CN111372205A - Information prompting method and electronic equipment - Google Patents

Information prompting method and electronic equipment Download PDF

Info

Publication number
CN111372205A
CN111372205A CN202010127866.4A CN202010127866A CN111372205A CN 111372205 A CN111372205 A CN 111372205A CN 202010127866 A CN202010127866 A CN 202010127866A CN 111372205 A CN111372205 A CN 111372205A
Authority
CN
China
Prior art keywords
address
risk
internet protocol
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010127866.4A
Other languages
Chinese (zh)
Inventor
刘超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202010127866.4A priority Critical patent/CN111372205A/en
Publication of CN111372205A publication Critical patent/CN111372205A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses an information prompting method and electronic equipment, wherein the method comprises the following steps: receiving a first input of a user requesting to access a target webpage; responding to the first input, and acquiring an Internet Protocol (IP) address of a target webpage; and when the IP address is the preset risk address, outputting prompt information, and prompting the target webpage to be an unsafe webpage by the prompt information. To avoid the problem of network hijacking.

Description

Information prompting method and electronic equipment
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to an information prompting method and electronic equipment.
Background
With the gradual improvement of hardware configuration and the expansion of functions of electronic devices, electronic devices have become a necessity for people to access the internet.
When a user accesses the internet with a higher security level (such as a bank account login scene, an instant messaging login scene, and the like) through electronic equipment, a phenomenon of network hijacking needs to be prevented, for example, when the user is linked with a Wireless-Fidelity (Wi-Fi) in a certain store, the user is maliciously guided to download of an application program, hijacked to a promotion interface of the certain store, maliciously guided to a malicious website, and the like, and thus privacy information of the user is leaked. Therefore, how to avoid network hijacking becomes an urgent problem to be solved in the current network security.
Disclosure of Invention
The embodiment of the invention provides an information prompting method, electronic equipment and a storage medium, which are used for avoiding the problem of network hijacking.
In order to solve the above technical problem, the method provided by the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides an information prompting method, which is applied to an electronic device, and the method may include:
receiving a first input of a user requesting to access a target webpage;
responding to the first input, and acquiring an Internet Protocol (IP) address of a target webpage;
and when the IP address is the preset risk address, outputting prompt information, wherein the prompt information is used for prompting the target webpage to be an unsafe webpage to the user.
In a second aspect, an embodiment of the present invention provides an electronic device, which may include:
the receiving module is used for receiving a first input of a user request for accessing a target webpage;
the acquisition module is used for responding to the first input and acquiring the Internet protocol IP address of the target webpage;
and the prompting module is used for outputting prompting information when the IP address is the preset risk address, and the prompting information is used for prompting the target webpage to be an unsafe webpage to the user.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a processor, a memory, and a computer program stored in the memory and being executable on the processor, where the computer program, when executed by the processor, implements the information prompting method shown in the first aspect.
In a fourth aspect, there is provided a computer-readable storage medium having a computer program stored thereon, which, if the computer program is executed in a computer, causes the computer to execute the information presentation method according to the first aspect.
In the embodiment of the invention, the first input of a user request for accessing the target webpage is received, the internet protocol IP address of the target webpage is obtained, whether the IP address is the preset risk address or not is judged, and when the IP address is the preset risk address, the target webpage is prompted to the user to be an unsafe webpage. Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user.
Drawings
The present invention will be better understood from the following description of specific embodiments thereof taken in conjunction with the accompanying drawings, in which like or similar reference characters designate like or similar features.
Fig. 1 is a schematic view of an application scenario of an information prompting method according to an embodiment of the present invention;
fig. 2 is a flowchart of an information prompting method according to an embodiment of the present invention;
fig. 3 is a schematic view of a first interface of an information prompt according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a second interface of an information prompt according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a third interface of an information prompt according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, when a user accesses the internet with a higher security level (such as in the situations of bank account login, instant messaging login, and the like) through electronic equipment, for example, in the situations of bank account login, important account login, and the like, the phenomenon of network hijacking needs to be prevented. The network hijacking is that a network attacker cannot achieve an expected correct access result through a Domain Name Server (DNS) replacement mode, a data replacement mode and the like.
Under the existing network environment, for example, when a user links private Wi-Fi in a certain store, the user is maliciously guided to download an application program, hijacked to a promotion interface of the certain store, maliciously guided to a malicious website, and the like. For the phenomenon of network hijacking, two ways are currently avoided, the first way is that a user subjectively identifies according to the network environment, for example, a nearby stranger provides wifi or a private wifi of a certain store can be regarded as not very safe, so that the user can not connect wifi or visit a webpage regarded as unsafe. The second way is to set a firewall to confirm the security of the network.
However, in the first method, when the user has network awareness or network related knowledge, the network scene cannot be well recognized, and thus, if some unsafe websites are visited, the network hijacking is likely to occur. In addition, the second way of the design is that the way of setting the firewall is a good way for accessing the external network or the backbone network, but in the local area network scenario, the firewall cannot cover the local area network, and if the user is hijacked in the local area network, the user cannot access the real data.
Therefore, the existing way for preventing network hijacking is difficult to prevent the user from being hijacked by malicious network under the condition of not knowing the common sense of the network in the local area network scene, and has the defects of incomplete scene coverage and incapability of avoiding network hijacking under some scenes.
Aiming at the problems in the related art, the embodiment of the invention provides an information prompting method, electronic equipment and a storage medium, so as to solve the problems that in the related art, privacy information is easy to leak and low in safety when the electronic equipment is used for displaying the privacy information in public places.
The information prompting method provided by the embodiment of the invention can be applied to the following application scenes, which are respectively explained as follows:
as shown in fig. 1, in a local area network scenario, an electronic device may receive a first input that a user requests to access a target web page, send, in response to the first input, a domain name a corresponding to the target web page to a domain name resolution server, where the domain name resolution server obtains, according to the domain name a, an Internet Protocol (IP) address corresponding to the target web page, and sends the IP address to the electronic device; and then, when the IP address is the preset risk address, the electronic equipment outputs prompt information to the user, wherein the prompt information is used for prompting the user that the target webpage is an unsafe webpage, otherwise, when the IP address is not the preset risk address, the corresponding webpage is accessed according to the IP address, and the webpage corresponding to the IP address is displayed to the user.
What needs to be prompted is that the manner of outputting the prompt information in the embodiment of the present invention may be displaying the prompt information in a manner of outputting the prompt information through a display screen of the electronic device; or outputting prompt information in a vibration output mode of the electronic equipment; the prompt information may also be output through an output mode of playing the ring tone of the electronic device, and the output mode is not particularly limited herein.
Here, the manner of determining whether the IP address is the preset risk address in the embodiment of the present invention may include the following manner: in the first mode, under the condition that a preset risk address comprises a private Internet Protocol (IP) address, whether the IP address is the private IP address is determined; and under the condition that the IP address is a private IP address, determining the IP address as a preset risk address. In the second mode, when the preset risk address comprises a risk Internet Protocol (IP) address, second request information is sent to a configuration server corresponding to the electronic equipment, and the second request information is used for requesting the risk IP address; receiving second feedback information sent by a configuration server, wherein the second feedback information comprises a plurality of risk Internet Protocol (IP) addresses; determining whether the IP address is an address of a plurality of risky Internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as a preset risk address.
Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user. In addition, the method provided by the embodiment of the invention detects the IP address through the electronic equipment, can solve the problem that an external firewall cannot be related to an area without building complex and expensive firewall equipment, does not need a user to know much network common knowledge, and can select whether to continue to access according to the prompt information, so that the user can access the safe webpage and the experience of the user is improved.
Based on the application scenario, the following describes in detail an information prompting method provided by an embodiment of the present invention.
Fig. 2 is a flowchart of an information prompting method according to an embodiment of the present invention.
As shown in fig. 2, the information prompting method may specifically include steps 210 to 230, which are specifically as follows:
first, step 210, receiving a first input of a user requesting to access a target webpage; then, step 220, in response to the first input, acquiring an internet protocol IP address of the target webpage; then, in step 230, when the IP address is the preset risk address, the user is prompted that the target webpage is an unsafe webpage.
Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user.
The above steps are described in detail below:
first, step 210 is involved, where a user can access a target web page using multiple means on the electronic device, such as browser access, applet access, multiple application access, or web page link access.
Next, step 220 is involved, wherein, in response to the first input, first request information is sent to the domain name resolution server, and the first request information is used for requesting an IP address of the target web page; receiving first feedback information sent by a domain name resolution server; and acquiring the IP address of the target webpage according to the first feedback information.
Here, the domain name of the target web page may be included in the first request information, so that the domain name resolution server queries the IP address of the target web page according to the domain name.
Then, referring to step 230, in a possible embodiment, before performing step 230, it may further include determining whether the IP address is a preset risk address.
When the IP address is not the preset risk address, accessing a target webpage corresponding to the IP address according to the IP address, and displaying the page corresponding to the target webpage to a user; when the IP address is the preset risk address, step 230 is executed. Here, in a possible embodiment, when the user is prompted that the target webpage is an unsafe webpage, a second input that the user confirms to continue accessing is received, a page corresponding to the target webpage is displayed to the user, otherwise, when the user is prompted that the target webpage is an unsafe webpage, a third input that the user confirms not to continue accessing is received, and the process is ended.
Based on this, the embodiment of the present invention provides two ways of determining whether an IP address is a preset risk address, which are specifically as follows:
the first method is as follows: the preset risk address includes a private internet protocol, IP, address.
Wherein, determining whether the IP address is a private IP address;
and under the condition that the IP address is a private IP address, determining the IP address as a preset risk address.
Here, current IP addresses are generally classified into five types of addresses, such as:
a:0.0.0.0-127.255.255, where segments 0 and 127 are not available
B:128.0.0.0-191.255.255.255
C:192.0.0.0-223.255.255.255
D:224.0.0.0-239.255.255.255
E240.0.0.0-255.255.255.255, wherein segment 255 is unusable
The five types of addresses referred to above, in addition to segment 0 and segment 127, have some IP addresses that are not available as public IP for other purposes. A further portion is used as a private IP address, and the private IP address range is shown in table 1:
TABLE 1
A 10.0.0.0~10.255.255.255 10.0.0.0/8
B 172.16.0.0~172.31.255.255 172.16.0.0/12
C 192.168.0.0~192.168.255.255 192.168.0.0/16
The private IP address cannot be routed to the Internet (Internet) backbone and the router will also discard the private address.
In summary, if an extranet address is resolved into an intranet address by DNS, the address is most likely an insecure web page (except for users on the same intranet as the website), and thus, the user's access is hijacked to a certain service address in the lan, and most likely to be an attacker address in the lan. Thus, if the private IP address detection is within the range of table 1, it is considered a preset risk address.
The second method comprises the following steps: the preset risk address comprises a risk Internet Protocol (IP) address
The electronic equipment sends second request information to a configuration server corresponding to the electronic equipment, wherein the second request information is used for requesting a risk Internet Protocol (IP) address; receiving second feedback information sent by a configuration server, wherein the second feedback information comprises a plurality of risk Internet Protocol (IP) addresses; determining whether the IP address is an address of a plurality of risky Internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as a preset risk address.
In addition, the second feedback information also comprises a risk grade corresponding to each risk internet protocol IP address of the plurality of risk internet protocol IP addresses, and the risk grade is used for representing the unsafe degree of the risk IP.
For example, the following steps are carried out: the risk IP list is shown in table 2, and includes a plurality of risk internet protocol IP addresses and risk levels corresponding to the risk internet protocol IP addresses.
TABLE 2
Risk rating Risky internet protocol IP address
2 2.2.2.2
3 3.3.3.3
4 4.4.4.4
5 5.5.5.5
6 6.6.6.6
It should be noted that the implementation may not be limited to the risky IP addresses shown in table 2, but may also be risky IP addresses marked by a large number of users, and risky IP addresses that are not recognized by the authorities. Therefore, the risk Internet Protocol (IP) address obtained through the big data has higher accuracy, wider trial range and more flexible realization.
In addition, in table 2, the risk level can be determined according to the behavior data accessed by the user, for example, only wifi connection pages in a general store can be considered as having a small risk, and this situation is defined as level 1; and maliciously directed to the downloading of an application, defining this as a risk level 2; when the behavior data indicates that accessing the webpage can cause the accessed electronic equipment to crash or the system to fail, defining the condition as a risk level 4; when there is behavior data indicating that the web page may reveal property loss or privacy information of the user, this case is defined as risk level 6.
Based on the contents of method two referred to in step 230, in a possible embodiment, before step 230, the method may further include: and determining the risk level of the IP address according to the risk Internet protocol IP address corresponding to the IP address. Here, since the risky internet protocol IP address has a risk level corresponding to the risky internet protocol IP address, if the IP address is one of the risky internet protocol IP addresses, the IP address also has a risk level corresponding to the IP address.
Based on this, the step 230 may specifically include:
the display prompt includes a risk level for the IP address to prompt the user that the target web page is an insecure web page.
For example, after detecting that the IP address is the preset risk address, certain processing may be performed according to the risk level, which is specifically shown as follows, but includes, but is not limited to, the following combinations:
(1) the user is prompted in the form of a message prompt box, as shown in fig. 3, such as a Toast prompt or a light prompt, to prompt the user that the target web page is an unsafe web page. Here, the time for prompting the message prompt box may be before the wifi log-in page in a certain store, or may be prompted on the wifi log-in page in a certain store.
(2) And prompting the user that the target webpage is a page for guiding the downloading of an application program in a pop-up box prompting mode, as shown in fig. 4, displaying a window for continuously accessing by operation A and a window for returning to the previous page by operation B while prompting that the target webpage is the text information of the unsafe webpage, so that the user can access according to actual needs.
(3) And prompting the user that the target webpage is attacked by a malicious account in a forced prohibition mode, so that the user is not advised to continue accessing or the target webpage is not displayed. As shown in fig. 5, when the user indicates that the target web page is the text information of the unsafe web page, the user may be forced to be prohibited from accessing the target web page due to the higher risk level of the target web page.
For example, in table 2, if the configuration server returns the web page 6.6.6.6 with risk level 6, the process may be directly performed as shown in (3); when the configuration server returns the webpage with the risk level 2, 2.2.2, the process can be directly processed according to the step (1).
Therefore, the method can prevent the user from being hijacked by an illegal network in the local area network, further ensures the network safety of the user, does not need the user to know a lot of network common knowledge, can judge through the electronic equipment, relieves the worry of the user about the network environment, can avoid some mistaken identification behaviors by the set risk level, enables the user to select whether to continue to access or not, and improves the experience of the user.
In addition, when the IP address is not the preset risk address, the target webpage is directly accessed through the network, and the content corresponding to the target webpage is displayed for the user.
In addition, it is to be noted that, in the embodiment of the present invention, a scene of a target web page is referred to, and it is needless to say that, in the scene of a target website, the target website may be prompted to be an unsafe website to a user by the information prompting method.
In summary, the method provided by the embodiment of the present invention performs IP address detection through the electronic device, so as to prevent the user from being hijacked by an illegal network in the local area network, thereby ensuring the network security of the user and protecting the privacy information of the user. In addition, the method provided by the embodiment of the invention detects the IP address through the electronic equipment, can solve the problem that an external firewall cannot be related to an area without building complex and expensive firewall equipment, does not need a user to know much network common knowledge, and can select whether to continue to access according to the prompt information, so that the user can access the safe webpage and the experience of the user is improved.
In addition, based on the information prompting method, an embodiment of the present invention further provides an electronic device, which is specifically described in detail with reference to fig. 6.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
As shown in fig. 6, the electronic device 60 may include:
the receiving module 601 is configured to receive a first input that a user requests to access a target webpage.
An obtaining module 602, configured to obtain an internet protocol IP address of the target webpage in response to the first input.
The prompting module 603 is configured to output a prompting message when the IP address is the preset risk address, where the prompting message is used to prompt the user that the target webpage is an unsafe webpage.
The obtaining module 602 in the embodiment of the present invention is specifically configured to, in response to a first input, send first request information to a domain name resolution server, where the first request information is used to request an IP address of a target web page; based on this, the receiving module 601 is specifically configured to receive first feedback information sent by the domain name resolution server; the obtaining module 602 is specifically configured to obtain the IP address of the target webpage according to the first feedback information.
In a possible implementation, the electronic device 60 further includes a processing module 604, where the processing module 604 is configured to determine that the IP address is the preset risk address.
In the case that the preset risk address includes a private internet protocol IP address, the processing module 604 may be specifically configured to determine whether the IP address is a private IP address; and under the condition that the IP address is a private IP address, determining the IP address as a preset risk address.
In another possible embodiment, the electronic device 60 further comprises a sending module 605; the sending module 605 is configured to send second request information to a configuration server corresponding to the electronic device when the preset risk address includes a risk internet protocol IP address, where the second request information is used for requesting the risk internet protocol IP address. Based on this, the receiving module 601 is further configured to receive second feedback information sent by the configuration server, where the second feedback information includes multiple risk internet protocol IP addresses; the processing module 604 is specifically configured to determine whether the IP address is an address of multiple risky internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as a preset risk address.
Further, the processing module 604 is further configured to, in a case that the second feedback information includes a risk level corresponding to each risk internet protocol IP address of the multiple risk internet protocol IP addresses, determine a risk level of the IP address according to the risk internet protocol IP address corresponding to the IP address. Based on this, the prompt module 604 is specifically configured to output a prompt message, where the prompt message includes the risk level of the IP address.
Therefore, the electronic equipment provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user. In addition, the method provided by the embodiment of the invention detects the IP address through the electronic equipment, can solve the problem that an external firewall cannot be related to an area without building complex and expensive firewall equipment, does not need a user to know much network common knowledge, and can select whether to continue to access according to the prompt information, so that the user can access the safe webpage and the experience of the user is improved.
Fig. 7 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
The electronic device 700 includes, but is not limited to: a radio frequency unit 701, a network module 702, an audio output unit 703, an input unit 704, a sensor 705, a display unit 706, a user input unit 707, an interface unit 708, a memory 709, a processor 710, a power supply 711, and the like. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 7 does not constitute a limitation of the electronic device, and that the electronic device may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
Wherein, the user input unit 707 is configured to receive a first input that a user requests to access the target webpage.
A processor 710 for obtaining an internet protocol, IP, address of the target web page in response to the first input.
And the display unit 706 is configured to output prompt information when the IP address is the preset risk address, where the prompt information is used to prompt the user that the target webpage is an unsafe webpage.
Therefore, the first input of a user requesting to access the target webpage is received, the Internet Protocol (IP) address of the target webpage is obtained, whether the IP address is the preset risk address or not is judged, and when the IP address is the preset risk address, the fact that the target webpage is an unsafe webpage is prompted to the user. Therefore, the method provided by the embodiment of the invention can realize the purpose of preventing the user from being hijacked by an illegal network in the local area network by detecting the IP address through the electronic equipment, thereby ensuring the network security of the user and protecting the privacy information of the user.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 701 may be used for receiving and sending signals during a message transmission and reception process or a call process, and specifically, receives downlink resources from a base station and then processes the received downlink resources to the processor 710; in addition, the uplink resource is transmitted to the base station. In general, radio frequency unit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 701 may also communicate with a network and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user via the network module 702, such as assisting the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 703 may convert an audio resource received by the radio frequency unit 701 or the network module 702 or stored in the memory 707 into an audio signal and output as sound. Also, the audio output unit 703 may also provide audio output related to a specific function performed by the electronic apparatus 700 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 703 includes a speaker, a buzzer, a receiver, and the like.
The input unit 704 is used to receive audio or video signals. The input Unit 704 may include a Graphics Processing Unit (GPU) 7041 and a microphone 7042, and the Graphics processor 7041 processes image resources of still pictures or videos obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 707. The image frames processed by the graphic processor 7041 may be stored in the memory 707 (or other storage medium) or transmitted via the radio unit 701 or the network module 702. The microphone 7042 may receive sound and may be capable of processing such sound into an audio asset. The processed audio resources may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 701 in case of a phone call mode.
The electronic device 700 also includes at least one sensor 705, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 7061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 7061 and/or a backlight when the electronic device 700 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 705 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 706 is used to display information input by the user or information provided to the user. The Display unit 706 may include a Display panel 7061, and the Display panel 7061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 707 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device. Specifically, the user input unit 707 includes a touch panel 7071 and other input devices 7072. The touch panel 7071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 7071 (e.g., operations by a user on or near the touch panel 7071 using a finger, a stylus, or any other suitable object or attachment). The touch panel 7071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 710, receives a command from the processor 710, and executes the command. In addition, the touch panel 7071 can be implemented by various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 707 may include other input devices 7072 in addition to the touch panel 7071. In particular, the other input devices 7072 may include, but are not limited to, a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 7071 may be overlaid on the display panel 7061, and when the touch panel 7071 detects a touch operation on or near the touch panel 7071, the touch operation is transmitted to the processor 710 to determine the type of the touch event, and then the processor 710 provides a corresponding visual output on the display panel 7061 according to the type of the touch event. Although the touch panel 7071 and the display panel 7061 are shown in fig. 7 as two separate components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 7071 and the display panel 7061 may be integrated to implement the input and output functions of the electronic device, which is not limited herein.
The interface unit 708 is an interface for connecting an external device to the electronic apparatus 700. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless resource port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 708 may be used to receive input (e.g., resource information, power, etc.) from an external device and transmit the received input to one or more elements within the electronic apparatus 700 or may be used to transmit resources between the electronic apparatus 700 and the external device.
The memory 709 may be used to store software programs and various resources. The memory 709 may mainly include a storage program area and a storage resource area, where the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like; the storage resource area may store resources (such as audio resources, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 709 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 710 is a control center of the electronic device, connects various parts of the whole electronic device by using various interfaces and lines, and performs various functions and processing resources of the electronic device by running or executing software programs and/or modules stored in the memory 709 and calling resources stored in the memory 709, thereby performing overall monitoring of the electronic device. Processor 710 may include one or more processing units; preferably, the processor 710 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 710.
The electronic device 700 may further include a power supply 711 (e.g., a battery) for supplying power to various components, and preferably, the power supply 711 may be logically connected to the processor 710 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the electronic device 700 includes some functional modules that are not shown, and are not described in detail herein.
Embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed in a computer, the computer is caused to execute the steps of the information prompting method according to the embodiments of the present invention.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling an electronic device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. An information prompting method is applied to electronic equipment and is characterized by comprising the following steps:
receiving a first input of a user requesting to access a target webpage;
responding to the first input, and acquiring an Internet Protocol (IP) address of the target webpage;
and when the IP address is the preset risk address, outputting prompt information, wherein the prompt information is used for prompting the target webpage to be an unsafe webpage for a user.
2. The method of claim 1, wherein said obtaining an internet protocol, IP, address of the target web page in response to the first input comprises:
responding to the first input, and sending first request information to a domain name resolution server;
receiving first feedback information sent by the domain name resolution server;
and acquiring the IP address of the target webpage according to the first feedback information.
3. The method of claim 1 or 2, wherein prior to the outputting of the prompt message, the method further comprises:
determining whether the IP address is a preset risk address;
wherein the preset risk address comprises a private Internet Protocol (IP) address; the determining whether the IP address is a preset risk address includes:
determining whether the IP address is the private IP address;
and under the condition that the IP address is the private IP address, determining that the IP address is the preset risk address.
4. The method of claim 1 or 2, wherein the preset risk address comprises a risk internet protocol, IP, address; the determining whether the IP address is a preset risk address includes:
sending second request information to a configuration server, wherein the second request information is used for requesting the risk internet protocol IP address;
receiving second feedback information sent by the configuration server, wherein the second feedback information comprises a plurality of risk Internet Protocol (IP) addresses;
determining whether the IP address is an address of the plurality of risky Internet protocol IP addresses;
and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as the preset risk address.
5. The method of claim 4, wherein the second feedback information includes a risk level corresponding to each risky internet protocol IP address of the plurality of risky internet protocol IP addresses;
before the outputting the prompt message, the method further comprises:
determining the risk level of the IP address according to the risk Internet protocol IP address;
the outputting the prompt message comprises:
and outputting prompt information, wherein the prompt information comprises the risk level of the IP address.
6. An electronic device, comprising:
the receiving module is used for receiving a first input of a user request for accessing a target webpage;
the acquisition module is used for responding to the first input and acquiring the Internet protocol IP address of the target webpage;
and the prompting module is used for outputting prompting information when the IP address is a preset risk address, and the prompting information is used for prompting the target webpage to be an unsafe webpage to a user.
7. The electronic device according to claim 6, wherein the obtaining module is specifically configured to send, in response to the first input, first request information to a domain name resolution server;
the receiving module is specifically configured to receive first feedback information sent by the domain name resolution server;
the obtaining module is specifically configured to obtain the IP address of the target webpage according to the first feedback information.
8. The electronic device of claim 6 or 7, further comprising a processing module;
the processing module is configured to determine that the IP address is the preset risk address;
the processing module is specifically configured to determine whether the IP address is a private IP address when the preset risk address includes the private internet protocol IP address;
and under the condition that the IP address is the private IP address, determining that the IP address is the preset risk address.
9. The electronic device of claim 6 or 7, further comprising a transmitting module; wherein,
the sending module is used for sending second request information to a configuration server under the condition that the preset risk address comprises a risk Internet Protocol (IP) address, wherein the second request information is used for requesting the risk IP address;
the receiving module is further configured to receive second feedback information sent by the configuration server, where the second feedback information includes multiple risk internet protocol IP addresses;
the processing module is specifically configured to determine whether the IP address is an address of the risky internet protocol IP addresses; and under the condition that the IP address is one of the multiple risk Internet protocol IP addresses, determining the IP address as the preset risk address.
10. The electronic device of claim 9, wherein the processing module is further configured to determine a risk level for a plurality of risky internet protocol IP addresses based on the risky internet protocol IP address if the second feedback information includes a risk level corresponding to each risky internet protocol IP address of the IP addresses;
the prompt module is specifically configured to output prompt information, where the prompt information includes a risk level of the IP address.
CN202010127866.4A 2020-02-28 2020-02-28 Information prompting method and electronic equipment Pending CN111372205A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010127866.4A CN111372205A (en) 2020-02-28 2020-02-28 Information prompting method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010127866.4A CN111372205A (en) 2020-02-28 2020-02-28 Information prompting method and electronic equipment

Publications (1)

Publication Number Publication Date
CN111372205A true CN111372205A (en) 2020-07-03

Family

ID=71210190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010127866.4A Pending CN111372205A (en) 2020-02-28 2020-02-28 Information prompting method and electronic equipment

Country Status (1)

Country Link
CN (1) CN111372205A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111898159A (en) * 2020-07-31 2020-11-06 维沃移动通信有限公司 Risk prompting method and device, electronic equipment and readable storage medium
CN111914243A (en) * 2020-07-30 2020-11-10 长沙尚链通信息科技有限公司 Block chain wallet operation reminding method based on block chain intelligent contract
CN113342303A (en) * 2021-05-31 2021-09-03 维沃移动通信有限公司 Information input method and device
WO2023040983A1 (en) * 2021-09-18 2023-03-23 贵州白山云科技股份有限公司 Access request processing method, electronic apparatus, electronic device, and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605154A (en) * 2009-07-09 2009-12-16 中兴通讯股份有限公司 Use the IP Address Confirmation system and method for the network equipment of network address translation
CN102651856A (en) * 2011-02-23 2012-08-29 腾讯科技(深圳)有限公司 Method, system and device for improving Internet surfing security of terminal
CN103780450A (en) * 2012-10-24 2014-05-07 腾讯科技(深圳)有限公司 Browser access web address detection method and system
CN103780659A (en) * 2012-10-25 2014-05-07 中国电信股份有限公司 Method for processing webpage address inputted by mobile subscriber and wireless application protocol gateway
CN103825895A (en) * 2014-02-24 2014-05-28 联想(北京)有限公司 Information processing method and electronic device
CN104683330A (en) * 2015-02-06 2015-06-03 广州酷狗计算机科技有限公司 Domain name hijacking resisting method and device
US20150281242A1 (en) * 2012-05-10 2015-10-01 Centurylink Intellectual Property Llc System and Method for Secure Machine-To-Machine Communications
CN105323210A (en) * 2014-06-10 2016-02-10 腾讯科技(深圳)有限公司 Method, apparatus and cloud server for detecting website security
CN106357603A (en) * 2016-08-18 2017-01-25 乐视控股(北京)有限公司 Web page security detection processing method and device
CN106453436A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Method and device for detecting network security
CN108512935A (en) * 2018-04-16 2018-09-07 腾讯科技(深圳)有限公司 data service system, method, server and computer readable storage medium
CN108566656A (en) * 2018-04-13 2018-09-21 上海连尚网络科技有限公司 A kind of method and apparatus for detecting wireless network secure
CN108647281A (en) * 2018-05-03 2018-10-12 腾讯科技(深圳)有限公司 Web page access risk supervision, reminding method, device and computer equipment
CN110113364A (en) * 2019-05-29 2019-08-09 深圳市网心科技有限公司 Domain Hijacking defence method and device, computer installation and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101605154A (en) * 2009-07-09 2009-12-16 中兴通讯股份有限公司 Use the IP Address Confirmation system and method for the network equipment of network address translation
CN102651856A (en) * 2011-02-23 2012-08-29 腾讯科技(深圳)有限公司 Method, system and device for improving Internet surfing security of terminal
US20150281242A1 (en) * 2012-05-10 2015-10-01 Centurylink Intellectual Property Llc System and Method for Secure Machine-To-Machine Communications
CN103780450A (en) * 2012-10-24 2014-05-07 腾讯科技(深圳)有限公司 Browser access web address detection method and system
CN103780659A (en) * 2012-10-25 2014-05-07 中国电信股份有限公司 Method for processing webpage address inputted by mobile subscriber and wireless application protocol gateway
CN103825895A (en) * 2014-02-24 2014-05-28 联想(北京)有限公司 Information processing method and electronic device
CN105323210A (en) * 2014-06-10 2016-02-10 腾讯科技(深圳)有限公司 Method, apparatus and cloud server for detecting website security
CN104683330A (en) * 2015-02-06 2015-06-03 广州酷狗计算机科技有限公司 Domain name hijacking resisting method and device
CN106357603A (en) * 2016-08-18 2017-01-25 乐视控股(北京)有限公司 Web page security detection processing method and device
CN106453436A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Method and device for detecting network security
CN108566656A (en) * 2018-04-13 2018-09-21 上海连尚网络科技有限公司 A kind of method and apparatus for detecting wireless network secure
CN108512935A (en) * 2018-04-16 2018-09-07 腾讯科技(深圳)有限公司 data service system, method, server and computer readable storage medium
CN108647281A (en) * 2018-05-03 2018-10-12 腾讯科技(深圳)有限公司 Web page access risk supervision, reminding method, device and computer equipment
CN110113364A (en) * 2019-05-29 2019-08-09 深圳市网心科技有限公司 Domain Hijacking defence method and device, computer installation and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111914243A (en) * 2020-07-30 2020-11-10 长沙尚链通信息科技有限公司 Block chain wallet operation reminding method based on block chain intelligent contract
CN111914243B (en) * 2020-07-30 2023-12-01 长沙尚链通信息科技有限公司 Blockchain wallet operation reminding method based on blockchain intelligent contract
CN111898159A (en) * 2020-07-31 2020-11-06 维沃移动通信有限公司 Risk prompting method and device, electronic equipment and readable storage medium
CN113342303A (en) * 2021-05-31 2021-09-03 维沃移动通信有限公司 Information input method and device
CN113342303B (en) * 2021-05-31 2024-05-24 维沃移动通信有限公司 Information input method and device
WO2023040983A1 (en) * 2021-09-18 2023-03-23 贵州白山云科技股份有限公司 Access request processing method, electronic apparatus, electronic device, and medium

Similar Documents

Publication Publication Date Title
CN111372205A (en) Information prompting method and electronic equipment
CN108924037B (en) Display method of rich media communication RCS message and mobile terminal
CN108510022B (en) Two-dimensional code generation and verification method and server
CN109918930A (en) A kind of information protecting method and terminal device
CN110336805B (en) Network access management method and mobile terminal
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN109918944B (en) Information protection method and device, mobile terminal and storage medium
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN110913455B (en) Method for forbidding abnormal cell, electronic equipment and server
CN109831359B (en) Method for detecting connection state of data network and terminal equipment thereof
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN111107223B (en) Message processing method and electronic equipment
CN109522741B (en) Application program permission prompting method and terminal equipment thereof
CN110990850A (en) Authority management method and electronic equipment
CN107995669B (en) Display method of wireless access point AP information and mobile terminal
CN111315039B (en) Integrity protection failure processing method and terminal
CN111159738A (en) Permission configuration method, application login method and device
CN108391305B (en) WiFi hotspot selection method and terminal equipment
CN109033822B (en) External link management method, mobile terminal and computer-readable storage medium
CN108616873B (en) Data transmission method, information transmission method, device, mobile equipment and storage medium
CN108494754B (en) Account information processing method and mobile terminal
CN110784467B (en) Network link processing method in message and electronic equipment
CN111010455B (en) Hotspot name modification method and electronic equipment
CN110856173B (en) Network access method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200703