CN106941673A - Fraud text message recognition methods and device - Google Patents
Fraud text message recognition methods and device Download PDFInfo
- Publication number
- CN106941673A CN106941673A CN201710113791.2A CN201710113791A CN106941673A CN 106941673 A CN106941673 A CN 106941673A CN 201710113791 A CN201710113791 A CN 201710113791A CN 106941673 A CN106941673 A CN 106941673A
- Authority
- CN
- China
- Prior art keywords
- address
- short message
- network address
- text message
- fraud text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
- H04L61/2503—Translation of Internet protocol [IP] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A kind of fraud text message recognition methods, applied to terminal, the terminal receives the short message for including network address, and methods described includes:Obtain the first IP address corresponding to the network address in the short message;When note number the second IP address of correspondence, determine whether first IP address matches with second IP address;If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.The present invention also provides a kind of fraud text message identifying device, can effectively recognize short message fraud.
Description
Technical field
The present invention relates to communication technical field, and in particular to a kind of fraud text message recognition methods and device.
Background technology
Terminal, such as mobile phone, are increasingly becoming common items in people's daily life, and short message is then people's using terminal to enter
A kind of common method that row is in communication with each other.But, some criminals can be issued to seek the interests of oneself by terminal
Fraud text message.More there is the network address for often including forging in authenticity, fraud text message in order to allow fraud text message, so will
People are caused easily to believe fraud text message, by short message fraud.
The content of the invention
In consideration of it, being necessary to provide a kind of fraud text message recognition methods and device, short message fraud can be effectively recognized.
The first aspect of the application provides a kind of fraud text message recognition methods, applied to terminal, and the terminal, which is received, to be included
There is the short message of network address, methods described includes:
Obtain the first IP address corresponding to the network address in the short message;
When note number the second IP address of correspondence, determine first IP address and second IP address whether
Match somebody with somebody;
If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.
In alternatively possible implementation, methods described also includes:
When note number does not correspond to the second IP address, acquisition receives network address and corresponds to described first in the given time
The number of the short message of IP address;
Determining the number for receiving the short message that network address corresponds to first IP address in the given time of the acquisition is
It is no to exceed preset value;
If the number for receiving the short message that network address corresponds to first IP address in the given time exceedes preset value, really
The fixed short message is fraud text message.
In alternatively possible implementation, the first IP address corresponding to the network address obtained in the short message it
It is preceding also to include:
It is non-malicious network address that the network address in the short message is determined according to known malice network address database.
In alternatively possible implementation, it is determined that the short message be fraud text message after, methods described also includes:
Obtain the first web page contents corresponding to the network address in the short message;
Obtain the second web page contents corresponding to the note number;
Determine whether first web page contents match with second web page contents;
If first web page contents are mismatched with second web page contents, it is fraud text message to verify the short message.
In alternatively possible implementation, methods described also includes:
If first IP address is matched with second IP address, it is normal short message to determine the short message.
The second aspect of the application provides a kind of fraud text message identifying device, applied to terminal, and the terminal, which is received, to be included
There is the short message of network address, described device includes:
Acquisition module, for obtaining the first IP address corresponding to the network address in the short message;
Matching module, for when note number the second IP address of correspondence, determining first IP address and described second
Whether IP address matches;
Determining module, if being mismatched for first IP address and second IP address, it is swindleness to determine the short message
Deceive short message.
In alternatively possible implementation, described device also includes judge module:
The acquisition module, for when note number does not correspond to the second IP address, acquisition to be received in the given time
Network address corresponds to the number of the short message of first IP address;
The judge module, network address is received with corresponding to the first IP for determine the acquisition in the given time
Whether the number of the short message of location exceedes preset value;
The determining module, if for receiving the people that network address corresponds to the short message of first IP address in the given time
When number exceedes preset value, it is fraud text message to determine the short message.
In alternatively possible implementation, the first IP address corresponding to the network address obtained in the short message it
Before:
The determining module, is additionally operable to determine that the network address in the short message is disliked to be non-according to known malice network address database
Meaning network address.
In alternatively possible implementation, described device also includes authentication module, is used to determine in the determining module
The short message is after fraud text message:
The acquisition module, is additionally operable to obtain the first web page contents corresponding to the network address in the short message;
The acquisition module, is additionally operable to obtain the second web page contents corresponding to the note number;
The matching module, is additionally operable to determine whether first web page contents match with second web page contents;
The authentication module, mismatches with second web page contents if being additionally operable to first web page contents, verifies institute
Short message is stated for fraud text message.
In alternatively possible implementation, the determining module, if being additionally operable to first IP address and described second
When IP address is matched, it is normal short message to determine the short message.
The embodiment of the present invention is by obtaining the first IP address corresponding to the network address in the short message;When note number correspondence
During the second IP address, determine whether first IP address matches with second IP address;If first IP address and institute
The second IP address mismatch is stated, it is fraud text message to determine the short message, so as to effectively identification short message fraud.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, embodiment will be described below needed for be used
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the flow chart for the fraud text message recognition methods that the embodiment of the present invention one is provided;
Fig. 2 is the flow chart for the fraud text message recognition methods that the embodiment of the present invention two is provided;
Fig. 3 is the flow chart for the fraud text message recognition methods that the embodiment of the present invention three is provided;
Fig. 4 is the flow chart for the fraud text message recognition methods that the embodiment of the present invention four is provided;
Fig. 5 is the structural representation of the preferred embodiment for the terminal that the present invention realizes fraud text message recognition methods;
Fig. 6 is the structure chart for the fraud text message identifying device that the embodiment of the present invention six is provided;
Fig. 7 is the structure chart for the fraud text message identifying device that the embodiment of the present invention seven is provided;
Fig. 8 is the structure chart for the fraud text message identifying device that the embodiment of the present invention eight is provided;
Fig. 9 is the structure chart for the fraud text message identifying device that the embodiment of the present invention nine is provided.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Applying example, the present invention will be described in detail.It should be noted that in the case where not conflicting, embodiments herein and embodiment
In feature can be mutually combined.
Many details are elaborated in the following description in order to fully understand the present invention, and described embodiment is only
Only it is a part of embodiment of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill
The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Unless otherwise defined, all of technologies and scientific terms used here by the article is with belonging to technical field of the invention
The implication that technical staff is generally understood that is identical.Term used in the description of the invention herein is intended merely to description tool
The purpose of the embodiment of body, it is not intended that in the limitation present invention.
Embodiment one
Fig. 1 is the schematic flow diagram for the fraud text message recognition methods that the embodiment of the present invention one is provided.Methods described is applied to
In terminal, the terminal can receive the device for the short message for including network address for mobile phone, flat board etc..As shown in figure 1, swindle
Short message recognition methods may include following steps:
S101:Obtain the first IP address corresponding to the network address in the short message.
The short message includes the network address, and the network address can be determined according to the short message.The network address includes agreement, domain
Name, path and filename, such as " agreement:// mandate/pathInquiry ".Corresponding to the network address obtained in the short message
First IP address is specially:Domain name is determined according to the network address, and according to domain name is from name server (DNS) or interconnects
Net acquisition first IP address corresponding with domain name such as service provider (ISP).ISP (ISP) bag
AFRI-NIC (African Network Information Centre), APNIC (asia pacific network information centre), ARIN is included (to note American Network address
Volume management tissue), LACNTC (Latin America and Internet address registration management organization of Caribbean area), RIPE-NIC (Europe
Network coordination center) etc..One first IP address of each domain name correspondence.
S102:When note number the second IP address of correspondence, determine that first IP address is with second IP address
No matching.
Every short message all corresponds to a SMS sender number, i.e. every short message all corresponds to a note number.When the short message number
When code is public number, the second IP address of the note number correspondence.The public number is the phone number of public service unit
Code, for example, the telephone number of China Mobile's customer service is 10086, the telephone number of the Industrial and Commercial Bank of China is 95588.It is each public
Service unit is all to that should have IP address.Wherein, the different IP address of different public service units correspondence.Each public service list
Member can correspond to one or more IP address.
S103:If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.
When the public service unit one IP address of correspondence, first IP address and second IP address are not
With being differed for first IP address with the IP address corresponding to the public service unit.When the public service unit pair
When answering multiple IP address, first IP address and second IP address mismatch for first IP address with it is described public
Any IP address corresponding to service unit is all differed.
Further, it is determined that the short message be fraud text message after, perform prompting user described in short message be fraud text message, basis
The SMS alarm, at least one that the network address is uploaded in malice network address database are operated.
Short message described in the prompting user is that fraud text message can be by sound, word, image, vibrations, flash of light etc.
At least one is pointed out.Described can be that the short message is forwarded into the corresponding public service unit according to the SMS alarm
Corresponding telephone number, at least one directly dialed in 110 alarms etc. are alarmed.
Further, if first IP address is matched with second IP address, it is normal short message to determine the short message.
When the public service unit one IP address of correspondence, first IP address is matched with second IP address
It is identical with the IP address corresponding to the public service unit for first IP address.When public service unit correspondence is more
During individual IP address, first IP address is matched with second IP address as first IP address and the public service list
The IP address in multiple IP address corresponding to member is identical.
The embodiment of the present invention one is by obtaining the first IP address corresponding to the network address in the short message;When note number pair
When answering the second IP address, determine whether first IP address matches with second IP address;If first IP address with
Second IP address is mismatched, and it is fraud text message to determine the short message.Because the embodiment of the present invention one utilizes the net in short message
Location and note number, the first IP address corresponding to the network address in the short message and the 2nd IP corresponding to the note number
When address is mismatched, it is fraud text message to determine the short message, can prevent short message fraud.
Embodiment two
Fig. 2 is the schematic flow diagram for the fraud text message recognition methods that the embodiment of the present invention two is provided.Methods described is applied to
In terminal, the terminal can receive the device for the short message for including network address for mobile phone, flat board etc..As shown in Fig. 2 swindle
Short message recognition methods may include following steps:
S201:Obtain the first IP address corresponding to the network address in the short message.
Step S201 is consistent with step S101 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S101 associated description, herein without repeating.
S202:When note number the second IP address of correspondence, determine that first IP address is with second IP address
No matching.
Step S202 is consistent with step S102 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S102 associated description, herein without repeating.
S203:If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.
Step S203 is consistent with step S103 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S103 associated description, herein without repeating.
S204:When note number does not correspond to the second IP address, acquisition receives network address and corresponds to institute in the given time
State the number of the short message of the first IP address.
When the note number is non-public number, the note number does not correspond to the second IP address.The non-public affairs
Number includes the telephone number of enterprise customer and the telephone number of personal user etc. altogether.The scheduled time be pre-set when
Between, such as it is 5 seconds, 10 seconds or 20 seconds.The number for receiving the short message that network address corresponds to first IP address can be from
Operator or cloud data center etc. obtain.The operator or cloud data center etc. can provide receive network address correspond to it is described
The number of the short message of first IP address.The number for receiving the short message that network address corresponds to first IP address can also be by obtaining
Take and receive the number of the short message transmitted by the note number to obtain.It is described to receive short message transmitted by the note number
Number can be obtained from operator or cloud data center etc..The operator or cloud data center etc. may also provide receive it is described
The number of short message transmitted by note number.
S205:Determine the acquisition receives the people that network address corresponds to the short message of first IP address in the given time
Whether number exceedes preset value.
The preset value is the quantity pre-set, is such as 200,300,500 or 1000.The determination acquisition
Whether the number for receiving the short message that network address corresponds to first IP address in the given time can be by determining more than preset value
Whether the number for receiving the short message transmitted by the note number in the given time of the acquisition determines more than preset value.
S206:If the number for receiving the short message that network address corresponds to first IP address in the given time exceedes preset value
When, it is fraud text message to determine the short message.
The number for receiving the short message that network address corresponds to first IP address in the given time can more than preset value
To receive the number of the short message transmitted by the note number in the given time more than preset value.Wherein, user is with terminal
During bulk SMS, the preset value is typically rarely exceeded, if the quantity of bulk SMS is too big, for example, the quantity of bulk SMS
For 1200, then this is clearly abnormal, now can determine that the short message is fraud text message.
The embodiment of the present invention two is by obtaining the first IP address corresponding to the network address in the short message;When note number pair
When answering the second IP address, determine whether first IP address matches with second IP address;If first IP address with
Second IP address is mismatched, and it is fraud text message to determine the short message;When note number does not correspond to the second IP address, obtain
Take the number for receiving the short message that network address corresponds to first IP address in the given time;Determine the acquisition in pre- timing
Whether the interior number for receiving the short message that network address corresponds to first IP address exceedes preset value;If receiving in the given time
When the number that network address corresponds to the short message of first IP address exceedes preset value, it is fraud text message to determine the short message.Due to
The embodiment of the present invention two is using network address and note number in short message, the first IP address corresponding to the network address in the short message
When being mismatched with the second IP address corresponding to the note number, it is fraud text message to determine the short message, can prevent that short message from cheating
Deceive.Meanwhile, the embodiment of the present invention two is non-public number in note number, and receive in the given time network address correspond to it is described
When the number of the short message of first IP address exceedes preset value, it is fraud text message to determine the short message, can prevent short message fraud.
Embodiment three
Fig. 3 is the schematic flow diagram for the fraud text message recognition methods that the embodiment of the present invention three is provided.Methods described is applied to
In terminal, the terminal can receive the device for the short message for including network address for mobile phone, flat board etc..As shown in figure 3, swindle
Short message recognition methods may include following steps:
S301:It is non-malicious network address that the network address in the short message is determined according to known malice network address database.
The known malice network address database includes the network address database of ALEX and domestic well-known security firm.It is described
Not only include malice network address in the malice network address database known, also including non-malicious network address.Wherein, when the network address in the short message
When being matched with the non-malicious network address in the known malice network address database, it is non-malicious net to determine the network address in the short message
Location.In the present embodiment, when the malice network address in the network address in the short message and the malice network address database is mismatched,
Can determine that the network address in the short message is non-malicious network address.But, when the network address in the short message and the malice website data
When malice network address in storehouse is matched, it is determined that the network address in the short message is malice network address.
S302:Obtain the first IP address corresponding to the network address in the short message.
Step S302 is consistent with step S101 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S101 associated description, herein without repeating.
S303:When note number the second IP address of correspondence, determine that first IP address is with second IP address
No matching.
Step S303 is consistent with step S102 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S102 associated description, herein without repeating.
S304:If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.
Step S304 is consistent with step S103 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S103 associated description, herein without repeating.
The embodiment of the present invention three according to known malice network address database by determining that the network address in the short message is disliked to be non-
Meaning network address;Obtain the first IP address corresponding to the network address in the short message;When note number the second IP address of correspondence, it is determined that
Whether first IP address matches with second IP address;If first IP address and second IP address are not
Match somebody with somebody, it is fraud text message to determine the short message.Because the embodiment of the present invention three is using the network address and note number in short message, described
When the first IP address corresponding to network address in short message is mismatched with the second IP address corresponding to the note number, institute is determined
Short message is stated for fraud text message, short message fraud can be prevented.Meanwhile, the embodiment of the present invention three is true by known malice network address database
When network address in the fixed short message is non-malicious network address, just determine first IP address and second IP address whether
Match somebody with somebody, so as to when can not be determined by known malice network address database the network address in the short message be malice network address when, can profit
Determine that short message is fraud text message, can prevent short message fraud with the network address and note number in short message.
Example IV
Fig. 4 is the schematic flow diagram for the fraud text message recognition methods that the embodiment of the present invention four is provided.Methods described is applied to
In terminal, the terminal can receive the device for the short message for including network address for mobile phone, flat board etc..As shown in figure 4, swindle
Short message recognition methods may include following steps:
S401:Obtain the first IP address corresponding to the network address in the short message.
Step S401 is consistent with step S101 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S101 associated description, herein without repeating.
S402:When note number the second IP address of correspondence, determine that first IP address is with second IP address
No matching.
Step S402 is consistent with step S102 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S102 associated description, herein without repeating.
S403:If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.
Step S403 is consistent with step S103 in embodiment one in the present embodiment, specifically refers to step in embodiment one
S103 associated description, herein without repeating.
S404:Obtain the first web page contents corresponding to the network address in the short message.
The network address is the address of webpage on internet.Enterprises and institutions or individual are by technical finesse, by some information
Stored in the way of page by page on the internet, every one first webpage has a corresponding network address, so as to other users visit inquiry
Obtain information material.Meanwhile, one first webpage of each network address correspondence.First webpage is a pure text for including html tag
This document.Word of first web page contents including the first webpage, the picture of the first webpage, the music of the first webpage, first
Program of the animation of webpage and the first webpage etc..
S405:Obtain the second web page contents corresponding to the note number.
Second web page contents obtained corresponding to the note number can be first to obtain corresponding to the note number
Second IP address, then obtain the second web page contents corresponding to second IP address.Each second IP address correspondence one second
Web page contents.Second webpage is a text-only file for including html tag.Second web page contents include second
The word of webpage, the picture of the second webpage, the music of the second webpage, program of the animation of the second webpage and the second webpage etc..
S406:Determine whether first web page contents match with second web page contents.
Whether first web page contents match word for first webpage, the first net with second web page contents
Picture, the music of the first webpage, program of the animation of the first webpage and the first webpage of page etc. whether respectively with second net
Word, the picture of the second webpage, the music of the second webpage, the program of the animation of the second webpage and the second webpage of page etc. are identical.
S407:If first web page contents are mismatched with second web page contents, it is short to swindle to verify the short message
Letter.
First web page contents are mismatched with second web page contents:The word of first web page contents,
At least one and institute in the picture of one webpage, the music of the first webpage, program of the animation of the first webpage and the first webpage etc.
State word, the picture of the second webpage, the music of the second webpage, the animation of the second webpage and the second webpage of the second web page contents
Corresponding one kind in program etc. is differed.For example, the music not phase of music and second webpage when first webpage
Meanwhile, determine that first web page contents are mismatched with second web page contents.The checking short message is fraud text message
To determine that the short message is fraud text message again.
Further, if first web page contents are matched with second web page contents, it is non-swindleness to verify the short message
Deceive short message.
First web page contents are matched with second web page contents:The word of first web page contents, first
The picture of webpage, the music of the first webpage, program of the animation of the first webpage and the first webpage etc. all with second webpage
The word of appearance, the picture of the second webpage, the music of the second webpage, the program of the animation of the second webpage and the second webpage etc. are identical.
The checking short message is that non-fraud text message is to determine that the short message is non-fraud text message.
The embodiment of the present invention four according to known malice network address database by determining that the network address in the short message is disliked to be non-
Meaning network address;Obtain the first IP address corresponding to the network address in the short message;When note number the second IP address of correspondence, it is determined that
Whether first IP address matches with second IP address;If first IP address and second IP address are not
Match somebody with somebody, it is fraud text message to determine the short message;Obtain the first web page contents corresponding to the network address in the short message;Obtain described short
The second web page contents corresponding to signal code;Determine whether first web page contents match with second web page contents;If
First web page contents are mismatched with second web page contents, and it is fraud text message to verify the short message.Due to of the invention real
Example four is applied using the network address and note number in short message, the first IP address corresponding to the network address in the short message with it is described short
When the second IP address corresponding to signal code is mismatched, it is fraud text message to determine the short message, can prevent short message fraud.Meanwhile,
The first web page contents corresponding to network address in the excessive short message of embodiment of the present invention four-way with corresponding to the note number
The second web page contents when mismatching, it is fraud text message to verify the short message, so as to further prevent short message fraud.
Above is the detailed description carried out to method provided by the present invention.According to different demands, in shown flow chart
The execution sequence of square can change, and some squares can be omitted, and the method that optimization aim is applied is also in above-mentioned optimization method
Selective is applied in combination, or is applied in combination with other above-mentioned NM optimization methods.Below to provided by the present invention
Device is described.
Embodiment five
As shown in figure 5, the present invention realizes the structural representation of the terminal of the preferred embodiment of fraud text message recognition methods.Institute
State fraud text message identifying device to be applied in terminal, the terminal be able to can receive for mobile phone, flat board etc. includes network address
The device of short message.The terminal 10 includes fraud text message identifying device 20.The terminal 10 also includes storage device 30, processing and set
Standby 40 and display device 50.
Preferably, fraud text message recognition methods of the invention by the fraud text message identifying device 20 in the terminal 10 come
Realize.
The terminal 10 be it is a kind of can be automatic to carry out numerical computations and/or letter according to the instruction for being previously set or storing
The equipment of processing is ceased, its hardware includes but is not limited to microprocessor, application specific integrated circuit (Application Specific
Integrated Circuit, ASIC), programmable gate array (Field-Programmable Gate Array, FPGA), number
Word processing device (Digital Signal Processor, DSP), embedded device etc..
The terminal 10, which may be, but not limited to, any one, to pass through keyboard, mouse, remote control, touch pad with user
Or the mode such as voice-operated device carries out the electronic product of man-machine interaction, for example, panel computer, smart mobile phone, personal digital assistant
(Personal Digital Assistant, PDA), game machine, intellectual Wearable etc..
Network residing for the terminal 10 includes, but are not limited to internet, wide area network, Metropolitan Area Network (MAN), LAN, virtual private
Network (Virtual Private Network, VPN) etc..
The fraud text message identifying device 20 can obtain the first IP address corresponding to the network address in the short message;Work as short message
During number the second IP address of correspondence, determine whether first IP address matches with second IP address;If the first IP
Address is mismatched with second IP address, and it is fraud text message to determine the short message, so as to prevent short message fraud.
The storage device 30 is used for the program code for storing each program segment in the fraud text message identifying device 20.Institute
It can be smart media card (smart media card), safe digital card (secure digital to state storage device 30
Card), the storage facilities such as flash memory cards (flash card).
The processing equipment 40 can include one or more microprocessor, digital processing unit.
The display device 50 can be touch-screen or display screen etc. other be used for display picture equipment.
Embodiment six
Fig. 6 is the schematic diagram for the fraud text message identifying device that the embodiment of the present invention six is provided.The fraud text message identification dress
Put applied in terminal, the terminal can show the terminal at the interface of interactive application for mobile phone, flat board etc..Such as Fig. 6 institutes
Show, the fraud text message identifying device 20 may include acquisition module 610, matching module 620 and determining module 630.Institute of the present invention
The module of title refers to that a kind of equipment that can be processed is performed and can complete the series of computation machine program segment of fixing function,
It is stored in storage device.
The acquisition module 610, for obtaining the first IP address corresponding to the network address in the short message.
The short message includes the network address, and the network address can be determined according to the short message.The network address includes agreement, domain
Name, path and filename, such as " agreement:// mandate/pathInquiry ".Corresponding to the network address obtained in the short message
First IP address is specially:Domain name is determined according to the network address, and according to domain name is from name server (DNS) or interconnects
Net acquisition first IP address corresponding with domain name such as service provider (ISP).ISP (ISP) bag
AFRI-NIC (African Network Information Centre), APNIC (asia pacific network information centre), ARIN is included (to note American Network address
Volume management tissue), LACNTC (Latin America and Internet address registration management organization of Caribbean area), RIPE-NIC (Europe
Network coordination center) etc..One first IP address of each domain name correspondence.
The matching module 620, for when note number the second IP address of correspondence, determining first IP address and institute
State whether the second IP address matches.
Every short message all corresponds to a SMS sender number, i.e. every short message all corresponds to a note number.When the short message number
When code is public number, the second IP address of the note number correspondence.The public number is the phone number of public service unit
Code, for example, the telephone number of China Mobile's customer service is 10086, the telephone number of the Industrial and Commercial Bank of China is 95588.It is each public
Service unit is all to that should have IP address.Wherein, the different IP address of different public service units correspondence.Each public service list
Member can correspond to one or more IP address.
The determining module 630, if being mismatched for first IP address and second IP address, is determined described short
Believe for fraud text message.
When the public service unit one IP address of correspondence, first IP address and second IP address are not
With being differed for first IP address with the IP address corresponding to the public service unit.When the public service unit pair
When answering multiple IP address, first IP address and second IP address mismatch for first IP address with it is described public
Any IP address corresponding to service unit is all differed.
Further, in order to further prevent user and other users short message fraud, the fraud text message identifying device
20 also include performing module 640.It is determined that the short message be fraud text message after, the performing module 640 be used for perform prompting use
Short message described in family is fraud text message, is uploaded to according to the SMS alarm, by the network address in malice network address database at least
One kind operation.
Short message described in the prompting user is that fraud text message can be by sound, word, image, vibrations, flash of light etc.
At least one is pointed out.Described can be that the short message is forwarded into the corresponding public service unit according to the SMS alarm
Corresponding telephone number, at least one directly dialed in 110 alarms etc. are alarmed.
Further, user uses short message for convenience, if the determining module 630 be additionally operable to first IP address with
During the second IP address matching, it is normal short message to determine the short message.
When the public service unit one IP address of correspondence, first IP address is matched with second IP address
It is identical with the IP address corresponding to the public service unit for first IP address.When public service unit correspondence is more
During individual IP address, first IP address is matched with second IP address as first IP address and the public service list
The IP address in multiple IP address corresponding to member is identical.
The embodiment of the present invention six is by obtaining the first IP address corresponding to the network address in the short message;When note number pair
When answering the second IP address, determine whether first IP address matches with second IP address;If first IP address with
Second IP address is mismatched, and it is fraud text message to determine the short message.Because the embodiment of the present invention six utilizes the net in short message
Location and note number, the first IP address corresponding to the network address in the short message and the 2nd IP corresponding to the note number
When address is mismatched, it is fraud text message to determine the short message, can prevent short message fraud.
Embodiment seven
Fig. 7 is the schematic diagram for the fraud text message identifying device that the embodiment of the present invention seven is provided.The fraud text message identification dress
Put applied in terminal, the terminal can show the terminal at the interface of interactive application for mobile phone, flat board etc..Such as Fig. 7 institutes
Show, the fraud text message identifying device 20 may include acquisition module 710, matching module 720, determining module 730 and judge module
740.Module alleged by the present invention refers to that a kind of equipment that can be processed is performed and can complete a series of of fixing function
Computer program code segments, it is stored in storage device.
The acquisition module 710, for obtaining the first IP address corresponding to the network address in the short message.
Acquisition module 710 described in the present embodiment is consistent with acquisition module 610 in embodiment six, specifically refers to embodiment
The associated description of acquisition module 610 in six, herein without repeating.
The matching module 720, for when note number the second IP address of correspondence, determining first IP address and institute
State whether the second IP address matches.
Matching module 720 described in the present embodiment is consistent with matching module 620 in embodiment six, specifically refers to embodiment
The associated description of matching module 620 in six, herein without repeating.
The determining module 730, if being mismatched for first IP address and second IP address, is determined described short
Believe for fraud text message.
Determining module 730 described in the present embodiment is consistent with determining module 630 in embodiment six, specifically refers to embodiment
The associated description of determining module 630 in six, herein without repeating.
The acquisition module 710, is additionally operable to, when note number does not correspond to the second IP address, obtain in the given time
Receive the number that network address corresponds to the short message of first IP address.
When the note number is non-public number, the note number does not correspond to the second IP address.The non-public affairs
Number includes the telephone number of enterprise customer and the telephone number of personal user etc. altogether.The scheduled time be pre-set when
Between, such as it is 5 seconds, 10 seconds or 20 seconds.The number for receiving the short message that network address corresponds to first IP address can be from
Operator or cloud data center etc. obtain.The operator or cloud data center etc. can provide receive network address correspond to it is described
The number of the short message of first IP address.The number for receiving the short message that network address corresponds to first IP address can also be by obtaining
Take and receive the number of the short message transmitted by the note number to obtain.It is described to receive short message transmitted by the note number
Number can be obtained from operator or cloud data center etc..The operator or cloud data center etc. may also provide receive it is described
The number of short message transmitted by note number.
The judge module 740, the network address that receives in the given time for determining the acquisition corresponds to described first
Whether the number of the short message of IP address exceedes preset value.
The preset value is the quantity pre-set, is such as 200,300,500 or 1000.The determination acquisition
Whether the number for receiving the short message that network address corresponds to first IP address in the given time can be by determining more than preset value
Whether the number for receiving the short message transmitted by the note number in the given time of the acquisition determines more than preset value.
The determining module 730, if corresponding to the short message of first IP address for receiving network address in the given time
Number exceed preset value when, determine the short message be fraud text message.
The number for receiving the short message that network address corresponds to first IP address in the given time can more than preset value
To receive the number of the short message transmitted by the note number in the given time more than preset value.Wherein, user is with terminal
During bulk SMS, the preset value is typically rarely exceeded, if the quantity of bulk SMS is too big, for example, the quantity of bulk SMS
For 1200, then this is clearly abnormal, now can determine that the short message is fraud text message.
The embodiment of the present invention seven is by obtaining the first IP address corresponding to the network address in the short message;When note number pair
When answering the second IP address, determine whether first IP address matches with second IP address;If first IP address with
Second IP address is mismatched, and it is fraud text message to determine the short message;When note number does not correspond to the second IP address, obtain
Take the number for receiving the short message that network address corresponds to first IP address in the given time;Determine the acquisition in pre- timing
Whether the interior number for receiving the short message that network address corresponds to first IP address exceedes preset value;If receiving in the given time
When the number that network address corresponds to the short message of first IP address exceedes preset value, it is fraud text message to determine the short message.Due to
The embodiment of the present invention seven is using network address and note number in short message, the first IP address corresponding to the network address in the short message
When being mismatched with the second IP address corresponding to the note number, it is fraud text message to determine the short message, can prevent that short message from cheating
Deceive.Meanwhile, the embodiment of the present invention seven is non-public number in note number, and receive in the given time network address correspond to it is described
When the number of the short message of first IP address exceedes preset value, it is fraud text message to determine the short message, can prevent short message fraud.
Embodiment eight
Fig. 8 is the schematic diagram for the fraud text message identifying device that the embodiment of the present invention eight is provided.The fraud text message identification dress
Put applied in terminal, the terminal can show the terminal at the interface of interactive application for mobile phone, flat board etc..Such as Fig. 8 institutes
Show, the fraud text message identifying device 20 may include acquisition module 810, matching module 820 and determining module 830.Institute of the present invention
The module of title refers to that a kind of equipment that can be processed is performed and can complete the series of computation machine program segment of fixing function,
It is stored in storage device.
The determining module 830, the network address for being determined according to known malice network address database in the short message is non-
Malice network address.
The known malice network address database includes the network address database of ALEX and domestic well-known security firm.It is described
Not only include malice network address in the malice network address database known, also including non-malicious network address.Wherein, when the network address in the short message
When being matched with the non-malicious network address in the known malice network address database, it is non-malicious net to determine the network address in the short message
Location.In the present embodiment, when the malice network address in the network address in the short message and the malice network address database is mismatched,
Can determine that the network address in the short message is non-malicious network address.But, when the network address in the short message and the malice website data
When malice network address in storehouse is matched, it is determined that the network address in the short message is malice network address.
The acquisition module 810, for obtaining the first IP address corresponding to the network address in the short message.
Acquisition module 810 described in the present embodiment is consistent with acquisition module 610 in embodiment six, specifically refers to embodiment
The associated description of acquisition module 610 in six, herein without repeating.
The matching module 820, for when note number the second IP address of correspondence, determining first IP address and institute
State whether the second IP address matches.
Matching module 820 described in the present embodiment is consistent with matching module 620 in embodiment six, specifically refers to embodiment
The associated description of matching module 620 in six, herein without repeating.
The determining module 830, if being mismatched for first IP address and second IP address, is determined described short
Believe for fraud text message.
Determining module 830 described in the present embodiment is consistent with determining module 630 in embodiment six, specifically refers to embodiment
The associated description of determining module 630 in six, herein without repeating.
The embodiment of the present invention eight according to known malice network address database by determining that the network address in the short message is disliked to be non-
Meaning network address;Obtain the first IP address corresponding to the network address in the short message;When note number the second IP address of correspondence, it is determined that
Whether first IP address matches with second IP address;If first IP address and second IP address are not
Match somebody with somebody, it is fraud text message to determine the short message.Because the embodiment of the present invention eight is using the network address and note number in short message, described
When the first IP address corresponding to network address in short message is mismatched with the second IP address corresponding to the note number, institute is determined
Short message is stated for fraud text message, short message fraud can be prevented.Meanwhile, the embodiment of the present invention eight is true by known malice network address database
When network address in the fixed short message is non-malicious network address, just determine first IP address and second IP address whether
Match somebody with somebody, so as to when can not be determined by known malice network address database the network address in the short message be malice network address when, can profit
Determine that short message is fraud text message, can prevent short message fraud with the network address and note number in short message.
Embodiment nine
Fig. 9 is the schematic diagram for the fraud text message identifying device that the embodiment of the present invention nine is provided.The fraud text message identification dress
Put applied in terminal, the terminal can show the terminal at the interface of interactive application for mobile phone, flat board etc..Such as Fig. 9 institutes
Show, the fraud text message identifying device 20 may include acquisition module 910, matching module 920, determining module 930 and authentication module
940.Module alleged by the present invention refers to that a kind of equipment that can be processed is performed and can complete a series of of fixing function
Computer program code segments, it is stored in storage device.
The acquisition module 910, for obtaining the first IP address corresponding to the network address in the short message.
Acquisition module 910 described in the present embodiment is consistent with acquisition module 610 in embodiment six, specifically refers to embodiment
The associated description of acquisition module 610 in six, herein without repeating.
The matching module 920, for when note number the second IP address of correspondence, determining first IP address and institute
State whether the second IP address matches.
Matching module 920 described in the present embodiment is consistent with matching module 620 in embodiment six, specifically refers to embodiment
The associated description of matching module 620 in six, herein without repeating.
The determining module 930, if being mismatched for first IP address and second IP address, is determined described short
Believe for fraud text message.
Determining module 930 described in the present embodiment is consistent with determining module 630 in embodiment six, specifically refers to embodiment
The associated description of determining module 630 in six, herein without repeating.
The acquisition module 910, is additionally operable to obtain the first web page contents corresponding to the network address in the short message.
The network address is the address of webpage on internet.Enterprises and institutions or individual are by technical finesse, by some information
Stored in the way of page by page on the internet, every one first webpage has a corresponding network address, so as to other users visit inquiry
Obtain information material.Meanwhile, one first webpage of each network address correspondence.First webpage is a pure text for including html tag
This document.Word of first web page contents including the first webpage, the picture of the first webpage, the music of the first webpage, first
Program of the animation of webpage and the first webpage etc..
The acquisition module 910, is additionally operable to obtain the second web page contents corresponding to the note number.
Second web page contents obtained corresponding to the note number can be first to obtain corresponding to the note number
Second IP address, then obtain the second web page contents corresponding to second IP address.Each second IP address correspondence one second
Web page contents.Second webpage is a text-only file for including html tag.Second web page contents include second
The word of webpage, the picture of the second webpage, the music of the second webpage, program of the animation of the second webpage and the second webpage etc..
The matching module 920, is additionally operable to determine whether first web page contents match with second web page contents.
Whether first web page contents match word for first webpage, the first net with second web page contents
Picture, the music of the first webpage, program of the animation of the first webpage and the first webpage of page etc. whether respectively with second net
Word, the picture of the second webpage, the music of the second webpage, the program of the animation of the second webpage and the second webpage of page etc. are identical.
The authentication module 940, if being mismatched for first web page contents and second web page contents, verifies institute
Short message is stated for fraud text message.
First web page contents are mismatched with second web page contents:The word of first web page contents,
At least one and institute in the picture of one webpage, the music of the first webpage, program of the animation of the first webpage and the first webpage etc.
State word, the picture of the second webpage, the music of the second webpage, the animation of the second webpage and the second webpage of the second web page contents
Corresponding one kind in program etc. is differed.For example, the music not phase of music and second webpage when first webpage
Meanwhile, determine that first web page contents are mismatched with second web page contents.The checking short message is fraud text message
To determine that the short message is fraud text message again.
Further, in order to normally use the SMS, if the authentication module 940 is additionally operable to first webpage
Content is matched with second web page contents, and it is non-fraud text message to verify the short message.
First web page contents are matched with second web page contents:The word of first web page contents, first
The picture of webpage, the music of the first webpage, program of the animation of the first webpage and the first webpage etc. all with second webpage
The word of appearance, the picture of the second webpage, the music of the second webpage, the program of the animation of the second webpage and the second webpage etc. are identical.
The checking short message is that non-fraud text message is to determine that the short message is non-fraud text message.
The embodiment of the present invention nine according to known malice network address database by determining that the network address in the short message is disliked to be non-
Meaning network address;Obtain the first IP address corresponding to the network address in the short message;When note number the second IP address of correspondence, it is determined that
Whether first IP address matches with second IP address;If first IP address and second IP address are not
Match somebody with somebody, it is fraud text message to determine the short message;Obtain the first web page contents corresponding to the network address in the short message;Obtain described short
The second web page contents corresponding to signal code;Determine whether first web page contents match with second web page contents;If
First web page contents are mismatched with second web page contents, and it is fraud text message to verify the short message.Due to of the invention real
Example nine is applied using the network address and note number in short message, the first IP address corresponding to the network address in the short message with it is described short
When the second IP address corresponding to signal code is mismatched, it is fraud text message to determine the short message, can prevent short message fraud.Meanwhile,
The embodiment of the present invention nine passes through when corresponding to the first web page contents corresponding to the network address in the short message and the note number
The second web page contents when mismatching, it is fraud text message to verify the short message, so as to further prevent short message fraud.
In several embodiments provided by the present invention, it should be understood that disclosed fraud text message recognition methods and dress
Put, can realize by another way.For example, the embodiment of fraud text message identifying device described above is only signal
Property, for example, the division of the module, only a kind of division of logic function, can there is other division side when actually realizing
Formula.
In addition, each functional module in each embodiment of the invention can be integrated in same treatment module, can also
That modules are individually physically present, can also two or more modules be integrated in equal modules.Above-mentioned integrated mould
Block can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of software function module to realize.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as to the claim involved by limitation.This
Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Unit or device can also be realized by same unit or device by software or hardware.
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention and it is unrestricted, although reference
The present invention is described in detail for preferred embodiment, it will be understood by those within the art that, can be to the present invention's
Technical scheme is modified or equivalent, without departing from the spirit and scope of technical solution of the present invention.
Claims (10)
1. a kind of fraud text message recognition methods, applied to terminal, the terminal receives the short message for including network address, and its feature exists
In methods described includes:
Obtain the first IP address corresponding to the network address in the short message;
When note number the second IP address of correspondence, determine whether first IP address matches with second IP address;
If first IP address is mismatched with second IP address, it is fraud text message to determine the short message.
2. fraud text message recognition methods as claimed in claim 1, it is characterised in that methods described also includes:
When note number does not correspond to the second IP address, acquisition receives network address with corresponding to the first IP in the given time
The number of the short message of location;
Determine whether the number for receiving the short message that network address corresponds to first IP address in the given time of the acquisition surpasses
Cross preset value;
If the number for receiving the short message that network address corresponds to first IP address in the given time exceedes preset value, institute is determined
Short message is stated for fraud text message.
3. fraud text message recognition methods as claimed in claim 1, it is characterised in that the network address in the acquisition short message
Also include before the first corresponding IP address:
It is non-malicious network address that the network address in the short message is determined according to known malice network address database.
4. fraud text message recognition methods as claimed in claim 1, it is characterised in that it is determined that the short message is fraud text message
Afterwards, methods described also includes:
Obtain the first web page contents corresponding to the network address in the short message;
Obtain the second web page contents corresponding to the note number;
Determine whether first web page contents match with second web page contents;
If first web page contents are mismatched with second web page contents, it is fraud text message to verify the short message.
5. fraud text message recognition methods as claimed in claim 1 or 2 or 3 or 4, it is characterised in that methods described also includes:
If first IP address is matched with second IP address, it is normal short message to determine the short message.
6. a kind of fraud text message identifying device, applied to terminal, the terminal receives the short message for including network address, and its feature exists
In described device includes:
Acquisition module, for obtaining the first IP address corresponding to the network address in the short message;
Matching module, for when note number the second IP address of correspondence, with determining first IP address and the 2nd IP
Whether location matches;
Determining module, if being mismatched for first IP address and second IP address, it is short to swindle to determine the short message
Letter.
7. fraud text message identifying device as claimed in claim 6, it is characterised in that described device also includes judge module:
The acquisition module, for when note number does not correspond to the second IP address, acquisition to receive network address in the given time
Correspond to the number of the short message of first IP address;
The judge module, the network address that receives in the given time for determining the acquisition corresponds to first IP address
Whether the number of short message exceedes preset value;
The determining module, if surpassing for the number for receiving the short message that network address corresponds to first IP address in the given time
When crossing preset value, it is fraud text message to determine the short message.
8. fraud text message identifying device as claimed in claim 6, it is characterised in that the network address in the acquisition short message
Before the first corresponding IP address:
The determining module, is additionally operable to determine that the network address in the short message is non-malicious net according to known malice network address database
Location.
9. fraud text message identifying device as claimed in claim 6, it is characterised in that described device also includes authentication module,
The determining module is used to determine the short message for after fraud text message:
The acquisition module, is additionally operable to obtain the first web page contents corresponding to the network address in the short message;
The acquisition module, is additionally operable to obtain the second web page contents corresponding to the note number;
The matching module, is additionally operable to determine whether first web page contents match with second web page contents;
The authentication module, mismatches with second web page contents if being additionally operable to first web page contents, verifies described short
Believe for fraud text message.
10. the fraud text message identifying device as described in claim 6 or 7 or 8 or 9, it is characterised in that:
The determining module, if be additionally operable to first IP address and matched with second IP address, determines that the short message is
Normal short message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710113791.2A CN106941673A (en) | 2017-02-28 | 2017-02-28 | Fraud text message recognition methods and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710113791.2A CN106941673A (en) | 2017-02-28 | 2017-02-28 | Fraud text message recognition methods and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106941673A true CN106941673A (en) | 2017-07-11 |
Family
ID=59469277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710113791.2A Withdrawn CN106941673A (en) | 2017-02-28 | 2017-02-28 | Fraud text message recognition methods and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106941673A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743698A (en) * | 2019-03-05 | 2019-05-10 | 中国联合网络通信集团有限公司 | Method for anti-counterfeit, gateway, user terminal, block chain based on block chain |
CN109802915A (en) * | 2017-11-16 | 2019-05-24 | 中国移动通信集团河南有限公司 | A kind of telecommunication fraud detection processing method and device |
CN113316153A (en) * | 2020-04-02 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220641A (en) * | 2012-01-19 | 2013-07-24 | 联想(北京)有限公司 | Information processing method and electronic terminal |
CN106028334A (en) * | 2016-04-28 | 2016-10-12 | 北京小米移动软件有限公司 | Method and device for identifying information and terminal |
CN106126707A (en) * | 2016-06-30 | 2016-11-16 | 北京奇虎科技有限公司 | Information identifying method and information recognition device |
-
2017
- 2017-02-28 CN CN201710113791.2A patent/CN106941673A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103220641A (en) * | 2012-01-19 | 2013-07-24 | 联想(北京)有限公司 | Information processing method and electronic terminal |
CN106028334A (en) * | 2016-04-28 | 2016-10-12 | 北京小米移动软件有限公司 | Method and device for identifying information and terminal |
CN106126707A (en) * | 2016-06-30 | 2016-11-16 | 北京奇虎科技有限公司 | Information identifying method and information recognition device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109802915A (en) * | 2017-11-16 | 2019-05-24 | 中国移动通信集团河南有限公司 | A kind of telecommunication fraud detection processing method and device |
CN109802915B (en) * | 2017-11-16 | 2021-06-11 | 中国移动通信集团河南有限公司 | Telecommunication fraud detection processing method and device |
CN109743698A (en) * | 2019-03-05 | 2019-05-10 | 中国联合网络通信集团有限公司 | Method for anti-counterfeit, gateway, user terminal, block chain based on block chain |
CN113316153A (en) * | 2020-04-02 | 2021-08-27 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
CN113316153B (en) * | 2020-04-02 | 2024-03-26 | 阿里巴巴集团控股有限公司 | Short message inspection method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103425736B (en) | A kind of web information recognition, Apparatus and system | |
CN106534572A (en) | Information display method and device and terminal | |
US8917939B2 (en) | Verifying vendor identification and organization affiliation of an individual arriving at a threshold location | |
CN106789089A (en) | A kind of method and system for managing certificate | |
WO2015136800A1 (en) | Authentication device, authentication system and authentication method | |
US11356451B2 (en) | Cube-based user interface for online community | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN109684786A (en) | A kind of copyright registration method, apparatus and terminal device based on block chain | |
WO2014145395A2 (en) | System and method for consumer fraud protection | |
TWI596556B (en) | A method and system for authenticating a user with service providers using a universal one time password | |
US11233897B1 (en) | Secure call center communications | |
CN106941673A (en) | Fraud text message recognition methods and device | |
CN110135854A (en) | Actual situation authentication circuit | |
CN106254626A (en) | A kind of incoming display method and terminal | |
US20190347441A1 (en) | Patient privacy de-identification in firewall switches forming VLAN segregation | |
CN107580000A (en) | Digital certificate authentication method and device | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN108289028A (en) | A kind of signature authentication method, relevant device and computer readable storage medium | |
US20100310061A1 (en) | Account number security system with communication system | |
CN113506108A (en) | Account management method, device, terminal and storage medium | |
CN107133245A (en) | Presence information management system, method and electronic equipment | |
Nagesh et al. | E-Voting System Using Blockchain Technology | |
CN102843371A (en) | Method and device for generating domain name based on real-name registration system | |
CN106936807A (en) | A kind of recognition methods of malicious operation and device | |
CN107704734A (en) | A kind of recognition methods of user account and its equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170711 |