CN111091019A - Information prompting method, device and equipment - Google Patents

Information prompting method, device and equipment Download PDF

Info

Publication number
CN111091019A
CN111091019A CN201911335623.3A CN201911335623A CN111091019A CN 111091019 A CN111091019 A CN 111091019A CN 201911335623 A CN201911335623 A CN 201911335623A CN 111091019 A CN111091019 A CN 111091019A
Authority
CN
China
Prior art keywords
link
information
risk
prompt
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911335623.3A
Other languages
Chinese (zh)
Other versions
CN111091019B (en
Inventor
王宁
朱通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN201911335623.3A priority Critical patent/CN111091019B/en
Publication of CN111091019A publication Critical patent/CN111091019A/en
Application granted granted Critical
Publication of CN111091019B publication Critical patent/CN111091019B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1439Methods for optical code recognition including a method step for retrieval of the optical code
    • G06K7/1447Methods for optical code recognition including a method step for retrieval of the optical code extracting optical codes from image or text carrying said optical code

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the specification provides an information prompting method, device and equipment. The scheme comprises the following steps: acquiring image information containing a two-dimensional code; analyzing the two-dimensional code according to the image information to obtain analyzed characters; analyzing the risk value of the link pointed by the character to obtain a first analysis result; and generating prompt information for prompting the linked risk according to the first analysis result, and displaying the prompt information.

Description

Information prompting method, device and equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information prompting method, apparatus, and device.
Background
At present, two-dimensional codes are more and more popular on mobile devices, which can store more information and represent more data types than bar codes. However, the problems follow the situation, and due to the popularization of the two-dimensional code, all industries begin to want to combine their own services with each other, and anyone can generate the two-dimensional code, and the convenience provides a new channel for the black products. The network black product takes the internet as a medium, and the organization or the individual who disturb the safety of a computer information system and the management order of a network space is disturbed. The network black products implant the two-dimensional codes by linking fishing, faking, false information, yellow gambling poison and the like, and guide the code scanning users to reveal personal privacy information, so that the code scanning users are cheated and misled, and unsafe problems of code scanning user information disclosure or property loss and the like are caused.
Therefore, it is desirable to provide a more reliable information prompting scheme for prompting the security of the two-dimensional code.
Disclosure of Invention
In view of this, the embodiment of the present application provides an information prompting method, an information prompting device, and information prompting equipment, which are used for informing a user of the security of a scanned two-dimensional code when the user scans the code, so as to ensure the code scanning security of the user.
In order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
an information prompting method provided in an embodiment of the present specification includes:
acquiring image information containing a two-dimensional code;
analyzing the two-dimensional code according to the image information to obtain analyzed characters;
analyzing the risk value of the link pointed by the character to obtain a first analysis result;
generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk;
and displaying the prompt information.
An information prompt device provided in an embodiment of the present specification includes:
the image information acquisition module is used for acquiring image information containing the two-dimensional code;
the analysis module is used for analyzing the two-dimensional code according to the image information to obtain analyzed characters;
the risk value analysis module is used for analyzing the risk value of the link pointed by the character to obtain a first analysis result;
a prompt message generation module, configured to generate a prompt message according to the first analysis result, where the prompt message is used to prompt the linked risk;
and the prompt information display module is used for displaying the prompt information.
An information prompt device provided in an embodiment of the present specification includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring image information containing a two-dimensional code;
analyzing the two-dimensional code according to the image information to obtain analyzed characters;
analyzing the risk value of the link pointed by the character to obtain a first analysis result;
generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk;
and displaying the prompt information.
Embodiments of the present specification provide a computer readable medium having stored thereon computer readable instructions executable by a processor to implement an information prompting method.
One embodiment of the present description achieves the following advantageous effects: the method comprises the steps of obtaining image information containing the two-dimensional code, analyzing the two-dimensional code according to the image information to obtain analyzed characters, analyzing a risk value of a link pointed by the characters to obtain a first analysis result, generating prompt information according to the first analysis result, and displaying the prompt information to ensure that the prompt information is displayed after a user scans or identifies the two-dimensional code and before the user jumps to a page corresponding to the link to inform the user of the risk of the scanned two-dimensional code, so that the code scanning safety of the user is guaranteed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain one or more embodiment(s) of the description and are not intended to limit the application.
Fig. 1 is an overall process schematic diagram of an information prompting method in an embodiment of the present specification;
fig. 2 is a schematic flowchart of an information prompting method provided in an embodiment of the present specification;
fig. 3 is a schematic interface diagram of prompt information display in an information prompt method provided in an embodiment of the present specification;
fig. 4 is a schematic view of a display interface of a user comment entry in an information prompting method according to an embodiment of the present specification;
fig. 5 is a schematic structural diagram of an information prompt device corresponding to fig. 2 provided in an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an information prompting device corresponding to fig. 2 provided in an embodiment of this specification.
Detailed Description
To make the objects, technical solutions and advantages of one or more embodiments of the present disclosure more apparent, the technical solutions of one or more embodiments of the present disclosure will be described in detail and completely with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present specification, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from the embodiments given herein without making any creative effort fall within the scope of protection of one or more embodiments of the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Fig. 1 is a schematic overall process diagram of an information prompting method in an embodiment of this specification. As shown in fig. 1, the process may include the following steps:
step 102: and the user scans or clicks the identification two-dimensional code, and the application program receives the image information containing the two-dimensional code.
Step 104: and the APP terminal analyzes the image information to obtain a link corresponding to the two-dimensional code.
Step 106: determining a risk value for the link.
Step 108: and determining the preset range of the risk value.
Step 110: and if the risk value belongs to the first preset range, generating safety prompt information.
Step 112: and if the risk value belongs to a second preset range, generating abnormal prompt information.
Step 114: and if the risk value belongs to a third preset range, generating an in-doubt prompt message.
When a user enters a certain application program, the two-dimensional code can be scanned or the two-dimensional code can be identified by clicking through a camera of a starting terminal, after scanning or clicking identification, the application program can acquire image information containing the two-dimensional code, the image of the two-dimensional code is analyzed, then safety judgment is carried out on a link obtained by analysis, whether the link corresponding to the two-dimensional code is safe can be judged, different prompt information is generated according to the judgment result, and the prompt information can comprise safety prompt information, abnormal prompt information and doubt prompt information. And displaying the prompt information for the user to check, and performing subsequent operation by the user according to the prompt information.
Next, an information prompting method provided by an embodiment of the specification will be specifically described with reference to the accompanying drawings:
fig. 2 is a schematic flow chart of an information prompting method provided in an embodiment of the present specification. From the viewpoint of a program, the execution subject of the flow may be a program installed in an application server or an application client.
As shown in fig. 2, the process may include the following steps:
step 202: and acquiring image information containing the two-dimensional code.
In the above steps, the execution main body for acquiring the image information including the two-dimensional code may be an application program terminal, and the image information acquired by the application program terminal may be obtained by scanning or identifying the application program through the terminal where the application program is located.
The application program may be deployed on a Terminal (Terminal) for use, where the Terminal is also called a Terminal device, and may refer to a device located at the outermost periphery of a network in a computer network, and is mainly used for inputting user information and outputting a processing result. The terminal for application deployment in the scheme can be an intelligent terminal with a data display function, a scanning function or a touch screen function, such as a mobile phone and a tablet computer used by a code scanning user, and the terminal does not limit the application.
The method comprises the steps of obtaining image information of the two-dimensional code, decoding the two-dimensional code in a camera, picture and URL link mode, and when the two-dimensional code is scanned into an electronic two-dimensional code and sent to a terminal used by a user, identifying the electronic two-dimensional code through long-time pressing of the two-dimensional code; when the two-dimensional code is not electronic but printed on a publicity page, paper or the like, a scanning camera of the terminal can be started to scan.
Taking scanning the two-dimensional code as an example, when a user scans the two-dimensional code by using a terminal with a scanning function, the corresponding application program may acquire image information corresponding to the scanned two-dimensional code, where the image information may be only image information corresponding to one two-dimensional code, or image information including the two-dimensional code and other information.
Step 204: and analyzing the two-dimensional code according to the image information to obtain analyzed characters.
The two-dimensional code may be a bar code that is extended in another dimension based on the one-dimensional bar code and has readability, binary data is represented by a black-and-white rectangular pattern, and information contained therein can be acquired after the binary data is scanned by the device. The two-dimensional code has larger data storage amount and can contain mixed contents of numbers, letters, Chinese texts and the like. A two-dimensional code comprises numbers, letters or characters corresponding to texts in various languages.
After the application program side obtains the image information containing the two-dimensional code, the application program side can analyze the image information to obtain the character corresponding to the contained two-dimensional code.
Step 206: and analyzing the risk value of the link pointed by the character to obtain a first analysis result.
Each two-dimensional code corresponds to a link, and a user can enter a webpage corresponding to the link of the two-dimensional code after scanning the two-dimensional code. Therefore, when judging whether the two-dimensional code has risks, the risk of the corresponding two-dimensional code can be analyzed by determining the risk value of the link corresponding to the two-dimensional code.
Step 208: and generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk.
After the risk corresponding to the two-dimensional code is judged, corresponding prompt information can be generated, and the prompt information mentioned here can be used for prompting the risk of the link corresponding to the scanned two-dimensional code. In general, the higher the risk value of a link, the greater the risk of the link may be considered. Such as: the scanned link corresponding to the two-dimensional code is analyzed to obtain that the risk value of the link is higher than a preset threshold value, namely the link is high in risk, and at the moment, prompt information used for prompting the link to be high in risk can be generated.
Step 210: and displaying the prompt information.
After the prompt information is generated, the prompt information can be displayed for the user to check. When the prompt information is displayed, the prompt information can be displayed after the two-dimensional code is scanned or identified, namely before the two-dimensional code jumps to the interface corresponding to the link pointed by the two-dimensional code. The displayed position can be on an interface where a user scans the two-dimensional code; or in a corresponding application program interface, such as: and after clicking the operation option of 'two-dimension code in the identification graph', the user displays prompt information in the application program interface. This is not a limitation in the present application.
In the method in fig. 2, the image information including the two-dimensional code is acquired, the two-dimensional code is analyzed according to the image information to obtain the analyzed character, the risk value of the link to which the character points is analyzed to obtain a first analysis result, the prompt information is generated according to the first analysis result, and the prompt information is displayed to ensure that the prompt information is displayed after the user scans or identifies the two-dimensional code and before the user jumps to the page corresponding to the link, so that the risk of the scanned two-dimensional code is informed to the user, and the information security of the code scanning user is ensured.
Based on the method of fig. 2, the present specification also provides some specific embodiments of the method, which are described below.
In the method steps in fig. 2, when analyzing the risk value of the link pointed to by the character corresponding to the two-dimensional code, different methods may be adopted to determine:
the method comprises the steps of comparing a link pointed by a character with links stored in a risk library, and judging a risk value of the link pointed by the character.
The analyzing the risk value of the link pointed to by the character may specifically include:
analyzing and comparing the link with risk links stored in a risk library to obtain a second analysis result, wherein the risk links with known risk values are stored in the risk library;
determining a risk value of the link based on the second analysis result.
In practical application, in order to guarantee information security of a user, the application program can determine data with risks through the collected historical data, so that risk judgment can be performed on similar risk data in the following process. The historical data may include web page link information, picture feature information, semantic feature information, web page content information, violation keyword information, and the like. Such as: the application program end collects some link information or other related information corresponding to illegal websites such as a plurality of phishing websites, counterfeit websites and gambling websites according to historical data, and stores the information into a risk library corresponding to the application program.
The risk repository may represent a storage space for storing risk data. Taking an application with a payment function as an example, by collecting historical transaction data in the application, information corresponding to a transaction with a risk can be obtained. For example: there is a risk transaction in the historical transaction record: after the user A enters a webpage for payment by scanning the two-dimensional code provided by the user B, the user A finds that the user B is a cheater, and property loss of the user A is caused. Therefore, link information corresponding to the two-dimensional code provided by the user B, web page information corresponding to the link information, account information of the user B, and the like may be stored in the risk database corresponding to the application program. Therefore, the risk of the link corresponding to the scanned two-dimensional code can be determined by comparing the link corresponding to the scanned two-dimensional code with the risk link stored in the risk library.
The risk database may store risk data corresponding to a plurality of risk domains. The risk domain may be a domain prohibited by legal regulations. For example: religion, fraud, gambling, personal property security, and the like.
The risk domain data may represent data corresponding to various risk types, such as: data corresponding to counterfeit websites, data corresponding to fraudulent websites, and the like. And the risk library stores relevant data corresponding to each risk domain, compares and associates information corresponding to the two-dimensional code with information stored in the risk library when determining the risk of the identified two-dimensional code, and judges whether the identified two-dimensional code is safe or not according to the comparison and association result.
When the link is compared to judge whether the two-dimensional code to be identified is safe, whether the link corresponding to the two-dimensional code to be identified is a risk link can be determined by comparing the similarity or correlation of the two links. When the link corresponding to the two-dimensional code to be identified is the same as or has higher similarity with the link in the risk library, the link corresponding to the two-dimensional code to be identified can be considered to have risk, and the risk value of the link is determined according to the corresponding scoring method. Such as: the link corresponding to the two-dimensional code to be identified is judged to belong to a counterfeit website (for example, a website of a forged bank or a certain financial institution), and the link can be considered to belong to an abnormal link. Or the link corresponding to the two-dimensional code to be identified and the link similarity of a certain phishing website stored in the risk library are higher than a preset value through judgment, and the link can be considered to belong to an abnormal link.
The method for calculating the risk value can be a plurality of algorithms, and the method for analyzing the two-dimensional code and the method for calculating the risk value are not limited in the scheme.
And secondly, determining the risk value of the link by analyzing the webpage information corresponding to the link.
The analyzing the risk value of the link pointed to by the character may specifically include:
analyzing the characters to obtain webpage link information pointed by the characters;
acquiring webpage content information corresponding to the webpage link information;
determining a risk value for the link based on the web page content information.
In an application scenario, the two-dimensional code can be a payment two-dimensional code or a webpage information two-dimensional code for promotion and publicity, and both the payment two-dimensional code and the webpage information two-dimensional code correspond to link information. After analyzing the characters corresponding to the two-dimensional code, webpage link information pointed by the characters can be obtained, the webpage link information corresponds to webpage content information, and the risk value of the link is determined by analyzing the webpage content information.
Further, the determining the risk value of the link based on the webpage content information may specifically include:
extracting keywords in the webpage content information;
analyzing and comparing the key words with risk keywords stored in a risk library to obtain a third analysis result;
determining a risk value of the link according to the third analysis result.
When the risk value of the link is determined based on the webpage content information, the extracted keywords can be compared with the keywords stored in the risk library for correlation analysis by extracting the keywords in the webpage content information, and the risk value of the link is determined through a corresponding algorithm according to the analysis result.
The keywords in the risk library may be some illegal keywords, and different keywords may correspond to different risk domains, such as: the gambling field can have the risk keywords such as 'banker' and 'fried golden flower', the cheating field can have the risks of 'clicking to receive the prize', 'clicking to double the prize' and 'free for all people', and the like. Therefore, when the link corresponding to the two-dimensional code is judged to be safe, the keyword in the webpage content information corresponding to the link can be extracted, and if the extracted keyword belongs to the illegal keyword in the risk library, the risk value corresponding to the link can be determined according to the risk level corresponding to the keyword and the preset rule. The method for determining the link risk value according to the risk level of the keyword mentioned herein may be various, and the sum of each keyword may be used as the link risk value, and the average value of the risk values of the keywords may also be used as the link risk value, and the like, and this scheme is not limited to this.
Besides the above method for extracting keyword comparison, the determining the risk value of the link based on the web page content information may further include:
performing semantic analysis and/or picture analysis on the webpage content information to obtain characteristic information corresponding to the webpage content information;
and inputting the characteristic information into a risk identification model to obtain a risk value corresponding to the link.
Semantic analysis may refer to mining and learning deep concepts such as text and pictures using various machine learning methods. Each link corresponds to webpage information, when the webpage information is analyzed, text semantic analysis can be performed on texts in the webpage, picture semantic analysis can also be performed on pictures corresponding to the webpage, and feature information corresponding to webpage content information is extracted according to a preset rule, wherein the feature information can comprise text feature information and/or webpage feature information and the like.
The risk identification model can be a risk identification model based on a neural network or a deep learning model, extracted feature information is input into the risk identification model, the input feature information is identified through the risk identification model, and a risk value corresponding to the link can be obtained.
Of course, besides the above method, it is also possible to determine the operation behavior of the user providing the two-dimensional code within a set time, determine whether there is an abnormal operation, and so on, such as: judging whether a party providing the two-dimensional code has risk characteristics of fraud, cheating, cash register, gambling (fund transfer link) and the like; or judging whether an abnormal operation (such as equipment change, remote location and the like) exists recently by a party providing the two-dimensional code, and then determining the linked risk value according to a preset rule.
By the method, the linked risk value corresponding to the two-dimensional code can be determined by different methods, and prompt information can be generated according to the linked risk value conveniently in the follow-up process. The prompt message may include icon information and/or text information.
The prompt may be an icon that can represent safety, danger (anomaly), or doubt.
The icon may be a solid color icon, such as: the safety prompt message can be pure green icon information, the abnormal prompt message can be red icon information, and the doubt prompt message can be yellow icon information. Or may be a non-solid icon, or may be an irregular icon or the like that can indicate a safe meaning, such as: the exception prompting message may be an icon message with a red exclamation point.
The prompt may also be a text message that can represent a security, exception, or doubt, such as a security prompt: the safety prompt message can be a text message with a safety word, or a text message with a safety meaning, such as: the text information such as 'the page has passed the authentication and please operate with ease' can also be the text information with 'Safety' word.
In order to more clearly illustrate the related content of the prompt message, the following description can be made in conjunction with fig. 3:
fig. 3 is a schematic interface diagram of prompt information display in an information prompt method provided in an embodiment of this specification.
As shown in fig. 3, in the drawings: the first hint information 301 may be a first color, the first color being used to indicate that the link is a secure link; the second prompt message 303 may be a second color, where the second color is used to indicate that the link is an abnormal link; the third prompt 305 may be a third color; the third color is used to indicate that the link is an in-doubt link. The first prompt 301 may also be expressed in words for indicating a secure meaning, such as: authentication pass! Please put the operation at ease ", the second prompt message 303 may also be represented by words indicating abnormal meanings, such as: "Exception! Please stop the operation immediately ", the third prompt message 305 may also be represented by words indicating the suspicious meaning, such as: "unknown! Please confirm that the source is operating cautiously ".
Further, when generating the second prompt message, the method may specifically include:
generating risk type prompt information containing the linked risk type information;
after the generating the second prompt message, the method may further include:
and displaying the risk type prompt message.
In an actual application scenario, the exception prompt message may further display a risk type, and when the user is informed that the link is abnormal, the user is informed of the abnormal type. Such as: and judging that the link corresponding to the two-dimensional code is a link corresponding to a counterfeit website, wherein the counterfeit website counterfeit bank organization steals the personal information of the user and deducts funds in the account of the user, and at the moment, after displaying the abnormal prompt information for the user, the link is displayed as a counterfeit fraud connection for the user. As shown in fig. 3, when displaying the abnormality prompt information, the risk type prompt information 311 may also be displayed, such as: and displaying the risk type prompt message as 'suspected fraud'.
It should be noted that when the risk type prompt message is displayed, the risk type prompt message may be displayed simultaneously with the abnormal prompt message, or may be displayed after the abnormal prompt message is displayed. The abnormal prompt information and the abnormal prompt information can be displayed on the same page or different pages, and the scheme is not strictly limited to the above.
After analyzing the linked risk value to obtain an analysis result, generating a prompt message according to the risk value of the analysis result, more specifically, generating a prompt message according to the first analysis result may specifically include:
when the first analysis result shows that the risk value of the link is in a first preset range, generating first prompt information, wherein the first prompt information is used for showing that the link is a safe link;
when the first analysis result shows that the risk value of the link is in a second preset range, generating second prompt information, wherein the second prompt information is used for showing that the link is an abnormal link;
and when the first analysis result shows that the risk value of the link is in a third preset range, generating third prompt information, wherein the third prompt information is used for showing that the link is an in-doubt link, and the in-doubt link is a link the safety of which cannot be determined.
When generating the hint information according to the analysis result, different hint information may be generated according to the specific risk value of the link, and the hint information may represent information for prompting the risk of the link, such as: the prompt message can be a safety prompt message, a danger prompt message and an in-doubt prompt message. Three different threshold value ranges can be set, and the type of the generated prompt message is determined by judging the threshold value range in which the risk value corresponding to the link falls. The first preset range may be considered as a numerical range corresponding to the secure link, the second preset range may be considered as a numerical range corresponding to the abnormal link, and the third preset range may be considered as a numerical range corresponding to the in-doubt link.
It should be noted that risk data exists in the risk library, and the risk data are obtained by analyzing according to historical data, in addition, in some cases, the scanned two-dimensional code may be a new two-dimensional code that is just generated or a two-dimensional code that has never been identified in an application program system, at this time, the application program cannot directly judge the security of the link corresponding to the two-dimensional code, at this time, a code scanning user may be prompted that the link corresponding to the two-dimensional code is an in-doubt link, and the user may automatically judge whether to continue to execute subsequent steps. Such as: and a certain two-dimension code is sent to the user A by a person trusted by the user A, at the moment, the security system of the application program cannot judge the security of the two-dimension code, and can output a prompt to the user that a link corresponding to the two-dimension code is an in-doubt link. However, if the two-dimensional code is sent by a stranger, the doubt prompting message can prompt the user to increase the vigilance.
For example: setting the numerical range corresponding to the safe link to be greater than or equal to 30 minutes and less than 60 minutes, setting the numerical range corresponding to the abnormal link to be greater than or equal to 60 minutes, and setting the numerical range corresponding to the in-doubt link to be less than 30 minutes. At this time, assuming that the risk value corresponding to the link a is determined to be 50 minutes, the risk value corresponding to the link B is determined to be 90 minutes, and the risk value corresponding to the link C is determined to be 10 minutes, at this time, the risk value of the link a falls within the numerical range corresponding to the safe link, the link a may be considered to be the safe link, the risk value of the link B falls within the numerical range corresponding to the abnormal link, the link B may be considered to be the abnormal link, and the risk value of the link C falls within the numerical range corresponding to the in-doubt link, and the link C may be considered to be the in-doubt link. In this case, the presentation information corresponding to link a is presentation information indicating that link a is a secure link, the presentation information corresponding to link B is presentation information indicating that link B is an abnormal link, and the presentation information corresponding to link C is presentation information indicating that link C is an in-doubt link. Where an in-doubt link is a link for which security cannot be determined.
According to the method, based on the safety prevention and control capacity of each risk domain, prompt information is generated in a simple and easy manner according to the linked risk value of the two-dimensional code, prompt is performed in the code scanning process of a user, the safety of the two-dimensional code identified by the user can be prompted, the user can visually know the safety of the identified two-dimensional code, whether a webpage corresponding to the two-dimensional code is continuously opened or not can be judged according to the prompt information to perform subsequent operation, the risk of information leakage or property loss when the user identifies the two-dimensional code can be greatly reduced, and therefore the code scanning safety of the user is guaranteed.
After displaying the prompt information, the user may perform subsequent operations according to the displayed prompt information, and more specifically, after displaying the prompt information, the method may further include:
displaying operation options on a terminal interface, as shown in fig. 3, where the operation options include a first option 307 and a second option 309, and the first option 307 is used for receiving a determination operation that a user continues to access the link; the second option 309 is used for receiving a determination that the user has stopped accessing the link.
When a first selection operation of the user on the first option 307 is received, in response to the first selection operation, jumping to a webpage corresponding to the link; when a second selection operation of the second option 309 by the user is received, in response to the second selection operation, the access to the web page corresponding to the link may be stopped.
The operation may be a touch operation of a user, for example: the user operates the finger and stroke operation or the touch option operation. In this scenario, the operation may represent: the user clicks on the first option 307 to instruct jumping to a web page corresponding to the link or clicks on the second option 309 to instruct stopping accessing the web page corresponding to the link.
Stopping access to the web page corresponding to the link may take a variety of forms, such as: after clicking the second option 309, the user may return to the scanning interface or the interface before identifying the two-dimensional code, or may directly return to the home page of the application program, which may be specifically set according to the actual situation, and this is not limited here.
Fig. 4 is a schematic view of a display interface of a user comment entry in an information prompting method provided in an embodiment of the present specification.
As shown in fig. 4, after the prompt information is displayed in the terminal interface, a user comment editing interface may also be displayed on the terminal interface, where the user comment editing interface is used to obtain information that the user feeds back the prompt information.
The user comment editing interface 403 is directly displayed on the terminal interface, so that the user can conveniently make comment feedback on the prompt information, but besides directly displaying the user comment editing interface 403, a feedback operation option 401 can also be displayed on the terminal interface, and the feedback operation option 401 is used for receiving the determination operation of the user for feeding back the prompt information. The user enters a user comment editing interface by clicking a feedback operation option 401 to edit the comment. Of course, besides the comment editing interface 403 or the feedback operation option 401, a user comment interface (not shown in the figure) may be displayed in the terminal interface, and the user comment interface may display feedback opinions or suggestions of other users on the prompt information for the user to view.
It should be noted that, no matter the user comment editing interface is directly displayed, or the feedback operation options are displayed, or the user comment interface is displayed, the time of display and the position of display may be set according to actual situations, for example: the display can be displayed in different pages or in the same page; the display can be carried out simultaneously or according to a preset rule. This is not limited in this embodiment.
By the method, a comment entry is provided for the user, and the requirement of the user for commenting or complaining the prompt information can be met. The user may have various questions or complaints about the displayed prompt information, and by providing a comment entry to the user, the application operator can quickly find and solve the problem according to the information provided by the user.
According to the scheme, after the prompt message corresponding to the two-dimensional code is displayed for the user, most of users can perform subsequent operations according to the prompt message, such as: when the safety prompt information is displayed, the user can be relieved to enter the webpage corresponding to the link to carry out payment operation or other operations; when the abnormal prompt information is displayed, the user stops accessing the link corresponding to the two-dimensional code; when the doubt prompting information is displayed, the user can judge whether to continuously access the link corresponding to the two-dimensional code. In order to fully ensure the information and property safety of the user, the fund loss guarantee can be provided for the user, when the user continues to access the webpage corresponding to the link to cause the fund loss on the premise of displaying the safety prompt information, the user can select complaints, and the fund loss is compensated for the user through the preset compensation rule, so that the fund guarantee is provided for the safe code scanning of the user.
Based on the same idea, the embodiment of the present specification further provides a device corresponding to the above method. Fig. 5 is a schematic structural diagram of an information prompting device corresponding to fig. 2 provided in an embodiment of the present disclosure. As shown in fig. 5, the apparatus may include:
an image information obtaining module 502, configured to obtain image information including a two-dimensional code;
the analyzing module 504 is configured to analyze the two-dimensional code according to the image information to obtain an analyzed character;
a risk value analysis module 506, configured to analyze a risk value of the link pointed by the character to obtain a first analysis result;
a prompt message generating module 508, configured to generate a prompt message according to the first analysis result, where the prompt message is used to prompt the linked risk;
and a prompt information display module 510, configured to display the prompt information.
Optionally, the risk value analyzing module 506 may specifically include:
a first risk value analysis unit for:
analyzing and comparing the link with risk links stored in a risk library to obtain a second analysis result, wherein the risk links with known risk values are stored in the risk library;
and determining a risk value of the link based on the second analysis result.
Optionally, the risk value analyzing module 506 may specifically include:
a second risk value analysis unit for:
analyzing the characters to obtain webpage link information pointed by the characters;
acquiring webpage content information corresponding to the webpage link information;
determining a risk value for the link based on the web page content information.
Optionally, the second risk value analyzing unit may be specifically configured to:
extracting keywords in the webpage content information;
analyzing and comparing the key words with risk keywords stored in a risk library to obtain a third analysis result;
determining a risk value of the link according to the third analysis result.
Optionally, the second risk value analyzing unit may be specifically configured to:
performing semantic analysis and/or picture analysis on the webpage content information to obtain characteristic information corresponding to the webpage content information;
and inputting the characteristic information into a risk identification model to obtain a risk value corresponding to the link.
Optionally, the prompt information generating module 508 may specifically include:
a first prompt information generation unit, configured to generate first prompt information when the first analysis result indicates that the risk value of the link is within a first preset range, where the first prompt information is used to indicate that the link is a secure link;
the second prompt information generation unit is used for generating second prompt information when the first analysis result shows that the risk value of the link is in a second preset range, and the second prompt information is used for showing that the link is an abnormal link;
and a third prompt information generation unit, configured to generate third prompt information when the first analysis result indicates that the risk value of the link is within a third preset range, where the third prompt information is used to indicate that the link is an in-doubt link, and the in-doubt link is a link whose security cannot be determined.
Optionally, the prompt message may include icon information and/or text information.
Optionally, the first prompt message may be a first color, and the first color may be used to indicate that the link is a secure link; the second prompt message is in a second color, and the second color is used for indicating that the link is an abnormal link; the third prompt message is a third color; the third color is used to indicate that the link is an in-doubt link.
Optionally, the second prompt information generating unit may be specifically configured to:
generating risk type prompt information containing the linked risk type information;
after the generating the second prompt message, the method further includes:
and displaying the risk type prompt message.
Optionally, the apparatus may further include:
the operation option display module is used for displaying operation options on a terminal interface, wherein the operation options comprise a first option and a second option, and the first option is used for receiving the determination operation of the user for continuing accessing the link; the second option is used for receiving a determination operation that the user stops accessing the link.
Optionally, the apparatus may further include:
and the user comment editing interface display module is used for displaying a user comment editing interface, and the user comment editing interface is used for acquiring information fed back by the user to the prompt information.
Optionally, the apparatus may further include:
and the feedback operation option display module is used for receiving the determination operation of the user for feeding back the prompt information.
Optionally, the apparatus may be further configured to:
receiving a first selection operation of a user on the first option;
and responding to the first selected operation, and jumping to the webpage corresponding to the link.
Optionally, the apparatus may be further configured to:
receiving a second selection operation of the user on the second option;
and stopping the access to the webpage corresponding to the link in response to the second selected operation.
Based on the same idea, the embodiment of the present specification further provides a device corresponding to the above method. Fig. 6 is a schematic structural diagram of an information prompting device corresponding to fig. 2 provided in an embodiment of this specification. As shown in fig. 6, the apparatus 600 may include:
at least one processor 610; and the number of the first and second groups,
a memory 630 communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory 630 stores instructions 620 executable by the at least one processor 610, the instructions being executed by the at least one processor 610.
The instructions may enable the at least one processor 610 to:
acquiring image information containing a two-dimensional code;
analyzing the two-dimensional code according to the image information to obtain analyzed characters;
analyzing the risk value of the link pointed by the character to obtain a first analysis result;
generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk;
and displaying the prompt information.
Based on the same idea, the embodiment of the present specification further provides a computer-readable medium corresponding to the above method. The computer readable medium has computer readable instructions stored thereon that are executable by a processor to implement the method of:
acquiring image information containing a two-dimensional code;
analyzing the two-dimensional code according to the image information to obtain analyzed characters;
analyzing the risk value of the link pointed by the character to obtain a first analysis result;
generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk;
and displaying the prompt information.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardsradware (Hardware Description Language), vhjhd (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations in implementing one or more embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
One or more embodiments of the present description are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to one or more embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is merely exemplary of the present disclosure and is not intended to limit one or more embodiments of the present disclosure. Various modifications and alterations to one or more embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of one or more embodiments of the present specification should be included in the scope of claims of one or more embodiments of the present specification.

Claims (17)

1. An information prompting method comprises the following steps:
acquiring image information containing a two-dimensional code;
analyzing the two-dimensional code according to the image information to obtain analyzed characters;
analyzing the risk value of the link pointed by the character to obtain a first analysis result;
generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk;
and displaying the prompt information.
2. The method according to claim 1, wherein analyzing the risk value of the link pointed to by the character specifically comprises:
analyzing and comparing the link with risk links stored in a risk library to obtain a second analysis result, wherein the risk links with known risk values are stored in the risk library;
determining a risk value of the link based on the second analysis result.
3. The method according to claim 1, wherein analyzing the risk value of the link pointed to by the character specifically comprises:
analyzing the characters to obtain webpage link information pointed by the characters;
acquiring webpage content information corresponding to the webpage link information;
determining a risk value for the link based on the web page content information.
4. The method according to claim 3, wherein determining the risk value of the link based on the web page content information specifically comprises:
extracting keywords in the webpage content information;
analyzing and comparing the key words with risk keywords stored in a risk library to obtain a third analysis result;
determining a risk value of the link according to the third analysis result.
5. The method according to claim 3, wherein determining the risk value of the link based on the web page content information specifically comprises:
performing semantic analysis and/or picture analysis on the webpage content information to obtain characteristic information corresponding to the webpage content information;
and inputting the characteristic information into a risk identification model to obtain a risk value corresponding to the link.
6. The method according to claim 1, wherein the generating of the prompt information according to the first analysis result specifically includes:
when the first analysis result shows that the risk value of the link is in a first preset range, generating first prompt information, wherein the first prompt information is used for showing that the link is a safe link;
when the first analysis result shows that the risk value of the link is in a second preset range, generating second prompt information, wherein the second prompt information is used for showing that the link is an abnormal link;
and when the first analysis result shows that the risk value of the link is in a third preset range, generating third prompt information, wherein the third prompt information is used for showing that the link is an in-doubt link, and the in-doubt link is a link the safety of which cannot be determined.
7. The method of claim 6, wherein the prompt message comprises an icon message and/or a text message.
8. The method of claim 6, wherein the first prompt is a first color, the first color indicating that the link is a secure link;
the second prompt message is in a second color, and the second color is used for indicating that the link is an abnormal link;
the third prompt message is a third color; the third color is used to indicate that the link is an in-doubt link.
9. The method of claim 6, wherein the generating of the second prompt message specifically includes:
generating risk type prompt information containing the linked risk type information;
after the generating the second prompt message, the method further includes:
and displaying the risk type prompt message.
10. The method of claim 1, further comprising, after displaying the prompt message:
displaying operation options on a terminal interface, wherein the operation options comprise a first option and a second option, and the first option is used for receiving a determination operation of a user for continuing accessing the link; the second option is used for receiving a determination operation that the user stops accessing the link.
11. The method of claim 1, further comprising, after displaying the reminder information:
and displaying a user comment editing interface, wherein the user comment editing interface is used for acquiring information fed back by the user to the prompt information.
12. The method of claim 1, further comprising, after displaying the reminder information:
and displaying a feedback operation option, wherein the feedback operation option is used for receiving a trigger operation of a user for feeding back the prompt information.
13. The method of claim 10, after displaying the prompting message, further comprising:
receiving a first selection operation of a user on the first option;
and responding to the first selected operation, and jumping to the webpage corresponding to the link.
14. The method of claim 10, after displaying the prompting message, further comprising:
receiving a second selection operation of the user on the second option;
and stopping the access to the webpage corresponding to the link in response to the second selected operation.
15. An information presentation device comprising:
the image information acquisition module is used for acquiring image information containing the two-dimensional code;
the analysis module is used for analyzing the two-dimensional code according to the image information to obtain analyzed characters;
the risk value analysis module is used for analyzing the risk value of the link pointed by the character to obtain a first analysis result;
a prompt message generation module, configured to generate a prompt message according to the first analysis result, where the prompt message is used to prompt the linked risk;
and the prompt information display module is used for displaying the prompt information.
16. An information prompting device, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring image information containing a two-dimensional code;
analyzing the two-dimensional code according to the image information to obtain analyzed characters;
analyzing the risk value of the link pointed by the character to obtain a first analysis result;
generating prompt information according to the first analysis result, wherein the prompt information is used for prompting the linked risk;
and displaying the prompt information.
17. A computer readable medium having computer readable instructions stored thereon which are executable by a processor to implement the information prompting method of any one of claims 1 to 14.
CN201911335623.3A 2019-12-23 2019-12-23 Information prompting method, device and equipment Active CN111091019B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911335623.3A CN111091019B (en) 2019-12-23 2019-12-23 Information prompting method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911335623.3A CN111091019B (en) 2019-12-23 2019-12-23 Information prompting method, device and equipment

Publications (2)

Publication Number Publication Date
CN111091019A true CN111091019A (en) 2020-05-01
CN111091019B CN111091019B (en) 2024-03-01

Family

ID=70395309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911335623.3A Active CN111091019B (en) 2019-12-23 2019-12-23 Information prompting method, device and equipment

Country Status (1)

Country Link
CN (1) CN111091019B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115687829A (en) * 2022-12-29 2023-02-03 四川绿源集科技有限公司 Page jump method and device, computer readable storage medium and electronic equipment

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102622435A (en) * 2012-02-29 2012-08-01 百度在线网络技术(北京)有限公司 Method and device for detecting black chain
CN102664878A (en) * 2012-04-10 2012-09-12 中国科学院计算机网络信息中心 Method and equipment for detection of counterfeit domain names
KR20130035572A (en) * 2011-09-30 2013-04-09 고려대학교 산학협력단 Detecting apparatus and method for messenger phishing
CN103530367A (en) * 2013-10-12 2014-01-22 深圳先进技术研究院 Phishing netsite identification system and method
US20140033307A1 (en) * 2012-07-24 2014-01-30 Webroot Inc. System and method to provide automatic classification of phishing sites
US20140259158A1 (en) * 2013-03-11 2014-09-11 Bank Of America Corporation Risk Ranking Referential Links in Electronic Messages
CN104091140A (en) * 2014-06-23 2014-10-08 联想(北京)有限公司 Information processing method and electronic device
CN105100119A (en) * 2015-08-31 2015-11-25 百度在线网络技术(北京)有限公司 URL detection method and device
CN105956472A (en) * 2016-05-12 2016-09-21 宝利九章(北京)数据技术有限公司 Method and system for identifying whether webpage includes malicious content or not
CN106302438A (en) * 2016-08-11 2017-01-04 国家计算机网络与信息安全管理中心 A kind of method of actively monitoring fishing website of Behavior-based control feature by all kinds of means
CN106330811A (en) * 2015-06-15 2017-01-11 中兴通讯股份有限公司 Domain name credibility determination method and device
CN106561029A (en) * 2016-12-09 2017-04-12 北京安天电子设备有限公司 Semi-connection two-dimensional code detecting method and system
CN107231285A (en) * 2016-03-23 2017-10-03 北京搜狗科技发展有限公司 A kind of Content of Communication processing method, device and processing equipment
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN107862050A (en) * 2017-11-08 2018-03-30 国网四川省电力公司信息通信公司 A kind of web site contents safety detecting system and method
CN108111478A (en) * 2017-11-07 2018-06-01 中国互联网络信息中心 A kind of phishing recognition methods and device based on semantic understanding
US20190065736A1 (en) * 2017-08-29 2019-02-28 Symantec Corporation Systems and methods for preventing malicious applications from exploiting application services
CN109447469A (en) * 2018-10-30 2019-03-08 阿里巴巴集团控股有限公司 A kind of Method for text detection, device and equipment
CN109743309A (en) * 2018-12-28 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of illegal request recognition methods, device and electronic equipment
CN110309388A (en) * 2018-03-09 2019-10-08 阿里巴巴集团控股有限公司 The illegal Risk Identification Method of data object information, device and computer system
CN110443031A (en) * 2019-07-16 2019-11-12 阿里巴巴集团控股有限公司 A kind of two dimensional code Risk Identification Method and system

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20130035572A (en) * 2011-09-30 2013-04-09 고려대학교 산학협력단 Detecting apparatus and method for messenger phishing
CN102622435A (en) * 2012-02-29 2012-08-01 百度在线网络技术(北京)有限公司 Method and device for detecting black chain
CN102664878A (en) * 2012-04-10 2012-09-12 中国科学院计算机网络信息中心 Method and equipment for detection of counterfeit domain names
US20140033307A1 (en) * 2012-07-24 2014-01-30 Webroot Inc. System and method to provide automatic classification of phishing sites
US20140259158A1 (en) * 2013-03-11 2014-09-11 Bank Of America Corporation Risk Ranking Referential Links in Electronic Messages
CN103530367A (en) * 2013-10-12 2014-01-22 深圳先进技术研究院 Phishing netsite identification system and method
CN104091140A (en) * 2014-06-23 2014-10-08 联想(北京)有限公司 Information processing method and electronic device
CN106330811A (en) * 2015-06-15 2017-01-11 中兴通讯股份有限公司 Domain name credibility determination method and device
CN105100119A (en) * 2015-08-31 2015-11-25 百度在线网络技术(北京)有限公司 URL detection method and device
CN107231285A (en) * 2016-03-23 2017-10-03 北京搜狗科技发展有限公司 A kind of Content of Communication processing method, device and processing equipment
CN105956472A (en) * 2016-05-12 2016-09-21 宝利九章(北京)数据技术有限公司 Method and system for identifying whether webpage includes malicious content or not
CN106302438A (en) * 2016-08-11 2017-01-04 国家计算机网络与信息安全管理中心 A kind of method of actively monitoring fishing website of Behavior-based control feature by all kinds of means
CN106561029A (en) * 2016-12-09 2017-04-12 北京安天电子设备有限公司 Semi-connection two-dimensional code detecting method and system
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
US20190065736A1 (en) * 2017-08-29 2019-02-28 Symantec Corporation Systems and methods for preventing malicious applications from exploiting application services
CN108111478A (en) * 2017-11-07 2018-06-01 中国互联网络信息中心 A kind of phishing recognition methods and device based on semantic understanding
CN107862050A (en) * 2017-11-08 2018-03-30 国网四川省电力公司信息通信公司 A kind of web site contents safety detecting system and method
CN110309388A (en) * 2018-03-09 2019-10-08 阿里巴巴集团控股有限公司 The illegal Risk Identification Method of data object information, device and computer system
CN109447469A (en) * 2018-10-30 2019-03-08 阿里巴巴集团控股有限公司 A kind of Method for text detection, device and equipment
CN109743309A (en) * 2018-12-28 2019-05-10 微梦创科网络科技(中国)有限公司 A kind of illegal request recognition methods, device and electronic equipment
CN110443031A (en) * 2019-07-16 2019-11-12 阿里巴巴集团控股有限公司 A kind of two dimensional code Risk Identification Method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁晓容: "邮件过滤系统的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115687829A (en) * 2022-12-29 2023-02-03 四川绿源集科技有限公司 Page jump method and device, computer readable storage medium and electronic equipment
CN115687829B (en) * 2022-12-29 2023-04-07 四川绿源集科技有限公司 Page jump method and device, computer readable storage medium and electronic equipment

Also Published As

Publication number Publication date
CN111091019B (en) 2024-03-01

Similar Documents

Publication Publication Date Title
CN109087106B (en) Wind control model training and wind control method, device and equipment for recognizing fraudulent use of secondary number-paying account
Harborth et al. Investigating privacy concerns related to mobile augmented reality Apps–A vignette based online experiment
Xi et al. Deepintent: Deep icon-behavior learning for detecting intention-behavior discrepancy in mobile apps
CN113886584A (en) Information detection method, device and equipment for application program
CN111353488B (en) Method, device and equipment for identifying risks in code image
Kaur et al. Crowdmask: Using crowds to preserve privacy in crowd-powered systems via progressive filtering
EP2211286A1 (en) Method for securing an interface between a user and an application, corresponding system, terminal and computer program
US20170235378A1 (en) Method for invoking local keyboard on html page in user terminal device and apparatus thereof
US11120221B2 (en) Method and system to resolve ambiguities in regulations
CN105431859A (en) Signal tokens indicative of malware
CN112734436A (en) Terminal and method for supporting face recognition
Obie et al. On the violation of honesty in mobile apps: Automated detection and categories
US20220116348A1 (en) System and Method for Tagging Data
CN112528326B (en) Information processing method and device and electronic equipment
CN111091019B (en) Information prompting method, device and equipment
CN112910896A (en) Account authentication method, device, equipment and medium
Dufresne-Camaro et al. Computer vision applications and their ethical risks in the global south
CN113837772A (en) Method, device and equipment for auditing marketing information
CN112836612A (en) Method, device and system for user real-name authentication
Bellini et al. The {Digital-Safety} Risks of Financial Technologies for Survivors of Intimate Partner Violence
CN111488180A (en) Service information processing method and device, electronic equipment and storage medium
KR102604576B1 (en) Monitoring device, method and computer program for preventing leakage and exposure of personal information in a web environment
Pan et al. \textsc {SeePrivacy}: Automated Contextual Privacy Policy Generation for Mobile Applications
CA3081893C (en) System and method for tagging data
CN113239851B (en) Privacy image processing method, device and equipment based on privacy protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant