CN109981644B - Method and equipment for sending target message - Google Patents

Method and equipment for sending target message Download PDF

Info

Publication number
CN109981644B
CN109981644B CN201910233410.3A CN201910233410A CN109981644B CN 109981644 B CN109981644 B CN 109981644B CN 201910233410 A CN201910233410 A CN 201910233410A CN 109981644 B CN109981644 B CN 109981644B
Authority
CN
China
Prior art keywords
user
real
time
information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910233410.3A
Other languages
Chinese (zh)
Other versions
CN109981644A (en
Inventor
陈晓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201910233410.3A priority Critical patent/CN109981644B/en
Publication of CN109981644A publication Critical patent/CN109981644A/en
Application granted granted Critical
Publication of CN109981644B publication Critical patent/CN109981644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The purpose of the application is to provide a method and equipment for sending a target message, wherein a first user equipment sends the target message to a network device; the network equipment detects whether the target message meets a preset real-time verification condition, and sends a real-time verification instruction to the first user equipment; the first user equipment acquires information to be verified of a corresponding first user in real time based on the real-time verification instruction, and sends the information to be verified to the network equipment; the network equipment sends the information to be verified and the target message to the second user equipment; and the second user equipment receives the information to be verified and the target message. The method and the device enable the receiver of the message to verify the identity of the sender according to the received content, thereby avoiding the receiver of the message from being cheated.

Description

Method and equipment for sending target message
Technical Field
The present application relates to the field of communications, and in particular, to a technique for sending a target message.
Background
With the popularization of intelligent devices such as mobile phones and the like, social software such as instant messaging software and the like has more and more users, and a communication bridge is built among the users. At the same time, however, fraud is also occurring, for example, some malicious users (or malware installed on a piece of equipment) may send fraud messages to other users through social software to trick money or personal sensitive information. Even if the system gives some prompts (like "please pay attention to verify the identity of the other party" or the like) after the suspected fraud messages are received by the users, the system is still not enough to alert the users, and some users still choose to click the fraud messages or perform related operations (such as filling out personal information, performing transfer operations, and the like) according to the fraud messages, so that personal information or property loss is suffered.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for transmitting a target message.
According to an aspect of the present application, there is provided a method for sending a target message at a network device, the method including:
receiving a target message sent by first user equipment, and detecting whether the target message meets a preset real-time verification condition, wherein a target receiving party of the target message is second user equipment;
if the target message meets the real-time verification condition, sending a real-time verification instruction to the first user equipment, wherein the real-time verification instruction is used for enabling the first user equipment to acquire information to be verified of a first user corresponding to the first user equipment in real time;
receiving to-be-verified information sent by the first user equipment based on the real-time verification instruction, and sending the to-be-verified information to the second user equipment;
and sending the target message to the second user equipment.
According to another aspect of the present application, a method for sending a target message at a first user equipment is provided, and the method includes:
sending a target message to network equipment, wherein a target receiver of the target message is second user equipment;
receiving a real-time verification instruction sent by the network device, wherein the real-time verification instruction is used for enabling the first user device to acquire information to be verified of a first user corresponding to the first user device in real time;
acquiring corresponding information to be verified of the first user in real time based on the real-time verification instruction;
and sending the information to be verified to the network equipment.
According to another aspect of the present application, there is provided a method for sending a target message at a second user equipment, the method comprising:
receiving information to be verified sent by network equipment;
receiving a target message sent by the network equipment;
the information to be verified is sent by first user equipment based on a real-time verification instruction, the real-time verification instruction is sent to the first user equipment by the network equipment after receiving a target message sent by the first user equipment, and a target receiving party of the target message is the second user equipment.
According to another aspect of the present application, there is provided a method for transmitting a target message, the method including:
a first user device sends a target message to a network device, wherein a target receiving party of the target message is a second user device;
the network equipment receives a target message sent by first user equipment, and detects whether the target message meets a preset real-time verification condition;
if the target message meets the real-time verification condition, the network device sends a real-time verification instruction to the first user device, wherein the real-time verification instruction is used for the first user device to acquire information to be verified of a first user corresponding to the first user device in real time;
the first user equipment receives a real-time verification instruction sent by the network equipment, acquires information to be verified of a corresponding first user in real time based on the real-time verification instruction, and sends the information to be verified to the network equipment;
the network equipment receives information to be verified, which is sent by the first user equipment based on the real-time verification instruction, and sends the information to be verified and the target message to the second user equipment;
and the second user equipment receives the information to be verified and the target message.
According to an aspect of the present application, there is provided an apparatus for transmitting a target message, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to another aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
Compared with the prior art, based on the application, the system requires the sender to provide information (such as real-time picture/video and the like) for verifying the identity to the receiver in real time when the suspicious message is detected, so that the receiver of the message can verify the identity of the sender of the message according to the received content, and the receiver of the message is prevented from being cheated. In some cases, the system can also intercept the suspicious message, and after receiving the information for verifying the identity, the system can send the information and the suspicious message to a message receiver, thereby further ensuring the information and property safety of the message receiver.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to one embodiment of the present application;
FIG. 2 is a flow diagram of a method for sending a targeted message according to one embodiment of the present application;
fig. 3 is a flowchart of a method for sending a target message at a network device according to another embodiment of the present application;
fig. 4 is a flowchart of a method for sending a target message at a first user equipment according to another embodiment of the present application;
fig. 5 is a flowchart of a method for receiving a target message at a second user equipment according to another embodiment of the present application;
FIG. 6 illustrates functional modules of a network device for sending a targeted message according to one embodiment of the present application;
FIG. 7 illustrates functional modules of a first user equipment for sending a targeted message according to another embodiment of the present application;
FIG. 8 illustrates functional modules of a second user equipment for receiving a targeted message according to another embodiment of the present application;
FIG. 9 illustrates functional modules of an exemplary system of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase-Change Memory (PCM), programmable Random Access Memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read-Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory (Flash Memory) or other Memory technology, compact Disc Read-Only Memory (CD-ROM), digital Versatile Disc (Digital Versatile Disc, DVD) or other optical storage media, magnetic cassettes or other magnetic storage media, magnetic tape or other non-magnetic storage devices that can be used to store information and can be accessed by a computer.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a VPN Network, a wireless Ad Hoc Network (Ad Hoc Network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 shows the topology of a system for carrying out the method for sending a target message according to the present application, which comprises a network device 100, at least one first user device 200 and at least one third user device 200. Taking the first user equipment 200 and the second user equipment 300 shown in the figure as an example, the first user equipment 200 intends to send a message (hereinafter referred to as a target message) to the second user equipment 300, and the message is sent to the second user 300 via the network equipment 100. Where the message may trigger a mechanism of the system to verify the identity of the sender of the message, such as the system determining that the message may be a fraudulent message, or the system determining that the message satisfies other real-time verification conditions, so that the sender needs to verify its identity to the recipient.
Based on the above system, according to one aspect of the present application, a method for sending a targeted message is provided. Referring to fig. 2, the method includes the steps of:
a first user device sends a target message to a network device, wherein a target receiving party of the target message is a second user device;
the network equipment receives a target message sent by first user equipment, and detects whether the target message meets a preset real-time verification condition;
if the target message meets the real-time verification condition, the network device sends a real-time verification instruction to the first user device, wherein the real-time verification instruction is used for the first user device to acquire information to be verified of a first user corresponding to the first user device in real time;
the first user equipment receives a real-time verification instruction sent by the network equipment, acquires information to be verified of a corresponding first user in real time based on the real-time verification instruction, and sends the information to be verified to the network equipment;
the network equipment receives to-be-verified information sent by the first user equipment based on the real-time verification instruction, and sends the to-be-verified information to the second user equipment;
and the second user equipment receives the information to be verified and the target message.
Specific embodiments of the above method will be described in detail below from the perspective of the network device, the first user equipment and the second user equipment, respectively.
According to one aspect of the application, a method for sending the target message at the network equipment side is further provided. Referring to fig. 3, the method includes step S101, step S102, step S103, and step S104. In step S101, a network device receives a target message sent by a first user equipment, and detects whether the target message meets a preset real-time verification condition, where a target recipient of the target message is a second user equipment; in step S102, if the target message meets the real-time verification condition, the network device sends a real-time verification instruction to the first user device, where the real-time verification instruction is used for the first user device to acquire, in real time, to-be-verified information of a first user corresponding to the first user device; in step S103, the network device receives information to be verified, which is sent by the first user device based on the real-time verification instruction, and sends the information to be verified to the second user device; in step S104, the network device sends the target message to the second user equipment.
Specifically, in step S101, the network device receives a target message sent by a first user device, and detects whether the target message meets a preset real-time verification condition, where a target recipient of the target message is a second user device. For example, in some embodiments, the header of the targeted message contains identification information of the recipient (i.e., the second user device), including but not limited to device identification information of the second user device, or identification information of the corresponding second user (e.g., the second user has logged in the application for receiving the message).
Wherein the real-time authentication condition is used for judging whether the target message needs the sender to provide additional information for the receiver to verify the identity of the sender, thereby ensuring the information and property safety and avoiding being cheated. Correspondingly, in step S102, if the target message meets the real-time verification condition, the network device sends a real-time verification instruction to the first user device, where the real-time verification instruction is used for the first user device to acquire, in real time, to-be-verified information of the first user corresponding to the first user device.
Then, if the first user equipment responds after receiving the real-time verification instruction, for example, corresponding information to be verified is sent (for sending to a receiving party, that is, the second user equipment, for identity verification), in step S103, the network device receives the information to be verified, which is sent by the first user equipment based on the real-time verification instruction, and sends the information to be verified to the second user equipment.
And in step S104, the network device sends the target message to the second user equipment.
It should be noted that, in the embodiments of the present application, the sending order of the to-be-verified information and the target message is not particularly limited, for example, the to-be-verified information may be sent to the second user equipment before or after the target message.
In some embodiments, the information to be verified includes any one of the following, or a combination of any several of the following:
-a real-time picture of the first user, e.g. a picture taken by the first user device invoking its front camera in real-time, containing the face of the first user operating the first user device;
-real-time video of the first user, e.g. video taken by a first user device invoking its front-facing camera in real-time;
the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment invoking its microphone in real time, and in some embodiments, may also be used for real-time voice communication between the first user and a second user corresponding to the second user equipment.
In some embodiments, the above step S102 includes a sub-step S102a, a sub-step S102b, and a sub-step S102c (all not shown). In the substep S102a, the network device sends verification inquiry information to the second user device, for example, the system inquires whether the second user (message receiver) wants to verify the identity of the sender, and if so, further obtains the information to be verified for verifying the identity of the first user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process is ended or the system directly provides the target message to the second user equipment, so as to simplify the process, improve the operation efficiency of the user, and avoid causing excessive interference to the user. Accordingly, in sub-step S102b, the network device receives a real-time verification request sent by the second user device based on the verification inquiry information; in sub-step S102c, the network device sends a real-time verification instruction to the first user equipment based on the real-time verification request.
In some embodiments, in order to protect the privacy of the first user and avoid excessive interference to the first user, the collection of the information to be authenticated of the first user is performed under the condition that the first user agrees to the real-time authentication. Accordingly, in step S103, the network device receives the verification response information sent by the first user device based on the real-time verification instruction (for example, the verification response information may include "allow verification", or "not allow verification", or "verify later", etc.), and if the verification response information includes the allow verification, the network device receives the to-be-verified information sent by the first user device and sends the to-be-verified information to the second user device.
In some embodiments, in case that the first user agrees to perform the real-time authentication, the first user and the second user may be provided with interaction in order to further enhance the authentication effect and avoid the first user from making a false answer. Accordingly, the above method further includes step S105 (not shown). In step S105, the network device receives a second real-time message sent by the second user equipment based on the real-time verification request, and sends the second real-time message to the first user equipment. Wherein the second real-time message includes any one of the following items, or a combination of any several items:
-a real-time video of a second user to which the second user equipment corresponds;
-real-time speech of a second user to which the second user equipment corresponds;
-text entered in real time by a second user to which the second user device corresponds.
For example, the second user may have some dialog with the first user (e.g., have the first user answer some questions), or may require the first user to perform some operation or some action according to the requirements of the second user, so as to enhance the credibility of the authentication result of the first user.
Of course, the first user may also refuse authentication, e.g., the first user is currently inconvenient to capture real-time video. In some embodiments, the method further comprises step S106 (not shown). In step S106, if the verification response information sent by the first user equipment based on the real-time verification instruction includes that verification is not allowed, or the real-time verification instruction response is overtime, the network device discards the target message, and the network device does not send the target message to the second user equipment any more, so as to avoid interference to the second user, thereby improving the user experience of the user. For example, the second user is not sensible to the target message.
In some embodiments, the real-time verification condition comprises any one of, or a combination of any several of:
the target message contains bank account information, e.g. a number for which the system detects a certain number of bits (e.g. 15 bits, 16 bits, 19 bits, etc.) in the target message.
-the target message contains preset keywords such as "bank", "transfer", "deposit", "cash", etc.
The sending user of the targeted message is included in the set of suspicious users, for example, the set is provided by the system, wherein the system creates a list of suspicious users, and the users in the list send messages to other users, all of which need to first verify the identity to avoid as much as possible the suspicious user posing a threat to the information and property security of legitimate users; for another example, the set is created by the recipients, e.g., the set corresponds to a blacklist, where users in the blacklist all need to verify their identities when they send messages to the recipients, and this set may be different for each recipient;
the credibility of the sending user of the target message is lower than a credibility threshold, wherein the credibility is calculated based on the historical behavior of the message sender, and when the credibility is high enough, the message sender does not need to perform identity authentication when sending messages to other users, so that the operation efficiency and the use experience of the legal user are improved.
On this basis, when the real-time verification condition includes that the sending user of the target message is included in the set of suspicious users, the method further includes step S107 (not shown). In step S107, the network device receives verification result information of the second user device based on the to-be-verified information, and updates the suspicious user set based on the verification result information. For example, when a certain user fails the verification of the receiver (the verification may be performed in the form of "spot check" to improve the user operation efficiency and use experience), or when the user fails the verification for a certain number of times, the user is added to the above-mentioned suspicious user set; for another example, if a user is originally in the set of suspicious users and the user is verified by the recipient (or passed a certain number of times), the user is removed from the set of suspicious users. Therefore, the trouble of the normal operation of the message sender caused by misoperation or malicious operation of the message receiver can be avoided.
And when the real-time verification condition includes that the credibility of the sending user of the target message is lower than the credibility threshold, the method further includes step S108 (not shown). In step S108, the network device receives verification result information of the second user device based on the to-be-verified information, and updates the reliability based on the verification result information. For example, in the case that the credibility of a certain user in the system is too low, the user is always authenticated in real time when the user sends a message to other users; and under the condition that the credibility of a certain user in the system is high, the user is not verified in real time or only verified in a mode of 'spot check'. In some embodiments, if the first user fails to verify in the real-time verification process, the trustworthiness of the first user is reduced; and if the first user passes the verification in the real-time verification process, the reliability of the first user is improved. Therefore, the trouble of normal operation of a message sender caused by misoperation or malicious operation of a message receiver can be avoided, and the dynamic management of the user credibility is realized.
Even if the first user fails the real-time authentication, if the target message is sent to the second user device, the second user device may be confused and cheated or may be mishandled and suffer a loss. To avoid this, in some embodiments, in step S104, the network device receives verification result information sent by the second user device based on the to-be-verified information, and sends the target message to the second user device if the verification result information includes verification pass.
Corresponding to the method for sending the target message at the network equipment side, according to another aspect of the present application, a method for sending the target message at the first user equipment side is also provided. Referring to fig. 4, the method includes step S201, step S202, step S203, and step S204. In step S201, a first user equipment sends a target message to a network device, where a target recipient of the target message is a second user equipment; in step S202, a first user equipment receives a real-time verification instruction sent by the network device, where the real-time verification instruction is used for the first user equipment to acquire, in real time, to-be-verified information of a first user corresponding to the first user equipment; in step S203, the first user equipment acquires, in real time, information to be verified of the corresponding first user based on the real-time verification instruction; in step S204, the first user equipment sends the information to be verified to the network device.
Specifically, in step S201, a first user equipment sends a target message to a network device, where a target recipient of the target message is a second user equipment. For example, in some embodiments, the header of the targeted message contains identification information of the recipient (i.e., the second user device), including but not limited to device identification information of the second user device, or identification information of the corresponding second user (e.g., the second user has logged in the application for receiving the message).
In step S202, the first user equipment receives a real-time verification instruction sent by the network equipment, where the real-time verification instruction is used for the first user equipment to acquire, in real time, to-be-verified information of a first user corresponding to the first user equipment. For example, the network device detects whether the target message satisfies a real-time verification condition, and sends the real-time verification instruction when the condition is satisfied. The real-time authentication condition is used for judging whether the target message needs the sender to provide additional information for the receiver to verify the identity of the sender, thereby ensuring the information and property safety and avoiding the cheat.
In step S203, the first user device acquires, in real time, information to be verified of the corresponding first user based on the real-time verification instruction. For example, the information to be verified is acquired by the first user equipment in real time through the biological features, videos, photos, sounds and other information of the first user, and the information is used for being sent to the second user equipment so that the corresponding second user can verify the identity of the first user.
In step S204, the first user equipment sends the information to be verified to the network equipment.
In some embodiments, the information to be verified includes any one of the following, or a combination of any several of the following:
-a real-time picture of the first user, e.g. a picture taken by the first user device invoking its front camera in real-time, containing the face of the first user operating the first user device;
-real-time video of the first user, e.g. video taken by a first user device invoking its front-facing camera in real-time;
the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment invoking its microphone in real time, and in some embodiments, may also be used for real-time voice communication between the first user and a second user corresponding to the second user equipment.
In some embodiments, in order to protect the privacy of the first user and avoid excessive interference to the first user, the collection of information to be authenticated of the first user is performed with the first user agreeing to real-time authentication. Accordingly, in step S203, the first user device determines corresponding verification response information based on the verification response operation of the first user to the real-time verification instruction, and sends the verification response information to the network device. Subsequently, in step S204, if the verification response message includes permission for verification, the first user equipment sends the to-be-verified message to the network device.
In some embodiments, in case that the first user agrees to perform the real-time authentication, the first user and the second user may be provided with interaction in order to further enhance the authentication effect and avoid the first user from making a false answer. Accordingly, the above method further includes step S205 (not shown). In step S205, the first user equipment receives a second real-time message sent by the network device, where the second real-time message is sent to the network device by the second user equipment. Wherein the second real-time message includes any one of the following items, or a combination of any several items:
-a real-time video of a second user to which the second user equipment corresponds;
-real-time speech of a second user to which the second user equipment corresponds;
-text entered in real time by a second user to which the second user device corresponds.
For example, the second user may have some dialog with the first user (e.g., have the first user answer some questions), or may require the first user to perform some operation or some action according to the requirements of the second user, so as to enhance the credibility of the authentication result of the first user.
Of course, the first user may also refuse authentication (e.g., the first user is currently inconvenient to capture real-time video), and the authentication response message includes no authentication permission.
Corresponding to the method for sending the target message at the network device side, according to another aspect of the present application, a method for receiving the target message at the second user device side is also provided. Referring to fig. 5, the method includes steps S301 and S302. In step S301, the second user equipment receives information to be verified sent by the network equipment; in step S302, the second user equipment receives the target message sent by the network device. The information to be verified is sent by first user equipment based on a real-time verification instruction, the real-time verification instruction is sent to the first user equipment by the network equipment after receiving a target message sent by the first user equipment, and a target receiving party of the target message is the second user equipment.
For example, in some embodiments, the header of the targeted message contains identification information of the recipient (i.e., the second user device), including but not limited to device identification information of the second user device, or identification information of the corresponding second user (e.g., the second user has logged in the application for receiving the message). And the network equipment detects whether the target message meets a real-time verification condition or not, and sends the real-time verification instruction when the condition is met. The real-time authentication condition is used for judging whether the target message needs the sender to provide additional information for the receiver to verify the identity of the sender, thereby ensuring the information and property safety and avoiding the cheat. Here, the specific implementation of the real-time verification condition is the same or substantially the same as the above-mentioned specific implementation of the real-time verification condition, and is not repeated herein and is included by reference.
It should be noted that, in the embodiments of the present application, the receiving order of the to-be-verified information and the target message is not particularly limited, for example, the to-be-verified information may be received by the second user equipment before or after the target message.
In some embodiments, the method further comprises step S303 and step S304 (both not shown). In step S303, the second user equipment receives the verification inquiry information sent by the network device, for example, the system inquires whether the second user (message receiver) wants to verify the identity of the sender, and if so, further obtains the information to be verified for verifying the identity of the first user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process is ended or the system directly provides the target message to the second user equipment, so as to simplify the process, improve the operation efficiency of the user, and avoid causing excessive interference to the user. In step S304, the second user device sends a real-time verification request to the network device according to a verification request operation of the second user corresponding to the second user device on the verification inquiry information. Subsequently, in step S301, the second user equipment receives information to be authenticated, which is sent by the network device based on the real-time authentication request.
In some embodiments, in case that the first user agrees to perform the real-time authentication, the first user and the second user may be provided with interaction in order to further enhance the authentication effect and avoid the first user from making a false answer. Correspondingly, in step S304, the second user equipment sends a real-time verification request and a second real-time message to the network device according to a verification request operation of the second user corresponding to the second user equipment on the verification inquiry information. Wherein the second real-time message includes any one of the following items, or a combination of any several items:
-a real-time video of a second user to which the second user equipment corresponds;
-real-time speech of a second user to which the second user equipment corresponds;
-text entered in real time by a second user to which the second user device corresponds.
For example, the second user may have some dialog with the first user (e.g., have the first user answer some questions), or may require the first user to perform some operation or some action according to the requirements of the second user, so as to enhance the credibility of the authentication result of the first user.
In some embodiments, the method further comprises step S305 (not shown). In step S305, the second user equipment sends corresponding verification result information to the network device based on the information to be verified. In some embodiments, the network device sends the target message to the second user device only after the identity of the first user is confirmed by the second user; or the network device adds the first user into a suspicious user set based on the real-time verification result of the second user on the identity of the first user, or adjusts the credibility of the first user in the system. The detailed description is not repeated, and is incorporated by reference herein. For example, in step S302, if the verification result information includes that the verification is passed, the second user equipment receives the target message sent by the network device.
According to an aspect of the present application, there is also provided a network device 100 for sending a targeted message. Referring to fig. 6, the network device 100 includes a first primary module 101, a first secondary module 102, a first tertiary module 103, and a first quaternary module 104. The first module 101 receives a target message sent by first user equipment, and detects whether the target message meets a preset real-time verification condition, wherein a target receiver of the target message is second user equipment; if the target message meets the real-time verification condition, the first and second modules 102 send a real-time verification instruction to the first user equipment, wherein the real-time verification instruction is used for the first user equipment to acquire information to be verified of a first user corresponding to the first user equipment in real time; the first third module 103 receives information to be verified, which is sent by the first user equipment based on the real-time verification instruction, and sends the information to be verified to the second user equipment; the fourth module 104 sends the targeted message to the second user equipment.
Specifically, the first module 101 receives a target message sent by a first user equipment, and detects whether the target message meets a preset real-time verification condition, where a target recipient of the target message is a second user equipment. For example, in some embodiments, the header of the targeted message contains identification information of the recipient (i.e., the second user device), including but not limited to device identification information of the second user device, or identification information of the corresponding second user (e.g., the second user has logged in the application for receiving the message).
Wherein the real-time authentication condition is used for judging whether the target message needs the sender to provide additional information for the receiver to verify the identity of the sender, thereby ensuring the information and property safety and avoiding being cheated. Correspondingly, if the target message meets the real-time verification condition, the first and second modules 102 send a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to acquire, in real time, to-be-verified information of a first user corresponding to the first user equipment.
Then, if the first user equipment responds after receiving the real-time verification instruction, for example, corresponding information to be verified (for sending to a receiver, that is, the second user equipment, for identity verification) is sent, the first third module 103 receives the information to be verified sent by the first user equipment based on the real-time verification instruction, and sends the information to be verified to the second user equipment.
And the first fourth module 104 sends the targeted message to the second user equipment.
It should be noted that, in the embodiments of the present application, the sending order of the to-be-verified information and the target message is not particularly limited, for example, the to-be-verified information may be sent to the second user equipment before or after the target message.
In some embodiments, the information to be verified includes any one of the following, or a combination of any several of the following:
-a real-time picture of the first user, e.g. a picture taken by the first user device invoking its front camera in real-time, containing the face of the first user operating the first user device;
-real-time video of the first user, e.g. video taken by a first user device invoking its front-facing camera in real-time;
the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment invoking its microphone in real time, and in some embodiments, may also be used for real-time voice communication between the first user and a second user corresponding to the second user equipment.
In some embodiments, first two modules 102 described above include a first cell 102a, a second cell 102b, and a third cell 102c (all not shown). The first unit 102a sends authentication inquiry information to the second user equipment, for example, the system inquires whether the second user (message receiver) wants to authenticate the identity of the sender, and if so, further obtains the information to be authenticated for authenticating the identity of the first user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process is ended or the system directly provides the target message to the second user equipment, so as to simplify the process, improve the operation efficiency of the user, and avoid causing excessive interference to the user. Correspondingly, the second unit 102b receives a real-time verification request sent by the second user equipment based on the verification inquiry information; the third unit 102c sends a real-time authentication instruction to the first user equipment based on the real-time authentication request.
In some embodiments, in order to protect the privacy of the first user and avoid excessive interference to the first user, the collection of the information to be authenticated of the first user is performed under the condition that the first user agrees to the real-time authentication. Accordingly, the first third module 103 receives verification response information sent by the first user equipment based on the real-time verification instruction (for example, the verification response information may include "allow verification", or "disallow verification", or "verify later", etc.), and if the verification response information includes allow verification, the network device receives to-be-verified information sent by the first user equipment and sends the to-be-verified information to the second user equipment.
In some embodiments, in case that the first user agrees to perform the real-time authentication, the first user and the second user may be provided with interaction in order to further enhance the authentication effect and avoid the first user from making a false answer. Accordingly, the network device further comprises a fifth module 105 (not shown). The first fifth module 105 receives a second real-time message sent by the second user equipment based on the real-time verification request, and sends the second real-time message to the first user equipment. Wherein the second real-time message includes any one of the following items, or a combination of any several items:
-a real-time video of a second user to which the second user equipment corresponds;
-real-time speech of a second user to which the second user equipment corresponds;
-text entered in real time by a second user to which the second user device corresponds.
For example, the second user may have some dialog with the first user (e.g., have the first user answer some questions), or require the first user to perform some operation or some action as required by the second user to enhance the trustworthiness of the authentication result of the first user.
Of course, the first user may also refuse authentication, e.g., the first user is currently inconvenient to capture real-time video. In some embodiments, the network device further comprises a sixth module 106 (not shown). If the verification response information sent by the first user equipment based on the real-time verification instruction includes that verification is not allowed or the response of the real-time verification instruction is overtime, the sixth module 106 discards the target message, and the network equipment does not send the target message to the second user equipment any more, so as to avoid interference on the second user, thereby improving the user experience. For example, the second user is not sensible to the target message.
In some embodiments, the real-time verification condition comprises any one of, or a combination of any several of:
the target message contains bank account information, e.g. a number for which the system detects a certain number of bits (e.g. 15 bits, 16 bits, 19 bits, etc.) in the target message.
-the target message contains preset keywords such as "bank", "transfer", "deposit", "cash", etc.
The sending user of the targeted message is included in the set of suspicious users, for example, the set is provided by the system, wherein the system creates a list of suspicious users, and the users in the list send messages to other users, all of which need to first verify the identity to avoid as much as possible the suspicious user posing a threat to the information and property security of legitimate users; for another example, the set is created by the recipients, e.g., the set corresponds to a blacklist, where users in the blacklist all need to verify their identities when they send messages to the recipients, and this set may be different for each recipient;
the credibility of the sending user of the target message is lower than a credibility threshold, wherein the credibility is calculated based on the historical behavior of the message sender, and when the credibility is high enough, the message sender does not need to perform identity authentication when sending messages to other users, so that the operation efficiency and the use experience of the legal user are improved.
On this basis, when the real-time verification condition includes that the sending user of the target message is included in the suspicious user set, the network device further includes a first seventh module 107 (not shown). The first seventh module 107 receives the verification result information of the second user equipment based on the information to be verified, and updates the suspicious user set based on the verification result information. For example, when a certain user fails the verification of the receiver (the verification may be performed in the form of "spot check" to improve the user operation efficiency and use experience), or when the user fails the verification for a certain number of times, the user is added to the above-mentioned suspicious user set; for another example, if a user is originally in the set of suspicious users and the user is verified by the recipient (or passed a certain number of times), the user is removed from the set of suspicious users. Therefore, the trouble of normal operation of the message sender caused by misoperation or malicious operation of the message receiver can be avoided.
When the real-time verification condition includes that the credibility of the sending user of the target message is lower than the credibility threshold, the network device further includes a first eight module 108 (not shown). The first eighth module 108 receives verification result information of the second user equipment based on the information to be verified, and updates the reliability based on the verification result information. For example, in the case that the credibility of a certain user in the system is too low, the user is always authenticated in real time when the user sends a message to other users; and under the condition that the credibility of a certain user in the system is high, the user is not verified in real time or only verified in a mode of 'spot check'. In some embodiments, if the first user fails to verify in the real-time verification process, the trustworthiness of the first user is reduced; and if the first user passes the verification in the real-time verification process, the reliability of the first user is improved. Therefore, the trouble of the normal operation of the message sender caused by misoperation or malicious operation of the message receiver can be avoided, and the dynamic management of the user reliability is realized.
Even if the first user fails the real-time authentication, if the target message is sent to the second user device, the second user device may be confused and cheated or may be mishandled and suffer a loss. To avoid this, in some embodiments, the first fourth module 104 receives verification result information sent by the second user equipment based on the to-be-verified information, and sends the target message to the second user equipment if the verification result information includes verification pass.
Corresponding to the network device for sending the target message described above, according to another aspect of the present application, there is also provided a first user device 200 for sending the target message. Referring to fig. 7, the user equipment 200 includes a second first module 201, a second module 202, a second third module 203, and a second fourth module 204. A second module 201 sends a target message to a network device, wherein a target receiver of the target message is a second user device; a second module 202 receives a real-time verification instruction sent by the network device, where the real-time verification instruction is used for the first user device to acquire information to be verified of a first user corresponding to the first user device in real time; the second third module 203 acquires the information to be verified of the corresponding first user in real time based on the real-time verification instruction; the second fourth module 204 sends the information to be verified to the network device.
Specifically, the second module 201 sends a target message to the network device, where a target recipient of the target message is a second user equipment. For example, in some embodiments, the header of the targeted message contains identification information of the recipient (i.e., the second user device), including but not limited to device identification information of the second user device, or identification information of the corresponding second user (e.g., the second user has logged in the application for receiving the message).
The second module 202 receives a real-time verification instruction sent by the network device, where the real-time verification instruction is used for the first user device to acquire, in real time, to-be-verified information of a first user corresponding to the first user device. For example, the network device detects whether the target message satisfies a real-time verification condition, and sends the real-time verification instruction when the condition is satisfied. The real-time authentication condition is used for judging whether the target message needs the sender to provide additional information for the receiver to verify the identity of the sender, thereby ensuring the information and property safety and avoiding the cheat.
The second and third modules 203 collect the corresponding information to be verified of the first user in real time based on the real-time verification instruction. For example, the information to be verified is acquired by the first user equipment in real time through the biological features, videos, photos, sounds and other information of the first user, and the information is used for being sent to the second user equipment so that the corresponding second user can verify the identity of the first user.
The fourth module 204 sends the information to be verified to the network device.
In some embodiments, the information to be verified includes any one of the following, or a combination of any several of the following:
-a real-time picture of the first user, e.g. a picture taken by the first user device invoking its front camera in real-time, containing the face of the first user operating the first user device;
-real-time video of the first user, e.g. video taken by a first user device invoking its front-facing camera in real-time;
the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment invoking its microphone in real time, and in some embodiments, may also be used for real-time voice communication between the first user and a second user corresponding to the second user equipment.
In some embodiments, in order to protect the privacy of the first user and avoid excessive interference to the first user, the collection of information to be authenticated of the first user is performed with the first user agreeing to real-time authentication. Correspondingly, the second third module 203 determines corresponding verification response information based on the verification response operation of the first user to the real-time verification instruction, and sends the verification response information to the network device. Subsequently, if the verification response message includes a verification permission, the second fourth module 204 sends the to-be-verified message to the network device.
In some embodiments, in case that the first user agrees to perform the real-time authentication, the first user and the second user may be provided with interaction in order to further enhance the authentication effect and avoid the first user from making a false answer. Accordingly, the first user equipment further comprises a fifth module 205 (not shown). The fifth module 205 receives a second real-time message sent by the network device, where the second real-time message is sent by the second user equipment to the network device. Wherein the second real-time message includes any one of the following items, or a combination of any several items:
-a real-time video of a second user to which the second user equipment corresponds;
-real-time speech of a second user to which the second user equipment corresponds;
-text entered in real time by a second user to which the second user device corresponds.
For example, the second user may have some dialog with the first user (e.g., have the first user answer some questions), or may require the first user to perform some operation or some action according to the requirements of the second user, so as to enhance the credibility of the authentication result of the first user.
Of course, the first user may also refuse authentication (e.g., the first user is currently inconvenient to capture real-time video), and the authentication response message includes no authentication permission.
Corresponding to the network device for sending the targeted message described above, according to another aspect of the present application, there is also provided a second user equipment 300 for receiving the targeted message. Referring to fig. 8, the second user equipment 300 includes a third first module 301 and a third second module 302. The third module 301 receives information to be verified sent by the network device; the third second module 302 receives a target message sent by the network device. The information to be verified is sent by a first user device based on a real-time verification instruction, the real-time verification instruction is sent to the first user device by the network device after receiving a target message sent by the first user device, and a target receiving party of the target message is the second user device.
For example, in some embodiments, the header of the targeted message contains identification information of the recipient (i.e., the second user device), including but not limited to device identification information of the second user device, or identification information of the corresponding second user (e.g., the second user has logged in the application for receiving the message). The network equipment detects whether the target message meets a real-time verification condition, and sends the real-time verification instruction when the condition is met. The real-time authentication condition is used for judging whether the target message needs the sender to provide additional information for the receiver to verify the identity of the sender, thereby ensuring the information and property safety and avoiding the cheat. Here, the specific implementation of the real-time verification condition is the same or substantially the same as the above-mentioned specific implementation of the real-time verification condition, and is not repeated herein and is included by reference.
It should be noted that, in the embodiments of the present application, the receiving order of the to-be-verified information and the target message is not particularly limited, for example, the to-be-verified information may be received by the second user equipment before or after the target message.
In some embodiments, the second user equipment further comprises a third module 303 and a third fourth module 304 (both not shown). The third module 303 receives authentication inquiry information sent by the network device, for example, the system inquires whether the second user (message receiver) wants to authenticate the identity of the sender, and if yes, further obtains the information to be authenticated to authenticate the identity of the first user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process is ended or the system directly provides the target message to the second user equipment, so as to simplify the process, improve the operation efficiency of the user, and avoid causing excessive interference to the user. The third and fourth modules 304 send a real-time verification request to the network device according to a verification request operation of the second user for the verification inquiry information corresponding to the second user device. Subsequently, the third module 301 receives information to be authenticated, which is sent by the network device based on the real-time authentication request.
In some embodiments, in case that the first user agrees to perform the real-time authentication, interaction may be provided for the first user and the second user in order to further enhance the authentication effect and avoid the first user from making a false answer. Correspondingly, the third fourth module 304 sends a real-time verification request and a second real-time message to the network device according to a verification request operation of the second user for the verification inquiry information, where the verification request operation corresponds to the second user device. Wherein the second real-time message includes any one of the following items, or a combination of any several items:
-a real-time video of a second user to which the second user equipment corresponds;
-real-time speech of a second user to which the second user equipment corresponds;
-text entered in real time by a second user to which the second user device corresponds.
For example, the second user may have some dialog with the first user (e.g., have the first user answer some questions), or may require the first user to perform some operation or some action according to the requirements of the second user, so as to enhance the credibility of the authentication result of the first user.
In some embodiments, the second user equipment further comprises a fifth module 305 (not shown). The third fifth module 305 sends corresponding verification result information to the network device based on the information to be verified. In some embodiments, the network device sends the target message to the second user device only after the identity of the first user is confirmed by the second user; or the network device adds the first user into a suspicious user set based on the real-time verification result of the second user on the identity of the first user, or adjusts the credibility of the first user in the system. The detailed description of the embodiments is not repeated, and is included herein by reference. For example, if the verification result information includes that the verification is passed, the third module 302 receives the target message sent by the network device.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs the method of any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 9 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in fig. 9, the system 1000 can be implemented as any one of the network device, the first user device, or the second user device in the various described embodiments. In some embodiments, system 1000 may include one or more computer-readable media (e.g., system memory or NVM/storage 1020) having instructions and one or more processors (e.g., processor(s) 1005) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 1010 may include any suitable interface controllers to provide any suitable interface to at least one of the processor(s) 1005 and/or to any suitable device or component in communication with system control module 1010.
The system control module 1010 may include a memory controller module 1030 to provide an interface to the system memory 1015. Memory controller module 1030 may be a hardware module, a software module, and/or a firmware module.
System memory 1015 may be used to load and store data and/or instructions, for example, for system 1000. For one embodiment, system memory 1015 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 1015 may include a double data rate type four synchronous dynamic random access memory (DDR 4 SDRAM).
For one embodiment, system control module 1010 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 1020 and communication interface(s) 1025.
For example, NVM/storage 1020 may be used to store data and/or instructions. NVM/storage 1020 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk drive(s) (HDD (s)), one or more Compact Disc (CD) drive(s), and/or one or more Digital Versatile Disc (DVD) drive (s)).
NVM/storage 1020 may include storage resources that are physically part of a device on which system 1000 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 1020 may be accessed over a network via communication interface(s) 1025.
Communication interface(s) 1025 may provide an interface for system 1000 to communicate over one or more networks and/or with any other suitable device. System 1000 may communicate wirelessly with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 1005 may be packaged together with logic for one or more controller(s) of the system control module 1010, e.g., memory controller module 1030. For one embodiment, at least one of the processor(s) 1005 may be packaged together with logic for one or more controller(s) of the system control module 1010 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic for one or more controller(s) of the system control module 1010. For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic of one or more controllers of the system control module 1010 to form a system on a chip (SoC).
In various embodiments, system 1000 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 1000 may have more or fewer components and/or different architectures. For example, in some embodiments, system 1000 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Additionally, some portions of the present application may be applied as a computer program product, such as computer program instructions, which, when executed by a computer, may invoke or provide the method and/or solution according to the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules or other data may be embodied in a modulated data signal, such as a carrier wave or similar mechanism that is embodied in a wireless medium, such as part of spread-spectrum techniques, for example. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, feRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it will be obvious that the term "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (19)

1. A method for sending a target message at a network device, wherein the method comprises:
receiving a target message sent by first user equipment, and detecting whether the target message meets a preset real-time verification condition, wherein a target receiver of the target message is second user equipment, the real-time verification condition is used for judging whether the target message needs to provide additional information for a sender so that the receiver can verify the identity of the sender, the real-time verification condition comprises that the credibility of a sending user of the target message is lower than a credibility threshold, and the credibility is calculated based on the historical behavior of the sending user;
if the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the target message is directly sent to the second user equipment;
if the target message meets the real-time verification condition, sending a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to acquire, in real time, to-be-verified information of a first user corresponding to the first user equipment, and the sending a real-time verification instruction to the first user equipment includes: sending verification inquiry information to the second user equipment; receiving a real-time verification request sent by the second user equipment based on the verification inquiry information, wherein a second user corresponding to the second user equipment needs to verify the identity of the first user; sending a real-time verification instruction to the first user equipment based on the real-time verification request; if the second user does not need to verify the identity of the first user, the process is directly ended;
receiving to-be-verified information sent by the first user equipment based on the real-time verification instruction, and sending the to-be-verified information to the second user equipment;
receiving verification result information sent by the second user equipment based on the information to be verified, and if the verification result information includes verification passing, sending the target message to the second user equipment;
wherein the method further comprises: and updating the credibility based on the verification result information so as to avoid the trouble of the second user in misoperation or malicious operation on the normal operation of the first user.
2. The method of claim 1, wherein the information to be verified comprises at least any one of:
a real-time photograph of the first user;
a real-time video of the first user;
real-time speech of the first user.
3. The method of claim 1, wherein the receiving information to be verified, which is sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified to the second user equipment comprises:
receiving verification response information sent by the first user equipment based on the real-time verification instruction;
and if the verification response information comprises the permission of verification, receiving the information to be verified sent by the first user equipment, and sending the information to be verified to the second user equipment.
4. The method of claim 3, wherein the method further comprises:
receiving a second real-time message sent by the second user equipment based on the real-time verification request;
sending the second real-time message to the first user equipment;
wherein the second real-time message comprises at least any one of:
a real-time video of a second user corresponding to the second user equipment;
real-time voice of a second user corresponding to the second user equipment;
and the text input by the second user corresponding to the second user equipment in real time.
5. The method of claim 1, wherein the method further comprises:
and if the verification response information sent by the first user equipment based on the real-time verification instruction comprises that verification is not allowed or the response of the real-time verification instruction is overtime, discarding the target message.
6. The method of claim 1, wherein the real-time validation conditions further comprise at least any one of:
the target message contains bank account information;
the target message comprises preset keywords;
the sending user of the targeted message is contained in a set of suspicious users.
7. The method of claim 6, wherein the real-time validation condition comprises: the sending user of the target message is contained in a suspicious user set;
the method further comprises the following steps:
and receiving verification result information of the second user equipment based on the information to be verified, and updating the suspicious user set based on the verification result information.
8. The method of claim 1, wherein the sending the targeted message to the second user equipment comprises:
receiving verification result information sent by the second user equipment based on the information to be verified;
and if the verification result information comprises verification passing, sending the target message to the second user equipment.
9. A method for sending a target message at a first user equipment, wherein the method comprises:
sending a target message to a network device, wherein a target receiver of the target message is a second user device, the target message meets a real-time authentication condition, the real-time authentication condition includes that the credibility of a sending user of the target message is lower than a credibility threshold, the credibility is calculated based on the historical behavior of the sending user, and the real-time authentication condition is used for judging whether the target message needs a sender to provide additional information for a receiver to verify the identity of the sender; if the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the network equipment directly sends the target message to the second user equipment;
receiving a real-time verification instruction sent by the network device, wherein the real-time verification instruction is used for enabling the first user device to acquire information to be verified of a first user corresponding to the first user device in real time, the network device sends the real-time verification instruction to the first user device based on a real-time verification request, the real-time verification request is sent by the second user device based on verification inquiry information sent by the network device, and a second user corresponding to the second user device needs to verify the identity of the first user; if the second user does not need to verify the identity of the first user, the network equipment directly ends the process;
acquiring corresponding information to be verified of the first user in real time based on the real-time verification instruction;
and sending the information to be verified to the network equipment, wherein the network equipment receives verification result information of the second user equipment based on the information to be verified, and updates the credibility based on the verification result information so as to avoid the trouble of the second user on normal operation of the first user due to misoperation or malicious operation.
10. The method of claim 9, wherein the acquiring, in real time, information to be authenticated of the corresponding first user based on the real-time authentication instruction comprises:
determining corresponding verification response information based on verification response operation of the first user on the real-time verification instruction;
sending the verification response information to the network equipment;
the sending the information to be verified to the network device includes:
and if the verification response information comprises the verification permission, sending the information to be verified to the network equipment.
11. The method of claim 10, wherein the method further comprises:
receiving a second real-time message sent by the network device, wherein the second real-time message is sent to the network device by the second user device;
wherein the second real-time message comprises at least any one of:
a real-time video of a second user corresponding to the second user equipment;
real-time voice of a second user corresponding to the second user equipment;
and the text input by the second user corresponding to the second user equipment in real time.
12. A method at a second user equipment for receiving a targeted message, wherein the method comprises:
receiving information to be verified sent by network equipment;
receiving a target message sent by the network equipment;
the information to be verified is sent by a first user device based on a real-time verification instruction, the real-time verification instruction is sent to the first user device by a network device after receiving a target message sent by the first user device based on a real-time verification request, a target receiver of the target message is the second user device, the target message meets a real-time verification condition, the real-time verification condition comprises that the credibility of a sending user of the target message is lower than a credibility threshold, the credibility is calculated based on the historical behavior of the sending user, the real-time verification condition is used for judging whether the target message needs to be provided with additional information by the sender for the receiver to verify the identity of the sender, if the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the network device directly sends the target message to the second user device; the real-time verification request is sent by the second user equipment based on verification inquiry information sent by the network equipment, and a second user corresponding to the second user equipment needs to verify the identity of the first user; if the second user does not need to verify the identity of the first user, the network equipment directly ends the process;
the network device receives verification result information of the second user device based on the information to be verified, and updates the credibility based on the verification result information so as to avoid the trouble of the second user on normal operation of the first user due to misoperation or malicious operation.
13. The method of claim 12, wherein the method further comprises:
receiving verification inquiry information sent by network equipment;
sending a real-time verification request to the network equipment according to the verification request operation of a second user corresponding to the second user equipment on the verification inquiry information;
the receiving of the to-be-verified information sent by the network device includes:
and receiving to-be-verified information sent by the network equipment based on the real-time verification request.
14. The method of claim 13, wherein the sending a real-time authentication request to the network device according to an authentication request operation of a second user corresponding to the second user device on the authentication inquiry information includes:
sending a real-time verification request and a second real-time message to the network equipment according to a verification request operation of a second user corresponding to the second user equipment on the verification inquiry information;
wherein the second real-time message comprises at least any one of:
a real-time video of a second user corresponding to the second user equipment;
real-time voice of a second user corresponding to the second user equipment;
and the text input by the second user corresponding to the second user equipment in real time.
15. The method of claim 12, wherein the method further comprises:
and sending corresponding verification result information to the network equipment based on the information to be verified.
16. The method of claim 15, wherein the receiving the target message sent by the network device comprises:
and if the verification result information comprises verification passing, receiving the target message sent by the network equipment.
17. A method for transmitting a target message, wherein the method comprises:
a first user device sends a target message to a network device, wherein a target receiving party of the target message is a second user device;
the network equipment receives a target message sent by first user equipment, and detects whether the target message meets a preset real-time verification condition, wherein the real-time verification condition comprises that the credibility of a sending user of the target message is lower than a credibility threshold, the credibility is calculated based on the historical behavior of the sending user, and the real-time verification condition is used for judging whether the target message needs a sender to provide additional information for the receiver to verify the identity of the sender;
if the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the network equipment directly sends the target message to the second user equipment;
if the target message meets the real-time verification condition, the network device sends a real-time verification instruction to the first user device, where the real-time verification instruction is used for the first user device to acquire, in real time, to-be-verified information of a first user corresponding to the first user device, and the sending of the real-time verification instruction to the first user device includes: sending verification inquiry information to the second user equipment; receiving a real-time verification request sent by the second user equipment based on the verification inquiry information, wherein a second user corresponding to the second user equipment needs to verify the identity of the first user; sending a real-time verification instruction to the first user equipment based on the real-time verification request; if the second user does not need to verify the identity of the first user, the process is directly ended;
the first user equipment receives a real-time verification instruction sent by the network equipment, acquires corresponding to-be-verified information of a first user in real time based on the real-time verification instruction, and sends the to-be-verified information to the network equipment;
the network equipment receives to-be-verified information sent by the first user equipment based on the real-time verification instruction, and sends the to-be-verified information to the second user equipment;
the network equipment receives verification result information of the second user equipment based on the information to be verified, and if the verification result information comprises verification passing, the network equipment sends the target message to the second user equipment;
the second user equipment receives the information to be verified and the target message;
the network equipment updates the credibility based on the verification result information so as to avoid the trouble of the second user caused by misoperation or malicious operation on the normal operation of the first user.
18. An apparatus for transmitting a targeted message, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform operations according to the method of any one of claims 1 to 16.
19. A computer-readable medium storing instructions that, when executed, cause a system to perform operations of any of the methods of claims 1-16.
CN201910233410.3A 2019-03-26 2019-03-26 Method and equipment for sending target message Active CN109981644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910233410.3A CN109981644B (en) 2019-03-26 2019-03-26 Method and equipment for sending target message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910233410.3A CN109981644B (en) 2019-03-26 2019-03-26 Method and equipment for sending target message

Publications (2)

Publication Number Publication Date
CN109981644A CN109981644A (en) 2019-07-05
CN109981644B true CN109981644B (en) 2022-10-11

Family

ID=67080622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910233410.3A Active CN109981644B (en) 2019-03-26 2019-03-26 Method and equipment for sending target message

Country Status (1)

Country Link
CN (1) CN109981644B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883293A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Message interaction method, relevant apparatus and communication system
CN104980899A (en) * 2015-05-28 2015-10-14 广东欧珀移动通信有限公司 Communication method and system for mobile terminal, mobile terminal and server
CN106161183A (en) * 2015-03-30 2016-11-23 重庆邮电大学 Method for message interaction and social interaction server device and communication system
CN107294724A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of up verification method of short message and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9886693B2 (en) * 2009-03-30 2018-02-06 Yuh-Shen Song Privacy protected anti identity theft and payment network
CN102291369A (en) * 2010-06-21 2011-12-21 上海薄荷信息科技有限公司 Control method and corresponding control device for verifying junk information settings
US9483623B2 (en) * 2012-10-10 2016-11-01 Adobe Systems Incorporated Displaying targeted website content based on social user profile data
CN104615335B (en) * 2015-02-13 2019-02-22 腾讯科技(北京)有限公司 A kind of information processing method, client

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161183A (en) * 2015-03-30 2016-11-23 重庆邮电大学 Method for message interaction and social interaction server device and communication system
CN104883293A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Message interaction method, relevant apparatus and communication system
CN104980899A (en) * 2015-05-28 2015-10-14 广东欧珀移动通信有限公司 Communication method and system for mobile terminal, mobile terminal and server
CN107294724A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of up verification method of short message and device

Also Published As

Publication number Publication date
CN109981644A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
US20160335441A1 (en) Security engine for a secure operating environment
WO2015169158A1 (en) Information protection method and system
US11129020B2 (en) Method and device for establishing connection to wireless access point
CN108965250B (en) Digital certificate installation method and system
US20160142210A1 (en) Signatures for near field communications
US20160125522A1 (en) Automatic account lockout
US10187428B2 (en) Identifying data usage via active data
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
US11916936B2 (en) Techniques for incentivized intrusion detection system
US20190325134A1 (en) Neural network detection of malicious activity
US20210158360A1 (en) Systems, methods and computer program products for securing electronic transactions
CN113486348A (en) API service security control system and method for open bank
US11057392B2 (en) Data security method utilizing mesh network dynamic scoring
Vishnuvardhan et al. A study of digital banking: Security issues and challenges
CN109639437B (en) Monitoring method, device, equipment and medium based on trusted data source
US11558365B1 (en) Multi-second factor authentication
WO2015188718A1 (en) Mobile terminal-based payment method and apparatus, and mobile terminal
CN109981644B (en) Method and equipment for sending target message
CN111932230A (en) Method and equipment for modifying red envelope
KR20180028246A (en) Smishing Message Detecting Method And Terminal, Verification Server Of Thereof
Sombatruang et al. Internet Service Providers' and Individuals' Attitudes, Barriers, and Incentives to Secure {IoT}
CN112866265B (en) CSRF attack protection method and device
US10019582B1 (en) Detecting application leaks
CN104021351A (en) Method and device for data resource access
CN113099025A (en) Method and device for adding friends in social application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant