WO2018233418A1 - 转发消息的方法、装置及存储介质 - Google Patents
转发消息的方法、装置及存储介质 Download PDFInfo
- Publication number
- WO2018233418A1 WO2018233418A1 PCT/CN2018/087492 CN2018087492W WO2018233418A1 WO 2018233418 A1 WO2018233418 A1 WO 2018233418A1 CN 2018087492 W CN2018087492 W CN 2018087492W WO 2018233418 A1 WO2018233418 A1 WO 2018233418A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- account
- terminal
- information
- answer
- identity verification
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/23—Reliability checks, e.g. acknowledgments or fault reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/10—Multimedia information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/222—Monitoring or handling of messages using geographical location information, e.g. messages transmitted or received in proximity of a certain spot or area
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
Definitions
- the present application relates to the field of computer technologies, and in particular, to a method, an apparatus, and a storage medium for forwarding a message.
- chat relies on the Internet, as long as it is similar to the counterfeit (such as avatar, name, social relationship with the victim, recent social activities, etc.), fraud is easier to succeed, and the similarity is directly proportional to the success rate of fraud, ie The higher the similarity, the easier the fraud is to succeed.
- the embodiment of the present application provides a method for forwarding a message, which is applied to a computer device, and includes:
- the message of the terminal of the first account is suspended to the terminal of the second account;
- An embodiment of the present application provides an apparatus for forwarding a message, including:
- processor coupled to the processor, the memory having machine readable instructions executable by the processor, the processor executing the machine readable instructions to:
- the message of the terminal of the first account is suspended to the terminal of the second account;
- Embodiments of the present application provide a non-transitory computer readable storage medium in which machine readable instructions are stored, the machine readable instructions being executable by a processor to perform the following operations:
- the message of the terminal of the first account is suspended to the terminal of the second account;
- FIG. 1A is a schematic diagram of an interface of a risk prompt based on a chat interface according to an embodiment of the present application
- FIG. 1B is a schematic diagram of an implementation environment of a method for forwarding a message according to an embodiment of the present application
- FIG. 2 is a schematic flowchart of a method for forwarding a message according to an embodiment of the present application
- FIG. 3 is a schematic diagram of interaction between terminals in a method for forwarding a message according to an embodiment of the present disclosure
- FIG. 4 is a schematic flowchart of a method for forwarding a message based on an identity verification server according to an embodiment of the present application
- FIG. 5 is a schematic flowchart of a method for forwarding a message according to an embodiment of the present application
- 6A is a schematic structural diagram of an apparatus for forwarding a message according to an embodiment of the present application.
- FIG. 6B is a schematic structural diagram of an apparatus for forwarding a message according to an embodiment of the present application.
- FIG. 7 is a schematic structural diagram of a computer device that runs the foregoing method for forwarding a message according to an embodiment of the present application.
- each social platform and instant messaging software will remind the user to increase vigilance and verify the identity of the other party by issuing security prompts during the chat.
- the prompt information shown in 101 in FIG. 1A is displayed to prompt the user that the current chat content may be
- the user may not view the prompt information or ignore the prompt information, resulting in the general reach of the prompt information is not high, and the corresponding alert effect cannot be achieved, that is, the corresponding prompt effect is not achieved.
- a forwarding message is proposed.
- the implementation of the method may depend on a computer program running on a von Neumann system-based computer system, which may be an application based on an instant messaging application or a social network platform for message forwarding .
- the computer system may be a computer device such as a smartphone, tablet, personal computer or the like that runs the above computer program.
- the execution body of the method for forwarding a message may be a server that forwards a message between a user and a user based on an instant messaging application or a social network platform, for example, with an instant messaging application or a social network.
- the web server corresponding to the platform. For example, when a user sends a message to another user or group of users through an instant messaging application or a social network platform, the message that needs to be sent is sent to the server, and the server forwards the message to the user or user group that needs to be sent.
- FIG. 1B is a schematic diagram of an implementation environment of a method for forwarding a message according to an embodiment of the present application.
- the computer device 10 is integrated with the device 11 for forwarding a message provided by any embodiment of the present application, and is used to implement the method for forwarding a message provided by any embodiment of the present application.
- the computer device 10 is connected to the user terminal 20 via a network 30, which may be a wired network or a wireless network. In the embodiment of the present application, the computer device 10 may be a server device.
- the method for forwarding a message provided by the embodiment of the present application can be applied to a computer device, such as a server. This includes the following steps S102-S108, as shown in FIG. 2.
- Step S102 Receive a target message sent by the terminal of the first account to the terminal of the second account.
- the user After logging in to the instant messaging application or the social networking platform, the user can send messages to other users or friends on the social relationship chain through an instant messaging application or a social networking platform. That is to say, after the user logs in to the first account through the instant messaging application or the webpage or client (APP) of the social networking platform on the terminal, the user can send a message to other user terminals.
- APP client
- the user can log in to the corresponding instant messaging application or the social network platform through the webpage or the APP on the user terminal, and send the message.
- the user downloads an APP corresponding to the instant messaging application or the social network platform on the user terminal, that is, the user sends a message through the APP corresponding to the instant messaging application or the social network platform installed on the user terminal. .
- the server after receiving the message sending request sent by the terminal that has logged in the first account, acquires the target user (that is, the terminal of the second account) that needs to send the message included in the message sending request, and obtains The message that needs to be sent (ie the target message). Then, according to the obtained second account and the target message, related operations of message forwarding are performed.
- the target user that is, the terminal of the second account
- the second account may be a personal account or a user account (ie, an account of the user group). That is to say, the target message sent by the terminal of the first account may be sent to a certain user terminal, or may be sent to the user terminal corresponding to all accounts included in a certain user group. That is, the number of terminals of the second account may be more than one.
- Step S104 If the first account or the target message is at risk, the message of the terminal of the first account is suspended to the terminal of the second account.
- the instant messaging application or the server corresponding to the social network platform automatically delivers a corresponding security prompt to the user to prompt the user to be true to the other party. Identity is verified.
- the terminal of the first account when the terminal of the first account sends the target message to the terminal of the second account, it is forwarded by the server. After receiving the target message sent by the terminal of the first account, the server identifies the target message to determine whether the content in the risk is included.
- the keyword in the process of determining whether the target information has a risk, the keyword may be searched for a keyword that matches the preset risk keyword. That is, a search is performed on the text information included in the target message, and it is determined whether there is a keyword matching the preset risk keyword, and if yes, it is determined that the target message is risky; otherwise, the target message is determined. There is no risk.
- the text information included in the target message is subjected to word segmentation processing, and at least one word after the word segmentation is obtained, and then the at least one word is searched for whether there is a word matching the preset risk keyword, if the search is performed.
- the preset risk keyword may include a keyword related to the security of the user's account, such as remittance, account number, and money. For another example, when the target message is "Can you play 10,000 yuan in my account?", the target message is considered risky because of the keywords "account” and "money”.
- the case where there is a security risk between the terminal of the first account and the terminal of the second account includes not only the risk that the target message itself is present, but also the risk of the terminal of the first account or the terminal of the second account, for example
- the operating environment is at risk, or the location is abnormal.
- the method further includes: acquiring location information of the terminal of the first account, where the location information is If the historical location information corresponding to the first account does not match, it is determined that the first account has a risk.
- the user obtains the current location information of the user. For example, the user may obtain the city or region where the user is located through the IP address or network address of the user terminal; or, through the user terminal.
- the positioning system on the system obtains the current location information of the user terminal and uploads it to the server. That is, according to the location information included in the historical data of the first account login, it is determined whether the location information corresponding to the current location of the first account matches the historical data, that is, the terminal of the first account is currently located. Whether the location is a location that already exists in the historical data.
- the location information of the terminal of the first account is obtained during the process of logging in the first account on the user terminal, or the location information of the terminal of the first account is obtained before the terminal of the first account sends the target message, and When the target message is sent to the server, the location information is sent to the server.
- the location information of the terminal of the first account does not match the historical location information corresponding to the first account, it indicates that the first account may be hacked by other users, and thus there is a security risk, that is, the first account has a risk; In a case where the location information of the terminal of the first account matches the historical location information corresponding to the first account, it is determined that the first account does not have a risk.
- a certain security risk may be caused. Specifically, if the first account has a risk or the target message is at risk, the sending of the message between the terminal of the first account and the terminal of the second account should be stopped, that is, in this case, the first block should be blocked. The transmission of a message between the terminal of an account and the terminal of the second account until it is confirmed that there is no risk or the risk is released.
- the sending of the message between the terminal of the first account and the terminal of the second account should be suspended. Also, for all cases in which it is determined that there is a risk, it is considered to be a risk as long as one of the cases is satisfied. For example, if there is a risk in the first account, or the target message is at risk, or the first account and the target message are at risk, the message of the terminal of the first account is temporarily suspended to the terminal of the second account.
- Step S106 Acquire first authentication information corresponding to the identity verification problem information and the identity verification problem information.
- Step S108 Send the identity verification question information to the terminal of the first account.
- Step S110 Receive second answer information corresponding to the identity verification question information returned by the terminal of the first account.
- the identity of the user corresponding to the first account needs to be verified.
- the user corresponding to the first account and the user corresponding to the second account need to be the same.
- One question gives the answer, that is, does not depend on the question-answer database, and does not need to pre-establish a database with a one-to-one correspondence with the reference answer.
- the user corresponding to the first account and the user corresponding to the second account need to provide an answer to the authentication question “What is the phone number of Zhang?” and return it to the server, and the server verifies the answer.
- the server may randomly select an identity verification question from the preset problem database as the problem that the user evaluates the risk in this embodiment. For example, at least one problem commonly used for authentication is set in the problem database. In this step, the server selects one of the at least one question as the authentication problem of the method.
- the setting of the authentication problem may also be set by a user corresponding to the second account.
- the server sends the list corresponding to the at least one problem that is selectable to the terminal of the second account, and the user corresponding to the second account selects the identity verification question from the list through the terminal of the second account, and returns the problem to the server.
- the corresponding request for the identity verification problem is sent to the terminal corresponding to the second account, and the user corresponding to the second account inputs the identity verification problem through the terminal corresponding to the second account, and the input is The authentication issue is returned to the server so that the server can get authentication issues.
- the answer information given by the receiver of the target message (ie, the terminal of the second account) for the identity verification question is the first answer information
- the sender of the target message ie, the terminal of the first account
- the answer given by the question is the second answer message.
- the acquisition time of the first answer information may be different according to the setting time of the identity verification question.
- the authentication problem is the server setting
- the server determines the identity verification problem for performing the risk confirmation
- the authentication problem information is separately sent to the terminal of the first account and the terminal of the second account. Then the corresponding user can give the answer information for the received authentication question.
- the first answer information corresponding to the information about the authentication and the authentication information is: obtaining preset authentication problem information, and sending the authentication problem information to the terminal of the second account, and receiving The answer information sent by the terminal of the second account is used as the first answer information.
- the identity verification question information is sent to the terminal of the first account, and the second answer information corresponding to the identity verification problem information returned by the terminal of the first account is received. .
- the authentication problem is determined by the server, and then the server sends the determined authentication question to the terminal of the first account and the terminal of the second account respectively, and the second answer information returned by the terminal receiving the first account And the first answer information returned by the terminal of the second account.
- the authentication question may also be set by the terminal of the second account.
- the first answer information corresponding to the obtaining the authentication problem information and the identity verification problem information is: sending an identity verification question and an answer setting request to the terminal of the second account; and receiving the terminal of the second account
- the authentication question information sent by the request and the first answer information corresponding to the authentication question information are set for the authentication question and answer.
- the server sends a request corresponding to the authentication question to the terminal of the second account, that is, an authentication question and an answer setting request.
- the terminal of the second account displays a preset identity verification question and an interface related to the answer setting on the display interface of the terminal, and then the user can input the identity verification question or select the identity verification question through the interface.
- the terminal of the second account may be free to set the identity verification problem (ie, input text information corresponding to the authentication problem), or may be Select the authentication question in the more than one optional authentication question preset by the server.
- the user corresponding to the second account also needs to give the answer of the set authentication question, that is, the first answer information, and set the first answer information and settings.
- the authentication problem is sent to the server.
- the identity verification information is sent to the terminal of the first account, so that the terminal of the first account can display the identity verification problem, thereby making the first
- the user corresponding to an account can input the answer information corresponding to the authentication question, that is, the second answer information, through the interface or window displaying the authentication question, and return the second answer information to the server after the input is completed.
- the terminal of the first account may also be given a time limit for answering the information for the identity verification problem, that is, the terminal that defines the first account needs to be within the preset duration.
- the answer information for the authentication question may also be given a time limit for answering the information for the identity verification problem, that is, the terminal that defines the first account needs to be within the preset duration.
- the method further includes: returning the identity verification problem within the preset duration of the terminal of the first account In the case of the second answer information corresponding to the information, it is determined that the first account has a risk.
- the answer information determines that the first account is at risk. That is to say, in the case that the first account is stolen or fraudulent, the user corresponding to the first account can find the answer information corresponding to the identity verification problem through the network, thereby further improving the reliability of the identity verification.
- Step S112 determining whether the first answer information and the second answer information match, if yes, performing step S114: restoring the message of the terminal that forwards the first account to the terminal of the second account; If the matching is performed, the process proceeds to step S116: the message forwarding the terminal of the first account is terminated to the terminal of the second account, and the risk prompt information corresponding to the first account is generated and the risk prompt information is sent to the second The terminal of the account.
- whether there is a risk of sending a message between the terminal of the first account and the terminal of the second account is that the terminal of the first account and the terminal of the second account give respective answers to the same identity verification question. Then, it is judged whether the answer between the terminal of the first account and the terminal of the second account is matched. That is to say, if the answer given by the terminal of the first account is the same as the answer given by the second account, it means that the user corresponding to the first account and the user corresponding to the second account are recognized in the current situation. Not someone else is fake.
- the first answer information corresponding to the second account is matched with the second answer information corresponding to the first account, and if it is matched, the terminal of the current first account and the terminal of the second account are There is no risk in the transmission of the message, and the message can be sent normally; if the first answer information and the second answer information do not match, the current terminal of the first account and the terminal of the second account are There is a risk in sending a message, that is, the first account may be stolen or spoofed, and therefore, the sending of messages between the two should be blocked.
- the message of the terminal that forwards the first account suspended in step S104 is restored to the terminal of the second account, that is, restored. Forwarding the message of the terminal of the first account to the terminal of the second account.
- the sending of the message between the terminal of the first account and the terminal of the second account is blocked, that is, the terminal of the first account is terminated. The message is to the terminal of the second account.
- the terminal of the first account when the terminal of the first account sends a target message to the terminal of the second account, there is a risk that not only the sending of the message but also the corresponding security risk needs to be notified to the first
- the terminal of the second account that is, if there is a mismatch between the first answer information and the second answer information, generating risk alert information corresponding to the first account and transmitting the risk alert information to the terminal of the second account .
- FIG. 3 shows the interaction relationship between the terminal of the first account, the terminal of the second account, and the server.
- the case where the first account or the target message is risky and the subsequent authentication is passed is taken as an example.
- the user sends the target message to the server through the terminal of the first account and the receiver (the terminal of the second account) corresponding to the target message.
- the server detects the first account and the target message to determine whether the current first account or the target message has fraud, impersonation or other risks.
- the server requests the identity verification question and the first answer information from the terminal of the second account, and the terminal of the second account returns the identity verification question and the first answer information to the server in response to the request.
- the server then sends the authentication question to the terminal of the first account and receives the second answer information returned by the terminal of the first account.
- the server compares the first answer information with the second answer information to determine whether the two match. In the case of matching, the server sends the target message of the previously received first account terminal to the terminal of the second account. Give the terminal to the second account.
- the server that forwards the message between the terminal of the first account and the terminal of the second account is a web server corresponding to the instant messaging application or the social network platform, and the server that performs the authentication may be another server. It can also be a separate module for authentication in the web server.
- FIG. 4 is a schematic flowchart of a method for forwarding a message based on an identity verification server according to an embodiment of the present application.
- FIG. 4 is an example of an authentication server that is independent of a web server for authentication.
- the web server can communicate with the authentication server. For example, if the web server detects that the current message is at risk, the notification is notified.
- the authentication server determines the authentication problem and obtains the answer information given by the terminal of the first account and the terminal of the second account for the identity verification question, and then the identity verification server authenticates the terminal of the first account and the terminal of the second account. The answer information given by the question is verified.
- the web server is notified to send the message of the terminal of the first account to the terminal of the second account to the terminal of the second account; if the verification fails, The sending of the message between the terminal of the first account and the terminal of the second account is performed, and the security prompt information is sent to the terminal of the second account.
- FIG. 5 is a schematic flowchart of a method for forwarding a message according to an embodiment of the present application. As shown in FIG. 5, the method can include the following steps.
- Step S501 The two parties of the chat initiate a chat.
- Step S502 The server determines whether it is a suspected fraud chat scene. If yes, go to step S503; if no, go to step S507.
- Step S503 The server blocks the chat.
- Step S504 The server sends two-way identity verification to both parties. That is, the server sends the same authentication question to both parties to the chat.
- Step S505 The server determines whether the results returned by the two parties for the identity verification question (ie, the answer) are consistent. If they are consistent, step S507 is performed; if not, step S506 is performed.
- Step S506 returning the verification result to the message recipient, and ending the chat.
- Step S507 The server normally forwards the chat message between the two parties.
- an apparatus for forwarding a message including a target message receiving module 102, a risk determining module 104, a first answer information acquiring module 106, a second answer information acquiring module 108, and an answer information matching module 110. ,among them:
- the target message receiving module 102 is configured to receive a target message sent by the terminal of the first account to the terminal of the second account;
- the risk determining module 104 is configured to suspend the message of the terminal of the first account to the terminal of the second account if the first account or the target message is at risk;
- the first answer information obtaining module 106 is configured to obtain the first answer information corresponding to the identity verification problem information and the identity verification question information;
- a second answer information obtaining module 108 configured to send the identity verification question information to the terminal of the first account; and receive second answer information corresponding to the identity verification question information returned by the terminal of the first account ;
- the answer information comparison module 110 is configured to resume forwarding the message of the terminal of the first account to the terminal of the second account if the first answer information and the second answer information match.
- the first answer information obtaining module 106 is further configured to obtain preset identity verification question information, send the identity verification question information to the terminal of the second account, and receive the terminal of the second account.
- the answer information sent is used as the first answer information.
- the first answer information obtaining module 106 is further configured to send an identity verification question and an answer setting request to the terminal of the second account; the terminal that receives the second account sets the authentication question and answer settings.
- the risk determining module 104 is further configured to acquire location information of the terminal of the first account, where the location information does not match the historical location information corresponding to the first account, The first account is at risk.
- the risk determination module 104 is further configured to search for a keyword that matches the preset risk keyword in the target message, and if found, determine that the target message is at risk.
- the risk determining module 104 is further configured to: when the terminal of the first account does not return the second answer information corresponding to the identity verification question information within a preset duration, determine the first account. There is a risk.
- the device further includes a risk prompting module 112, configured to terminate forwarding the first account if the first answer information and the second answer information do not match. Sending the message of the terminal to the terminal of the second account; generating risk prompt information corresponding to the first account and transmitting the risk prompt information to the terminal of the second account.
- a risk prompting module 112 configured to terminate forwarding the first account if the first answer information and the second answer information do not match.
- the server may Suspending the message sent by the terminal of the first account to the second account, and requesting, by the server, the answer information for the same identity verification question to the terminal of the first account and the terminal of the second account, and the terminal of the first account and the first The answer information given by the terminals of the two account accounts are compared. When the two are matched, it is determined that there is no risk, and the message that the terminal that forwards the first account is sent to the second account is restored, and vice versa, the two do not match.
- the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
- a software program it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions.
- the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer instructions can be stored in a non-transitory computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, a computer,
- the server or data center is transported to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
- the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
- the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
- Figure 7 illustrates a von Neumann system-based computer device that operates the method of forwarding messages described above.
- the computer device can be a terminal device or a server device such as a smartphone, a tablet, a palmtop, a laptop, or a personal computer.
- the computer device may include an external input interface 1001, a processor 1002, a memory 1003, and an output interface 1004 connected through a system bus.
- the external input interface 1001 can include at least a network interface 10012.
- the memory 1003 may include an external memory 10032 (eg, a hard disk, an optical disk, or a floppy disk, etc.) and an internal memory 10034.
- the output interface 1004 can include at least a device such as a display 10042.
- the operation of the method is based on a computer program, the program file (machine readable instructions) of the computer program being stored in the external memory 10032 of the aforementioned von Neumann system-based computer device, which is loaded at runtime
- the internal memory 10034 is then compiled into a machine code and then passed to the processor 1002 for execution, so that the logical target message receiving module 102, the risk determination module 104, and the first answer are formed in the von Neumann system-based computer device.
- the input parameters are received by the external input interface 1001, and transferred to the buffer in the memory 1003, and then input to the processor 1002 for processing, and the processed result data is cached in the memory 1003. Subsequent processing is performed or passed to the output interface 1004 for output.
- the network interface 10012 is configured to receive, by the processor 1002, a target message sent by the terminal of the first account to the terminal of the second account;
- the processor 1002 is configured to: when the first account or the target message is at risk, suspend forwarding of the message of the terminal of the first account to the terminal of the second account; acquiring identity verification problem information and the The first answer information corresponding to the authentication problem information;
- the network interface 10012 is further configured to: send, by the processor 1002, the identity verification question information to the terminal of the first account; and receive, by the terminal that receives the first account, a message corresponding to the identity verification problem information. Second answer message;
- the processor 1002 is further configured to: when the first answer information and the second answer information match, resume the message forwarding the terminal of the first account to the terminal of the second account.
- the processor 1002 is further configured to obtain preset identity verification problem information, where the network interface 10012 is further configured to send the identity verification question information to the second account under the control of the processor 1002.
- the terminal receives the answer information sent by the terminal of the second account and uses the answer information as the first answer information.
- the network interface 10012 is further configured to send, by the processor 1002, an identity verification question and an answer setting request to the terminal of the second account; and the terminal that receives the second account is configured for the identity verification.
- the question and answer sets the authentication question information sent by the request and the first answer information corresponding thereto.
- the processor 1002 is further configured to acquire location information of the terminal of the first account, where the location information does not match the historical location information corresponding to the first account, and determine the There is a risk in an account.
- the processor 1002 is further configured to search, in the target message, a keyword that matches a preset risk keyword, and if found, determine that the target message is at risk.
- the processor 1002 is further configured to: when the terminal of the first account does not return the second answer information corresponding to the identity verification question information within a preset duration, determine that the first account exists. risk.
- the processor 1002 is further configured to: when the first answer information and the second answer information do not match, terminate the message forwarding the terminal of the first account to the second account
- the terminal generates a risk prompt information corresponding to the first account.
- the network interface 10012 is further configured to send the risk prompt information to the terminal of the second account under the control of the processor 1002.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Power Engineering (AREA)
- Bioethics (AREA)
- Social Psychology (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本申请实施例公开了一种转发消息的方法、装置及存储介质,该方法包括:接收第一账号的终端发送给第二账号的终端的目标消息;在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
Description
本申请要求于2017年6月20日提交中国专利局、申请号为201710472364.3,申请名称为“转发消息的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及计算机技术领域,尤其涉及一种转发消息的方法、装置及存储介质。
随着互联网应用的普及和用户日常生活对互联网日渐依赖,互联网安全问题日益凸显。恶意程序、各类钓鱼和欺诈保持了高速增长,同时黑客攻击和大规模的个人信息泄露事件频发。与各种网络攻击大幅增长相伴的,是大量网民个人信息的泄露不断增加。伴随公民个人信息泄漏,网络欺诈成为众多危害之一,给人们的经济财产带来重大安全隐患和损害。如:网络关系链欺诈是不法分子基于网络社交工具,冒充受害人社交关系链中的一员与受害人进行聊天,并实施欺诈。由于聊天依托于网络,只要其与被仿冒者较为相似(如:头像、姓名、与受害者社会关系、近期社会活动等),则欺诈较容易成功,且相似度与欺诈成功率成正比,即相似度越高,欺诈越容易成功。
发明内容
本申请实施例提供了一种转发消息的方法,应用于计算机设备,包括:
接收第一账号的终端发送给第二账号的终端的目标消息;
在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;
获取身份验证问题信息和所述身份验证问题信息对应的第一答案 信息;
将所述身份验证问题信息发送给所述第一账号的终端;
接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;
在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
本申请实施例提供了一种转发消息的装置,包括:
处理器以及与所述处理器相连接的存储器,所述存储器中存储有可由所述处理器执行的机器可读指令,所述处理器执行所述机器可读指令完成以下操作:
接收第一账号的终端发送给第二账号的终端的目标消息;
在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;
获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;
将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;
在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
本申请实施例提供了一种非易失性计算机可读存储介质,所述存储介质中存储有机器可读指令,所述机器可读指令可以由处理器执行以完成以下操作:
接收第一账号的终端发送给第二账号的终端的目标消息;
在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;
获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;
将所述身份验证问题信息发送给所述第一账号的终端;
接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;
在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
其中:图1A为本申请一个实施例中一种基于聊天界面的风险提示的界面示意图;
图1B为本申请一个实施例中一种转发消息的方法的实施环境示意图;
图2为本申请一个实施例中一种转发消息的方法的流程示意图;
图3为本申请一个实施例中一种转发消息的方法中各个终端之间的交互示意图;
图4为本申请一个实施例中一种基于身份验证服务器的转发消息的方法的流程示意图;
图5为本申请一个实施例中一种转发消息的方法的流程示意图;
图6A为本申请一个实施例中一种转发消息的装置的结构示意图;
图6B为本申请一个实施例中一种转发消息的装置的结构示意图;
图7为本申请一个实施例中运行前述转发消息的方法的计算机设备的结构示意图。
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实 施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
一般地,为了保障社交平台上公民个人财产安全、承担平台应有的社会责任,各社交平台、以及即时通讯软件会在聊天中通过下发安全提示等手段,提醒用户提高警惕、核实对方身份。例如,在如图1A所示的应用场景中,在用户之间的聊天内容与预设的安全信息相关时,会展示如图1A中101所示的提示信息,以提示用户当前的聊天内容可能存在一定的风险。但是,在很多情况下,用户可能不会查看这些提示信息或者忽略这些提示信息,导致提示信息的普遍触达性不高,无法达到相应的警醒效果,也就是说,没有达到相应的提示效果,在存在风险时进行提示的有效率不足
为解决上述在用户与其他用户通过即时通讯应用或者社交网络平台进行聊天的过程中在存在风险时对用户进行提醒的有效率不足的技术问题,在本申请实施例中,提出了一种转发消息的方法,该方法的实现可依赖于计算机程序,该计算机程序可运行于基于冯诺依曼体系的计算机系统之上,该计算机程序可以是基于即时通讯应用或者社交网络平台的消息转发的应用程序。该计算机系统可以是运行上述计算机程序的例如智能手机、平板电脑、个人电脑等计算机设备。需要说明的是,在本实施例中,上述转发消息的方法的执行主体可以是基于即时通讯应用或者社交网络平台的用户与用户之间的消息转发的服务器,例如,与即时通讯应用或者社交网络平台对应的web服务器。例如,在用户通过即时通讯应用或者社交网络平台向其他用户或者用户群组发送消息时,是将需要发送的消息发送给服务器,由服务器将该消息转发给需要发送的用户或者用户群组。
图1B是本申请实施例提供的一种转发消息的方法的实施环境示意图。其中,计算机设备10集成有本申请任一实施例提供的转发消息的装置11,用于实现本申请任一实施例提供的转发消息的方法。该计算机 设备10与用户终端20之间通过网络30连接,所述网络30可以是有线网络,也可以是无线网络。在本申请实施例中,该计算机设备10可以为服务器设备。
本申请实施例提供的转发消息的方法可应用于计算机设备,如服务器。该包括如下步骤S102-S108,如图2所示。
步骤S102:接收第一账号的终端发送给第二账号的终端的目标消息。
用户在登录了即时通讯应用或者社交网络平台之后,可以通过即时通讯应用或者社交网络平台向其他用户或者社交关系链上的好友发送消息。也就是说,在用户在终端上通过即时通讯应用或者社交网络平台的网页或者客户端(APP)登录了第一账号之后,可以向其他用户终端发送消息。
需要说明的是,在本实施例中,用户可以在用户终端上通过网页或者APP登录对应的即时通讯应用或者社交网络平台,并进行消息的发送。在后续的叙述中,以用户在用户终端上下载了与即时通讯应用或者社交网络平台对应的APP为例,即用户通过安装在用户终端上的与即时通讯应用或者社交网络平台对应的APP发送消息。
在本实施例中,服务器在接收到登录了第一账号的终端发送的消息发送请求之后,获取在该消息发送请求中包含的需要发送消息的目标用户(即第二账号的终端),并获取需要发送的消息(即目标消息)。然后根据获取到的第二账号以及目标消息进行消息转发的相关操作。
需要说明的是,在本实施例中,第二账号可以是个人账号、也可以是用户账户账号(即用户群组的账号)。也就是说,第一账号的终端发送的目标消息可以是发送给某一个用户终端的,也可以是发送给某一个用户群组中所包含的所有的账号所对应的用户终端的。即,第二账号的终端的数量可以不止一个。
步骤S104:在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端。
如图1A所示,在用户之间的聊天涉及到钱财或者其他敏感信息时, 即时通讯应用或者社交网络平台对应的服务器会自动下发对应的安全提示给用户,以提示用户对对方用户的真实身份进行验证。
在本实施例中,在第一账号的终端向第二账号的终端发送目标消息时,是通过服务器进行转发的。服务器在接收到第一账号的终端发送的目标消息之后,会对目标消息进行识别,判断其中是否包含了存在风险的内容。
具体的,在本申请一个实施例中,在判断目标信息是否存在风险的过程中,可以通过在所述目标消息中查找与预设的风险关键字匹配的关键字来进行。也就是说,对目标消息中包含的文本信息中进行查找,判断其中是否存在与预设的风险关键字匹配的关键字,若存在,则确定所述目标消息存在风险,反之,则确定目标消息不存在风险。
在另一个实施例中,对目标消息所包含的文本信息进行分词处理,获取分词之后的至少一个词,然后在该至少一个词中查找是否存在与预设的风险关键字匹配的词,若查找到,则说明目标消息存在风险,反之,则说明目标消息不存在风险。例如,预设的风险关键字可以包括汇款、账号、钱等与用户的账号安全相关的关键字。再例如,在目标消息为“你可以往我的账户中打1万块钱吗?”的时候,因为关键字“账户”、“钱”而被认为该目标消息存在风险。
第一账号的终端与第二账号的终端之间存在安全风险的情况不仅包含了目标消息本身是存在风险的情况,还包括了第一账号的终端或者第二账号的终端身本存在风险,例如,运行环境存在风险,或者,所在的位置异常等。
具体的,在一个实施例中,在接收第一账号的终端发送给第二账号的终端的目标消息之后,该方法还包括:获取所述第一账号的终端的位置信息,在所述位置信息与所述第一账号对应的历史位置信息不匹配的情况下,确定所述第一账号存在风险。
在用户每次在用户终端上登录第一账号时,均获取用户当前的位置信息,例如,可以是通过用户终端的IP地址或者网络地址来获取用户所 在的城市或者区域;再或者,通过用户终端上的定位系统,获取用户终端当前所在的位置信息,并上传至服务器。也就是说,根据第一账号登录的历史数据中包含的位置信息,来判断第一账号当前所在的位置对应的位置信息是否与历史数据相匹配,也就是说,判断第一账号的终端当前所在的位置是否为历史数据中已存在的某一个位置。
具体的,在第一账号在用户终端上登录的过程中获取第一账号的终端的位置信息,或者,在第一账号的终端发送目标消息之前获取第一账号的终端的位置信息,并在将目标消息发送给服务器时将该位置信息一并发送给服务器。
如果第一账号的终端的位置信息与第一账号对应的历史位置信息是不匹配的情况下,说明第一账号可能被其他用户盗号等,因此存在安全风险,即第一账号存在风险;反之,在第一账号的终端的位置信息与第一账号对应的历史位置信息是匹配的情况下,确定第一账号不存在风险。
在本实施例中,如果第一账号存在风险或者目标消息存在风险,在此种情况下,如果继续进行目标消息的转发,可能造成一定的安全隐患。具体的,如果第一账号存在风险或者目标消息存在风险,则对于第一账号的终端与第二账号的终端之间的消息的发送应当停止,也就是说,在此种情况下应当阻断第一账号的终端与第二账号的终端之间的消息的发送,直至确认当前不存在风险或者风险解除。
需要说明的是,在本实施例中,只要存在可能对用户的信息安全、账户安全等造成影响的安全风险,均应当暂停第一账号的终端与第二账号的终端之间的消息的发送。并且,对于所有的被判定为存在风险的各种情况,只要满足其中一种情况均被认为是存在风险。例如,在第一账号存在风险、或者目标消息存在风险、或者第一账号以及目标消息均存在风险的情况下,均暂停转发第一账号的终端的消息至第二账号的终端。
步骤S106:获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息。
步骤S108:将所述身份验证问题信息发送给所述第一账号的终端。
步骤S110:接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息。
需要说明的是,在本实施例中,在第一账号的终端与第二账号的终端之间的消息发送存在风险的情况下,需要对第一账号对应的用户身份进行验证。与以往的基于预设问题-答案数据库(即预先设置了隐私问题和参考答案)进行身份验证的方案不同,在本实施例中,第一账号对应的用户和第二账号对应的用户需要对同一个问题给出答案,即不依赖于问题-答案数据库,不需要预先建立问题与参考答案一一对应的数据库。例如,第一账号对应的用户与第二账号对应的用户均需要针对身份验证问题“张某某的电话号码是多少?”给出答案并返回给服务器,由服务器对答案进行验证。
具体的,在本申请一个实施例中,服务器可以从预设的问题数据库中随机选择一个身份验证问题作为本实施例中用户对风险进行评估的问题。例如,问题数据库中设置了常用于身份验证的至少一个问题,在本步骤中,服务器从该至少一个问题中选择一个作为本方法的身份验证问题。
在本申请另一个实施例中,身份验证问题的设置还可以是由第二账号对应的用户进行设置的。例如,服务器将可以选择的至少一个问题对应的列表发送给第二账号的终端,由第二账号对应的用户通过第二账号的终端从该列表中选择身份验证问题,并返回给服务器。再例如,在需要确定身份验证问题时,发送身份验证问题设置对应的请求给第二账号对应的终端,由第二账号对应的用户通过第二账号对应的终端输入身份验证问题,并将输入的身份验证问题返回给服务器,从而使得服务器可以获取身份验证问题。
在本实施例中,目标消息的接收方(即第二账号的终端)针对身份验证问题给出的答案信息为第一答案信息,目标消息的发送方(即第一账号的终端)针对身份验证问题给出的答案为第二答案信息。
需要说明的是,在本实施例中,第一答案信息的获取时间会根据身份验证问题的设置时间不同而出现不同。
例如,在身份验证问题是服务器设置的情况下,在步骤S104之后,在服务器确定了进行风险确认的身份验证问题之后,将身份验证问题信息分别发送给第一账号的终端以及第二账号的终端,然后对应的用户可以给出针对接收到的身份验证问题的答案信息。
具体的,获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息为:获取预设的身份验证问题信息,将所述身份验证问题信息发送给所述第二账号的终端,接收所述第二账号的终端发送的答案信息并将该答案信息作为第一答案信息。并且,在步骤S108-S110中,将所述身份验证问题信息发送给所述第一账号的终端,并接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息。
也就是说,身份验证问题是服务器确定的,然后由服务器将确定的身份验证问题分别发送给第一账号的终端以及第二账号的终端,并且,接收第一账号的终端返回的第二答案信息以及第二账号的终端返回的第一答案信息。
在另一个实施例中,身份验证问题还可以是第二账号的终端设置的。具体的,所述获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息为:向所述第二账号的终端发送身份验证问题和答案设置请求;接收所述第二账号的终端针对所述身份验证问题和答案设置请求发送的身份验证问题信息以及与该身份验证问题信息对应的第一答案信息。
也就是说,在需要确定身份验证问题时,服务器向第二账号的终端发送与身份验证问题对应的请求,即身份验证问题和答案设置请求。第二账号的终端在接收到该请求之后,在终端的显示界面上展示预设的身份验证问题以及答案设置的相关界面,然后用户可以通过该界面输入身份验证问题或者选择身份验证问题。
需要说明的是,在本实施例中,第二账号的终端在设置身份验证问 题的过程中,可以是自由对身份验证问题进行设置(即输入与身份验证问题对应的文本信息),也可以是在服务器给出的预设的不止一个可选的身份验证问题中选择身份验证问题。
在用户通过第二账号的终端设置身份验证问题的情况下,第二账号对应的用户还需要一并给出设置的身份验证问题的答案,即第一答案信息,并将第一答案信息与设置的身份验证问题一并发送给服务器。
在服务器接收到第二账号的终端发送的身份验证问题以及第一答案信息之后,将身份验证信息发送给第一账号的终端,以使第一账号的终端可以展示该身份验证问题,从而使得第一账号对应的用户可以通过展示身份验证问题的界面或者窗口输入与身份验证问题对应的答案信息,即第二答案信息,并在输入完成之后将第二答案信息返回给服务器。
需要说明的是,在本实施例中,还可以对第一账号的终端针对身份验证问题给出答案信息的限时,也就是说,限定第一账号的终端需在预设的时长范围之内给出身份验证问题的答案信息。
具体的,所述将所述身份验证问题信息发送给所述第一账号的终端之后,该方法还包括:在所述第一账号的终端未在预设的时长内返回与所述身份验证问题信息对应的第二答案信息的情况下,确定第一账号存在风险。
也就是说,在将身份验证问题发送给第一账号的终端之后,启动与预设的时长对应的定时器,在定时器被唤醒时,如果第一账号的终端还未针对身份验证问题给出答案信息,则判定第一账号存在风险。也就是说,避免了在第一账号被盗号或者欺诈等情况下,第一账号对应的用户可以通过网络查找得到与身份验证问题对应的答案信息,进一步的提高身份验证的可靠性。
步骤S112:判断所述第一答案信息和所述第二答案信息是否匹配,若匹配,则执行步骤S114:恢复转发所述第一账号的终端的消息至所述第二账号的终端;若不匹配,则执行步骤S116:终止转发所述第一账号的终端的消息至所述第二账号的终端,并生成与第一账号对应的风险提 示信息并将该风险提示信息发送给所述第二账号的终端。
在本实施例中,对第一账号的终端与第二账号的终端之间的消息发送是否存在风险是通过第一账号的终端以及第二账号的终端针对同一个身份验证问题给出各自的答案,然后判断第一账号的终端以及第二账号的终端各自给出的答案之间是否是匹配的来进行判断的。也就是说,如果第一账号的终端给出的答案与第二账号给出的答案是一样的,则说明当前情况下第一账号对应的用户与第二账号对应的用户之间是认识的,并不是其他人假冒的。
具体实施例中,即对第二账号对应的第一答案信息和第一账号对应的第二答案信息之间进行匹配,若是匹配的,则说明当前第一账号的终端与第二账号的终端之间的消息发送不存在风险,可以继续正常进行消息的发送;反之,若第一答案信息与第二答案信息之间不匹配,则说明当前第一账号的终端与第二账号的终端之间的消息发送存在风险,即第一账号可能被盗号或者假冒,因此,应当阻断二者之间的消息的发送。
具体的,在第一答案信息与第二答案信息之间是匹配的情况下,将步骤S104中暂停的转发所述第一账号的终端的消息至所述第二账号的终端进行恢复,即恢复转发所述第一账号的终端的消息至所述第二账号的终端。在第一答案信息与第二答案信息之间是不匹配的情况下,阻断第一账号的终端与第二账号的终端之间的消息的发送,即终止转发所述第一账号的终端的消息至所述第二账号的终端。
需要说明的是,在本实施例中,在第一账号的终端发送目标消息给第二账号的终端存在风险的情况下,不仅需要阻断消息的发送,还需要将相应的安全风险告知给第二账号的终端,即在第一答案信息与第二答案信息之间是不匹配的情况下,生成与第一账号对应的风险提示信息并将该风险提示信息发送给所述第二账号的终端。
如图3所示,图3展示了第一账号的终端、第二账号的终端以及服务器之间的交互关系。
以第一账号或目标消息存在风险、且后续的身份验证通过的情况为 例进行说明,用户通过第一账号的终端向服务器发送目标消息以及目标消息的接收方(第二账号的终端)所对应的账号标识,服务器在接收到目标消息和第二账号标识之后,通过对第一账号以及目标消息进行检测,确定当前的第一账号或者目标消息是否存在欺诈、假冒或者其他风险。并且,在存在风险的情况下,服务器向第二账号的终端请求身份验证问题以及第一答案信息,第二账号的终端响应该请求向服务器返回身份验证问题以及第一答案信息。然后服务器将身份验证问题发送给第一账号的终端,并接收第一账号的终端返回的第二答案信息。然后服务器对第一答案信息和第二答案信息进行比对,判断二者是否匹配,在匹配的情况下,服务器将之前接收到的第一账号的终端发送给第二账号的终端的目标消息发送给第二账号的终端。
在另一个实施例中,转发第一账号的终端与第二账号的终端之间的消息的服务器为与即时通信应用或者社交网络平台对应的web服务器,而进行身份验证的服务器可以是另外一个服务器,也可以是web服务器中的一个独立的用于身份验证的模块。
图4为本申请一个实施例中一种基于身份验证服务器的转发消息的方法的流程示意图。图4以进行身份验证的是独立于web服务器的身份验证服务器为例,其中web服务器与身份验证服务器之间可以进行通讯,例如,在web服务器检测到当前的消息发送存在风险的情况下,通知身份验证服务器确定身份验证问题并获取第一账号的终端以及第二账号的终端针对身份验证问题给出的答案信息,然后由身份验证服务器对第一账号的终端以及第二账号的终端针对身份验证问题给出的答案信息进行验证,在验证通过的情况下,通知web服务器将第一账号的终端发送给第二账号的终端的消息发送给第二账号的终端;在验证不通过的情况下,阻断第一账号的终端与第二账号的终端之间的消息的发送,并下发安全提示信息给第二账号的终端。
图5为本申请一个实施例中一种转发消息的方法的流程示意图。如图5所示,该方法可包括如下步骤。
步骤S501:聊天双方发起聊天。
步骤S502:服务器判断是否为疑似欺诈聊天场景。如是,则执行步骤S503;如否,则执行步骤S507。
步骤S503:服务器阻断聊天。
步骤S504:服务器向聊天双方下发双向身份验证。即服务器向聊天双方发送同一个身份验证问题。
步骤S505:服务器判断聊天双方针对该身份验证问题返回的结果(即答案)是否一致。如一致,则执行步骤S507;如不一致,则执行步骤S506。
步骤S506:向消息接收方返回验证结果,结束聊天。
步骤S507:服务器正常转发聊天双方之间的聊天消息。
此外,为解决传统技术中的在用户与其他用户通过即时通讯应用或者社交网络平台进行聊天的过程中在存在风险时对用户进行提醒的有效率不足的技术问题,在本申请一个实施例中,如图6A所示,还提出了一种转发消息的装置,包括目标消息接收模块102、风险判定模块104、第一答案信息获取模块106、第二答案信息获取模块108、答案信息比对模块110,其中:
目标消息接收模块102,用于接收第一账号的终端发送给第二账号的终端的目标消息;
风险判定模块104,用于在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;
第一答案信息获取模块106,用于获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;
第二答案信息获取模块108,用于将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;
答案信息比对模块110,用于在所述第一答案信息和所述第二答案 信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
在一个实施例中,第一答案信息获取模块106还用于获取预设的身份验证问题信息,将所述身份验证问题信息发送给所述第二账号的终端,接收所述第二账号的终端发送的答案信息并将该答案信息作为第一答案信息。
在一个实施例中,第一答案信息获取模块106还用于向所述第二账号的终端发送身份验证问题和答案设置请求;接收所述第二账号的终端针对所述身份验证问题和答案设置请求发送的身份验证问题信息以及与所述身份验证问题信息对应的第一答案信息。
在一个实施例中,风险判定模块104还用于获取所述第一账号的终端的位置信息,在所述位置信息与所述第一账号对应的历史位置信息不匹配的情况下,确定所述第一账号存在风险。
在一个实施例中,风险判定模块104还用于在所述目标消息中查找与预设的风险关键字匹配的关键字,在查找到的情况下,确定所述目标消息存在风险。
在一个实施例中,风险判定模块104还用于在所述第一账号的终端未在预设的时长内返回与所述身份验证问题信息对应的第二答案信息的情况下,确定第一账号存在风险。
在一个实施例中,如图6B所示,上述装置还包括风险提示模块112,用于在所述第一答案信息和所述第二答案信息不匹配的情况下,终止转发所述第一账号的终端的消息至所述第二账号的终端;生成与第一账号对应的风险提示信息并将所述风险提示信息发送给所述第二账号的终端。
采用了上述本申请实施例提供的转发消息的方法和装置之后,在第一账号的终端通过服务器向第二账号的终端发送消息时,如果检测到第一账号或者发送的消息存在风险,服务器会暂停转发第一账号的终端发 送给第二账号的消息,并通过服务器向第一账号的终端以及第二账号的终端请求针对同一个身份验证问题的答案信息,并对第一账号的终端以及第二账号的终端各自给出的答案信息进行比对,在二者匹配的情况下,确定不存在风险,恢复转发第一账号的终端发送给第二账号的消息,反之,在二者不匹配的情况下,确定存在风险,并阻断第一账号的终端与第二账号的终端之间的消息的发送,向第二账号的终端发送安全提示消息。也就是说,采用了上述转发消息的方法及装置之后,在用户之间的消息的发送存在风险的情况下,实时的对聊天双方进行身份验证,提高了身份验证的可靠性和消息转发的安全性,保证了在存在安全风险的情况下对用户进行安全提示的有效性。而且,在聊天的过程中对聊天双方进行双向身份验证也提高了计算设备的处理能力。
在上述实施例中,可以全部或部分的通过软件、硬件、固件或者其任意组合来实现。当使用软件程序实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在非易失性计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或者数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或者数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或半导体介质(例如固态硬盘Solid State Disk(SSD))等。
在一个实施例中,如图7所示,图7展示了一种运行上述转发消息 的方法的基于冯诺依曼体系的计算机设备。该计算机设备可以是智能手机、平板电脑、掌上电脑、笔记本电脑或个人电脑等终端设备或服务器设备。具体的,该计算机设备可包括通过系统总线连接的外部输入接口1001、处理器1002、存储器1003和输出接口1004。其中,外部输入接口1001可至少包括网络接口10012。存储器1003可包括外存储器10032(例如硬盘、光盘或软盘等)和内存储器10034。输出接口1004可至少包括显示屏10042等设备。
在本实施例中,本方法的运行基于计算机程序,该计算机程序的程序文件(机器可读指令)存储于前述基于冯诺依曼体系的计算机设备的外存储器10032中,在运行时被加载到内存储器10034中,然后被编译为机器码之后传递至处理器1002中执行,从而使得基于冯诺依曼体系的计算机设备中形成逻辑上的目标消息接收模块102、风险判定模块104、第一答案信息获取模块106、第二答案信息获取模块108、答案信息比对模块110以及风险提示模块112。且在上述转发消息的方法执行过程中,输入的参数均通过外部输入接口1001接收,并传递至存储器1003中缓存,然后输入到处理器1002中进行处理,处理的结果数据或缓存于存储器1003中进行后续地处理,或被传递至输出接口1004进行输出。
具体的,网络接口10012用于在处理器1002的控制下,接收第一账号的终端发送给第二账号的终端的目标消息;
处理器1002用于在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;
网络接口10012还用于在处理器1002的控制下,将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;
处理器1002还用于在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
在一个实施例中,处理器1002还用于获取预设的身份验证问题信 息,网络接口10012还用于在处理器1002的控制下,将所述身份验证问题信息发送给所述第二账号的终端,接收所述第二账号的终端发送的答案信息并将该答案信息作为第一答案信息。
在一个实施例中,网络接口10012还用于在处理器1002的控制下,向所述第二账号的终端发送身份验证问题和答案设置请求;接收所述第二账号的终端针对所述身份验证问题和答案设置请求发送的身份验证问题信息以及与之对应的第一答案信息。
在一个实施例中,处理器1002还用于获取所述第一账号的终端的位置信息,在所述位置信息与所述第一账号对应的历史位置信息不匹配的情况下,确定所述第一账号存在风险。
在一个实施例中,处理器1002还用于在所述目标消息中查找与预设的风险关键字匹配的关键字,在查找到的情况下,确定所述目标消息存在风险。
在一个实施例中,处理器1002还用于在所述第一账号的终端未在预设的时长内返回与所述身份验证问题信息对应的第二答案信息的情况下,确定第一账号存在风险。
在一个实施例中,处理器1002还用于在所述第一答案信息和所述第二答案信息不匹配的情况下,终止转发所述第一账号的终端的消息至所述第二账号的终端;生成与第一账号对应的风险提示信息;网络接口10012还用于在处理器1002的控制下,将所述风险提示信息发送给所述第二账号的终端。
以上所揭露的仅为本申请较佳实施例而已,当然不能以此来限定本申请之权利范围,因此依本申请权利要求所作的等同变化,仍属本申请实施例所涵盖的范围。
Claims (21)
- 一种转发消息的方法,应用于计算机设备,包括:接收第一账号的终端发送给第二账号的终端的目标消息;在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
- 根据权利要求1所述的方法,所述获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息为:获取预设的身份验证问题信息,将所述身份验证问题信息发送给所述第二账号的终端,接收所述第二账号的终端发送的答案信息并将该答案信息作为第一答案信息。
- 根据权利要求1所述的方法,所述获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息为:向所述第二账号的终端发送身份验证问题和答案设置请求;接收所述第二账号的终端针对所述身份验证问题和答案设置请求发送的身份验证问题信息以及与所述身份验证问题信息对应的第一答案信息。
- 根据权利要求1所述的方法,在所述接收第一账号的终端发送给第二账号的终端的目标消息之后,还包括:获取所述第一账号的终端的位置信息,在所述位置信息与所述第一账号对应的历史位置信息不匹配的情况下,确定所述第一账号存在风险。
- 根据权利要求1所述的方法,在所述接收第一账号的终端发送给第二账号的终端的目标消息之后,还包括:在所述目标消息中查找与预设的风险关键字匹配的关键字,在查找到的情况下,确定所述目标消息存在风险。
- 根据权利要求1所述的方法,在所述将所述身份验证问题信息发送给所述第一账号的终端之后,还包括:在所述第一账号的终端未在预设的时长内返回与所述身份验证问题信息对应的第二答案信息的情况下,确定第一账号存在风险。
- 根据权利要求1所述的方法,在所述接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息之后,还包括:在所述第一答案信息和所述第二答案信息不匹配的情况下,终止转发所述第一账号的终端的消息至所述第二账号的终端;生成与第一账号对应的风险提示信息并将所述风险提示信息发送给所述第二账号的终端。
- 一种转发消息的装置,包括:处理器以及与所述处理器相连接的存储器,所述存储器中存储有可由所述处理器执行的机器可读指令,所述处理器执行所述机器可读指令完成以下操作:接收第一账号的终端发送给第二账号的终端的目标消息;在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;获取身份验证问题信息和所述身份验证问题信息对应的第一答案 信息;将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
- 根据权利要求8所述的装置,所述处理器执行所述机器可读指令完成以下操作:获取预设的身份验证问题信息,将所述身份验证问题信息发送给所述第二账号的终端,接收所述第二账号的终端发送的答案信息并将该答案信息作为第一答案信息。
- 根据权利要求8所述的装置,所述处理器执行所述机器可读指令完成以下操作:向所述第二账号的终端发送身份验证问题和答案设置请求;接收所述第二账号的终端针对所述身份验证问题和答案设置请求发送的身份验证问题信息以及与所述身份验证问题信息对应的第一答案信息。
- 根据权利要求8所述的装置,所述处理器执行所述机器可读指令完成以下操作:获取所述第一账号的终端的位置信息,在所述位置信息与所述第一账号对应的历史位置信息不匹配的情况下,确定所述第一账号存在风险。
- 根据权利要求8所述的装置,所述处理器执行所述机器可读指令完成以下操作:在所述目标消息中查找与预设的风险关键字匹配的关键字,在查找到的情况下,确定所述目标消息存在风险。
- 根据权利要求8所述的装置,所述处理器执行所述机器可读指令完成以下操作:在所述第一账号的终端未在预设的时长内返回与所述身份验证问题信息对应的第二答案信息的情况下,确定第一账号存在风险。
- 根据权利要求8所述的装置,所述处理器执行所述机器可读指令完成以下操作:在所述第一答案信息和所述第二答案信息不匹配的情况下,终止转发所述第一账号的终端的消息至所述第二账号的终端;生成与第一账号对应的风险提示信息并将所述风险提示信息发送给所述第二账号的终端。
- 一种非易失性计算机可读存储介质,所述存储介质中存储有机器可读指令,所述机器可读指令可以由处理器执行以完成以下操作:接收第一账号的终端发送给第二账号的终端的目标消息;在所述第一账号或所述目标消息存在风险的情况下,暂停转发所述第一账号的终端的消息至所述第二账号的终端;获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息;将所述身份验证问题信息发送给所述第一账号的终端;接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息;在所述第一答案信息和所述第二答案信息匹配的情况下,恢复转发所述第一账号的终端的消息至所述第二账号的终端。
- 根据权利要求15所述的非易失性计算机可读存储介质,所述 获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息为:获取预设的身份验证问题信息,将所述身份验证问题信息发送给所述第二账号的终端,接收所述第二账号的终端发送的答案信息并将该答案信息作为第一答案信息。
- 根据权利要求15所述的非易失性计算机可读存储介质,所述获取身份验证问题信息和所述身份验证问题信息对应的第一答案信息为:向所述第二账号的终端发送身份验证问题和答案设置请求;接收所述第二账号的终端针对所述身份验证问题和答案设置请求发送的身份验证问题信息以及与所述身份验证问题信息对应的第一答案信息。
- 根据权利要求15所述的非易失性计算机可读存储介质,在所述接收第一账号的终端发送给第二账号的终端的目标消息之后,还包括:获取所述第一账号的终端的位置信息,在所述位置信息与所述第一账号对应的历史位置信息不匹配的情况下,确定所述第一账号存在风险。
- 根据权利要求15所述的非易失性计算机可读存储介质,在所述接收第一账号的终端发送给第二账号的终端的目标消息之后,还包括:在所述目标消息中查找与预设的风险关键字匹配的关键字,在查找到的情况下,确定所述目标消息存在风险。
- 根据权利要求15所述的非易失性计算机可读存储介质,在所述将所述身份验证问题信息发送给所述第一账号的终端之后,还包括:在所述第一账号的终端未在预设的时长内返回与所述身份验证问题信息对应的第二答案信息的情况下,确定第一账号存在风险。
- 根据权利要求15所述的非易失性计算机可读存储介质,在所述接收所述第一账号的终端返回的与所述身份验证问题信息对应的第二答案信息之后,还包括:在所述第一答案信息和所述第二答案信息不匹配的情况下,终止转发所述第一账号的终端的消息至所述第二账号的终端;生成与第一账号对应的风险提示信息并将所述风险提示信息发送给所述第二账号的终端。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18820580.1A EP3644551B1 (en) | 2017-06-20 | 2018-05-18 | Method and device for forwarding message, and storage medium |
US16/373,302 US10834080B2 (en) | 2017-06-20 | 2019-04-02 | Method, device and storage medium for forwarding messages |
US17/063,615 US11363020B2 (en) | 2017-06-20 | 2020-10-05 | Method, device and storage medium for forwarding messages |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710472364.3 | 2017-06-20 | ||
CN201710472364.3A CN109104280B (zh) | 2017-06-20 | 2017-06-20 | 转发消息的方法及装置 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/373,302 Continuation US10834080B2 (en) | 2017-06-20 | 2019-04-02 | Method, device and storage medium for forwarding messages |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018233418A1 true WO2018233418A1 (zh) | 2018-12-27 |
Family
ID=64735488
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/087492 WO2018233418A1 (zh) | 2017-06-20 | 2018-05-18 | 转发消息的方法、装置及存储介质 |
Country Status (5)
Country | Link |
---|---|
US (2) | US10834080B2 (zh) |
EP (1) | EP3644551B1 (zh) |
CN (1) | CN109104280B (zh) |
MA (1) | MA49470A (zh) |
WO (1) | WO2018233418A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113726836A (zh) * | 2020-11-16 | 2021-11-30 | 北京沃东天骏信息技术有限公司 | 信息应答方法、装置、设备和计算机可读介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090178120A1 (en) * | 2008-01-08 | 2009-07-09 | First Data Corporation | Electronic verification service systems and methods |
CN104468249A (zh) * | 2013-09-17 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | 一种账号异常的检测方法及装置 |
CN104660481A (zh) * | 2013-11-18 | 2015-05-27 | 深圳市腾讯计算机系统有限公司 | 即时通讯消息处理方法及装置 |
Family Cites Families (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7039949B2 (en) * | 2001-12-10 | 2006-05-02 | Brian Ross Cartmell | Method and system for blocking unwanted communications |
US7200635B2 (en) * | 2002-01-09 | 2007-04-03 | International Business Machines Corporation | Smart messenger |
US20080196099A1 (en) * | 2002-06-10 | 2008-08-14 | Akonix Systems, Inc. | Systems and methods for detecting and blocking malicious content in instant messages |
US9191215B2 (en) * | 2003-12-30 | 2015-11-17 | Entrust, Inc. | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques |
US7650383B2 (en) * | 2005-03-15 | 2010-01-19 | Aol Llc | Electronic message system with federation of trusted senders |
JP4601470B2 (ja) * | 2005-03-18 | 2010-12-22 | 富士通株式会社 | 電子メール転送方法及び装置 |
US7647381B2 (en) * | 2005-04-04 | 2010-01-12 | Aol Llc | Federated challenge credit system |
US20070033256A1 (en) * | 2005-07-12 | 2007-02-08 | Yuval Ben-Itzhak | System and method for the prevention of unsolicited calls and contacts |
US20070088793A1 (en) * | 2005-10-17 | 2007-04-19 | Landsman Richard A | Filter for instant messaging |
US20070101010A1 (en) * | 2005-11-01 | 2007-05-03 | Microsoft Corporation | Human interactive proof with authentication |
US20070130462A1 (en) * | 2005-12-06 | 2007-06-07 | Law Eric C W | Asynchronous encryption for secured electronic communications |
US7917757B2 (en) * | 2006-02-09 | 2011-03-29 | California Institute Of Technology | Method and system for authentication of electronic communications |
US20080034216A1 (en) * | 2006-08-03 | 2008-02-07 | Eric Chun Wah Law | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords |
US8515847B2 (en) * | 2006-10-31 | 2013-08-20 | Microfolio Data, Llc | System and method for password-free access for validated users |
KR100867940B1 (ko) * | 2006-12-28 | 2008-11-18 | 주식회사 누리비젼 | 스팸메일 차단 방법 |
US8474022B2 (en) * | 2007-06-15 | 2013-06-25 | Microsoft Corporation | Self-service credential management |
US8650399B2 (en) * | 2008-02-29 | 2014-02-11 | Spansion Llc | Memory device and chip set processor pairing |
US9002922B2 (en) * | 2008-05-15 | 2015-04-07 | Kota Enterprises, Llc | Question server to facilitate communication between participants |
US8621585B2 (en) * | 2009-06-16 | 2013-12-31 | Z2Live, Inc. | Invitation service for multi-device application sessions |
CA2698087C (en) * | 2010-04-13 | 2011-09-13 | Nachum Gal | Method and system for filtering electronic messages |
US9348981B1 (en) * | 2011-01-23 | 2016-05-24 | Google Inc. | System and method for generating user authentication challenges |
CN103702725B (zh) * | 2011-02-01 | 2016-10-12 | 诺基亚技术有限公司 | 用于多方captcha的方法和设备 |
US8752172B1 (en) * | 2011-06-27 | 2014-06-10 | Emc Corporation | Processing email messages based on authenticity analysis |
US8769286B2 (en) * | 2011-09-20 | 2014-07-01 | Daon Holdings Limited | Methods and systems for increasing the security of electronic messages |
US8886925B2 (en) * | 2011-10-11 | 2014-11-11 | Citrix Systems, Inc. | Protecting enterprise data through policy-based encryption of message attachments |
IN2014MN00977A (zh) * | 2011-10-25 | 2015-05-22 | Isi Corp | |
US10084732B1 (en) * | 2011-12-02 | 2018-09-25 | Google Llc | Ranking to determine relevance of social connections |
US8595808B2 (en) * | 2011-12-16 | 2013-11-26 | Daon Holdings Limited | Methods and systems for increasing the security of network-based transactions |
US20150149775A1 (en) * | 2012-09-02 | 2015-05-28 | POWA Technologies (Hong Kong) Limited | Method and System of Secure Email |
KR101907041B1 (ko) * | 2012-12-17 | 2018-10-11 | 한국전자통신연구원 | 소셜 웹 콘텐츠에서의 예측 기반 리스크 관리 장치 및 그 방법 |
US9866391B1 (en) * | 2013-01-30 | 2018-01-09 | Amazon Technologies, Inc. | Permissions based communication |
WO2014178217A1 (ja) * | 2013-04-30 | 2014-11-06 | ソニー株式会社 | 情報処理装置、無線通信システム、情報処理方法、及びプログラム |
CN104184709A (zh) * | 2013-05-23 | 2014-12-03 | 腾讯科技(深圳)有限公司 | 验证方法、装置、服务器、业务数据中心和系统 |
GB2518392A (en) * | 2013-09-19 | 2015-03-25 | Visa Europe Ltd | Account association systems and methods |
KR101744747B1 (ko) * | 2013-11-22 | 2017-06-09 | 한국전자통신연구원 | 휴대 단말기, 단말기 및 보안쿠키를 이용한 인증 방법 |
US9756007B1 (en) * | 2013-12-18 | 2017-09-05 | Symantec Corporation | Systems and methods for detecting compromised messaging accounts |
US9396332B2 (en) * | 2014-05-21 | 2016-07-19 | Microsoft Technology Licensing, Llc | Risk assessment modeling |
CN105323219B (zh) * | 2014-07-01 | 2020-06-16 | 腾讯科技(深圳)有限公司 | 验证用户帐号身份信息的方法及装置 |
DE102014222222A1 (de) * | 2014-10-30 | 2016-05-04 | Robert Bosch Gmbh | Verfahren zur Absicherung eines Netzwerks |
US9762591B2 (en) * | 2014-12-27 | 2017-09-12 | Mcafee, Inc. | Message sender authenticity validation |
EP3241136B1 (en) * | 2014-12-30 | 2020-07-29 | OneSpan International GmbH | User authentication based on personal access history |
CN106161183B (zh) * | 2015-03-30 | 2019-10-22 | 重庆邮电大学 | 消息交互方法和社交服务器及通信系统 |
US10140600B2 (en) * | 2015-07-01 | 2018-11-27 | Liveensure, Inc. | System and method for mobile peer authentication and asset control |
US10616196B1 (en) * | 2015-09-24 | 2020-04-07 | EMC IP Holding Company LLC | User authentication with multiple authentication sources and non-binary authentication decisions |
CN105516133B (zh) * | 2015-12-08 | 2019-12-13 | 腾讯科技(深圳)有限公司 | 用户身份的验证方法、服务器及客户端 |
US10721195B2 (en) * | 2016-01-26 | 2020-07-21 | ZapFraud, Inc. | Detection of business email compromise |
US11449785B2 (en) * | 2016-02-24 | 2022-09-20 | Line Corporation | Method and system for artificial intelligence learning using messaging service and method and system for relaying answer using artificial intelligence |
US10097528B2 (en) * | 2016-02-27 | 2018-10-09 | Ncr Corporation | Non-repeatable challenge-response authentication |
US20170331818A1 (en) * | 2016-05-13 | 2017-11-16 | Symantec Corporation | Systems and methods for location-restricting one-time passcodes |
US9703775B1 (en) * | 2016-08-16 | 2017-07-11 | Facebook, Inc. | Crowdsourcing translations on online social networks |
US11048821B1 (en) * | 2016-09-09 | 2021-06-29 | eEmerger.biz, LLC | Hosted server system and method for intermediating anonymous firm matching and exit strategy negotiations |
CN106332054B (zh) * | 2016-10-20 | 2018-03-27 | 广东欧珀移动通信有限公司 | 数据迁移身份验证的方法及装置 |
US10715543B2 (en) * | 2016-11-30 | 2020-07-14 | Agari Data, Inc. | Detecting computer security risk based on previously observed communications |
-
2017
- 2017-06-20 CN CN201710472364.3A patent/CN109104280B/zh active Active
-
2018
- 2018-05-18 MA MA049470A patent/MA49470A/fr unknown
- 2018-05-18 EP EP18820580.1A patent/EP3644551B1/en active Active
- 2018-05-18 WO PCT/CN2018/087492 patent/WO2018233418A1/zh unknown
-
2019
- 2019-04-02 US US16/373,302 patent/US10834080B2/en active Active
-
2020
- 2020-10-05 US US17/063,615 patent/US11363020B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090178120A1 (en) * | 2008-01-08 | 2009-07-09 | First Data Corporation | Electronic verification service systems and methods |
CN104468249A (zh) * | 2013-09-17 | 2015-03-25 | 深圳市腾讯计算机系统有限公司 | 一种账号异常的检测方法及装置 |
CN104660481A (zh) * | 2013-11-18 | 2015-05-27 | 深圳市腾讯计算机系统有限公司 | 即时通讯消息处理方法及装置 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3644551A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP3644551B1 (en) | 2024-07-31 |
US10834080B2 (en) | 2020-11-10 |
CN109104280A (zh) | 2018-12-28 |
EP3644551A1 (en) | 2020-04-29 |
MA49470A (fr) | 2020-04-29 |
CN109104280B (zh) | 2021-09-28 |
US11363020B2 (en) | 2022-06-14 |
US20210021596A1 (en) | 2021-01-21 |
US20190230078A1 (en) | 2019-07-25 |
EP3644551A4 (en) | 2021-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10554655B2 (en) | Method and system for verifying an account operation | |
US10594696B2 (en) | Network-based authentication and security services | |
CN107135073B (zh) | 接口调用方法和装置 | |
US8601602B1 (en) | Enhanced multi-factor authentication | |
US10726111B2 (en) | Increased security using dynamic watermarking | |
US20140380478A1 (en) | User centric fraud detection | |
US20160267290A1 (en) | Information viewing method, device, system and storage medium | |
US10659453B2 (en) | Dual channel identity authentication | |
US20210099431A1 (en) | Synthetic identity and network egress for user privacy | |
US20210158360A1 (en) | Systems, methods and computer program products for securing electronic transactions | |
TWI611359B (zh) | 即時通信消息的傳輸方法、系統及設備 | |
TW201411402A (zh) | 同步多個電子裝置中之使用者帳戶之控制代碼 | |
WO2017088548A1 (zh) | 基于社交身份的通信方法及服务器 | |
US20150067772A1 (en) | Apparatus, method and computer-readable storage medium for providing notification of login from new device | |
WO2017190436A1 (zh) | 一种数据处理方法及装置 | |
US9338112B2 (en) | Safety protocols for messaging service-enabled cloud services | |
US11363020B2 (en) | Method, device and storage medium for forwarding messages | |
US11888889B2 (en) | Securing against network vulnerabilities | |
KR20150104667A (ko) | 인증 방법 | |
US12008105B2 (en) | Protected QR code scanner using operational system override | |
US12062055B2 (en) | Systems and methods for increasing data security in social media online platforms | |
US20170279810A1 (en) | Method of, and apparatus for, secure online electronic communication | |
US20240205338A1 (en) | Transferring an authentication state from a digital channel to an agent channel | |
WO2018232660A1 (zh) | 一种移动终端信息发布方法和移动终端 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18820580 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018820580 Country of ref document: EP Effective date: 20200120 |