CN117353988A - Risk detection method and device and computing equipment - Google Patents

Risk detection method and device and computing equipment Download PDF

Info

Publication number
CN117353988A
CN117353988A CN202311239361.7A CN202311239361A CN117353988A CN 117353988 A CN117353988 A CN 117353988A CN 202311239361 A CN202311239361 A CN 202311239361A CN 117353988 A CN117353988 A CN 117353988A
Authority
CN
China
Prior art keywords
user account
target user
target
simulated
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311239361.7A
Other languages
Chinese (zh)
Inventor
蔡晶晶
陈俊
付磊
胡刚
刘刚宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yongxin Zhicheng Technology Group Co ltd
Beijing Wuyi Jiayu Technology Co ltd
Original Assignee
Yongxin Zhicheng Technology Group Co ltd
Beijing Wuyi Jiayu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yongxin Zhicheng Technology Group Co ltd, Beijing Wuyi Jiayu Technology Co ltd filed Critical Yongxin Zhicheng Technology Group Co ltd
Priority to CN202311239361.7A priority Critical patent/CN117353988A/en
Publication of CN117353988A publication Critical patent/CN117353988A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The invention relates to a risk detection method, a risk detection device and a risk detection computing device, and relates to the technical field of data processing. In the invention, the computing device receives a first instruction, wherein the first instruction is used for indicating a risk detection result of determining a target user account, and the first instruction carries target characteristic information of the target user account. And responding to the first instruction, and determining the simulated fraudulent mail corresponding to the target characteristic information according to the target characteristic information. And sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account. Acquiring operation information input by a target user account, and determining a risk detection result of the target user account according to the operation information input by the target user account. The invention can send the simulated fraud software corresponding to the users with different characteristics to the user accounts with different characteristics, and further can realize the accurate detection of the possible risks of the user accounts with different characteristics, thereby meeting the detection requirements under different use scenes.

Description

Risk detection method and device and computing equipment
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a risk detection method, apparatus, and computing device.
Background
With the popularity of the internet and the rapid development of information technology, the increasing amount of fraudulent mail has led to an increasing risk of fraudulent user accounts. Typically, fraudulent mail is sent to a user account by information disguised as source trusted such that the user account operates on the fraudulent mail, resulting in leakage of personal information from the user account and economic loss. In order to improve the identification capability and the response level of the user account to the fraudulent mail, the related art generally simulates the fraudulent mail and sends the simulated fraudulent mail to the user account so as to improve the security awareness and the identification capability of the user account.
However, this approach has a limitation in that different user accounts have different characteristics, for example, different user accounts correspond to users having different professions, ages, or cultural degrees, respectively. Therefore, the same simulated fraudulent mails are sent to different user accounts, the scheme flexibility is poor, the identification capacity and the safety awareness of each user account with different characteristics on the fraudulent mails cannot be accurately reflected, and the use requirements of users under different use scenes cannot be met.
Disclosure of Invention
The invention provides a risk detection method, a risk detection device and a risk detection computing device, which can realize accurate detection of possible risks of user accounts with different characteristics according to the characteristic information of the user accounts, thereby meeting detection requirements under different use scenes.
The technical scheme for solving the technical problems is as follows:
in a first aspect, the present invention provides a risk detection method, the method comprising: and receiving a first instruction, wherein the first instruction is used for indicating a risk detection result of the determined target user account, and the first instruction carries target characteristic information of the target user account. In response to the first instruction, determining simulated fraud mails corresponding to the target feature information from a first database according to the target feature information, wherein the simulated fraud mails of a plurality of categories are stored in the first database, and the simulated fraud mails of each category in the plurality of categories correspond to different feature information respectively.
And sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account. And acquiring operation information input by the target user account, wherein the operation information comprises operation items of the target user account for the simulated fraudulent mail corresponding to the target characteristic information after receiving the simulated fraudulent mail corresponding to the target characteristic information. And determining a risk detection result of the target user account according to the operation information input by the target user account.
The beneficial effects of the invention are as follows: according to the invention, the simulated fraudulent mail corresponding to the target user account with the target characteristic information is determined from the first database according to the target characteristic information of the target user account, then the simulated fraudulent mail corresponding to the target user account is sent to the target user account, and the risk level of the target user account is determined according to the operation of the target user account on the simulated fraudulent mail. In this way, the invention can send the simulated fraud software corresponding to the users with different characteristics to the user accounts with different characteristics, and compared with the operation of sending the same simulated fraud software to the user accounts with different characteristics in the related technology, the invention can realize the accurate detection of the possible risks of the user accounts with different characteristics, thereby meeting the detection requirements under different use scenes.
On the basis of the technical scheme, the invention can be improved as follows.
In a possible implementation manner of the first aspect, sending the simulated fraud mail corresponding to the target feature information to the target user account includes: and determining address information of a target user account from a second database according to the target characteristic information, wherein the second database comprises address information of a plurality of user accounts, each user account is respectively configured with corresponding characteristic information, and the target user account is one or more of the plurality of user accounts. And sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account according to the address information of the target user account.
The beneficial effects of adopting the further scheme are as follows: the method provided by the invention determines the address information of the target user account in the second database through the target characteristic information, and sends the simulated fraudulent mail to the target user account. In this way, the computing device can effectively screen the accounts in the second database based on the target feature information, determine user accounts with different features, and send simulated fraudulent mail corresponding to the different features to the user accounts with the different features.
In a possible implementation manner of the first aspect, the target feature information includes one or more of professional feature information, age feature information, cultural degree feature information, sex feature information or regional feature information of the target user account.
The beneficial effects of adopting the further scheme are as follows: according to the method provided by the invention, through setting the classification of various characteristic information, the risk detection of the user account with different characteristics can be met, and further the use requirements of the user under different use scenes can be met.
In a possible implementation manner of the first aspect, the risk detection result includes that the user account is at risk or that the user account is not at risk. Determining a risk detection result of the target user account according to the operation information input by the target user account, including: and under the condition that the operation information input by the target user account characterizes the user account to operate the simulated fraudulent mail, determining that the risk detection result is that the user account has risk. And under the condition that the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account is not at risk.
The beneficial effects of adopting the further scheme are as follows: according to the method provided by the invention, whether the target user account operates the virtual fraudulent mail or not can be determined, the identification capacity and the safety awareness of the target user account on the fraudulent mail can be determined, and the risk detection result is determined to be that the user account has risks under the condition that the operation information input by the target user account characterizes the user account to operate the virtual fraudulent mail. And under the condition that the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account is not at risk. So that the risk detection result of each target user account can be determined.
In one possible implementation manner of the first aspect, the simulated fraudulent mail carries a website link, an attachment file, and a user information input control. The operation of simulating the fraudulent mail corresponding to the target characteristic information comprises the following steps: clicking on simulated fraudulent mail, clicking on a web site link, clicking on an attachment file, and inputting information via a user information input control.
The beneficial effects of adopting the further scheme are as follows: according to the method provided by the invention, by setting various risk contents in the simulated fraudulent mail, the operation of the simulated fraudulent mail on the target user account can be divided into finer granularity, and further, the operation content of the simulated fraudulent mail on the target user account can be determined, so that the risk detection result of the target user account can be judged more accurately.
In a possible implementation manner of the first aspect, the risk detection result further includes a risk level of the target user account. The different risk levels correspond to one or more of the operational items, respectively. The method further comprises the following steps: and determining operation items of the target user account for simulating the fraudulent mail according to the operation information input by the target user account. And determining the risk level of the target user account according to the operation item of the target user account for simulating the fraudulent mail.
The beneficial effects of adopting the further scheme are as follows: according to the method provided by the invention, the risk levels are set, and then the risk level of each target user account is determined based on different operations of the target user account on the simulated fraudulent mail, so that finer granularity division of the risk detection result of each user account is realized, and the identification capability level and the security consciousness level of each user account on the simulated fraudulent mail can be accurately reflected.
In a possible implementation manner of the first aspect, the different risk levels correspond to different security promotion policies, respectively, and the method further includes: and determining the security promotion strategy of the target user account according to the risk level of the target user account. And sending the security promotion policy of the target user account to the target user account.
The beneficial effects of adopting the further scheme are as follows: according to the method provided by the invention, through setting the security promotion strategies corresponding to different risk levels and providing different security promotion strategies for the user accounts with different risk levels, the identification capacity and security consciousness of the user accounts on the simulated fraudulent mails can be effectively promoted, and unnecessary losses are avoided.
In a possible implementation manner of the first aspect, the method further includes: and displaying the risk detection result and the operation information of the target user account.
The beneficial effects of adopting the further scheme are as follows: according to the method provided by the invention, the detection result of each user account can be intuitively displayed by displaying the risk detection result, the operation information and the security promotion strategy of the target user account, so that a user can conveniently and quickly know the risk condition of each user account, and timely process the risk condition, and the use experience of the user can be promoted.
In a second aspect, the present invention provides a risk detection apparatus, the apparatus comprising: the receiving unit is used for receiving a first instruction, the first instruction is used for indicating a risk detection result of the target user account, and the first instruction carries target characteristic information of the target user account. The determining unit is used for responding to the first instruction, determining simulated fraud mails corresponding to the target characteristic information from the first database according to the target characteristic information, wherein the simulated fraud mails of a plurality of categories are stored in the first database, and the simulated fraud mails of each category in the plurality of categories respectively correspond to different characteristic information. And the sending unit is used for sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account. The acquiring unit is used for acquiring the operation information input by the target user account, wherein the operation information comprises operation items of the target user account for the simulated fraudulent mail corresponding to the target characteristic information after receiving the simulated fraudulent mail corresponding to the target characteristic information. And the determining unit is also used for determining a risk detection result of the target user account according to the operation information input by the target user account.
In a possible implementation manner of the second aspect, the sending unit is specifically configured to: and determining address information of a target user account from a second database according to the target characteristic information, wherein the second database comprises address information of a plurality of user accounts, each user account is respectively configured with corresponding characteristic information, and the target user account is one or more of the plurality of user accounts. And sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account according to the address information of the target user account.
In a possible implementation manner of the second aspect, the target feature information includes one or more of professional feature information, age feature information, cultural degree feature information, sex feature information or regional feature information of the target user account.
In a possible implementation manner of the second aspect, the risk detection result includes that the user account is at risk or that the user account is not at risk. The determining unit is specifically configured to: and under the condition that the operation information input by the target user account characterizes the user account to operate the simulated fraudulent mail, determining that the risk detection result is that the user account has risk. And under the condition that the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account is not at risk.
In one possible implementation of the second aspect, the simulated fraudulent mail carries a web site link, an attachment file, and a user information input control. The operation of simulating the fraudulent mail corresponding to the target characteristic information comprises the following steps: clicking on simulated fraudulent mail, clicking on a web site link, clicking on an attachment file, and inputting information via a user information input control.
In a possible implementation manner of the second aspect, the risk detection result further includes a risk level of the target user account. The different risk levels correspond to one or more of the operational items, respectively. The determining unit is further used for: and determining operation items of the target user account for simulating the fraudulent mail according to the operation information input by the target user account. And determining the risk level of the target user account according to the operation item of the target user account for simulating the fraudulent mail.
In a possible implementation manner of the second aspect, the different risk levels correspond to different security lifting policies, and the determining unit is further configured to: and determining the security promotion strategy of the target user account according to the risk level of the target user account. And sending the security promotion policy of the target user account to the target user account.
In a possible implementation manner of the second aspect, the apparatus further includes a display unit, configured to display a risk detection result and operation information of the target user account.
In a third aspect, the present invention provides a computing device comprising: a processor. A memory for storing processor-executable instructions. Wherein the processor is configured to execute instructions to implement any one of the risk detection methods as provided in the first aspect above.
In a fourth aspect, there is provided a chip comprising: a processor and an interface circuit. And the interface circuit is used for receiving the code instruction and transmitting the code instruction to the processor. A processor configured to execute code instructions to perform any one of the risk detection methods provided in the first aspect.
In a fifth aspect, there is provided a computer-readable storage medium storing computer-executable instructions that, when executed on a computer, cause the computer to perform any one of the risk detection methods provided in the first aspect above.
In a sixth aspect, there is provided a computer program product comprising computer-executable instructions which, when run on a computer, cause the computer to perform any one of the methods provided in the first aspect above.
The technical effects caused by any one of the design manners of the second aspect to the sixth aspect may refer to the technical effects caused by different implementation manners of the first aspect, which are not described herein.
Drawings
Fig. 1 is an application scenario diagram of a risk detection method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a computing device in accordance with an embodiment of the invention;
fig. 3 is a schematic flow chart of a risk detection method according to an embodiment of the present invention;
FIG. 4 is a flow chart of another risk detection method according to an embodiment of the present invention;
FIG. 5 is a flow chart of another risk detection method according to an embodiment of the present invention;
FIG. 6 is a flow chart of another risk detection method according to an embodiment of the present invention;
FIG. 7 is a schematic diagram of a second interface according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a risk detection device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the accompanying drawings in the embodiments of the present invention. Wherein, in the description of embodiments of the invention, unless otherwise indicated, "a plurality" means two or more than two. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
In addition, in order to facilitate the clear description of the technical solution of the embodiments of the present invention, in the embodiments of the present invention, the words "first", "second", etc. are used to distinguish the same item or similar items having substantially the same function and effect. It will be appreciated by those of skill in the art that the words "first," "second," and the like do not limit the amount and order of execution, and that the words "first," "second," and the like do not necessarily differ. Meanwhile, in the embodiments of the present invention, words such as "exemplary" or "such as" are used to mean serving as examples, illustrations or explanations. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment of the present invention is not to be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion that may be readily understood.
With the popularity of the internet and the rapid development of information technology, the increasing amount of fraudulent mail has led to an increasing risk of fraudulent user accounts. Typically, fraudulent mail is sent to a user account by information disguised as source trusted such that the user account operates on the fraudulent mail, resulting in leakage of personal information from the user account and economic loss. In order to improve the identification capability and the response level of the user account to the fraudulent mail, the related art generally simulates the fraudulent mail and sends the simulated fraudulent mail to the user account so as to improve the security awareness and the identification capability of the user account.
However, this approach has a limitation in that different user accounts have different characteristics, for example, different user accounts correspond to users having different professions, ages, or cultural degrees, respectively. Therefore, the same simulated fraudulent mails are sent to different user accounts, the scheme flexibility is poor, the identification capacity and the safety awareness of each user account with different characteristics on the fraudulent mails cannot be accurately reflected, and the use requirements of users under different use scenes cannot be met.
In view of this, an embodiment of the present invention provides a risk detection method, applied to a computing device, where a risk detection device receives a first instruction, where the first instruction is used to indicate a risk detection result of determining a target user account, and the first instruction carries target feature information of the target user account. The computing device responds to the first instruction, determines simulated fraud mails corresponding to target feature information from a first database according to the target feature information, wherein the simulated fraud mails corresponding to the feature information are stored in the first database, and the target feature information is one or more of the feature information. The computing device sends simulated fraudulent mail corresponding to the target feature information to the target user account. The risk detection device acquires operation information input by the target user account, wherein the operation information comprises operation items of the target user account for the simulated fraudulent mail corresponding to the target characteristic information after receiving the simulated fraudulent mail corresponding to the target characteristic information. And the computing equipment determines a risk detection result of the target user account according to the operation information input by the target user account.
According to the invention, the simulated fraudulent mail corresponding to the target user account with the target characteristic information is determined from the first database according to the target characteristic information of the target user account, then the simulated fraudulent mail corresponding to the target user account is sent to the target user account, and the risk level of the target user account is determined according to the operation of the target user account on the simulated fraudulent mail. In this way, the invention can send the simulated fraud software corresponding to the users with different characteristics to the user accounts with different characteristics, and compared with the operation of sending the same simulated fraud software to the user accounts with different characteristics in the related technology, the invention can realize the accurate detection of the possible risks of the user accounts with different characteristics, thereby meeting the detection requirements under different use scenes.
Fig. 1 is an application scenario diagram of a risk detection method according to an embodiment of the present invention. As shown in fig. 1, the risk detection method provided by the present invention is performed by the computing device 100 shown in fig. 1, and the computing device 100 communicates with a plurality of terminal devices 110, respectively.
Specifically, each terminal device 110 corresponds to a different user account. In other words, each terminal device 110 logs in with a user account of a different user, respectively.
It should be understood that the foregoing is merely illustrative, and that one terminal device 110 may log in to multiple user accounts of the same user, or may log in to multiple user accounts of different users, and embodiments of the present invention are not limited to specific implementation manners of the terminal device 110.
By way of example, computing device 100 may be any device having data processing capabilities, such as a general purpose computer, a personal computer, a notebook computer, a switch or tablet computer, etc., and the particular implementation of computing device 100 is not limited herein.
By way of example, the terminal device 110 may be any electronic device having data processing capabilities, such as a mobile phone, a smart watch, a general purpose computer, a personal computer, a notebook computer or tablet computer, etc., and the specific implementation of the terminal device 110 is not limited herein.
It should be further understood that the application scenario provided in fig. 1 and the functions implemented by each execution body in the application scenario are only one exemplary implementation manner in the embodiment of the present invention, and the application scenario and the functions implemented by each execution body in the embodiment of the present invention include, but are not limited to, the above description.
For example, the method provided by the present invention may also be performed by one of the plurality of terminal devices 110 shown in fig. 1, which is not particularly limited in the embodiment of the present invention. The following exemplary description of the methods provided by the present invention as performed by computing device 100.
Fig. 2 shows a schematic structural diagram of a computing device 100 provided by an embodiment of the present invention. The computing device 100 includes a processor 210, a memory 220, and a communication interface 230.
Processor 210 may include one or more processing cores. The processor 210 utilizes various interfaces and lines to connect various portions of the computing device 100, perform various functions of the computing device 100 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 220, and invoking data stored in the memory 220. Alternatively, the processor 210 may be implemented in at least one hardware form of a central processing unit (Central Processing Unit, CPU), an image processor (graphics processing unit, GPU), digital signal processing (digital signal processing, DSP), field-programmable gate array (field-programmable gate array, FPGA), programmable logic array (programmable logic array, PLA).
The memory 220 may include a random access memory (random access memory, RAM) or a read-only memory (ROM). Optionally, the memory 220 includes a non-transitory computer readable medium (non-transitory computer-readable storage medium). Memory 220 may be used to store instructions, programs, code, sets of codes, or sets of instructions. Memory 220 may include a memory program area. The storage program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a request sending function, a data processing function, etc.), instructions for implementing the various method embodiments described above, and so on.
A communication interface 230 for communicating with other devices, apparatus or communication networks, such as a data storage device, image processing apparatus or ethernet, a Radio Access Network (RAN), a wireless local area network (wireless local area networks, WLAN), etc.
In a physical implementation, the devices (e.g., the processor 210, the memory 220, and the communication interface 230) may be devices in the same device (e.g., a notebook computer). Alternatively, at least two of the devices may be provided in the same apparatus, i.e. as different devices in one apparatus, e.g. in a manner similar to the arrangement of the apparatuses or devices in a distributed system.
It should be appreciated that the architecture illustrated in this embodiment is not intended to constitute a particular limitation on the computing device 100. In other embodiments of the invention, computing device 100 may include more or less components than illustrated, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The risk detection method provided by the embodiment of the invention is described below with reference to the accompanying drawings.
Fig. 3 is a flowchart of a risk detection method according to an embodiment of the present invention. Alternatively, the method may be applied to the computing device 100 shown in fig. 1, that is, performed by the computing device 100 having the hardware structure shown in fig. 2. The method may comprise the steps of:
S310, receiving a first instruction, wherein the first instruction is used for indicating and determining a risk detection result of the target user account, and the first instruction carries target characteristic information of the target user account.
The target feature information is feature information corresponding to the target user account, and the feature information is used for representing features of a user corresponding to the target user account.
In one possible implementation, the target characteristic information includes one or more of professional characteristic information, age characteristic information, cultural degree characteristic information, gender characteristic information, or region characteristic information of the target user account.
Specifically, the occupation characteristic information includes occupation, department and post of the user corresponding to the target user account. The age characteristic information comprises the age range of the user corresponding to the target user account, and the cultural degree characteristic information is the cultural degree of the user corresponding to the target user account. The sex characteristic information or the region characteristic information is the sex and the region of the user corresponding to the target user account.
Further, the first instruction is input by a first interface of the user, a feature information input control and an instruction sending control are displayed in the first interface, the computing device 100 generates feature information of the target user account in response to information input by the user through the feature information input control, and then receives the first instruction in response to operation of the instruction sending control by the user.
The first interface displayed by the computing device displays 3 feature information input controls corresponding to a plurality of different departments, namely a research and development part, a business part and a production part. And generating target characteristic information in response to the characteristic information input control corresponding to the research and development part by the user, wherein the target characteristic information comprises the research and development part. The computing device then receives a first instruction in response to a user operation of the instruction send control.
It should be appreciated that the first interface described above may be an interface displayed by the computing device 100. Other interfaces displayed by devices in communication with computing device 100 that send the first instruction to computing device 100 upon user input are also possible. The embodiment of the invention does not particularly limit the specific input form of the first instruction.
S320, responding to the first instruction, and determining the simulated fraudulent mail corresponding to the target characteristic information from the first database according to the target characteristic information.
Specifically, the simulated fraudulent mail is a simulated malicious mail, and the simulated fraudulent mail is provided with a website link, an attachment file and a user information input control. The computing device is capable of obtaining operational information for the target user account by simulating fraudulent mail operations in response to the target user account.
For example, the operations performed by the target user account on the simulated fraudulent mail include: clicking on simulated fraudulent mail, clicking on a web site link, clicking on an attachment file, and inputting information via a user information input control.
It should be understood that the simulated fraudulent mail may take a variety of forms, and the above is merely illustrative, and that the specific implementation of the simulated fraudulent mail according to the embodiments of the present application is not particularly limited.
The first database stores simulated fraudulent mails of a plurality of categories, and the simulated fraudulent mails of each category in the plurality of categories respectively correspond to different characteristic information.
The first database stores a plurality of classes of simulated fraud mails, and the number of the simulated fraud mails in each class is a plurality of the simulated fraud mails. Mail categories may include game promotion type mail, merchandise promotion type mail, web dating type mail, and benefit presentation type mail. Different characteristic information corresponds to different classes of simulated fraudulent mail respectively. For example, the characteristic information a is a 20 year old male research and development department personnel, and the simulated fraud mail corresponding to the characteristic information a is a game popularization mail and a network friend mail. The characteristic information B is female retirement personnel of 70 years old, and the simulated fraud mail corresponding to the characteristic information B is welfare giving mail.
It should be understood that one piece of characteristic information may correspond to one or more categories of simulated fraudulent mail, and that multiple pieces of characteristic information may also correspond to one or more categories of simulated fraudulent mail, and embodiments of the present invention are not particularly limited in this regard.
In response to the first instruction, the computing device determines that the simulated fraudulent mail corresponding to the target characteristic information is game popularization mail and network friend making mail from a first database under the condition that the target characteristic information is male research and development department personnel of 20-30 years old.
S330, sending the simulated fraud mail corresponding to the target characteristic information to the target user account.
Specifically, under the condition that the simulated fraud mail corresponding to the target feature information is a game popularization mail and a network friend-making mail, the computing device can randomly select one or more from a plurality of game popularization mails and/or network friend-making mails to send to the target user account.
In some embodiments, referring to fig. 4, S330 specifically includes the following steps:
s3301, determining address information of a target user account from a second database according to the target characteristic information.
The second database comprises address information of a plurality of user accounts, each user account is respectively configured with corresponding characteristic information, and the target user account is one or more of the plurality of user accounts.
Illustratively, the second database stores address information for user account A, user account B, and user account C. The characteristic information configured by the user account A is a 20-year-old male research and development department personnel, and the characteristic information configured by the user account B is a 70-year-old female retirement personnel. The characteristic information configured by the user account C is a female research and development department person 25 years old.
In the case that the target feature information is the research and development part, the computing device determines that the target user accounts are the user account a and the user account C in the second database. The computing device then obtains address information for user account a and user account C.
S3302, according to the address information of the target user account, sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account.
In conjunction with the above example, the computing device sends simulated fraud mail to user account a and user account C based on address information for user account a and user account C.
As can be seen from the above-mentioned S3301-S3302, the method provided by the present invention determines the address information of the target user account in the second database through the target feature information, and sends the simulated fraudulent mail to the target user account. In this way, the computing device can effectively screen the accounts in the second database based on the target feature information, determine user accounts with different features, and send simulated fraudulent mail corresponding to the different features to the user accounts with the different features.
S340, acquiring operation information input by the target user account, wherein the operation information comprises operation items of the target user account for the simulated fraudulent mail corresponding to the target characteristic information after receiving the simulated fraudulent mail corresponding to the target characteristic information.
Specifically, after sending the simulated fraudulent mail, the computing device monitors an operation event of the target user account on the simulated fraudulent mail, and generates operation information when the operation event of the target user account on the simulated fraudulent mail is monitored, wherein the operation information is an operation item of the target user account on the simulated fraudulent mail.
The simulated fraudulent mail is provided with a website link, and when the target user is monitored to operate the website link in the simulated fraudulent mail, operation information is generated, wherein the operation information is used for representing the target user account to operate the website link in the simulated fraudulent mail.
S350, determining a risk detection result of the target user account according to the operation information input by the target user account.
Specifically, the risk detection result characterizes whether the target user account has risk.
In one possible implementation, the risk detection result includes that the user account is at risk or that the user account is not at risk.
Optionally, referring to fig. 5, S350 specifically includes the following steps:
s3501, determining that the risk detection result is that the user account has risk under the condition that the operation information input by the target user account characterizes the user account to operate the simulated fraudulent mail.
Illustratively, if the target user account a operates after receiving the simulated fraud mail, it is determined that the risk detection result of the target user account a is that the user account is at risk.
S3502, when the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account has no risk.
Illustratively, after receiving the simulated fraud mail, the target user account B does not perform any operation, and then it is determined that the risk detection result of the target user account B is that the user account is not at risk.
As can be seen from the S3501-3502, the method provided by the invention can determine the identification capability and security awareness of the target user account on the fraudulent mail according to determining whether the target user account operates the virtual fraudulent mail, and determine that the risk detection result is that the user account has risk when the operation information input by the target user account characterizes the user account to operate the virtual fraudulent mail. And under the condition that the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account is not at risk. So that the risk detection result of each target user account can be determined.
Further, the simulated fraudulent mail carries a website link, an attachment file and a user information input control. The operation of simulating the fraudulent mail corresponding to the target characteristic information comprises the following steps: clicking on simulated fraudulent mail, clicking on a web site link, clicking on an attachment file, and inputting information via a user information input control. The risk detection result also includes a risk level for the target user account. The different risk levels correspond to one or more of the operational items, respectively.
Illustratively, the risk level includes low, medium, high, extremely high. Wherein the risk level corresponding to the operation of clicking the simulated fraudulent mail by the target user account is low. The risk level corresponding to the target user account clicking simulation fraud mail and clicking website links is the same. The risk level corresponding to the target user account clicking on the simulated fraudulent mail, clicking on the website link and clicking on the attachment file is high. The risk level corresponding to the target user account clicking on the simulated fraudulent mail, clicking on the website link, clicking on the attachment file, and inputting information through the user information input control is high.
The method provided by the embodiment of the invention, referring to fig. 6, further comprises the following steps:
s610, according to the operation information input by the target user account, determining operation items of the target user account for simulating the fraudulent mail.
S620, determining the risk level of the target user account according to the operation item of the target user account for simulating the fraudulent mail.
Illustratively, the operations of the target user account a on the simulated fraudulent mail are clicking on the simulated fraudulent mail, clicking on a web site link, and clicking on an attachment file, and the computing device determines that the risk level of the target user account a is high.
It should be understood that the above risk levels are merely exemplary, and that the user may flexibly set more or less risk levels according to the use requirement and use scenario, which is not particularly limited by the present invention.
According to the method provided by the invention, multiple risk contents are set in the simulated fraudulent mail, so that the operation of the target user account on the simulated fraudulent mail can be divided into finer granularity, the operation content of the target user account on the simulated fraudulent mail can be determined, and the risk level of each target user account is determined based on different operations of the target user account on the simulated fraudulent mail, so that the division of the risk detection result of each user account into finer granularity is realized, and the recognition capability level and the security consciousness level of each user account on the simulated fraudulent mail can be accurately reflected.
In one possible implementation, different risk levels correspond to different security boost policies, respectively.
Exemplary, the first policy with low risk level, the second policy with high risk level, the third policy with high risk level, and the fourth policy with high risk level.
It should be understood that the above security promotion policies are merely exemplary, and the user may flexibly set the security promotion policies corresponding to different risk levels according to the use requirement and the use scenario, which is not particularly limited in the present invention.
The method provided by the invention further comprises the following steps:
and determining the security promotion strategy of the target user account according to the risk level of the target user account. And sending the security promotion policy of the target user account to the target user account.
For example, the risk level of the target user account a is high, the computing device determines that the security promotion policy corresponding to the risk level of the target user account a is a third policy, and the computing device sends the third policy to the target user account.
In this way, the method provided by the invention can effectively improve the recognition capability and the safety awareness of the user account to the simulated fraudulent mail by setting the safety promotion strategies corresponding to different risk levels and providing different safety promotion strategies for the user account with different risk levels, thereby avoiding unnecessary loss.
As can be seen from S310 to S350, the present invention determines, from the first database, a simulated fraud mail corresponding to a target user account having target feature information according to the target feature information of the target user account, and then sends the simulated fraud mail corresponding to the target user account, and determines a risk level of the target user account according to the operation of the target user account on the simulated fraud mail. In this way, the invention can send the simulated fraud software corresponding to the users with different characteristics to the user accounts with different characteristics, and compared with the operation of sending the same simulated fraud software to the user accounts with different characteristics in the related technology, the invention can realize the accurate detection of the possible risks of the user accounts with different characteristics through personalized customization, thereby meeting the detection requirements under different use scenes.
In one possible implementation manner, the method provided by the invention further comprises the following steps:
and displaying the risk detection result and the operation information of the target user account.
For example, referring to fig. 7, fig. 7 is a schematic diagram of a second interface according to an embodiment of the present invention, where the second interface includes a risk detection result and operation information of the target user account C. The risk detection result includes that the target user account C is at risk, the risk level of the target user account C is high, and the operations of the target user account C on the simulated fraudulent mail include clicking the simulated fraudulent mail, clicking a website link and clicking an attachment file.
From the above, the method provided by the invention can intuitively display the detection result of each user account by displaying the risk detection result, the operation information and the security promotion strategy of the target user account, is convenient for the user to quickly know the risk condition of each user account, processes in time, and can promote the use experience of the user.
The foregoing description of the embodiments of the present invention has been presented primarily in terms of methods. It is understood that the computing device 100 includes at least one of a corresponding hardware structure and software module for performing the respective functions in order to implement the functions described above. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present invention.
The embodiment of the present invention may divide the risk detection apparatus into functional units according to the above method example, for example, each functional unit may be divided into each function by the computing device 100, or two or more functions may be integrated into one processing unit. The integrated units may be implemented in hardware or in software functional units. It should be noted that, in the embodiment of the present invention, the division of the units is schematic, which is merely a logic function division, and other division manners may be implemented in actual practice.
Fig. 8 is a schematic structural diagram of a risk detection device according to an embodiment of the present invention. The risk detection apparatus includes a receiving unit 810, a determining unit 820, a transmitting unit 830, and an acquiring unit 840. The receiving unit 810 is configured to receive a first instruction, where the first instruction is used to indicate a risk detection result of determining the target user account, and the first instruction carries target feature information of the target user account. And the determining unit 820 is configured to determine, in response to the first instruction, a simulated fraud mail corresponding to the target feature information from the first database according to the target feature information, where the first database stores simulated fraud mails of multiple categories, and each of the simulated fraud mails of multiple categories corresponds to different feature information. And a sending unit 830, configured to send the simulated fraud mail corresponding to the target feature information to the target user account. The obtaining unit 840 is configured to obtain operation information input by the target user account, where the operation information includes operation items of the target user account on the simulated fraud mail corresponding to the target feature information after receiving the simulated fraud mail corresponding to the target feature information. And the determining unit is also used for determining a risk detection result of the target user account according to the operation information input by the target user account.
Optionally, the sending unit 830 is specifically configured to: and determining address information of a target user account from a second database according to the target characteristic information, wherein the second database comprises address information of a plurality of user accounts, each user account is respectively configured with corresponding characteristic information, and the target user account is one or more of the plurality of user accounts. And sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account according to the address information of the target user account.
Optionally, the target feature information includes one or more of professional feature information, age feature information, cultural degree feature information, sex feature information, or regional feature information of the target user account.
Optionally, the risk detection result includes that the user account is at risk or the user account is not at risk. The determining unit 820 is specifically configured to: and under the condition that the operation information input by the target user account characterizes the user account to operate the simulated fraudulent mail, determining that the risk detection result is that the user account has risk. And under the condition that the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account is not at risk.
Optionally, the simulated fraudulent mail carries a website link, an attachment file, and a user information input control. The operation of simulating the fraudulent mail corresponding to the target characteristic information comprises the following steps: clicking on simulated fraudulent mail, clicking on a web site link, clicking on an attachment file, and inputting information via a user information input control.
Optionally, the risk detection result further includes a risk level of the target user account. The different risk levels correspond to one or more of the operational items, respectively. The determining unit 820 is further configured to: and determining operation items of the target user account for simulating the fraudulent mail according to the operation information input by the target user account. And determining the risk level of the target user account according to the operation item of the target user account for simulating the fraudulent mail.
Optionally, the different risk levels correspond to different security lifting policies, and the determining unit 820 is further configured to: and determining the security promotion strategy of the target user account according to the risk level of the target user account. And sending the security promotion policy of the target user account to the target user account.
Optionally, the apparatus further includes a display unit 850, where the display unit 850 is configured to display the risk detection result and the operation information of the target user account.
It should be understood that, for the specific description of the above alternative modes, reference may be made to the foregoing method embodiments, and no further description is given here. In addition, any explanation and description of the beneficial effects of the risk detection device provided above may refer to the corresponding method embodiments described above, and will not be repeated.
Embodiments of the present invention also provide a computer readable storage medium having stored therein at least one computer instruction that is loaded and executed by a processor to implement the risk detection method of the above embodiments. For the explanation of the relevant content and the description of the beneficial effects in any of the above-mentioned computer-readable storage media, reference may be made to the above-mentioned corresponding embodiments, and the description thereof will not be repeated here.
The embodiment of the invention also provides a chip. The chip has integrated therein control circuitry and one or more ports for implementing the functions of the terminal device and the server described above. Optionally, the functions supported by the chip may be referred to above, and will not be described herein.
Those of ordinary skill in the art will appreciate that all or a portion of the steps implementing the above-described embodiments may be implemented by a program to instruct associated hardware. May be stored in a computer readable storage medium. The above-mentioned storage medium may be a read-only memory, a random access memory, or the like. The processing unit or processor may be a central processing unit, a general purpose processor, a specific circuit configuration (application specific integrated circuit, ASIC), a microprocessor (digital signal processor, DSP), a field programmable gate array (field programmable gate array, FPGA) or other programmable logic device, transistor logic device, hardware components, or any combination thereof.
Embodiments of the present invention also provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform any of the methods of the above embodiments. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present invention are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, a website, computer, server, or data center via a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. Computer readable storage media can be any available media that can be accessed by a computer or data storage devices including one or more servers, data centers, etc. that can be integrated with the media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., SSD), etc.
It should be noted that the above-mentioned devices for storing computer instructions or computer programs, such as, but not limited to, the above-mentioned memories, computer-readable storage media, communication chips, and the like, provided by the embodiments of the present invention all have non-volatility. Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the embodiments of the present invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable storage medium. Computer-readable storage media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.

Claims (10)

1. A risk detection method, the method comprising:
receiving a first instruction, wherein the first instruction is used for indicating and determining a risk detection result of a target user account, and the first instruction carries target characteristic information of the target user account;
responding to the first instruction, determining simulated fraud mails corresponding to the target characteristic information from a first database according to the target characteristic information, wherein the first database stores simulated fraud mails of a plurality of categories, and the simulated fraud mails of each category in the plurality of categories respectively correspond to different characteristic information;
sending the simulated fraud mail corresponding to the target characteristic information to the target user account;
acquiring operation information input by the target user account, wherein the operation information comprises operation items of the target user account for the simulated fraudulent mail corresponding to the target characteristic information after receiving the simulated fraudulent mail corresponding to the target characteristic information;
and determining a risk detection result of the target user account according to the operation information input by the target user account.
2. The method of claim 1, wherein sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account comprises:
Determining address information of the target user account from a second database according to the target characteristic information, wherein the second database comprises address information of a plurality of user accounts, each user account is respectively configured with corresponding characteristic information, and the target user account is one or more of the plurality of user accounts;
and sending the simulated fraudulent mail corresponding to the target characteristic information to the target user account according to the address information of the target user account.
3. The method of claim 2, wherein the target characteristic information comprises one or more of professional characteristic information, age characteristic information, cultural degree characteristic information, gender characteristic information, or regional characteristic information of a target user account.
4. A method according to any of claims 1-3, wherein the risk detection result comprises a risk of a user account or a risk of the user account not being present;
the determining the risk detection result of the target user account according to the operation information input by the target user account comprises the following steps:
determining that the risk detection result is that the user account has risk under the condition that the operation information input by the target user account characterizes the user account to operate the simulated fraudulent mail;
And under the condition that the operation information input by the target user account characterizes that the user account does not operate the simulated fraudulent mail, determining that the risk detection result is that the user account is free of risk.
5. The method of claim 4, wherein the simulated fraudulent mail carries a web site link, an attachment file and a user information input control; the operation of simulating the fraudulent mail corresponding to the target characteristic information comprises the following steps: clicking on the simulated fraudulent mail, clicking on the web site link, clicking on the attachment file, and inputting information through the user information input control.
6. The method of claim 5, wherein the risk detection result further comprises a risk level of a target user account; the different risk levels respectively correspond to one or more operation items;
the method further comprises the steps of:
according to the operation information input by the target user account, determining operation items of the target user account on the simulated fraudulent mail;
and determining the risk level of the target user account according to the operation item of the target user account on the simulated fraudulent mail.
7. The method of claim 6, wherein different ones of the risk levels correspond to different security boost policies, respectively, the method further comprising:
determining a security promotion strategy of the target user account according to the risk level of the target user account;
and sending the security promotion policy of the target user account to the target user account.
8. The method of claim 6, wherein the method further comprises:
and displaying the risk detection result and the operation information of the target user account.
9. A risk detection apparatus, the apparatus comprising:
the receiving unit is used for receiving a first instruction, wherein the first instruction is used for indicating and determining a risk detection result of a target user account, and the first instruction carries target characteristic information of the target user account;
the determining unit is used for responding to the first instruction, determining simulated fraud mails corresponding to the target characteristic information from a first database according to the target characteristic information, wherein the simulated fraud mails corresponding to a plurality of characteristic information are stored in the first database, and the target characteristic information is one or more of the plurality of characteristic information;
The sending unit is used for sending the simulated fraud mail corresponding to the target characteristic information to the target user account;
the acquiring unit is used for acquiring operation information input by the target user account, wherein the operation information comprises operation items of the target user account for the simulated fraudulent mail corresponding to the target characteristic information after receiving the simulated fraudulent mail corresponding to the target characteristic information;
the determining unit is further configured to determine a risk detection result of the target user account according to the operation information input by the target user account.
10. A computing device, comprising:
a processor; a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the risk detection method of any of claims 1-8.
CN202311239361.7A 2023-09-25 2023-09-25 Risk detection method and device and computing equipment Pending CN117353988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311239361.7A CN117353988A (en) 2023-09-25 2023-09-25 Risk detection method and device and computing equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311239361.7A CN117353988A (en) 2023-09-25 2023-09-25 Risk detection method and device and computing equipment

Publications (1)

Publication Number Publication Date
CN117353988A true CN117353988A (en) 2024-01-05

Family

ID=89356670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311239361.7A Pending CN117353988A (en) 2023-09-25 2023-09-25 Risk detection method and device and computing equipment

Country Status (1)

Country Link
CN (1) CN117353988A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013149063A (en) * 2012-01-19 2013-08-01 Nomura Research Institute Ltd Target type mail attack simulation system and target type mail attack simulation program
CN109067637A (en) * 2018-06-15 2018-12-21 北京首联信通科技有限公司 Network information security Consciousness Education method and device, storage medium
CN111770086A (en) * 2020-06-28 2020-10-13 深圳前海微众银行股份有限公司 Fishing user simulation collection method, device, system and computer readable storage medium
US20210126944A1 (en) * 2019-10-25 2021-04-29 Target Brands, Inc. Analysis of potentially malicious emails
CN113259321A (en) * 2021-04-13 2021-08-13 上海碳泽信息科技有限公司 System and method for verifying security awareness of personnel on network attack and utilization

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013149063A (en) * 2012-01-19 2013-08-01 Nomura Research Institute Ltd Target type mail attack simulation system and target type mail attack simulation program
CN109067637A (en) * 2018-06-15 2018-12-21 北京首联信通科技有限公司 Network information security Consciousness Education method and device, storage medium
US20210126944A1 (en) * 2019-10-25 2021-04-29 Target Brands, Inc. Analysis of potentially malicious emails
CN111770086A (en) * 2020-06-28 2020-10-13 深圳前海微众银行股份有限公司 Fishing user simulation collection method, device, system and computer readable storage medium
CN113259321A (en) * 2021-04-13 2021-08-13 上海碳泽信息科技有限公司 System and method for verifying security awareness of personnel on network attack and utilization

Similar Documents

Publication Publication Date Title
US10680978B2 (en) Generating recommended responses based on historical message data
CN112148987B (en) Message pushing method based on target object activity and related equipment
CN107733984A (en) A kind of method, terminal and computer-readable recording medium for pushing screen locking information
WO2019062081A1 (en) Salesman profile formation method, electronic device and computer readable storage medium
CN111327607B (en) Security threat information management method, system, storage medium and terminal based on big data
CN110022399B (en) Message display method and device, user terminal and readable storage medium
CN110503409B (en) Information processing method and related device
US10867130B2 (en) Language classification system
CN107665232A (en) Detect the method for similar application and its electronic installation of adaptation
CN112434238A (en) Webpage quality detection method and device, electronic equipment and storage medium
CN111885408A (en) Bullet screen display method and device and electronic equipment
CN112214770A (en) Malicious sample identification method and device, computing equipment and medium
CN107563188A (en) Safe evaluating method, device and the computer-readable storage medium of application
CN117353988A (en) Risk detection method and device and computing equipment
US10860804B2 (en) Quick text classification model
CN116823493A (en) Feature processing method and device, storage medium and electronic equipment
CN111640029A (en) Insurance application method and device, electronic equipment and storage medium
US20180280801A1 (en) System and Method for Placement Marketing
CN110278241A (en) A kind of registration request processing method and processing device
CN112055010B (en) Two-dimensional code picture intercepting method and device, electronic equipment and storage medium
CN115357179A (en) Display screen management method, display screen management device, electronic equipment and storage medium
CN113706724A (en) Referral supervision method, device, equipment and storage medium based on artificial intelligence
CN113469732A (en) Content understanding-based auditing method and device and electronic equipment
CN110929175A (en) Method, device, system and medium for evaluating user evaluation
CN113051476B (en) Method and device for sending message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination