CN111372205A - Information prompting method and electronic equipment - Google Patents
Information prompting method and electronic equipment Download PDFInfo
- Publication number
- CN111372205A CN111372205A CN202010127866.4A CN202010127866A CN111372205A CN 111372205 A CN111372205 A CN 111372205A CN 202010127866 A CN202010127866 A CN 202010127866A CN 111372205 A CN111372205 A CN 111372205A
- Authority
- CN
- China
- Prior art keywords
- address
- risk
- internet protocol
- information
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012545 processing Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 8
- 230000006870 function Effects 0.000 description 12
- 230000008569 process Effects 0.000 description 10
- 238000004590 computer program Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 230000006399 behavior Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses an information prompting method and electronic equipment, wherein the method comprises the following steps: receiving a first input of a user requesting to access a target webpage; responding to the first input, and acquiring an Internet Protocol (IP) address of a target webpage; and when the IP address is the preset risk address, outputting prompt information, and prompting the target webpage to be an unsafe webpage by the prompt information. To avoid the problem of network hijacking.
Description
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to an information prompting method and electronic equipment.
Background
With the gradual improvement of hardware configuration and the expansion of functions of electronic devices, electronic devices have become a necessity for people to access the internet.
When a user accesses the internet with a higher security level (such as a bank account login scene, an instant messaging login scene, and the like) through electronic equipment, a phenomenon of network hijacking needs to be prevented, for example, when the user is linked with a Wireless-Fidelity (Wi-Fi) in a certain store, the user is maliciously guided to download of an application program, hijacked to a promotion interface of the certain store, maliciously guided to a malicious website, and the like, and thus privacy information of the user is leaked. Therefore, how to avoid network hijacking becomes an urgent problem to be solved in the current network security.
Disclosure of Invention
The embodiment of the invention provides an information prompting method, electronic equipment and a storage medium, which are used for avoiding the problem of network hijacking.
In order to solve the above technical problem, the method provided by the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides an information prompting method, which is applied to an electronic device, and the method may include:
receiving a first input of a user requesting to access a target webpage;
responding to the first input, and acquiring an Internet Protocol (IP) address of a target webpage;
and when the IP address is the preset risk address, outputting prompt information, wherein the prompt information is used for prompting the target webpage to be an unsafe webpage to the user.
In a second aspect, an embodiment of the present invention provides an electronic device, which may include:
the receiving module is used for receiving a first input of a user request for accessing a target webpage;
the acquisition module is used for responding to the first input and acquiring the Internet protocol IP address of the target webpage;
and the prompting module is used for outputting prompting information when the IP address is the preset risk address, and the prompting information is used for prompting the target webpage to be an unsafe webpage to the user.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a processor, a memory, and a computer program stored in the memory and being executable on the processor, where the computer program, when executed by the processor, implements the information prompting method shown in the first aspect.
In a fourth aspect, there is provided a computer-readable storage medium having a computer program stored thereon, which, if the computer program is executed in a computer, causes the computer to execute the information presentation method according to the first aspect.
In the embodiment of the invention, the first input of a user request for accessing the target webpage is received, the internet protocol IP address of the target webpage is obtained, whether the IP address is the preset risk address or not is judged, and when the IP address is the preset risk address, the target webpage is prompted to the user to be an unsafe webpage. Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user.
Drawings
The present invention will be better understood from the following description of specific embodiments thereof taken in conjunction with the accompanying drawings, in which like or similar reference characters designate like or similar features.
Fig. 1 is a schematic view of an application scenario of an information prompting method according to an embodiment of the present invention;
fig. 2 is a flowchart of an information prompting method according to an embodiment of the present invention;
fig. 3 is a schematic view of a first interface of an information prompt according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a second interface of an information prompt according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a third interface of an information prompt according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, when a user accesses the internet with a higher security level (such as in the situations of bank account login, instant messaging login, and the like) through electronic equipment, for example, in the situations of bank account login, important account login, and the like, the phenomenon of network hijacking needs to be prevented. The network hijacking is that a network attacker cannot achieve an expected correct access result through a Domain Name Server (DNS) replacement mode, a data replacement mode and the like.
Under the existing network environment, for example, when a user links private Wi-Fi in a certain store, the user is maliciously guided to download an application program, hijacked to a promotion interface of the certain store, maliciously guided to a malicious website, and the like. For the phenomenon of network hijacking, two ways are currently avoided, the first way is that a user subjectively identifies according to the network environment, for example, a nearby stranger provides wifi or a private wifi of a certain store can be regarded as not very safe, so that the user can not connect wifi or visit a webpage regarded as unsafe. The second way is to set a firewall to confirm the security of the network.
However, in the first method, when the user has network awareness or network related knowledge, the network scene cannot be well recognized, and thus, if some unsafe websites are visited, the network hijacking is likely to occur. In addition, the second way of the design is that the way of setting the firewall is a good way for accessing the external network or the backbone network, but in the local area network scenario, the firewall cannot cover the local area network, and if the user is hijacked in the local area network, the user cannot access the real data.
Therefore, the existing way for preventing network hijacking is difficult to prevent the user from being hijacked by malicious network under the condition of not knowing the common sense of the network in the local area network scene, and has the defects of incomplete scene coverage and incapability of avoiding network hijacking under some scenes.
Aiming at the problems in the related art, the embodiment of the invention provides an information prompting method, electronic equipment and a storage medium, so as to solve the problems that in the related art, privacy information is easy to leak and low in safety when the electronic equipment is used for displaying the privacy information in public places.
The information prompting method provided by the embodiment of the invention can be applied to the following application scenes, which are respectively explained as follows:
as shown in fig. 1, in a local area network scenario, an electronic device may receive a first input that a user requests to access a target web page, send, in response to the first input, a domain name a corresponding to the target web page to a domain name resolution server, where the domain name resolution server obtains, according to the domain name a, an Internet Protocol (IP) address corresponding to the target web page, and sends the IP address to the electronic device; and then, when the IP address is the preset risk address, the electronic equipment outputs prompt information to the user, wherein the prompt information is used for prompting the user that the target webpage is an unsafe webpage, otherwise, when the IP address is not the preset risk address, the corresponding webpage is accessed according to the IP address, and the webpage corresponding to the IP address is displayed to the user.
What needs to be prompted is that the manner of outputting the prompt information in the embodiment of the present invention may be displaying the prompt information in a manner of outputting the prompt information through a display screen of the electronic device; or outputting prompt information in a vibration output mode of the electronic equipment; the prompt information may also be output through an output mode of playing the ring tone of the electronic device, and the output mode is not particularly limited herein.
Here, the manner of determining whether the IP address is the preset risk address in the embodiment of the present invention may include the following manner: in the first mode, under the condition that a preset risk address comprises a private Internet Protocol (IP) address, whether the IP address is the private IP address is determined; and under the condition that the IP address is a private IP address, determining the IP address as a preset risk address. In the second mode, when the preset risk address comprises a risk Internet Protocol (IP) address, second request information is sent to a configuration server corresponding to the electronic equipment, and the second request information is used for requesting the risk IP address; receiving second feedback information sent by a configuration server, wherein the second feedback information comprises a plurality of risk Internet Protocol (IP) addresses; determining whether the IP address is an address of a plurality of risky Internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as a preset risk address.
Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user. In addition, the method provided by the embodiment of the invention detects the IP address through the electronic equipment, can solve the problem that an external firewall cannot be related to an area without building complex and expensive firewall equipment, does not need a user to know much network common knowledge, and can select whether to continue to access according to the prompt information, so that the user can access the safe webpage and the experience of the user is improved.
Based on the application scenario, the following describes in detail an information prompting method provided by an embodiment of the present invention.
Fig. 2 is a flowchart of an information prompting method according to an embodiment of the present invention.
As shown in fig. 2, the information prompting method may specifically include steps 210 to 230, which are specifically as follows:
first, step 210, receiving a first input of a user requesting to access a target webpage; then, step 220, in response to the first input, acquiring an internet protocol IP address of the target webpage; then, in step 230, when the IP address is the preset risk address, the user is prompted that the target webpage is an unsafe webpage.
Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user.
The above steps are described in detail below:
first, step 210 is involved, where a user can access a target web page using multiple means on the electronic device, such as browser access, applet access, multiple application access, or web page link access.
Next, step 220 is involved, wherein, in response to the first input, first request information is sent to the domain name resolution server, and the first request information is used for requesting an IP address of the target web page; receiving first feedback information sent by a domain name resolution server; and acquiring the IP address of the target webpage according to the first feedback information.
Here, the domain name of the target web page may be included in the first request information, so that the domain name resolution server queries the IP address of the target web page according to the domain name.
Then, referring to step 230, in a possible embodiment, before performing step 230, it may further include determining whether the IP address is a preset risk address.
When the IP address is not the preset risk address, accessing a target webpage corresponding to the IP address according to the IP address, and displaying the page corresponding to the target webpage to a user; when the IP address is the preset risk address, step 230 is executed. Here, in a possible embodiment, when the user is prompted that the target webpage is an unsafe webpage, a second input that the user confirms to continue accessing is received, a page corresponding to the target webpage is displayed to the user, otherwise, when the user is prompted that the target webpage is an unsafe webpage, a third input that the user confirms not to continue accessing is received, and the process is ended.
Based on this, the embodiment of the present invention provides two ways of determining whether an IP address is a preset risk address, which are specifically as follows:
the first method is as follows: the preset risk address includes a private internet protocol, IP, address.
Wherein, determining whether the IP address is a private IP address;
and under the condition that the IP address is a private IP address, determining the IP address as a preset risk address.
Here, current IP addresses are generally classified into five types of addresses, such as:
a:0.0.0.0-127.255.255, where segments 0 and 127 are not available
B:128.0.0.0-191.255.255.255
C:192.0.0.0-223.255.255.255
D:224.0.0.0-239.255.255.255
E240.0.0.0-255.255.255.255, wherein segment 255 is unusable
The five types of addresses referred to above, in addition to segment 0 and segment 127, have some IP addresses that are not available as public IP for other purposes. A further portion is used as a private IP address, and the private IP address range is shown in table 1:
TABLE 1
A | 10.0.0.0~10.255.255.255 | 10.0.0.0/8 |
B | 172.16.0.0~172.31.255.255 | 172.16.0.0/12 |
C | 192.168.0.0~192.168.255.255 | 192.168.0.0/16 |
The private IP address cannot be routed to the Internet (Internet) backbone and the router will also discard the private address.
In summary, if an extranet address is resolved into an intranet address by DNS, the address is most likely an insecure web page (except for users on the same intranet as the website), and thus, the user's access is hijacked to a certain service address in the lan, and most likely to be an attacker address in the lan. Thus, if the private IP address detection is within the range of table 1, it is considered a preset risk address.
The second method comprises the following steps: the preset risk address comprises a risk Internet Protocol (IP) address
The electronic equipment sends second request information to a configuration server corresponding to the electronic equipment, wherein the second request information is used for requesting a risk Internet Protocol (IP) address; receiving second feedback information sent by a configuration server, wherein the second feedback information comprises a plurality of risk Internet Protocol (IP) addresses; determining whether the IP address is an address of a plurality of risky Internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as a preset risk address.
In addition, the second feedback information also comprises a risk grade corresponding to each risk internet protocol IP address of the plurality of risk internet protocol IP addresses, and the risk grade is used for representing the unsafe degree of the risk IP.
For example, the following steps are carried out: the risk IP list is shown in table 2, and includes a plurality of risk internet protocol IP addresses and risk levels corresponding to the risk internet protocol IP addresses.
TABLE 2
Risk rating | Risky internet protocol IP address |
2 | 2.2.2.2 |
3 | 3.3.3.3 |
4 | 4.4.4.4 |
5 | 5.5.5.5 |
6 | 6.6.6.6 |
It should be noted that the implementation may not be limited to the risky IP addresses shown in table 2, but may also be risky IP addresses marked by a large number of users, and risky IP addresses that are not recognized by the authorities. Therefore, the risk Internet Protocol (IP) address obtained through the big data has higher accuracy, wider trial range and more flexible realization.
In addition, in table 2, the risk level can be determined according to the behavior data accessed by the user, for example, only wifi connection pages in a general store can be considered as having a small risk, and this situation is defined as level 1; and maliciously directed to the downloading of an application, defining this as a risk level 2; when the behavior data indicates that accessing the webpage can cause the accessed electronic equipment to crash or the system to fail, defining the condition as a risk level 4; when there is behavior data indicating that the web page may reveal property loss or privacy information of the user, this case is defined as risk level 6.
Based on the contents of method two referred to in step 230, in a possible embodiment, before step 230, the method may further include: and determining the risk level of the IP address according to the risk Internet protocol IP address corresponding to the IP address. Here, since the risky internet protocol IP address has a risk level corresponding to the risky internet protocol IP address, if the IP address is one of the risky internet protocol IP addresses, the IP address also has a risk level corresponding to the IP address.
Based on this, the step 230 may specifically include:
the display prompt includes a risk level for the IP address to prompt the user that the target web page is an insecure web page.
For example, after detecting that the IP address is the preset risk address, certain processing may be performed according to the risk level, which is specifically shown as follows, but includes, but is not limited to, the following combinations:
(1) the user is prompted in the form of a message prompt box, as shown in fig. 3, such as a Toast prompt or a light prompt, to prompt the user that the target web page is an unsafe web page. Here, the time for prompting the message prompt box may be before the wifi log-in page in a certain store, or may be prompted on the wifi log-in page in a certain store.
(2) And prompting the user that the target webpage is a page for guiding the downloading of an application program in a pop-up box prompting mode, as shown in fig. 4, displaying a window for continuously accessing by operation A and a window for returning to the previous page by operation B while prompting that the target webpage is the text information of the unsafe webpage, so that the user can access according to actual needs.
(3) And prompting the user that the target webpage is attacked by a malicious account in a forced prohibition mode, so that the user is not advised to continue accessing or the target webpage is not displayed. As shown in fig. 5, when the user indicates that the target web page is the text information of the unsafe web page, the user may be forced to be prohibited from accessing the target web page due to the higher risk level of the target web page.
For example, in table 2, if the configuration server returns the web page 6.6.6.6 with risk level 6, the process may be directly performed as shown in (3); when the configuration server returns the webpage with the risk level 2, 2.2.2, the process can be directly processed according to the step (1).
Therefore, the method can prevent the user from being hijacked by an illegal network in the local area network, further ensures the network safety of the user, does not need the user to know a lot of network common knowledge, can judge through the electronic equipment, relieves the worry of the user about the network environment, can avoid some mistaken identification behaviors by the set risk level, enables the user to select whether to continue to access or not, and improves the experience of the user.
In addition, when the IP address is not the preset risk address, the target webpage is directly accessed through the network, and the content corresponding to the target webpage is displayed for the user.
In addition, it is to be noted that, in the embodiment of the present invention, a scene of a target web page is referred to, and it is needless to say that, in the scene of a target website, the target website may be prompted to be an unsafe website to a user by the information prompting method.
In summary, the method provided by the embodiment of the present invention performs IP address detection through the electronic device, so as to prevent the user from being hijacked by an illegal network in the local area network, thereby ensuring the network security of the user and protecting the privacy information of the user. In addition, the method provided by the embodiment of the invention detects the IP address through the electronic equipment, can solve the problem that an external firewall cannot be related to an area without building complex and expensive firewall equipment, does not need a user to know much network common knowledge, and can select whether to continue to access according to the prompt information, so that the user can access the safe webpage and the experience of the user is improved.
In addition, based on the information prompting method, an embodiment of the present invention further provides an electronic device, which is specifically described in detail with reference to fig. 6.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
As shown in fig. 6, the electronic device 60 may include:
the receiving module 601 is configured to receive a first input that a user requests to access a target webpage.
An obtaining module 602, configured to obtain an internet protocol IP address of the target webpage in response to the first input.
The prompting module 603 is configured to output a prompting message when the IP address is the preset risk address, where the prompting message is used to prompt the user that the target webpage is an unsafe webpage.
The obtaining module 602 in the embodiment of the present invention is specifically configured to, in response to a first input, send first request information to a domain name resolution server, where the first request information is used to request an IP address of a target web page; based on this, the receiving module 601 is specifically configured to receive first feedback information sent by the domain name resolution server; the obtaining module 602 is specifically configured to obtain the IP address of the target webpage according to the first feedback information.
In a possible implementation, the electronic device 60 further includes a processing module 604, where the processing module 604 is configured to determine that the IP address is the preset risk address.
In the case that the preset risk address includes a private internet protocol IP address, the processing module 604 may be specifically configured to determine whether the IP address is a private IP address; and under the condition that the IP address is a private IP address, determining the IP address as a preset risk address.
In another possible embodiment, the electronic device 60 further comprises a sending module 605; the sending module 605 is configured to send second request information to a configuration server corresponding to the electronic device when the preset risk address includes a risk internet protocol IP address, where the second request information is used for requesting the risk internet protocol IP address. Based on this, the receiving module 601 is further configured to receive second feedback information sent by the configuration server, where the second feedback information includes multiple risk internet protocol IP addresses; the processing module 604 is specifically configured to determine whether the IP address is an address of multiple risky internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as a preset risk address.
Further, the processing module 604 is further configured to, in a case that the second feedback information includes a risk level corresponding to each risk internet protocol IP address of the multiple risk internet protocol IP addresses, determine a risk level of the IP address according to the risk internet protocol IP address corresponding to the IP address. Based on this, the prompt module 604 is specifically configured to output a prompt message, where the prompt message includes the risk level of the IP address.
Therefore, the electronic equipment provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user. In addition, the method provided by the embodiment of the invention detects the IP address through the electronic equipment, can solve the problem that an external firewall cannot be related to an area without building complex and expensive firewall equipment, does not need a user to know much network common knowledge, and can select whether to continue to access according to the prompt information, so that the user can access the safe webpage and the experience of the user is improved.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
The electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, a power supply 711, and the like. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 7 does not constitute a limitation of the electronic device, and that the electronic device may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Wherein, the user input unit 707 is configured to receive a first input that a user requests to access the target webpage.
A processor 710 for obtaining an internet protocol, IP, address of the target web page in response to the first input.
And the display unit 706 is configured to output prompt information when the IP address is the preset risk address, where the prompt information is used to prompt the user that the target webpage is an unsafe webpage.
Therefore, the first input of a user requesting to access the target webpage is received, the Internet Protocol (IP) address of the target webpage is obtained, whether the IP address is the preset risk address or not is judged, and when the IP address is the preset risk address, the fact that the target webpage is an unsafe webpage is prompted to the user. Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 701 may be used for receiving and sending signals during a message transmission and reception process or a call process, and specifically, receives downlink resources from a base station and then processes the received downlink resources to the processor 710; in addition, the uplink resource is transmitted to the base station. In general, radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 701 may also communicate with a network and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user via the network module 702, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 703 may convert an audio resource received by the radio frequency unit 701 or the network module 702 or stored in the memory 707 into an audio signal and output as sound. Also, the audio output unit 703 may also provide audio output related to a specific function performed by the electronic apparatus 700 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 703 includes a speaker, a buzzer, a receiver, and the like.
The input unit 704 is used to receive audio or video signals. The input Unit 704 may include a Graphics Processing Unit (GPU) 7041 and a microphone 7042, and the Graphics processor 7041 processes image resources of still pictures or videos obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 707. The image frames processed by the graphic processor 7041 may be stored in the memory 707 (or other storage medium) or transmitted via the radio unit 701 or the network module 702. The microphone 7042 may receive sound and may be capable of processing such sound into an audio asset. The processed audio resources may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 701 in case of a phone call mode.
The electronic device 700 also includes at least one sensor 705, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 7061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 7061 and/or a backlight when the electronic device 700 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 705 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 706 is used to display information input by the user or information provided to the user. The Display unit 706 may include a Display panel 7061, and the Display panel 7061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 707 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device. Specifically, the user input unit 707 includes a touch panel 7071 and other input devices 7072. The touch panel 7071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 7071 (e.g., operations by a user on or near the touch panel 7071 using a finger, a stylus, or any other suitable object or attachment). The touch panel 7071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 710, receives a command from the processor 710, and executes the command. In addition, the touch panel 7071 can be implemented by various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 707 may include other input devices 7072 in addition to the touch panel 7071. In particular, the other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 7071 may be overlaid on the display panel 7061, and when the touch panel 7071 detects a touch operation on or near the touch panel 7071, the touch operation is transmitted to the processor 710 to determine the type of the touch event, and then the processor 710 provides a corresponding visual output on the display panel 7061 according to the type of the touch event. Although the touch panel 7071 and the display panel 7061 are shown in fig. 7 as two separate components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 7071 and the display panel 7061 may be integrated to implement the input and output functions of the electronic device, which is not limited herein.
The interface unit 708 is an interface for connecting an external device to the electronic apparatus 700. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless resource port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 708 may be used to receive input (e.g., resource information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 700 or may be used to transmit resources between the electronic apparatus 700 and the external device.
The memory 709 may be used to store software programs and various resources. The memory 709 may mainly include a storage program area and a storage resource area, where the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like; the storage resource area may store resources (such as audio resources, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 709 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 710 is a control center of the electronic device, connects various parts of the whole electronic device by using various interfaces and lines, and performs various functions and processing resources of the electronic device by running or executing software programs and/or modules stored in the memory 709 and calling resources stored in the memory 709, thereby performing overall monitoring of the electronic device. Processor 710 may include one or more processing units; preferably, the processor 710 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The electronic device 700 may further include a power supply 711 (e.g., a battery) for supplying power to various components, and preferably, the power supply 711 may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the electronic device 700 includes some functional modules that are not shown, and are not described in detail herein.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed in a computer, the computer is caused to execute the steps of the information prompting method according to the embodiments of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling an electronic device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (10)
1. An information prompting method is applied to electronic equipment and is characterized by comprising the following steps:
receiving a first input of a user requesting to access a target webpage;
responding to the first input, and acquiring an Internet Protocol (IP) address of the target webpage;
and when the IP address is the preset risk address, outputting prompt information, wherein the prompt information is used for prompting the target webpage to be an unsafe webpage for a user.
2. The method of claim 1, wherein said obtaining an internet protocol, IP, address of the target web page in response to the first input comprises:
responding to the first input, and sending first request information to a domain name resolution server;
receiving first feedback information sent by the domain name resolution server;
and acquiring the IP address of the target webpage according to the first feedback information.
3. The method of claim 1 or 2, wherein prior to the outputting of the prompt message, the method further comprises:
determining whether the IP address is a preset risk address;
wherein the preset risk address comprises a private Internet Protocol (IP) address; the determining whether the IP address is a preset risk address includes:
determining whether the IP address is the private IP address;
and under the condition that the IP address is the private IP address, determining that the IP address is the preset risk address.
4. The method of claim 1 or 2, wherein the preset risk address comprises a risk internet protocol, IP, address; the determining whether the IP address is a preset risk address includes:
sending second request information to a configuration server, wherein the second request information is used for requesting the risk internet protocol IP address;
receiving second feedback information sent by the configuration server, wherein the second feedback information comprises a plurality of risk Internet Protocol (IP) addresses;
determining whether the IP address is an address of the plurality of risky Internet protocol IP addresses;
and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as the preset risk address.
5. The method of claim 4, wherein the second feedback information includes a risk level corresponding to each risky internet protocol IP address of the plurality of risky internet protocol IP addresses;
before the outputting the prompt message, the method further comprises:
determining the risk level of the IP address according to the risk Internet protocol IP address;
the outputting the prompt message comprises:
and outputting prompt information, wherein the prompt information comprises the risk level of the IP address.
6. An electronic device, comprising:
the receiving module is used for receiving a first input of a user request for accessing a target webpage;
the acquisition module is used for responding to the first input and acquiring the Internet protocol IP address of the target webpage;
and the prompting module is used for outputting prompting information when the IP address is a preset risk address, and the prompting information is used for prompting the target webpage to be an unsafe webpage to a user.
7. The electronic device according to claim 6, wherein the obtaining module is specifically configured to send, in response to the first input, first request information to a domain name resolution server;
the receiving module is specifically configured to receive first feedback information sent by the domain name resolution server;
the obtaining module is specifically configured to obtain the IP address of the target webpage according to the first feedback information.
8. The electronic device of claim 6 or 7, further comprising a processing module;
the processing module is configured to determine that the IP address is the preset risk address;
the processing module is specifically configured to determine whether the IP address is a private IP address when the preset risk address includes the private internet protocol IP address;
and under the condition that the IP address is the private IP address, determining that the IP address is the preset risk address.
9. The electronic device of claim 6 or 7, further comprising a transmitting module; wherein,
the sending module is used for sending second request information to a configuration server under the condition that the preset risk address comprises a risk Internet Protocol (IP) address, wherein the second request information is used for requesting the risk IP address;
the receiving module is further configured to receive second feedback information sent by the configuration server, where the second feedback information includes multiple risk internet protocol IP addresses;
the processing module is specifically configured to determine whether the IP address is an address of the risky internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as the preset risk address.
10. The electronic device of claim 9, wherein the processing module is further configured to determine a risk level for a plurality of risky internet protocol IP addresses based on the risky internet protocol IP address if the second feedback information includes a risk level corresponding to each risky internet protocol IP address of the IP addresses;
the prompt module is specifically configured to output prompt information, where the prompt information includes a risk level of the IP address.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010127866.4A CN111372205A (en) | 2020-02-28 | 2020-02-28 | Information prompting method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010127866.4A CN111372205A (en) | 2020-02-28 | 2020-02-28 | Information prompting method and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111372205A true CN111372205A (en) | 2020-07-03 |
Family
ID=71210190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010127866.4A Pending CN111372205A (en) | 2020-02-28 | 2020-02-28 | Information prompting method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111372205A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111898159A (en) * | 2020-07-31 | 2020-11-06 | 维沃移动通信有限公司 | Risk prompting method and device, electronic equipment and readable storage medium |
CN111914243A (en) * | 2020-07-30 | 2020-11-10 | 长沙尚链通信息科技有限公司 | Block chain wallet operation reminding method based on block chain intelligent contract |
CN113342303A (en) * | 2021-05-31 | 2021-09-03 | 维沃移动通信有限公司 | Information input method and device |
WO2023040983A1 (en) * | 2021-09-18 | 2023-03-23 | 贵州白山云科技股份有限公司 | Access request processing method, electronic apparatus, electronic device, and medium |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605154A (en) * | 2009-07-09 | 2009-12-16 | 中兴通讯股份有限公司 | Use the IP Address Confirmation system and method for the network equipment of network address translation |
CN102651856A (en) * | 2011-02-23 | 2012-08-29 | 腾讯科技(深圳)有限公司 | Method, system and device for improving Internet surfing security of terminal |
CN103780450A (en) * | 2012-10-24 | 2014-05-07 | 腾讯科技(深圳)有限公司 | Browser access web address detection method and system |
CN103780659A (en) * | 2012-10-25 | 2014-05-07 | 中国电信股份有限公司 | Method for processing webpage address inputted by mobile subscriber and wireless application protocol gateway |
CN103825895A (en) * | 2014-02-24 | 2014-05-28 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104683330A (en) * | 2015-02-06 | 2015-06-03 | 广州酷狗计算机科技有限公司 | Domain name hijacking resisting method and device |
US20150281242A1 (en) * | 2012-05-10 | 2015-10-01 | Centurylink Intellectual Property Llc | System and Method for Secure Machine-To-Machine Communications |
CN105323210A (en) * | 2014-06-10 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method, apparatus and cloud server for detecting website security |
CN106357603A (en) * | 2016-08-18 | 2017-01-25 | 乐视控股(北京)有限公司 | Web page security detection processing method and device |
CN106453436A (en) * | 2016-12-21 | 2017-02-22 | 北京奇虎科技有限公司 | Method and device for detecting network security |
CN108512935A (en) * | 2018-04-16 | 2018-09-07 | 腾讯科技(深圳)有限公司 | data service system, method, server and computer readable storage medium |
CN108566656A (en) * | 2018-04-13 | 2018-09-21 | 上海连尚网络科技有限公司 | A kind of method and apparatus for detecting wireless network secure |
CN108647281A (en) * | 2018-05-03 | 2018-10-12 | 腾讯科技(深圳)有限公司 | Web page access risk supervision, reminding method, device and computer equipment |
CN110113364A (en) * | 2019-05-29 | 2019-08-09 | 深圳市网心科技有限公司 | Domain Hijacking defence method and device, computer installation and storage medium |
-
2020
- 2020-02-28 CN CN202010127866.4A patent/CN111372205A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101605154A (en) * | 2009-07-09 | 2009-12-16 | 中兴通讯股份有限公司 | Use the IP Address Confirmation system and method for the network equipment of network address translation |
CN102651856A (en) * | 2011-02-23 | 2012-08-29 | 腾讯科技(深圳)有限公司 | Method, system and device for improving Internet surfing security of terminal |
US20150281242A1 (en) * | 2012-05-10 | 2015-10-01 | Centurylink Intellectual Property Llc | System and Method for Secure Machine-To-Machine Communications |
CN103780450A (en) * | 2012-10-24 | 2014-05-07 | 腾讯科技(深圳)有限公司 | Browser access web address detection method and system |
CN103780659A (en) * | 2012-10-25 | 2014-05-07 | 中国电信股份有限公司 | Method for processing webpage address inputted by mobile subscriber and wireless application protocol gateway |
CN103825895A (en) * | 2014-02-24 | 2014-05-28 | 联想(北京)有限公司 | Information processing method and electronic device |
CN105323210A (en) * | 2014-06-10 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Method, apparatus and cloud server for detecting website security |
CN104683330A (en) * | 2015-02-06 | 2015-06-03 | 广州酷狗计算机科技有限公司 | Domain name hijacking resisting method and device |
CN106357603A (en) * | 2016-08-18 | 2017-01-25 | 乐视控股(北京)有限公司 | Web page security detection processing method and device |
CN106453436A (en) * | 2016-12-21 | 2017-02-22 | 北京奇虎科技有限公司 | Method and device for detecting network security |
CN108566656A (en) * | 2018-04-13 | 2018-09-21 | 上海连尚网络科技有限公司 | A kind of method and apparatus for detecting wireless network secure |
CN108512935A (en) * | 2018-04-16 | 2018-09-07 | 腾讯科技(深圳)有限公司 | data service system, method, server and computer readable storage medium |
CN108647281A (en) * | 2018-05-03 | 2018-10-12 | 腾讯科技(深圳)有限公司 | Web page access risk supervision, reminding method, device and computer equipment |
CN110113364A (en) * | 2019-05-29 | 2019-08-09 | 深圳市网心科技有限公司 | Domain Hijacking defence method and device, computer installation and storage medium |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111914243A (en) * | 2020-07-30 | 2020-11-10 | 长沙尚链通信息科技有限公司 | Block chain wallet operation reminding method based on block chain intelligent contract |
CN111914243B (en) * | 2020-07-30 | 2023-12-01 | 长沙尚链通信息科技有限公司 | Blockchain wallet operation reminding method based on blockchain intelligent contract |
CN111898159A (en) * | 2020-07-31 | 2020-11-06 | 维沃移动通信有限公司 | Risk prompting method and device, electronic equipment and readable storage medium |
CN113342303A (en) * | 2021-05-31 | 2021-09-03 | 维沃移动通信有限公司 | Information input method and device |
CN113342303B (en) * | 2021-05-31 | 2024-05-24 | 维沃移动通信有限公司 | Information input method and device |
WO2023040983A1 (en) * | 2021-09-18 | 2023-03-23 | 贵州白山云科技股份有限公司 | Access request processing method, electronic apparatus, electronic device, and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111372205A (en) | Information prompting method and electronic equipment | |
CN108924037B (en) | Display method of rich media communication RCS message and mobile terminal | |
CN108510022B (en) | Two-dimensional code generation and verification method and server | |
CN109918930A (en) | A kind of information protecting method and terminal device | |
CN110336805B (en) | Network access management method and mobile terminal | |
CN109800602B (en) | Privacy protection method, mobile terminal and computer readable storage medium | |
CN109918944B (en) | Information protection method and device, mobile terminal and storage medium | |
CN110457888B (en) | Verification code input method and device, electronic equipment and storage medium | |
CN110913455B (en) | Method for forbidding abnormal cell, electronic equipment and server | |
CN109831359B (en) | Method for detecting connection state of data network and terminal equipment thereof | |
CN111597540B (en) | Login method of application program, electronic device and readable storage medium | |
CN108012270B (en) | Information processing method, equipment and computer readable storage medium | |
CN111107223B (en) | Message processing method and electronic equipment | |
CN109522741B (en) | Application program permission prompting method and terminal equipment thereof | |
CN110990850A (en) | Authority management method and electronic equipment | |
CN107995669B (en) | Display method of wireless access point AP information and mobile terminal | |
CN111315039B (en) | Integrity protection failure processing method and terminal | |
CN111159738A (en) | Permission configuration method, application login method and device | |
CN108391305B (en) | WiFi hotspot selection method and terminal equipment | |
CN109033822B (en) | External link management method, mobile terminal and computer-readable storage medium | |
CN108616873B (en) | Data transmission method, information transmission method, device, mobile equipment and storage medium | |
CN108494754B (en) | Account information processing method and mobile terminal | |
CN110784467B (en) | Network link processing method in message and electronic equipment | |
CN111010455B (en) | Hotspot name modification method and electronic equipment | |
CN110856173B (en) | Network access method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200703 |