementation, this note is not indicated to be whether the feelings of secure short message at this first feedback information
Under condition, display to the user that this note, and point out this note to there is risk to this user.Risk is there is with prompting this note of user,
Should be careful, effectively reduce the probability that user is swindled by lawless person.
In a kind of possible implementation, if this short message content does not comprise this keyword, then display to the user that this is short
Letter.
In a kind of possible implementation, if this short message content includes that uniform resource position mark URL links, the method
Also include: receive the operational order of the URL link of user's input;This link wouldn't be issued browser to open, this operation refers to
Order triggers mobile terminal and sends this URL link to this network security server, to verify this URL link.Receive this net
The second feedback information that network security server verifies this URL link and feeds back, this second feedback information is used for indicating this URL link
Whether is secure link, mobile terminal can point out this URL link to there is risk in the way of text message, or can also lead to
Cross sound to point out.In the case of this second feedback information indicates this URL link to be non-security link, refusal responds this behaviour
Instruct.In the case of mobile terminal shows this note, if the content of this note includes URL link, and this mobile terminal
After the operational order of the URL link receiving user's input, mobile terminal wouldn't show the interface of URL link.But network peace
URL link is verified by full server, and mobile terminal carries out corresponding process according to the result of verification to this URL link,
When object information indicates this URL link to be non-security link, mobile terminal does not show this URL link, effectively avoids this URL
It is linked as being linked to fishing website, the interests of infringement user.
In a kind of possible implementation, do not indicate whether this URL link is secure link at this second feedback information
In the case of, respond this operational order and open this URL link, and pointing out this URL link to there is risk to this user.
In a kind of possible implementation, in the situation that this second feedback information indicates this URL link to be secure link
Under, respond this operational order and open this URL link.
Second aspect, embodiments provides a kind of method identifying non-security note, receives mobile terminal and sends
Target information, in the content sending number or this note of the note that this target information is received by this mobile terminal at least
One;According to the first presupposed information and this target information, the safety of this note is verified, generates the first feedback information,
This first feedback information is used for indicating whether this note is secure short message;This first feedback information is sent to this mobile terminal.
In a kind of possible implementation, this first presupposed information is the first blacklist including multiple number, and this is years old
One blacklist is reported by user, network security server carry out recording and safeguarding and formed.And the network security server cycle
Property updates this first blacklist.In the case of the transmission number that this target information is this note, it is judged that in this first blacklist
Whether include the transmission number of this note, if this first blacklist includes this transmission number, then this first feedback letter generated
To be used for indicating this note be non-security note to breath, if this first blacklist does not include this transmission number, then generate this first
Feedback information instruction this note of None-identified whether safety.The number of non-security note is recorded, by judging by blacklist
Whether the transmission number of the note received is present in the safety verifying this note in this black bright list, and verification mode is easy, soon
Speed.
In a kind of possible implementation, this first presupposed information includes the record letter of the issued note of sms center
Breath, in the case of the content that target information is this note, network security server inquires about this record information, then, it is judged that should
Whether record information includes the content of this note, if this record information includes the content of this note, then generate this first
Feedback information indicates this note to be secure short message, if this record information does not include the content of this note, then generate this first
Feedback information indicates this note to be non-security note.Whether network security server is by note by mating the content of this note
Center sends, and judges the safety of this note.Being verified note by the content of note, can verify out accurately should
Note is secure short message or non-security note.
In a kind of possible implementation, in the situation of the content sending number and note that target information is note
Under, and this target information carries timestamp, network security server can directly pass through the issued note in short message enquiry center
Record information, the transmission number of first matching sms, if record has this note in this record information of the moment of timestamp record
Transmission number be transmitted across note, then the content of matching sms whether identical in record information, if short message sending time
Between, the content sending number and note of note all mate, then the first feedback information generated for indicating this note is
Secure short message.If including the transmission number of this note in record information, but the content of note do not mated, it may be possible to pseudo-base station
Pretend to be the phone number of user, and the non-security note sent.
In a kind of possible implementation, receiving the URL link that this mobile terminal sends, network security server also may be used
Verify with the safety to URL link.According to the second presupposed information, the safety of this URL link is verified, generate
Second feedback information, this second feedback information is used for indicating whether this URL link is secure link.
In a kind of possible implementation, this second presupposed information is include multiple non-security URL link second black
List, verifies the safety of this URL link according to this second presupposed information, generates the tool of the step of the second feedback information
The implementation of body can be: judges whether include this URL link in this second blacklist, if this second blacklist includes this
URL link, then the second feedback information generated is non-security link for indicating this URL link, if in this second blacklist not
Including this URL link, then second feedback information instruction this URL link of None-identified generated whether safety.Come by blacklist
Recording non-security URL link, whether the URL link received by judgement is present in this black bright list verifies this URL link
Safety, verification mode is easy, quickly.
In a kind of possible implementation, this second presupposed information includes multiple URL link and corresponding putting on record thereof
Information, log-on message and qualification certification information.This URL link according to receiving inquires about this second presupposed information.If this second
Presupposed information inquires record information corresponding to this URL link, log-on message and qualification certification information, then generate this second
Feedback information indicates this URL link to be secure link;If not inquiring corresponding standby of this URL link in this second presupposed information
Case information, log-on message and qualification certification information, then this second feedback information generated indicates this URL link to be non-security chain
Connect;If inquiring in this second presupposed information in record information corresponding to this URL link, log-on message or qualification certification information
Any one or two information, then this second feedback information generated instruction this URL link of None-identified whether safety.
The third aspect, embodiments provide a kind of mobile terminal, including processor, and respectively with this process
The Receiver And Transmitter of device coupling;This receiver, is used for receiving note;This processor, for judging what this receiver received
Whether including the keyword relevant to user privacy information in the content of this note, the content in this note includes this keyword
In the case of, from this note, extract target information, this target information includes: send the transmission number of this note, or, this note
Content at least one;This transmitter, is sent to Network Security Service for this target information extracted by this processor
Device;This receiver, is additionally operable to receive this network security server and verifies this target information and the first feedback information of feeding back, and this is years old
One feedback information is used for indicating whether this note is secure short message;This processor, be additionally operable to receive at this receiver this first
In the case of feedback information indicates this note to be non-security note, do not display to the user that this note.
In a kind of possible implementation, also include: the display device coupled with this processor;This display device, uses
In the case of indicating this note to be secure short message at this first feedback information, display to the user that this note.
In a kind of possible implementation, also include: the display device coupled with this processor;This display device, uses
In the case of indicating this note of None-identified the most safely at this first feedback information, display to the user that this note, and to this
User points out this note to there is risk.
In a kind of possible implementation, also include: the display device coupled with this processor;This display device, uses
In the case of not comprising this keyword in the content of this note, display to the user that this note.
In a kind of possible implementation, also include: the input equipment coupled with described processor;In this short message content
Link including uniform resource position mark URL;This input equipment, is additionally operable to receive the operational order of the URL link of user's input;Should
Transmitter, is additionally operable to this operational order according to this input equipment receives and sends this URL link to this network security server;Should
Receiver, is additionally operable to receive this network security server and verifies this URL link and the second feedback information of feeding back, this second feedback
Information is used for indicating whether this URL link is secure link;This processor, is additionally operable to indicate this URL at this second feedback information
In the case of being linked as non-security link, refusal responds this operational order.
In a kind of possible implementation, this processor, being additionally operable to should at this second feedback information instruction None-identified
In the case of URL link is the safest, responds this operational order and open this URL link, and pointing out this URL chain to this user
Connect and there is risk.
In a kind of possible implementation, this processor, it is additionally operable to indicate this URL link to be at this second feedback information
In the case of secure link, respond this operational order and open this URL link.
Fourth aspect, the embodiment of the present invention additionally provides a kind of network security server, including: network interface, and place
Reason device, couples with this memorizer and this network interface;This network interface, for receiving the target information that mobile terminal sends, should
At least one in the content sending number or this note of the note that target information is received by this mobile terminal;This process
Device, is additionally operable to this target information according to the first presupposed information and this network interface receive and the safety of this note is carried out school
Testing, generate the first feedback information, this first feedback information is used for indicating whether this note is secure short message;This network interface, also
For sending this first feedback information to this mobile terminal.
In a kind of possible implementation, this first presupposed information is the first blacklist including multiple number;At this
Reason device, is additionally operable to the transmission number judging whether include this note in this first blacklist, if this first blacklist includes this
Send number, then this first feedback information generated is for indicating this note safety;If this first blacklist does not include this
Send number, then this first feedback information of generating instruction this note of None-identified whether safety.
In a kind of possible implementation, this first presupposed information includes the record letter of the issued note of sms center
Breath, this target information is the content of this note;This processor, is additionally operable to inquire about this record information, and judges in this record information
Whether including the content of this note, if this record information includes the content of this note, then this first feedback information generated refers to
Show that this note is secure short message;If not including the content of this note in this record information, then this first feedback information generated refers to
Show that this note is non-security note.In a kind of possible implementation, this network interface, it is additionally operable to receive this mobile terminal and sends out
The URL link sent;This processor, is additionally operable to verify the safety of this URL link according to the second presupposed information, generates the
Two feedback informations, this second feedback information is used for indicating whether this URL link is secure link.
In a kind of possible implementation, this second presupposed information is include multiple non-security URL link second black
List;This processor, is additionally operable to judge whether include this URL link in this second blacklist, if this second blacklist includes
This URL link, then the second feedback information generated is non-security link for indicating this URL link, if in this second blacklist
Do not include this URL link, then whether second feedback information instruction this URL link of None-identified generated is secure link.
In a kind of possible implementation, this second presupposed information includes multiple URL link and corresponding putting on record thereof
Information, log-on message and qualification certification information;This processor, is additionally operable to this URL link inquiry received according to this network interface
This second presupposed information, if inquire record information corresponding to this URL link, log-on message and money in this second presupposed information
Matter authentication information, then this second feedback information generated indicates this URL link to be secure link;If in this second presupposed information
Do not inquire record information corresponding to this URL link, log-on message and qualification certification information, then this second feedback information generated
Indicating this URL link is non-security link;If inquire in this second presupposed information record information corresponding to this URL link,
Any one in log-on message or qualification certification information or two information, then this second feedback information generated instruction cannot
Identify whether this URL link is secure link.
Accompanying drawing explanation
The configuration diagram of the Fig. 1 communication system for providing in the embodiment of the present invention;
The schematic flow sheet of the Fig. 2 a kind of method identifying non-security note for providing in the embodiment of the present invention;
The structural representation of the Fig. 3 a kind of mobile terminal for providing in the embodiment of the present invention;
The structural representation of the Fig. 4 a kind of network security server for providing in the embodiment of the present invention.
Detailed description of the invention
Embodiments provide a kind of method identifying non-security note and relevant device, the peace of note can be verified
Quan Xing, effectively reduction user are due to the safety of None-identified note, and are made after operating according to the content guide of note
The loss become.
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention
Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only
The embodiment of a present invention part rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people
The every other embodiment that member is obtained under not making creative work premise, all should belong to the model of present invention protection
Enclose.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", " the 3rd " "
Four " etc. (if present) is for distinguishing similar object, without being used for describing specific order or precedence.Should manage
Solve the data so used can exchange in the appropriate case, in order to the embodiments described herein can be with except here illustrating
Or the order enforcement beyond the content described.Additionally, term " includes " and " having " and their any deformation, it is intended that
Cover non-exclusive comprising, such as, contain series of steps or the process of unit, method, system, product or equipment need not limit
In those steps clearly listed or unit, but can include the most clearly listing or for these processes, method, product
Product or intrinsic other step of equipment or unit.
Embodiments providing a kind of method identifying secure short message, the method is applied to a kind of communication system, please
Refering to shown in Fig. 1, Fig. 1 is the configuration diagram of communication system 100, and this communication system 100 can include mobile terminal 110, base
Standing 120, network security server 130 and sms center 140, this mobile terminal 110 is linked into network, with net by base station 120
Network security server 130 communicates, and this mobile terminal 110 is the mobile terminal with function of receiving and sending short message.This mobile terminal
For receiving the note that base station sends, the note that this mobile terminal receives may be by base station 120 and receives sms center 140 institute
The note sent, it is also possible to the note that other pseudo-base station sends.Network security server 130 is for mobile terminal 110
The note received verifies, and verifies the safety of this note, and the object information of verification is sent to mobile terminal 110, moves
This note is processed accordingly by dynamic terminal 110 according to this object information.
This mobile terminal 110 can be mobile phone, panel computer or personal digital assistant (Personal Digital
PDA) etc. Assistant, abbreviation: have the terminal of function of receiving and sending short message, the mobile terminal 110 in the embodiment of the present invention can be with
Illustrate as a example by mobile phone.Network security server 130 can be equipment of the core network, it is also possible in the network security of Shi Ge bank
The heart, or can also be an information security terrace, this network security server can record non-security URL
(Uniform Resource Locator, abbreviation: the second blacklist URL) linked and the first blacklist of non-security number.
Below the vocabulary that the present invention relates to is described briefly:
Non-security note: be to be sent by pseudo-base station, for the purpose of swindle or other crimes, is entered user by short message content
Row induction, if after user operates with the guide of the content of this note, may result in the privacy information of user and is swindled point
Sub-set takes, and then can cause the user economy or the information of other aspects loss.
Secure short message: sms center sends, rather than pseudo-base station sends.It should be noted that this secure short message potentially includes
Non-security URL link.
Non-security URL link: be linked to fishing website, fishing website is often referred to for the purpose of swindle disguise oneself as bank and electricity
Son commercial affairs, steal the website of the private informations such as the account No. of user's submission, password.
Safe URL link: registered by registration office, through the actual site of authentication.
Below the embodiment of the present invention is described in detail.Refer to shown in Fig. 1, a kind of knowledge that the embodiment of the present invention provides
One embodiment of the method for the most non-security note includes:
Step 101, when mobile terminal receives note, mobile terminal judges whether to include in short message content sensitive letter
Breath, this sensitive information refers to the keyword relevant to user privacy information, and wherein, user privacy information refers to the wealth with user
Produce, identity, family, the information that work etc. is correlated with.If the content of this note includes sensitive information, then perform step 102.If should
The content of note does not include sensitive information, then performs step 112.
In a kind of possible implementation, this mobile terminal prestores some key words or keyword.This pass
Keyword or keyword refer to some information relevant to individual's economic interests and/or privacy.Such as, money, bonus, account, account,
ID (identity number) card No., Alipay, wechat, bank, transfer accounts, take, pay the fees, pay dues, password or title (industrial and commercial bank, the agriculture of each bank
Industry bank, Construction Bank, Bank of Communications etc.) etc..
When mobile terminal receives note, and this note is probably the secure short message that sms center sends, it is also possible to by pseudo-base
Stand send non-security note.Therefore, when mobile terminal receives note, this mobile terminal can't show this note, and
It is to first have to determine whether this note comprises sensitive information.If this short breath includes sensitive information, show that this note exists risk,
It is likely to be the non-security note that pseudo-base station sends.
Mobile terminal determines whether this note includes that the concrete mode of sensitive information is as follows:
Text message in the content of the note received is entered by mobile terminal with the key word prestored or keyword
Row coupling, coupling can be that unit is mated with " word ", it is also possible to is that unit is mated with " word ".In actual applications,
Setting with " word " as unit or with " word " is that unit carries out mating the present invention and do not limits, and " word " is also made up of " word ", only
It is the Different matching mode with " word " or " word ", it may be necessary to the preset value of the judgement of setting is different.Such as, enter in units of word
Row coupling, can first set a preset value, when the quantity of the key word in short message content is more than or equal to this preset value, the most really
This note fixed comprises sensitive information.Such as, this preset value can be " 1 ", it is also possible to for " 2 ", the present invention is for preset value only
It is to illustrate, and indefiniteness explanation.
First, referring to shown in table 1 below, table 1 below is the example of the note that mobile terminal receives:
Table 1
The content of the note of reception can be mated by mobile terminal with the sensitive information prestored, search note
Whether content deposits keyword or key word, illustrates as a example by the preset value of key word quantity is " 2 ".Such as, first
Note includes two key words: " industrial and commercial bank " and " password ".Second note includes 4 key words: " Alipay ",
" account ", " ID (identity number) card No. " and " password ".Key word quantity in above-mentioned two note is all higher than equal to preset value, then and first
Individual note and second note are all judged as comprising sensitive information, it may be possible to non-security note, need to verify.
In alternatively possible implementation, the content of note and mobile terminal can be prestored by mobile terminal
Keyword mates, and whether there is keyword in search short message content, whether comprises sensitive letter to determine in this short message content
Breath, concrete method refer to the matching process of above-mentioned key word and understands, do not repeats.
It should be noted that be merely illustrative for key word or the keyword of storage in mobile terminal, actual application
In, this key word or keyword are not defined.
If comprising sensitive information in the content of this note of step 102, then mobile terminal extracts target letter from this note
Breath.
Sensitive information is included, say, that this note of reception is probably puppet in mobile terminal judges the note received
The non-security note that base station sends, then this mobile terminal extracts target information from note, is entered this note by target information
Row verification.
Wherein, this target information can be following several possible implementation:
1, this target information is for sending number.
2, this target information is the content of note.
3, preferred, this target information includes sending number and the content of note.
Step 103, mobile terminal send target information to network security server.
The safety information of this note is verified by this target information by this target information for network security server.
This target information carries the first mark for this note of labelling.So that when mobile terminal receives network security server feedback
During check results, being also required to include the first mark in the result of this verification, the result of verification is corresponding with this verified note.
Such as, this first mark can be timestamp, random code or serial number etc..This random code can be mobile terminal
The character string of stochastic generation.Such as " 100110 ".In the embodiment of the present invention, this first mark can be said as a example by timestamp
Bright.In actual applications, this first mark concrete implementation mode, the present invention does not limits.
Step 104, network security server receive this target information, and according to the first presupposed information and target information pair
The safety of this note verifies, and generates the first feedback information, and the first feedback information is used for indicating whether note is that safety is short
Letter.
The safety of this note is verified by network security server according to the first presupposed information and target information
Concrete mode can be: (1) first presupposed information is the first blacklist including multiple number, and this first blacklist is lifted by user
Report, is carried out recording and safeguarding and formed by network security server.And network security server periodically updates this first black name
Single.If the transmission number that target information is note, it is judged that whether include the transmission number of note in the first blacklist.If first is black
List includes sending number, then the first feedback information generated is non-security note for indicating note.If the first blacklist
In do not include sending number, then the first feedback information instruction None-identified note whether safety generated.Remembered by blacklist
Recording the number of non-security note, whether the transmission number of the note received by judgement is present in this black bright list, verification mode
Simplicity, quickly.
(2) when the content that this target information is note, whether network security server by mating the content of this note
It is to be sent by sms center, judges the safety of this note.Such as, this network security server can first extract short message content
In the title of sender, such as industrial and commercial bank, Alipay, Construction Bank etc..As a example by industrial and commercial bank, network security server is looked into
Ask the record information of the issued note of sms center, record information is inquired about the issued note of industrial and commercial bank.Such as, from
Network security server receives the moment of this note, the note of 30 seconds before that moment, if industrial and commercial bank send short
Having the note identical with the content of this note in letter, then show that this note is secure short message, the first feedback information of generation is used for
Indicating this note is secure short message, if not including the content of note in record information, then the first feedback information instruction generated is short
Letter is non-security note.Being verified note by the content of note, can verify out this note accurately is secure short message
Or non-security note.
Preferably, if this first is designated timestamp, can directly lock this moment industrial and commercial bank in timestamp instruction
The note sent.Such as, the moment of this timestamp instruction is 7:40:05.Network security server inquires about industrial and commercial bank at 7:40:
In 05 note sent, if having the note identical with this short message content, if there being the note identical with this short message content, then show
This note is secure short message, if the note the most identical with this short message content, then shows that this note is non-security note.This note
It is sent to mobile terminal by pseudo-base station.
In another kind of preferably implementation, this target information is transmission number and the content of note of this note, and the
One is designated timestamp, and network security server can directly pass through the record information of the issued note in short message enquiry center,
The transmission number of first matching sms, if record has had the transmission number of this note in this record information of the moment of timestamp record
It is transmitted across note, then the content of matching sms whether identical in record information, if the time of short message sending, the transmission of note
The content of number and note is all mated, then the first feedback information generated is secure short message for indicating this note.Or,
The content sending number and note of note is all mated, and the interval sent between time and the moment of timestamp record of note
Duration (is likely to be due to the reason of network, mobile terminal receives note time delay) in presetting range, the first feedback information of generation
Being also used for indicating this note is secure short message.
If including the transmission number of this note in record information, but the content of note do not mated, it may be possible to pseudo-base station
Pretend to be the phone number of user, and the non-security note sent, such as, pseudo-base station pretends to be the short of 13800000000 transmissions swindles
Letter content, then the first feedback information generated is non-security note for indicating this note.
It should be noted that for the safety of this note being verified according to the first presupposed information and target information
Concrete grammar, the embodiment of the present invention is merely illustrative, and indefiniteness explanation.
Step 105, network security server send this first feedback information to mobile terminal.
Network security server sends this first feedback information by note to mobile terminal, and this first feedback information carries
First mark.First mark is for identifying the check results of specifically which bar note of this first feedback information instruction.
Step 106, mobile terminal receive the first feedback information that this network security server sends, and according to the first feedback
Information, processes accordingly.
(1) in the case of the first feedback information indicates note to be non-security note, note is not displayed to the user that.
(2) in the case of the first feedback information indicates note to be secure short message, note is displayed to the user that.
(3) in the case of the first feedback information does not indicates note whether to be secure short message, note is displayed to the user that, and to
There is risk in user's SMS Tip.It should be noted that prompt the user with note exist risk may include that display this note deposit
Information in risk, it is also possible to be to there is risk by prompt tone prompting this note of user, concrete prompting mode, this
Bright do not limit.
Optionally, in the case of in step 106 the 2nd kind and the 3rd kind of mobile terminal show this note, if this note
Content also includes URL link, then can continue executing with step 107.
Step 107, mobile terminal receive the URL link operational order of user's input.
Mobile terminal receives the operational order of the click URL link of user's input.
Step 108, mobile terminal send URL link according to operational order to network security server.
The content of this note includes that URL connects, and this URL link is likely to be unsafe.Such as, following note:
Transmission number: 13800000000
Short message content: you are good, I is the teacher of your child school, provides convenient for the head of a family, and our school is unified on the net
Pay tuition fee for child, following website http:www.ancd//t.cc/eac.com please be log in and pay the fees.
It can be seen that this short message content includes " expense " " payment " such keyword from said short message content, but
After this network security server is verified, the first feedback information of feedback indicates this note to be secure short message, say, that move
Dynamic terminal normally shows this note, and user may click on this link (for example, it is also possible to being maloperation), and input is for this URL
The operational order of link, after mobile terminal receives the operational order of user's input, wouldn't issue browser by this link
Open, but this URL link and second are identified by short message sending to network security server, to carry out this URL link
Verification.The effect of this second mark, for this URL link of labelling, receives network security server feedback check so that working as
During result, for the result of verification is carried out corresponding with the URL of transmission connection.This second mark can be timestamp, random code
Or serial numbers etc., this random code can be the character string of mobile terminal stochastic generation.
Step 109, network security server receive this URL link that mobile terminal sends, network security server root
According to the second presupposed information, the safety of this URL link is verified, generate the second feedback information.
It is secure link or non-security link that this second feedback information is used for indicating this URL link.Preset according to second
The safety of URL link is verified by information, generates the second feedback information, and the second feedback information is used for indicating the URL link be
No for secure link.
Concrete method of calibration is as follows: (1) second presupposed information is the second black name including multiple non-security URL link
Single, the non-security URL link in this second blacklist is to be reported by user, and network security server record is also safeguarded, network is pacified
Full server periodically updates this second blacklist.After network security server receives URL link, it is judged that this second black name
Whether list includes this URL link received;If the second blacklist includes the URL link of this reception, then second generated is anti-
It is non-security link that feedforward information is used for indicating URL link.If this second blacklist not including URL link, then second generated
Feedback information instruction None-identified URL link whether safety.This by the method for calibration of blacklist, it is achieved easy, should
Second blacklist periodically updates, and network security server can determine non-security URL link by blacklist, it is achieved to URL
The verification of link.
(2) this second presupposed information includes that multiple URL link and corresponding record information, log-on message and qualification are recognized
Card information.URL link according to receiving inquires about the second presupposed information.
If inquiring record information corresponding to URL link, log-on message and qualification certification information in the second presupposed information,
The the second feedback information instruction URL link then generated is secure link.If it is understood that this URL link can be inquired
Corresponding record information, log-on message and qualification certification information these three information, then show that this URL link is true, safety
Link.
If not inquiring record information corresponding to URL link, log-on message and qualification certification letter in the second presupposed information
Breath, then the second feedback information instruction URL link generated is non-security link.If it is understood that record information, registration letter
Breath and qualification certification information these three information all do not inquire, then show that this URL link is non-security link.
If inquiring record information corresponding to URL link, log-on message or qualification certification information in the second presupposed information
In any one or two information, then the second feedback information instruction None-identified URL link generated whether safety.
It should be noted that this network security server can store this second presupposed information, or, network security
Server can also obtain this second presupposed information from third party's service platform, and concrete implementation is the mode present invention do not limit.
This second feedback information is fed back to mobile terminal by step 110, network security server.
This second feedback information carries the second mark, and this second mark is for this second feedback information of labelling, so that moving
When terminal receives this second feedback information, it may be determined that the URL corresponding to this check results connects.
Step 111, mobile terminal receive this second feedback information, and locate accordingly according to this second feedback information
Reason.
Mobile terminal identifies corresponding URL link according to the second mark, indicates this URL link for peace at the second feedback information
In the case of full link, then mobile terminal shows this URL link.
This URL link is indicated to be non-security link at this second feedback information, then mobile terminal refusal response operational order.
Mobile terminal does not perform to open the instruction of URL link, or, mobile terminal opens URL link, but enters the interface of URL link
Row shielding, namely mobile terminal does not display to the user that the interface of this URL link.
In the case of this second feedback information indicates this URL link of None-identified the most safely, then mobile terminal shows
URL link, and point out this URL to there is risk to being used for.Mobile terminal can point out this URL link to deposit in the way of text message
In risk, or can also be pointed out by sound, concrete prompting mode, the present invention does not limits.
In the embodiment of the present invention, in the case of mobile terminal shows this note, if the content of this note includes URL chain
Connect, and this mobile terminal receive user input URL link operational order after, mobile terminal wouldn't show URL link
Interface.This operational order triggers mobile terminal and URL link information is sent to network security server, network security server pair
URL link verifies, and the result of verification is sent to mobile terminal by network security, mobile terminal according to verification result to this
URL link carries out corresponding process, and when object information indicates this URL link to be non-security link, mobile terminal does not shows
This URL link, effectively avoids this URL link for being linked to fishing website, damages the interests of user.
It should be noted that step 107 to step 111 is optional step, can not perform, directly perform step 112.
If not comprising sensitive information in this note of step 112, mobile terminal displays to the user that note.
Such as, as a example by following note:
Transmission number: 10690779120510
Short message content: you are good for distinguished client: AAA shop-establishment celebration, and 1000 yuan of red packets have arrived account, and details please be stabbed: http: //
t.cc/R4eceac。
From the content of said short message, if according to the matching process of " key word ", this note does not comprise sensitive information, moves
Dynamic terminal can normally show note, but, this note comprising URL and connects, this URL connection also likely to be present risk, user
This link (for example, it is also possible to being maloperation) may be clicked on, input the operational order for this URL link.
In the case of the operational order that user have input this URL link, step 113 can be continued executing with.
Optionally, step 113, mobile terminal send URL link according to operational order to network security server.
Optionally, step 114 to step 117 and step 108 are identical to 111, do not repeat.
In the embodiment of the present invention, mobile terminal display note, if this note includes URL link, and mobile terminal receives
The operational order of the URL link of user's input, then this URL link is sent to network security server by mobile terminal, by network
The safety of this URL link is verified by security server, if the check results of this URL link is referred to by network security server
Show that this URL link is non-security link, then mobile terminal refusal responds this operational order, is not turned on this URL link or does not shows
Show this URL link, it is to avoid user is caused economy and property loss by non-security link.
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the terminal of embodiment of the present invention offer.With reference to figure
3, mobile phone includes: receiver 310, memorizer 320, input equipment 330, display device 340, transmitter 350, voicefrequency circuit 360,
The parts such as processor 380 and power supply 390.It will be understood by those skilled in the art that the not structure of the handset structure shown in Fig. 3
The restriction of mobile phone in pairs, can include that ratio illustrates more or less of parts, or combine some parts, or different parts
Arrange.
Below in conjunction with Fig. 3 each component parts of mobile phone carried out concrete introduction:
Receiver 310 can be used for receiving information by antenna, and be transferred to processor 380 and process.This information includes
But it is not limited to note.
Transmitter 350 is for sending information by antenna.Up data are sent to base station.
Memorizer 320 can be used for storing software program and module, and processor 380 is stored in memorizer 320 by operation
Software program and module, thus perform mobile phone various functions application and data process.
Input equipment 330 can be used for receiving numeral or the character information of input, and produce with the user setup of mobile phone with
And function controls relevant key signals input.Specifically, input equipment 330 can include that contact panel 331 and other inputs set
Standby 332.Contact panel 331, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user uses
Any applicable object such as finger, stylus or adnexa operation on contact panel 331 or near contact panel 331), and root
Corresponding attachment means is driven according to formula set in advance.Optionally, contact panel 331 can include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect the signal that touch operation brings,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinates, then give processor 380, and order that processor 380 sends can be received and performed.
Display device 340 can be used for information or the note etc. of reception that display is inputted by user.Display device 340 can include
Display floater 341, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), organic light emission two
The forms such as pole pipe (Organic Light-Emitting Diode, OLED) configure display floater 341.Further, touch-control
Panel 331 can cover display floater 341, when contact panel 331 detects thereon or after neighbouring touch operation, sends place to
Reason device 380, to determine the type of touch event, carries according to the type of touch event with preprocessor 380 on display floater 341
For corresponding visual output.Although in figure 3, contact panel 331 and display floater 341 are to come in fact as two independent parts
The input of existing mobile phone and input function, but in some embodiments it is possible to by integrated with display floater 341 for contact panel 331
And realize input and the output function of mobile phone.
Voicefrequency circuit 360, speaker 361, microphone 362 can provide the audio interface between user and mobile phone.Audio-frequency electric
The signal of telecommunication after the voice data conversion that road 360 can will receive, is transferred to speaker 361, speaker 361 is converted to sound
Signal exports.
Processor 380 is the control centre of mobile phone, utilizes various interface and the various piece of the whole mobile phone of connection, logical
Cross operation or perform to be stored in the software program in memorizer 320 and/or module, and calling and be stored in memorizer 320
Data, perform the various functions of mobile phone and process data, thus mobile phone is carried out integral monitoring.Optionally, processor 380 can wrap
Include one or more processing unit;Preferably, processor 380 can integrated application processor and modem processor, wherein, should
Mainly process operating system, user interface and application program etc. with processor, modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor can not also be integrated in processor 380.
Mobile phone also includes the power supply 390 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system is logically contiguous with processor 380, thus realizes management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although not shown, mobile phone can also include photographic head, bluetooth module, Wireless Fidelity (Wireless Fidelity,
Abbreviation: WiFi) module etc., does not repeats them here.
Receiver 310, is used for receiving note;
Whether processor 380, include and user privacy information phase in the content judging note that RF circuit 310 receives
The keyword closed, in the case of the content of note includes keyword, extracts target information, target information bag from note
Include: send the transmission number of note, or, at least one in the content of note;
Receiver 310, for being sent to network security server by the target information that processor 380 extracts;
Receiver 310, is additionally operable to receive network security server verification object information and the first feedback information of feeding back, the
One feedback information is used for indicating whether note is secure short message;
Processor 380, is additionally operable to the situation that the first feedback information instruction note is non-security note received at receiver
Under, do not display to the user that note.
Optionally, display device 340, in the case of indicating note to be secure short message at the first feedback information, Xiang Yong
Family display note.
Display device 340, in the case of indicating None-identified note the most safely at the first feedback information, to user
Display note, and prompt the user with note and there is risk.Or, speaker 361 prompt the user with note and there is risk.
Display device 340, in the case of not comprising keyword in the content of note, displays to the user that note.
Short message content includes that uniform resource position mark URL links, input equipment 330, for receiving the URL of user's input
The operational order of link;
Transmitter 350, is additionally operable to the operational order according to input equipment 330 receives and sends URL to network security server
Link;
Receiver 310, is additionally operable to receive network security server verification URL link and the second feedback information of feeding back, the
Two feedback informations are used for indicating whether URL link is secure link;
Processor 380, is additionally operable in the case of the second feedback information indicates URL link to be non-security link, and refusal rings
Answer operational order.
Fig. 4 is a kind of network security server structural representation that the embodiment of the present invention provides, this network security server
400 can produce bigger difference because of configuration or performance difference, can include one or more processors 422 (such as,
One or more processors) and memorizer 432, storage medium 430 (such as one or more mass memories of data
Equipment).Wherein, memorizer 432 and storage medium 430 can be of short duration storage or persistently store.It is stored in storage medium 430
Program can include one or more modules (diagram does not marks), and each module can include in network security server
A series of command operatings.Further, processor 422 could be arranged to communicate with storage medium 430, takes in network security
The a series of command operatings in storage medium 430 are performed on business device 400.
Network security server 400 can also include one or more power supplys 426, one or more wired or
Radio network interface 450.
Above-described embodiment can be taken based on the network security shown in this Fig. 4 by the step performed by network security server
Business device structure.
Concrete, network interface 450, for receiving the target information that mobile terminal sends, target information is mobile terminal
At least one in the content sending number or note of the note received.
Processor 422, is used for the safety to note of the target information according to the first presupposed information and network interface reception
Property verifies, and generates the first feedback information, and the first feedback information is used for indicating whether note is secure short message.
Network interface 450, is additionally operable to send the first feedback information to mobile terminal.
First presupposed information is the first blacklist including multiple number;
Processor 422, is additionally operable to judge whether to include in the first blacklist the transmission number of note, if in the first blacklist
Including sending number, then the first feedback information generated is for indicating note safety;If the first blacklist does not include transmission number
Code, then the first feedback information instruction None-identified note whether safety generated.
First presupposed information includes the record information of the issued note of sms center, and target information is the content of note.
Processor 422, is additionally operable to inquire about record information, and judges whether to include in record information the content of note, if note
Record information includes the content of note, then the first feedback information instruction note generated is secure short message;If in record information not
Including the content of note, then the first feedback information instruction note generated is non-security note.
Network interface 450, is additionally operable to receive the URL link that mobile terminal sends;
Processor 422, is additionally operable to verify the safety of URL link according to the second presupposed information, generates second anti-
Feedforward information, the second feedback information is used for indicating whether URL link is secure link.
Second presupposed information is the second blacklist including multiple non-security URL link.
Processor 422, is additionally operable to judge whether include URL link in the second blacklist, if the second blacklist includes URL
Link, then the second feedback information generated is non-security link for indicating URL link, if not including URL in the second blacklist
Link, then whether the second feedback information instruction None-identified URL link generated is secure link.
Second presupposed information includes multiple URL link and corresponding record information, log-on message and qualification certification letter
Breath;
Processor 422, is additionally operable to the URL link according to network interface receives and inquires about the second presupposed information, if pre-second
If information inquires record information corresponding to URL link, log-on message and qualification certification information, then the second feedback letter generated
Breath instruction URL link is secure link;If not inquiring record information corresponding to URL link, registration in the second presupposed information
Information and qualification certification information, then the second feedback information instruction URL link generated is non-security link;If presetting letter second
Breath inquires any one in record information corresponding to URL link, log-on message or qualification certification information or two letters
Breath, then whether the second feedback information instruction None-identified URL link generated is secure link.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the movement of foregoing description
Terminal, the specific works process of network security server, it is referred to the corresponding process in preceding method embodiment, at this no longer
Repeat.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method are permissible
Realize by another way.Such as, device embodiment described above is only schematically, such as, and described unit
Dividing, be only a kind of logic function and divide, actual can have other dividing mode, the most multiple unit or assembly when realizing
Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or
The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communication connection, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme
's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit
Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part that in other words prior art contributed or this technical scheme completely or partially can be with the form of software product
Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer
Equipment (can be personal computer, server, or the network equipment etc.) performs the complete of method described in each embodiment of the present invention
Portion or part steps.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, above example only in order to technical scheme to be described, is not intended to limit;Although with reference to front
State embodiment the present invention has been described in detail, it will be understood by those within the art that: it still can be to front
State the technical scheme described in each embodiment to modify, or wherein portion of techniques feature is carried out equivalent;And these
Amendment or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (26)
1. the method identifying non-security note, it is characterised in that including:
Receive note;
Judge whether the content of the described note received includes that sensitive information, described sensitive information are: with user privacy information
Relevant keyword;
In the case of the content of described note includes described sensitive information, from described note, extract target information, described
Target information includes: send the transmission number of described note, or, at least one in the content of described note;
Described target information is sent to network security server;
The first feedback information receiving the described network security server described target information of verification and feed back, described first feedback letter
Breath is used for indicating whether described note is secure short message;
In the case of described first feedback information indicates described note to be non-security note, do not display to the user that described note.
Method the most according to claim 1, it is characterised in that described method also includes:
In the case of described first feedback information indicates described note to be secure short message, display to the user that described note.
Method the most according to claim 1, it is characterised in that described method also includes:
In the case of whether note described in described first feedback information instruction None-identified is secure short message, display to the user that institute
State note, and point out described note to there is risk to described user.
Method the most according to claim 1, it is characterised in that described method also includes:
If in the case of this short message content does not comprise described sensitive information, then display to the user that described note.
5. according to the method according to any one of claim 2 to 4, it is characterised in that if described short message content includes unified
URLs URL link, described method also includes:
Receive the operational order opening described URL link;
Described URL link is sent to described network security server according to described operational order;
The second feedback information receiving the described network security server described URL link of verification and feed back, described second feedback letter
Breath is used for indicating whether described URL link is secure link;
In the case of described second feedback information indicates described URL link to be non-security link, refusal responds described operation and refers to
Order.
Method the most according to claim 5, it is characterised in that described method also includes:
In the case of whether URL link described in described second feedback information instruction None-identified is secure link, response is described
Operational order also opens described URL link, and point out described URL link to there is risk to described user.
Method the most according to claim 5, it is characterised in that described method also includes:
In the case of described second feedback information indicates described URL link to be secure link, respond described operational order and open
Open described URL link.
8. the method identifying non-security note, it is characterised in that described method includes:
Receive the target information that mobile terminal sends, the transmission number of the note that described target information is received by described mobile terminal
At least one in the content of code or described note;
According to the first presupposed information and described target information, the safety of described note is verified, generate the first feedback letter
Breath, described first feedback information is used for indicating whether described note is secure short message;
Described first feedback information is sent to described mobile terminal.
Method the most according to claim 8, it is characterised in that described first presupposed information is include multiple number first
Blacklist, if the transmission number that described target information is described note, then according to the first presupposed information and described target information
Safety to described note verifies, and generates the step of the first feedback information, including:
Judge whether described first blacklist includes the transmission number of described note;
If described first blacklist includes described transmission number, then described first feedback information generated is described short for indicating
Letter is non-security note;
If described first blacklist does not include described transmission number, then the described first feedback information instruction None-identified generated
Described note whether safety.
Method the most according to claim 8, it is characterised in that described first presupposed information includes that sms center sends
The record information of note, described target information is the content of described note, then according to described first presupposed information and described
The safety of described note is verified by target information, generates the step of the first feedback information, including:
Inquire about described record information;
Judge whether described record information includes the content of described note;
If described record information includes the content of described note, then the described first described note of feedback information instruction generated is
Secure short message;
If not including the content of described note in described record information, then described first feedback information generated indicates described note
For non-security note.
11. methods according to claim 8, it is characterised in that described method also includes:
Receive the URL link that described mobile terminal sends;
According to the second presupposed information, the safety of described URL link is verified, generate the second feedback information, described second anti-
Feedforward information is used for indicating whether described URL link is secure link.
12. methods according to claim 11, it is characterised in that described second presupposed information is multiple non-security for including
Second blacklist of URL link, verifies the safety of described URL link according to described second presupposed information, generates the
The step of two feedback informations, including:
Judge whether described second blacklist includes described URL link;
If described second blacklist includes described URL link, then the second feedback information generated is for indicating described URL link
For non-security link;
If described second blacklist does not include described URL link, then described in the second feedback information instruction None-identified generated
URL link whether safety.
13. methods according to claim 11, it is characterised in that described second presupposed information include multiple URL link and
Its corresponding record information, log-on message and qualification certification information;
Described second presupposed information is inquired about according to the described URL link received;
If inquiring record information corresponding to described URL link, log-on message and qualification certification in described second presupposed information
Information, then described second feedback information generated indicates described URL link to be secure link;
If not inquiring record information corresponding to described URL link, log-on message and qualification in described second presupposed information to recognize
Card information, then described second feedback information generated indicates described URL link to be non-security link;
If inquiring record information corresponding to described URL link, log-on message or qualification certification in described second presupposed information
Any one in information or two information, then described second feedback information generated indicates URL link described in None-identified
Whether safety.
14. 1 kinds of mobile terminals, it is characterised in that including: processor, and the receiver that couples with described processor respectively and
Transmitter;
Described receiver, is used for receiving note;
Whether described processor, include sensitive information in the content judging described note that described receiver receives, described
Sensitive information is: the keyword relevant to user privacy information, and the content in described note includes the feelings of described sensitive information
Under condition, extracting target information from described note, described target information includes: send the transmission number of described note, or, described
At least one in the content of note;
Described transmitter, is sent to network security server for the described target information extracted by described processor;
Described receiver, is additionally operable to receive described network security server and verifies described target information and the first feedback letter of feeding back
Breath, described first feedback information is used for indicating whether described note is secure short message;
Described processor, is additionally operable to described first feedback information described receiver receives and indicates described note to be non-security short
In the case of letter, do not display to the user that described note.
15. mobile terminals according to claim 14, it is characterised in that also include: the display coupled with described processor
Equipment;
Described display device, in the case of indicating described note to be secure short message at described first feedback information, to user
Show described note.
16. mobile terminals according to claim 14, it is characterised in that also include: the display coupled with described processor
Equipment;
Described display device, in the case of indicating note described in None-identified the most safely at described first feedback information,
Display to the user that described note, and point out described note to there is risk to described user.
17. mobile terminals according to claim 14, it is characterised in that also include: the display coupled with described processor
Equipment;
Described display device, in the case of not comprising described keyword in the content of described note, displays to the user that institute
State note.
18. according to the mobile terminal according to any one of claim 15 to 17, it is characterised in that also include: with described process
The input equipment of device coupling;
Described short message content includes that uniform resource position mark URL links;The most described input equipment, is used for receiving unlatching described
The operational order of URL link;
Described transmitter, is additionally operable to the described operational order according to described input equipment receives and sends out to described network security server
Send described URL link;
Described receiver, is additionally operable to receive described network security server and verifies described URL link and the second feedback letter of feeding back
Breath, described second feedback information is used for indicating whether described URL link is secure link;
Described processor, is additionally operable to, in the case of described second feedback information indicates described URL link to be non-security link, refuse
Lost art should described operational order.
19. mobile terminals according to claim 18, it is characterised in that
Described processor, is additionally operable in the situation of URL link whether safety described in described second feedback information instruction None-identified
Under, respond described operational order and open described URL link, and pointing out described URL link to there is risk to described user.
20. mobile terminals according to claim 18, it is characterised in that
Described processor, is additionally operable in the case of described second feedback information indicates described URL link to be secure link, response
Described operational order also opens described URL link.
21. 1 kinds of network security servers, it is characterised in that including:
Network interface, and
Processor, couples with described memorizer and described network interface;
Described network interface, for receiving the target information that mobile terminal sends, described target information is described mobile terminal institute
At least one in the content sending number or described note of the note received;
Described processor, is additionally operable to the described target information according to the first presupposed information and the reception of described network interface to described
The safety of note verifies, and generates the first feedback information, and whether described first feedback information is used for indicating the described note be
Secure short message;
Described network interface, is additionally operable to send described first feedback information to described mobile terminal.
22. network security servers according to claim 21, it is characterised in that described first presupposed information is many for including
First blacklist of individual number;
Described processor, is additionally operable to the transmission number judging whether include described note in described first blacklist, if described
One blacklist includes described transmission number, then described first feedback information generated is for indicating described note safety;If institute
State and the first blacklist does not include described transmission number, then note described in the described first feedback information instruction None-identified generated
Whether safety.
23. network security servers according to claim 21, it is characterised in that described first presupposed information includes note
The record information of the issued note in center, described target information is the content of described note;
Described processor, is additionally operable to inquire about described record information, and judges whether include described note in described record information
Content, if described record information includes the content of described note, then described first feedback information generated indicates described note
For secure short message;If described record information does not include the content of described note, then the described first feedback information instruction generated
Described note is non-security note.
24. network security servers according to claim 21, it is characterised in that
Described network interface, is additionally operable to receive the URL link that described mobile terminal sends;
Described processor, is additionally operable to verify the safety of described URL link according to the second presupposed information, generates second anti-
Feedforward information, described second feedback information is used for indicating whether described URL link is secure link.
25. network security servers according to claim 24, it is characterised in that described second presupposed information is many for including
Second blacklist of individual non-security URL link;
Described processor, is additionally operable to judge whether include described URL link in described second blacklist, if described second blacklist
Include described URL link, then the second feedback information generated is non-security link for indicating described URL link, if described
Do not include described URL link in second blacklist, then described in the second feedback information instruction None-identified generated, whether URL link
For secure link.
26. network security servers according to claim 24, it is characterised in that described second presupposed information includes multiple
URL link and corresponding record information, log-on message and qualification certification information;
Described processor, is additionally operable to the described URL link according to described network interface receives and inquires about described second presupposed information, if
Record information corresponding to described URL link, log-on message and qualification certification information is inquired, then in described second presupposed information
Described second feedback information generated indicates described URL link to be secure link;If not inquiring about in described second presupposed information
To record information, log-on message and qualification certification information that described URL link is corresponding, then described second feedback information generated refers to
Show that described URL link is non-security link;If inquiring the letter of putting on record that described URL link is corresponding in described second presupposed information
Any one in breath, log-on message or qualification certification information or two information, then described second feedback information generated refers to
Show whether URL link described in None-identified is secure link.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610796204.XA CN106332024A (en) | 2016-08-31 | 2016-08-31 | Insecure short message recognition method and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610796204.XA CN106332024A (en) | 2016-08-31 | 2016-08-31 | Insecure short message recognition method and related equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106332024A true CN106332024A (en) | 2017-01-11 |
Family
ID=57786561
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610796204.XA Pending CN106332024A (en) | 2016-08-31 | 2016-08-31 | Insecure short message recognition method and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106332024A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106980778A (en) * | 2017-03-29 | 2017-07-25 | 北京奇虎科技有限公司 | Information authentication method, device and terminal device |
CN107239504A (en) * | 2017-05-10 | 2017-10-10 | 上海交通大学 | A kind of deep learning algorithm for being used to recognize fraud text message |
CN108667715A (en) * | 2018-03-27 | 2018-10-16 | 北京泰迪熊移动科技有限公司 | Recognition methods, device, storage medium and the processor of Flight Information |
CN108882183A (en) * | 2018-03-27 | 2018-11-23 | 北京泰迪熊移动科技有限公司 | Recognition methods, device, storage medium and the processor of bank information |
CN109302687A (en) * | 2017-07-25 | 2019-02-01 | 中国电信股份有限公司 | For obscuring the methods, devices and systems of short message content |
CN109327812A (en) * | 2018-09-30 | 2019-02-12 | 国网浙江省电力有限公司 | A kind of electrical power services intelligently pushing method and device based on short message |
CN109587640A (en) * | 2017-09-29 | 2019-04-05 | 中国移动通信有限公司研究院 | A kind of junk information recognition methods, terminal and computer storage medium |
CN109905359A (en) * | 2018-12-24 | 2019-06-18 | 深圳市珍爱捷云信息技术有限公司 | Communication message processing method, device, computer equipment and can read access medium |
CN113316153A (en) * | 2020-04-02 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
CN113328923A (en) * | 2020-02-28 | 2021-08-31 | 阿里巴巴集团控股有限公司 | Presentation method, server, client, electronic device and computer readable medium |
CN113542489A (en) * | 2021-09-14 | 2021-10-22 | 深圳市沃特沃德软件技术有限公司 | Automatic processing method and device of contact information and computer equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790752A (en) * | 2011-05-20 | 2012-11-21 | 盛乐信息技术(上海)有限公司 | Fraud information filtering system and method on basis of feature identification |
CN102801706A (en) * | 2012-06-28 | 2012-11-28 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and security processing method for information contents |
CN104486737A (en) * | 2014-12-19 | 2015-04-01 | 上海斐讯数据通信技术有限公司 | Short message processing system and method thereof |
CN105101202A (en) * | 2015-05-25 | 2015-11-25 | 小米科技有限责任公司 | Information processing method and device |
CN105323261A (en) * | 2015-12-15 | 2016-02-10 | 北京奇虎科技有限公司 | Data detection method and device |
CN105611513A (en) * | 2016-02-29 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Short message display method and system for mobile terminal |
CN105721697A (en) * | 2016-02-18 | 2016-06-29 | 吴伟东 | Mobile phone short message shielding method and system |
CN105813085A (en) * | 2016-03-08 | 2016-07-27 | 联想(北京)有限公司 | Information processing method and electronic device |
-
2016
- 2016-08-31 CN CN201610796204.XA patent/CN106332024A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790752A (en) * | 2011-05-20 | 2012-11-21 | 盛乐信息技术(上海)有限公司 | Fraud information filtering system and method on basis of feature identification |
CN102801706A (en) * | 2012-06-28 | 2012-11-28 | 宇龙计算机通信科技(深圳)有限公司 | Terminal and security processing method for information contents |
CN104486737A (en) * | 2014-12-19 | 2015-04-01 | 上海斐讯数据通信技术有限公司 | Short message processing system and method thereof |
CN105101202A (en) * | 2015-05-25 | 2015-11-25 | 小米科技有限责任公司 | Information processing method and device |
CN105323261A (en) * | 2015-12-15 | 2016-02-10 | 北京奇虎科技有限公司 | Data detection method and device |
CN105721697A (en) * | 2016-02-18 | 2016-06-29 | 吴伟东 | Mobile phone short message shielding method and system |
CN105611513A (en) * | 2016-02-29 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Short message display method and system for mobile terminal |
CN105813085A (en) * | 2016-03-08 | 2016-07-27 | 联想(北京)有限公司 | Information processing method and electronic device |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106980778B (en) * | 2017-03-29 | 2020-07-14 | 北京奇虎科技有限公司 | Information identification method and device and terminal equipment |
CN106980778A (en) * | 2017-03-29 | 2017-07-25 | 北京奇虎科技有限公司 | Information authentication method, device and terminal device |
CN107239504A (en) * | 2017-05-10 | 2017-10-10 | 上海交通大学 | A kind of deep learning algorithm for being used to recognize fraud text message |
CN109302687A (en) * | 2017-07-25 | 2019-02-01 | 中国电信股份有限公司 | For obscuring the methods, devices and systems of short message content |
CN109587640A (en) * | 2017-09-29 | 2019-04-05 | 中国移动通信有限公司研究院 | A kind of junk information recognition methods, terminal and computer storage medium |
CN108882183A (en) * | 2018-03-27 | 2018-11-23 | 北京泰迪熊移动科技有限公司 | Recognition methods, device, storage medium and the processor of bank information |
CN108667715A (en) * | 2018-03-27 | 2018-10-16 | 北京泰迪熊移动科技有限公司 | Recognition methods, device, storage medium and the processor of Flight Information |
CN109327812A (en) * | 2018-09-30 | 2019-02-12 | 国网浙江省电力有限公司 | A kind of electrical power services intelligently pushing method and device based on short message |
CN109905359A (en) * | 2018-12-24 | 2019-06-18 | 深圳市珍爱捷云信息技术有限公司 | Communication message processing method, device, computer equipment and can read access medium |
CN109905359B (en) * | 2018-12-24 | 2021-09-21 | 深圳市珍爱捷云信息技术有限公司 | Communication message processing method, device, computer equipment and readable access medium |
CN113328923A (en) * | 2020-02-28 | 2021-08-31 | 阿里巴巴集团控股有限公司 | Presentation method, server, client, electronic device and computer readable medium |
CN113316153A (en) * | 2020-04-02 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
CN113316153B (en) * | 2020-04-02 | 2024-03-26 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
CN113542489A (en) * | 2021-09-14 | 2021-10-22 | 深圳市沃特沃德软件技术有限公司 | Automatic processing method and device of contact information and computer equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106332024A (en) | Insecure short message recognition method and related equipment | |
CN104219050B (en) | Voice print verification method, server, client and system | |
CN102790674B (en) | Auth method, equipment and system | |
CN101523859B (en) | System and method for authenticating remote server access | |
CN106211169A (en) | Pseudo-base station identification device and method | |
CN105814591A (en) | Verification information transmission method and terminal | |
CN105246058B (en) | The verification method and short message server of short message | |
CN103329179A (en) | Intelligent emergency signal transmission system using mobile phone and method thereof | |
CN104660481A (en) | Instant messaging processing method and device | |
CN102130909A (en) | Authentication method and system | |
CN104539624A (en) | Safety monitoring method and device for number information in text | |
CN106231572A (en) | Pseudo-base station refuse messages discrimination method and system | |
CN109033801A (en) | Method, mobile terminal and the storage medium of application program verification user identity | |
CN108881103A (en) | A kind of method and device accessing network | |
CN106713579A (en) | Telephone number identification method and device | |
CN107318104A (en) | Account register method, device, computer equipment and medium | |
CN106126707A (en) | Information identifying method and information recognition device | |
CN106330889A (en) | Method and apparatus for deblocking account | |
CN103458407A (en) | Internet account number login management system and method based on short message | |
CN110443558A (en) | A kind of method, apparatus and equipment of bill processing | |
CN108271127A (en) | Pseudo-base station note knows method for distinguishing and terminal | |
CN109257338A (en) | A kind of System and method for of server log re-authentication | |
CN104899488B (en) | Numeric value transfer and device | |
CN102299910B (en) | Anti-hacking system through telephone authentication | |
CN106257940A (en) | A kind of iOS device and bluetooth peripheral hardware matching method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170111 |
|
RJ01 | Rejection of invention patent application after publication |