CN106332024A - Insecure short message recognition method and related equipment - Google Patents

Insecure short message recognition method and related equipment Download PDF

Info

Publication number
CN106332024A
CN106332024A CN201610796204.XA CN201610796204A CN106332024A CN 106332024 A CN106332024 A CN 106332024A CN 201610796204 A CN201610796204 A CN 201610796204A CN 106332024 A CN106332024 A CN 106332024A
Authority
CN
China
Prior art keywords
note
information
url link
link
feedback information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610796204.XA
Other languages
Chinese (zh)
Inventor
周君
刘继武
阳思聪
李延冰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201610796204.XA priority Critical patent/CN106332024A/en
Publication of CN106332024A publication Critical patent/CN106332024A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses an insecure short message recognition method and related equipment. The method comprises the steps of receiving a short message; judging whether the content of the received short message contains sensitive information or not, wherein the sensitive information refers keywords related with privacy information of a user; under the condition that the content of the short message contains keywords, extracting target information from the short message, wherein the target information comprises at least one of a sending number of the short message or the content of the short message; sending the target information to a network security server; receiving first feedback information which is fed back by the network security server after verification for the target information, wherein the first feedback information is used for indicating whether the short message is a secure short message or not; and not displaying the short message to the user under the condition that the first feedback information indicates that the short message is an insecure short message. The method disclosed by the embodiment of the invention can perform verification on short messages received by a mobile terminal so as to determine whether the short messages are secure short messages or not, thereby avoiding the user from suffering economic losses. The embodiment of the invention further provides a mobile terminal and a network security server.

Description

A kind of method identifying non-security note and relevant device
Technical field
The present invention relates to moving communicating field, particularly relate to a kind of method identifying non-security note and relevant device.
Background technology
Continuous progressive along with society, the mobile terminal such as mobile phone becomes communication equipment indispensable in people's life.Pass through The built-in short message module of mobile terminal carries out the transmitting-receiving of short message, and in people's daily life, utilization rate is the highest especially one is led to Telecommunication function.But, short message swindle also becomes the severely afflicated area swindling at present case, and lawless person utilizes short message to carry out swindling Case is of common occurrence, and such as, a lot of lawless persons can utilize pseudo-base station, sends swindle note to user.
Pseudo-base station, also known as false base station, false base station, is a kind of illegal wireless electrical communication equipment, be typically placed at automobile or The place that one comparison of person is hidden, it is possible to search the SIM card information taken centered by it, in the range of certain radius, when pseudo-base station is transported During row, the user mobile phone signal in pseudo-base station coverage is forced to be connected on this equipment, it is impossible to be connected to public telecommunication network Network, to affect the normal use of cellphone subscriber.Then, pseudo-base station can arbitrarily falsely use other people phone number by force to user mobile phone Send the refuse messages such as swindle, distribution.
Further, comprising fishing chained address inside swindle note, user once accesses, and will steal user profile, The economic interests of infringement user.
Summary of the invention
Embodiments provide a kind of method identifying non-security note and relevant device, be used for identifying non-security short Letter, can effectively reduce user due to the safety of None-identified note, guide according to the content of secure short message after operating The loss caused.
Embodiments provide a kind of method identifying non-security note and relevant device, for verifying the peace of note Quan Xing, it is to avoid user is due to the safety of None-identified note, and suffers economic loss.
First aspect, the embodiment of the present invention provides a kind of method identifying non-security note, and the method may include that movement Terminal receive note, this note be probably sms center send secure short message, it is also possible to by pseudo-base station send non-security Note.Therefore, when mobile terminal receives note, this mobile terminal can't show this note, but first has to determine this Whether note comprises sensitive information.This sensitive information refers to the keyword relevant to user privacy information.If this short breath includes Sensitive information then shows that this note exists risk, it may be possible to the non-security note that pseudo-base station sends.In the content of this note In the case of this keyword, extracting target information from this note, this target information includes: send the transmission number of this note Code, or, at least one in the content of this note.This target information is sent to network security server;Then, this net is received The first feedback information that network security server verifies this target information and feeds back, this first feedback information is used for indicating this note be No for secure short message;In the case of this first feedback information indicates this note to be non-security note, do not display to the user that this is short Letter.The embodiment of the present invention, can effectively determine whether the note that mobile terminal receives is secure short message, in this first feedback letter Breath indicates in the case of this note is non-security note, do not display to the user that this note, it is to avoid user is according to non-security note Guide operate, and lost by economic interests.
In a kind of possible implementation, in the case of this first feedback information indicates this note to be secure short message, Display to the user that this note.Mobile terminal note after user shows verification, effectively raises the degree of safety of this note.
In a kind of possible implementation, this note is not indicated to be whether the feelings of secure short message at this first feedback information Under condition, display to the user that this note, and point out this note to there is risk to this user.Risk is there is with prompting this note of user, Should be careful, effectively reduce the probability that user is swindled by lawless person.
In a kind of possible implementation, if this short message content does not comprise this keyword, then display to the user that this is short Letter.
In a kind of possible implementation, if this short message content includes that uniform resource position mark URL links, the method Also include: receive the operational order of the URL link of user's input;This link wouldn't be issued browser to open, this operation refers to Order triggers mobile terminal and sends this URL link to this network security server, to verify this URL link.Receive this net The second feedback information that network security server verifies this URL link and feeds back, this second feedback information is used for indicating this URL link Whether is secure link, mobile terminal can point out this URL link to there is risk in the way of text message, or can also lead to Cross sound to point out.In the case of this second feedback information indicates this URL link to be non-security link, refusal responds this behaviour Instruct.In the case of mobile terminal shows this note, if the content of this note includes URL link, and this mobile terminal After the operational order of the URL link receiving user's input, mobile terminal wouldn't show the interface of URL link.But network peace URL link is verified by full server, and mobile terminal carries out corresponding process according to the result of verification to this URL link, When object information indicates this URL link to be non-security link, mobile terminal does not show this URL link, effectively avoids this URL It is linked as being linked to fishing website, the interests of infringement user.
In a kind of possible implementation, do not indicate whether this URL link is secure link at this second feedback information In the case of, respond this operational order and open this URL link, and pointing out this URL link to there is risk to this user.
In a kind of possible implementation, in the situation that this second feedback information indicates this URL link to be secure link Under, respond this operational order and open this URL link.
Second aspect, embodiments provides a kind of method identifying non-security note, receives mobile terminal and sends Target information, in the content sending number or this note of the note that this target information is received by this mobile terminal at least One;According to the first presupposed information and this target information, the safety of this note is verified, generates the first feedback information, This first feedback information is used for indicating whether this note is secure short message;This first feedback information is sent to this mobile terminal.
In a kind of possible implementation, this first presupposed information is the first blacklist including multiple number, and this is years old One blacklist is reported by user, network security server carry out recording and safeguarding and formed.And the network security server cycle Property updates this first blacklist.In the case of the transmission number that this target information is this note, it is judged that in this first blacklist Whether include the transmission number of this note, if this first blacklist includes this transmission number, then this first feedback letter generated To be used for indicating this note be non-security note to breath, if this first blacklist does not include this transmission number, then generate this first Feedback information instruction this note of None-identified whether safety.The number of non-security note is recorded, by judging by blacklist Whether the transmission number of the note received is present in the safety verifying this note in this black bright list, and verification mode is easy, soon Speed.
In a kind of possible implementation, this first presupposed information includes the record letter of the issued note of sms center Breath, in the case of the content that target information is this note, network security server inquires about this record information, then, it is judged that should Whether record information includes the content of this note, if this record information includes the content of this note, then generate this first Feedback information indicates this note to be secure short message, if this record information does not include the content of this note, then generate this first Feedback information indicates this note to be non-security note.Whether network security server is by note by mating the content of this note Center sends, and judges the safety of this note.Being verified note by the content of note, can verify out accurately should Note is secure short message or non-security note.
In a kind of possible implementation, in the situation of the content sending number and note that target information is note Under, and this target information carries timestamp, network security server can directly pass through the issued note in short message enquiry center Record information, the transmission number of first matching sms, if record has this note in this record information of the moment of timestamp record Transmission number be transmitted across note, then the content of matching sms whether identical in record information, if short message sending time Between, the content sending number and note of note all mate, then the first feedback information generated for indicating this note is Secure short message.If including the transmission number of this note in record information, but the content of note do not mated, it may be possible to pseudo-base station Pretend to be the phone number of user, and the non-security note sent.
In a kind of possible implementation, receiving the URL link that this mobile terminal sends, network security server also may be used Verify with the safety to URL link.According to the second presupposed information, the safety of this URL link is verified, generate Second feedback information, this second feedback information is used for indicating whether this URL link is secure link.
In a kind of possible implementation, this second presupposed information is include multiple non-security URL link second black List, verifies the safety of this URL link according to this second presupposed information, generates the tool of the step of the second feedback information The implementation of body can be: judges whether include this URL link in this second blacklist, if this second blacklist includes this URL link, then the second feedback information generated is non-security link for indicating this URL link, if in this second blacklist not Including this URL link, then second feedback information instruction this URL link of None-identified generated whether safety.Come by blacklist Recording non-security URL link, whether the URL link received by judgement is present in this black bright list verifies this URL link Safety, verification mode is easy, quickly.
In a kind of possible implementation, this second presupposed information includes multiple URL link and corresponding putting on record thereof Information, log-on message and qualification certification information.This URL link according to receiving inquires about this second presupposed information.If this second Presupposed information inquires record information corresponding to this URL link, log-on message and qualification certification information, then generate this second Feedback information indicates this URL link to be secure link;If not inquiring corresponding standby of this URL link in this second presupposed information Case information, log-on message and qualification certification information, then this second feedback information generated indicates this URL link to be non-security chain Connect;If inquiring in this second presupposed information in record information corresponding to this URL link, log-on message or qualification certification information Any one or two information, then this second feedback information generated instruction this URL link of None-identified whether safety.
The third aspect, embodiments provide a kind of mobile terminal, including processor, and respectively with this process The Receiver And Transmitter of device coupling;This receiver, is used for receiving note;This processor, for judging what this receiver received Whether including the keyword relevant to user privacy information in the content of this note, the content in this note includes this keyword In the case of, from this note, extract target information, this target information includes: send the transmission number of this note, or, this note Content at least one;This transmitter, is sent to Network Security Service for this target information extracted by this processor Device;This receiver, is additionally operable to receive this network security server and verifies this target information and the first feedback information of feeding back, and this is years old One feedback information is used for indicating whether this note is secure short message;This processor, be additionally operable to receive at this receiver this first In the case of feedback information indicates this note to be non-security note, do not display to the user that this note.
In a kind of possible implementation, also include: the display device coupled with this processor;This display device, uses In the case of indicating this note to be secure short message at this first feedback information, display to the user that this note.
In a kind of possible implementation, also include: the display device coupled with this processor;This display device, uses In the case of indicating this note of None-identified the most safely at this first feedback information, display to the user that this note, and to this User points out this note to there is risk.
In a kind of possible implementation, also include: the display device coupled with this processor;This display device, uses In the case of not comprising this keyword in the content of this note, display to the user that this note.
In a kind of possible implementation, also include: the input equipment coupled with described processor;In this short message content Link including uniform resource position mark URL;This input equipment, is additionally operable to receive the operational order of the URL link of user's input;Should Transmitter, is additionally operable to this operational order according to this input equipment receives and sends this URL link to this network security server;Should Receiver, is additionally operable to receive this network security server and verifies this URL link and the second feedback information of feeding back, this second feedback Information is used for indicating whether this URL link is secure link;This processor, is additionally operable to indicate this URL at this second feedback information In the case of being linked as non-security link, refusal responds this operational order.
In a kind of possible implementation, this processor, being additionally operable to should at this second feedback information instruction None-identified In the case of URL link is the safest, responds this operational order and open this URL link, and pointing out this URL chain to this user Connect and there is risk.
In a kind of possible implementation, this processor, it is additionally operable to indicate this URL link to be at this second feedback information In the case of secure link, respond this operational order and open this URL link.
Fourth aspect, the embodiment of the present invention additionally provides a kind of network security server, including: network interface, and place Reason device, couples with this memorizer and this network interface;This network interface, for receiving the target information that mobile terminal sends, should At least one in the content sending number or this note of the note that target information is received by this mobile terminal;This process Device, is additionally operable to this target information according to the first presupposed information and this network interface receive and the safety of this note is carried out school Testing, generate the first feedback information, this first feedback information is used for indicating whether this note is secure short message;This network interface, also For sending this first feedback information to this mobile terminal.
In a kind of possible implementation, this first presupposed information is the first blacklist including multiple number;At this Reason device, is additionally operable to the transmission number judging whether include this note in this first blacklist, if this first blacklist includes this Send number, then this first feedback information generated is for indicating this note safety;If this first blacklist does not include this Send number, then this first feedback information of generating instruction this note of None-identified whether safety.
In a kind of possible implementation, this first presupposed information includes the record letter of the issued note of sms center Breath, this target information is the content of this note;This processor, is additionally operable to inquire about this record information, and judges in this record information Whether including the content of this note, if this record information includes the content of this note, then this first feedback information generated refers to Show that this note is secure short message;If not including the content of this note in this record information, then this first feedback information generated refers to Show that this note is non-security note.In a kind of possible implementation, this network interface, it is additionally operable to receive this mobile terminal and sends out The URL link sent;This processor, is additionally operable to verify the safety of this URL link according to the second presupposed information, generates the Two feedback informations, this second feedback information is used for indicating whether this URL link is secure link.
In a kind of possible implementation, this second presupposed information is include multiple non-security URL link second black List;This processor, is additionally operable to judge whether include this URL link in this second blacklist, if this second blacklist includes This URL link, then the second feedback information generated is non-security link for indicating this URL link, if in this second blacklist Do not include this URL link, then whether second feedback information instruction this URL link of None-identified generated is secure link.
In a kind of possible implementation, this second presupposed information includes multiple URL link and corresponding putting on record thereof Information, log-on message and qualification certification information;This processor, is additionally operable to this URL link inquiry received according to this network interface This second presupposed information, if inquire record information corresponding to this URL link, log-on message and money in this second presupposed information Matter authentication information, then this second feedback information generated indicates this URL link to be secure link;If in this second presupposed information Do not inquire record information corresponding to this URL link, log-on message and qualification certification information, then this second feedback information generated Indicating this URL link is non-security link;If inquire in this second presupposed information record information corresponding to this URL link, Any one in log-on message or qualification certification information or two information, then this second feedback information generated instruction cannot Identify whether this URL link is secure link.
Accompanying drawing explanation
The configuration diagram of the Fig. 1 communication system for providing in the embodiment of the present invention;
The schematic flow sheet of the Fig. 2 a kind of method identifying non-security note for providing in the embodiment of the present invention;
The structural representation of the Fig. 3 a kind of mobile terminal for providing in the embodiment of the present invention;
The structural representation of the Fig. 4 a kind of network security server for providing in the embodiment of the present invention.
Detailed description of the invention
Embodiments provide a kind of method identifying non-security note and relevant device, the peace of note can be verified Quan Xing, effectively reduction user are due to the safety of None-identified note, and are made after operating according to the content guide of note The loss become.
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention, it is clear that described embodiment is only The embodiment of a present invention part rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under not making creative work premise, all should belong to the model of present invention protection Enclose.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing, " second ", " the 3rd " " Four " etc. (if present) is for distinguishing similar object, without being used for describing specific order or precedence.Should manage Solve the data so used can exchange in the appropriate case, in order to the embodiments described herein can be with except here illustrating Or the order enforcement beyond the content described.Additionally, term " includes " and " having " and their any deformation, it is intended that Cover non-exclusive comprising, such as, contain series of steps or the process of unit, method, system, product or equipment need not limit In those steps clearly listed or unit, but can include the most clearly listing or for these processes, method, product Product or intrinsic other step of equipment or unit.
Embodiments providing a kind of method identifying secure short message, the method is applied to a kind of communication system, please Refering to shown in Fig. 1, Fig. 1 is the configuration diagram of communication system 100, and this communication system 100 can include mobile terminal 110, base Standing 120, network security server 130 and sms center 140, this mobile terminal 110 is linked into network, with net by base station 120 Network security server 130 communicates, and this mobile terminal 110 is the mobile terminal with function of receiving and sending short message.This mobile terminal For receiving the note that base station sends, the note that this mobile terminal receives may be by base station 120 and receives sms center 140 institute The note sent, it is also possible to the note that other pseudo-base station sends.Network security server 130 is for mobile terminal 110 The note received verifies, and verifies the safety of this note, and the object information of verification is sent to mobile terminal 110, moves This note is processed accordingly by dynamic terminal 110 according to this object information.
This mobile terminal 110 can be mobile phone, panel computer or personal digital assistant (Personal Digital PDA) etc. Assistant, abbreviation: have the terminal of function of receiving and sending short message, the mobile terminal 110 in the embodiment of the present invention can be with Illustrate as a example by mobile phone.Network security server 130 can be equipment of the core network, it is also possible in the network security of Shi Ge bank The heart, or can also be an information security terrace, this network security server can record non-security URL (Uniform Resource Locator, abbreviation: the second blacklist URL) linked and the first blacklist of non-security number.
Below the vocabulary that the present invention relates to is described briefly:
Non-security note: be to be sent by pseudo-base station, for the purpose of swindle or other crimes, is entered user by short message content Row induction, if after user operates with the guide of the content of this note, may result in the privacy information of user and is swindled point Sub-set takes, and then can cause the user economy or the information of other aspects loss.
Secure short message: sms center sends, rather than pseudo-base station sends.It should be noted that this secure short message potentially includes Non-security URL link.
Non-security URL link: be linked to fishing website, fishing website is often referred to for the purpose of swindle disguise oneself as bank and electricity Son commercial affairs, steal the website of the private informations such as the account No. of user's submission, password.
Safe URL link: registered by registration office, through the actual site of authentication.
Below the embodiment of the present invention is described in detail.Refer to shown in Fig. 1, a kind of knowledge that the embodiment of the present invention provides One embodiment of the method for the most non-security note includes:
Step 101, when mobile terminal receives note, mobile terminal judges whether to include in short message content sensitive letter Breath, this sensitive information refers to the keyword relevant to user privacy information, and wherein, user privacy information refers to the wealth with user Produce, identity, family, the information that work etc. is correlated with.If the content of this note includes sensitive information, then perform step 102.If should The content of note does not include sensitive information, then performs step 112.
In a kind of possible implementation, this mobile terminal prestores some key words or keyword.This pass Keyword or keyword refer to some information relevant to individual's economic interests and/or privacy.Such as, money, bonus, account, account, ID (identity number) card No., Alipay, wechat, bank, transfer accounts, take, pay the fees, pay dues, password or title (industrial and commercial bank, the agriculture of each bank Industry bank, Construction Bank, Bank of Communications etc.) etc..
When mobile terminal receives note, and this note is probably the secure short message that sms center sends, it is also possible to by pseudo-base Stand send non-security note.Therefore, when mobile terminal receives note, this mobile terminal can't show this note, and It is to first have to determine whether this note comprises sensitive information.If this short breath includes sensitive information, show that this note exists risk, It is likely to be the non-security note that pseudo-base station sends.
Mobile terminal determines whether this note includes that the concrete mode of sensitive information is as follows:
Text message in the content of the note received is entered by mobile terminal with the key word prestored or keyword Row coupling, coupling can be that unit is mated with " word ", it is also possible to is that unit is mated with " word ".In actual applications, Setting with " word " as unit or with " word " is that unit carries out mating the present invention and do not limits, and " word " is also made up of " word ", only It is the Different matching mode with " word " or " word ", it may be necessary to the preset value of the judgement of setting is different.Such as, enter in units of word Row coupling, can first set a preset value, when the quantity of the key word in short message content is more than or equal to this preset value, the most really This note fixed comprises sensitive information.Such as, this preset value can be " 1 ", it is also possible to for " 2 ", the present invention is for preset value only It is to illustrate, and indefiniteness explanation.
First, referring to shown in table 1 below, table 1 below is the example of the note that mobile terminal receives:
Table 1
The content of the note of reception can be mated by mobile terminal with the sensitive information prestored, search note Whether content deposits keyword or key word, illustrates as a example by the preset value of key word quantity is " 2 ".Such as, first Note includes two key words: " industrial and commercial bank " and " password ".Second note includes 4 key words: " Alipay ", " account ", " ID (identity number) card No. " and " password ".Key word quantity in above-mentioned two note is all higher than equal to preset value, then and first Individual note and second note are all judged as comprising sensitive information, it may be possible to non-security note, need to verify.
In alternatively possible implementation, the content of note and mobile terminal can be prestored by mobile terminal Keyword mates, and whether there is keyword in search short message content, whether comprises sensitive letter to determine in this short message content Breath, concrete method refer to the matching process of above-mentioned key word and understands, do not repeats.
It should be noted that be merely illustrative for key word or the keyword of storage in mobile terminal, actual application In, this key word or keyword are not defined.
If comprising sensitive information in the content of this note of step 102, then mobile terminal extracts target letter from this note Breath.
Sensitive information is included, say, that this note of reception is probably puppet in mobile terminal judges the note received The non-security note that base station sends, then this mobile terminal extracts target information from note, is entered this note by target information Row verification.
Wherein, this target information can be following several possible implementation:
1, this target information is for sending number.
2, this target information is the content of note.
3, preferred, this target information includes sending number and the content of note.
Step 103, mobile terminal send target information to network security server.
The safety information of this note is verified by this target information by this target information for network security server. This target information carries the first mark for this note of labelling.So that when mobile terminal receives network security server feedback During check results, being also required to include the first mark in the result of this verification, the result of verification is corresponding with this verified note.
Such as, this first mark can be timestamp, random code or serial number etc..This random code can be mobile terminal The character string of stochastic generation.Such as " 100110 ".In the embodiment of the present invention, this first mark can be said as a example by timestamp Bright.In actual applications, this first mark concrete implementation mode, the present invention does not limits.
Step 104, network security server receive this target information, and according to the first presupposed information and target information pair The safety of this note verifies, and generates the first feedback information, and the first feedback information is used for indicating whether note is that safety is short Letter.
The safety of this note is verified by network security server according to the first presupposed information and target information Concrete mode can be: (1) first presupposed information is the first blacklist including multiple number, and this first blacklist is lifted by user Report, is carried out recording and safeguarding and formed by network security server.And network security server periodically updates this first black name Single.If the transmission number that target information is note, it is judged that whether include the transmission number of note in the first blacklist.If first is black List includes sending number, then the first feedback information generated is non-security note for indicating note.If the first blacklist In do not include sending number, then the first feedback information instruction None-identified note whether safety generated.Remembered by blacklist Recording the number of non-security note, whether the transmission number of the note received by judgement is present in this black bright list, verification mode Simplicity, quickly.
(2) when the content that this target information is note, whether network security server by mating the content of this note It is to be sent by sms center, judges the safety of this note.Such as, this network security server can first extract short message content In the title of sender, such as industrial and commercial bank, Alipay, Construction Bank etc..As a example by industrial and commercial bank, network security server is looked into Ask the record information of the issued note of sms center, record information is inquired about the issued note of industrial and commercial bank.Such as, from Network security server receives the moment of this note, the note of 30 seconds before that moment, if industrial and commercial bank send short Having the note identical with the content of this note in letter, then show that this note is secure short message, the first feedback information of generation is used for Indicating this note is secure short message, if not including the content of note in record information, then the first feedback information instruction generated is short Letter is non-security note.Being verified note by the content of note, can verify out this note accurately is secure short message Or non-security note.
Preferably, if this first is designated timestamp, can directly lock this moment industrial and commercial bank in timestamp instruction The note sent.Such as, the moment of this timestamp instruction is 7:40:05.Network security server inquires about industrial and commercial bank at 7:40: In 05 note sent, if having the note identical with this short message content, if there being the note identical with this short message content, then show This note is secure short message, if the note the most identical with this short message content, then shows that this note is non-security note.This note It is sent to mobile terminal by pseudo-base station.
In another kind of preferably implementation, this target information is transmission number and the content of note of this note, and the One is designated timestamp, and network security server can directly pass through the record information of the issued note in short message enquiry center, The transmission number of first matching sms, if record has had the transmission number of this note in this record information of the moment of timestamp record It is transmitted across note, then the content of matching sms whether identical in record information, if the time of short message sending, the transmission of note The content of number and note is all mated, then the first feedback information generated is secure short message for indicating this note.Or, The content sending number and note of note is all mated, and the interval sent between time and the moment of timestamp record of note Duration (is likely to be due to the reason of network, mobile terminal receives note time delay) in presetting range, the first feedback information of generation Being also used for indicating this note is secure short message.
If including the transmission number of this note in record information, but the content of note do not mated, it may be possible to pseudo-base station Pretend to be the phone number of user, and the non-security note sent, such as, pseudo-base station pretends to be the short of 13800000000 transmissions swindles Letter content, then the first feedback information generated is non-security note for indicating this note.
It should be noted that for the safety of this note being verified according to the first presupposed information and target information Concrete grammar, the embodiment of the present invention is merely illustrative, and indefiniteness explanation.
Step 105, network security server send this first feedback information to mobile terminal.
Network security server sends this first feedback information by note to mobile terminal, and this first feedback information carries First mark.First mark is for identifying the check results of specifically which bar note of this first feedback information instruction.
Step 106, mobile terminal receive the first feedback information that this network security server sends, and according to the first feedback Information, processes accordingly.
(1) in the case of the first feedback information indicates note to be non-security note, note is not displayed to the user that.
(2) in the case of the first feedback information indicates note to be secure short message, note is displayed to the user that.
(3) in the case of the first feedback information does not indicates note whether to be secure short message, note is displayed to the user that, and to There is risk in user's SMS Tip.It should be noted that prompt the user with note exist risk may include that display this note deposit Information in risk, it is also possible to be to there is risk by prompt tone prompting this note of user, concrete prompting mode, this Bright do not limit.
Optionally, in the case of in step 106 the 2nd kind and the 3rd kind of mobile terminal show this note, if this note Content also includes URL link, then can continue executing with step 107.
Step 107, mobile terminal receive the URL link operational order of user's input.
Mobile terminal receives the operational order of the click URL link of user's input.
Step 108, mobile terminal send URL link according to operational order to network security server.
The content of this note includes that URL connects, and this URL link is likely to be unsafe.Such as, following note:
Transmission number: 13800000000
Short message content: you are good, I is the teacher of your child school, provides convenient for the head of a family, and our school is unified on the net Pay tuition fee for child, following website http:www.ancd//t.cc/eac.com please be log in and pay the fees.
It can be seen that this short message content includes " expense " " payment " such keyword from said short message content, but After this network security server is verified, the first feedback information of feedback indicates this note to be secure short message, say, that move Dynamic terminal normally shows this note, and user may click on this link (for example, it is also possible to being maloperation), and input is for this URL The operational order of link, after mobile terminal receives the operational order of user's input, wouldn't issue browser by this link Open, but this URL link and second are identified by short message sending to network security server, to carry out this URL link Verification.The effect of this second mark, for this URL link of labelling, receives network security server feedback check so that working as During result, for the result of verification is carried out corresponding with the URL of transmission connection.This second mark can be timestamp, random code Or serial numbers etc., this random code can be the character string of mobile terminal stochastic generation.
Step 109, network security server receive this URL link that mobile terminal sends, network security server root According to the second presupposed information, the safety of this URL link is verified, generate the second feedback information.
It is secure link or non-security link that this second feedback information is used for indicating this URL link.Preset according to second The safety of URL link is verified by information, generates the second feedback information, and the second feedback information is used for indicating the URL link be No for secure link.
Concrete method of calibration is as follows: (1) second presupposed information is the second black name including multiple non-security URL link Single, the non-security URL link in this second blacklist is to be reported by user, and network security server record is also safeguarded, network is pacified Full server periodically updates this second blacklist.After network security server receives URL link, it is judged that this second black name Whether list includes this URL link received;If the second blacklist includes the URL link of this reception, then second generated is anti- It is non-security link that feedforward information is used for indicating URL link.If this second blacklist not including URL link, then second generated Feedback information instruction None-identified URL link whether safety.This by the method for calibration of blacklist, it is achieved easy, should Second blacklist periodically updates, and network security server can determine non-security URL link by blacklist, it is achieved to URL The verification of link.
(2) this second presupposed information includes that multiple URL link and corresponding record information, log-on message and qualification are recognized Card information.URL link according to receiving inquires about the second presupposed information.
If inquiring record information corresponding to URL link, log-on message and qualification certification information in the second presupposed information, The the second feedback information instruction URL link then generated is secure link.If it is understood that this URL link can be inquired Corresponding record information, log-on message and qualification certification information these three information, then show that this URL link is true, safety Link.
If not inquiring record information corresponding to URL link, log-on message and qualification certification letter in the second presupposed information Breath, then the second feedback information instruction URL link generated is non-security link.If it is understood that record information, registration letter Breath and qualification certification information these three information all do not inquire, then show that this URL link is non-security link.
If inquiring record information corresponding to URL link, log-on message or qualification certification information in the second presupposed information In any one or two information, then the second feedback information instruction None-identified URL link generated whether safety.
It should be noted that this network security server can store this second presupposed information, or, network security Server can also obtain this second presupposed information from third party's service platform, and concrete implementation is the mode present invention do not limit.
This second feedback information is fed back to mobile terminal by step 110, network security server.
This second feedback information carries the second mark, and this second mark is for this second feedback information of labelling, so that moving When terminal receives this second feedback information, it may be determined that the URL corresponding to this check results connects.
Step 111, mobile terminal receive this second feedback information, and locate accordingly according to this second feedback information Reason.
Mobile terminal identifies corresponding URL link according to the second mark, indicates this URL link for peace at the second feedback information In the case of full link, then mobile terminal shows this URL link.
This URL link is indicated to be non-security link at this second feedback information, then mobile terminal refusal response operational order. Mobile terminal does not perform to open the instruction of URL link, or, mobile terminal opens URL link, but enters the interface of URL link Row shielding, namely mobile terminal does not display to the user that the interface of this URL link.
In the case of this second feedback information indicates this URL link of None-identified the most safely, then mobile terminal shows URL link, and point out this URL to there is risk to being used for.Mobile terminal can point out this URL link to deposit in the way of text message In risk, or can also be pointed out by sound, concrete prompting mode, the present invention does not limits.
In the embodiment of the present invention, in the case of mobile terminal shows this note, if the content of this note includes URL chain Connect, and this mobile terminal receive user input URL link operational order after, mobile terminal wouldn't show URL link Interface.This operational order triggers mobile terminal and URL link information is sent to network security server, network security server pair URL link verifies, and the result of verification is sent to mobile terminal by network security, mobile terminal according to verification result to this URL link carries out corresponding process, and when object information indicates this URL link to be non-security link, mobile terminal does not shows This URL link, effectively avoids this URL link for being linked to fishing website, damages the interests of user.
It should be noted that step 107 to step 111 is optional step, can not perform, directly perform step 112.
If not comprising sensitive information in this note of step 112, mobile terminal displays to the user that note.
Such as, as a example by following note:
Transmission number: 10690779120510
Short message content: you are good for distinguished client: AAA shop-establishment celebration, and 1000 yuan of red packets have arrived account, and details please be stabbed: http: // t.cc/R4eceac。
From the content of said short message, if according to the matching process of " key word ", this note does not comprise sensitive information, moves Dynamic terminal can normally show note, but, this note comprising URL and connects, this URL connection also likely to be present risk, user This link (for example, it is also possible to being maloperation) may be clicked on, input the operational order for this URL link.
In the case of the operational order that user have input this URL link, step 113 can be continued executing with.
Optionally, step 113, mobile terminal send URL link according to operational order to network security server.
Optionally, step 114 to step 117 and step 108 are identical to 111, do not repeat.
In the embodiment of the present invention, mobile terminal display note, if this note includes URL link, and mobile terminal receives The operational order of the URL link of user's input, then this URL link is sent to network security server by mobile terminal, by network The safety of this URL link is verified by security server, if the check results of this URL link is referred to by network security server Show that this URL link is non-security link, then mobile terminal refusal responds this operational order, is not turned on this URL link or does not shows Show this URL link, it is to avoid user is caused economy and property loss by non-security link.
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the terminal of embodiment of the present invention offer.With reference to figure 3, mobile phone includes: receiver 310, memorizer 320, input equipment 330, display device 340, transmitter 350, voicefrequency circuit 360, The parts such as processor 380 and power supply 390.It will be understood by those skilled in the art that the not structure of the handset structure shown in Fig. 3 The restriction of mobile phone in pairs, can include that ratio illustrates more or less of parts, or combine some parts, or different parts Arrange.
Below in conjunction with Fig. 3 each component parts of mobile phone carried out concrete introduction:
Receiver 310 can be used for receiving information by antenna, and be transferred to processor 380 and process.This information includes But it is not limited to note.
Transmitter 350 is for sending information by antenna.Up data are sent to base station.
Memorizer 320 can be used for storing software program and module, and processor 380 is stored in memorizer 320 by operation Software program and module, thus perform mobile phone various functions application and data process.
Input equipment 330 can be used for receiving numeral or the character information of input, and produce with the user setup of mobile phone with And function controls relevant key signals input.Specifically, input equipment 330 can include that contact panel 331 and other inputs set Standby 332.Contact panel 331, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user uses Any applicable object such as finger, stylus or adnexa operation on contact panel 331 or near contact panel 331), and root Corresponding attachment means is driven according to formula set in advance.Optionally, contact panel 331 can include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 380, and order that processor 380 sends can be received and performed.
Display device 340 can be used for information or the note etc. of reception that display is inputted by user.Display device 340 can include Display floater 341, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), organic light emission two The forms such as pole pipe (Organic Light-Emitting Diode, OLED) configure display floater 341.Further, touch-control Panel 331 can cover display floater 341, when contact panel 331 detects thereon or after neighbouring touch operation, sends place to Reason device 380, to determine the type of touch event, carries according to the type of touch event with preprocessor 380 on display floater 341 For corresponding visual output.Although in figure 3, contact panel 331 and display floater 341 are to come in fact as two independent parts The input of existing mobile phone and input function, but in some embodiments it is possible to by integrated with display floater 341 for contact panel 331 And realize input and the output function of mobile phone.
Voicefrequency circuit 360, speaker 361, microphone 362 can provide the audio interface between user and mobile phone.Audio-frequency electric The signal of telecommunication after the voice data conversion that road 360 can will receive, is transferred to speaker 361, speaker 361 is converted to sound Signal exports.
Processor 380 is the control centre of mobile phone, utilizes various interface and the various piece of the whole mobile phone of connection, logical Cross operation or perform to be stored in the software program in memorizer 320 and/or module, and calling and be stored in memorizer 320 Data, perform the various functions of mobile phone and process data, thus mobile phone is carried out integral monitoring.Optionally, processor 380 can wrap Include one or more processing unit;Preferably, processor 380 can integrated application processor and modem processor, wherein, should Mainly process operating system, user interface and application program etc. with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated in processor 380.
Mobile phone also includes the power supply 390 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system is logically contiguous with processor 380, thus realizes management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include photographic head, bluetooth module, Wireless Fidelity (Wireless Fidelity, Abbreviation: WiFi) module etc., does not repeats them here.
Receiver 310, is used for receiving note;
Whether processor 380, include and user privacy information phase in the content judging note that RF circuit 310 receives The keyword closed, in the case of the content of note includes keyword, extracts target information, target information bag from note Include: send the transmission number of note, or, at least one in the content of note;
Receiver 310, for being sent to network security server by the target information that processor 380 extracts;
Receiver 310, is additionally operable to receive network security server verification object information and the first feedback information of feeding back, the One feedback information is used for indicating whether note is secure short message;
Processor 380, is additionally operable to the situation that the first feedback information instruction note is non-security note received at receiver Under, do not display to the user that note.
Optionally, display device 340, in the case of indicating note to be secure short message at the first feedback information, Xiang Yong Family display note.
Display device 340, in the case of indicating None-identified note the most safely at the first feedback information, to user Display note, and prompt the user with note and there is risk.Or, speaker 361 prompt the user with note and there is risk.
Display device 340, in the case of not comprising keyword in the content of note, displays to the user that note.
Short message content includes that uniform resource position mark URL links, input equipment 330, for receiving the URL of user's input The operational order of link;
Transmitter 350, is additionally operable to the operational order according to input equipment 330 receives and sends URL to network security server Link;
Receiver 310, is additionally operable to receive network security server verification URL link and the second feedback information of feeding back, the Two feedback informations are used for indicating whether URL link is secure link;
Processor 380, is additionally operable in the case of the second feedback information indicates URL link to be non-security link, and refusal rings Answer operational order.
Fig. 4 is a kind of network security server structural representation that the embodiment of the present invention provides, this network security server 400 can produce bigger difference because of configuration or performance difference, can include one or more processors 422 (such as, One or more processors) and memorizer 432, storage medium 430 (such as one or more mass memories of data Equipment).Wherein, memorizer 432 and storage medium 430 can be of short duration storage or persistently store.It is stored in storage medium 430 Program can include one or more modules (diagram does not marks), and each module can include in network security server A series of command operatings.Further, processor 422 could be arranged to communicate with storage medium 430, takes in network security The a series of command operatings in storage medium 430 are performed on business device 400.
Network security server 400 can also include one or more power supplys 426, one or more wired or Radio network interface 450.
Above-described embodiment can be taken based on the network security shown in this Fig. 4 by the step performed by network security server Business device structure.
Concrete, network interface 450, for receiving the target information that mobile terminal sends, target information is mobile terminal At least one in the content sending number or note of the note received.
Processor 422, is used for the safety to note of the target information according to the first presupposed information and network interface reception Property verifies, and generates the first feedback information, and the first feedback information is used for indicating whether note is secure short message.
Network interface 450, is additionally operable to send the first feedback information to mobile terminal.
First presupposed information is the first blacklist including multiple number;
Processor 422, is additionally operable to judge whether to include in the first blacklist the transmission number of note, if in the first blacklist Including sending number, then the first feedback information generated is for indicating note safety;If the first blacklist does not include transmission number Code, then the first feedback information instruction None-identified note whether safety generated.
First presupposed information includes the record information of the issued note of sms center, and target information is the content of note.
Processor 422, is additionally operable to inquire about record information, and judges whether to include in record information the content of note, if note Record information includes the content of note, then the first feedback information instruction note generated is secure short message;If in record information not Including the content of note, then the first feedback information instruction note generated is non-security note.
Network interface 450, is additionally operable to receive the URL link that mobile terminal sends;
Processor 422, is additionally operable to verify the safety of URL link according to the second presupposed information, generates second anti- Feedforward information, the second feedback information is used for indicating whether URL link is secure link.
Second presupposed information is the second blacklist including multiple non-security URL link.
Processor 422, is additionally operable to judge whether include URL link in the second blacklist, if the second blacklist includes URL Link, then the second feedback information generated is non-security link for indicating URL link, if not including URL in the second blacklist Link, then whether the second feedback information instruction None-identified URL link generated is secure link.
Second presupposed information includes multiple URL link and corresponding record information, log-on message and qualification certification letter Breath;
Processor 422, is additionally operable to the URL link according to network interface receives and inquires about the second presupposed information, if pre-second If information inquires record information corresponding to URL link, log-on message and qualification certification information, then the second feedback letter generated Breath instruction URL link is secure link;If not inquiring record information corresponding to URL link, registration in the second presupposed information Information and qualification certification information, then the second feedback information instruction URL link generated is non-security link;If presetting letter second Breath inquires any one in record information corresponding to URL link, log-on message or qualification certification information or two letters Breath, then whether the second feedback information instruction None-identified URL link generated is secure link.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the movement of foregoing description Terminal, the specific works process of network security server, it is referred to the corresponding process in preceding method embodiment, at this no longer Repeat.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method are permissible Realize by another way.Such as, device embodiment described above is only schematically, such as, and described unit Dividing, be only a kind of logic function and divide, actual can have other dividing mode, the most multiple unit or assembly when realizing Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communication connection, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit Time, can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part that in other words prior art contributed or this technical scheme completely or partially can be with the form of software product Embodying, this computer software product is stored in a storage medium, including some instructions with so that a computer Equipment (can be personal computer, server, or the network equipment etc.) performs the complete of method described in each embodiment of the present invention Portion or part steps.And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, above example only in order to technical scheme to be described, is not intended to limit;Although with reference to front State embodiment the present invention has been described in detail, it will be understood by those within the art that: it still can be to front State the technical scheme described in each embodiment to modify, or wherein portion of techniques feature is carried out equivalent;And these Amendment or replacement, do not make the essence of appropriate technical solution depart from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (26)

1. the method identifying non-security note, it is characterised in that including:
Receive note;
Judge whether the content of the described note received includes that sensitive information, described sensitive information are: with user privacy information Relevant keyword;
In the case of the content of described note includes described sensitive information, from described note, extract target information, described Target information includes: send the transmission number of described note, or, at least one in the content of described note;
Described target information is sent to network security server;
The first feedback information receiving the described network security server described target information of verification and feed back, described first feedback letter Breath is used for indicating whether described note is secure short message;
In the case of described first feedback information indicates described note to be non-security note, do not display to the user that described note.
Method the most according to claim 1, it is characterised in that described method also includes:
In the case of described first feedback information indicates described note to be secure short message, display to the user that described note.
Method the most according to claim 1, it is characterised in that described method also includes:
In the case of whether note described in described first feedback information instruction None-identified is secure short message, display to the user that institute State note, and point out described note to there is risk to described user.
Method the most according to claim 1, it is characterised in that described method also includes:
If in the case of this short message content does not comprise described sensitive information, then display to the user that described note.
5. according to the method according to any one of claim 2 to 4, it is characterised in that if described short message content includes unified URLs URL link, described method also includes:
Receive the operational order opening described URL link;
Described URL link is sent to described network security server according to described operational order;
The second feedback information receiving the described network security server described URL link of verification and feed back, described second feedback letter Breath is used for indicating whether described URL link is secure link;
In the case of described second feedback information indicates described URL link to be non-security link, refusal responds described operation and refers to Order.
Method the most according to claim 5, it is characterised in that described method also includes:
In the case of whether URL link described in described second feedback information instruction None-identified is secure link, response is described Operational order also opens described URL link, and point out described URL link to there is risk to described user.
Method the most according to claim 5, it is characterised in that described method also includes:
In the case of described second feedback information indicates described URL link to be secure link, respond described operational order and open Open described URL link.
8. the method identifying non-security note, it is characterised in that described method includes:
Receive the target information that mobile terminal sends, the transmission number of the note that described target information is received by described mobile terminal At least one in the content of code or described note;
According to the first presupposed information and described target information, the safety of described note is verified, generate the first feedback letter Breath, described first feedback information is used for indicating whether described note is secure short message;
Described first feedback information is sent to described mobile terminal.
Method the most according to claim 8, it is characterised in that described first presupposed information is include multiple number first Blacklist, if the transmission number that described target information is described note, then according to the first presupposed information and described target information Safety to described note verifies, and generates the step of the first feedback information, including:
Judge whether described first blacklist includes the transmission number of described note;
If described first blacklist includes described transmission number, then described first feedback information generated is described short for indicating Letter is non-security note;
If described first blacklist does not include described transmission number, then the described first feedback information instruction None-identified generated Described note whether safety.
Method the most according to claim 8, it is characterised in that described first presupposed information includes that sms center sends The record information of note, described target information is the content of described note, then according to described first presupposed information and described The safety of described note is verified by target information, generates the step of the first feedback information, including:
Inquire about described record information;
Judge whether described record information includes the content of described note;
If described record information includes the content of described note, then the described first described note of feedback information instruction generated is Secure short message;
If not including the content of described note in described record information, then described first feedback information generated indicates described note For non-security note.
11. methods according to claim 8, it is characterised in that described method also includes:
Receive the URL link that described mobile terminal sends;
According to the second presupposed information, the safety of described URL link is verified, generate the second feedback information, described second anti- Feedforward information is used for indicating whether described URL link is secure link.
12. methods according to claim 11, it is characterised in that described second presupposed information is multiple non-security for including Second blacklist of URL link, verifies the safety of described URL link according to described second presupposed information, generates the The step of two feedback informations, including:
Judge whether described second blacklist includes described URL link;
If described second blacklist includes described URL link, then the second feedback information generated is for indicating described URL link For non-security link;
If described second blacklist does not include described URL link, then described in the second feedback information instruction None-identified generated URL link whether safety.
13. methods according to claim 11, it is characterised in that described second presupposed information include multiple URL link and Its corresponding record information, log-on message and qualification certification information;
Described second presupposed information is inquired about according to the described URL link received;
If inquiring record information corresponding to described URL link, log-on message and qualification certification in described second presupposed information Information, then described second feedback information generated indicates described URL link to be secure link;
If not inquiring record information corresponding to described URL link, log-on message and qualification in described second presupposed information to recognize Card information, then described second feedback information generated indicates described URL link to be non-security link;
If inquiring record information corresponding to described URL link, log-on message or qualification certification in described second presupposed information Any one in information or two information, then described second feedback information generated indicates URL link described in None-identified Whether safety.
14. 1 kinds of mobile terminals, it is characterised in that including: processor, and the receiver that couples with described processor respectively and Transmitter;
Described receiver, is used for receiving note;
Whether described processor, include sensitive information in the content judging described note that described receiver receives, described Sensitive information is: the keyword relevant to user privacy information, and the content in described note includes the feelings of described sensitive information Under condition, extracting target information from described note, described target information includes: send the transmission number of described note, or, described At least one in the content of note;
Described transmitter, is sent to network security server for the described target information extracted by described processor;
Described receiver, is additionally operable to receive described network security server and verifies described target information and the first feedback letter of feeding back Breath, described first feedback information is used for indicating whether described note is secure short message;
Described processor, is additionally operable to described first feedback information described receiver receives and indicates described note to be non-security short In the case of letter, do not display to the user that described note.
15. mobile terminals according to claim 14, it is characterised in that also include: the display coupled with described processor Equipment;
Described display device, in the case of indicating described note to be secure short message at described first feedback information, to user Show described note.
16. mobile terminals according to claim 14, it is characterised in that also include: the display coupled with described processor Equipment;
Described display device, in the case of indicating note described in None-identified the most safely at described first feedback information, Display to the user that described note, and point out described note to there is risk to described user.
17. mobile terminals according to claim 14, it is characterised in that also include: the display coupled with described processor Equipment;
Described display device, in the case of not comprising described keyword in the content of described note, displays to the user that institute State note.
18. according to the mobile terminal according to any one of claim 15 to 17, it is characterised in that also include: with described process The input equipment of device coupling;
Described short message content includes that uniform resource position mark URL links;The most described input equipment, is used for receiving unlatching described The operational order of URL link;
Described transmitter, is additionally operable to the described operational order according to described input equipment receives and sends out to described network security server Send described URL link;
Described receiver, is additionally operable to receive described network security server and verifies described URL link and the second feedback letter of feeding back Breath, described second feedback information is used for indicating whether described URL link is secure link;
Described processor, is additionally operable to, in the case of described second feedback information indicates described URL link to be non-security link, refuse Lost art should described operational order.
19. mobile terminals according to claim 18, it is characterised in that
Described processor, is additionally operable in the situation of URL link whether safety described in described second feedback information instruction None-identified Under, respond described operational order and open described URL link, and pointing out described URL link to there is risk to described user.
20. mobile terminals according to claim 18, it is characterised in that
Described processor, is additionally operable in the case of described second feedback information indicates described URL link to be secure link, response Described operational order also opens described URL link.
21. 1 kinds of network security servers, it is characterised in that including:
Network interface, and
Processor, couples with described memorizer and described network interface;
Described network interface, for receiving the target information that mobile terminal sends, described target information is described mobile terminal institute At least one in the content sending number or described note of the note received;
Described processor, is additionally operable to the described target information according to the first presupposed information and the reception of described network interface to described The safety of note verifies, and generates the first feedback information, and whether described first feedback information is used for indicating the described note be Secure short message;
Described network interface, is additionally operable to send described first feedback information to described mobile terminal.
22. network security servers according to claim 21, it is characterised in that described first presupposed information is many for including First blacklist of individual number;
Described processor, is additionally operable to the transmission number judging whether include described note in described first blacklist, if described One blacklist includes described transmission number, then described first feedback information generated is for indicating described note safety;If institute State and the first blacklist does not include described transmission number, then note described in the described first feedback information instruction None-identified generated Whether safety.
23. network security servers according to claim 21, it is characterised in that described first presupposed information includes note The record information of the issued note in center, described target information is the content of described note;
Described processor, is additionally operable to inquire about described record information, and judges whether include described note in described record information Content, if described record information includes the content of described note, then described first feedback information generated indicates described note For secure short message;If described record information does not include the content of described note, then the described first feedback information instruction generated Described note is non-security note.
24. network security servers according to claim 21, it is characterised in that
Described network interface, is additionally operable to receive the URL link that described mobile terminal sends;
Described processor, is additionally operable to verify the safety of described URL link according to the second presupposed information, generates second anti- Feedforward information, described second feedback information is used for indicating whether described URL link is secure link.
25. network security servers according to claim 24, it is characterised in that described second presupposed information is many for including Second blacklist of individual non-security URL link;
Described processor, is additionally operable to judge whether include described URL link in described second blacklist, if described second blacklist Include described URL link, then the second feedback information generated is non-security link for indicating described URL link, if described Do not include described URL link in second blacklist, then described in the second feedback information instruction None-identified generated, whether URL link For secure link.
26. network security servers according to claim 24, it is characterised in that described second presupposed information includes multiple URL link and corresponding record information, log-on message and qualification certification information;
Described processor, is additionally operable to the described URL link according to described network interface receives and inquires about described second presupposed information, if Record information corresponding to described URL link, log-on message and qualification certification information is inquired, then in described second presupposed information Described second feedback information generated indicates described URL link to be secure link;If not inquiring about in described second presupposed information To record information, log-on message and qualification certification information that described URL link is corresponding, then described second feedback information generated refers to Show that described URL link is non-security link;If inquiring the letter of putting on record that described URL link is corresponding in described second presupposed information Any one in breath, log-on message or qualification certification information or two information, then described second feedback information generated refers to Show whether URL link described in None-identified is secure link.
CN201610796204.XA 2016-08-31 2016-08-31 Insecure short message recognition method and related equipment Pending CN106332024A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610796204.XA CN106332024A (en) 2016-08-31 2016-08-31 Insecure short message recognition method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610796204.XA CN106332024A (en) 2016-08-31 2016-08-31 Insecure short message recognition method and related equipment

Publications (1)

Publication Number Publication Date
CN106332024A true CN106332024A (en) 2017-01-11

Family

ID=57786561

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610796204.XA Pending CN106332024A (en) 2016-08-31 2016-08-31 Insecure short message recognition method and related equipment

Country Status (1)

Country Link
CN (1) CN106332024A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980778A (en) * 2017-03-29 2017-07-25 北京奇虎科技有限公司 Information authentication method, device and terminal device
CN107239504A (en) * 2017-05-10 2017-10-10 上海交通大学 A kind of deep learning algorithm for being used to recognize fraud text message
CN108667715A (en) * 2018-03-27 2018-10-16 北京泰迪熊移动科技有限公司 Recognition methods, device, storage medium and the processor of Flight Information
CN108882183A (en) * 2018-03-27 2018-11-23 北京泰迪熊移动科技有限公司 Recognition methods, device, storage medium and the processor of bank information
CN109302687A (en) * 2017-07-25 2019-02-01 中国电信股份有限公司 For obscuring the methods, devices and systems of short message content
CN109327812A (en) * 2018-09-30 2019-02-12 国网浙江省电力有限公司 A kind of electrical power services intelligently pushing method and device based on short message
CN109587640A (en) * 2017-09-29 2019-04-05 中国移动通信有限公司研究院 A kind of junk information recognition methods, terminal and computer storage medium
CN109905359A (en) * 2018-12-24 2019-06-18 深圳市珍爱捷云信息技术有限公司 Communication message processing method, device, computer equipment and can read access medium
CN113316153A (en) * 2020-04-02 2021-08-27 阿里巴巴集团控股有限公司 Short message inspection method, device and system
CN113328923A (en) * 2020-02-28 2021-08-31 阿里巴巴集团控股有限公司 Presentation method, server, client, electronic device and computer readable medium
CN113542489A (en) * 2021-09-14 2021-10-22 深圳市沃特沃德软件技术有限公司 Automatic processing method and device of contact information and computer equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790752A (en) * 2011-05-20 2012-11-21 盛乐信息技术(上海)有限公司 Fraud information filtering system and method on basis of feature identification
CN102801706A (en) * 2012-06-28 2012-11-28 宇龙计算机通信科技(深圳)有限公司 Terminal and security processing method for information contents
CN104486737A (en) * 2014-12-19 2015-04-01 上海斐讯数据通信技术有限公司 Short message processing system and method thereof
CN105101202A (en) * 2015-05-25 2015-11-25 小米科技有限责任公司 Information processing method and device
CN105323261A (en) * 2015-12-15 2016-02-10 北京奇虎科技有限公司 Data detection method and device
CN105611513A (en) * 2016-02-29 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Short message display method and system for mobile terminal
CN105721697A (en) * 2016-02-18 2016-06-29 吴伟东 Mobile phone short message shielding method and system
CN105813085A (en) * 2016-03-08 2016-07-27 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790752A (en) * 2011-05-20 2012-11-21 盛乐信息技术(上海)有限公司 Fraud information filtering system and method on basis of feature identification
CN102801706A (en) * 2012-06-28 2012-11-28 宇龙计算机通信科技(深圳)有限公司 Terminal and security processing method for information contents
CN104486737A (en) * 2014-12-19 2015-04-01 上海斐讯数据通信技术有限公司 Short message processing system and method thereof
CN105101202A (en) * 2015-05-25 2015-11-25 小米科技有限责任公司 Information processing method and device
CN105323261A (en) * 2015-12-15 2016-02-10 北京奇虎科技有限公司 Data detection method and device
CN105721697A (en) * 2016-02-18 2016-06-29 吴伟东 Mobile phone short message shielding method and system
CN105611513A (en) * 2016-02-29 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Short message display method and system for mobile terminal
CN105813085A (en) * 2016-03-08 2016-07-27 联想(北京)有限公司 Information processing method and electronic device

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980778B (en) * 2017-03-29 2020-07-14 北京奇虎科技有限公司 Information identification method and device and terminal equipment
CN106980778A (en) * 2017-03-29 2017-07-25 北京奇虎科技有限公司 Information authentication method, device and terminal device
CN107239504A (en) * 2017-05-10 2017-10-10 上海交通大学 A kind of deep learning algorithm for being used to recognize fraud text message
CN109302687A (en) * 2017-07-25 2019-02-01 中国电信股份有限公司 For obscuring the methods, devices and systems of short message content
CN109587640A (en) * 2017-09-29 2019-04-05 中国移动通信有限公司研究院 A kind of junk information recognition methods, terminal and computer storage medium
CN108882183A (en) * 2018-03-27 2018-11-23 北京泰迪熊移动科技有限公司 Recognition methods, device, storage medium and the processor of bank information
CN108667715A (en) * 2018-03-27 2018-10-16 北京泰迪熊移动科技有限公司 Recognition methods, device, storage medium and the processor of Flight Information
CN109327812A (en) * 2018-09-30 2019-02-12 国网浙江省电力有限公司 A kind of electrical power services intelligently pushing method and device based on short message
CN109905359A (en) * 2018-12-24 2019-06-18 深圳市珍爱捷云信息技术有限公司 Communication message processing method, device, computer equipment and can read access medium
CN109905359B (en) * 2018-12-24 2021-09-21 深圳市珍爱捷云信息技术有限公司 Communication message processing method, device, computer equipment and readable access medium
CN113328923A (en) * 2020-02-28 2021-08-31 阿里巴巴集团控股有限公司 Presentation method, server, client, electronic device and computer readable medium
CN113316153A (en) * 2020-04-02 2021-08-27 阿里巴巴集团控股有限公司 Short message inspection method, device and system
CN113316153B (en) * 2020-04-02 2024-03-26 阿里巴巴集团控股有限公司 Short message inspection method, device and system
CN113542489A (en) * 2021-09-14 2021-10-22 深圳市沃特沃德软件技术有限公司 Automatic processing method and device of contact information and computer equipment

Similar Documents

Publication Publication Date Title
CN106332024A (en) Insecure short message recognition method and related equipment
CN104219050B (en) Voice print verification method, server, client and system
CN102790674B (en) Auth method, equipment and system
CN101523859B (en) System and method for authenticating remote server access
CN106211169A (en) Pseudo-base station identification device and method
CN105814591A (en) Verification information transmission method and terminal
CN105246058B (en) The verification method and short message server of short message
CN103329179A (en) Intelligent emergency signal transmission system using mobile phone and method thereof
CN104660481A (en) Instant messaging processing method and device
CN102130909A (en) Authentication method and system
CN104539624A (en) Safety monitoring method and device for number information in text
CN106231572A (en) Pseudo-base station refuse messages discrimination method and system
CN109033801A (en) Method, mobile terminal and the storage medium of application program verification user identity
CN108881103A (en) A kind of method and device accessing network
CN106713579A (en) Telephone number identification method and device
CN107318104A (en) Account register method, device, computer equipment and medium
CN106126707A (en) Information identifying method and information recognition device
CN106330889A (en) Method and apparatus for deblocking account
CN103458407A (en) Internet account number login management system and method based on short message
CN110443558A (en) A kind of method, apparatus and equipment of bill processing
CN108271127A (en) Pseudo-base station note knows method for distinguishing and terminal
CN109257338A (en) A kind of System and method for of server log re-authentication
CN104899488B (en) Numeric value transfer and device
CN102299910B (en) Anti-hacking system through telephone authentication
CN106257940A (en) A kind of iOS device and bluetooth peripheral hardware matching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111

RJ01 Rejection of invention patent application after publication