CN109005193A - Alarming method for power, device and electric terminal - Google Patents

Alarming method for power, device and electric terminal Download PDF

Info

Publication number
CN109005193A
CN109005193A CN201811020779.8A CN201811020779A CN109005193A CN 109005193 A CN109005193 A CN 109005193A CN 201811020779 A CN201811020779 A CN 201811020779A CN 109005193 A CN109005193 A CN 109005193A
Authority
CN
China
Prior art keywords
newcomer
target session
group
session group
members
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811020779.8A
Other languages
Chinese (zh)
Inventor
蔡兵
吉向东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University of Arts and Science
Original Assignee
Hubei University of Arts and Science
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University of Arts and Science filed Critical Hubei University of Arts and Science
Priority to CN201811020779.8A priority Critical patent/CN109005193A/en
Publication of CN109005193A publication Critical patent/CN109005193A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission

Abstract

The embodiment of the present invention provides a kind of alarming method for power, device and electric terminal, in an example, which comprises judge all members in target session group, judge whether the target session group has newcomer's addition;If so, then the newcomer is identified;And if the newcomer is identified as abnormal member, issues alert messages to all members.The message confidence level that abnormal member can be reduced by the alarming method for power, prevents criminal from interfering member in group, avoids deception of the member by criminal in group, and then leads to that property loss occurs.

Description

Alarming method for power, device and electric terminal
Technical field
The present invention relates to instant messaging fields, in particular to a kind of alarming method for power, device and electric terminal.
Background technique
With the development of network technology, occur diversified instant messaging tools on the market, is more and more using While communication is got used to using a network in family, criminal can be issued spoofing by instant messaging tools, maliciously be lured Information is deceived, causes to harass to member ignorant of the fact, even results in financial losses.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of alarming method for power, device and electric terminal, not When method molecule is using other people business card publication spoofings, malice trick information, the message confidence level of criminal is reduced.
In a first aspect, the embodiment of the invention provides a kind of alarming method for power, which comprises
All members in target session group are judged, judge whether the target session group has newcomer's addition;
If so, then being identified to the newcomer;And
If the newcomer is identified as abnormal member, alert messages are issued to all members.
With reference to first aspect, in alternative embodiment of the invention, the described the step of newcomer is identified, packet It includes:
Obtain the pet name of the newcomer;
Obtain the pet name of all originating members in the target session group;
The pet name of the newcomer and the pet name of the originating member are compared, if identical, judged described new Member is abnormal member.
With reference to first aspect, in alternative embodiment of the invention, all members in target session group are carried out Judgement, judges whether the target session group has the step of newcomer's addition, comprising:
Obtain history membership table corresponding with target session group and current membership's table;
Identity in the history membership table, current membership's table is compared, comparing result is obtained;
It is confirmed whether there is newcomer's addition according to the comparing result.
With reference to first aspect, in alternative embodiment of the invention, after the step of identifying the newcomer, The method also includes:
If the newcomer is identified as non-abnormal member, the history membership table is updated.
With reference to first aspect, in alternative embodiment of the invention, all members in target session group are carried out Judgement, judges whether the target session group has the step of newcomer's addition, comprising:
Obtain the addition time of all members in target session group;
Newcomer is judged whether there is according to the addition time to be added.
With reference to first aspect, in alternative embodiment of the invention, the method also includes:
Judge the request for whether thering is member to propose the modification pet name in the target session group;
If so, carrying out identification to the member of the modification pet name;And
If the member of the modification pet name is identified as abnormal member, alert messages are issued to all members.
With reference to first aspect, in alternative embodiment of the invention, all members in target session group into Before the step of row judges, the method also includes:
Obtain the permission for reading all member's data in the target session group;And/or
Obtain the automatic permission for sending system message;And/or
Obtain the automatic permission for sending bulletin.
Second aspect, the embodiment of the invention provides a kind of alarming device, the alarming device includes:
Judgment module, for all members in target session group to be judged with whether judge the target session group There is newcomer's addition;
Identification module, for being identified to the newcomer;
Alarm module, for issuing alert messages to all members.
In conjunction with second aspect, in alternative embodiment of the invention, the alarming device further includes obtaining module;
The acquisition module, for obtaining the permission for reading all member's data in the target session group;And/or it is used for Obtain the automatic permission for sending system message;And/or for obtaining the automatic permission for sending bulletin.
The third aspect, the embodiment of the invention provides a kind of electric terminal, the electric terminal includes:
Memory;
Processor;
The memory is used to store the program for supporting processor to execute the above method, the processor is configured to being used for Execute the program stored in the memory.
Compared with prior art, a kind of alarming method for power, device and electric terminal provided in an embodiment of the present invention, it can be determined that Whether there is the newcomer into target session group out, identification may further be carried out to newcomer, if the newcomer falsely uses The newcomer can be regarded as abnormal member, and issue alert messages to all members by other people business cards in group.Whether in group Other members are it can be seen that alert messages on the one hand can be right after seeing alert messages in administrator, founder or group Abnormal member makes subsequent processing, on the other hand can also send prompting message to the member for being falsely used business card, can be dropped with this The message confidence level of low exception member, prevents criminal from interfering member in group, avoids in group member by illegal point The deception of son, and then lead to that property loss occurs.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram that server-side provided in an embodiment of the present invention and client interact.
Fig. 2 is the structural block diagram of electric terminal provided in an embodiment of the present invention.
Fig. 3 is the flow chart of alarming method for power provided in an embodiment of the present invention.
Fig. 4 is the detail flowchart of the step S310 of alarming method for power provided in an embodiment of the present invention.
Fig. 5 is the partial process view of alarming method for power provided in an embodiment of the present invention.
Fig. 6 is the functional block diagram of alarming device provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
As shown in Figure 1, being the schematic diagram that server-side 100 provided in an embodiment of the present invention is interacted with client 200.Institute It states server-side 100 to be communicatively coupled by network and one or more clients 200, to carry out data communication or interaction.Institute The correspondence equipment for stating server-side 100 can be network server, database server etc..The correspondence equipment of the client 200 It can be PC (personal computer, PC), tablet computer, smart phone, personal digital assistant (personal Digital assistant, PDA) etc..Wherein, user can log in the account of oneself by client 200, wherein each Account corresponds to a unique identity, and user can carry out data interaction by account and server-side 100.Implement in the present invention In example, client 200 can be the front end of network application, and server-side 100 can be the rear end of network application.
As shown in Fig. 2, being the structural block diagram of electric terminal 100 provided in an embodiment of the present invention.The electric terminal 100 wraps Include alarming device 110, memory 120, storage control 130, processor 140 and network unit 150 etc..The memory 120, storage control 130, processor 140, network unit 150 are directly or indirectly electrically connected between each other, to realize number According to transmission or interaction.For example, these elements can be realized electrically between each other by one or more communication bus or signal wire Connection.The alarming device 110 includes that at least one can be stored in the storage in the form of software or firmware (firmware) In device 120 or the software function mould that is solidificated in the operating system (operating system, OS) of the electric terminal 100 Block.The processor 140 is used to execute the executable module stored in memory 120, such as the alarming device 110 includes Software function module or computer program.
Wherein, the memory 120 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only memory (Read Only Memory, ROM), programmable read only memory (Programmable Read-Only Memory, PROM), erasable read-only memory (Erasable Programmable Read-Only Memory, EPROM), electricallyerasable ROM (EEROM) (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 120 is for storing program, the processor 140 after receiving and executing instruction, Execute described program.Processor 140 and other possible components can be in storage controls 130 to the access of memory 120 Control is lower to be carried out.Method performed by the electric terminal 100 that defines of process that any embodiment of the embodiment of the present invention discloses can be with It is realized applied in processor 140, or by processor 140.
The processor 140 may be a kind of IC chip, the processing capacity with signal.Above-mentioned processor 140 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network processes Device (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (DSP), specific integrated circuit (ASIC), field programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor 140 is also possible to any conventional processor etc..
The network unit 150 for receiving and transmitting network signal, network signal may include wireless signal or Wire signal.
It will appreciated by the skilled person that structure shown in Fig. 2 is only to illustrate, not to electric terminal 100 Structure cause to limit.For example, electric terminal 100 may also include the more perhaps less component than shown in Fig. 2 or have The configuration different from shown in Fig. 2.In the embodiment of the present invention, electric terminal 100 can be server, personal computer, movement Equipment, intelligent wearable device, mobile unit etc. can connect network and the equipment with calculation processing power.In certain embodiment party In formula, terminal device can also be not limited to physical equipment, such as can also be virtual machine, virtual server etc..The present invention is implemented Server-side 100 in example can run on above-mentioned electric terminal 100.
Referring to Fig. 3, being the alarming method for power provided in an embodiment of the present invention applied to electric terminal 100 shown in Fig. 2 Flow chart.Detailed process shown in Fig. 3 will be described in detail below.
Step S310: judging all members in target session group, judges whether the target session group has newly Member is added.
Step S320: if so, then being identified to the newcomer.
Step S330: if the newcomer is identified as abnormal member, alert messages are issued to all members.
It may include crowd administrator, rank-and-file member in the target session group in the present embodiment, the group administrator can be with It is the founder of target session group, is also possible to the member that founder assigns administration authority.
Wherein, each member that target session group is added has a unique identity, can be with by unique identity Member is distinguished, unique identity can be the correspondence account of cell-phone number and instant messaging tools.Wherein, Instant Messenger The correspondence account of letter tool can be QQ number, WeChat ID, nail nail account, Netease's cloud letter, Skype account etc..In an example, The target session group is QQ groups, and the identity is QQ number, and the member in QQ crowds is using the pet name as business card in group.
In another example, the target session group is that Netease's cloud believes advanced group, and the identity is accid account Number, Netease's cloud believes the member in advanced group using user's pet name (name) as business card in group.
In another example, the target session group is nailing sections door, and the identity is the unique ID of employee (userID), the member in department is using member Name (name) as business card in group.
Data by reading all members in target session group judges members all in group, judges whether there is new Target session group is added in member.Such as addition time of all members, unique identity, business card can be read etc., wherein it can To have known whether newcomer's addition according to addition time or unique identity.In the case where there is newcomer's addition, read The data of newcomer is taken, to carry out identification and monitoring to newcomer, if newcomer and the business card using originating member in group Member in group is cheated, alert messages are issued to members all in group.Wherein, known to newcomer can be identification otherwise Unique identity, business card, addition time of newcomer etc..
Due to sporadically there is newcomer's addition in target session group, when one newcomer of every addition can to it is described it is new at Member carries out identification.When recognizing newcomer is abnormal member, alert messages can be sent to all members, be reduced with this The confidence level of abnormal member avoids interfering originating member in group when abnormal member sends out message, so cause in group at Member has dust thrown into the eyes or occurs property loss.
If identifying, the newcomer just clashes business card when being added with the business card of other members in group, described in judgement Newcomer is abnormal member;It, will be described if the newcomer does not use business card identical with other members in group when being added Newcomer is temporarily considered as safe member, next member be added target session group before, if the newcomer by its business card more It is changed to business card identical as the business card of other members in group, judges the newcomer for abnormal member.Wherein, business card described in business card can To be the pet name, user name etc..
In a scenario, member agrees to that target session group is just added by administrator.Enter group and require to include do not bear the same name, is full Sufficient pre-set level exists and recommends member etc..Wherein, if Member card has conflict, it may result in originating member in group and be difficult to Distinguish two members of business card conflict;If preset standard is not achieved in membership grade, the management of target session group may be will increase Burden;If undesirable without referrer or referrer, threat may be brought to originating member in group, lead to member Data leakage etc..It is considered as safe member by the member that administrator verifies and is added, for mesh is added by administrator's verifying Mark session group newcomer, during being verified through administrator, if in the business card of member to be added and group originating member name Piece has conflict, and the member to be added is caused to be unsatisfactory for requiring into group, and administrator can send prompting message to member to be added, with Member to be added is set to change business card.
Under another scene, target session group is not added by administrator's verifying in newcomer, is verified without administrator And the member being added may be safe member, it is also possible to abnormal member.For example, certain target session groups are due to being arranged to pair The attribute of outer opening, user need not move through administrator agree to can into group, if by this method into the member of group in group its The business card of his member clashes business card, is judged as abnormal member;Even if being needed for another example certain target session groups are provided with The program of verifying, but due to by criminal using hacking technique invade target session group, the correspondence business card of criminal with When the business card of other members is overlapped, business card is judged as abnormal member.
Under other scenes, no matter target session group is added as newcomer in member in which way, all it is likely to become different Normal member.
In the present embodiment, using the pet name as target session group in business card for be illustrated.
In the present embodiment, whether in order to judge to have in target session group newcomer to be added, there are two types of embodiments.
The first, is judged according to identity, as shown in figure 4, step S310 includes step S311-S313.
Step S311: history membership table corresponding with target session group and current membership's table, the history member are obtained Record has the identity of member in table, current membership's table.
Step S312: the identity in the history membership table, current membership's table is compared, and obtains comparison knot Fruit.
Step S313: it is confirmed whether there is newcomer's addition according to the comparing result.
Wherein, the identity for having member in the group under historical time node is recorded in the history membership table, it is described to work as Preceding membership table record has the identity of member in the group under current time node.By obtaining and comparing in two membership tables Identity, it can be determined that whether have newcomer that target session group is added.If all identity in current membership's table with go through All identity in history membership table are identical, then judge from a upper timing node until current time node, without new Member is added, wherein a upper timing node indicates historical time node corresponding with the history membership table.If current membership's table Not the phenomenon that middle identity there are in identity and history membership table is not inconsistent, further, if existing in current membership's table The identity not having in history membership table, it can be determined that have newcomer's addition, with this can solve member move back it is right caused by group Than difficult problem.
In one embodiment, period regular time can be set with two membership tables of timing acquisition, in another kind In embodiment, trigger condition can be set, obtain two membership tables when a triggering condition is met, the trigger condition can be with It is the application instruction for receiving Client-initiated and obtaining membership table.
In the present embodiment, after obtaining history membership table, current membership's table, if recognizing the newcomer is non-exception Member can be updated history membership table.After having compared two membership tables and having obtained comparing result, can by history at Information update in member's table is the information of current membership's table, compares two membership tables next time to facilitate.
It second, is directly carried out judging whether there is newcomer addition target session group according to the addition time of member.It is logical The addition time for obtaining all members in target session group is spent, newcomer is judged whether there is according to the addition time and is added.
After obtaining the addition time of all members, filters out member the latest and the time is added.Judgement movement is executed each time When only needs acquisition, and the time is added in member the latest, then the member the latest currently acquired addition time and last time are obtained To member the latest be added the time and be compared, if the member the latest that currently acquires is added the time and is later than the last time and obtains The time arrived, it is possible to determine that have newcomer's addition.In other embodiments, when can not have to obtain the addition of all members Between, member the latest can be obtained by the sortord that instant messaging tools itself provides, the time is added, to judge whether there is Newcomer is added.
In order to judge whether the newcomer in target session group is abnormal member, in the present embodiment, step S320 includes step Rapid S321-S323.
Step S321: the pet name of the newcomer is obtained.
Step S322: the pet name of all originating members in the target session group is obtained.
Step S323: the pet name of the newcomer and the pet name of the originating member are compared, if identical, are sentenced The newcomer of breaking is abnormal member.
It is carried out pair by obtaining the pet name of newcomer, originating member, and by the pet name of newcomer and the pet name of originating member Than, it can be determined that whether newcomer is abnormal member in group, when the pet name of newcomer and the pet name difference of originating member, newly at Member is non-abnormal member, and when the pet name of newcomer is identical as the pet name of originating member, newcomer is abnormal member.When confirmation is new After member is abnormal member, alert messages can be sent to all members in target session group, originating member in group be avoided to receive To the deception of abnormal member.
If newcomer is non-abnormal member, can continue to identify next member that target session group is added, Or, being identified to the originating member for being identified as safe member.Once identify the identity of abnormal member, it can be to all Member sends alert messages.
Just other members in group are interfered using other people business cards for a period of time to avoid member from hiding after entering group, are asked Refering to Fig. 5, the method also includes:
Step S340: judge the request for whether thering is member to propose the modification pet name in the target session group.
Step S350: if so, carrying out identification to the member of the modification pet name.
Step S360: if the member of the modification pet name is identified as abnormal member, alert messages are issued to all members.
When receiving the request of the modification pet name of claimant's initiation, can according to the identity of claimant, the pet name into Row identification, when recognizing there are when the identical phenomenon of the pet name, into target session group, all members send alert messages.
In a scenario, when certain member for having become originating member in group is intended to make member in group using other people business cards When at interference, the request of the modification pet name can be proposed, include the original pet name, the new pet name, identity of claimant in the request Etc. information.If the new pet name is identical as the pet name of other members in group, judges there is abnormal member in group, further pass through identity mark After knowledge confirms the claimant that the identity of exception member is the modification pet name, all members alert messages can be issued into group, with this It reduces and falsely uses the confidence level of other people business card persons, avoid in group member from being hard to tell the true and false and come to harm or occur property loss.
The beneficial effect is that no matter the member of the modification pet name is newcomer, as long as finding in group at any time There are the identical phenomenons of the pet name, it is believed that there is abnormal member in group, may further be confirmed by identity it is abnormal at Then the identity of member issues alert messages to members all in group, member in group is avoided to have dust thrown into the eyes, and then lead to that property occurs Loss.
In an example, member A initiates that the first QQ group requests are added, due to be added the first QQ group need to be by verifying It can be added, after the first QQ crowds of administrators verify member A, member A is denoted as safe member, agrees to that member A is added;? In another example, member A initiates the request of addition the 2nd QQ groups, and due to addition the 2nd, QQ groups are not required to add by verifying Enter, member A may be safe member at this time, it is also possible to abnormal member, wherein when member A the 2nd pet name in QQ groups with When other members are consistent, member A is considered as abnormal member;In another example, member B invades the first QQ by illegal means The pet name is revised as with originating member's a certain in group after addition the first QQ groups to obtain the trust of originating member in group by group The pet name is consistent, and member B is considered as abnormal member at this time.
In the present embodiment, when identifying abnormal member, from trend, all members send alert messages.For example, identifying When newcomer is abnormal member or identifies the abnormal member in originating member out, from trend administrator, founder, group other Safe member, the abnormal member being identified send alert messages.Member in group can be made to learn abnormal member's in advance with this Identity avoids making mistakes since administrator verifies, or does not take timely measure bring lag issues to abnormal member.
Wherein, the mode for sending alert messages can be automatic dispatch system message, be also possible to automatically initiate bulletin, with Prompt member in group.
The content of alert messages may include the identity of abnormal member, can also include building to members all in group View.In an example, alert messages can be that " verified, the member C that QQ number is XX is utilizing the pet name of member D, please manage Reason person or founder are handled, hope group in member enhance your vigilance " etc. printed words.
In another example, alert messages can be caveat such as " every member are asked to pay attention to possible swindle ".
In the present embodiment, after issuing alert messages automatically, it can receive and execute from administrator or founder Processing request.
In a scenario, if administrator or founder see alert messages, taboo can be taken to say abnormal member, is strong System such as moves back group, pulls in blacklist at the processing, can also into group, other members send group's message or bulletin manually to remind in group again Personnel further decrease the message confidence level of abnormal member with this;If the safe member in group sees alert messages, it is known that The member for issuing unexpected message is that other people business cards are utilized, and on the one hand can voluntarily initiate to pull blacklist to abnormal member use Processing request, on the other hand can initiate to make it enhance your vigilance the request of the notice of the member for being utilized business card;If it is abnormal at Member sees alert messages, can learn that identity has been exposed through, can constrain abnormal member to a certain extent to member safe in group Carry out deceptive practices.
In the present embodiment, after identifying abnormal member, risk markers can be made to abnormal member automatically.For example, adopting Abnormal member is marked with different colors, or risk class is arranged to abnormal member, so that member can be in exception in group It can be noted that publisher for abnormal member when member issues spoofing, malice inveigles message.
Wherein, the mode for risk class being arranged to abnormal member can be, and the abnormal member not given out information also is marked It is denoted as low-risk, high risk is labeled as the abnormal member for giving out information or giving out information.It on the one hand can be with Play the role of warning to abnormal member, reminding effect on the other hand can be played to safe member, another further aspect can remind group Interior member advises in accordance with group, avoids due to jokeing between member or teasing member ignorant of the fact for other purposes, and gives The maleficent chance of criminal.
In the present embodiment, before step S310, the method also includes:
Step S301: the permission of group relation chain is obtained.
Step S302: the permission for reading all member's data in the target session group is obtained.
Step S303: the automatic permission for sending system message is obtained.
Step S304: the automatic permission for sending bulletin is obtained.
Wherein, when receiving the acquisition request of administrator or founder, corresponding authority is obtained.
In an example, using QQ groups as target session group, need first to obtain the group relation chain for reading target session group Permission, to obtain the permission for reading all member's data in the target session group, and then all members in available group Data or individually obtain group in some member data.
Newcomer, originating member can be identified after the permission of member's data obtaining to read in group.
Obtain the automatic permission for sending system message, the automatic permission for sending bulletin is conducive to identifying abnormal member Afterwards, alert messages are issued to the member in target session group automatically, it is not necessary to which member in group can be notified by administrator.
Wherein, the execution sequence before step S301- step S304 should not be construed as limiting the invention, in other realities It applies in example, step S301 can be first carried out, then execute step S303, S302, S304, step S301 can also be first carried out, then hold Row step S302, S304, S303.
Referring to Fig. 6, being the functional block diagram of alarming device shown in Fig. 2 110 provided in an embodiment of the present invention.This The modules in alarming device 110 in embodiment are used to execute each step in above method embodiment.The warning Device 110 includes judgment module 111, identification module 112, alarm module 113.
The judgment module 111 judges the target session for judging all members in target session group Whether group has newcomer's addition.
The identification module 112, for being identified to the newcomer.
The alarm module 113, for issuing alert messages to all members.
After judgment module 111 judges whether there is newcomer's addition, judging result is sent to identification module 112, is identified Module 112 can identify the newcomer in target session group, can also identify, know to the originating member in group Chu not be after abnormal member, alarm module 113 issues alert messages automatically, reduces criminal with this and is sent out using other people business cards The message confidence level of cloth message, avoids member in group from having dust thrown into the eyes.
In the present embodiment, the alarming device 110 further include obtain module 114, the acquisitions module 114 for obtain and The relevant permission of target session group, the permission include reading the permission of group relation chain, reading the permission of member's data in group, certainly The dynamic permission for sending system message, the automatic permission for sending bulletin.
The acquisition module 114, identification module 112, intercouples between alarm module 113 at judgment module 111, passes through Judgment module 111, identification module 112, alarm module 113 and target session group can be associated by the acquisition module 114 Matching can be by alarming device 110 as immediate communication tool after acquiring corresponding permission by acquisition module 114 Plug-in unit, such as the software program of alarming device 110 is loaded on QQ server, with for users to use.
In a full instance, using QQ groups as being illustrated for target session group.Administrator passes through electric terminal 100 log in QQ number, select the QQ to be authorized group, load alarming device 110 provided in an embodiment of the present invention, by obtaining module The 114 selection permissions to be obtained, the permission include reading the permission of group relation chain, reading the permission of member's data in group, certainly The dynamic permission for sending system message, the automatic permission for sending bulletin, QQ server authorize corresponding authority.
In practice scene, administrator can add target session group application in the list of application of oneself.Administrator After clicking target session group application, if being identified to unauthorized, group's application platform can prompt administrator to issue authorized application; If identifying that administrator has authorized, the entry address of application can be jumped directly to, and ginseng as follows can be taken Number:
//thirdparty.com/index.cgi? access_token=6d356e402420b0ec36df9918xxxx Xxxx&expires_in=7776000&openid=55E8960584D19C24BB6C7DDEx xxxxxx&openkey= 6d356e402420b0ec36df9918xxxxxxxx&group_openid=22BDE4FE83 8B4A1BE01F3Bxxxxxx& Appid=101234000&_wv=1027.
These parameters allow third party to save.Wherein appid, openkey, openid, group_openid can be with It is parameter necessary to calling all QQ groups of open interfaces, these parameters can be used for the verifying of application identity and user identity. Each parameter is briefly discussed below:
(1) appid, unique ID of application.The essential information of APP can be searched by appid.
(2) access_token is identical as openkey, and application can be called when jumping to application from platform CanvasURL, platform can take the parameter after CanvasURL.The parameter can be directly transmitted to apply by platform, then by applying Platform is fed back to as former state.
(3) expires_in parameter can illustrate how long openkey can fail later, and unit can be the second.
(4) openid is the unique identity of the user communicated with APP.It can call and answer when jumping to application from platform CanvasURL, platform can take the parameter after CanvasURL.The parameter can be directly transmitted to apply by platform, then by Using feeding back to platform as former state.
(5) group_openid is privately owned parameter, can be used as group's identity of specified target session group.
Wherein, above-mentioned platform can be server.
After judging to have obtained the permission for reading group relation chain, calling interface: get_group_members_auth, so The return parameters ret that the backstage QQ provides is read afterwards, and the data of member in group is obtained according to the value of return parameters ret, passes through acquisition To group in member data judge whether there is newcomer be added, member in group is identified, when recognizing abnormal member Issue alert messages.It, can be with calling interface: send_sys_ if judging to have obtained the automatic permission for sending system message Objmsg_auth, all members send system alert messages from trend group, if judging to have obtained the power that hair is announced Limit, can call javascript script postAnnouncement, issue group from trend members and announce warning.
Alarming method for power, device and the electric terminal provided through this embodiment can utilize member in group in criminal Business card when, identify the abnormal member using other people business cards, all members send alert messages from trend group, can be with this The confidence level for reducing criminal further avoids causing to harass to member ignorant of the fact using the people of Member card in group, Realize the protection to user.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), CD.It should be noted that Herein, relational terms such as first and second and the like are used merely to an entity or operation and another entity Or operation distinguishes, without necessarily requiring or implying between these entities or operation there are any this actual relationship or Person's sequence.Moreover, the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, to make Obtaining the process, method, article or equipment including a series of elements not only includes those elements, but also including not arranging clearly Other element out, or further include for elements inherent to such a process, method, article, or device.Not more In the case where limitation, the element that is limited by sentence "including a ...", it is not excluded that including process, the side of the element There is also other identical elements in method, article or equipment.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (10)

1. a kind of alarming method for power, which is characterized in that the described method includes:
All members in target session group are judged, judge whether the target session group has newcomer's addition;
If so, then being identified to the newcomer;And
If the newcomer is identified as abnormal member, alert messages are issued to all members.
2. alarming method for power as described in claim 1, which is characterized in that described the step of being identified to the newcomer, packet It includes:
Obtain the pet name of the newcomer;
Obtain the pet name of all originating members in the target session group;
The pet name of the newcomer and the pet name of the originating member are compared, if identical, judge the newcomer For abnormal member.
3. alarming method for power as described in claim 1, which is characterized in that all members in target session group sentence It is disconnected, judge whether the target session group has the step of newcomer's addition, comprising:
Obtain history membership table corresponding with target session group and current membership's table;
Identity in the history membership table, current membership's table is compared, comparing result is obtained;
It is confirmed whether there is newcomer's addition according to the comparing result.
4. alarming method for power as claimed in claim 3, which is characterized in that after the step of identifying the newcomer, The method also includes:
If the newcomer is identified as non-abnormal member, the history membership table is updated.
5. alarming method for power as described in claim 1, which is characterized in that all members in target session group sentence It is disconnected, judge whether the target session group has the step of newcomer's addition, comprising:
Obtain the addition time of all members in target session group;
Newcomer is judged whether there is according to the addition time to be added.
6. alarming method for power as described in claim 1, which is characterized in that the method also includes:
Judge the request for whether thering is member to propose the modification pet name in the target session group;
If so, carrying out identification to the member of the modification pet name;And
If the member of the modification pet name is identified as abnormal member, alert messages are issued to all members.
7. alarming method for power as claimed in any one of claims 1 to 6, which is characterized in that described to all in target session group Before the step of member judges, the method also includes:
Obtain the permission for reading all member's data in the target session group;And/or
Obtain the automatic permission for sending system message;And/or
Obtain the automatic permission for sending bulletin.
8. a kind of alarming device, which is characterized in that the alarming device includes:
Judgment module judges whether the target session group has newly for judging all members in target session group Member is added;
Identification module, for being identified to the newcomer;
Alarm module, for issuing alert messages to all members.
9. alarming device as claimed in claim 8, which is characterized in that the alarming device further includes obtaining module;
The acquisition module, for obtaining the permission for reading all member's data in the target session group;And/or for obtaining The permission of automatic dispatch system message;And/or for obtaining the automatic permission for sending bulletin.
10. a kind of electric terminal, which is characterized in that the electric terminal includes:
Memory;
Processor;
The memory is used to store the program for supporting processor perform claim to require any one of 1-6 the method, the processing Device is configurable for executing the program stored in the memory.
CN201811020779.8A 2018-09-03 2018-09-03 Alarming method for power, device and electric terminal Pending CN109005193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811020779.8A CN109005193A (en) 2018-09-03 2018-09-03 Alarming method for power, device and electric terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811020779.8A CN109005193A (en) 2018-09-03 2018-09-03 Alarming method for power, device and electric terminal

Publications (1)

Publication Number Publication Date
CN109005193A true CN109005193A (en) 2018-12-14

Family

ID=64590920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811020779.8A Pending CN109005193A (en) 2018-09-03 2018-09-03 Alarming method for power, device and electric terminal

Country Status (1)

Country Link
CN (1) CN109005193A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062824A (en) * 2019-12-04 2020-04-24 腾讯科技(深圳)有限公司 Group member processing method and device, computer equipment and storage medium
CN114401160A (en) * 2022-01-19 2022-04-26 腾讯科技(深圳)有限公司 Data processing method, device, server, terminal and storage medium
CN114979975A (en) * 2022-05-07 2022-08-30 深圳市灵镜技术有限公司 Cluster talkback access method and system based on big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025550A (en) * 2010-12-20 2011-04-20 中兴通讯股份有限公司 System and method for managing data in distributed cluster
CN104933050A (en) * 2014-03-17 2015-09-23 腾讯科技(深圳)有限公司 Method and system for executing operations to new user of group
CN105323144A (en) * 2014-07-16 2016-02-10 腾讯科技(深圳)有限公司 Method and system for prompting message abnormity in instant messenger
CN105871702A (en) * 2016-05-31 2016-08-17 腾讯科技(深圳)有限公司 Information identification method and server
WO2017044510A1 (en) * 2015-09-08 2017-03-16 Microsoft Technology Licensing, Llc Trust status of a communication session
CN107527072A (en) * 2017-08-31 2017-12-29 北京小米移动软件有限公司 Determine method and device, the electronic equipment of similar head portrait

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025550A (en) * 2010-12-20 2011-04-20 中兴通讯股份有限公司 System and method for managing data in distributed cluster
CN104933050A (en) * 2014-03-17 2015-09-23 腾讯科技(深圳)有限公司 Method and system for executing operations to new user of group
CN105323144A (en) * 2014-07-16 2016-02-10 腾讯科技(深圳)有限公司 Method and system for prompting message abnormity in instant messenger
WO2017044510A1 (en) * 2015-09-08 2017-03-16 Microsoft Technology Licensing, Llc Trust status of a communication session
CN105871702A (en) * 2016-05-31 2016-08-17 腾讯科技(深圳)有限公司 Information identification method and server
CN107527072A (en) * 2017-08-31 2017-12-29 北京小米移动软件有限公司 Determine method and device, the electronic equipment of similar head portrait

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111062824A (en) * 2019-12-04 2020-04-24 腾讯科技(深圳)有限公司 Group member processing method and device, computer equipment and storage medium
CN111062824B (en) * 2019-12-04 2023-08-18 腾讯科技(深圳)有限公司 Group member processing method, device, computer equipment and storage medium
CN114401160A (en) * 2022-01-19 2022-04-26 腾讯科技(深圳)有限公司 Data processing method, device, server, terminal and storage medium
CN114401160B (en) * 2022-01-19 2022-12-02 腾讯科技(深圳)有限公司 Data processing method, device, server, terminal and storage medium
CN114979975A (en) * 2022-05-07 2022-08-30 深圳市灵镜技术有限公司 Cluster talkback access method and system based on big data
CN114979975B (en) * 2022-05-07 2023-09-19 深圳市灵镜技术有限公司 Cluster talkback admittance method and system based on big data

Similar Documents

Publication Publication Date Title
CN108777719A (en) Entirety is intelligence community platform
CN109005193A (en) Alarming method for power, device and electric terminal
CN105721426B (en) Access authorization methods, server, target terminal equipment and the system of terminal device
US10028147B1 (en) Dynamic defenses to secure a proximity-based communication system of linked wireless-enabled devices
CN103313429A (en) Processing method for recognizing fabricated WIFI (Wireless Fidelity) hotspot
CN110351237B (en) Honeypot method and device for numerical control machine tool
CN104284334B (en) A kind of control method and equipment of WiFi protection settings
CN106663363B (en) A kind of intelligent alarm system
CN105100048B (en) WiFi network secure authentication method, server, client terminal device and system
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN112165683B (en) Communication distance early warning method and device
WO2017084456A1 (en) Wifi hotspot processing method, device and system
CN107357821B (en) System management method, device and storage medium
CN104348804B (en) The method, apparatus and system of offline automatic locking service
CN115550049A (en) Vulnerability detection method and system for Internet of things equipment
CN113572757B (en) Server access risk monitoring method and device
CN106331060B (en) WIFI-based deployment and control method and system
CN111193900A (en) Monitoring video sharing method and device and storage medium
CN110601850B (en) Scenic spot information recording method, related equipment and storage medium
CN110378120A (en) Application programming interfaces attack detection method, device and readable storage medium storing program for executing
CN110048905B (en) Internet of things equipment communication mode identification method and device
CN112948804B (en) Program control method, device and computer readable storage medium
CN108846281A (en) Root authority acquisition methods, device, terminal device and storage medium
CN111343193B (en) Cloud network port security protection method and device, electronic equipment and storage medium
CN112911207A (en) Calling method and intelligent talkback system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181214

RJ01 Rejection of invention patent application after publication