WO2019144756A1 - 验证短信的处理方法及系统 - Google Patents
验证短信的处理方法及系统 Download PDFInfo
- Publication number
- WO2019144756A1 WO2019144756A1 PCT/CN2018/124338 CN2018124338W WO2019144756A1 WO 2019144756 A1 WO2019144756 A1 WO 2019144756A1 CN 2018124338 W CN2018124338 W CN 2018124338W WO 2019144756 A1 WO2019144756 A1 WO 2019144756A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- short message
- verification
- keyword
- local server
- preset
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
- G06F40/284—Lexical analysis, e.g. tokenisation or collocates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
- G06F18/2411—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/547—Remote procedure calls [RPC]; Web services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/20—Image preprocessing
- G06V10/30—Noise filtering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
- G06V30/14—Image acquisition
- G06V30/148—Segmentation of character regions
- G06V30/153—Segmentation of character regions using recognition of characters or words
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Definitions
- the present application belongs to the field of Internet technologies, and in particular, to a method and system for processing a verification short message.
- the prior art has a problem of low operational efficiency and poor convenience due to the existence of the verification code in the multi-server function invocation process.
- a first aspect of the embodiment of the present application provides a method for processing a verification short message, including:
- the local server receives the instruction input by the user, and records the time of the instruction input; the local server sends the request message to the remote server according to the instruction, to control the remote server to send the verification short message to the terminal device; the terminal device is receiving Determining whether the short message is the verification short message when the short message is sent; if the short message is the verification short message, the terminal device forwards the verification short message to the local server; the local server receives the verification message Sending a short message, and recording a short message receiving time of the verified short message; if the difference between the time input by the instruction and the short message receiving time is less than or equal to a preset time difference threshold, the local server identifies the verified short message Verification code, and sending the verification code to the remote server to invoke a function in the remote server corresponding to the instruction.
- a second aspect of the embodiments of the present application provides a processing system for verifying a short message, where the processing system for verifying a short message includes: a local server, configured to receive an instruction input by a user, and record a time input by the instruction; the local server further The method is configured to send a request message to the remote server according to the instruction, to control the remote server to send the verification short message to the terminal device, where the terminal device is configured to determine, when the short message is received, whether the short message is the verification short message.
- the terminal device is further configured to: if the short message is the verification short message, forward the verification short message to the local server; the local server is configured to receive the verification short message, and record the verification The short message receiving time of the short message; the local server is further configured to: if the difference between the time input by the instruction and the short message receiving time is less than or equal to a preset time difference threshold, identify the verification code in the verification short message, And sending the verification code to the remote server to invoke a function in the remote server corresponding to the instruction.
- the local server receives the instruction input by the user, records the time of the instruction input, and sends a request message to the remote server according to the instruction, so as to control the remote server to send the verification short message to the terminal device;
- the terminal device forwards the verification short message to the local server;
- the local server receives the verification short message, And recording the short message receiving time of the verification short message; if the difference between the time input by the instruction and the short message receiving time is less than or equal to a preset time difference threshold, the local server identifies the verification code in the verification short message. And sending the verification code to the remote server to invoke a function corresponding to the instruction in the remote server, so that the local server is more automated and more efficient when calling the function of the remote server .
- FIG. 1 is a flowchart of an implementation of a method for processing a verification short message according to an embodiment of the present application
- FIG. 2 is a specific implementation flowchart of a method for processing a verification short message S103 according to an embodiment of the present application
- FIG. 3 is a flowchart of a specific implementation of a method for processing a verification short message provided by an embodiment of the present application
- FIG. 4 is a specific implementation flowchart of a method for processing a verification short message provided by an embodiment of the present application
- FIG. 5 is an interaction diagram of a processing system for verifying a short message provided by an embodiment of the present application.
- FIG. 1 is a flowchart showing an implementation process of a method for processing a verification short message provided by an embodiment of the present application, where the method includes steps S101 to S109.
- the specific implementation principle of each step is as follows.
- Step S101 The local server receives an instruction input by the user, and records the time when the instruction is input.
- the method for verifying the short message mainly relates to a local server, and a plurality of remote servers that can provide functions or data for the local server, and the terminal device, wherein the terminal device can be a fixed terminal such as a personal computer. It can also be a mobile terminal such as a mobile phone.
- the user can directly input an instruction to the local server through the client or other control device, and is used to control the local server to call the function in the local server or the data stored in the local server, and can also be used to control the local server. Calling other servers, ie functions or data within the remote server.
- Step S102 The local server sends a request message to the remote server according to the instruction, so as to control the remote server to send the verification short message to the terminal device.
- the local server receives an instruction to invoke a function or data in the local server, the local server processes the data in the local server through a module encapsulated in the local server to meet the user's needs. If the local server recognizes that the received instruction needs to call the functions and data of other remote servers, the local server needs to add the instruction to a request message and send it to the corresponding remote server.
- the description information of the terminal device corresponding to the instruction is added to the request message, where the description information of the terminal device includes the ID of the terminal device or the phone number of the terminal device, and the remote server receives the request message.
- the verification short message is sent to the corresponding terminal device according to the description information of the terminal device.
- Step S103 When receiving the short message, the terminal device determines whether the short message is the verification short message.
- the remote server after receiving the request packet, the remote server sends a verification short message to the corresponding terminal device according to the description information of the terminal device, but it is understandable that the terminal device may receive various types of short messages. It is a verification short message sent by the remote server. Therefore, in the embodiment of the present application, when receiving a short message, the terminal device first determines whether the short message is a verification short message.
- the verification message contains the verification code
- the verification message in order to indicate the verification code, the verification message often contains related keywords.
- whether the number of keywords in the short message appears is used to determine whether a short message is Verify the text message.
- the foregoing S103 includes:
- Step S1031 Perform word segmentation on the text of the short message to generate a plurality of short message words.
- the terminal device first performs word segmentation processing on the received short message by using a word segmentation program encapsulated by the Dijkstra algorithm to generate a plurality of short message words.
- a text message is: "You are applying for A Bank's SMS verification code is: 12345.”, will generate multiple text messages, namely: you, in the process, application, bank A, a flash pass, , SMS, verification code, yes,: 12345.
- step S1032 it is determined whether each short message word exists in the keyword database.
- the keyword database includes a correspondence between words and keyword probabilities.
- the keyword database may be stored in the terminal device, or may be stored in the local server.
- the terminal device can call the keyword database from the local server.
- a text message may be split into: SMS, Yes, Apply, Bank A, Flash, SMS, Verification Code, Yes, 12345, etc. Then, among the short message words, only the words “A bank”, “one flash pass” and “verification code” exist in the keyword database, and the keyword probability corresponding to “A bank” in the keyword database is : 60%; the probability of a keyword corresponding to "one flash pass” is 40%; and the probability of a keyword corresponding to "verification code” is 90%.
- step S1033 if the short message word exists in the preset keyword database, the keyword probability corresponding to each short message word is determined according to the correspondence between the word and the keyword probability in the keyword database.
- the keyword probability corresponding to the short message "A Bank” is: 60 %; the probability of the keyword corresponding to the short message "one flash pass” is 40%; and the probability of the keyword corresponding to the short message “verification code” is 90%.
- Step S1034 If the short message word does not exist in the keyword database, assign a preset keyword probability to the short message word.
- Keyword probability As mentioned in the example above, only the three words “A Bank”, “One Flash” and “Verification Code” exist in the keyword database, so the short message words: “you", “being”, “application”, “ “,” “sMS”, “yes”, “:12345” cannot determine the corresponding keyword probabilities by the correspondence between the words and keyword probabilities contained in the keyword database, and the terminal device assigns a preset to these short message words. Keyword probability. Alternatively, the preset keyword probability may be 0%.
- Step S1035 The short message words in the text of the short message whose keyword probability is greater than or equal to the preset probability threshold are used as keywords.
- the keyword is determined by comparing whether the keyword probability of a short message word is greater than or equal to a preset probability threshold. For example, if the preset probability threshold is 50%, in the above example, the keyword probability corresponding to the short message "A Bank” is: 60%; the keyword probability of the short message “One Flash” is 40%. The keyword probability of the short message "Verification Code” is 90%, so only "A Bank” and “Verification Code” will be judged as keywords.
- the text message "You are applying for A Bank's SMS verification code: 12345" contains two keywords.
- Step S1036 If the short message includes a keyword greater than or equal to a preset number, determining that the short message is the verification short message.
- the SMS will be judged as a verification SMS because the SMS “You are applying for A Bank One Flash Authentication Code: 12345” contains two keywords. .
- Step S104 If the short message is the verification short message, the terminal device forwards the verification short message to the local server.
- the terminal device determines whether the received short message is a verification short message, which can reduce unnecessary transmission of the short message to the local server, is beneficial to reduce invalid data transmission, and can save the local server processing resources for invalid data. .
- Step S105 If the short message is not the verification short message, the terminal device stores the verification short message in the terminal device, and does not forward the short message to the local server.
- Step S106 the local server receives the verification short message, and records the short message receiving time of the verification short message.
- the local server after receiving the instruction input by the user, the local server records the time of the instruction input. In this step, after receiving the verification short message, the local server records the short message receiving time of the verification short message, thereby passing the The time difference between the time of the command input and the time of receiving the short message, and determining whether the verification short message forwarded from the terminal device is a verification short message generated by the remote server according to the instruction input by the user.
- Step S107 determining whether the difference between the time input by the instruction and the short message receiving time is less than or equal to a preset time difference threshold.
- the verification short message forwarded by the terminal device is likely to be generated by the remote server according to the instruction input by the user.
- Verification SMS If the difference between the time of the instruction input and the short message receiving time is greater than a preset time difference threshold, the verification message may not be a verification message generated by the remote server according to an instruction input by the user, or the verification message is likely The valid time for verifying the SMS has been exceeded.
- Step S108 if the difference between the time input by the instruction and the short message receiving time is less than or equal to a preset time difference threshold, the local server identifies the verification code in the verification short message, and sends the verification code. Go to the remote server to invoke a function in the remote server corresponding to the instruction.
- the verification short message forwarded by the terminal device is likely to be the remote server according to the user input.
- the verification message generated by the instruction is generated, so the local server will automatically identify the verification code in the verification message.
- the above S108 includes:
- Step S1081 Perform word segmentation on the text of the verification short message to generate a plurality of short message words.
- the method for performing word segmentation processing on the text of the verification short message by the local server is the same as the method for performing word segmentation processing on the text of the short message in the step S1031 in the above embodiment, and is not described herein.
- step S1082 if the short message word exists in the preset keyword database, the keyword probability corresponding to each short message word is determined according to the correspondence between the word and the keyword probability in the keyword database.
- the method for the local server to determine the keyword probability corresponding to each short message word is the same as the method for the terminal device to determine the keyword probability corresponding to each short message word in step S1032 of the above embodiment, and is not described herein.
- Step S1083 using the short message with the highest probability of the keyword in the verification short message as the special keyword.
- the terminal device uses a short message including a keyword greater than or equal to a preset number as a verification short message, and sends the verification short message to the local server, so if the preset number is greater than 1 , to verify that there are multiple keywords in the text message.
- the keyword probability is Among the highest-ranking keywords, the one with the highest position in the verification SMS is selected as a special keyword.
- Step S1084 If there is a number between the preset cutoff flag before the special keyword and the preset cutoff flag after the special keyword, the number is used as the verification code.
- the punctuation mark "]” and the punctuation mark ",” are preset break marks, suppose an interface verification message is: "[Software A] 581458 (Software A mobile phone verification code) Please complete the verification. If you are not working, please ignore this SMS.”
- the preset partition mark before the keyword is "]” and the preset cutoff flag after the keyword is ",”, so the "] 581458 can be intercepted from the interface verification message by two preset cutoff flags (software A mobile phone verification) Code, please complete the verification),", by identifying the number in the section, get "581458" as the verification code in the interface verification SMS.
- the method for setting a preset blocking flag includes: selecting a punctuation mark whose appearance frequency is greater than or equal to the first frequency threshold from the plurality of interface verification short messages, to obtain a first symbol group; and calculating each of the first symbols
- the punctuation marks in the group appear in the frequency between the verification code and the keyword as the second frequency of each punctuation mark; the punctuation symbol in the first symbol group whose second frequency is greater than the second frequency threshold is deleted to obtain the second a symbol group; the punctuation marks in the second symbol group are used as a preset blocking flag.
- the interval of the verification code in the interface verification short message is divided, and the number of the interval is extracted as a verification code, thereby realizing automatic analysis of the interface verification short message. Extract the verification code without human intervention to improve the automation of the entire interface call process.
- Step S1085 if there is no number between the preset cutoff flag before the special keyword and the preset cutoff flag after the special keyword, but the picture exists, the character string in the picture is identified, and The character string is used as the verification code.
- the above S1085 includes:
- Step S10851 Perform noise reduction processing on the picture by a median filtering algorithm to generate a verification image.
- median filtering is a nonlinear signal processing technique based on the theory of sorting statistics that can effectively suppress noise.
- the basic principle of median filtering is to use the value of a point in a digital image with the value of a point in a neighborhood of the point. The median value is substituted so that the surrounding pixel values are close to the true value, thus eliminating isolated noise points.
- Step S10852 Calculate a gray average value of the verification image according to a gray value of each pixel in the verification image, and convert a pixel point in the verification image with a gray value smaller than the gray average value into A black pixel point converts a pixel point in the verification image whose gray value is greater than or equal to the gray average value into a white pixel point.
- the verification image in order to accurately identify the verification code included in the verification image, it is necessary to maximize the distinction between the pixel point where the verification code is located in the verification image and the pixel point that the verification code does not occupy, so the verification image is first calculated.
- the grayscale average of all the pixels in the middle In the embodiment of the present application, in order to accurately identify the verification code included in the verification image, it is necessary to maximize the distinction between the pixel point where the verification code is located in the verification image and the pixel point that the verification code does not occupy, so the verification image is first calculated. The grayscale average of all the pixels in the middle.
- the gray value of each pixel of the current general digital image is divided into 256 sections, which are respectively a gray value of 0 - a gray value of 255, wherein the gray value of the white pixel is 255, and the black pixel The gray value of the point is 0. Therefore, in order to classify different pixel points of the verification image, in the embodiment of the present application, the gray value of the pixel point in the verification image whose gray value is smaller than the gray average value is set to 0, and the image is verified.
- the gradation value of the pixel whose gradation value is greater than or equal to the gradation average value is set to 255.
- Step S10853 Scanning from one end to the other end of the verification image, and displaying a black pixel point for the first time on the scan line to an area between the black line pixels for the first time on the scan line as a verification area, to The verification image is sliced into more than one of the verification regions.
- the verification image is a rectangular image, which is divided into two dimensions of length and width. It is assumed that in the verification image, the verification code is sequentially arranged from the left side to the right side of the verification image, and then in the embodiment of the present application, The scan is performed from the left side to the right side of the verification image, and the scan line is a line perpendicular to the long axis of the verification image. It can be understood that the scan line may not detect any black pixel points during the beginning of the scan, but as the scan line continues to move to the right, there is a moment when the black pixel points appear for the first time on the scan line.
- the example records the position of the scanning line at this time, and uses the position of the scanning line at this time as a cutting line for cutting the verification image. Then, the scan line continues to move to the right. In a period of time, due to the existence of the verification code, black pixel points will continue to exist on the scan line. Until one time, the scan line does not contain black pixel points for the first time. At this time, the position of the scanning line and the position at which the scanning line is located at this time serve as a cutting line for cutting the verification image, and it is understood that the verification image is divided into a verification area according to the above procedure.
- the scan line continues to move to the right.
- the scan line will be During a period of time, since there is a space between the characters and the characters in the verification image, the scan line will be During a period of time, no black pixel points can be detected. Until a certain time, black pixel points appear again on the scan line.
- Black pixel points appear again, also known as the first occurrence of black pixel points; there will be black pixel points for each scan line until one time, the scan line no longer contains black pixels, also known as black pixels for the first time. point.
- Step S10854 Calculate feature vectors of each of the verification regions of the verification image, and identify characters corresponding to feature vectors of the verification regions by using a supervised learning model as characters corresponding to the verification regions.
- the verification image is divided into more than one verification area, and each verification area contains only one character. Therefore, in the embodiment of the present application, characters in each verification area can be identified by the supervised learning model.
- the character database includes a correspondence between a character and a feature vector, and a character corresponding to the feature vector of the verification region may be calculated by using a support vector machine model.
- Step S10855 Combine characters corresponding to each of the verification areas to generate a character string in the picture.
- the picture including the verification code is divided into multiple verification areas, and individual image recognition is performed on each verification area to improve recognition accuracy and reduce recognition calculation amount. It helps to identify the verification code in the picture more quickly and accurately.
- the verification code is sent to the remote server to invoke the function corresponding to the instruction in the remote server.
- the local server stores the verification short message forwarded by the terminal device, and stores the corresponding relationship between the verification short message and the terminal device; and the local server receives the verification code error sent by the remote server.
- the user is prompted to input the device name and view the password; if the device name and the viewing password entered by the user are correct, the local server displays the terminal corresponding to the device name. The device recently forwarded the verification SMS.
- Step S109 If the difference between the time input by the instruction and the short message receiving time is greater than the time difference threshold, the verification short message is not recognized. It should be understood that the size of the sequence of the steps in the above embodiments does not mean that the order of execution is performed. The order of execution of each process should be determined by its function and internal logic, and should not be construed as limiting the implementation process of the embodiments of the present application.
- FIG. 5 is a cross-sectional view of the processing system for verifying the short message provided by the embodiment of the present application.
- the system includes:
- the local server 501 is configured to receive an instruction input by the user, and record a time when the instruction is input;
- the local server 501 is further configured to send a request message to the remote server 502 according to the instruction, to control the remote server to send a verification short message to the terminal device, where the terminal device 503 is configured to determine when receiving the short message. Whether the short message is the verification short message; the terminal device 503 is further configured to forward the verification short message to the local server if the short message is the verification short message; the local server 501 is configured to: Receiving the verification short message, and recording the short message receiving time of the verification short message; the local server 501 is further configured to: if the difference between the time input by the instruction and the short message receiving time is less than or equal to a preset time difference threshold And identifying a verification code in the verification short message, and sending the verification code to the remote server to invoke a function corresponding to the instruction in the remote server.
- the terminal device 503 includes:
- a word segmentation module configured to perform word segmentation on the text of the verification short message to generate a plurality of short message words
- a first determining module configured to determine, according to a correspondence between a word and a keyword probability in the keyword database, a keyword corresponding to each short message word, if the short message word exists in a preset keyword database
- a second determining module configured to: assign a preset keyword probability to the short message word if the short message word does not exist in the keyword database; and use a keyword identifying module to send the short message
- the text message whose keyword probability is greater than or equal to the preset probability threshold is used as a keyword
- the verification short message identification module is configured to determine, if the short message includes a keyword greater than or equal to a preset number, The short message is the verification short message.
- the local server 501 includes:
- a server word segmentation module configured to perform word segmentation processing on the text of the short message to generate a plurality of short message words
- a server first determining module configured to: if the short message word exists in a preset keyword database, according to the key a correspondence between a word and a keyword probability in the word database, determining a keyword probability corresponding to each of the short message words; and a server second determining module, configured to use a keyword with a highest probability in the top position of the verification short message
- the short message word is used as a special keyword;
- the first identifying module is configured to: if there is a number between the preset blocking flag before the special keyword and the preset blocking flag after the special keyword, the number is
- the second identification module is configured to: if there is no number between the preset blocking flag before the special keyword and the preset blocking flag after the special keyword, but the image exists, a character string in the picture, and the character string is used as the verification code.
- the local server 501 further includes:
- a generating module configured to perform noise reduction processing on the image by a median filtering algorithm to generate a verification image
- a conversion module configured to calculate a grayscale of the verification image according to a gray value of each pixel in the verification image An average value, and converting, in the verification image, a pixel point whose gray value is smaller than the gray average value into a black pixel point, and a pixel point in the verification image whose gray value is greater than or equal to the gray average value Converting to a white pixel
- a dividing module configured to scan from one end to the other end of the verification image, to first display a black pixel point on the scan line to a region between the black line pixel for the first time on the scan line a verification area for dividing the verification image into more than one of the verification areas
- a calculation module for calculating feature vectors of each of the verification areas of the verification image, and identifying each part by a supervised learning model a character corresponding to a feature vector of the verification area, as a character
- the local server 501 further includes:
- a storage module configured to store, by the local server, a verification short message forwarded by the terminal device, and store a correspondence between the verification short message and the terminal device; and a prompting module, configured to receive the far distance at the local server After the verification code sent by the terminal server is notified by mistake, or after receiving the instruction of the user to input the verification verification message, the user is prompted to input the device name and view the password; and the display module is used if the device name and the viewing password entered by the user are correct, The local server displays the latest verified verification short message of the terminal device corresponding to the device name.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Evolutionary Computation (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (20)
- 一种验证短信的处理方法,其特征在于,包括:本地服务器接收用户输入的指令,并记录指令输入的时间;所述本地服务器根据所述指令向远端服务器发送请求报文,以控制远端服务器向终端设备发送验证短信;所述终端设备在接收到短信时,判断所述短信是否为所述验证短信;若所述短信为所述验证短信,则所述终端设备将所述验证短信转发至所述本地服务器;所述本地服务器接收所述验证短信,并记录所述验证短信的短信接收时间;若所述指令输入的时间与所述短信接收时间的差值小于或等于预设的时间差阈值,则所述本地服务器识别所述验证短信中的验证码,并将所述验证码发送至所述远端服务器,以调用所述远端服务器中与所述指令对应的功能。
- 如权利要求1所述的验证短信的处理方法,其特征在于,所述判断所述短信是否为所述验证短信,包括:对所述短信的文本进行分词处理,生成多个短信词;若所述短信词存在于预设的关键词数据库中,则根据所述关键词数据库中的词语与关键词概率的对应关系,确定各个所述短信词对应的关键词概率;将所述短信的文本中所述关键词概率大于或等于预设概率阈值的短信词,作为关键词;若所述短信中包含大于或等于预设个数的关键词,则判定所述短信为所述验证短信。
- 如权利要求1所述的验证短信的处理方法,其特征在于,所述本地服务器识别所述验证短信中的验证码,包括:对所述验证短信的文本进行分词处理,生成多个短信词;若所述短信词存在于预设的关键词数据库中,则根据所述关键词数据库中的词语与关键词概率的对应关系,确定各个所述短信词对应的关键词概率;将所述验证短信中位置最靠前的一个关键词概率最高的短信词作为特殊关键词;若所述特殊关键词之前的预设隔断标志与所述特殊关键词之后的所述预设隔断标志之间不存在数字但存在图片,则识别所述图片中的字符串,并将所述字符串作为所述验证码。
- 如权利要求3所述的验证短信的处理方法,其特征在于,所述则识别所述图片中的字符串,包括:通过中值滤波算法对所述图片进行降噪处理,生成验证图像;根据所述验证图像中各个像素点的灰度值,计算所述验证图像的灰度平均值,并将所述验证图像中灰度值小于所述灰度平均值的像素点转换为黑色像素点,将所述验证图像中灰度值大于或等于所述灰度平均值的像素点转换为白色像素点;从所述验证图像的一端至另一端进行扫描,将扫描线上首次出现黑色像素点到所述扫描线上首次不含有黑色像素点之间的区域作为一个验证区域,以将所述验证图像切分为一个以上的所述验证区域;计算所述验证图像的各个所述验证区域的特征向量,并通过有监督学习模型识别各个所述验证区域的特征向量对应的字符,作为各个所述验证区域对应的字符;组合各个所述验证区域对应的字符,生成所述图片中的字符串。
- 如权利要求1所述的验证短信的处理方法,其特征在于,还包括:所述本地服务器存储由所述终端设备转发的验证短信,并存储所述验证短信与所述终端设备的对应关系;在所述本地服务器接收到所述远端服务器发送的验证码错误通知后,或在接收到用户输入的查看验证短信的指令后,提示用户输入设备名称以及查看密码;若用户输入的设备名称以及查看密码正确,则所述本地服务器显示所述设备名称对应的终端设备最新转发的验证短信。
- 如权利要求2所述的验证短信的处理方法,其特征在于,还包括:若所述短信词不存在于所述关键词数据库中,则为所述短信词分配一个预设的关键词概率。
- 如权利要求2所述的验证短信的处理方法,其特征在于,所述对所述短信的文本进行分词处理,包括:通过封装有基于dijkstra算法的分词程序对接收到的短信进行分词处理。
- 如权利要求3所述的验证短信的处理方法,其特征在于,还包括:若所述特殊关键词之前的预设隔断标志与所述特殊关键词之后的所述预设隔断标志之间存在数字,则将所述数字作为所述验证码。
- 如权利要求4所述的验证短信的处理方法,其特征在于,所述通过有监督学习模型识别各个所述验证区域的特征向量对应的字符,包括:通过支持向量机模型计算出验证区域的特征向量对应的字符。
- 如权利要求1所述的验证短信的处理方法,其特征在于,还包括:若所述指令输入的时间与所述短信接收时间的差值大于时间差阈值,则不对验证短信进行识别。
- 一种验证短信的处理系统,其特征在于,包括:本地服务器,用于接收用户输入的指令,并记录指令输入的时间;所述本地服务器,还用于根据所述指令向远端服务器发送请求报文,以控制远端服务器向终端设备发送验证短信;所述终端设备,用于在接收到短信时,判断所述短信是否为所述验证短信;所述终端设备,还用于若所述短信为所述验证短信,则将所述验证短信转发至所述本地服务器;所述本地服务器,用于接收所述验证短信,并记录所述验证短信的短信接收时间;所述本地服务器,还用于若所述指令输入的时间与所述短信接收时间的差值小于或等于预设的时间差阈值,则识别所述验证短信中的验证码,并将所述验证码发送至所述远端服务器,以调用所述远端服务器中与所述指令对应的功能。
- 根据权利要求11所述的验证短信的处理系统,其特征在于,所述终端设备包括:分词模块,用于对所述验证短信的文本进行分词处理,生成多个短信词;第一确定模块,用于若所述短信词存在于预设的关键词数据库中,则根据所述关键词数据库中的词语与关键词概率的对应关系,确定各个所述短信词对应的关键词概率;第二确定模块,用于若所述短信词不存在于所述关键词数据库中,则为所述短信词分配一个预设的关键词概率;关键词识别模块,用于将所述短信的文本中所述关键词概率大于或等于预设概率阈值的短信词,作为关键词;验证短信识别模块,用于若所述短信中包含大于或等于预设个数的关键词,则判定所述短信为所述验证短信。
- 根据权利要求11所述的验证短信的处理系统,其特征在于,所述本地服务器,包括:服务器分词模块,用于对所述短信的文本进行分词处理,生成多个短信词;服务器第一确定模块,用于若所述短信词存在于预设的关键词数据库中,则根据所述关键词数据库中的词语与关键词概率的对应关系,确定各个所述短信词对应的关键词概率;服务器第二确定模块,用于将所述验证短信中位置最靠前的一个关键词概率最高的短信词作为特殊关键词;第一识别模块,用于若所述特殊关键词之前的预设隔断标志与所述特殊关键词之后的所述预设隔断标志之间存在数字,则将所述数字作为所述验证码;第二识别模块,用于若所述特殊关键词之前的预设隔断标志与所述特殊关键词之后的所述预设隔断标志之间不存在数字但存在图片,则识别所述图片中的字符串,并将所述字符串作为所述验证码。
- 根据权利要求13所述的验证短信的处理系统,其特征在于,所述本地服务器,还包括:生成模块,用于通过中值滤波算法对所述图片进行降噪处理,生成验证图像;转换模块,用于根据所述验证图像中各个像素点的灰度值,计算所述验证图像的灰度平均值,并将所述验证图像中灰度值小于所述灰度平均值的像素点转换为黑色像素点,将所述验证图像中灰度值大于或等于所述灰度平均值的像素点转换为白色像素点;划分模块,用于从所述验证图像的一端至另一端进行扫描, 将扫描线上首次出现黑色像素点到所述扫描线上首次不含有黑色像素点之间的区域作为一个验证区域,以将所述验证图像切分为一个以上的所述验证区域;计算模块,用于计算所述验证图像的各个所述验证区域的特征向量,并通过有监督学习模型识别各个所述验证区域的特征向量对应的字符,作为各个所述验证区域对应的字符;组合模块,用于组合各个所述验证区域对应的字符,生成所述图片中的字符串。
- 根据权利要求11所述的验证短信的处理系统,其特征在于,所述本地服务器,还包括:存储模块,用于所述本地服务器存储由所述终端设备转发的验证短信,并存储所述验证短信与所述终端设备的对应关系;提示模块,用于在所述本地服务器接收到所述远端服务器发送的验证码错误通知后,或在接收到用户输入的查看验证短信的指令后,提示用户输入设备名称以及查看密码;显示模块,用于若用户输入的设备名称以及查看密码正确,则所述本地服务器显示所述设备名称对应的终端设备最新转发的验证短信。
- 根据权利要求12所述的验证短信的处理系统,其特征在于,还包括:若所述短信词不存在于所述关键词数据库中,则为所述短信词分配一个预设的关键词概率。
- 根据权利要求12所述的验证短信的处理系统,其特征在于,所述对所述短信的文本进行分词处理,包括:通过封装有基于dijkstra算法的分词程序对接收到的短信进行分词处理。
- 根据权利要求13所述的验证短信的处理系统,其特征在于,还包括:若所述特殊关键词之前的预设隔断标志与所述特殊关键词之后的所述预设隔断标志之间存在数字,则将所述数字作为所述验证码。
- 根据权利要求14所述的验证短信的处理系统,其特征在于,所述通过有监督学习模型识别各个所述验证区域的特征向量对应的字符,包括:通过支持向量机模型计算出验证区域的特征向量对应的字符。
- 根据权利要求11所述的验证短信的处理系统,其特征在于,还包括:若所述指令输入的时间与所述短信接收时间的差值大于时间差阈值,则不对验证短信进行识别。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810084587.7A CN108366052B (zh) | 2018-01-29 | 2018-01-29 | 验证短信的处理方法及系统 |
CN201810084587.7 | 2018-01-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019144756A1 true WO2019144756A1 (zh) | 2019-08-01 |
Family
ID=63007232
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/124338 WO2019144756A1 (zh) | 2018-01-29 | 2018-12-27 | 验证短信的处理方法及系统 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108366052B (zh) |
WO (1) | WO2019144756A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114124455A (zh) * | 2021-10-22 | 2022-03-01 | 中国联合网络通信集团有限公司 | 短信验证方法及短信验证系统 |
CN115767537A (zh) * | 2022-11-15 | 2023-03-07 | 南京鼎山信息科技有限公司 | 一种短信验证码的权限处理方法、装置和计算机设备 |
CN116996840A (zh) * | 2023-09-26 | 2023-11-03 | 北京百悟科技有限公司 | 短信审核方法、装置、设备和存储介质 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108366052B (zh) * | 2018-01-29 | 2021-01-01 | 深圳壹账通智能科技有限公司 | 验证短信的处理方法及系统 |
CN109600722B (zh) * | 2018-11-14 | 2021-11-02 | 平安科技(深圳)有限公司 | 短信接收验证方法及装置、电子设备、存储介质 |
CN110677338B (zh) * | 2019-09-16 | 2021-10-15 | 北京达佳互联信息技术有限公司 | 验证信息计时方法、装置、电子设备和存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160092970A1 (en) * | 2014-09-30 | 2016-03-31 | Wal-Mart Stores, Inc. | Systems and methods for performing in-store and online transactions |
CN106170004A (zh) * | 2016-09-23 | 2016-11-30 | 北京小米移动软件有限公司 | 处理验证码的方法及装置 |
CN106851602A (zh) * | 2017-03-31 | 2017-06-13 | 武汉票据交易中心有限公司 | 一种交易系统短信验证方法及系统 |
CN108366052A (zh) * | 2018-01-29 | 2018-08-03 | 深圳壹账通智能科技有限公司 | 验证短信的处理方法及系统 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103530642B (zh) * | 2012-08-21 | 2016-03-09 | 深圳市中金岭南有色金属股份有限公司凡口铅锌矿 | 雷管自动识别机以及雷管编码图像识别方法 |
CN103618606A (zh) * | 2013-11-26 | 2014-03-05 | 觅林网络科技(上海)有限公司 | 通过短信验证的App登录方法 |
WO2015188277A1 (en) * | 2014-06-13 | 2015-12-17 | BicDroid Inc. | Methods, systems and computer program product for providing encryption on a plurality of devices |
CN105703921A (zh) * | 2014-11-24 | 2016-06-22 | 甘肃省科学技术情报研究所 | 一种利用手机短信远程控制服务器的装置和方法 |
CN105046140A (zh) * | 2015-06-09 | 2015-11-11 | 苏州德锐朗智能科技有限公司 | 一种用于字符验证码的自动输入方法 |
CN105159533A (zh) * | 2015-08-31 | 2015-12-16 | 努比亚技术有限公司 | 一种移动终端及其验证码自动输入方法 |
CN106294714A (zh) * | 2016-08-08 | 2017-01-04 | 龙官波 | 一种信息采集方法和装置 |
-
2018
- 2018-01-29 CN CN201810084587.7A patent/CN108366052B/zh active Active
- 2018-12-27 WO PCT/CN2018/124338 patent/WO2019144756A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160092970A1 (en) * | 2014-09-30 | 2016-03-31 | Wal-Mart Stores, Inc. | Systems and methods for performing in-store and online transactions |
CN106170004A (zh) * | 2016-09-23 | 2016-11-30 | 北京小米移动软件有限公司 | 处理验证码的方法及装置 |
CN106851602A (zh) * | 2017-03-31 | 2017-06-13 | 武汉票据交易中心有限公司 | 一种交易系统短信验证方法及系统 |
CN108366052A (zh) * | 2018-01-29 | 2018-08-03 | 深圳壹账通智能科技有限公司 | 验证短信的处理方法及系统 |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114124455A (zh) * | 2021-10-22 | 2022-03-01 | 中国联合网络通信集团有限公司 | 短信验证方法及短信验证系统 |
CN114124455B (zh) * | 2021-10-22 | 2023-05-05 | 中国联合网络通信集团有限公司 | 短信验证方法及短信验证系统 |
CN115767537A (zh) * | 2022-11-15 | 2023-03-07 | 南京鼎山信息科技有限公司 | 一种短信验证码的权限处理方法、装置和计算机设备 |
CN115767537B (zh) * | 2022-11-15 | 2023-10-17 | 南京鼎山信息科技有限公司 | 一种短信验证码的权限处理方法、装置和计算机设备 |
CN116996840A (zh) * | 2023-09-26 | 2023-11-03 | 北京百悟科技有限公司 | 短信审核方法、装置、设备和存储介质 |
CN116996840B (zh) * | 2023-09-26 | 2023-12-29 | 北京百悟科技有限公司 | 短信审核方法、装置、设备和存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN108366052B (zh) | 2021-01-01 |
CN108366052A (zh) | 2018-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019144756A1 (zh) | 验证短信的处理方法及系统 | |
CN107889070B (zh) | 图片处理方法、装置、终端及计算机可读存储介质 | |
EP2814212B1 (en) | Method and apparatus for adding friend, and storage medium | |
US20220115012A1 (en) | Method and apparatus for processing voices, device and computer storage medium | |
WO2022095735A1 (zh) | 应用程序多语言支持方法、装置、计算机设备及存储介质 | |
WO2016165557A1 (zh) | 验证码的实现方法及装置 | |
CN102405474A (zh) | 使用基于地理地点或用户身份的信息的用户询问 | |
CN112184367A (zh) | 一种订单处理方法和装置 | |
WO2020140925A1 (zh) | 识别损坏二维码的方法、装置、设备以及存储介质 | |
CN109670109A (zh) | 信息获取方法、装置、服务器、终端和介质 | |
CN105203121A (zh) | 在地理应用程序中动态地整合离线和在线建议 | |
CN106156595B (zh) | 一种通过验证码图片进行验证的方法、装置及系统 | |
JP2004164180A (ja) | 情報処理装置、通信処理装置、および方法、並びにコンピュータ・プログラム | |
US9348999B2 (en) | User terminal, reliability management server, and method and program for preventing unauthorized remote operation | |
WO2017093412A1 (en) | System and method for detecting and predicting level of importance of electronic mail messages | |
CN110764685B (zh) | 用于识别二维码的方法和设备 | |
CN110519373B (zh) | 用于推送信息的方法和装置 | |
CN110912801B (zh) | 一种检测电子红包的方法、系统及终端设备 | |
CN111083705A (zh) | 群发诈骗短信检测方法、装置、服务器及存储介质 | |
CN116303888A (zh) | 一种生僻字处理方法、装置、存储介质及电子设备 | |
KR102347070B1 (ko) | 단말기의 정보 처리 방법 및 장치 | |
CN112272135B (zh) | 一种存储软件的邮件发送方法、装置、设备及存储介质 | |
CN112580762A (zh) | 动态二维码及其识别方法和识别装置 | |
CN113595884A (zh) | 一种消息提醒方法及应用端 | |
CN114386010A (zh) | 应用登录方法、装置、电子设备以及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18902508 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18902508 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 30.11.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18902508 Country of ref document: EP Kind code of ref document: A1 |