CN106980778B - Information identification method and device and terminal equipment - Google Patents

Information identification method and device and terminal equipment Download PDF

Info

Publication number
CN106980778B
CN106980778B CN201710197789.8A CN201710197789A CN106980778B CN 106980778 B CN106980778 B CN 106980778B CN 201710197789 A CN201710197789 A CN 201710197789A CN 106980778 B CN106980778 B CN 106980778B
Authority
CN
China
Prior art keywords
information
authenticated
interface
authentication result
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710197789.8A
Other languages
Chinese (zh)
Other versions
CN106980778A (en
Inventor
韩超
李强
刘亚男
刘刚
韦祎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201710197789.8A priority Critical patent/CN106980778B/en
Publication of CN106980778A publication Critical patent/CN106980778A/en
Application granted granted Critical
Publication of CN106980778B publication Critical patent/CN106980778B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses an information identification method, an information identification device and terminal equipment. The method comprises the following steps: obtaining information to be authenticated from a user interface; obtaining a security authentication result of the information to be authenticated based on the type of the information to be authenticated; and displaying the security authentication result on a user interface. The embodiment of the invention provides an identification approach for the safety of various suspicious information for users, and can realize the identification of the safety of various information such as telephone numbers, qq numbers, bank card numbers, website links, WeChat and short message contents and the like by providing professional judgment for various information, thereby identifying information which can cause harm to the property safety of people, such as fraud calls, nuisance calls, advertisement promotion calls, fraud information, black websites, Trojan download links and the like contained in short messages, being beneficial to stopping the occurrence of telecommunication fraud and protecting the property safety of people.

Description

Information identification method and device and terminal equipment
Technical Field
The invention belongs to the technical field of computers, and particularly relates to an information identification method, an information identification device and terminal equipment.
Background
In recent years, with the rapid development of industries such as finance and communication, telecommunication fraud by means of communication tools such as mobile phones, fixed phones and networks and modern internet banking technology is gradually in a high situation, and great harm is brought to property safety of people. Especially, as the personal information leakage is increased, the means of telecommunication fraud is renewed, and the telecommunication fraud appears to be more targeted, for example: the house can receive the short message of decoration promotion just after buying, the baby can receive the call of the newborn subsidy just after the baby finishes the birth, lawless persons utilize professional telephone operation and accurate information about the identity of people, a vivid trap is set to lure people to work, and telecommunication fraud becomes more and more difficult to prevent.
The telecommunication fraud is frequently called by people, the reason is that people can not know the set route of the telecommunication fraud, the authenticity of various false numbers, fishing links, false information and the like is difficult to distinguish, and people generally lack the professional judgment capability for various received information.
Disclosure of Invention
The embodiment of the invention aims to solve the technical problem that: an information authentication method, an information authentication device and terminal equipment are provided, and authentication of various kinds of suspicious information security is provided for a user.
To solve the above technical problem, according to an aspect of an embodiment of the present invention, there is provided an information authentication method including:
obtaining information to be authenticated from a user interface;
obtaining a security authentication result of the information to be authenticated based on the type of the information to be authenticated;
and displaying the security authentication result on a user interface.
In another embodiment of the above method according to the present invention, the obtaining information to be authenticated from the user interface includes:
receiving an information authentication instruction based on the operation of a user;
and responding to the information authentication instruction, and acquiring the information to be authenticated from a user interface.
In another embodiment of the above method according to the present invention, the obtaining information to be authenticated from the user interface includes:
and acquiring information to be authenticated from a selection frame of the user interface.
In another embodiment of the above method according to the present invention, the obtaining information to be authenticated from the user interface includes:
and acquiring information to be authenticated from an input box specified by the user interface.
In another embodiment of the above method according to the present invention, the obtaining information to be authenticated from an input box specified by a user interface includes:
responding to the information identification instruction, and detecting whether an input box designated by a user interface is empty;
if the input box designated by the user interface is empty, popping up a reminding dialog box, and reminding a user to input information to be identified in the input box;
and if the input box designated by the user interface is not empty, acquiring the information to be authenticated from the input box.
In another embodiment of the above method according to the present invention, the obtaining a security authentication result of the information to be authenticated based on the type of the information to be authenticated includes:
detecting whether the information to be authenticated comprises a number;
if the information to be identified does not comprise numbers, a short message inquiry interface is requested to identify the information to be identified;
receiving a security identification result of the information to be identified, which is returned by the short message query interface;
if the information to be authenticated comprises numbers, a telephone marking interface is requested to authenticate the information to be authenticated;
and receiving a security authentication result of the information to be authenticated, which is returned by the telephone marking interface.
In another embodiment of the above method according to the present invention, after receiving a security authentication result of the information to be authenticated returned by the telephone marking interface, the method further includes:
detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
and if the security identification result of the information to be identified returned by the telephone marking interface is not received, requesting the short message inquiry interface to identify the information to be identified.
In another embodiment of the above method according to the present invention, the information to be authenticated includes: telephone number, qq number, bank card number, website link, short message and WeChat content.
In another embodiment of the above method according to the present invention, the security authentication result returned by the telephone marking interface is obtained by querying a number database with the authenticated telephone number.
In another embodiment based on the above method of the present invention, the security authentication result returned by the short message query interface is obtained based on intelligent identification of the authenticated content; wherein the identified content includes: qq number, bank card number, website link, short message and WeChat content.
In another embodiment of the above method according to the present invention, the displaying the security authentication result on the user interface includes:
generating an authentication result display card based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
and displaying the identification result display card on a user interface.
In another embodiment of the above method according to the present invention, the authentication result display card is displayed in a color corresponding to a security rating of the security authentication result, and the authentication result display card includes: the security authentication result and a graphic symbol corresponding to a security level of the security authentication result.
In another embodiment of the above method according to the present invention, the generating of the authentication result display card includes:
determining the security level of the security authentication result according to the security authentication result;
acquiring the color of an authentication result display card matched with the security grade and the graphic symbols in the authentication result display card based on the security grade of the security authentication result;
and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbol in the identification result display card.
In another embodiment of the foregoing method according to the present invention, the security authentication result returned by the phone mark interface includes: a type of label for the identified telephone number; the security identification result returned by the short message query interface comprises: a type of the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message and WeChat content.
In another embodiment of the foregoing method according to the present invention, the returning of the security authentication result by the phone mark interface further includes: the location of the identified telephone number and the number of times the identified telephone number is marked.
In another embodiment based on the above method of the present invention, the security authentication result returned by the short message query interface further includes: high risk information in the identified content.
In another embodiment of the foregoing method according to the present invention, the displaying the security authentication result on the user interface further includes:
generating an authentication book based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
the identification result display card is displayed on a user interface, specifically, the identification book is displayed on the user interface; wherein the certificate further comprises: and obtaining the information authenticated by the security authentication result.
In another embodiment of the above method according to the present invention, the certificate further comprises: a correction button, a report button, and/or a share button; the error correction button is used for sending a request for correcting the information which is wrongly identified in the identification book to an error correction interface based on the operation of a user; the report button is used for sending a request for reporting the identification information in the identification book to a report interface based on the operation of a user; the sharing button is used for publishing the identification book to a social platform based on the operation of a user.
According to another aspect of the embodiments of the present invention, there is provided an information authentication apparatus including:
an acquisition unit configured to acquire information to be authenticated from a user interface;
the processing unit is used for obtaining a safety authentication result of the information to be authenticated based on the type of the information to be authenticated;
and the display unit is used for displaying the safety identification result on a user interface.
In another embodiment of the above apparatus according to the present invention, the obtaining unit includes:
the instruction receiving module is used for receiving an information identification instruction based on the operation of a user;
and the information acquisition module is used for responding to the information identification instruction and acquiring the information to be identified from the user interface.
In another embodiment of the above apparatus according to the present invention, the information obtaining module is specifically configured to obtain the information to be authenticated from a selection box of the user interface.
In another embodiment of the above apparatus according to the present invention, the information obtaining module is specifically configured to obtain the information to be authenticated from an input box specified by the user interface.
In another embodiment of the above apparatus according to the present invention, the obtaining of the information to be authenticated from the input box specified by the user interface is specifically configured to:
responding to the information identification instruction, and detecting whether an input box designated by a user interface is empty;
if the input box designated by the user interface is empty, popping up a reminding dialog box, and reminding a user to input information to be identified in the input box;
and if the input box designated by the user interface is not empty, acquiring the information to be authenticated from the input box.
In another embodiment of the above apparatus according to the present invention, the processing unit includes:
the first detection module is used for detecting whether the information to be authenticated comprises numbers;
the first request module is used for responding to the fact that the information to be identified does not comprise numbers according to the detection result of the first detection module and requesting a short message inquiry interface to identify the information to be identified;
the first receiving module is used for receiving a security identification result of the information to be identified, which is returned by the short message query interface;
the second request module is used for responding to the information to be authenticated and including numbers according to the detection result of the first detection module, and requesting a telephone marking interface to authenticate the information to be authenticated;
and the second receiving module is used for receiving the security authentication result of the information to be authenticated, which is returned by the telephone marking interface.
In another embodiment of the above apparatus according to the present invention, the processing unit further includes:
the second detection module is used for detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
the first request module is further configured to request the short message query interface to authenticate the information to be authenticated in response to not receiving a security authentication result of the information to be authenticated, where the security authentication result is returned by the telephone tag interface according to a detection result of the second detection module.
In another embodiment of the above apparatus according to the present invention, the information to be authenticated includes: telephone number, qq number, bank card number, website link, short message and WeChat content.
In another embodiment of the above apparatus according to the present invention, the security authentication result returned by the telephone marking interface is obtained by querying a number database with the authenticated telephone number.
In another embodiment of the above device according to the present invention, the security authentication result returned by the short message query interface is obtained based on intelligent identification of the authenticated content; wherein the identified content includes: qq number, bank card number, website link, short message and WeChat content.
In another embodiment of the above apparatus according to the present invention, the display unit includes:
the first generation module is used for generating an identification result display card based on the security identification result returned by the telephone marking interface or the short message inquiry interface;
and the display module is used for displaying the identification result display card on a user interface.
In another embodiment of the above apparatus according to the present invention, the authentication result display card is displayed in a color corresponding to a security rating of the security authentication result, and the authentication result display card includes: the security authentication result and a graphic symbol corresponding to a security level of the security authentication result.
In another embodiment of the above apparatus according to the present invention, the first generating module is specifically configured to:
determining the security level of the security authentication result according to the security authentication result;
acquiring the color of an authentication result display card matched with the security grade and the graphic symbols in the authentication result display card based on the security grade of the security authentication result;
and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbol in the identification result display card.
In another embodiment of the above apparatus according to the present invention, the security authentication result returned by the phone mark interface includes: a type of label for the identified telephone number; the security identification result returned by the short message query interface comprises: a type of the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message and WeChat content.
In another embodiment of the above apparatus according to the present invention, the information returned by the telephone mark interface further includes: the location of the identified telephone number and the number of times the identified telephone number is marked.
In another embodiment of the above apparatus based on the present invention, the information returned by the short message query interface further includes: high risk information in the identified content.
In another embodiment of the above apparatus according to the present invention, the display unit further includes:
the second generation module is used for generating an authentication book based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
the display module is specifically used for displaying the identification book on a user interface; wherein the certificate further comprises: and obtaining the information authenticated by the security authentication result.
In another embodiment of the above apparatus according to the present invention, the certificate further comprises: a correction button, a report button, and/or a share button; the error correction button is used for sending a request for correcting the information which is wrongly identified in the identification book to an error correction interface based on the operation of a user; the report button is used for sending a request for reporting the identification information in the identification book to a report interface based on the operation of a user; the sharing button is used for publishing the identification book to a social platform based on the operation of a user.
According to still another aspect of the embodiments of the present invention, there is provided a terminal device, including: a processor and a memory; wherein the content of the first and second substances,
the memory is used for storing the program of the information identification method of any one of the above embodiments;
the processor is configured to execute the program of the information authentication method stored in the memory.
Based on the information authentication method, device and terminal device provided by the above embodiments of the present invention, the security authentication result of the information to be authenticated is obtained based on the type of the information to be authenticated by obtaining the information to be authenticated from the user interface, the safety identification result is displayed on the user interface, an identification way for the safety of various suspicious information is provided for the user, professional judgment is provided for various information, can realize the identification of the safety of various information such as telephone numbers, qq numbers, bank card numbers, website links, WeChat and short message contents and the like, therefore, the information which is possibly harmful to the property safety of people, such as fraud calls, harassing calls, advertising promotion calls, fraud information, black websites, Trojan download links and the like contained in the short messages can be identified, the occurrence of telecommunication fraud is favorably stopped, and the property safety of people is protected.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention.
The invention will be more clearly understood from the following detailed description, taken with reference to the accompanying drawings, in which:
fig. 1 is a flowchart of an embodiment of an information authentication method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another embodiment of an information authentication method according to an embodiment of the present invention.
Fig. 3A to 3D are schematic diagrams illustrating a security authentication result displayed on a user interface by the information authentication method according to the embodiment of the present invention.
Fig. 4A is a schematic diagram illustrating sharing of an authentication book to a WeChat by an information authentication method according to an embodiment of the invention.
Fig. 4B is a schematic diagram illustrating sharing of an authenticator to a microblog by the information authentication method according to the embodiment of the invention.
Fig. 5 is a block diagram of an embodiment of an information authentication apparatus according to an embodiment of the present invention.
Fig. 6 is a block diagram of another embodiment of an information authentication apparatus according to an embodiment of the present invention.
Fig. 7 is a block diagram of a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present invention.
Detailed Description
Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective portions shown in the drawings are not drawn in an actual proportional relationship for the convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
Fig. 1 is a flowchart of an embodiment of an information authentication method according to an embodiment of the present invention. As shown in fig. 1, the method of this embodiment includes:
s102, obtaining information to be authenticated from a user interface.
In a specific implementation, operation S102 may be to receive an information authentication instruction based on an operation of a user, and obtain information to be authenticated from a user interface in response to the information authentication instruction. The operation of the user may be to click an information identification button on the user interface, or to click an information identification option in the pop-up menu. The information to be authenticated is obtained from the user interface, and the information to be authenticated can be obtained from a selection frame of the user interface or can be obtained from an input frame designated by the user interface.
Specifically, when the operation S102 is to acquire information to be authenticated from an input box specified by the user interface, first, in response to an information authentication instruction, it is detected whether the input box specified by the user interface is empty, and if the input box specified by the user interface is empty, a prompt dialog box pops up to prompt the user to input the information to be authenticated in the input box, for example, the content of the prompt dialog box is "authentication content cannot be empty, please re-input", and if the input box specified by the user interface is not empty, the information to be authenticated is acquired from the input box.
And S104, obtaining a safety identification result of the information to be identified based on the type of the information to be identified.
The information to be authenticated may include: telephone number, qq number, bank card number, website link, short message, WeChat content and the like.
In a specific implementation, operation S104 may classify all information to be authenticated into two categories, namely, a telephone number and a non-telephone number; the information to be identified is identified by the request telephone marking interface for the information to be identified of the telephone number class, and the information to be identified is identified by the request short message inquiry interface for the information to be identified of the non-telephone number class, wherein the information to be identified of the non-telephone number class can comprise: qq number, bank card number, website link, short message, WeChat content and the like.
Specifically, for information to be identified in a telephone number category, a security identification result may be obtained by querying the number database with the identified telephone number, and for information to be identified in a non-telephone number category, a security identification result may be obtained based on intelligent identification of the identified content.
And S106, displaying the safety identification result on the user interface.
In a specific implementation, operation S106 may generate an authentication result display card based on the security authentication result, and display the obtained security authentication result by displaying the authentication result display card on the user interface.
Further, the authentication result display card may display a color corresponding to the security level of the security authentication result, and the authentication result display card may include a graphic symbol corresponding to the security level of the security authentication result in addition to the security authentication result, so as to more intuitively indicate the security degree of the authenticated information using the color and/or the graphic symbol.
For example, the security level of the security authentication result may include: the identification results corresponding to the three security levels show that the card has red, orange and green colors, the figure symbols corresponding to the security levels with higher and lower risks are exclamation marks in a triangle, and the figure symbols corresponding to the security levels with no risk are opposite marks in a circle.
Based on the information identification method provided by the embodiment of the invention, the information to be identified is obtained from the user interface, the safety identification result of the information to be identified is obtained based on the type of the information to be identified, the safety identification result is displayed on the user interface, an identification way for the safety of various suspicious information is provided for users, and the safety of various information such as telephone numbers, qq numbers, bank card numbers, website links, micro messages, short message contents and the like can be identified by providing professional judgment for various information, so that information which is possibly harmful to the property safety of people, such as fraud calls, harassing calls, advertising promotion calls, fraud information, black websites, Trojan download links and the like contained in short messages, is identified, the occurrence of telecommunication fraud is avoided, and the property safety of people is protected.
Fig. 2 is a flowchart of another embodiment of an information authentication method according to an embodiment of the present invention. As shown in fig. 2, the method of this embodiment includes:
s202, obtaining information to be authenticated from a user interface.
S204, detecting whether the information to be authenticated comprises numbers.
If the information to be authenticated does not include a number, performing operation S206; otherwise, if the information to be authenticated includes a number, operation S208 is performed.
S206, the short message query interface is requested to identify the information to be identified.
S210, receiving a security identification result of the information to be identified, which is returned by the short message query interface.
And S208, requesting the telephone marking interface to identify the information to be identified.
S212, receiving a security authentication result of the information to be authenticated returned by the telephone marking interface.
S214, whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not is detected.
If the security authentication result of the information to be authenticated returned by the telephone tag interface is not received, executing operation S206; otherwise, if the security authentication result of the information to be authenticated returned by the phone tag interface is received, operation S216 is performed.
S216, displaying the safety identification result on the user interface.
The information to be authenticated may include: telephone number, qq number, bank card number, website link, short message, WeChat content and the like.
In a specific implementation, when the operation S204 detects that the information to be identified only includes characters or letters, for example, the information to be identified is a website link, a short message or a WeChat content, etc., the operation S206 directly requests the short message query interface to identify the information to be identified; when operation S204 detects that the information to be authenticated includes both characters or letters and numbers, or the information to be authenticated includes only numbers, for example, the information to be authenticated is a short message or a WeChat content, but includes a phone number, a qq number or a bank card number, or the information to be authenticated is only a phone number, a qq number or a bank card number, first, the phone mark interface is requested to authenticate the information to be authenticated through operation S208, because the phone mark interface returns a security authentication result only when the information to be authenticated is only a phone number, the phone mark interface does not return a security authentication result for the remaining information to be authenticated except for this situation, and then, the short message query interface is requested to authenticate the information to be authenticated through operation S206.
Specifically, the security authentication result returned by the telephone marking interface can be obtained by querying a number database by the authenticated telephone number, for example, by querying a number database of 360 guard tens of millions; the security identification result returned by the short message query interface can be obtained based on intelligent identification of the identified content, and the identified content comprises: qq number, bank card number, website link, short message and wechat content, etc., for example, by establishing an intelligent identification model, the identified content is obtained by intelligent identification.
The method comprises the steps of obtaining a word segmentation device by utilizing a latest conditional random field algorithm in a word segmentation algorithm in combination with a natural language processing algorithm for intelligent identification of short message contents, carrying out word segmentation on the short message contents and collected linguistic data through the word segmentation device, obtaining a word bag model vector related to the short message contents after word segmentation, simultaneously obtaining a subject vector to which the short message contents belong through a semantic subject generation model (L event Dirichlet Allocation, L DA for short), combining a traditional word bag model vector with the subject vector to generate a new feature vector, inputting the generated new feature vector into a classification model, and obtaining the type of the short message contents.
For example, if a topic matrix of the L DA model is a matrix T1 of 10 × 100, if the short message content contains 10 participles, m1 to m10 respectively represent vectors of topic probabilities to which the 10 participles belong, and m1, m2, and m10 are added and then multiplied by a topic matrix T1 to obtain a topic vector of the short message content, that is, the topic vector of the short message content is (m1+ m2+ … m10) T2.
For the intelligent identification of short message contents including numbers, UR L and the like, a mode based on combination of fingerprints and malicious features can be adopted, key features of numbers, UR L and the like in the short message contents are firstly extracted, meanwhile, a fingerprint is calculated for a text of the short message contents, then, the calculated fingerprint is compared with the fingerprint recorded in a fingerprint library, if related fingerprints are recorded in the fingerprint library, a corresponding judgment result is obtained, then, the digital features are identified by using a model established by the features of distribution, time, quantity and the like of objects sent and received by short messages, a corresponding judgment result is obtained, then, other suspicious features of the short messages, such as the features of change of a short message access base station and the like, are brought into the model for prediction, and finally, the judgment on the type of the short message contents is obtained.
For UR L characteristics, a big data technology can be used for identification, UR L is effectively captured by analyzing Host characteristics, UR L jump characteristics and the like and servers distributed at the inner and outer sides, UR L captured is further analyzed by page content characteristics, code characteristics and image characteristics in a page, so that whether the website pointed by the UR L is a phishing website is judged, for APK downloading, APK is downloaded and then is checked and killed by different checking and killing engines, if the engines give an alarm, whether the APK has a virus is directly judged, if the engines cannot be guided into a sandbox for operation, the APK is identified according to behavior characteristics of APK operation and an existing judgment model, if the deeper virus is hidden, static analysis can be carried out through technologies such as decompilation and the like, so that whether the APK has a problem is judged, PB-level UR L request data, suspicious UR L site data and related analysis data can be reserved by cloud storage and cloud computing, UR L request data of suspicious UR L and related analysis data can be conveniently tracked by establishing a multi-level UR L and UR 493 chains.
In a specific example, the security authentication result returned by the telephone tagging interface received in operation S212 is a tagging type of the identified telephone number, and the security authentication result returned by the short message query interface received in operation S210 is a type of the identified content, where the identified content includes: qq number, bank card number, website link, short message and wechat content, etc., operation S216 first generates an authentication result display card based on the security authentication result returned by the phone number tagging interface or the short message query interface, that is, the tag type of the authenticated phone number or the type of the authenticated content, and then displays the obtained security authentication result by displaying the authentication result display card on the user interface.
Further, the authentication result display card may display a color corresponding to a security level of the security authentication result, specifically, a color corresponding to a security level of a tag type of the authenticated phone number or a type of the authenticated content, and may include a graphic symbol corresponding to the security level of the security authentication result in addition to the tag type of the authenticated phone number or the type of the authenticated content. Therefore, the process of generating the authentication result display card in operation S216 further includes: determining the security level of the security identification result according to the security identification result returned by the telephone marking interface or the short message inquiry interface, namely the marking type of the identified telephone number or the type of the identified content; acquiring the color of the identification result display card matched with the security grade and the graphic symbol in the identification result display card based on the security grade of the security identification result; and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbols in the identification result display card.
In another specific example, the security authentication result returned by the phone badge interface received in operation S212 includes: a tag type of the identified phone number, a home of the identified phone number, and a number of times the identified phone number is tagged; the security authentication result returned by the short message query interface received in operation S210 includes: the type of content identified and high risk information in the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message, WeChat content and the like; operation S216 is to first generate an authenticator based on the security authentication result returned from the phone mark interface or the short message query interface, and then display the acquired security authentication result by displaying the authenticator on the user interface, where the authenticator further includes: information authenticated by the security authentication result, i.e., the authenticated phone number or the authenticated content is obtained.
Further, the certificate may further include: and an authentication result display card which displays a color corresponding to a security level of the security authentication result, specifically, a security level of a tag type of the authenticated phone number or a type of the authenticated content as the security level of the security authentication result, and which includes a graphic symbol corresponding to the security level of the security authentication result in addition to the tag type of the authenticated phone number or the type of the authenticated content. At this time, operation S216 may include: generating an identification result display card based on the identification type of the identified telephone number returned by the telephone identification interface or the type of the identified content returned by the short message inquiry interface; generating an authentication book based on the authentication result display card, and other information in the security authentication result except for the tag type of the authenticated telephone number or the type of the authenticated content, and the information authenticated by obtaining the security authentication result, i.e., the authenticated telephone number or the authenticated content; the authentication book is displayed on the user interface. The correspondence between the type of the identified phone number label and the security level and the color of the identification result display card is shown in table 1, and the correspondence between the type of the identified content and the high-risk information in the identified content is shown in table 2.
TABLE 1
Type (B) Colour(s) Level of security
Suspected fraud Red wine High risk
Harassing call Red wine High risk
Advertising promotion Red wine High risk
Fraud on absorbing fee Red wine High risk
Illegal crime Red wine High risk
Fraud telephone Red wine High risk
Express delivery Orange Low risk
House property agency Orange Low risk
Insurance financing Orange Low risk
Recruitment hunting head Orange Low risk
Taxi Orange Low risk
Customer service telephone Orange Low risk
Make a sound Orange Low risk
Education training Orange Danger ofIs lower than
Enterprise telephone Green Without danger
TABLE 2
High risk information Type (B)
Agent service Suspected pseudo base station
Gambling machine Suspected pseudo base station
Invoicing Suspected pseudo base station
Illegal sensitivity (anti-common law wheel work) Suspected pseudo base station
Pornography Suspected pseudo base station
Stock recommendation Suspected pseudo base station
Cash loan Suspected pseudo base station
Fraud telephone Suspected fraud
Fraud card number Suspected fraud
False shopping Suspected fraud
Credit card fraud Suspected fraud
Payment fraud Suspected fraud
Fair-time fraud Suspected fraud
Active fraud Suspected fraud
As shown in fig. 3A to 3D, fig. 3A to 3D are schematic diagrams illustrating a security authentication result displayed on a user interface by the information authentication method according to the embodiment of the present invention. In fig. 3A, the identified type of the phone number is a fraud phone, the fraud phone has a high security level, the corresponding identification result shows that the card has a red color, and the corresponding graphical symbol in the identification result shows that the card is an exclamation mark located in a triangle; in fig. 3B, the type of the identified tag of the phone number is financial, the security level of financial is low, the corresponding identification result shows that the card is orange in color, and the corresponding identification result shows that the graphic symbol in the card is an exclamation mark located in a triangle; in fig. 3C, the type of the identified phone number is shunfeng express, the security level of shunfeng express is no danger, the color of the corresponding identification result display card is green, and the graphic symbol in the corresponding identification result display card is a number located in a circle; in fig. 3D, the type of the identified short message content is suspected fraud, the security level of the suspected fraud is high, the color of the corresponding identification result display card is red, and the corresponding graphical symbol in the identification result display card is an exclamation mark located in a triangle.
Further, the certificate may further include: suggestive words, as shown in fig. 3A to 3D, in addition to the mark type of the identified telephone number or the type of the identified content and the graphic symbol, the identification result display card further includes suggestive words "dangerous, cautious, low dangerous, nuisance call" and "dangerous, cautious", wherein the suggestive words can be obtained based on the security level of the security identification result to further clarify the security degree of the identified information by the suggestive words. For example: in fig. 3A and 3D, the security level of the fraudulent phone call and the suspected fraud is high in risk, so the corresponding suggestive terms are "high in risk, cautious connection" and "high in risk, cautious disposal", respectively; in fig. 3B, the security level of financial management is low risk, and therefore the corresponding suggestive terms are "low risk, harassing call" respectively; in fig. 3C, the safety level of the soft express is no danger, and therefore suggestive wording can be set.
Further, the certificate may further include: the enterprise yellow page information can be contained in the security identification result returned by the telephone marking interface or the short message inquiry interface and is obtained from the security identification result.
Further, the certificate may further include: a correction button, a report button, and/or a share button; the error correction button can provide a request for correcting the information which is wrongly identified in the identification book to the error correction interface based on the operation of a user; a report button capable of making a request for reporting the authentication information in the authentication book to a report interface based on the operation of the user; and a sharing button can be used for publishing the certificate to the social platform based on the operation of the user.
Specifically, as shown in fig. 3A to 3D, a user may pop up a reminding dialog box by clicking a "i want to correct" button, where the content in the reminding dialog box may be "if the authentication result is wrong, please click 'confirm', we will verify as soon as possible", and the user may upload the authenticated information to the error correction interface by clicking the confirm button in the reminding dialog box; the user may pop up a reminder dialog by clicking the "i want to report" button, and the content in the reminder dialog may be "confirm that the content is suspected of being fraudulent and submit it to the 360 fraud reporting library? "the user can upload the identified information through the upload report interface by clicking the confirmation button in the reminding dialog box; a user can pop up a WeChat and/or microblog icon by clicking a 'tell friend' button, and the user can share an authentication book to WeChat or microblog by clicking the WeChat or microblog icon, as shown in fig. 4A and 4B, fig. 4A is a schematic diagram of an information authentication method according to an embodiment of the present invention sharing the authentication book to WeChat, and fig. 4B is a schematic diagram of an information authentication method according to an embodiment of the present invention sharing the authentication book to microblog.
The specific code implementation is as follows:
MobileSafeJsInterface.setTitleBar('{
title: "fraud certificate",
menu [ { id: "-100', text:" share ", showType:"1", actionInfo:"
{weixin:{
title: "you received a fraud certificate",
desc? Suspicious phone, short message, WeChat, bank card, website, 360 mobile phone guard help you one-key identify broken! ",
link:"",
type:"0",
img_url:""},
WeChat downloads url: http:// pop. shouji.360.cn/weishi/qing.0/index. html? Zpjd
weibo: { desc: "# fraud identification # telecom fraud indistinguishable? 360 mobile phone guard helps you to make a decision, such as suspicious phone, short message, WeChat, bank card, website, and one-key identification! Downloading 360 mobile phone guards, identifying fraud information by standing horses: http:// tu.360.cn/b84fs ",
type:"0",
img_url:""}}"}]
fig. 5 is a block diagram of an embodiment of an information authentication apparatus according to an embodiment of the present invention. As shown in fig. 5, the information authentication apparatus of this embodiment includes: an acquisition unit 510, a processing unit 520 and a display unit 530. Wherein the content of the first and second substances,
an obtaining unit 510 for obtaining information to be authenticated from a user interface.
In a specific implementation, the obtaining unit 510 may include: the system comprises an instruction receiving module and an information acquiring module, wherein the instruction receiving module is used for receiving an information identification instruction based on the operation of a user, and the information acquiring module is used for responding to the information identification instruction and acquiring information to be identified from a user interface. The operation of the user may be to click an information identification button on the user interface, or to click an information identification option in the pop-up menu. The information obtaining module may obtain the information to be authenticated from a selection box of the user interface, or may obtain the information to be authenticated from an input box specified by the user interface.
Specifically, when the obtaining unit 510 obtains information to be authenticated from an input box specified by a user interface, it first detects whether the input box specified by the user interface is empty in response to an information authentication instruction, and if the input box specified by the user interface is empty, pops up a reminding dialog box to remind the user to input the information to be authenticated in the input box, for example, to remind the user that the content of the dialog box is "authentication content cannot be empty, please re-input", and if the input box specified by the user interface is not empty, obtains the information to be authenticated from the input box.
A processing unit 520, configured to obtain a security authentication result of the information to be authenticated based on the type of the information to be authenticated.
The information to be authenticated may include: telephone number, qq number, bank card number, website link, short message, WeChat content and the like.
In a specific implementation, the processing unit 520 may divide all information to be identified into two categories, namely, a telephone number and a non-telephone number; the information to be identified is identified by the request telephone marking interface for the information to be identified of the telephone number class, and the information to be identified is identified by the request short message inquiry interface for the information to be identified of the non-telephone number class, wherein the information to be identified of the non-telephone number class can comprise: qq number, bank card number, website link, short message, WeChat content and the like.
Specifically, for information to be identified in a telephone number category, a security identification result may be obtained by querying the number database with the identified telephone number, and for information to be identified in a non-telephone number category, a security identification result may be obtained based on intelligent identification of the identified content.
A display unit 530 for displaying the security authentication result on the user interface.
In a specific implementation, the display unit 530 may generate an authentication result display card based on the security authentication result, and display the obtained security authentication result by displaying the authentication result display card on the user interface.
Further, the authentication result display card may display a color corresponding to the security level of the security authentication result, and the authentication result display card may include a graphic symbol corresponding to the security level of the security authentication result in addition to the security authentication result, so as to more intuitively indicate the security degree of the authenticated information using the color and/or the graphic symbol.
For example, the security level of the security authentication result may include: the identification results corresponding to the three security levels show that the card has red, orange and green colors, the figure symbols corresponding to the security levels with higher and lower risks are exclamation marks in a triangle, and the figure symbols corresponding to the security levels with no risk are opposite marks in a circle.
Based on the information identification device provided by the embodiment of the invention, the information to be identified is obtained from the user interface, the safety identification result of the information to be identified is obtained based on the type of the information to be identified, the safety identification result is displayed on the user interface, an identification way for the safety of various suspicious information is provided for users, and the safety of various information such as telephone numbers, qq numbers, bank card numbers, website links, micro messages, short message contents and the like can be identified by providing professional judgment for various information, so that information which is possibly harmful to the property safety of people, such as fraud calls, harassing calls, advertising promotion calls, fraud information, black websites, Trojan download links and the like contained in short messages, is identified, the occurrence of telecommunication fraud is avoided, and the property safety of people is protected.
Fig. 6 is a block diagram of another embodiment of an information authentication apparatus according to an embodiment of the present invention. As shown in fig. 6, compared to the embodiment of fig. 5, in this embodiment, the processing unit 620 further includes: a first detection module 621, a first request module 622, a first receiving module 623, a second request module 624, a second receiving module 625, and a second detection module 626. Wherein the content of the first and second substances,
the first detecting module 621 is configured to detect whether the information to be authenticated includes a number.
The first request module 622 is configured to, according to the detection result of the first detection module 621, request the short message query interface to identify the information to be identified in response to that the information to be identified does not include a number.
The first receiving module 623 is configured to receive a security authentication result of the information to be authenticated, which is returned by the short message query interface.
And the second requesting module 624 is configured to, according to the detection result of the first detecting module 621, request the phone tag interface to authenticate the information to be authenticated in response to that the information to be authenticated includes a number.
The second receiving module 625 is configured to receive a security authentication result of the information to be authenticated, which is returned by the phone label interface.
The second detecting module 626 is configured to detect whether a security authentication result of the information to be authenticated returned by the phone label interface is received.
The first request module 622 is further configured to request the short message query interface to authenticate the information to be authenticated according to the detection result of the second detection module 625, in response to not receiving the security authentication result of the information to be authenticated, which is returned by the telephone tag interface.
The information to be authenticated may include: telephone number, qq number, bank card number, website link, short message, WeChat content and the like.
In a specific implementation, when the first detection module 621 detects that the information to be authenticated only includes characters or letters, for example, the information to be authenticated is a website link, a short message or a WeChat content, and the like, the first request module 622 directly requests the short message query interface to authenticate the information to be authenticated; when the first detecting module 621 detects that the information to be authenticated includes both characters or letters and numbers, or the information to be authenticated includes only numbers, for example, the information to be authenticated is a short message or a WeChat content, but includes a phone number, a qq number or a bank card number, or the information to be authenticated is only a phone number, a qq number or a bank card number, the second requesting module 624 first requests the phone label interface to authenticate the information to be authenticated, because only when the information to be authenticated is only a phone number, the second receiving module 625 receives the phone label interface to return a security authentication result, for the remaining information to be authenticated except for this situation, the second receiving module 625 does not receive the phone label interface to return a security authentication result, and at this time, the first requesting module 622 needs to request the short message query interface to authenticate the information to be authenticated.
The display unit 630 further includes: a first generation module 631 and a display module 632. Wherein the content of the first and second substances,
the first generating module 631 is configured to generate an authentication result display card based on the security authentication result returned by the telephone label interface or the short message query interface.
And a display module 632, configured to display the authentication result display card on the user interface.
Further, the authentication result display card may display a color corresponding to the security level of the security authentication result, and the authentication result display card may include a graphic symbol corresponding to the security level of the security authentication result in addition to the security authentication result. Therefore, the first generating module 631 is specifically configured to: determining the safety level of the safety identification result according to the safety identification result returned by the telephone marking interface or the short message inquiry interface; acquiring the color of the identification result display card matched with the security grade and the graphic symbol in the identification result display card based on the security grade of the security identification result; and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbols in the identification result display card.
Further, the display unit 630 further includes: a second generating module 633, wherein the second generating module 633 is configured to generate an authenticator based on a security authentication result returned by the phone mark interface or the short message query interface, and the authenticator further includes: information authenticated by the security authentication result is obtained.
At this time, the security authentication result returned by the telephone label interface comprises: a tag type of the identified phone number, a home of the identified phone number, and a number of times the identified phone number is tagged; the safety identification result returned by the short message query interface comprises the following steps: the type of content identified and high risk information in the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message, WeChat content and the like. The first generating module 631 is specifically configured to: and generating an identification result display card based on the identification type of the identified telephone number returned by the telephone identification interface or the type of the identified content returned by the short message inquiry interface. The authentication result display card displays a color corresponding to the security level of the security authentication result, specifically, the security level of the type of the mark of the authenticated phone number or the type of the authenticated content is used as the security level of the security authentication result; the identification result display card specifically comprises: a tag type of the authenticated phone number or a type of the authenticated contents and a graphic symbol corresponding to a security level of a security authentication result. The second generating module 633 is specifically configured to: an authentication book is generated based on the authentication result display card, and other information in the security authentication result except the tag type of the authenticated telephone number or the type of the authenticated content, and the information authenticated by obtaining the security authentication result, i.e., the authenticated telephone number or the authenticated content. The display module 632 is specifically configured to display the authentication book on the user interface.
Further, the certificate may further include: and the suggestive expression can be obtained based on the security level of the security identification result so as to further clarify the security degree of the identified information through the suggestive expression.
Further, the certificate may further include: the enterprise yellow page information can be contained in the security identification result returned by the telephone marking interface or the short message inquiry interface and is obtained from the security identification result.
Further, the certificate may further include: a correction button, a report button, and/or a share button; the error correction button can provide a request for correcting the information which is wrongly identified in the identification book to the error correction interface based on the operation of a user; a report button capable of making a request for reporting the authentication information in the authentication book to a report interface based on the operation of the user; and a sharing button can be used for publishing the certificate to the social platform based on the operation of the user.
In addition, a terminal device is further provided in the embodiment of the present invention, as shown in fig. 7, for convenience of description, only a part related to the embodiment of the present invention is shown, and details of the specific technology are not disclosed, please refer to the method part in the embodiment of the present invention. The terminal device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, and the like, taking the terminal device as the mobile phone as an example:
fig. 7 is a block diagram of a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present invention. Referring to fig. 7, the handset includes: radio Frequency (RF) circuit 710, memory 720, input unit 730, display unit 740, sensor 750, audio circuit 760, wireless-fidelity (Wi-Fi) module 770, processor 780, and power supply 790. Those skilled in the art will appreciate that the handset configuration shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 7:
the RF circuit 710 may be used for receiving and transmitting signals during a message transmission or call, and particularly, for receiving downlink information of a base station and then processing the received downlink information, and for transmitting data designed for uplink to the base station, the RF circuit 710 may include, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (L w noise amplifier, &lttttransmission = L "&ttt/t &gttna), a duplexer, etc. furthermore, the RF circuit 710 may communicate with a network and other devices through wireless communication, which may use any communication standard or protocol, including, but not limited to, a global system for Mobile communication (GSM), a General Packet radio Service (General Packet radio Service, GPRS), a Code Division Multiple Access (Code Division Multiple Access, Wideband CDMA), a Code Division Multiple Access (CDMA), a Short Service Access (SMS Service, L), a long Term Evolution (SMS) message, L, a Service, a Short Service (Service), a WCDMA, a Mobile communication system, a Mobile communication, a wireless.
The memory 720 may be used to store software programs and modules, and the processor 780 may execute various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 720. The memory 720 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 720 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 730 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 730 may include a touch panel 731 and other input devices 732. The touch panel 731, also referred to as a touch screen, can collect touch operations of a user (e.g. operations of the user on or near the touch panel 731 by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 731 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 780, and can receive and execute commands from the processor 780. In addition, the touch panel 731 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 730 may include other input devices 732 in addition to the touch panel 731. In particular, other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 740 may be used to display information input by a user or information provided to the user and various menus of the cellular phone, the display unit 740 may include a display panel 741, and optionally, the display panel 741 may be configured in the form of a liquid crystal display (L required CrystalDisplay, &ttttranslation = L "&&ttt/t &gttcd), an Organic light Emitting Diode (Organic L sight-emulation Diode, O L ED), and the like, and further, the touch panel 731 may cover the display panel 741, and when the touch panel 731 detects a touch operation on or near the touch panel 731, the touch panel is transmitted to the processor 780 to determine the type of the touch event, and then the processor 880 provides a corresponding visual output on the display panel according to the type of the touch event, although in fig. 7, the touch panel 731 and the display panel 741 are implemented as two separate components, the touch input and input functions of the cellular phone, and the display panel 741 may be implemented as an integrated unit with the display panel 731 and the input and output functions of the cellular phone 741 in some embodiments.
The handset may also include at least one sensor 750, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 741 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 741 and/or a backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 760, speaker 761, and microphone 762 may provide an audio interface between a user and a cell phone. The audio circuit 760 can transmit the electrical signal converted from the received audio data to the speaker 761, and the electrical signal is converted into a sound signal by the speaker 761 and output; on the other hand, the microphone 762 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 760, and then processes the audio data output processor 780, and then transmits the audio data to, for example, another cellular phone through the RF circuit 710, or outputs the audio data to the memory 720 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 770, and provides wireless broadband Internet access for the user. Although fig. 7 shows the WiFi module 770, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 780 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 720 and calling data stored in the memory 720, thereby integrally monitoring the mobile phone. Optionally, processor 780 may include one or more processing units; preferably, the processor 780 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 780.
The handset also includes a power supply 790 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 780 via a power management system, so that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In this embodiment of the present invention, the processor 780 included in the terminal device further has the following functions:
obtaining information to be authenticated from a user interface;
obtaining a security identification result of the information to be identified based on the type of the information to be identified;
and displaying the security authentication result on a user interface.
The embodiment of the invention provides the following technical scheme:
1. an information authentication method comprising:
obtaining information to be authenticated from a user interface;
obtaining a security authentication result of the information to be authenticated based on the type of the information to be authenticated;
and displaying the security authentication result on a user interface.
2. The method of 1, wherein obtaining information to be authenticated from a user interface comprises:
receiving an information authentication instruction based on the operation of a user;
and responding to the information authentication instruction, and acquiring the information to be authenticated from a user interface.
3. The method of 2, wherein obtaining information to be authenticated from a user interface comprises:
and acquiring information to be authenticated from a selection frame of the user interface.
4. The method of 2, wherein obtaining information to be authenticated from a user interface comprises:
and acquiring information to be authenticated from an input box specified by the user interface.
5. The method of 4, wherein the obtaining information to be authenticated from an input box specified by a user interface comprises:
responding to the information identification instruction, and detecting whether an input box designated by a user interface is empty;
if the input box designated by the user interface is empty, popping up a reminding dialog box, and reminding a user to input information to be identified in the input box;
and if the input box designated by the user interface is not empty, acquiring the information to be authenticated from the input box.
6. The method according to any one of claims 1 to 5, wherein obtaining a security authentication result of the information to be authenticated based on the type of the information to be authenticated comprises:
detecting whether the information to be authenticated comprises a number;
if the information to be identified does not comprise numbers, a short message inquiry interface is requested to identify the information to be identified;
receiving a security identification result of the information to be identified, which is returned by the short message query interface;
if the information to be authenticated comprises numbers, a telephone marking interface is requested to authenticate the information to be authenticated;
and receiving a security authentication result of the information to be authenticated, which is returned by the telephone marking interface.
7. The method according to 6, after receiving a security authentication result of the information to be authenticated, which is returned by the telephone marking interface, further comprising:
detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
and if the security identification result of the information to be identified returned by the telephone marking interface is not received, requesting the short message inquiry interface to identify the information to be identified.
8. The method of 7, the information to be authenticated comprising: telephone number, qq number, bank card number, website link, short message and WeChat content.
9. According to the method of 8, the security authentication result returned by the phone tagging interface is obtained by querying a number database with the authenticated phone number.
10. According to the method of 8 or 9, the security authentication result returned by the short message query interface is obtained based on intelligent identification of the authenticated content; wherein the identified content includes: qq number, bank card number, website link, short message and WeChat content.
11. The method of any of claims 6 to 10, the displaying the security authentication result on a user interface, comprising:
generating an authentication result display card based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
and displaying the identification result display card on a user interface.
12. The method according to claim 11, wherein the authentication result display card is displayed in a color corresponding to a security level of the security authentication result, and the authentication result display card includes: the security authentication result and a graphic symbol corresponding to a security level of the security authentication result.
13. The method of 12, the generating an authentication result display card, comprising:
determining the security level of the security authentication result according to the security authentication result;
acquiring the color of an authentication result display card matched with the security grade and the graphic symbols in the authentication result display card based on the security grade of the security authentication result;
and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbol in the identification result display card.
14. The method according to any one of claims 11 to 13, wherein the security authentication result returned by the telephone tagging interface comprises: a type of label for the identified telephone number; the security identification result returned by the short message query interface comprises: a type of the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message and WeChat content.
15. The method of 14, wherein the security authentication returned by the telephony markup interface further comprises: the location of the identified telephone number and the number of times the identified telephone number is marked.
16. According to the method of 14 or 15, the security authentication result returned by the short message query interface further includes: high risk information in the identified content.
17. The method of 15 or 16, the displaying the security authentication result on a user interface, further comprising:
generating an authentication book based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
the identification result display card is displayed on a user interface, specifically, the identification book is displayed on the user interface; wherein the certificate further comprises: and obtaining the information authenticated by the security authentication result.
18. The method of claim 17, the certificate further comprising: a correction button, a report button, and/or a share button; the error correction button is used for sending a request for correcting the information which is wrongly identified in the identification book to an error correction interface based on the operation of a user; the report button is used for sending a request for reporting the identification information in the identification book to a report interface based on the operation of a user; the sharing button is used for publishing the identification book to a social platform based on the operation of a user.
19. An information authentication apparatus comprising:
an acquisition unit configured to acquire information to be authenticated from a user interface;
the processing unit is used for obtaining a safety authentication result of the information to be authenticated based on the type of the information to be authenticated;
and the display unit is used for displaying the safety identification result on a user interface.
20. The apparatus of 19, the obtaining unit, comprising:
the instruction receiving module is used for receiving an information identification instruction based on the operation of a user;
and the information acquisition module is used for responding to the information identification instruction and acquiring the information to be identified from the user interface.
21. The apparatus of 20, wherein the information obtaining module is specifically configured to obtain the information to be authenticated from a selection box of a user interface.
22. The apparatus of 20, wherein the information obtaining module is specifically configured to obtain the information to be authenticated from an input box specified by a user interface.
23. According to the apparatus of 22, the obtaining of the information to be authenticated from the input box specified by the user interface is specifically configured to:
responding to the information identification instruction, and detecting whether an input box designated by a user interface is empty;
if the input box designated by the user interface is empty, popping up a reminding dialog box, and reminding a user to input information to be identified in the input box;
and if the input box designated by the user interface is not empty, acquiring the information to be authenticated from the input box.
24. The apparatus of any of claims 19 to 23, the processing unit comprising:
the first detection module is used for detecting whether the information to be authenticated comprises numbers;
the first request module is used for responding to the fact that the information to be identified does not comprise numbers according to the detection result of the first detection module and requesting a short message inquiry interface to identify the information to be identified;
the first receiving module is used for receiving a security identification result of the information to be identified, which is returned by the short message query interface;
the second request module is used for responding to the information to be authenticated and including numbers according to the detection result of the first detection module, and requesting a telephone marking interface to authenticate the information to be authenticated;
and the second receiving module is used for receiving the security authentication result of the information to be authenticated, which is returned by the telephone marking interface.
25. The apparatus of 24, the processing unit, further comprising:
the second detection module is used for detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
the first request module is further configured to request the short message query interface to authenticate the information to be authenticated in response to not receiving a security authentication result of the information to be authenticated, where the security authentication result is returned by the telephone tag interface according to a detection result of the second detection module.
26. The apparatus of 25, the information to be authenticated comprising: telephone number, qq number, bank card number, website link, short message and WeChat content.
27. According to the apparatus of claim 26, the security authentication result returned by the phone tagging interface is obtained by querying a number database with the authenticated phone number.
28. According to the device of 26 or 27, the security identification result returned by the short message query interface is obtained by intelligently identifying the identified content; wherein the identified content includes: qq number, bank card number, website link, short message and WeChat content.
29. The apparatus of any of claims 24 to 28, the display unit comprising:
the first generation module is used for generating an identification result display card based on the security identification result returned by the telephone marking interface or the short message inquiry interface;
and the display module is used for displaying the identification result display card on a user interface.
30. The apparatus of 29, the authentication result display card displayed in a color corresponding to a security level of the security authentication result, the authentication result display card comprising: the security authentication result and a graphic symbol corresponding to a security level of the security authentication result.
31. The apparatus of claim 30, wherein the first generating module is specifically configured to:
determining the security level of the security authentication result according to the security authentication result;
acquiring the color of an authentication result display card matched with the security grade and the graphic symbols in the authentication result display card based on the security grade of the security authentication result;
and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbol in the identification result display card.
32. The apparatus according to any one of claims 29 to 31, wherein the security authentication result returned by the phone badge interface comprises: a type of label for the identified telephone number; the security identification result returned by the short message query interface comprises: a type of the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message and WeChat content.
33. The apparatus of 32, wherein the information returned by the telephony markup interface further comprises: the location of the identified telephone number and the number of times the identified telephone number is marked.
34. According to the apparatus of 32 or 33, the information returned by the short message query interface further includes: high risk information in the identified content.
35. The apparatus of 33 or 34, the display unit, further comprising:
the second generation module is used for generating an authentication book based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
the display module is specifically used for displaying the identification book on a user interface; wherein the certificate further comprises: and obtaining the information authenticated by the security authentication result.
36. The apparatus of claim 35, the certificate further comprising: a correction button, a report button, and/or a share button; the error correction button is used for sending a request for correcting the information which is wrongly identified in the identification book to an error correction interface based on the operation of a user; the report button is used for sending a request for reporting the identification information in the identification book to a report interface based on the operation of a user; the sharing button is used for publishing the identification book to a social platform based on the operation of a user.
37. A terminal device, comprising: a processor and a memory; wherein the content of the first and second substances,
the memory is used for storing a program of the information identification method according to any one of items 1 to 18 above;
the processor is configured to execute the program of the information authentication method stored in the memory.
In the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts in the embodiments are referred to each other. For the system embodiment, since it basically corresponds to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The method and apparatus, device of the present invention may be implemented in a number of ways. For example, the method, apparatus and device of the present invention may be implemented by software, hardware, firmware or any combination of software, hardware and firmware. The above-described order for the steps of the method is for illustrative purposes only, and the steps of the method of the present invention are not limited to the order specifically described above unless specifically indicated otherwise. Furthermore, in some embodiments, the present invention may also be embodied as a program recorded in a recording medium, the program including machine-readable instructions for implementing a method according to the present invention. Thus, the present invention also covers a recording medium storing a program for executing the method according to the present invention.
The description of the present invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to practitioners skilled in this art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (35)

1. An information authentication method comprising:
obtaining information to be authenticated from a user interface;
obtaining a security authentication result of the information to be authenticated based on the type of the information to be authenticated;
displaying the security authentication result on a user interface;
wherein the obtaining of the security authentication result of the information to be authenticated based on the type of the information to be authenticated comprises:
detecting whether the information to be authenticated comprises a number;
if the information to be identified does not comprise numbers, a short message inquiry interface is requested to identify the information to be identified;
receiving a security identification result of the information to be identified, which is returned by the short message query interface;
if the information to be authenticated comprises numbers, a telephone marking interface is requested to authenticate the information to be authenticated;
receiving a security authentication result of the information to be authenticated, which is returned by the telephone marking interface;
detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
and if the security identification result of the information to be identified returned by the telephone marking interface is not received, requesting the short message inquiry interface to identify the information to be identified.
2. The method of claim 1, the obtaining information to be authenticated from a user interface, comprising:
receiving an information authentication instruction based on the operation of a user;
and responding to the information authentication instruction, and acquiring the information to be authenticated from a user interface.
3. The method of claim 2, the obtaining information to be authenticated from a user interface, comprising:
and acquiring information to be authenticated from a selection frame of the user interface.
4. The method of claim 2, the obtaining information to be authenticated from a user interface, comprising:
and acquiring information to be authenticated from an input box specified by the user interface.
5. The method of claim 4, wherein the obtaining information to be authenticated from an input box specified by a user interface comprises:
responding to the information identification instruction, and detecting whether an input box designated by a user interface is empty;
if the input box designated by the user interface is empty, popping up a reminding dialog box, and reminding a user to input information to be identified in the input box;
and if the input box designated by the user interface is not empty, acquiring the information to be authenticated from the input box.
6. The method of claim 1, after receiving a security authentication result of the information to be authenticated returned by the telephone tag interface, further comprising:
detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
and if the security identification result of the information to be identified returned by the telephone marking interface is not received, requesting the short message inquiry interface to identify the information to be identified.
7. The method of claim 6, the information to be authenticated comprising: telephone number, qq number, bank card number, website link, short message and WeChat content.
8. The method of claim 7, wherein the security assessment returned by the phone tagging interface is obtained by querying a number database with the assessed phone number.
9. The method of claim 7, wherein the security authentication result returned by the short message query interface is obtained based on intelligent identification of the authenticated content; wherein the identified content includes: qq number, bank card number, website link, short message and WeChat content.
10. The method of any of claims 1 to 9, the displaying the security authentication result on a user interface, comprising:
generating an authentication result display card based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
and displaying the identification result display card on a user interface.
11. The method of claim 10, the authentication result display card displayed in a color corresponding to a security rating of the security authentication result, the authentication result display card comprising: the security authentication result and a graphic symbol corresponding to a security level of the security authentication result.
12. The method of claim 11, the generating an authentication result display card, comprising:
determining the security level of the security authentication result according to the security authentication result;
acquiring the color of an authentication result display card matched with the security grade and the graphic symbols in the authentication result display card based on the security grade of the security authentication result;
and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbol in the identification result display card.
13. The method of claim 10, the security authentication result returned by the telephony markup interface comprising: a type of label for the identified telephone number; the security identification result returned by the short message query interface comprises: a type of the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message and WeChat content.
14. The method of claim 13, the security authentication result returned by the telephony markup interface further comprising: the location of the identified telephone number and the number of times the identified telephone number is marked.
15. The method according to claim 13 or 14, wherein the security authentication result returned by the short message query interface further comprises: high risk information in the identified content.
16. The method of claim 14, the displaying the security authentication result on a user interface, further comprising:
generating an authentication book based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
the identification result display card is displayed on a user interface, specifically, the identification book is displayed on the user interface; wherein the certificate further comprises: and obtaining the information authenticated by the security authentication result.
17. The method of claim 16, the certificate further comprising: a correction button, a report button, and/or a share button; the error correction button is used for sending a request for correcting the information which is wrongly identified in the identification book to an error correction interface based on the operation of a user; the report button is used for sending a request for reporting the identification information in the identification book to a report interface based on the operation of a user; the sharing button is used for publishing the identification book to a social platform based on the operation of a user.
18. An information authentication apparatus comprising:
an acquisition unit configured to acquire information to be authenticated from a user interface;
the processing unit is used for obtaining a safety authentication result of the information to be authenticated based on the type of the information to be authenticated;
a display unit for displaying the security authentication result on a user interface;
wherein the processing unit comprises:
the first detection module is used for detecting whether the information to be authenticated comprises numbers;
the first request module is used for responding to the fact that the information to be identified does not comprise numbers according to the detection result of the first detection module and requesting a short message inquiry interface to identify the information to be identified;
the first receiving module is used for receiving a security identification result of the information to be identified, which is returned by the short message query interface;
the second request module is used for responding to the information to be authenticated and including numbers according to the detection result of the first detection module, and requesting a telephone marking interface to authenticate the information to be authenticated;
the second receiving module is used for receiving a security authentication result of the information to be authenticated, which is returned by the telephone marking interface;
the second detection module is used for detecting whether a security identification result of the information to be identified returned by the telephone marking interface is received;
the first request module is also used for responding to the security identification result of the information to be identified, which is returned by the telephone marking interface and is not received, and requesting the short message inquiry interface to identify the information to be identified according to the detection result of the second detection module.
19. The apparatus of claim 18, the obtaining unit, comprising:
the instruction receiving module is used for receiving an information identification instruction based on the operation of a user;
and the information acquisition module is used for responding to the information identification instruction and acquiring the information to be identified from the user interface.
20. The apparatus of claim 19, wherein the information obtaining module is specifically configured to obtain the information to be authenticated from a selection box of a user interface.
21. The apparatus according to claim 19, wherein the information obtaining module is specifically configured to obtain the information to be authenticated from an input box specified by a user interface.
22. The apparatus according to claim 21, wherein the information to be evaluated is obtained from an input box specified by the user interface, and is specifically configured to:
responding to the information identification instruction, and detecting whether an input box designated by a user interface is empty;
if the input box designated by the user interface is empty, popping up a reminding dialog box, and reminding a user to input information to be identified in the input box;
and if the input box designated by the user interface is not empty, acquiring the information to be authenticated from the input box.
23. The apparatus of claim 22, the processing unit, further comprising:
the second detection module is used for detecting whether a security authentication result of the information to be authenticated returned by the telephone marking interface is received or not;
the first request module is further configured to request the short message query interface to authenticate the information to be authenticated in response to not receiving a security authentication result of the information to be authenticated, where the security authentication result is returned by the telephone tag interface according to a detection result of the second detection module.
24. The apparatus of claim 23, the information to be authenticated comprising: telephone number, qq number, bank card number, website link, short message and WeChat content.
25. The apparatus of claim 24, wherein the security authentication returned by the phone tagging interface is obtained by querying a number database with an authenticated phone number.
26. The apparatus of claim 25, wherein the security authentication result returned by the short message query interface is obtained by performing intelligent identification on the authenticated content; wherein the identified content includes: qq number, bank card number, website link, short message and WeChat content.
27. The apparatus of any one of claims 23 to 26, the display unit comprising:
the first generation module is used for generating an identification result display card based on the security identification result returned by the telephone marking interface or the short message inquiry interface;
and the display module is used for displaying the identification result display card on a user interface.
28. The apparatus of claim 27, the authentication result display card displayed in a color corresponding to a security rating of the security authentication result, the authentication result display card comprising: the security authentication result and a graphic symbol corresponding to a security level of the security authentication result.
29. The apparatus of claim 28, wherein the first generating module is specifically configured to:
determining the security level of the security authentication result according to the security authentication result;
acquiring the color of an authentication result display card matched with the security grade and the graphic symbols in the authentication result display card based on the security grade of the security authentication result;
and generating the identification result display card based on the safety identification result, the color of the identification result display card and the graphic symbol in the identification result display card.
30. The apparatus of claim 29, the security authentication result returned by the telephony markup interface comprising: a type of label for the identified telephone number; the security identification result returned by the short message query interface comprises: a type of the identified content, wherein the identified content comprises: qq number, bank card number, website link, short message and WeChat content.
31. The apparatus of claim 30, the information returned by the telephony markup interface further comprising: the location of the identified telephone number and the number of times the identified telephone number is marked.
32. The apparatus of claim 31, wherein the information returned by the short message query interface further comprises: high risk information in the identified content.
33. The apparatus of claim 31 or 32, the display unit, further comprising:
the second generation module is used for generating an authentication book based on the security authentication result returned by the telephone marking interface or the short message inquiry interface;
the display module is specifically used for displaying the identification book on a user interface; wherein the certificate further comprises: and obtaining the information authenticated by the security authentication result.
34. The apparatus according to claim 33, the certificate further comprising: a correction button, a report button, and/or a share button; the error correction button is used for sending a request for correcting the information which is wrongly identified in the identification book to an error correction interface based on the operation of a user; the report button is used for sending a request for reporting the identification information in the identification book to a report interface based on the operation of a user; the sharing button is used for publishing the identification book to a social platform based on the operation of a user.
35. A terminal device, comprising: a processor and a memory; wherein the content of the first and second substances,
the memory is used for storing a program of the information identification method according to any one of 1 to 17 above;
the processor is configured to execute the program of the information authentication method stored in the memory.
CN201710197789.8A 2017-03-29 2017-03-29 Information identification method and device and terminal equipment Active CN106980778B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710197789.8A CN106980778B (en) 2017-03-29 2017-03-29 Information identification method and device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710197789.8A CN106980778B (en) 2017-03-29 2017-03-29 Information identification method and device and terminal equipment

Publications (2)

Publication Number Publication Date
CN106980778A CN106980778A (en) 2017-07-25
CN106980778B true CN106980778B (en) 2020-07-14

Family

ID=59338524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710197789.8A Active CN106980778B (en) 2017-03-29 2017-03-29 Information identification method and device and terminal equipment

Country Status (1)

Country Link
CN (1) CN106980778B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660991B (en) * 2017-10-11 2021-03-19 腾讯科技(深圳)有限公司 Pseudo base station prompting method, device and storage medium
CN109951354B (en) * 2019-03-12 2021-08-10 北京奇虎科技有限公司 Terminal equipment identification method, system and storage medium
CN113344599B (en) * 2021-06-30 2024-06-11 中国光大银行股份有限公司 Fraud short message identification method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425736A (en) * 2013-06-24 2013-12-04 腾讯科技(深圳)有限公司 Web information recognition method, device and system
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN106332024A (en) * 2016-08-31 2017-01-11 华为技术有限公司 Insecure short message recognition method and related equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425736A (en) * 2013-06-24 2013-12-04 腾讯科技(深圳)有限公司 Web information recognition method, device and system
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN106332024A (en) * 2016-08-31 2017-01-11 华为技术有限公司 Insecure short message recognition method and related equipment

Also Published As

Publication number Publication date
CN106980778A (en) 2017-07-25

Similar Documents

Publication Publication Date Title
Mishra et al. Smishing Detector: A security model to detect smishing through SMS content analysis and URL behavior analysis
Sonowal et al. SmiDCA: an anti-smishing model with machine learning approach
CN103425736B (en) A kind of web information recognition, Apparatus and system
CN107480533B (en) Vulnerability repairing method and device and storage medium
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
CN106778130B (en) Message display method, display device and mobile terminal
CN104539624B (en) The safety monitoring method and device of number information in text
Mishra et al. SMS phishing and mitigation approaches
KR102355973B1 (en) Apparatus and method for detecting smishing message
CN106713266B (en) Method, device, terminal and system for preventing information leakage
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
CN109089229B (en) Method, device, storage medium and terminal for risk prompt
CN106980778B (en) Information identification method and device and terminal equipment
CN103220302A (en) Malicious website access defending method and related device
CN112036791A (en) Cross-platform logistics order filling method and device, terminal equipment and storage medium
CN102801706A (en) Terminal and security processing method for information contents
CN109873794B (en) Protection method for denial of service attack and server
CN107506646A (en) Detection method, device and the computer-readable recording medium of malicious application
CN107748848A (en) A kind of information processing method and mobile terminal
CN107145780A (en) Malware detection method and device
KR101779696B1 (en) Method and apparatus for detecting voice phishing
Mishra et al. A content-based approach for detecting smishing in mobile environment
CN104899488B (en) Numeric value transfer and device
CN107347059A (en) The method and detection terminal of a kind of Hole Detection
CN107272985A (en) Notification message processing method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant