CN109005193A - Alarming method for power, device and electric terminal - Google Patents
Alarming method for power, device and electric terminal Download PDFInfo
- Publication number
- CN109005193A CN109005193A CN201811020779.8A CN201811020779A CN109005193A CN 109005193 A CN109005193 A CN 109005193A CN 201811020779 A CN201811020779 A CN 201811020779A CN 109005193 A CN109005193 A CN 109005193A
- Authority
- CN
- China
- Prior art keywords
- newcomer
- target session
- group
- session group
- members
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
Abstract
The embodiment of the present invention provides a kind of alarming method for power, device and electric terminal, in an example, which comprises judge all members in target session group, judge whether the target session group has newcomer's addition;If so, then the newcomer is identified;And if the newcomer is identified as abnormal member, issues alert messages to all members.The message confidence level that abnormal member can be reduced by the alarming method for power, prevents criminal from interfering member in group, avoids deception of the member by criminal in group, and then leads to that property loss occurs.
Description
Technical field
The present invention relates to instant messaging fields, in particular to a kind of alarming method for power, device and electric terminal.
Background technique
With the development of network technology, occur diversified instant messaging tools on the market, is more and more using
While communication is got used to using a network in family, criminal can be issued spoofing by instant messaging tools, maliciously be lured
Information is deceived, causes to harass to member ignorant of the fact, even results in financial losses.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of alarming method for power, device and electric terminal, not
When method molecule is using other people business card publication spoofings, malice trick information, the message confidence level of criminal is reduced.
In a first aspect, the embodiment of the invention provides a kind of alarming method for power, which comprises
All members in target session group are judged, judge whether the target session group has newcomer's addition;
If so, then being identified to the newcomer;And
If the newcomer is identified as abnormal member, alert messages are issued to all members.
With reference to first aspect, in alternative embodiment of the invention, the described the step of newcomer is identified, packet
It includes:
Obtain the pet name of the newcomer;
Obtain the pet name of all originating members in the target session group;
The pet name of the newcomer and the pet name of the originating member are compared, if identical, judged described new
Member is abnormal member.
With reference to first aspect, in alternative embodiment of the invention, all members in target session group are carried out
Judgement, judges whether the target session group has the step of newcomer's addition, comprising:
Obtain history membership table corresponding with target session group and current membership's table;
Identity in the history membership table, current membership's table is compared, comparing result is obtained;
It is confirmed whether there is newcomer's addition according to the comparing result.
With reference to first aspect, in alternative embodiment of the invention, after the step of identifying the newcomer,
The method also includes:
If the newcomer is identified as non-abnormal member, the history membership table is updated.
With reference to first aspect, in alternative embodiment of the invention, all members in target session group are carried out
Judgement, judges whether the target session group has the step of newcomer's addition, comprising:
Obtain the addition time of all members in target session group;
Newcomer is judged whether there is according to the addition time to be added.
With reference to first aspect, in alternative embodiment of the invention, the method also includes:
Judge the request for whether thering is member to propose the modification pet name in the target session group;
If so, carrying out identification to the member of the modification pet name;And
If the member of the modification pet name is identified as abnormal member, alert messages are issued to all members.
With reference to first aspect, in alternative embodiment of the invention, all members in target session group into
Before the step of row judges, the method also includes:
Obtain the permission for reading all member's data in the target session group;And/or
Obtain the automatic permission for sending system message;And/or
Obtain the automatic permission for sending bulletin.
Second aspect, the embodiment of the invention provides a kind of alarming device, the alarming device includes:
Judgment module, for all members in target session group to be judged with whether judge the target session group
There is newcomer's addition;
Identification module, for being identified to the newcomer;
Alarm module, for issuing alert messages to all members.
In conjunction with second aspect, in alternative embodiment of the invention, the alarming device further includes obtaining module;
The acquisition module, for obtaining the permission for reading all member's data in the target session group;And/or it is used for
Obtain the automatic permission for sending system message;And/or for obtaining the automatic permission for sending bulletin.
The third aspect, the embodiment of the invention provides a kind of electric terminal, the electric terminal includes:
Memory;
Processor;
The memory is used to store the program for supporting processor to execute the above method, the processor is configured to being used for
Execute the program stored in the memory.
Compared with prior art, a kind of alarming method for power, device and electric terminal provided in an embodiment of the present invention, it can be determined that
Whether there is the newcomer into target session group out, identification may further be carried out to newcomer, if the newcomer falsely uses
The newcomer can be regarded as abnormal member, and issue alert messages to all members by other people business cards in group.Whether in group
Other members are it can be seen that alert messages on the one hand can be right after seeing alert messages in administrator, founder or group
Abnormal member makes subsequent processing, on the other hand can also send prompting message to the member for being falsely used business card, can be dropped with this
The message confidence level of low exception member, prevents criminal from interfering member in group, avoids in group member by illegal point
The deception of son, and then lead to that property loss occurs.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation
Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram that server-side provided in an embodiment of the present invention and client interact.
Fig. 2 is the structural block diagram of electric terminal provided in an embodiment of the present invention.
Fig. 3 is the flow chart of alarming method for power provided in an embodiment of the present invention.
Fig. 4 is the detail flowchart of the step S310 of alarming method for power provided in an embodiment of the present invention.
Fig. 5 is the partial process view of alarming method for power provided in an embodiment of the present invention.
Fig. 6 is the functional block diagram of alarming device provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
As shown in Figure 1, being the schematic diagram that server-side 100 provided in an embodiment of the present invention is interacted with client 200.Institute
It states server-side 100 to be communicatively coupled by network and one or more clients 200, to carry out data communication or interaction.Institute
The correspondence equipment for stating server-side 100 can be network server, database server etc..The correspondence equipment of the client 200
It can be PC (personal computer, PC), tablet computer, smart phone, personal digital assistant (personal
Digital assistant, PDA) etc..Wherein, user can log in the account of oneself by client 200, wherein each
Account corresponds to a unique identity, and user can carry out data interaction by account and server-side 100.Implement in the present invention
In example, client 200 can be the front end of network application, and server-side 100 can be the rear end of network application.
As shown in Fig. 2, being the structural block diagram of electric terminal 100 provided in an embodiment of the present invention.The electric terminal 100 wraps
Include alarming device 110, memory 120, storage control 130, processor 140 and network unit 150 etc..The memory
120, storage control 130, processor 140, network unit 150 are directly or indirectly electrically connected between each other, to realize number
According to transmission or interaction.For example, these elements can be realized electrically between each other by one or more communication bus or signal wire
Connection.The alarming device 110 includes that at least one can be stored in the storage in the form of software or firmware (firmware)
In device 120 or the software function mould that is solidificated in the operating system (operating system, OS) of the electric terminal 100
Block.The processor 140 is used to execute the executable module stored in memory 120, such as the alarming device 110 includes
Software function module or computer program.
Wherein, the memory 120 may be, but not limited to, random access memory (Random Access
Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable
Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only
Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only
Memory, EEPROM) etc..Wherein, memory 120 is for storing program, the processor 140 after receiving and executing instruction,
Execute described program.Processor 140 and other possible components can be in storage controls 130 to the access of memory 120
Control is lower to be carried out.Method performed by the electric terminal 100 that defines of process that any embodiment of the embodiment of the present invention discloses can be with
It is realized applied in processor 140, or by processor 140.
The processor 140 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor
140 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processes
Device (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), specific integrated circuit
(ASIC), field programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor 140 is also possible to any conventional processor etc..
The network unit 150 for receiving and transmitting network signal, network signal may include wireless signal or
Wire signal.
It will appreciated by the skilled person that structure shown in Fig. 2 is only to illustrate, not to electric terminal 100
Structure cause to limit.For example, electric terminal 100 may also include the more perhaps less component than shown in Fig. 2 or have
The configuration different from shown in Fig. 2.In the embodiment of the present invention, electric terminal 100 can be server, personal computer, movement
Equipment, intelligent wearable device, mobile unit etc. can connect network and the equipment with calculation processing power.In certain embodiment party
In formula, terminal device can also be not limited to physical equipment, such as can also be virtual machine, virtual server etc..The present invention is implemented
Server-side 100 in example can run on above-mentioned electric terminal 100.
Referring to Fig. 3, being the alarming method for power provided in an embodiment of the present invention applied to electric terminal 100 shown in Fig. 2
Flow chart.Detailed process shown in Fig. 3 will be described in detail below.
Step S310: judging all members in target session group, judges whether the target session group has newly
Member is added.
Step S320: if so, then being identified to the newcomer.
Step S330: if the newcomer is identified as abnormal member, alert messages are issued to all members.
It may include crowd administrator, rank-and-file member in the target session group in the present embodiment, the group administrator can be with
It is the founder of target session group, is also possible to the member that founder assigns administration authority.
Wherein, each member that target session group is added has a unique identity, can be with by unique identity
Member is distinguished, unique identity can be the correspondence account of cell-phone number and instant messaging tools.Wherein, Instant Messenger
The correspondence account of letter tool can be QQ number, WeChat ID, nail nail account, Netease's cloud letter, Skype account etc..In an example,
The target session group is QQ groups, and the identity is QQ number, and the member in QQ crowds is using the pet name as business card in group.
In another example, the target session group is that Netease's cloud believes advanced group, and the identity is accid account
Number, Netease's cloud believes the member in advanced group using user's pet name (name) as business card in group.
In another example, the target session group is nailing sections door, and the identity is the unique ID of employee
(userID), the member in department is using member Name (name) as business card in group.
Data by reading all members in target session group judges members all in group, judges whether there is new
Target session group is added in member.Such as addition time of all members, unique identity, business card can be read etc., wherein it can
To have known whether newcomer's addition according to addition time or unique identity.In the case where there is newcomer's addition, read
The data of newcomer is taken, to carry out identification and monitoring to newcomer, if newcomer and the business card using originating member in group
Member in group is cheated, alert messages are issued to members all in group.Wherein, known to newcomer can be identification otherwise
Unique identity, business card, addition time of newcomer etc..
Due to sporadically there is newcomer's addition in target session group, when one newcomer of every addition can to it is described it is new at
Member carries out identification.When recognizing newcomer is abnormal member, alert messages can be sent to all members, be reduced with this
The confidence level of abnormal member avoids interfering originating member in group when abnormal member sends out message, so cause in group at
Member has dust thrown into the eyes or occurs property loss.
If identifying, the newcomer just clashes business card when being added with the business card of other members in group, described in judgement
Newcomer is abnormal member;It, will be described if the newcomer does not use business card identical with other members in group when being added
Newcomer is temporarily considered as safe member, next member be added target session group before, if the newcomer by its business card more
It is changed to business card identical as the business card of other members in group, judges the newcomer for abnormal member.Wherein, business card described in business card can
To be the pet name, user name etc..
In a scenario, member agrees to that target session group is just added by administrator.Enter group and require to include do not bear the same name, is full
Sufficient pre-set level exists and recommends member etc..Wherein, if Member card has conflict, it may result in originating member in group and be difficult to
Distinguish two members of business card conflict;If preset standard is not achieved in membership grade, the management of target session group may be will increase
Burden;If undesirable without referrer or referrer, threat may be brought to originating member in group, lead to member
Data leakage etc..It is considered as safe member by the member that administrator verifies and is added, for mesh is added by administrator's verifying
Mark session group newcomer, during being verified through administrator, if in the business card of member to be added and group originating member name
Piece has conflict, and the member to be added is caused to be unsatisfactory for requiring into group, and administrator can send prompting message to member to be added, with
Member to be added is set to change business card.
Under another scene, target session group is not added by administrator's verifying in newcomer, is verified without administrator
And the member being added may be safe member, it is also possible to abnormal member.For example, certain target session groups are due to being arranged to pair
The attribute of outer opening, user need not move through administrator agree to can into group, if by this method into the member of group in group its
The business card of his member clashes business card, is judged as abnormal member;Even if being needed for another example certain target session groups are provided with
The program of verifying, but due to by criminal using hacking technique invade target session group, the correspondence business card of criminal with
When the business card of other members is overlapped, business card is judged as abnormal member.
Under other scenes, no matter target session group is added as newcomer in member in which way, all it is likely to become different
Normal member.
In the present embodiment, using the pet name as target session group in business card for be illustrated.
In the present embodiment, whether in order to judge to have in target session group newcomer to be added, there are two types of embodiments.
The first, is judged according to identity, as shown in figure 4, step S310 includes step S311-S313.
Step S311: history membership table corresponding with target session group and current membership's table, the history member are obtained
Record has the identity of member in table, current membership's table.
Step S312: the identity in the history membership table, current membership's table is compared, and obtains comparison knot
Fruit.
Step S313: it is confirmed whether there is newcomer's addition according to the comparing result.
Wherein, the identity for having member in the group under historical time node is recorded in the history membership table, it is described to work as
Preceding membership table record has the identity of member in the group under current time node.By obtaining and comparing in two membership tables
Identity, it can be determined that whether have newcomer that target session group is added.If all identity in current membership's table with go through
All identity in history membership table are identical, then judge from a upper timing node until current time node, without new
Member is added, wherein a upper timing node indicates historical time node corresponding with the history membership table.If current membership's table
Not the phenomenon that middle identity there are in identity and history membership table is not inconsistent, further, if existing in current membership's table
The identity not having in history membership table, it can be determined that have newcomer's addition, with this can solve member move back it is right caused by group
Than difficult problem.
In one embodiment, period regular time can be set with two membership tables of timing acquisition, in another kind
In embodiment, trigger condition can be set, obtain two membership tables when a triggering condition is met, the trigger condition can be with
It is the application instruction for receiving Client-initiated and obtaining membership table.
In the present embodiment, after obtaining history membership table, current membership's table, if recognizing the newcomer is non-exception
Member can be updated history membership table.After having compared two membership tables and having obtained comparing result, can by history at
Information update in member's table is the information of current membership's table, compares two membership tables next time to facilitate.
It second, is directly carried out judging whether there is newcomer addition target session group according to the addition time of member.It is logical
The addition time for obtaining all members in target session group is spent, newcomer is judged whether there is according to the addition time and is added.
After obtaining the addition time of all members, filters out member the latest and the time is added.Judgement movement is executed each time
When only needs acquisition, and the time is added in member the latest, then the member the latest currently acquired addition time and last time are obtained
To member the latest be added the time and be compared, if the member the latest that currently acquires is added the time and is later than the last time and obtains
The time arrived, it is possible to determine that have newcomer's addition.In other embodiments, when can not have to obtain the addition of all members
Between, member the latest can be obtained by the sortord that instant messaging tools itself provides, the time is added, to judge whether there is
Newcomer is added.
In order to judge whether the newcomer in target session group is abnormal member, in the present embodiment, step S320 includes step
Rapid S321-S323.
Step S321: the pet name of the newcomer is obtained.
Step S322: the pet name of all originating members in the target session group is obtained.
Step S323: the pet name of the newcomer and the pet name of the originating member are compared, if identical, are sentenced
The newcomer of breaking is abnormal member.
It is carried out pair by obtaining the pet name of newcomer, originating member, and by the pet name of newcomer and the pet name of originating member
Than, it can be determined that whether newcomer is abnormal member in group, when the pet name of newcomer and the pet name difference of originating member, newly at
Member is non-abnormal member, and when the pet name of newcomer is identical as the pet name of originating member, newcomer is abnormal member.When confirmation is new
After member is abnormal member, alert messages can be sent to all members in target session group, originating member in group be avoided to receive
To the deception of abnormal member.
If newcomer is non-abnormal member, can continue to identify next member that target session group is added,
Or, being identified to the originating member for being identified as safe member.Once identify the identity of abnormal member, it can be to all
Member sends alert messages.
Just other members in group are interfered using other people business cards for a period of time to avoid member from hiding after entering group, are asked
Refering to Fig. 5, the method also includes:
Step S340: judge the request for whether thering is member to propose the modification pet name in the target session group.
Step S350: if so, carrying out identification to the member of the modification pet name.
Step S360: if the member of the modification pet name is identified as abnormal member, alert messages are issued to all members.
When receiving the request of the modification pet name of claimant's initiation, can according to the identity of claimant, the pet name into
Row identification, when recognizing there are when the identical phenomenon of the pet name, into target session group, all members send alert messages.
In a scenario, when certain member for having become originating member in group is intended to make member in group using other people business cards
When at interference, the request of the modification pet name can be proposed, include the original pet name, the new pet name, identity of claimant in the request
Etc. information.If the new pet name is identical as the pet name of other members in group, judges there is abnormal member in group, further pass through identity mark
After knowledge confirms the claimant that the identity of exception member is the modification pet name, all members alert messages can be issued into group, with this
It reduces and falsely uses the confidence level of other people business card persons, avoid in group member from being hard to tell the true and false and come to harm or occur property loss.
The beneficial effect is that no matter the member of the modification pet name is newcomer, as long as finding in group at any time
There are the identical phenomenons of the pet name, it is believed that there is abnormal member in group, may further be confirmed by identity it is abnormal at
Then the identity of member issues alert messages to members all in group, member in group is avoided to have dust thrown into the eyes, and then lead to that property occurs
Loss.
In an example, member A initiates that the first QQ group requests are added, due to be added the first QQ group need to be by verifying
It can be added, after the first QQ crowds of administrators verify member A, member A is denoted as safe member, agrees to that member A is added;?
In another example, member A initiates the request of addition the 2nd QQ groups, and due to addition the 2nd, QQ groups are not required to add by verifying
Enter, member A may be safe member at this time, it is also possible to abnormal member, wherein when member A the 2nd pet name in QQ groups with
When other members are consistent, member A is considered as abnormal member;In another example, member B invades the first QQ by illegal means
The pet name is revised as with originating member's a certain in group after addition the first QQ groups to obtain the trust of originating member in group by group
The pet name is consistent, and member B is considered as abnormal member at this time.
In the present embodiment, when identifying abnormal member, from trend, all members send alert messages.For example, identifying
When newcomer is abnormal member or identifies the abnormal member in originating member out, from trend administrator, founder, group other
Safe member, the abnormal member being identified send alert messages.Member in group can be made to learn abnormal member's in advance with this
Identity avoids making mistakes since administrator verifies, or does not take timely measure bring lag issues to abnormal member.
Wherein, the mode for sending alert messages can be automatic dispatch system message, be also possible to automatically initiate bulletin, with
Prompt member in group.
The content of alert messages may include the identity of abnormal member, can also include building to members all in group
View.In an example, alert messages can be that " verified, the member C that QQ number is XX is utilizing the pet name of member D, please manage
Reason person or founder are handled, hope group in member enhance your vigilance " etc. printed words.
In another example, alert messages can be caveat such as " every member are asked to pay attention to possible swindle ".
In the present embodiment, after issuing alert messages automatically, it can receive and execute from administrator or founder
Processing request.
In a scenario, if administrator or founder see alert messages, taboo can be taken to say abnormal member, is strong
System such as moves back group, pulls in blacklist at the processing, can also into group, other members send group's message or bulletin manually to remind in group again
Personnel further decrease the message confidence level of abnormal member with this;If the safe member in group sees alert messages, it is known that
The member for issuing unexpected message is that other people business cards are utilized, and on the one hand can voluntarily initiate to pull blacklist to abnormal member use
Processing request, on the other hand can initiate to make it enhance your vigilance the request of the notice of the member for being utilized business card;If it is abnormal at
Member sees alert messages, can learn that identity has been exposed through, can constrain abnormal member to a certain extent to member safe in group
Carry out deceptive practices.
In the present embodiment, after identifying abnormal member, risk markers can be made to abnormal member automatically.For example, adopting
Abnormal member is marked with different colors, or risk class is arranged to abnormal member, so that member can be in exception in group
It can be noted that publisher for abnormal member when member issues spoofing, malice inveigles message.
Wherein, the mode for risk class being arranged to abnormal member can be, and the abnormal member not given out information also is marked
It is denoted as low-risk, high risk is labeled as the abnormal member for giving out information or giving out information.It on the one hand can be with
Play the role of warning to abnormal member, reminding effect on the other hand can be played to safe member, another further aspect can remind group
Interior member advises in accordance with group, avoids due to jokeing between member or teasing member ignorant of the fact for other purposes, and gives
The maleficent chance of criminal.
In the present embodiment, before step S310, the method also includes:
Step S301: the permission of group relation chain is obtained.
Step S302: the permission for reading all member's data in the target session group is obtained.
Step S303: the automatic permission for sending system message is obtained.
Step S304: the automatic permission for sending bulletin is obtained.
Wherein, when receiving the acquisition request of administrator or founder, corresponding authority is obtained.
In an example, using QQ groups as target session group, need first to obtain the group relation chain for reading target session group
Permission, to obtain the permission for reading all member's data in the target session group, and then all members in available group
Data or individually obtain group in some member data.
Newcomer, originating member can be identified after the permission of member's data obtaining to read in group.
Obtain the automatic permission for sending system message, the automatic permission for sending bulletin is conducive to identifying abnormal member
Afterwards, alert messages are issued to the member in target session group automatically, it is not necessary to which member in group can be notified by administrator.
Wherein, the execution sequence before step S301- step S304 should not be construed as limiting the invention, in other realities
It applies in example, step S301 can be first carried out, then execute step S303, S302, S304, step S301 can also be first carried out, then hold
Row step S302, S304, S303.
Referring to Fig. 6, being the functional block diagram of alarming device shown in Fig. 2 110 provided in an embodiment of the present invention.This
The modules in alarming device 110 in embodiment are used to execute each step in above method embodiment.The warning
Device 110 includes judgment module 111, identification module 112, alarm module 113.
The judgment module 111 judges the target session for judging all members in target session group
Whether group has newcomer's addition.
The identification module 112, for being identified to the newcomer.
The alarm module 113, for issuing alert messages to all members.
After judgment module 111 judges whether there is newcomer's addition, judging result is sent to identification module 112, is identified
Module 112 can identify the newcomer in target session group, can also identify, know to the originating member in group
Chu not be after abnormal member, alarm module 113 issues alert messages automatically, reduces criminal with this and is sent out using other people business cards
The message confidence level of cloth message, avoids member in group from having dust thrown into the eyes.
In the present embodiment, the alarming device 110 further include obtain module 114, the acquisitions module 114 for obtain and
The relevant permission of target session group, the permission include reading the permission of group relation chain, reading the permission of member's data in group, certainly
The dynamic permission for sending system message, the automatic permission for sending bulletin.
The acquisition module 114, identification module 112, intercouples between alarm module 113 at judgment module 111, passes through
Judgment module 111, identification module 112, alarm module 113 and target session group can be associated by the acquisition module 114
Matching can be by alarming device 110 as immediate communication tool after acquiring corresponding permission by acquisition module 114
Plug-in unit, such as the software program of alarming device 110 is loaded on QQ server, with for users to use.
In a full instance, using QQ groups as being illustrated for target session group.Administrator passes through electric terminal
100 log in QQ number, select the QQ to be authorized group, load alarming device 110 provided in an embodiment of the present invention, by obtaining module
The 114 selection permissions to be obtained, the permission include reading the permission of group relation chain, reading the permission of member's data in group, certainly
The dynamic permission for sending system message, the automatic permission for sending bulletin, QQ server authorize corresponding authority.
In practice scene, administrator can add target session group application in the list of application of oneself.Administrator
After clicking target session group application, if being identified to unauthorized, group's application platform can prompt administrator to issue authorized application;
If identifying that administrator has authorized, the entry address of application can be jumped directly to, and ginseng as follows can be taken
Number:
//thirdparty.com/index.cgi? access_token=6d356e402420b0ec36df9918xxxx
Xxxx&expires_in=7776000&openid=55E8960584D19C24BB6C7DDEx xxxxxx&openkey=
6d356e402420b0ec36df9918xxxxxxxx&group_openid=22BDE4FE83 8B4A1BE01F3Bxxxxxx&
Appid=101234000&_wv=1027.
These parameters allow third party to save.Wherein appid, openkey, openid, group_openid can be with
It is parameter necessary to calling all QQ groups of open interfaces, these parameters can be used for the verifying of application identity and user identity.
Each parameter is briefly discussed below:
(1) appid, unique ID of application.The essential information of APP can be searched by appid.
(2) access_token is identical as openkey, and application can be called when jumping to application from platform
CanvasURL, platform can take the parameter after CanvasURL.The parameter can be directly transmitted to apply by platform, then by applying
Platform is fed back to as former state.
(3) expires_in parameter can illustrate how long openkey can fail later, and unit can be the second.
(4) openid is the unique identity of the user communicated with APP.It can call and answer when jumping to application from platform
CanvasURL, platform can take the parameter after CanvasURL.The parameter can be directly transmitted to apply by platform, then by
Using feeding back to platform as former state.
(5) group_openid is privately owned parameter, can be used as group's identity of specified target session group.
Wherein, above-mentioned platform can be server.
After judging to have obtained the permission for reading group relation chain, calling interface: get_group_members_auth, so
The return parameters ret that the backstage QQ provides is read afterwards, and the data of member in group is obtained according to the value of return parameters ret, passes through acquisition
To group in member data judge whether there is newcomer be added, member in group is identified, when recognizing abnormal member
Issue alert messages.It, can be with calling interface: send_sys_ if judging to have obtained the automatic permission for sending system message
Objmsg_auth, all members send system alert messages from trend group, if judging to have obtained the power that hair is announced
Limit, can call javascript script postAnnouncement, issue group from trend members and announce warning.
Alarming method for power, device and the electric terminal provided through this embodiment can utilize member in group in criminal
Business card when, identify the abnormal member using other people business cards, all members send alert messages from trend group, can be with this
The confidence level for reducing criminal further avoids causing to harass to member ignorant of the fact using the people of Member card in group,
Realize the protection to user.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), CD.It should be noted that
Herein, relational terms such as first and second and the like are used merely to an entity or operation and another entity
Or operation distinguishes, without necessarily requiring or implying between these entities or operation there are any this actual relationship or
Person's sequence.Moreover, the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, to make
Obtaining the process, method, article or equipment including a series of elements not only includes those elements, but also including not arranging clearly
Other element out, or further include for elements inherent to such a process, method, article, or device.Not more
In the case where limitation, the element that is limited by sentence "including a ...", it is not excluded that including process, the side of the element
There is also other identical elements in method, article or equipment.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (10)
1. a kind of alarming method for power, which is characterized in that the described method includes:
All members in target session group are judged, judge whether the target session group has newcomer's addition;
If so, then being identified to the newcomer;And
If the newcomer is identified as abnormal member, alert messages are issued to all members.
2. alarming method for power as described in claim 1, which is characterized in that described the step of being identified to the newcomer, packet
It includes:
Obtain the pet name of the newcomer;
Obtain the pet name of all originating members in the target session group;
The pet name of the newcomer and the pet name of the originating member are compared, if identical, judge the newcomer
For abnormal member.
3. alarming method for power as described in claim 1, which is characterized in that all members in target session group sentence
It is disconnected, judge whether the target session group has the step of newcomer's addition, comprising:
Obtain history membership table corresponding with target session group and current membership's table;
Identity in the history membership table, current membership's table is compared, comparing result is obtained;
It is confirmed whether there is newcomer's addition according to the comparing result.
4. alarming method for power as claimed in claim 3, which is characterized in that after the step of identifying the newcomer,
The method also includes:
If the newcomer is identified as non-abnormal member, the history membership table is updated.
5. alarming method for power as described in claim 1, which is characterized in that all members in target session group sentence
It is disconnected, judge whether the target session group has the step of newcomer's addition, comprising:
Obtain the addition time of all members in target session group;
Newcomer is judged whether there is according to the addition time to be added.
6. alarming method for power as described in claim 1, which is characterized in that the method also includes:
Judge the request for whether thering is member to propose the modification pet name in the target session group;
If so, carrying out identification to the member of the modification pet name;And
If the member of the modification pet name is identified as abnormal member, alert messages are issued to all members.
7. alarming method for power as claimed in any one of claims 1 to 6, which is characterized in that described to all in target session group
Before the step of member judges, the method also includes:
Obtain the permission for reading all member's data in the target session group;And/or
Obtain the automatic permission for sending system message;And/or
Obtain the automatic permission for sending bulletin.
8. a kind of alarming device, which is characterized in that the alarming device includes:
Judgment module judges whether the target session group has newly for judging all members in target session group
Member is added;
Identification module, for being identified to the newcomer;
Alarm module, for issuing alert messages to all members.
9. alarming device as claimed in claim 8, which is characterized in that the alarming device further includes obtaining module;
The acquisition module, for obtaining the permission for reading all member's data in the target session group;And/or for obtaining
The permission of automatic dispatch system message;And/or for obtaining the automatic permission for sending bulletin.
10. a kind of electric terminal, which is characterized in that the electric terminal includes:
Memory;
Processor;
The memory is used to store the program for supporting processor perform claim to require any one of 1-6 the method, the processing
Device is configurable for executing the program stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811020779.8A CN109005193A (en) | 2018-09-03 | 2018-09-03 | Alarming method for power, device and electric terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811020779.8A CN109005193A (en) | 2018-09-03 | 2018-09-03 | Alarming method for power, device and electric terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109005193A true CN109005193A (en) | 2018-12-14 |
Family
ID=64590920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811020779.8A Pending CN109005193A (en) | 2018-09-03 | 2018-09-03 | Alarming method for power, device and electric terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109005193A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111062824A (en) * | 2019-12-04 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Group member processing method and device, computer equipment and storage medium |
CN114401160A (en) * | 2022-01-19 | 2022-04-26 | 腾讯科技(深圳)有限公司 | Data processing method, device, server, terminal and storage medium |
CN114979975A (en) * | 2022-05-07 | 2022-08-30 | 深圳市灵镜技术有限公司 | Cluster talkback access method and system based on big data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102025550A (en) * | 2010-12-20 | 2011-04-20 | 中兴通讯股份有限公司 | System and method for managing data in distributed cluster |
CN104933050A (en) * | 2014-03-17 | 2015-09-23 | 腾讯科技(深圳)有限公司 | Method and system for executing operations to new user of group |
CN105323144A (en) * | 2014-07-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method and system for prompting message abnormity in instant messenger |
CN105871702A (en) * | 2016-05-31 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Information identification method and server |
WO2017044510A1 (en) * | 2015-09-08 | 2017-03-16 | Microsoft Technology Licensing, Llc | Trust status of a communication session |
CN107527072A (en) * | 2017-08-31 | 2017-12-29 | 北京小米移动软件有限公司 | Determine method and device, the electronic equipment of similar head portrait |
-
2018
- 2018-09-03 CN CN201811020779.8A patent/CN109005193A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102025550A (en) * | 2010-12-20 | 2011-04-20 | 中兴通讯股份有限公司 | System and method for managing data in distributed cluster |
CN104933050A (en) * | 2014-03-17 | 2015-09-23 | 腾讯科技(深圳)有限公司 | Method and system for executing operations to new user of group |
CN105323144A (en) * | 2014-07-16 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method and system for prompting message abnormity in instant messenger |
WO2017044510A1 (en) * | 2015-09-08 | 2017-03-16 | Microsoft Technology Licensing, Llc | Trust status of a communication session |
CN105871702A (en) * | 2016-05-31 | 2016-08-17 | 腾讯科技(深圳)有限公司 | Information identification method and server |
CN107527072A (en) * | 2017-08-31 | 2017-12-29 | 北京小米移动软件有限公司 | Determine method and device, the electronic equipment of similar head portrait |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111062824A (en) * | 2019-12-04 | 2020-04-24 | 腾讯科技(深圳)有限公司 | Group member processing method and device, computer equipment and storage medium |
CN111062824B (en) * | 2019-12-04 | 2023-08-18 | 腾讯科技(深圳)有限公司 | Group member processing method, device, computer equipment and storage medium |
CN114401160A (en) * | 2022-01-19 | 2022-04-26 | 腾讯科技(深圳)有限公司 | Data processing method, device, server, terminal and storage medium |
CN114401160B (en) * | 2022-01-19 | 2022-12-02 | 腾讯科技(深圳)有限公司 | Data processing method, device, server, terminal and storage medium |
CN114979975A (en) * | 2022-05-07 | 2022-08-30 | 深圳市灵镜技术有限公司 | Cluster talkback access method and system based on big data |
CN114979975B (en) * | 2022-05-07 | 2023-09-19 | 深圳市灵镜技术有限公司 | Cluster talkback admittance method and system based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108777719A (en) | Entirety is intelligence community platform | |
CN109005193A (en) | Alarming method for power, device and electric terminal | |
CN105721426B (en) | Access authorization methods, server, target terminal equipment and the system of terminal device | |
US10028147B1 (en) | Dynamic defenses to secure a proximity-based communication system of linked wireless-enabled devices | |
CN103313429A (en) | Processing method for recognizing fabricated WIFI (Wireless Fidelity) hotspot | |
CN110351237B (en) | Honeypot method and device for numerical control machine tool | |
CN104284334B (en) | A kind of control method and equipment of WiFi protection settings | |
CN106663363B (en) | A kind of intelligent alarm system | |
CN105100048B (en) | WiFi network secure authentication method, server, client terminal device and system | |
CN108966216B (en) | Mobile communication method and system applied to power distribution network | |
CN112165683B (en) | Communication distance early warning method and device | |
WO2017084456A1 (en) | Wifi hotspot processing method, device and system | |
CN107357821B (en) | System management method, device and storage medium | |
CN104348804B (en) | The method, apparatus and system of offline automatic locking service | |
CN115550049A (en) | Vulnerability detection method and system for Internet of things equipment | |
CN113572757B (en) | Server access risk monitoring method and device | |
CN106331060B (en) | WIFI-based deployment and control method and system | |
CN111193900A (en) | Monitoring video sharing method and device and storage medium | |
CN110601850B (en) | Scenic spot information recording method, related equipment and storage medium | |
CN110378120A (en) | Application programming interfaces attack detection method, device and readable storage medium storing program for executing | |
CN110048905B (en) | Internet of things equipment communication mode identification method and device | |
CN112948804B (en) | Program control method, device and computer readable storage medium | |
CN108846281A (en) | Root authority acquisition methods, device, terminal device and storage medium | |
CN111343193B (en) | Cloud network port security protection method and device, electronic equipment and storage medium | |
CN112911207A (en) | Calling method and intelligent talkback system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181214 |
|
RJ01 | Rejection of invention patent application after publication |