WO2021169382A1 - 链接检测方法、装置、电子设备及存储介质 - Google Patents

链接检测方法、装置、电子设备及存储介质 Download PDF

Info

Publication number
WO2021169382A1
WO2021169382A1 PCT/CN2020/126051 CN2020126051W WO2021169382A1 WO 2021169382 A1 WO2021169382 A1 WO 2021169382A1 CN 2020126051 W CN2020126051 W CN 2020126051W WO 2021169382 A1 WO2021169382 A1 WO 2021169382A1
Authority
WO
WIPO (PCT)
Prior art keywords
link
information
service provider
short
target
Prior art date
Application number
PCT/CN2020/126051
Other languages
English (en)
French (fr)
Inventor
蒋济舟
秦青
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2021169382A1 publication Critical patent/WO2021169382A1/zh
Priority to US17/711,091 priority Critical patent/US11943256B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • This application relates to the field of Internet security technology, and in particular to a link detection method, device, electronic equipment, and storage medium.
  • the user can determine the security of the link by querying the registration subject of the received link. For example, if the user receives a link to modify the password of his social account, the user can query whether the registered subject of the link is the service provider of the social account, if it is, it means the link is safe, if not, it means the link Not safe.
  • the embodiments of the present application provide a link detection method, device, electronic equipment, and storage medium, which can determine the security of the short link to be detected.
  • the technical solution is as follows:
  • a link detection method which is applied to an electronic device, and the method includes:
  • At least one short connection is acquired based on the first service provider information, where the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the first service
  • the service provider indicated by the provider information, the second service provider is used to provide a short link generation service
  • a link detection device in another aspect, includes:
  • An obtaining module configured to obtain first service provider information from target text, where the target text includes short links to be detected;
  • the obtaining module is further configured to obtain at least one short connection based on the first service provider information, where the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first The service provider is the service provider indicated by the first service provider information, and the second service provider is used to provide a short link generation service;
  • the determining module is configured to determine that the short link to be detected is an unsafe link in response to that the short link to be detected is not included in the at least one short link.
  • an electronic device the server includes a processor and a memory, the memory is configured to store at least one piece of program code, and the at least one piece of program code is loaded by the processor and executes the following steps:
  • At least one short connection is acquired based on the first service provider information, where the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the first service
  • the service provider indicated by the provider information, the second service provider is used to provide a short link generation service
  • a storage medium is provided, and at least one piece of program code is stored in the storage medium, and the at least one piece of program code is used to execute the following steps:
  • At least one short connection is acquired based on the first service provider information, where the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the first service
  • the service provider indicated by the provider information, the second service provider is used to provide a short link generation service
  • the short link to be detected is a short link generated for the first service provider, so as to determine whether the short link to be detected is safe.
  • Fig. 1 is a system architecture diagram of a blockchain system according to an embodiment of the present application
  • Fig. 2 is a schematic structural diagram of a blockchain provided according to an embodiment of the present application.
  • Fig. 3 is a flowchart of a new block generation according to an embodiment of the present application.
  • Figure 4 is a functional architecture diagram of a node device in a blockchain system according to an embodiment of the present application
  • Figure 5 is a structural block diagram of a link detection system according to an embodiment of the present application.
  • Fig. 6 is a flow chart of a method for link detection according to an embodiment of the present application.
  • Fig. 7 is a block diagram of a link detection device according to an embodiment of the present application.
  • Fig. 8 is a schematic structural diagram of a terminal according to an embodiment of the present application.
  • Fig. 9 is a schematic structural diagram of a server provided according to an embodiment of the present application.
  • a short link is a relatively short link, which can replace the long original link to access the content corresponding to the original link.
  • the user can only query the registered subject of the short link, but cannot query the registered subject of the original link corresponding to the short link, and thus cannot determine the security of the short link.
  • Blockchain (English: blockchain): It is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • the blockchain is essentially a decentralized database, which is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information to verify the validity of the information. (Anti-counterfeiting) and generate the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the underlying platform of the blockchain can include processing modules such as user management, basic services, smart contracts, and operation monitoring.
  • the user management module is responsible for the identity information management of all blockchain participants, including the maintenance of public and private key generation (account management), key management, and maintenance of the correspondence between the user’s real identity and the blockchain address (authority management), etc.
  • authorization supervise and audit certain real-identity transactions, and provide risk control rule configuration (risk control audit); basic service modules are deployed on all blockchain node devices to verify the validity of business requests, After completing the consensus on the valid request, it is recorded on the storage.
  • the basic service For a new business request, the basic service first performs interface adaptation analysis and authentication processing (interface adaptation), and then encrypts the business information through the consensus algorithm (consensus management) After encryption, it is completely and consistently transmitted to the shared ledger (network communication), and recorded and stored; the smart contract module is responsible for contract registration and issuance, contract triggering and contract execution.
  • interface adaptation interface adaptation
  • consensus algorithm consensus algorithm
  • contract registration can define contract logic and publish through a certain programming language
  • the operation monitoring module is mainly responsible for the product release process Deployment, configuration modification, contract settings, cloud adaptation, and visual output of real-time status during product operation, such as alarms, monitoring network conditions, monitoring node equipment health status, etc.
  • the platform product service layer provides basic capabilities and implementation frameworks for typical applications. Based on these basic capabilities, developers can superimpose business characteristics to complete the blockchain implementation of business logic.
  • the application service layer provides application services based on the blockchain solution for business participants to use.
  • Consensus mechanism (English: consensus mechanism): It is a mathematical algorithm that realizes the establishment of trust between different nodes and the acquisition of rights and interests in the blockchain system.
  • consensus mechanism It is a mathematical algorithm that realizes the establishment of trust between different nodes and the acquisition of rights and interests in the blockchain system.
  • the verification and confirmation of the transaction can be completed in a short time through voting by special node devices.
  • For a transaction if several node devices with irrelevant interests can reach a consensus, it can be considered All node devices in the system can also reach a consensus on this.
  • Smart contract (English: smart contract): is a computer agreement designed to spread, verify, or execute a contract in an information-based way.
  • the contract program that each node device in the blockchain system automatically executes based on specific conditions can operate on the data stored on the chain. It is an important way for users to interact with the blockchain and use the blockchain to implement business logic.
  • the purpose of smart contracts is to provide a security method superior to traditional contracts and reduce other transaction costs associated with the contract. It allows credible transactions without a third party, which are traceable and irreversible. Smart contracts are triggered by transactions and can read, write, and calculate transaction data on the blockchain to support the operation of various commercial applications.
  • the smart contract in the embodiment of the present application is divided into two parts: general and customized.
  • the general part supports basic functions such as identity authentication, transactions, and virtual resource transfer.
  • the customization part is used to cope with the differentiated application scenarios of the third-node device, and the third-node device can implement special functions by configuring an independent smart contract.
  • Public key (English: public key) and private key (English: private key): a key pair (that is, a public key and a private key) obtained through an algorithm, the public key is the public part of the key pair , The private key is the non-public part.
  • the public key is usually used to encrypt data, verify digital signatures, and so on. Through this algorithm, it can be ensured that the obtained key pair is unique.
  • the other key When using this key pair, if one of the keys is used to encrypt a piece of data, the other key must be used to decrypt it.
  • the public key is used to encrypt data. It must be decrypted with the private key, if it is encrypted with the private key, it must also be decrypted with the public key, otherwise the decryption will not succeed.
  • the embodiment of the present application provides a blockchain system 100 implemented based on the above-mentioned blockchain technology.
  • the system architecture of the blockchain system is introduced below.
  • the blockchain system includes a plurality of node devices 101.
  • the blockchain system also includes a client.
  • the node device 101 is a computing device of any form in the network, such as a server, a host, a user terminal, and so on.
  • the node device 101 and the node device 101 can share data.
  • the node devices 101 may establish a P2P network based on a peer-to-peer (Peer To Peer, P2P) protocol.
  • P2P protocol is an application layer protocol that runs on top of the Transmission Control Protocol (TCP) protocol.
  • each node device 101 can receive input information during normal operation, and maintain the shared data in the blockchain system based on the received input information.
  • there is an information connection between each node device in the blockchain system and the node devices can transmit information through the above-mentioned information connection. For example, when any node device in the blockchain system receives input information, other node devices in the blockchain system obtain the input information based on the consensus algorithm, and store the input information as data in the shared data, so that The data stored on all node devices in the blockchain system are consistent.
  • each node device in the blockchain system has a corresponding node device identifier, and each node device in the blockchain system stores the node device identifiers of other node devices in the blockchain system , In order to broadcast the generated block to other node devices in the blockchain system based on the node device identifiers of other node devices.
  • Each node device can maintain a node device identification list as shown in Table 1 below, and store the node device name and node device identification correspondingly in the node device identification list.
  • the node device identification is an IP (Internet Protocol, protocol for interconnection between networks) address and any other information that can be used to identify the node device. Table 1 only uses the IP address as an example for illustration.
  • each node device in the blockchain system stores an identical blockchain.
  • the blockchain is composed of multiple blocks.
  • the founding block includes a block header and a block body.
  • the block header stores the input information feature value, version number, timestamp and difficulty value, and the block body stores Input information; the next block of the founding block takes the founding block as the parent block.
  • the next block also includes the block header and the block body.
  • the block header stores the input information feature value of the current block and the parent block’s Block header feature value, version number, timestamp and difficulty value, and so on, so that the block data stored in each block in the blockchain is related to the block data stored in the parent block, ensuring The security of the information entered in the block.
  • SHA256 is the feature value algorithm used to calculate the feature value
  • version (version number) is the version information of the relevant block protocol in the blockchain
  • prev_hash is the block header feature value of the parent block of the current block
  • merkle_root is the input information
  • Ntime is the update time of the update timestamp
  • nbits is the current difficulty, which is a fixed value within a period of time, and will be determined again after a fixed period of time
  • x is a random number
  • TARGET is the characteristic value threshold, this feature The value threshold can be determined based on nbits.
  • the information can be correspondingly stored, the block header and the block body are generated, and the current block is obtained.
  • the node device where the blockchain is located is based on the node device identification of other node devices in the blockchain system, and the newly generated blocks are sent to other node devices in the blockchain system where it is located.
  • the generated block is verified, and the newly generated block is added to the stored block chain after the verification is completed.
  • the node device 101 can be functionally divided into a hardware layer, an intermediate layer, an operating system layer, and an application layer.
  • the specific functions involved can be as follows:
  • Routing the basic function of node devices, used to support communication between node devices.
  • node devices can also have the following functions:
  • the services implemented by the application include:
  • Wallet used to provide the function of electronic currency transactions, including initiating transactions (that is, sending the transaction records of the current transaction to other node devices in the blockchain system, and after other node devices are successfully verified, it will be regarded as an acknowledgement that the transaction is valid
  • the transaction record data is written into the temporary block of the blockchain; of course, the wallet also supports querying the remaining electronic money in the electronic money address.
  • Shared ledger used to provide functions such as storage, query and modification of account data, and send the record data of the operation of the account data to other node devices in the blockchain system. After other node devices are validated, they will be used as A response that acknowledges that the account data is valid, writes the record data into a temporary block, and can also send a confirmation to the node device that initiated the operation.
  • Smart contracts can execute the terms of a certain contract, implemented by the code deployed on the shared ledger for execution when certain conditions are met, and the code is used to complete automated transactions according to actual business requirements. For example, query the logistics status of the goods purchased by the buyer, and transfer the buyer’s electronic currency to the merchant’s address after the buyer signs for the goods; Contract processed.
  • Blockchain includes a series of blocks that are connected to each other according to the chronological order of generation. Once a new block is added to the blockchain, it will not be removed again. The blockchain system is recorded in the block. Record data submitted by the mid-node device.
  • the link detection method provided by the embodiment of the present application can be applied to related scenarios for link detection. For example, the scene of detecting links in text messages, the scene of detecting links in Weibo, the scene of detecting links in the chat information of social applications, the scene of detecting links in the product search bar of shopping applications And the scene of detecting the link entered in the browser search box, etc.
  • the electronic device obtains the first service provider information from the target text including the short link to be detected. Then, the electronic device obtains at least one short link that meets the target condition generated by the second service provider for the first service provider indicated by the first service provider information based on the first service provider information, and the second service provider is used to provide Short link generation service. Finally, in response to that the short link to be detected is not included in the at least one short link, the electronic device determines that the short link to be detected is an unsafe link.
  • the above technical solution uses at least one short link that meets the target condition generated by the second service provider for the first service provider, and then compares the at least one short link with the short link to be detected in the target text to determine the short link to be detected Whether the link is a short link generated for the first service provider, so as to determine whether the short link to be detected is safe.
  • FIG. 5 is a structural block diagram of a link detection system 500 provided according to an embodiment of the present application.
  • the link detection system 500 includes: a terminal 510 and a link detection platform 520.
  • the terminal 510 is connected to the link detection platform 520 through a wireless network or a wired network.
  • the terminal 510 is at least one of a smart phone, a game console, a desktop computer, a tablet computer, an e-book reader, a laptop portable computer, and a vehicle-mounted computer.
  • the terminal 510 installs and runs an application program that supports link detection.
  • the application is a communication application, a social application, a shopping application, a browser application, or a safety assistant application, etc.
  • the terminal 510 is a terminal used by a user, and a user account is logged in an application program running in the terminal 510.
  • the link detection platform 520 includes at least one of a server, multiple servers, a cloud computing platform, and a virtualization center.
  • the link detection platform 520 is used to provide background services for applications that support link detection.
  • the link detection platform 520 is responsible for the main detection work, and the terminal 510 is responsible for the secondary detection work; or the link detection platform 520 is responsible for the secondary detection work, and the terminal 510 is responsible for the main detection work; or, the link detection platform 520 or the terminal 510 can separately undertake the inspection work.
  • the link detection platform 520 includes: an access server, a link detection server, and a database.
  • the access server is used to provide the terminal 510 to provide access services.
  • the link detection server is used to provide background services related to link detection.
  • the link detection platform 520 is constructed based on the node device 101 in the above-mentioned blockchain system 100.
  • the terminal 510 may generally refer to one of multiple terminals, and this embodiment only uses the terminal 510 as an example for illustration.
  • the number of the aforementioned terminals may be more or less.
  • the foregoing terminal may be only one, or the foregoing terminal may be tens or hundreds, or more.
  • the image recognition system may also include other terminals.
  • the embodiments of the present application do not limit the number of terminals and device types.
  • the link detection method provided in this application can be applied to a blockchain system or a non-blockchain system.
  • the link detection method is applied to a non-blockchain system
  • the first link release information and the second link release information involved in the link detection method that is, the information related to the original link and the information related to the short link
  • the link detection method can be stored in In a database with a high degree of credibility, to ensure the validity of the information published by the first link and the information published by the second link.
  • the query service for the data stored in the database with higher credibility may be provided by the first service provider involved in the link detection method, or may be provided by the second service provider involved in the link detection method, and It may be provided by a third-party service provider, or may be jointly provided by the above-mentioned first service provider, second service provider, and other service providers after forming an alliance.
  • the link detection method is applied to the blockchain system, since the blockchain system itself is a data storage system with high credibility, the first link release information and the second link involved in the link detection method Release information can be stored in the blockchain system.
  • the electronic device that executes the link detection method is a node device in the blockchain system, or a device that can communicate with a node device in the blockchain system. If the electronic device is the terminal 510 in FIG. 5, the terminal 510 can communicate with the link detection platform 520 constructed based on the node device in the blockchain system to implement the link detection method.
  • Fig. 6 is a flowchart of a link detection method provided according to an embodiment of the present application, as shown in Fig. 6.
  • the link detection method is applied to the blockchain system, and the electronic device is a terminal that can communicate with the node device in the blockchain system as an example for description.
  • the link detection method includes the following steps:
  • the terminal obtains the first service provider information from the target text, where the target text includes a short link to be detected.
  • the terminal can receive the target text including the short link to be detected, and the text content of the target text can be used to explain the content of the webpage corresponding to the short link to be detected, or the text content of the target text can also be used to guide The user visits the webpage corresponding to the short link to be detected.
  • the target text is a short message in a short message application, a chat message in a social application, or information content in an information application, etc.
  • the field in the fixed position of the target text can be used to indicate the first service provider information.
  • the first service provider information is the name of the first service provider or the service provider identification of the first service provider, etc. Information identifying the first service provider, which is used to provide the service described by the content of the target text. The first service provider is used to provide relevant information corresponding to the original linked webpage.
  • the terminal can also perform punctuation detection on the target text.
  • the terminal uses the field indicated by the target punctuation as the first service provider information.
  • the target The punctuation marks are quotation marks "" or brackets (), etc., which are not limited in the embodiment of the present application.
  • the terminal can also obtain the first service provider information through text recognition, keyword matching, etc., which is not limited in this application.
  • the short link to be detected is associated with one of text, picture, video, and button in the target text.
  • the target text includes a text hyperlink
  • the link address of the text hyperlink is the short link to be detected.
  • the picture hyperlink in the target text has a short link to be detected, and in response to detecting a trigger operation on the picture, the terminal performs a link jump step based on the short link to be detected.
  • the content of the short message is used to instruct the terminal user to modify his account information: "Your account information has expired, please click url.cn.xxxxx to modify your account information, so as not to affect your normal game. [xx game] ]".
  • "xx game” is used to indicate the first service provider
  • "url.cn.xxxxx” is the short link to be detected.
  • the terminal performs punctuation detection on the content of the short message, and detects whether there are target punctuation marks "[" and "]". When these two target punctuation marks are detected, the terminal will check the fields between the two target punctuation marks, That is, "xx game", as the first service provider information.
  • the target text can be sent by the first service provider indicated by the first service provider information, can also be sent by the second service provider that generates the short link to be detected, and can also be sent by other information push services. This application is not restricted by the service provider.
  • the terminal obtains at least one short link based on the first service provider information, where the short connection is a short connection that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the first service provider information
  • the indicated service provider, the second service provider is used to provide short link generation services.
  • the terminal can obtain the second service provider information associated with the first service provider information based on the first service provider information. Based on the second service provider information, the terminal obtains the at least one short link from the short links associated with the second service provider information.
  • the target condition is at least one of the short link generation time being within the target time period, or the short link has not expired, or the service type to which the short link belongs is consistent with the target service type indicated by the target text.
  • the storage of the short link can be implemented in a variety of different ways, for example, through blockchain storage, that is, in some embodiments, the terminal can obtain the second link from the blockchain system.
  • Service provider information the step for the terminal to obtain the second service provider information associated with the first service provider information based on the first service provider information may be: the terminal determines the first zone from the blockchain system based on the first service provider information Block, the first block is used to store the first link release information of the first service provider. The terminal may obtain the second service provider information from the first link release information of the first service provider stored in the first block.
  • the first link posting information cannot be changed, avoiding malicious users from modifying the first link posting information to provide the terminal with wrong second service provider information Therefore, it is ensured that the short link obtained by the terminal is a safe and effective short link, rather than a short link forged by a malicious user.
  • the first service provider is a game service provider that can provide game-related services.
  • the second service provider is a short link service provider and can provide a service for generating short links.
  • the first service provider provides the user with a webpage for modifying account information, the link of the webpage is the original link a, the second service provider generates at least one short link for the original link a, and one of the short links is the short link b, then
  • the short message includes the short link b, that is, the aforementioned url.cn.xxxxx.
  • the first service provider saves the first service provider information, the original link a, and the second service provider information in the first link posting information, and uploads the first link posting information to make the first link posting information stored in In the first block. Then the terminal can obtain the second service provider information from the first link release information. If the first link publishing information is not stored on the blockchain, the malicious user can modify the first link publishing information to make the forged malicious service provider information obtained by the terminal and the short message associated with the malicious service provider information The link is a short link forged by a malicious user.
  • the above method stores the first link publication information in the blockchain, so that the first link publication information cannot be changed, thereby ensuring that the short link obtained by the terminal is a safe and effective short link, rather than a short link forged by a malicious user.
  • the terminal can obtain the aforementioned at least one short link from the blockchain system.
  • the step of obtaining at least one short link that meets the target condition generated by the second service provider for the first service provider from the short links associated with the second service provider information may be :
  • the terminal determines the second block from the blockchain system based on the second service provider information, and the second block is used to store the second link release information of the second service provider.
  • the terminal obtains at least one short link that meets the target condition generated by the second service provider for the first service provider from the second link release information of the second service provider stored in the second block.
  • the second link publishing information cannot be changed, which prevents malicious users from modifying the second link publishing information to provide the terminal with a short link forged by the malicious user. Ensure that the short link obtained by the terminal is a safe and effective short link.
  • the second service provider saves the second service provider information and the generated multiple short links in the second link publication information, and uploads the second link publication information to store the second link publication information in the second area Block.
  • the multiple short links generated by the second service provider include the short link b generated for the first service provider.
  • the terminal can obtain at least one short link that meets the target condition and is generated for the first service provider from the second link release information. If the second link posting information is not stored on the blockchain, the malicious user can modify the second link posting information and add a forged short link to the second link posting information, so that what the terminal obtains is forged Short link.
  • the terminal When the short link to be detected is a malicious short link, the terminal will mistakenly believe that the short link to be detected is safe, thus there is a security risk.
  • the second link release information By storing the second link release information on the blockchain, the second link is released The information cannot be changed, so as to ensure that the short link obtained by the terminal is a safe and effective short link.
  • the terminal can regard the generation time of the short link within the target time period as the target condition.
  • the terminal obtains at least one short link that meets the target condition generated by the second service provider for the first service provider from the second link release information of the second service provider stored in the second block, and the step may be: terminal Determine the target time period according to the receiving time of the above target text.
  • the terminal can filter multiple short links included in the second link release information of the second service provider stored in the second block, and obtain at least one generated by the second service provider for the first service provider within the target time period. Short link.
  • Short link By limiting the generation time of the short link, it is possible to filter out the short links that are not in the target time period when obtaining the above at least one short link, thereby improving the obtaining efficiency.
  • the target text as a short message as an example. Since only the second service provider generates the short link b first, the terminal can receive the short message including the short link b. Therefore, the generation time of the short link will not be later than the receiving time of the short message.
  • the generation time of the short link is generally not earlier than 24 hours before the receiving time of the short message. That is, the target time period is 24 hours before the SMS is received.
  • the target time period can also be set to 36 hours or 48 hours before receiving the short message, which is not limited in the embodiment of the present application.
  • the terminal can use the service type as the target condition to determine the aforementioned at least one short link.
  • the above-mentioned second link release information further includes the service type corresponding to any short link generated by the second service provider, wherein one short link corresponds to one service type. From the second link release information of the second service provider stored in the second block, the terminal obtains at least one short link that is generated by the second service provider for the first service provider and meets the target condition.
  • the step may be: the terminal responds to the target text Perform content identification, determine the service type corresponding to the short link to be detected, and obtain the target service type.
  • the terminal From the second link release information of the second service provider stored in the second block, the terminal obtains at least one short link belonging to the target service type generated by the second service provider for the first service provider.
  • the service type of the short link By restricting the service type of the short link, it is possible to filter out the short links that are not within the target time period when obtaining the above-mentioned at least one short link, thereby improving the obtaining efficiency.
  • the service type corresponding to the original link a generated by the first service provider is A
  • the service type of the generated at least one short link is also A
  • the service Type A corresponds to multiple short links
  • the short link b corresponding to the original link a only corresponds to one service type.
  • the second service provider stores the service type corresponding to the short link in the second link release information.
  • the terminal performs content identification on the content of the short message, and can determine that the short message indicates a service that modifies the account information type, and then uses the modified account information type as the target service type.
  • the terminal screens at least one short link whose service type is the target service type from the second link release information.
  • the terminal can determine the aforementioned at least one short link by using whether the short link expires as a target condition.
  • the foregoing second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired. From the second link release information of the second service provider stored in the second block, the terminal obtains at least one short link that is generated by the second service provider for the first service provider and meets the target condition.
  • the step may be: At least one piece of time limit information is acquired from the second link release information of the second service provider stored in the block.
  • the terminal Based on the at least one piece of time limit information, the terminal obtains from the second link release information at least one unexpired short link generated by the second service provider for the first service provider.
  • the time limit information of the short link it is possible to filter out the expired short links when acquiring the above-mentioned at least one short link, thereby improving the acquisition efficiency and at the same time improving the effectiveness of the acquired at least one short link.
  • the second service provider When the second service provider generates the short link b, it can set the time limit information of the short link b, and within the valid period indicated by the time limit information, the short link b can be triggered to jump to the original link a.
  • the short link b points to the original link c in January, points to the original link d in February, and currently points to the original link a.
  • the second service provider may store the time limit information in the second link release information.
  • the embodiments of the present application exemplarily show the process of determining the at least one short link separately through different target conditions. In fact, it is also possible to determine the at least one short link through two or more target conditions at the same time. Link.
  • the target conditions can be freely combined, which is not limited in the embodiment of the present application.
  • the storage of short links can also be achieved in other ways, for example, through cloud storage, that is, multiple service providers related to the short link will relate the information related to the short link to the original link.
  • the information is stored in a database with high credibility, and the database with high credibility can be built through cloud storage technology.
  • This highly reliable database can provide information query entry and set access permissions to ensure data security.
  • the terminal can send an acquisition request to the link detection server through the link detection client, and the link detection server having the access authority of the database with higher reliability can obtain the at least one short link.
  • a security assistant may be installed in the mobile phone, and the backend server of the security assistant has the access authority to the database with high reliability, so that the information related to the short link and the original link can be obtained, so as to realize the short link to be detected. Detection.
  • short message senders, network service providers, and information security supervision departments can all have access rights to the highly reliable database.
  • the terminal determines that the short link to be detected is an insecure link.
  • the terminal after the terminal obtains the above-mentioned at least one short link, it can compare the short link to be detected with the at least one short link one by one. If there is no short link in the at least one short link and the short link to be detected If the short links are the same, it is determined that the second service provider has not generated the short link to be detected, that is, the short link to be detected may be a malicious short link forged by a malicious user. Therefore, the terminal can determine that the short link to be detected is unsafe the link to.
  • the terminal can process the target text based on the detection result.
  • the step for the terminal to process the target text may be: the terminal can obtain the target processing method corresponding to the target text, and the terminal can process the target text based on the target processing method, where the target processing method includes isolation, deletion, and labeling. , Display at least one of the prompt messages.
  • the terminal After determining that the short link b included in the short message is an unsafe link, the terminal displays a prompt message, such as "url.cn.xxxxx is an unsafe link, please pay attention to information security".
  • the terminal can also isolate the short message. For example, if the short message is included in the interception information, the short link in the interception information is in an unclickable state, so as to prevent the user from clicking the unsafe short link b by mistake.
  • the terminal can also directly delete the short message when the user has set the delete authority, and the deleted short message can be temporarily stored in the recycle bin for easy reference by the user.
  • the terminal can also indicate that the short link b is unsafe by means of marking, such as highlighting the short message in red and marking the word "unsafe".
  • marking such as highlighting the short message in red and marking the word "unsafe".
  • the terminal can show the detection result to the user, and process the target text based on the user's operation.
  • the step for the terminal to process the target text may be: in response to receiving the user's selection operation, the terminal displays the target interface, the target interface including delete, trust, query and other tabs. In response to the trigger operation of any tab, the terminal executes the operation corresponding to the tab.
  • the terminal can also show the user the owner of the original link corresponding to the short link to be detected. If the holding subject displayed by the terminal is not the xx game in the short message, the user judges that the link is not secure and the user can choose to delete the short message; if the holding subject displayed by the terminal is the xx game in the short message, it means that the terminal may If it is a misjudgment, the user can judge that the link is safe, and the user can also choose to trust the short message; if the user thinks that he should not receive the short message to modify the account information, he can choose to query, and the terminal will publish the information from the first link Obtain and display the sending list of the short message to the user, so that the user can judge whether the short message is reasonable or not.
  • the processing method for the target text can also be implemented automatically by the terminal based on the preset target processing method, that is, it detects that the short link in the target text has a security problem, and then directly executes the target text Target processing methods to improve safety and intelligence of safety detection.
  • the terminal determines the location of the short link to be detected based on the first link publishing information of the first service provider and the second link publishing information of the second service provider. safety.
  • the terminal can further verify the short link, thereby Determine whether the short link is safe.
  • the terminal can further detect the short link based on the time limit information corresponding to any short link generated by the second service provider included in the second link release information, where the time limit information is used to indicate the Whether the short link expires.
  • the step for the terminal to further verify the short link may be: in response to the short link to be detected being included in the at least one short link, the terminal obtains target time limit information, and the target time limit information is obtained from the second link release information The time limit information corresponding to the short link to be detected.
  • the terminal can display first prompt information, and the first prompt information is used to prompt that the short link to be detected has expired. The information is implemented to determine whether the short link to be detected is still valid, so as to prevent the user from accessing the invalid short link or the short link pointing to a malicious website, thereby ensuring the user's information security.
  • the time limit information corresponding to the short link b generated by the second service provider indicates that the short link b has expired, that is, the short link b currently no longer points to the original link a, but points to the original link d.
  • the webpage corresponding to the original link d may be a webpage generated or hijacked by a malicious user and used to defraud the user's property information.
  • the terminal prompts the user by displaying a prompt message similar to "the short link has expired and is at risk".
  • the terminal can further detect the short link based on the first content information corresponding to any short link generated by the second service provider included in the second link publishing information.
  • the first content information is used to indicate at least one of a screenshot of the page corresponding to the short link, a feature value of the page, and page parameter information.
  • the step of further verifying the short link by the terminal may be: in response to the short link to be detected is included in at least one short link, the terminal obtains the target first content information, and the target first content information is the information published from the second link. The acquired first content information corresponding to the short link to be detected.
  • the terminal can display second prompt information, which is used to indicate that the short link to be detected is an unsafe link.
  • the target first content information corresponding to the short link stored in the blockchain with the content information obtained from the actual visit, it can be determined whether the content of the webpage actually redirected by the short link to be detected has changed. Give reminders to ensure the user’s information security.
  • the second service provider After the second service provider generates the short link b for the original link a, it will also obtain the screenshot of the short link b redirecting to the original link a, the screenshot of the webpage corresponding to the original link a, the feature value of the webpage corresponding to the original link a, and the original
  • the content information corresponding to the short link b is stored in the second link publishing information.
  • the screenshot may include screenshots displayed on different devices of the webpage corresponding to the original link a, such as screenshots on the computer side and screenshots on the mobile phone side.
  • the terminal can pass MD5 (Message Digest Algorithm 5) algorithm, TF (Term Frequency) algorithm, DF (Document Frequency) algorithm, and TF-IDF (Term Frequency-Inverse Document Frequency) algorithm. At least one of the algorithms for checking the feature value in the content information.
  • the terminal can also compare screenshots of web pages in the content information through image recognition algorithms. Based on the result of the check and comparison, the terminal can determine whether the target first content information is consistent with the content information actually accessed. If they are inconsistent, it means that the content of the webpage actually redirected by the short link to be detected has changed, and there may be a risk of defrauding user information.
  • the terminal displays a prompt message similar to "the content of the webpage has changed and there is a risk" to prompt the user.
  • the target first content information and the actual access content information do not have to be 100% identical. If the similarity reaches the target threshold, such as 90%, 85%, or 80%, the terminal can also determine the target content. 1.
  • the content information is consistent with the content information obtained by the actual visit, and there is no risk.
  • the terminal can publish the original link corresponding to any short link generated by the second service provider included in the second link information, and publish the second content corresponding to the original link included in the first link information.
  • Information to further check the short link is used to indicate at least one of a screenshot of the page corresponding to the original link, a feature value of the page, and page parameter information.
  • the step for the terminal to further verify the short link may be: in response to the short link to be detected is included in at least one short link, the terminal obtains the target original link, and the target original link is the pending link obtained from the second link release information. Detect the original link corresponding to the short link.
  • the terminal obtains the target second content information, and the target second content information is the second content information corresponding to the target original link obtained from the first link publishing information.
  • the terminal displays third prompt information, which is used to indicate that the short link to be detected is an unsafe link.
  • the first service provider creates the webpage corresponding to the original link a
  • it can be able to parameter information such as the label information of the page corresponding to the original link a, the feature value of the page corresponding to the original link a, and a screenshot of the page corresponding to the original link a
  • the screenshot includes screenshots displayed on different devices of the webpage corresponding to the original link a, such as screenshots on the computer side and screenshots on the mobile phone side.
  • the way the terminal compares the content information can refer to the content of the previous example, which will not be repeated here.
  • the terminal can perform a check based on the original link corresponding to any short link generated by the second service provider included in the second link posting information, and the account list corresponding to the original link included in the first link posting information. This short link is further tested. Among them, the account list is used to indicate at least one account that received the original link.
  • the step for the terminal to further verify the short link may be: in response to the short link to be detected is included in at least one short link, the terminal obtains the target original link, and the target original link is the pending link obtained from the second link release information. Detect the original link corresponding to the short link.
  • the terminal obtains a list of target accounts, which is a list of accounts corresponding to the target original link obtained from the first link release information.
  • the terminal displays fourth prompt information, which is used to indicate that the short link to be detected is an insecure link.
  • the first service provider can set up an account list for each original link to receive the original link or the short link corresponding to the original link.
  • the account in the account list is a mobile phone number or an IMEI (International Mobile Equipment Identity (International Mobile Equipment Identity), etc.
  • the terminal obtains the list of accounts corresponding to the original link a. If there is an account currently logged in to the terminal in the list, it means that the short link to be detected is indeed sent to the user of the terminal; if there is no account currently logged in to the terminal in the list, this Indicates that the short link to be detected is indeed not sent to the terminal user.
  • the terminal determines that there is a certain risk in the short link to be detected.
  • the terminal prompts the user by displaying a prompt message similar to "The information sending object is wrong, please pay attention to the information security".
  • the first service provider information included in the first link release information the second service provider information associated with the first service provider information, at least one original link, content information corresponding to any original link, and any A list of accounts and other information corresponding to the original link and the second service provider information included in the second link release information, at least one short link, content information corresponding to any short link, time limit information corresponding to any short link, etc. It can be used to detect short links to be detected, and can also be used as evidence information.
  • the terminal may receive a deposit instruction triggered by the user, and in response to receiving the deposit instruction, generate deposit information, which is used to indicate information associated with the process of accessing the page corresponding to the short link to be detected.
  • the certification information includes, but is not limited to, the foregoing first link posting information and the foregoing second link posting information. It can also include channel parameters, such as the port number for sending short messages in the short message industry. It can also include device information collected with the user's consent, such as browser version, browser type, terminal device information, network parameters, etc.
  • the terminal device information can be an IP (Internet Protocol, Internet Protocol) address, and a MAC (Media Access Control Address, media access control address) address.
  • the terminal can send a report request to the forensic device after receiving the foregoing evidence storage instruction, and the report request is used to instruct the forensic device to obtain evidence for the short link to be detected.
  • the forensic equipment of the impartial agency can automatically collect evidence, avoiding the problem of failure of the forensic due to the inability of the impartial agency to collect evidence during non-working hours.
  • the above steps 601 to 604 are optional implementations in the embodiment of this application.
  • the link detection method provided in this application can also be implemented in other implementations, for example, the first service provider generates the result of the second service provider. At least one short link is stored in the first link release information of the first service provider, thereby shortening the step of obtaining the at least one short link by the terminal and saving time. It is also possible to store the information used in the link detection process through a non-blockchain system with high credibility, so that the link detection method does not rely on the blockchain system, thereby increasing the application range of the link detection method. The embodiments of the present application do not limit this.
  • the above steps 601 to 604 exemplarily show the manner of link detection through the terminal.
  • the target text may also be reviewed by multiple intermediate service providers, such as short message service providers, network operators, service agents, and so on.
  • the intermediary service provider can use the link detection method provided in this application to obtain the above-mentioned first link release information and the first link from the blockchain when receiving the target text including the short link to be detected.
  • the second link releases information to detect the short link to be detected.
  • the short link to be detected is a short link generated for the first service provider, so as to determine whether the short link to be detected is safe.
  • Fig. 7 is a block diagram of a link detection device according to an embodiment of the present application.
  • the device is used to perform the steps in the execution of the above-mentioned link detection method.
  • the device includes: an acquisition module 701 and a determination module 702.
  • the obtaining module 701 is configured to obtain first service provider information from target text, where the target text includes short links to be detected.
  • the obtaining module 701 is further configured to obtain at least one short connection based on the information of the first service provider.
  • the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the first service provider.
  • the service provider indicated by the information, the second service provider is used to provide short link generation services.
  • the determining module 702 is configured to determine that the short link to be detected is an unsafe link in response to that the short link to be detected is not included in the at least one short link.
  • the obtaining module 701 is further configured to obtain the second service provider information associated with the first service provider information based on the first service provider information. Based on the second service provider information, at least one short link is obtained from the short links associated with the second service provider information.
  • the obtaining module 701 is further configured to determine the first block from the blockchain system based on the first service provider information, and the first block is used to store the first link release information of the first service provider. Obtain the second service provider information from the first link release information of the first service provider stored in the first block.
  • the acquiring module 701 is also used to determine the second block from the blockchain system based on the second service provider information, and the second block is used to store the second link release information of the second service provider. Obtain at least one short link from the second link release information of the second service provider stored in the second block.
  • the target condition is at least one of the following:
  • the short link generation time is within the target time period.
  • the short link has not expired.
  • the business type to which the short link belongs is consistent with the target business type indicated by the target text.
  • the obtaining module 701 is further configured to determine the target time period according to the receiving time of the target text. Filter multiple short links included in the second link release information of the second service provider stored in the second block, and obtain at least one short link.
  • the second link release information further includes the service type corresponding to any short link generated by the second service provider, and one short link corresponds to one service type.
  • the obtaining module 701 is also used to perform content recognition on the target text and determine the target service type corresponding to the short link to be detected. Obtain at least one short link belonging to the target service type from the second link release information of the second service provider stored in the second block.
  • the second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired.
  • the obtaining module 701 is further configured to obtain at least one piece of time limit information from the second link release information of the second service provider stored in the second block. Based on at least one piece of time limit information, at least one unexpired short link is obtained from the second link release information.
  • the second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired.
  • the device also includes:
  • the obtaining module 701 is further configured to obtain target time limit information in response to the short link to be detected being included in at least one short link, where the target time limit information is the time limit information corresponding to the short link to be detected obtained from the second link publishing information.
  • the first display module is configured to display first prompt information in response to the target time limit information indicating that the short link to be detected has expired, and the first prompt information is used to prompt that the short link to be detected has expired.
  • the second link publishing information further includes first content information corresponding to any short link generated by the second service provider, and the first content information is used to indicate the screenshot of the page corresponding to the short link, the page feature value, and the page At least one of parameter information.
  • the device also includes:
  • the obtaining module 701 is further configured to obtain target first content information in response to the short link to be detected being included in at least one short link, where the target first content information corresponds to the short link to be detected obtained from the second link publishing information The first content information.
  • the second display module is configured to display second prompt information in response to the target first content information being inconsistent with the content information obtained by accessing the short link to be detected.
  • the second prompt information is used to indicate that the short link to be detected is an unsafe link.
  • the second link publishing information further includes the original link corresponding to any short link generated by the second service provider, and the first link publishing information further includes the second content information corresponding to the original link.
  • the first link publishing information further includes the second content information corresponding to the original link.
  • the device also includes:
  • the obtaining module 701 is further configured to obtain a target original link in response to the short link to be detected being included in at least one short link, where the target original link is the original link corresponding to the short link to be detected obtained from the second link publishing information.
  • the obtaining module 701 is further configured to obtain target second content information, where the target second content information is the second content information corresponding to the target original link obtained from the first link publishing information.
  • the third display module is configured to display third prompt information in response to the target second content information being inconsistent with the content information obtained by accessing the short link to be detected.
  • the third prompt information is used to indicate that the short link to be detected is an unsafe link.
  • the second link posting information further includes the original link corresponding to any short link generated by the second service provider
  • the first link posting information further includes a list of accounts corresponding to the original link, and the account list is used to indicate the receipt of the original link. At least one account.
  • the device also includes:
  • the obtaining module 701 is further configured to obtain a target original link in response to the short link to be detected being included in at least one short link, where the target original link is the original link corresponding to the short link to be detected obtained from the second link publishing information.
  • the obtaining module 701 is also used to obtain a list of target accounts, which is a list of accounts corresponding to the target original link obtained from the first link release information.
  • the fourth display module is used to display fourth prompt information in response to the account currently logged in by the terminal is not in the target account list, and the fourth prompt information is used to indicate that the short link to be detected is an insecure link.
  • the device further includes:
  • the obtaining module 701 is further configured to obtain a target processing mode corresponding to the target text, and the target processing mode includes at least one of isolation, deletion, labeling, and display of prompt information.
  • the text processing module is used to process the target text based on the target processing mode.
  • the device further includes:
  • the generating module is used to generate deposit information in response to receiving the deposit instruction, and the deposit information is used to indicate information associated with the process of accessing the page corresponding to the short link to be detected.
  • the submission module is used to submit the deposit information.
  • the device further includes:
  • the request sending module is used to send a report request to the forensic device, and the report request is used to instruct the forensic device to obtain evidence for the short link to be detected.
  • the acquiring module 701 is also used to perform punctuation detection on the target text including the short link to be detected.
  • the field indicated by the target punctuation mark is used as the first service provider information.
  • the short link to be detected is associated with at least one of text, picture, button, and video in the target text
  • the link detection device provided in the above embodiment runs an application program, only the division of the above-mentioned functional modules is used as an example for illustration. In actual applications, the above-mentioned functions can be allocated by different functional modules as needed. That is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above.
  • the link detection device provided in the above embodiment and the link detection method embodiment belong to the same concept, and the specific implementation process is detailed in the method embodiment, which will not be repeated here.
  • the electronic device can be implemented as a terminal or a server.
  • the terminal can implement the operations performed by the above-mentioned link detection method.
  • the server can be implemented by the terminal.
  • the operations performed by the above-mentioned link detection method may also be realized by the interaction between the server and the terminal.
  • the electronic device may be implemented as a terminal.
  • FIG. 8 shows a structural block diagram of a terminal 800 provided by an exemplary embodiment of the present application.
  • the terminal FIG. 8 shows a structural block diagram of a terminal 800 provided by an exemplary embodiment of the present invention.
  • the terminal 800 can be: smart phones, tablet computers, MP3 players (Moving Picture Experts Group Audio Layer III, Motion Picture Experts compress standard audio layer 3), MP4 (Moving Picture Experts Group Audio Layer IV, Motion Picture Experts Group Audio Layer IV, Motion Picture Experts compress standard audio Level 4) Player, laptop or desktop computer.
  • the terminal 800 may also be called user equipment, portable terminal, laptop terminal, desktop terminal and other names.
  • the terminal 800 includes a processor 801 and a memory 802.
  • the processor 801 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on.
  • the processor 801 may adopt at least one hardware form among DSP (Digital Signal Processing), FPGA (Field-Programmable Gate Array), and PLA (Programmable Logic Array, Programmable Logic Array). accomplish.
  • the processor 801 may also include a main processor and a coprocessor.
  • the main processor is a processor used to process data in the wake state, also called a CPU (Central Processing Unit, central processing unit); the coprocessor is A low-power processor used to process data in the standby state.
  • the processor 801 may be integrated with a GPU (Graphics Processing Unit, image processor), and the GPU is used to render and draw content that needs to be displayed on the display screen.
  • the processor 801 may further include an AI (Artificial Intelligence) processor, and the AI processor is used to process computing operations related to machine learning.
  • AI Artificial Intelligence
  • the memory 802 may include one or more computer-readable storage media, which may be non-transitory.
  • the memory 802 may also include high-speed random access memory and non-volatile memory, such as one or more magnetic disk storage devices and flash memory storage devices.
  • the non-transitory computer-readable storage medium in the memory 802 is used to store at least one instruction, and the at least one instruction is used to be executed by the processor 801 in the following steps:
  • the first service provider information is obtained from the target text, and the target text includes the short link to be detected.
  • At least one short connection is acquired based on the first service provider information, the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the service provider indicated by the first service provider information, The second service provider is used to provide short link generation services.
  • the processor is also used to execute:
  • At least one short link is obtained from the short links associated with the second service provider information.
  • the processor is also used to execute:
  • the first block is determined from the blockchain system, and the first block is used to store the first link release information of the first service provider.
  • the processor is also used to execute:
  • the second block is determined from the blockchain system, and the second block is used to store the second link release information of the second service provider.
  • the target condition is at least one of the following:
  • the short link generation time is within the target time period.
  • the short link has not expired.
  • the business type to which the short link belongs is consistent with the target business type indicated by the target text.
  • the processor is also used to execute:
  • the second link release information further includes the service type corresponding to any short link generated by the second service provider, and one short link corresponds to one service type.
  • the processor is also used to execute:
  • the second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired.
  • the processor is also used to execute:
  • At least one unexpired short link is obtained from the second link release information.
  • the second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired.
  • the processor is also used to execute:
  • target time limit information is obtained, where the target time limit information is the time limit information corresponding to the short link to be detected obtained from the second link publishing information.
  • first prompt information is displayed, and the first prompt information is used to prompt that the short link to be detected has expired.
  • the second link publishing information further includes first content information corresponding to any short link generated by the second service provider, and the first content information is used to indicate the screenshot of the page corresponding to the short link, the page feature value, and the page At least one of parameter information.
  • the processor is also used to execute:
  • the target first content information is acquired, and the target first content information is the first content information corresponding to the short link to be detected acquired from the second link publishing information.
  • the second prompt information is displayed, and the second prompt information is used to indicate that the short link to be detected is an unsafe link.
  • the second link publishing information further includes the original link corresponding to any short link generated by the second service provider, and the first link publishing information further includes the second content information corresponding to the original link.
  • the first link publishing information further includes the second content information corresponding to the original link.
  • the processor is also used to execute:
  • the target original link is obtained, where the target original link is the original link corresponding to the short link to be detected obtained from the second link publishing information.
  • the target second content information is acquired, and the target second content information is the second content information corresponding to the target original link acquired from the first link publishing information.
  • the third prompt information is displayed, and the third prompt information is used to indicate that the short link to be detected is an unsafe link.
  • the second link posting information further includes the original link corresponding to any short link generated by the second service provider
  • the first link posting information further includes a list of accounts corresponding to the original link, and the account list is used to indicate the receipt of the original link. At least one account.
  • the processor is also used to execute:
  • the target original link is obtained, where the target original link is the original link corresponding to the short link to be detected obtained from the second link publishing information.
  • a list of target accounts is obtained, and the list of target accounts is a list of accounts corresponding to the original link of the target obtained from the information released by the first link.
  • fourth prompt information is displayed, and the fourth prompt information is used to indicate that the short link to be detected is an insecure link.
  • the processor is also used to execute:
  • attestation information is generated, and the attestation information is used to indicate information associated with the process of accessing the page corresponding to the short link to be detected.
  • the processor is also used to execute:
  • the processor is also used to execute:
  • the target processing method corresponding to the target text is acquired, and the target processing method includes at least one of isolation, deletion, labeling, and display of prompt information.
  • the target text is processed.
  • the processor is also used to execute:
  • the field indicated by the target punctuation mark is used as the first service provider information.
  • the short link to be detected is associated with at least one of text, picture, button, and video in the target text.
  • the terminal 800 may optionally further include: a peripheral device interface 803 and at least one peripheral device.
  • the processor 801, the memory 802, and the peripheral device interface 803 may be connected by a bus or a signal line.
  • Each peripheral device can be connected to the peripheral device interface 803 through a bus, a signal line, or a circuit board.
  • the peripheral device includes: at least one of a radio frequency circuit 804, a display screen 805, a camera component 806, an audio circuit 807, a positioning component 808, and a power supply 809.
  • the peripheral device interface 803 may be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 801 and the memory 802.
  • the processor 801, the memory 802, and the peripheral device interface 803 are integrated on the same chip or circuit board; in some other embodiments, any one of the processor 801, the memory 802, and the peripheral device interface 803 or The two can be implemented on a separate chip or circuit board, which is not limited in this embodiment.
  • the radio frequency circuit 804 is used for receiving and transmitting RF (Radio Frequency, radio frequency) signals, also called electromagnetic signals.
  • the radio frequency circuit 804 communicates with a communication network and other communication devices through electromagnetic signals.
  • the radio frequency circuit 804 converts electrical signals into electromagnetic signals for transmission, or converts received electromagnetic signals into electrical signals.
  • the radio frequency circuit 804 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a user identity module card, and so on.
  • the radio frequency circuit 804 can communicate with other terminals through at least one wireless communication protocol.
  • the wireless communication protocol includes, but is not limited to: metropolitan area networks, various generations of mobile communication networks (2G, 3G, 4G, and 5G), wireless local area networks, and/or WiFi (Wireless Fidelity, wireless fidelity) networks.
  • the radio frequency circuit 804 may also include a circuit related to NFC (Near Field Communication), which is not limited in this application.
  • the display screen 805 is used to display UI (User Interface).
  • the UI can include graphics, text, icons, videos, and any combination thereof.
  • the display screen 805 also has the ability to collect touch signals on or above the surface of the display screen 805.
  • the touch signal can be input to the processor 801 as a control signal for processing.
  • the display screen 805 may also be used to provide virtual buttons and/or virtual keyboards, also called soft buttons and/or soft keyboards.
  • the display screen 805 there may be one display screen 805, which is provided with the front panel of the terminal 800; in other embodiments, there may be at least two display screens 805, which are respectively arranged on different surfaces of the terminal 800 or in a folding design; In still other embodiments, the display screen 805 may be a flexible display screen, which is arranged on the curved surface or the folding surface of the terminal 800. Furthermore, the display screen 805 can also be set as a non-rectangular irregular pattern, that is, a special-shaped screen.
  • the display screen 805 may be made of materials such as LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode, organic light-emitting diode).
  • the camera assembly 806 is used to capture images or videos.
  • the camera assembly 806 includes a front camera and a rear camera.
  • the front camera is set on the front panel of the terminal, and the rear camera is set on the back of the terminal.
  • the camera assembly 806 may also include a flash.
  • the flash can be a single-color flash or a dual-color flash. Dual color temperature flash refers to a combination of warm light flash and cold light flash, which can be used for light compensation under different color temperatures.
  • the audio circuit 807 may include a microphone and a speaker.
  • the microphone is used to collect sound waves of the user and the environment, and convert the sound waves into electrical signals to be input to the processor 801 for processing, or input to the radio frequency circuit 804 to implement voice communication. For the purpose of stereo collection or noise reduction, there may be multiple microphones, which are respectively set in different parts of the terminal 800.
  • the microphone can also be an array microphone or an omnidirectional collection microphone.
  • the speaker is used to convert the electrical signal from the processor 801 or the radio frequency circuit 804 into sound waves.
  • the speaker can be a traditional thin-film speaker or a piezoelectric ceramic speaker.
  • the speaker When the speaker is a piezoelectric ceramic speaker, it can not only convert the electrical signal into human audible sound waves, but also convert the electrical signal into human inaudible sound waves for distance measurement and other purposes.
  • the audio circuit 807 may also include a headphone jack.
  • the positioning component 808 is used to locate the current geographic location of the terminal 800 to implement navigation or LBS (Location Based Service, location-based service).
  • the positioning component 808 may be a positioning component based on the GPS (Global Positioning System, Global Positioning System) of the United States, the Beidou system of China, the Grenas system of Russia, or the Galileo system of the European Union.
  • the power supply 809 is used to supply power to various components in the terminal 800.
  • the power source 809 may be alternating current, direct current, disposable batteries, or rechargeable batteries.
  • the rechargeable battery may support wired charging or wireless charging.
  • the rechargeable battery can also be used to support fast charging technology.
  • the terminal 800 further includes one or more sensors 810.
  • the one or more sensors 810 include, but are not limited to: an acceleration sensor 811, a gyroscope sensor 812, a pressure sensor 813, a fingerprint sensor 814, an optical sensor 815, and a proximity sensor 816.
  • the acceleration sensor 811 can detect the magnitude of acceleration on the three coordinate axes of the coordinate system established by the terminal 800.
  • the acceleration sensor 811 can be used to detect the components of the gravitational acceleration on three coordinate axes.
  • the processor 801 may control the display screen 805 to display the user interface in a horizontal view or a vertical view according to the gravity acceleration signal collected by the acceleration sensor 811.
  • the acceleration sensor 811 may also be used for the collection of game or user motion data.
  • the gyroscope sensor 812 can detect the body direction and rotation angle of the terminal 800, and the gyroscope sensor 812 can cooperate with the acceleration sensor 811 to collect the user's 3D actions on the terminal 800.
  • the processor 801 can implement the following functions according to the data collected by the gyroscope sensor 812: motion sensing (such as changing the UI according to the user's tilt operation), image stabilization during shooting, game control, and inertial navigation.
  • the pressure sensor 813 may be disposed on the side frame of the terminal 800 and/or the lower layer of the display screen 805.
  • the processor 801 performs left and right hand recognition or quick operation according to the holding signal collected by the pressure sensor 813.
  • the processor 801 controls the operability controls on the UI interface according to the pressure operation of the user on the display screen 805.
  • the operability control includes at least one of a button control, a scroll bar control, an icon control, and a menu control.
  • the fingerprint sensor 814 is used to collect the user's fingerprint.
  • the processor 801 identifies the user's identity according to the fingerprint collected by the fingerprint sensor 814, or the fingerprint sensor 814 identifies the user's identity according to the collected fingerprint. When it is recognized that the user's identity is a trusted identity, the processor 801 authorizes the user to perform related sensitive operations, including unlocking the screen, viewing encrypted information, downloading software, paying, and changing settings.
  • the fingerprint sensor 814 may be provided on the front, back or side of the terminal 800. When a physical button or a manufacturer logo is provided on the terminal 800, the fingerprint sensor 814 may be integrated with the physical button or the manufacturer logo.
  • the optical sensor 815 is used to collect the ambient light intensity.
  • the processor 801 may control the display brightness of the display screen 805 according to the ambient light intensity collected by the optical sensor 815. Specifically, when the ambient light intensity is high, the display brightness of the display screen 805 is increased; when the ambient light intensity is low, the display brightness of the display screen 805 is decreased.
  • the processor 801 may also dynamically adjust the shooting parameters of the camera assembly 806 according to the ambient light intensity collected by the optical sensor 815.
  • the proximity sensor 816 also called a distance sensor, is usually arranged on the front panel of the terminal 800.
  • the proximity sensor 816 is used to collect the distance between the user and the front of the terminal 800.
  • the processor 801 controls the display screen 805 to switch from the on-screen state to the off-screen state; when the proximity sensor 816 detects When the distance between the user and the front of the terminal 800 gradually increases, the processor 801 controls the display screen 805 to switch from the rest screen state to the bright screen state.
  • FIG. 8 does not constitute a limitation on the terminal 800, and may include more or fewer components than shown in the figure, or combine certain components, or adopt different component arrangements.
  • FIG. 9 is a schematic structural diagram of a server provided according to an embodiment of the present application.
  • the server 900 may have relatively large differences due to different configurations or performance, and may include one or more processors ( Central Processing Units (CPU) 901 and one or more memories 902, where at least one instruction is stored in the memory 902, and the at least one instruction is loaded and executed by the processor 901 to implement the foregoing method embodiments Provided method.
  • the server may also have components such as a wired or wireless network interface, a keyboard, an input and output interface for input and output, and the server may also include other components for implementing device functions, which will not be described in detail here.
  • the embodiment of the present application also provides a computer-readable storage medium, the computer-readable storage medium is applied to an electronic device, the computer-readable storage medium stores at least one piece of program code, and the at least one piece of program code is used by a processor Execute to achieve the following steps:
  • the first service provider information is obtained from the target text, and the target text includes the short link to be detected.
  • At least one short connection is acquired based on the first service provider information, the short connection is a short link that meets the target condition generated by the second service provider for the first service provider, and the first service provider is the service provider indicated by the first service provider information, The second service provider is used to provide short link generation services.
  • the processor is also used to execute:
  • At least one short link is obtained from the short links associated with the second service provider information.
  • the processor is also used to execute:
  • the first block is determined from the blockchain system, and the first block is used to store the first link release information of the first service provider.
  • the processor is also used to execute:
  • the second block is determined from the blockchain system, and the second block is used to store the second link release information of the second service provider.
  • the target condition is at least one of the following:
  • the short link generation time is within the target time period.
  • the short link has not expired.
  • the business type to which the short link belongs is consistent with the target business type indicated by the target text.
  • the processor is also used to execute:
  • the second link release information further includes the service type corresponding to any short link generated by the second service provider, and one short link corresponds to one service type.
  • the processor is also used to execute:
  • the second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired.
  • the processor is also used to execute:
  • At least one unexpired short link is obtained from the second link release information.
  • the second link publishing information further includes time limit information corresponding to any short link generated by the second service provider, and the time limit information is used to indicate whether the short link has expired.
  • the processor is also used to execute:
  • target time limit information is obtained, where the target time limit information is the time limit information corresponding to the short link to be detected obtained from the second link publishing information.
  • first prompt information is displayed, and the first prompt information is used to prompt that the short link to be detected has expired.
  • the second link publishing information further includes first content information corresponding to any short link generated by the second service provider, and the first content information is used to indicate the screenshot of the page corresponding to the short link, the page feature value, and the page At least one of parameter information.
  • the processor is also used to execute:
  • the target first content information is acquired, and the target first content information is the first content information corresponding to the short link to be detected acquired from the second link publishing information.
  • the second prompt information is displayed, and the second prompt information is used to indicate that the short link to be detected is an unsafe link.
  • the second link publishing information further includes the original link corresponding to any short link generated by the second service provider, and the first link publishing information further includes the second content information corresponding to the original link.
  • the first link publishing information further includes the second content information corresponding to the original link.
  • the processor is also used to execute:
  • the target original link is obtained, where the target original link is the original link corresponding to the short link to be detected obtained from the second link publishing information.
  • the target second content information is acquired, and the target second content information is the second content information corresponding to the target original link acquired from the first link publishing information.
  • the third prompt information is displayed, and the third prompt information is used to indicate that the short link to be detected is an unsafe link.
  • the second link posting information further includes the original link corresponding to any short link generated by the second service provider
  • the first link posting information further includes a list of accounts corresponding to the original link, and the account list is used to indicate the receipt of the original link. At least one account.
  • the processor is also used to execute:
  • the target original link is obtained, where the target original link is the original link corresponding to the short link to be detected obtained from the second link publishing information.
  • a list of target accounts is obtained, and the list of target accounts is a list of accounts corresponding to the original link of the target obtained from the information released by the first link.
  • fourth prompt information is displayed, and the fourth prompt information is used to indicate that the short link to be detected is an insecure link.
  • the processor is also used to execute:
  • attestation information is generated, and the attestation information is used to indicate information associated with the process of accessing the page corresponding to the short link to be detected.
  • the processor is also used to execute:
  • the processor is also used to execute:
  • the target processing method corresponding to the target text is acquired, and the target processing method includes at least one of isolation, deletion, labeling, and display of prompt information.
  • the target text is processed.
  • the processor is also used to execute:
  • the field indicated by the target punctuation mark is used as the first service provider information.
  • the short link to be detected is associated with at least one of text, picture, button, and video in the target text.
  • the program can be stored in a computer-readable storage medium.
  • the storage medium mentioned can be a read-only memory, a magnetic disk or an optical disk, etc.

Abstract

本申请提供了一种链接检测方法、装置、电子设备及存储介质,属于互联网安全技术领域。通过本申请实施例提供的技术方案,通过获取第二服务商为第一服务商生成的满足目标条件的至少一个短链接,进而将该至少一个短链接与目标文本中的待检测短链接进行比对,确定该待检测短链接是否是为第一服务商生成的短链接,从而确定该待检测短链接是否安全。

Description

链接检测方法、装置、电子设备及存储介质
本申请要求于2020年2月28日提交的申请号为202010131183.6、发明名称为“链接检测方法、装置、电子设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及互联网安全技术领域,特别涉及一种链接检测方法、装置、电子设备及存储介质。
背景技术
随着互联网技术的发展,用户可以通过互联网浏览自己感兴趣的内容。用户在浏览过程中,如果想要将浏览的内容分享给其他人,可以向其他人分享该内容的链接,如新闻链接、视频链接、应用程序下载链接等。然而,链接在方便用户分享的同时,也存在一定的安全隐患。例如,恶意用户可以制作具有诈骗内容的诈骗网页,向用户发送该诈骗网页的链接来实施诈骗,而由于用户无法判断接收到的链接是否安全,所以如何对链接的安全性进行检测是一个需要解决的问题。
相关技术中,用户可以通过查询接收到的链接的注册主体,来确定链接的安全性。例如,用户接收到用于修改自己的社交账号的密码的链接,则用户可以查询该链接的注册主体是否是该社交账号的服务商,如果是,则表示该链接安全,如果不是则表示该链接不安全。
发明内容
本申请实施例提供了一种链接检测方法、装置、电子设备及存储介质,可以确定待检测短链接的安全性。所述技术方案如下:
一方面,提供了一种链接检测方法,应用于电子设备,所述方法包括:
从包括目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
另一方面,提供了一种链接检测装置,所述装置包括:
获取模块,用于从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
所述获取模块,还用于基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
确定模块,用于响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待 检测短链接为不安全的链接。
另一方面,提供了一种电子设备,所述服务器包括处理器和存储器,所述存储器用于存储至少一段程序代码,所述至少一段程序代码由所述处理器加载并执行以下步骤:
从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
另一方面,提供了一种存储介质,所述存储介质中存储有至少一段程序代码,所述至少一段程序代码用于执行以下步骤:
从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
本申请实施例提供的技术方案带来的有益效果是:
在本申请实施例中,通过获取第二服务商为第一服务商生成的满足目标条件的至少一个短链接,进而将该至少一个短链接与目标文本中的待检测短链接进行比对,确定该待检测短链接是否是为第一服务商生成的短链接,从而确定该待检测短链接是否安全。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是根据本申请实施例提供的一种区块链系统的系统架构图;
图2是根据本申请实施例提供的一种区块链的结构示意图;
图3是根据本申请实施例提供的一种新区块产生的流程图;
图4是根据本申请实施例提供的一种区块链系统中节点设备的功能架构图;
图5是根据本申请实施例提供的链接检测系统的结构框图;
图6是根据本申请实施例提供的一种链接检测方法的流程图;
图7是根据本申请实施例提供的一种链接检测装置的框图;
图8是根据本申请实施例提供的一种终端的结构示意图;
图9是根据本申请实施例提供的一种服务器的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进 一步地详细描述。
相关技术中,由于网页对应的原始链接较长,不利于推广,因此原始链接的服务商通常会通过其他服务商为该原始链接生成对应的短链接。短链接顾名思义就是形式上比较短的链接,可以替代形式较长的原始链接,来访问该原始链接对应的内容。这种情况下,用户只能查询到短链接的注册主体,而无法查询到与该短链接对应的原始链接的注册主体,从而无法判断该短链接的安全性。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
以下,对本申请实施例涉及的术语进行解释。
区块链(英文:block chain):是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层。
区块链底层平台可以包括用户管理、基础服务、智能合约以及运营监控等处理模块。其中,用户管理模块负责所有区块链参与者的身份信息管理,包括维护公私钥生成(账户管理)、密钥管理以及用户真实身份和区块链地址对应关系维护(权限管理)等,并且在授权的情况下,监管和审计某些真实身份的交易情况,提供风险控制的规则配置(风控审计);基础服务模块部署在所有区块链节点设备上,用来验证业务请求的有效性,并对有效请求完成共识后,记录到存储上,对于一个新的业务请求,基础服务先对接口适配解析和鉴权处理(接口适配),然后通过共识算法将业务信息加密(共识管理),在加密之后完整一致的传输至共享账本上(网络通信),并进行记录存储;智能合约模块负责合约的注册发行以及合约触发和合约执行,开发人员可以通过某种编程语言定义合约逻辑,发布到区块链上(合约注册),根据合约条款的逻辑,调用密钥或者其它的事件触发执行,完成合约逻辑,同时还提供对合约升级注销的功能;运营监控模块主要负责产品发布过程中的部署、配置的修改、合约设置、云适配以及产品运行中的实时状态的可视化输出,例如:告警、监控网络情况、监控节点设备健康状态等。
平台产品服务层提供典型应用的基本能力和实现框架,开发人员可以基于这些基本能力,叠加业务的特性,完成业务逻辑的区块链实现。应用服务层提供基于区块链方案的应用服务给业务参与方进行使用。
共识机制(英文:consensus mechanism):是区块链系统中实现不同节点之间建立信任、获取权益的数学算法。在区块链系统中,通过特殊节点设备的投票,可以在很短的时间内完成对交易的验证和确认,对一笔交易,如果利益不相干的若干个节点设备能够达成共识,就可以认为系统中的全部节点设备对此也能够达成共识。
智能合约(英文:smart contract):是一种旨在以信息化方式传播、验证或执行合同的计算机协议。区块链系统中的各个节点设备基于特定条件自动执行的合约程序,可以对链上存储的数据进行操作,是用户与区块链进行交互、利用区块链实现业务逻辑的重要途径。智能 合约的目的是提供优于传统合约的安全方法,并减少与合约相关的其他交易成本,它允许在没有第三方的情况下进行可信交易,这些交易可追踪且不可逆转。智能合约由交易触发,能够读取、编写和计算区块链链上的交易数据,从而支持各种商业应用的运作。能够自动执行合约条款的计算机化程序,对从外部获得的数据信息进行识别并判断,当由中央节点、联盟节点设定的条件满足时,随即触发系统自动执行相应的合约条款,以此完成本申请实施例中的交易和通用虚拟资源/机构虚拟资源的转移。本申请实施例中的智能合约分为通用和定制化两部分。通用部分支持身份认证、交易、虚拟资源转移等基础功能。定制部分用于应对第三节点设备的差异化应用场景,第三节点设备可以通过配置独立的智能合约来实现特殊的功能。
公钥(英文:public key)与私钥(英文:private key):是通过一种算法得到的一个密钥对(即一个公钥和一个私钥),公钥是密钥对中公开的部分,私钥则是非公开的部分。公钥通常用于加密数据、验证数字签名等。通过这种算法能够确保得到的密钥对是唯一的,使用这种密钥对的时候,如果用其中一个密钥加密一段数据,必须用另一个密钥解密,例如,用公钥加密数据就必须用私钥解密,如果用私钥加密也必须用公钥解密,否则解密将不会成功。
本申请实施例提供了基于上述区块链技术实现的区块链系统100,以下对该区块链系统的系统架构进行介绍。
在一些实施例中,参见图1,该区块链系统中包括多个节点设备101,此外,区块链系统还包括客户端。
其中,节点设备101是网络中的任意形式的计算设备,如服务器、主机、用户终端等。节点设备101与节点设备101之间能够共享数据。其中,节点设备101之间可以基于点对点(Peer To Peer,P2P)协议,建立P2P网络。该P2P协议是一个运行在传输控制协议(Transmission Control Protocol,TCP)协议之上的应用层协议。
在一些实施例中,每个节点设备101在进行正常工作的过程中,能够接收到输入信息,并基于接收到的输入信息维护该区块链系统内的共享数据。为了保证区块链系统内的信息互通,区块链系统中的每个节点设备之间存在信息连接,节点设备之间能够通过上述信息连接进行信息传输。例如,当区块链系统中的任意节点设备接收到输入信息时,区块链系统中的其他节点设备便基于共识算法获取该输入信息,将该输入信息作为共享数据中的数据进行存储,使得区块链系统中全部节点设备上存储的数据均一致。
在一些实施例中,区块链系统中的每个节点设备均具有对应的节点设备标识,而且区块链系统中的每个节点设备均存储有区块链系统中其他节点设备的节点设备标识,以便后续基于其他节点设备的节点设备标识,将生成的区块广播至区块链系统中的其他节点设备。每个节点设备可维护一个如下表1所示的节点设备标识列表,将节点设备名称和节点设备标识对应存储至该节点设备标识列表中。在一些实施例中,节点设备标识为IP(Internet Protocol,网络之间互联的协议)地址以及其他任一种能够用于标识该节点设备的信息,表1中仅以IP地址为例进行说明。
表1
节点设备名称 节点设备标识
节点设备1 117.114.151.174
节点设备2 117.116.189.145
节点设备N 119.123.789.258
在一些实施例中,区块链系统中的每个节点设备均存储一条相同的区块链。参见图2,区块链由多个区块组成,创始块中包括区块头和区块主体,区块头中存储有输入信息特征值、版本号、时间戳和难度值,区块主体中存储有输入信息;创始块的下一区块以创始块为父区块,下一区块中同样包括区块头和区块主体,区块头中存储有当前区块的输入信息特征值、父区块的区块头特征值、版本号、时间戳和难度值,并以此类推,使得区块链中每个区块中存储的区块数据均与父区块中存储的区块数据存在关联,保证了区块中输入信息的安全性。
在生成区块链中的各个区块时,参见图3,区块链所在的节点设备在接收到输入信息时,对输入信息进行校验,完成校验后,将输入信息存储至内存池中,并更新其用于记录输入信息的哈希树。之后,将更新时间戳更新为接收到输入信息的时间,并尝试不同的随机数,多次进行特征值计算,使得计算得到的特征值可以满足下述公式:
SHA256(SHA256(version+prev_hash+merkle_root+ntime+nbits+x))<TARGET
其中,SHA256为计算特征值所用的特征值算法;version(版本号)为区块链中相关区块协议的版本信息;prev_hash为当前区块的父区块的区块头特征值;merkle_root为输入信息的特征值;ntime为更新时间戳的更新时间;nbits为当前难度,在一段时间内为定值,并在超出固定时间段后再次进行确定;x为随机数;TARGET为特征值阈值,该特征值阈值可以基于nbits确定得到。
这样,当计算得到满足上述公式的随机数时,便可将信息对应存储,生成区块头和区块主体,得到当前区块。随后,区块链所在节点设备基于区块链系统中其他节点设备的节点设备标识,将新生成的区块分别发送给其所在的区块链系统中的其他节点设备,由其他节点设备对新生成的区块进行校验,并在完成校验后将新生成的区块添加至其存储的区块链中。
以下,对区块链系统中的节点设备101的功能架构进行介绍。
参见图4,节点设备101从功能上可以划分为硬件层、中间层、操作系统层和应用层,涉及的具体功能可以如下:
1)路由,节点设备具有的基本功能,用于支持节点设备之间的通信。
节点设备除具有路由功能外,还可以具有以下功能:
2)应用,用于部署在区块链中,根据实际业务需求而实现特定业务,记录实现功能相关的数据形成记录数据,在记录数据中携带数字签名以表示任务数据的来源,将记录数据发送到区块链系统中的其他节点设备,供其他节点设备在验证记录数据来源以及完整性成功时,将记录数据添加到临时区块中。
例如,应用实现的业务包括:
2.1)钱包,用于提供进行电子货币的交易的功能,包括发起交易(即,将当前交易的交易记录发送给区块链系统中的其他节点设备,其他节点设备验证成功后,作为承认交易有效的响应,将交易的记录数据写入区块链的临时区块中;当然,钱包还支持查询电子货币地址中剩余的电子货币。
2.2)共享账本,用于提供账目数据的存储、查询和修改等操作的功能,将对账目数据的操作的记录数据发送到区块链系统中的其他节点设备,其他节点设备验证有效后,作为承认 账目数据有效的响应,将记录数据写入临时区块中,还可以向发起操作的节点设备发送确认。
2.3)智能合约,计算机化的协议,可以执行某个合约的条款,通过部署在共享账本上的用于在满足一定条件时而执行的代码实现,根据实际的业务需求代码用于完成自动化的交易,例如查询买家所购买商品的物流状态,在买家签收货物后将买家的电子货币转移到商户的地址;当然,智能合约不仅限于执行用于交易的合约,还可以执行对接收的信息进行处理的合约。
3)区块链,包括一系列按照产生的先后时间顺序相互接续的区块(Block),新区块一旦加入到区块链中就不会再被移除,区块中记录了区块链系统中节点设备提交的记录数据。
本申请实施例提供的一种链接检测方法,能够应用于对链接进行检测的相关场景中。如,对短信中的链接进行检测的场景,微博中的链接进行检测的场景,社交类应用程序的聊天信息中的链接进行检测的场景,购物类应用程序商品搜索栏中的链接进行检测场景以及对浏览器搜索框中输入的链接进行检测的场景等。
下面简单介绍一下本申请实施例提供的链接检测方法的主要步骤:首先,电子设备从包括待检测短链接的目标文本中获取第一服务商信息。然后,电子设备基于该第一服务商信息,获取第二服务商为所述第一服务商信息所指示的第一服务商生成的满足目标条件的至少一个短链接,该第二服务商用于提供短链接生成服务。最后,响应于该待检测短链接不包括在上述至少一个短链接中,电子设备确定该待检测短链接为不安全的链接。上述技术方案,通过第二服务商为第一服务商生成的满足目标条件的至少一个短链接,进而将该至少一个短链接与目标文本中的待检测短链接进行比对,确定该待检测短链接是否是为第一服务商生成的短链接,从而确定该待检测短链接是否安全。
图5是根据本申请实施例提供的链接检测系统500的结构框图。该链接检测系统500包括:终端510和链接检测平台520。
终端510通过无线网络或有线网络与链接检测平台520相连。在一些实施例中,终端510是智能手机、游戏主机、台式计算机、平板电脑、电子书阅读器、膝上型便携计算机及车载计算机等中的至少一种。终端510安装和运行有支持链接检测的应用程序。在一些实施例中,该应用程序是通讯类应用程序、社交类应用程序、购物类应用程序、浏览器类应用程序或者安全助手类应用程序等。示意性的,终端510是用户使用的终端,终端510中运行的应用程序内登录有用户账户。
在一些实施例中,链接检测平台520包括一台服务器、多台服务器、云计算平台以及虚拟化中心中的至少一种。链接检测平台520用于为支持链接检测的应用程序提供后台服务。在一些实施例中,链接检测平台520承担主要检测工作,终端510承担次要检测工作;或者,链接检测平台520承担次要检测工作,终端510承担主要检测工作;或者,链接检测平台520或终端510分别可以单独承担检测工作。
在一些实施例中,链接检测平台520包括:接入服务器、链接检测服务器和数据库。接入服务器用于提供终端510提供接入服务。链接检测服务器用于提供链接检测有关的后台服务。链接检测服务器可以是一台或多台。当链接检测服务器是多台时,存在至少两台链接检测服务器用于提供不同的服务,和/或,存在至少两台链接检测服务器用于提供相同的服务, 比如以负载均衡方式提供同一种服务,本申请实施例对此不加以限定。在本申请实施例中,该链接检测平台520基于上述区块链系统100中的节点设备101构建得到。
终端510可以泛指多个终端中的一个,本实施例仅以终端510来举例说明。
本领域技术人员可以知晓,上述终端的数量可以更多或更少。比如上述终端可以仅为一个,或者上述终端为几十个或几百个,或者更多数量,此时上述图像识别系统还包括其他终端。本申请实施例对终端的数量和设备类型不加以限定。
本申请提供的链接检测方法,可以应用于区块链系统中,也可以应用于非区块链系统中。当该链接检测方法应用于非区块链系统中时,该链接检测方法中涉及的第一链接发布信息和第二链接发布信息,也即原始链接相关的信息和短链接相关的信息可以存储在具有较高可信度的数据库中,以保证该第一链接发布信息和第二链接发布信息的有效性。对该具有较高可信度的数据库中存储的数据的查询服务,可以由该链接检测方法中涉及的第一服务商提供,也可以由该链接检测方法中涉及的第二服务商提供,还可以由第三方的第三服务商提供,还可以由上述第一服务商、第二服务商以及其他服务商组成联盟后共同提供。当该链接检测方法应用于区块链系统中时,由于区块链系统本身就是一个具有较高可信度的数据存储系统,因此,链接检测方法中涉及的第一链接发布信息和第二链接发布信息能够存储在区块链系统中。相应的,执行该链接检测方法的电子设备为该区块链系统中的节点设备,或者为可以与该区块链系统中节点设备进行通信的设备。如电子设备是图5中的终端510,该终端510能够与基于区块链系统中节点设备构建的链接检测平台520进行通信,实现该链接检测方法。
图6是根据本申请实施例提供的一种链接检测方法的流程图,如图6所示。在本申请实施例中以该链接检测方法应用于区块链系统中,电子设备为可以与区块链系统中的节点设备进行通信的终端为例进行说明。该链接检测方法包括以下步骤:
601、终端从目标文本中获取第一服务商信息,目标文本包括待检测短链接。
在一些实施例中,终端能够接收包括待检测短链接的目标文本,该目标文本的文本内容能够用于解释该待检测短链接对应的网页内容,或者该目标文本的文本内容还能够用于引导用户访问待检测短链接所对应的网页。在一些实施例中,该目标文本为短信应用程序中的短信息、社交应用程序中的聊天信息或者资讯类应用程序中的资讯内容等。在该目标文本的固定位置的字段能够用于表示第一服务商信息,在一些实施例中,该第一服务商信息为第一服务商的名称或者第一服务商的服务商标识等用于标识第一服务商的信息,该第一服务商用于提供该目标文本的内容所描述的服务。该第一服务商用于提供对应于原始链接网页的相关信息。
在一些实施例中,终端还能够对目标文本进行标点符号检测,响应于检测到目标标点符号,终端将该目标标点符号所指示的字段作为第一服务商信息,在一些实施例中,该目标标点符号为引号“”或者括号()等,本申请实施例对此不做限定。除此之外,终端还能够通过文字识别、关键字匹配等方式来获取第一服务商信息,本申请对此不进行限制。
在一些实施例中,该待检测短链接与该目标文本中的文本、图片、视频以及按钮中的一种相关联。例如,目标文本包括文本超链接,该文本超链接的链接地址即为该待检测短链接。又例如,目标文本中的图片超链接有待检测短链接,响应于检测到对图片的触发操作,终端 基于该待检测短链接执行链接跳转步骤。
以目标文本为短信息为例进行说明。该短信息的内容用于指示终端的用户对其账户信息进行修改:“您的账户信息已过期,请点击url.cn.xxxxx对您的账户信息进行修改,以免影响您正常游戏。【xx游戏】”。其中,“xx游戏”用于指示第一服务商,“url.cn.xxxxx”为待检测的短链接。终端对该短信息的内容进行标点符号检测,检测其中是否存在目标标点符号“【”和“】”,当检测到这两个目标标点符号时,终端将这两个目标标点符号中间的字段,即“xx游戏”,作为第一服务商信息。
需要说明的是,该目标文本,既能够由第一服务商信息所指示的第一服务商发送,也能够由生成待检测短链接的第二服务商发送,还能够由提供信息推送服务的其他服务商发送,本申请对此不进行限制。
602、终端基于第一服务商信息,获取至少一个短链接,该短连接为第二服务商为第一服务商生成的满足目标条件的短连接,该第一服务商为该第一服务商信息所指示的服务商,该第二服务商用于提供短链接生成服务。
在一些实施例中,终端在获取第一服务商信息后,能够基于该第一服务商信息,获取该第一服务商信息所关联的第二服务商信息。终端基于该第二服务商信息,从该第二服务商信息所关联的短链接中,获取该至少一个短链接。在一些实施例中,目标条件为短链接生成时间在目标时间段内,或者短链接未过期,或者短链接所属的业务类型与上述目标文本所指示的目标业务类型一致中的至少一种。
在一些实施例中,短链接的存储可以通过多种不同方式实现,例如,通过区块链式存储来实现,也即是,在一些实施例中,终端能够从区块链系统中获取第二服务商信息。相应的,终端基于第一服务商信息,获取该第一服务商信息所关联的第二服务商信息的步骤可以为:终端基于该第一服务商信息,从区块链系统中确定第一区块,该第一区块用于存储该第一服务商的第一链接发布信息。终端可以从该第一区块存储的第一服务商的第一链接发布信息中,获取该第二服务商信息。通过将第一链接发布信息存储在区块链上,使得该第一链接发布信息无法被更改,避免了恶意用户通过修改该第一链接发布信息,来向终端提供错误的第二服务商信息的情况,从而保证终端获取到的短链接为安全有效的短链接,而不是恶意用户伪造的短链接。
继续以目标文本为短信息为例进行说明。第一服务商为游戏服务商,能够提供游戏相关的服务。第二服务商为短链接服务商,能够提供生成短链接的服务。第一服务商向用户提供用于修改账户信息的网页,该网页的链接为原始链接a,第二服务商为该原始链接a生成了至少一个短链接,其中一个短链接为短链接b,则该短信息中包括该短链接b,即上述url.cn.xxxxx。第一服务商将第一服务商信息、原始链接a以及第二服务商信息保存在第一链接发布信息中,并对该第一链接发布信息进行上链,使该第一链接发布信息存储在第一区块中。则终端可以从该第一链接发布信息中获取第二服务商信息。如果该第一链接发布信息没有存储在区块链上,则恶意用户能够通过修改该第一链接发布信息,使终端获取到的伪造的恶意服务商信息,与该恶意服务商信息所关联的短链接为恶意用户伪造的短链接。上述方法将第一链接发布信息存储在区块链中,使得该第一链接发布信息无法被更改,从而保证终端获取到的短链接为安全有效的短链接,而不是恶意用户伪造的短链接。
在一些实施例中,终端能够从区块链系统中获取上述至少一个短链接。相应的,终端基 于第二服务商信息,从该第二服务商信息所关联的短链接中,获取第二服务商为该第一服务商生成的满足目标条件的至少一个短链接的步骤可以为:终端基于该第二服务商信息,从区块链系统中确定第二区块,该第二区块用于存储第二服务商的第二链接发布信息。终端从该第二区块存储的第二服务商的第二链接发布信息中,获取第二服务商为第一服务商生成的满足目标条件的至少一个短链接。通过将第二链接发布信息存储在区块链上,使得该第二链接发布信息无法被更改,避免了恶意用户通过修改该第二链接发布信息,来向终端提供恶意用户伪造的短链接,从而保证终端获取到的短链接为安全有效的短链接。
还是以目标文本为短信息为例进行说明。第二服务商将第二服务商信息以及生成的多个短链接保存在第二链接发布信息中,并对该第二链接发布信息进行上链,使该第二链接发布信息存储在第二区块中。其中,第二服务商生成的多个短链接包括为第一服务商生成的短链接b。则终端能够从该第二链接发布信息中获取为第一服务商生成的满足目标条件的至少一个短链接。如果该第二链接发布信息没有存储在区块链上,则恶意用户能够通过修改该第二链接发布信息,将伪造的短链接添加到该第二链接发布信息中,使得终端获取到的是伪造的短链接。在待检测短链接是恶意的短链接时,终端会误认为该待检测短链接是安全的,从而存在安全风险,通过将第二链接发布信息存储在区块链上,使得该第二链接发布信息无法被更改,从而保证终端获取到的短链接为安全有效的短链接。
在一些实施例中,终端能够将短链接的生成时间在目标时间段内作为目标条件。相应的,终端从第二区块存储的第二服务商的第二链接发布信息中,获取第二服务商为第一服务商生成的满足目标条件的至少一个短链接,的步骤可以为:终端根据上述目标文本的接收时间,确定目标时间段。终端能够对从第二区块存储的第二服务商的第二链接发布信息中包括的多个短链接进行筛选,获取该第二服务商在目标时间段内为第一服务商生成的至少一个短链接。通过限制短链接的生成时间,从而可以在获取上述至少一个短链接时,筛选掉不在目标时间段内的短链接,提高获取效率。
还是以目标文本为短信息为例进行说明。由于只有第二服务商先生成短链接b,终端才能接收到包括该短链接b的短信息。因此,短链接的生成时间不会晚于该短信息的接收时间。另外,为保证信息的时效性,一般情况下网页制作完成后,24小时内需要投入使用,也就是将网页的原始链接a对应的短链接b发送给用户。因此,短链接的生成时间一般也不会早于该短信息的接收时间前的24小时。即目标时间段为短信接收前的24小时。当然,也可以设置该目标时间段为短信接收前的36小时或者48小时等,本申请实施例对此不进行限制。
在一些实施例中,终端能够将业务类型作为目标条件来确定上述至少一个短链接。相应的,上述第二链接发布信息还包括第二服务商生成的任一短链接所对应的业务类型,其中,一个短链接对应一种业务类型。终端从第二区块存储的第二服务商的第二链接发布信息中,获取第二服务商为第一服务商生成的满足目标条件的至少一个短链接的步骤可以为:终端对上述目标文本进行内容识别,确定该待检测短链接对应的业务类型,得到目标业务类型。终端从第二区块存储的第二服务商的第二链接发布信息中,获取该第二服务商为第一服务商生成的属于目标业务类型的至少一个短链接。通过限制短链接的业务类型,从而可以在获取上述至少一个短链接时,筛选掉不在目标时间段内的短链接,提高获取效率。
还是以目标文本为短信息为例进行说明。第一服务商生成的原始链接a对应的业务类型为A,则第二服务商在为该原始链接a生成至少一个短链接时,能够设置生成的至少一个短 链接的业务类型也为A,业务类型A对应多个短链接,而原始链接a对应的短链接b只对应一个一个业务类型。第二服务商将短链接对应的业务类型存储在上述第二链接发布信息中。终端对短信息的内容进行内容识别,能够确定该短信息指示的是修改账户信息类型的业务,则将该修改账户信息类型作为目标业务类型。终端从第二链接发布信息中筛选业务类型为目标业务类型的至少一个短链接。
在一些实施例中,终端能够将短链接是否过期作为目标条件来确定上述至少一个短链接。相应的,上述第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,该时限信息用于指示短链接是否过期。终端从第二区块存储的第二服务商的第二链接发布信息中,获取该第二服务商为第一服务商生成的满足目标条件的至少一个短链接的步骤可以为:终端从第二区块存储的第二服务商的第二链接发布信息中获取至少一条时限信息。终端基于该至少一条时限信息,从第二链接发布信息中获取第二服务商为第一服务商生成的未过期的至少一个短链接。通过获取短链接的时限信息,从而可以在获取上述至少一个短链接时,筛选掉已经过期的短链接,提高获取效率,同时提高获取到的至少一个短链接的有效性。
还是以目标文本为短信息为例进行说明。第二服务商在生成短链接b时,能够设置短链接b的时限信息,在该时限信息指示的有效期内,触发短链接b都能够跳转到原始链接a。在一些实施例中,短链接b一月份指向原始链接c,在二月份指向原始链接d,当前指向原始链接a。第二服务商可以将该时限信息存储在第二链接发布信息中。
需要说明的是,本申请实施例示例性的示出了通过不同目标条件分别确定上述至少一个短链接的过程,实际上还能够同时通过两个或者两个以上的目标条件来确定上述至少一个短链接。目标条件能够自由组合,本申请实施例对此不进行限制。
还需要说明的是,短链接的存储还能够通过其他方式实现,例如,通过云存储式来实现,也即是,由短链接相关的多个服务商将与短链接相关的信息和原始链接相关的信息存储到可信度较高的数据库中,该可信度较高的数据库可以通过云存储技术搭建。该可信度较高的数据库能够提供信息查询入口,并设置访问权限,以保证数据的安全性。终端在获取上述至少一个短链接时,能够通过链接检测客户端向链接检测服务器发送获取请求,由具有该可信度较高的数据库的访问权限的链接检测服务器获取该至少一个短链接。通过设置可信度较高的数据库,既保证了与短链接相关的多个服务商存储的信息不会轻易的被篡改,又保证了上述信息的私密性。例如,手机中可以安装有安全助手,该安全助手的后台服务器具有该可信度较高的数据库的访问权限,从而可以获取短链接相关的信息和原始链接相关的信息,实现对待检测短链接的检测。当然,短信息发送商、网络服务商以及信息安全监管部门等均可以具有该可信度较高的数据库的访问权限。
603、响应于上述待检测短链接不包括在上述至少一个短链接中,终端确定该待检测短链接为不安全的链接。
在本申请实施例中,终端获取到上述至少一个短链接之后,能够将待检测短链接与该至少一个短链接进行逐一比对,如果该至少一个短链接中没有任何一个短链接与该待检测短链接相同,则确定第二服务商未生成过该待检测短链接,也即该待检测短链接可能为恶意用户伪造的恶意的短链接,因此,终端能够确定该待检测短链接为不安全的链接。
在一些实施例中,终端能够基于检测的结果对该目标文本进行处理。相应的,终端对目标文本进行处理的步骤可以为:终端可以获取该目标文本对应的目标处理方式,终端能够基 于目标处理方式,对目标文本进行处理,其中,目标处理方式包括隔离、删除、标注、显示提示信息中的至少一种。终端通过自动处理包含不安全的短链接的目标文本,能够减少用户被恶意用户欺骗的风险,保护了用户的信息安全。
还是以目标文本为短信息为例进行说明。终端在确定该短信息中包括的短链接b为不安全链接之后,显示提示信息,如“url.cn.xxxxx为不安全的链接,请注意信息安全”。终端还能够将该短信息进行隔离,如将该短信息收入拦截信息中,该拦截信息中的短链接为不可点击状态,避免用户误操作点击该不安全的短链接b。终端还能够在用户设置了删除权限时,直接删除该短信息,其中删除的短信息可以暂存于回收站中,方便用户查阅。终端还能够用标注的方式提示该短链接b不安全,如红色高亮显示该短信息,并标注“不安全”字样。上述示例仅示出目标文本为短信息的处理过程,而对于目标文本为其他形式,也适用于上述处理过程,本申请实施例对此不做限定。
在一些实施例中,终端能够向用户展示检测的结果,基于用户的操作来对该目标文本进行处理。相应的,终端对目标文本进行处理的步骤可以为:响应于接收到用户的选择操作,终端显示目标界面,该目标界面包括删除、信任、查询等选项卡。终端响应于任一选项卡的触发操作,执行所述选项卡对应的操作。
还是以目标文本为短信息为例进行说明。终端除了能够向用户展示检测的结果,即短链接安全或者不安全之外,还能够向用户展示该待检测短链接对应的原始链接的持有主体。如果终端展示的持有主体不是短信息中的xx游戏,则用户判断该链接不安全,用户能够选择删除该短信息;如果终端展示的持有主体是短信息中的xx游戏,那么表示终端可能是误判,则用户能够判断该链接安全,用户也能够选择信任该短信息;如果用户认为自己不应该收到修改账户信息的短消息,则能够选择查询,由终端从第一链接发布信息中获取并向用户展示该短信息的发送名单,从而用户能够判断收到该短信息是否合理。
需要说明的是,对于目标文本的处理方式还能够是终端基于预先设置好的目标处理方式来自动实现,也即是检测到目标文本中的短链接存在安全性问题,则直接对给目标文本执行目标处理方式,以提高安全性和安全检测的智能性。
604、响应于待检测短链接包括在上述至少一个短链接中,终端基于上述第一服务商的第一链接发布信息和上述第二服务商的第二链接发布信息,确定该待检测短链接的安全性。
在本申请实施例中,上述待检测短链接包括在至少一个短链接中,则表示该短链接本身没有问题,并不是伪造的恶意短链接,则终端可以进一步的对该短链接进行查证,从而确定该短链接是否安全。
在一些实施例中,终端能够基于第二链接发布信息中包括的第二服务商生成的任一短链接所对应的时限信息来对该短链接进行进一步的检测,其中,时限信息用于指示该短链接是否过期。相应的,终端进一步对短链接进行查证的步骤可以为:响应于待检测短链接包括在上述至少一个短链接中,终端获取目标时限信息,该目标时限信息为从第二链接发布信息中获取到的待检测短链接对应的时限信息。响应于该目标时限信息指示该待检测短链接已过期,终端能够显示第一提示信息,该第一提示信息用于提示该待检测短链接已过期。通过实现信息来确定待检测短链接当前是否仍旧有效,使得避免用户访问失效的短链接或者指向恶意网站的短链接,从而保证用户的信息安全。
还是以目标文本为短信息为例进行说明。第二服务商生成的短链接b对应的时限信息指 示该短链接b已经失效,也即该短链接b当前已经不再指向原始链接a,而是指向原始链接d。该原始链接d对应的网页可能是恶意用户生成或者劫持的网页,用于骗取用户的财产信息。在一些实施例中,终端通过显示类似于“短链接已过期,存在风险”的提示信息,来提示用户。
在一些实施例中,终端能够基于第二链接发布信息中包括的第二服务商生成的任一短链接所对应的第一内容信息,来对该短链接进行进一步的检测。其中,该第一内容信息用于指示所述短链接对应的页面截图、页面特征值以及页面参数信息中的至少一种。相应的,终端进一步对短链接进行查证的步骤可以为:响应于待检测短链接包括在至少一个短链接中,终端获取目标第一内容信息,目标第一内容信息为从第二链接发布信息中获取到的待检测短链接对应的第一内容信息。响应于目标第一内容信息与访问待检测短链接得到的内容信息不符,终端能够显示第二提示信息,该第二提示信息用于指示待检测短链接为不安全的链接。通过对比区块链中存储的短链接对应的目标第一内容信息和实际访问得到的内容信息,能够确定该待检测短链接实际跳转的网页的内容是否发生了改变,在发生改变时对用户进行提醒,从而保证用户的信息安全。
还是以目标文本为短信息为例进行说明。第二服务商在为原始链接a生成短链接b后,还会获取该短链接b跳转原始链接a的截图、原始链接a对应的网页的截图、原始链接a对应的网页的特征值以及原始链接a对应的网页的标签参数等该短链接b对应的内容信息,将该内容信息存储到第二链接发布信息中。其中,该截图可以包括原始链接a对应的网页在不同设备端显示的截图,如电脑端的截图和手机端的截图。终端可以通过MD5(Message Digest Algorithm 5)算法、TF(Term Frequency,词频)算法、DF(Document Frequency,文档频率)算法以及TF-IDF(Term Frequency–Inverse Document Frequency,词频-逆文档频率)算法中的至少一种算法对内容信息中的特征值进行校验。终端还能够通过图像识别算法对内容信息中的网页截图进行对比。终端基于校验和对比结果,即可确定目标第一内容信息和实际访问得到的内容信息是否一致。如果不一致,说明待检测短链接实际跳转的网页的内容已经发生了改变,可能存在骗取用户信息的风险。在一些实施例中,终端显示类似于“网页内容已发生改变,存在风险”的提示信息,来提示用户。当然,目标第一内容信息和实际访问得到的内容信息不一定要百分百相同,如果相似度达到目标阈值以上,如90%以上、85%以上或者80%以上等,终端也能够确定目标第一内容信息和实际访问得到的内容信息一致,不存在风险。
在一些实施例中,终端能够基于第二链接发布信息中包括的第二服务商生成的任一短链接所对应的原始链接,以及基于第一链接发布信息中包括的原始链接对应的第二内容信息,来对该短链接进行进一步的检测。其中,该第二内容信息用于指示原始链接对应的页面截图、页面特征值以及页面参数信息中的至少一种。相应的,终端进一步对短链接进行查证的步骤可以为:响应于待检测短链接包括在至少一个短链接中,终端获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。终端获取目标第二内容信息,目标第二内容信息为从第一链接发布信息中获取到的目标原始链接对应的第二内容信息。响应于该目标第二内容信息与访问待检测短链接得到的内容信息不符,终端显示第三提示信息,该第三提示信息用于指示待检测短链接为不安全的链接。通过对比区块链中存储的短链接对应的目标第二内容信息和实际访问得到的内容信息,可以确定该待检测短链接实 际跳转的网页的内容是否发生了改变,在发生改变时对用户进行提醒,从而保证用户的信息安全。
还是以目标文本为短信息为例进行说明。第一服务商在创建原始链接a对应的网页后,能够将该原始链接a对应的页面的标签信息等参数信息、该原始链接a对应的页面的特征值、该原始链接a对应的页面的截图等该原始链接a对应的内容信息,存储到第一链接发布信息中。其中,该截图包括原始链接a对应的网页在不同设备端显示的截图,如电脑端的截图和手机端的截图。终端对内容信息进行比对的方式可以参见上一举例内容,不再进行赘述。
在一些实施例中,终端能够基于第二链接发布信息中包括的第二服务商生成的任一短链接对应的原始链接,以及第一链接发布信息中包括的原始链接对应的账户名单,来对该短链接进行进一步的检测。其中,账户名单用于指示接收原始链接的至少一个账户。相应的,终端进一步对短链接进行查证的步骤可以为:响应于待检测短链接包括在至少一个短链接中,终端获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。终端获取目标账户名单,目标账户名单为从第一链接发布信息中获取到的目标原始链接对应的账户名单。响应于终端当前登录的账户不在目标账户名单中,终端显示第四提示信息,该第四提示信息用于指示待检测短链接为不安全的链接。通过对比当前登录的账户是否在目标账户名单中,可以确定目标文本是否发送有误,从而避免用户盲目的基于目标文本进行操作,耽误用户时间,且存在一定的信息泄露风险。
还是以目标文本为短信息为例进行说明。第一服务商能够为每个原始链接设置一个账户名单,用于接收该原始链接或者该原始链接对应的短链接,在一些实施例中,该账户名单中的账户是手机号,或者是IMEI(International Mobile Equipment Identity,国际移动设备识别码)等。终端获取原始链接a对应的账户名单,如果该名单中有终端当前登录的账户,则表示该待检测短链接确实是发给终端的用户的;如果该名单中没有终端当前登录的账户,则该表示待检测短链接确实不是发给终端的用户的。终端确定该待检测短链接存在一定的风险,在一些实施例中,终端通过显示类似于“信息发送对象有误,请注意信息安全”的提示信息,来提示用户。
需要说明的是,上述第一链接发布信息中包括的第一服务商信息、该第一服务商信息相关联的第二服务商信息、至少一个原始链接、任一原始链接对应的内容信息以及任一原始链接对应的账户名单等信息以及上述第二链接发布信息中包括的第二服务商信息、至少一个短链接、任一短链接对应的内容信息、任一短链接对应的时限信息等信息除了能够用于对待检测短链接进行检测,还能够作为存证信息。终端可以接收用户触发的存证指令,响应于接收到该存证指令,生成存证信息,该存证信息用于指示与访问该待检测短链接对应的页面的过程相关联的信息,该存证信息包括但不限于上述第一链接发布信息和上述第二链接发布信息。还可以包括渠道参数,如短信息行业的短信下发端口号等。还可以包括经用户同意后收集的设备信息,如浏览器版本、浏览器类型、终端设备信息、网络参数等。终端设备信息可以是IP(Internet Protocol,网际互连协议)地址,MAC(Media Access Control Address,媒体存取控制位址)地址。
在一些实施例中,终端能够在接收到上述存证指令后,向取证设备发送举报请求,该举报请求用于指示该取证设备对待检测短链接进行取证。通过发送举报请求,能够使公正机构的取证设备自动的进行取证,避免了由于公正机构在非工作时间无法取证,导致取证失败的 问题。
例如,恶意用户在公正机构的非工作时间,如午夜时段修改短链接对应的网页内容为非法内容,而在其他时间该短链接对应的内容为正常内容,则公正机构无法依靠人力对该短链接进行取证,通过举报请求触发可以解决这一问题,实现随时举报随时取证。
需要说明的是,上述步骤601至步骤604是本申请实施例可选的实现方式,本申请提供的链接检测方法,还能够通过其他实现方式实现,如第一服务商将第二服务商生成的至少一个短链接,存储到该第一服务商的第一链接发布信息中,从而缩短终端获取至少一个短链接的步骤,节约时间。还能够通过可信度较高的非区块链系统来存储链接检测过程中用到的信息,使该链接检测方法不依赖区块链系统,来提高该链接检测方法的应用范围。本申请实施例对此不进行限制。
需要说明的是,上述步骤601至步骤604示例性的示出了通过终端进行链接检测的方式。在终端接收到该目标文本之前,该目标文本还可能会经过多个中间服务商的审核,如短信服务商、网络运行商、服务代理商等。对于任一中间服务商,该中间服务商均可以通过本申请提供的链接检测方法,在接收到包括待检测短链接的目标文本时,通过从区块链中获取上述第一链接发布信息和第二链接发布信息,来对该待检测短链接进行检测。
在本申请实施例中,通过获取第二服务商为第一服务商生成的满足目标条件的至少一个短链接,进而将该至少一个短链接与目标文本中的待检测短链接进行比对,确定该待检测短链接是否是为第一服务商生成的短链接,从而确定该待检测短链接是否安全。
图7是根据本申请实施例提供的一种链接检测装置的框图。该装置用于执行上述链接检测方法执行时的步骤,参见图7,装置包括:获取模块701和确定模块702。
获取模块701,用于从目标文本中获取第一服务商信息,目标文本包括待检测短链接。
获取模块701,还用于基于第一服务商信息,获取至少一个短连接,短连接为第二服务商为第一服务商生成的满足目标条件的短链接,第一服务商为第一服务商信息所指示的服务商,第二服务商用于提供短链接生成服务。
确定模块702,用于响应于待检测短链接不包括在至少一个短链接中,确定待检测短链接为不安全的链接。
在一些实施例中,获取模块701,还用于基于第一服务商信息,获取第一服务商信息所关联的第二服务商信息。基于第二服务商信息,从第二服务商信息所关联的短链接中,获取至少一个短链接。
在一些实施例中,获取模块701,还用于基于第一服务商信息,从区块链系统中确定第一区块,第一区块用于存储第一服务商的第一链接发布信息。从第一区块存储的第一服务商的第一链接发布信息中,获取第二服务商信息。
在一些实施例中,获取模块701,还用于基于第二服务商信息,从区块链系统中确定第二区块,第二区块用于存储第二服务商的第二链接发布信息。从第二区块存储的第二服务商的第二链接发布信息中,获取至少一个短链接。
在一些实施例中,目标条件为下述至少一种:
短链接生成时间在目标时间段内。
短链接未过期。
短链接所属的业务类型与目标文本所指示的目标业务类型一致。
在一些实施例中,获取模块701,还用于根据目标文本的接收时间,确定目标时间段。对从第二区块存储的第二服务商的第二链接发布信息中包括的多个短链接进行筛选,获取至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的业务类型,一个短链接对应一种业务类型。
获取模块701,还用于对目标文本进行内容识别,确定待检测短链接对应的目标业务类型。从第二区块存储的第二服务商的第二链接发布信息中,获取属于目标业务类型的至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,时限信息用于指示短链接是否过期。
获取模块701,还用于从第二区块存储的第二服务商的第二链接发布信息中获取至少一条时限信息。基于至少一条时限信息,从第二链接发布信息中获取未过期的至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,时限信息用于指示短链接是否过期。
装置还包括:
获取模块701,还用于响应于待检测短链接包括在至少一个短链接中,获取目标时限信息,目标时限信息为从第二链接发布信息中获取到的待检测短链接对应的时限信息。
第一显示模块,用于响应于目标时限信息指示待检测短链接已过期,显示第一提示信息,第一提示信息用于提示待检测短链接已过期。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的第一内容信息,第一内容信息用于指示短链接对应的页面截图、页面特征值以及页面参数信息中的至少一种。
装置还包括:
获取模块701,还用于响应于待检测短链接包括在至少一个短链接中,获取目标第一内容信息,目标第一内容信息为从第二链接发布信息中获取到的待检测短链接对应的第一内容信息。
第二显示模块,用于响应于目标第一内容信息与访问待检测短链接得到的内容信息不符,显示第二提示信息,第二提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的原始链接,第一链接发布信息还包括原始链接对应的第二内容信息,第二内容信息用于指示原始链接对应的页面截图、页面特征值和页面参数信息中的至少一种。
装置还包括:
获取模块701,还用于响应于待检测短链接包括在至少一个短链接中,获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。
获取模块701,还用于获取目标第二内容信息,目标第二内容信息为从第一链接发布信息中获取到的目标原始链接对应的第二内容信息。
第三显示模块,用于响应于目标第二内容信息与访问待检测短链接得到的内容信息不符,显示第三提示信息,第三提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接对应的原始链接,第一链接发布信息还包括原始链接对应的账户名单,账户名单用于指示接收原始链接的至少一个账户。
装置还包括:
获取模块701,还用于响应于待检测短链接包括在至少一个短链接中,获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。
获取模块701,还用于获取目标账户名单,目标账户名单为从第一链接发布信息中获取到的目标原始链接对应的账户名单。
第四显示模块,用于响应于终端当前登录的账户不在目标账户名单中,显示第四提示信息,第四提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,装置还包括:
获取模块701,还用于获取目标文本对应的目标处理方式,目标处理方式包括隔离、删除、标注、显示提示信息中的至少一种。
文本处理模块,用于基于目标处理方式,对目标文本进行处理。
在一些实施例中,装置还包括:
生成模块,用于响应于接收到存证指令,生成存证信息,存证信息用于指示与访问待检测短链接对应的页面的过程相关联的信息。
提交模块,用于提交存证信息。
在一些实施例中,装置还包括:
请求发送模块,用于向取证设备发送举报请求,举报请求用于指示取证设备对待检测短链接进行取证。
在一些实施例中,获取模块701,还用于对包括待检测短链接的目标文本进行标点符号检测。响应于检测到目标标点符号,将目标标点符号所指示的字段作为第一服务商信息。
在一些实施例中,待检测短链接与目标文本中的文字、图片、按钮以及视频中的至少一种相关联
需要说明的是:上述实施例提供的链接检测装置在运行应用程序时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的链接检测装置与链接检测方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
在本申请实施例中,电子设备可以被实施为终端或者服务器,当被实施为终端时,可以由该终端实现上述的链接检测方法所执行的操作,当被实施为服务器时,可以由该服务器实现上述的链接方法所执行的操作,也可以由该服务器和终端的交互来实现上述链接检测方法所执行的操作。
电子设备可以被实施为终端,图8示出了本申请一个示例性实施例提供的终端800的结构框图。该终端图8示出了本发明一个示例性实施例提供的终端800的结构框图。该终端800 可以是:智能手机、平板电脑、MP3播放器(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、笔记本电脑或台式电脑。终端800还可能被称为用户设备、便携式终端、膝上型终端、台式终端等其他名称。
通常,终端800包括有:处理器801和存储器802。
处理器801可以包括一个或多个处理核心,比如4核心处理器、8核心处理器等。处理器801可以采用DSP(Digital Signal Processing,数字信号处理)、FPGA(Field-Programmable Gate Array,现场可编程门阵列)、PLA(Programmable Logic Array,可编程逻辑阵列)中的至少一种硬件形式来实现。处理器801也可以包括主处理器和协处理器,主处理器是用于对在唤醒状态下的数据进行处理的处理器,也称CPU(Central Processing Unit,中央处理器);协处理器是用于对在待机状态下的数据进行处理的低功耗处理器。在一些实施例中,处理器801可以在集成有GPU(Graphics Processing Unit,图像处理器),GPU用于负责显示屏所需要显示的内容的渲染和绘制。一些实施例中,处理器801还可以包括AI(Artificial Intelligence,人工智能)处理器,该AI处理器用于处理有关机器学习的计算操作。
存储器802可以包括一个或多个计算机可读存储介质,该计算机可读存储介质可以是非暂态的。存储器802还可包括高速随机存取存储器,以及非易失性存储器,比如一个或多个磁盘存储设备、闪存存储设备。在一些实施例中,存储器802中的非暂态的计算机可读存储介质用于存储至少一个指令,该至少一个指令用于被处理器801所执行以下述步骤:
从目标文本中获取第一服务商信息,目标文本包括待检测短链接。
基于第一服务商信息,获取至少一个短连接,短连接为第二服务商为第一服务商生成的满足目标条件的短链接,第一服务商为第一服务商信息所指示的服务商,第二服务商用于提供短链接生成服务。
响应于待检测短链接不包括在至少一个短链接中,确定待检测短链接为不安全的链接。
在一些实施例中,处理器还用于执行:
基于第一服务商信息,获取第一服务商信息所关联的第二服务商信息。
基于第二服务商信息,从第二服务商信息所关联的短链接中,获取至少一个短链接。
在一些实施例中,处理器还用于执行:
基于第一服务商信息,从区块链系统中确定第一区块,第一区块用于存储第一服务商的第一链接发布信息。
从第一区块存储的第一服务商的第一链接发布信息中,获取第二服务商信息。
在一些实施例中,处理器还用于执行:
基于第二服务商信息,从区块链系统中确定第二区块,第二区块用于存储第二服务商的第二链接发布信息。
从第二区块存储的第二服务商的第二链接发布信息中,获取至少一个短链接。
在一些实施例中,目标条件为下述至少一种:
短链接生成时间在目标时间段内。
短链接未过期。
短链接所属的业务类型与目标文本所指示的目标业务类型一致。
在一些实施例中,处理器还用于执行:
根据目标文本的接收时间,确定目标时间段。
对从第二区块存储的第二服务商的第二链接发布信息中包括的多个短链接进行筛选,获取至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的业务类型,一个短链接对应一种业务类型。
处理器还用于执行:
对目标文本进行内容识别,确定待检测短链接对应的目标业务类型。
从第二区块存储的第二服务商的第二链接发布信息中,获取属于目标业务类型的至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,时限信息用于指示短链接是否过期。
处理器还用于执行:
从第二区块存储的第二服务商的第二链接发布信息中获取至少一条时限信息。
基于至少一条时限信息,从第二链接发布信息中获取未过期的至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,时限信息用于指示短链接是否过期。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标时限信息,目标时限信息为从第二链接发布信息中获取到的待检测短链接对应的时限信息。
响应于目标时限信息指示待检测短链接已过期,显示第一提示信息,第一提示信息用于提示待检测短链接已过期。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的第一内容信息,第一内容信息用于指示短链接对应的页面截图、页面特征值以及页面参数信息中的至少一种。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标第一内容信息,目标第一内容信息为从第二链接发布信息中获取到的待检测短链接对应的第一内容信息。
响应于目标第一内容信息与访问待检测短链接得到的内容信息不符,显示第二提示信息,第二提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的原始链接,第一链接发布信息还包括原始链接对应的第二内容信息,第二内容信息用于指示原始链接对应的页面截图、页面特征值和页面参数信息中的至少一种。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。
获取目标第二内容信息,目标第二内容信息为从第一链接发布信息中获取到的目标原始链接对应的第二内容信息。
响应于目标第二内容信息与访问待检测短链接得到的内容信息不符,显示第三提示信息,第三提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接对应的原始链接,第一链接发布信息还包括原始链接对应的账户名单,账户名单用于指示接收原始链接的至少一个账户。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。
获取目标账户名单,目标账户名单为从第一链接发布信息中获取到的目标原始链接对应的账户名单。
响应于终端当前登录的账户不在目标账户名单中,显示第四提示信息,第四提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,处理器还用于执行:
响应于接收到存证指令,生成存证信息,存证信息用于指示与访问待检测短链接对应的页面的过程相关联的信息。
提交存证信息。
在一些实施例中,处理器还用于执行:
向取证设备发送举报请求,举报请求用于指示取证设备对待检测短链接进行取证。
在一些实施例中,处理器还用于执行:
获取目标文本对应的目标处理方式,目标处理方式包括隔离、删除、标注、显示提示信息中的至少一种。
基于目标处理方式,对目标文本进行处理。
在一些实施例中,处理器还用于执行:
对目标文本进行标点符号检测。
响应于检测到目标标点符号,将目标标点符号所指示的字段作为第一服务商信息。
在一些实施例中,待检测短链接与目标文本中的文字、图片、按钮以及视频中的至少一种相关联。
在一些实施例中,终端800还可选包括有:外围设备接口803和至少一个外围设备。处理器801、存储器802和外围设备接口803之间可以通过总线或信号线相连。各个外围设备可以通过总线、信号线或电路板与外围设备接口803相连。具体地,外围设备包括:射频电路804、显示屏805、摄像头组件806、音频电路807、定位组件808和电源809中的至少一种。
外围设备接口803可被用于将I/O(Input/Output,输入/输出)相关的至少一个外围设备连接到处理器801和存储器802。在一些实施例中,处理器801、存储器802和外围设备接口803被集成在同一芯片或电路板上;在一些其他实施例中,处理器801、存储器802和外围设备接口803中的任意一个或两个可以在单独的芯片或电路板上实现,本实施例对此不加以限定。
射频电路804用于接收和发射RF(Radio Frequency,射频)信号,也称电磁信号。射频电路804通过电磁信号与通信网络以及其他通信设备进行通信。射频电路804将电信号转换为电磁信号进行发送,或者,将接收到的电磁信号转换为电信号。可选地,射频电路804包括:天线系统、RF收发器、一个或多个放大器、调谐器、振荡器、数字信号处理器、编解码 芯片组、用户身份模块卡等等。射频电路804可以通过至少一种无线通信协议来与其它终端进行通信。该无线通信协议包括但不限于:城域网、各代移动通信网络(2G、3G、4G及5G)、无线局域网和/或WiFi(Wireless Fidelity,无线保真)网络。在一些实施例中,射频电路804还可以包括NFC(Near Field Communication,近距离无线通信)有关的电路,本申请对此不加以限定。
显示屏805用于显示UI(User Interface,用户界面)。该UI可以包括图形、文本、图标、视频及其它们的任意组合。当显示屏805是触摸显示屏时,显示屏805还具有采集在显示屏805的表面或表面上方的触摸信号的能力。该触摸信号可以作为控制信号输入至处理器801进行处理。此时,显示屏805还可以用于提供虚拟按钮和/或虚拟键盘,也称软按钮和/或软键盘。在一些实施例中,显示屏805可以为一个,设置终端800的前面板;在另一些实施例中,显示屏805可以为至少两个,分别设置在终端800的不同表面或呈折叠设计;在再一些实施例中,显示屏805可以是柔性显示屏,设置在终端800的弯曲表面上或折叠面上。甚至,显示屏805还可以设置成非矩形的不规则图形,也即异形屏。显示屏805可以采用LCD(Liquid Crystal Display,液晶显示屏)、OLED(Organic Light-Emitting Diode,有机发光二极管)等材质制备。
摄像头组件806用于采集图像或视频。可选地,摄像头组件806包括前置摄像头和后置摄像头。通常,前置摄像头设置在终端的前面板,后置摄像头设置在终端的背面。在一些实施例中,后置摄像头为至少两个,分别为主摄像头、景深摄像头、广角摄像头、长焦摄像头中的任意一种,以实现主摄像头和景深摄像头融合实现背景虚化功能、主摄像头和广角摄像头融合实现全景拍摄以及VR(Virtual Reality,虚拟现实)拍摄功能或者其它融合拍摄功能。在一些实施例中,摄像头组件806还可以包括闪光灯。闪光灯可以是单色温闪光灯,也可以是双色温闪光灯。双色温闪光灯是指暖光闪光灯和冷光闪光灯的组合,可以用于不同色温下的光线补偿。
音频电路807可以包括麦克风和扬声器。麦克风用于采集用户及环境的声波,并将声波转换为电信号输入至处理器801进行处理,或者输入至射频电路804以实现语音通信。出于立体声采集或降噪的目的,麦克风可以为多个,分别设置在终端800的不同部位。麦克风还可以是阵列麦克风或全向采集型麦克风。扬声器则用于将来自处理器801或射频电路804的电信号转换为声波。扬声器可以是传统的薄膜扬声器,也可以是压电陶瓷扬声器。当扬声器是压电陶瓷扬声器时,不仅可以将电信号转换为人类可听见的声波,也可以将电信号转换为人类听不见的声波以进行测距等用途。在一些实施例中,音频电路807还可以包括耳机插孔。
定位组件808用于定位终端800的当前地理位置,以实现导航或LBS(Location Based Service,基于位置的服务)。定位组件808可以是基于美国的GPS(Global Positioning System,全球定位系统)、中国的北斗系统、俄罗斯的格雷纳斯系统或欧盟的伽利略系统的定位组件。
电源809用于为终端800中的各个组件进行供电。电源809可以是交流电、直流电、一次性电池或可充电电池。当电源809包括可充电电池时,该可充电电池可以支持有线充电或无线充电。该可充电电池还可以用于支持快充技术。
在一些实施例中,终端800还包括有一个或多个传感器810。该一个或多个传感器810包括但不限于:加速度传感器811、陀螺仪传感器812、压力传感器813、指纹传感器814、光学传感器815以及接近传感器816。
加速度传感器811可以检测以终端800建立的坐标系的三个坐标轴上的加速度大小。比如,加速度传感器811可以用于检测重力加速度在三个坐标轴上的分量。处理器801可以根据加速度传感器811采集的重力加速度信号,控制显示屏805以横向视图或纵向视图进行用户界面的显示。加速度传感器811还可以用于游戏或者用户的运动数据的采集。
陀螺仪传感器812可以检测终端800的机体方向及转动角度,陀螺仪传感器812可以与加速度传感器811协同采集用户对终端800的3D动作。处理器801根据陀螺仪传感器812采集的数据,可以实现如下功能:动作感应(比如根据用户的倾斜操作来改变UI)、拍摄时的图像稳定、游戏控制以及惯性导航。
压力传感器813可以设置在终端800的侧边框和/或显示屏805的下层。当压力传感器813设置在终端800的侧边框时,可以检测用户对终端800的握持信号,由处理器801根据压力传感器813采集的握持信号进行左右手识别或快捷操作。当压力传感器813设置在显示屏805的下层时,由处理器801根据用户对显示屏805的压力操作,实现对UI界面上的可操作性控件进行控制。可操作性控件包括按钮控件、滚动条控件、图标控件、菜单控件中的至少一种。
指纹传感器814用于采集用户的指纹,由处理器801根据指纹传感器814采集到的指纹识别用户的身份,或者,由指纹传感器814根据采集到的指纹识别用户的身份。在识别出用户的身份为可信身份时,由处理器801授权该用户执行相关的敏感操作,该敏感操作包括解锁屏幕、查看加密信息、下载软件、支付及更改设置等。指纹传感器814可以被设置终端800的正面、背面或侧面。当终端800上设置有物理按键或厂商Logo时,指纹传感器814可以与物理按键或厂商Logo集成在一起。
光学传感器815用于采集环境光强度。在一个实施例中,处理器801可以根据光学传感器815采集的环境光强度,控制显示屏805的显示亮度。具体地,当环境光强度较高时,调高显示屏805的显示亮度;当环境光强度较低时,调低显示屏805的显示亮度。在另一个实施例中,处理器801还可以根据光学传感器815采集的环境光强度,动态调整摄像头组件806的拍摄参数。
接近传感器816,也称距离传感器,通常设置在终端800的前面板。接近传感器816用于采集用户与终端800的正面之间的距离。在一个实施例中,当接近传感器816检测到用户与终端800的正面之间的距离逐渐变小时,由处理器801控制显示屏805从亮屏状态切换为息屏状态;当接近传感器816检测到用户与终端800的正面之间的距离逐渐变大时,由处理器801控制显示屏805从息屏状态切换为亮屏状态。
本领域技术人员可以理解,图8中示出的结构并不构成对终端800的限定,可以包括比图示更多或更少的组件,或者组合某些组件,或者采用不同的组件布置。
电子设备可以被实施为服务器,图9是根据本申请实施例提供的一种服务器的结构示意图,该服务器900可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上处理器(Central Processing Units,CPU)901和一个或一个以上的存储器902,其中,所述存储器902中存储有至少一条指令,所述至少一条指令由所述处理器901加载并执行以实现上述各个方法实施例提供的方法。当然,该服务器还可以具有有线或无线网络接口、键盘以及输入输出接口等部件,以便进行输入输出,该服务器还可以包括其他用于实现设备功能的部件,在此不做赘述。
本申请实施例还提供了一种计算机可读存储介质,该计算机可读存储介质应用于电子设备,该计算机可读存储介质中存储有至少一条程序代码,该至少一条程序代码用于被处理器执行以实现下述步骤:
从目标文本中获取第一服务商信息,目标文本包括待检测短链接。
基于第一服务商信息,获取至少一个短连接,短连接为第二服务商为第一服务商生成的满足目标条件的短链接,第一服务商为第一服务商信息所指示的服务商,第二服务商用于提供短链接生成服务。
响应于待检测短链接不包括在至少一个短链接中,确定待检测短链接为不安全的链接。
在一些实施例中,处理器还用于执行:
基于第一服务商信息,获取第一服务商信息所关联的第二服务商信息。
基于第二服务商信息,从第二服务商信息所关联的短链接中,获取至少一个短链接。
在一些实施例中,处理器还用于执行:
基于第一服务商信息,从区块链系统中确定第一区块,第一区块用于存储第一服务商的第一链接发布信息。
从第一区块存储的第一服务商的第一链接发布信息中,获取第二服务商信息。
在一些实施例中,处理器还用于执行:
基于第二服务商信息,从区块链系统中确定第二区块,第二区块用于存储第二服务商的第二链接发布信息。
从第二区块存储的第二服务商的第二链接发布信息中,获取至少一个短链接。
在一些实施例中,目标条件为下述至少一种:
短链接生成时间在目标时间段内。
短链接未过期。
短链接所属的业务类型与目标文本所指示的目标业务类型一致。
在一些实施例中,处理器还用于执行:
根据目标文本的接收时间,确定目标时间段。
对从第二区块存储的第二服务商的第二链接发布信息中包括的多个短链接进行筛选,获取至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的业务类型,一个短链接对应一种业务类型。
处理器还用于执行:
对目标文本进行内容识别,确定待检测短链接对应的目标业务类型。
从第二区块存储的第二服务商的第二链接发布信息中,获取属于目标业务类型的至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,时限信息用于指示短链接是否过期。
处理器还用于执行:
从第二区块存储的第二服务商的第二链接发布信息中获取至少一条时限信息。
基于至少一条时限信息,从第二链接发布信息中获取未过期的至少一个短链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的时限信息,时限信息用于指示短链接是否过期。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标时限信息,目标时限信息为从第二链接发布信息中获取到的待检测短链接对应的时限信息。
响应于目标时限信息指示待检测短链接已过期,显示第一提示信息,第一提示信息用于提示待检测短链接已过期。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的第一内容信息,第一内容信息用于指示短链接对应的页面截图、页面特征值以及页面参数信息中的至少一种。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标第一内容信息,目标第一内容信息为从第二链接发布信息中获取到的待检测短链接对应的第一内容信息。
响应于目标第一内容信息与访问待检测短链接得到的内容信息不符,显示第二提示信息,第二提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接所对应的原始链接,第一链接发布信息还包括原始链接对应的第二内容信息,第二内容信息用于指示原始链接对应的页面截图、页面特征值和页面参数信息中的至少一种。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。
获取目标第二内容信息,目标第二内容信息为从第一链接发布信息中获取到的目标原始链接对应的第二内容信息。
响应于目标第二内容信息与访问待检测短链接得到的内容信息不符,显示第三提示信息,第三提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,第二链接发布信息还包括第二服务商生成的任一短链接对应的原始链接,第一链接发布信息还包括原始链接对应的账户名单,账户名单用于指示接收原始链接的至少一个账户。
处理器还用于执行:
响应于待检测短链接包括在至少一个短链接中,获取目标原始链接,目标原始链接为从第二链接发布信息中获取到的待检测短链接对应的原始链接。
获取目标账户名单,目标账户名单为从第一链接发布信息中获取到的目标原始链接对应的账户名单。
响应于终端当前登录的账户不在目标账户名单中,显示第四提示信息,第四提示信息用于指示待检测短链接为不安全的链接。
在一些实施例中,处理器还用于执行:
响应于接收到存证指令,生成存证信息,存证信息用于指示与访问待检测短链接对应的页面的过程相关联的信息。
提交存证信息。
在一些实施例中,处理器还用于执行:
向取证设备发送举报请求,举报请求用于指示取证设备对待检测短链接进行取证。
在一些实施例中,处理器还用于执行:
获取目标文本对应的目标处理方式,目标处理方式包括隔离、删除、标注、显示提示信息中的至少一种。
基于目标处理方式,对目标文本进行处理。
在一些实施例中,处理器还用于执行:
对目标文本进行标点符号检测。
响应于检测到目标标点符号,将目标标点符号所指示的字段作为第一服务商信息。
在一些实施例中,待检测短链接与目标文本中的文字、图片、按钮以及视频中的至少一种相关联。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的可选实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (36)

  1. 一种链接检测方法,应用于电子设备,所述方法包括:
    从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
    基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
    响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
  2. 根据权利要求1所述的方法,其中,所述基于所述第一服务商信息,获取至少一个短连接,包括:
    基于所述第一服务商信息,获取所述第一服务商信息所关联的第二服务商信息;
    基于所述第二服务商信息,从所述第二服务商信息所关联的短链接中,获取所述至少一个短链接。
  3. 根据权利要求2所述的方法,其中,所述基于所述第一服务商信息,获取所述第一服务商信息所关联的第二服务商信息,包括:
    基于所述第一服务商信息,从区块链系统中确定第一区块,所述第一区块用于存储所述第一服务商的第一链接发布信息;
    从所述第一区块存储的所述第一服务商的第一链接发布信息中,获取所述第二服务商信息。
  4. 根据权利要求2所述的方法,其中,所述基于所述第二服务商信息,从所述第二服务商信息所关联的短链接中,获取所述至少一个短链接,包括:
    基于所述第二服务商信息,从区块链系统中确定第二区块,所述第二区块用于存储所述第二服务商的第二链接发布信息;
    从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取所述至少一个短链接。
  5. 根据权利要求1-4任一项所述的方法,其中,所述目标条件为下述至少一种:
    短链接生成时间在目标时间段内;
    短链接未过期;
    短链接所属的业务类型与所述目标文本所指示的目标业务类型一致。
  6. 根据权利要求5所述的方法,其中,所述从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取所述至少一个短链接,包括:
    根据所述目标文本的接收时间,确定所述目标时间段;
    对从所述第二区块存储的所述第二服务商的第二链接发布信息中包括的多个短链接进行筛选,获取所述至少一个短链接。
  7. 根据权利要求5所述的方法,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的业务类型,一个短链接对应一种业务类型;
    所述从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取所述至少一个短链接,包括:
    对所述目标文本进行内容识别,确定所述待检测短链接对应的目标业务类型;
    从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取属于所述目标业务类型的至少一个短链接。
  8. 根据权利要求5所述的方法,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的时限信息,所述时限信息用于指示所述短链接是否过期;
    所述从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取所述至少一个短链接,包括:
    从所述第二区块存储的所述第二服务商的第二链接发布信息中获取至少一条时限信息;
    基于所述至少一条时限信息,从所述第二链接发布信息中获取未过期的至少一个短链接。
  9. 根据权利要求4所述的方法,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的时限信息,所述时限信息用于指示所述短链接是否过期;
    所述方法还包括:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标时限信息,所述目标时限信息为从所述第二链接发布信息中获取到的所述待检测短链接对应的时限信息;
    响应于所述目标时限信息指示所述待检测短链接已过期,显示第一提示信息,所述第一提示信息用于提示所述待检测短链接已过期。
  10. 根据权利要求4所述的方法,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的第一内容信息,所述第一内容信息用于指示所述短链接对应的页面截图、页面特征值以及页面参数信息中的至少一种;
    所述方法还包括:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标第一内容信息,所述目标第一内容信息为从所述第二链接发布信息中获取到的所述待检测短链接对应的第一内容信息;
    响应于所述目标第一内容信息与访问所述待检测短链接得到的内容信息不符,显示第二提示信息,所述第二提示信息用于指示所述待检测短链接为不安全的链接。
  11. 根据权利要求4所述的方法,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的原始链接,所述第一链接发布信息还包括所述原始链接对应的第二内容信息,所述第二内容信息用于指示所述原始链接对应的页面截图、页面特征值和页面 参数信息中的至少一种;
    所述方法还包括:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标原始链接,所述目标原始链接为从所述第二链接发布信息中获取到的所述待检测短链接对应的原始链接;
    获取目标第二内容信息,所述目标第二内容信息为从所述第一链接发布信息中获取到的所述目标原始链接对应的第二内容信息;
    响应于所述目标第二内容信息与访问所述待检测短链接得到的内容信息不符,显示第三提示信息,所述第三提示信息用于指示所述待检测短链接为不安全的链接。
  12. 根据权利要求4所述的方法,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接对应的原始链接,所述第一链接发布信息还包括所述原始链接对应的账户名单,所述账户名单用于指示接收所述原始链接的至少一个账户;
    所述方法还包括:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标原始链接,所述目标原始链接为从所述第二链接发布信息中获取到的所述待检测短链接对应的原始链接;
    获取目标账户名单,所述目标账户名单为从所述第一链接发布信息中获取到的所述目标原始链接对应的账户名单;
    响应于终端当前登录的账户不在所述目标账户名单中,显示第四提示信息,所述第四提示信息用于指示所述待检测短链接为不安全的链接。
  13. 根据权利要求1所述的方法,其中,所述方法还包括:
    响应于接收到存证指令,生成存证信息,所述存证信息用于指示与访问所述待检测短链接对应的页面的过程相关联的信息;
    提交所述存证信息。
  14. 根据权利要求13所述的方法,其中,所述接收到存证指令之后,所述方法还包括:
    向取证设备发送举报请求,所述举报请求用于指示所述取证设备对所述待检测短链接进行取证。
  15. 根据权利要求1所述的方法,其中,所述方法还包括:
    获取所述目标文本对应的目标处理方式,所述目标处理方式包括隔离、删除、标注、显示提示信息中的至少一种;
    基于所述目标处理方式,对所述目标文本进行处理。
  16. 根据权利要求1所述的方法,其中,所述从目标文本中获取第一服务商信息,包括:
    对所述目标文本进行标点符号检测;
    响应于检测到目标标点符号,将所述目标标点符号所指示的字段作为所述第一服务商信息。
  17. 根据权利要求1所述的方法,其中,所述待检测短链接与所述目标文本中的文字、图片、按钮以及视频中的至少一种相关联。
  18. 一种链接检测装置,所述装置包括:
    获取模块,用于从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
    所述获取模块,还用于基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
    确定模块,用于响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
  19. 一种电子设备,所述电子设备包括处理器和存储器,所述存储器用于存储至少一段程序代码,所述至少一段程序代码由所述处理器加载并执行以下步骤:
    从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
    基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
    响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
  20. 根据权利要求19所述的电子设备,其中,所述处理器还用于执行:
    基于所述第一服务商信息,获取所述第一服务商信息所关联的第二服务商信息;
    基于所述第二服务商信息,从所述第二服务商信息所关联的短链接中,获取所述至少一个短链接。
  21. 根据权利要求20所述的电子设备,其中,所述处理器还用于执行:
    基于所述第一服务商信息,从区块链系统中确定第一区块,所述第一区块用于存储所述第一服务商的第一链接发布信息;
    从所述第一区块存储的所述第一服务商的第一链接发布信息中,获取所述第二服务商信息。
  22. 根据权利要求20所述的电子设备,其中,所述处理器还用于执行:
    基于所述第二服务商信息,从区块链系统中确定第二区块,所述第二区块用于存储所述第二服务商的第二链接发布信息;
    从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取所述至少一个短链接。
  23. 根据权利要求19-22任一项所述的电子设备,其中,所述目标条件为下述至少一种:
    短链接生成时间在目标时间段内;
    短链接未过期;
    短链接所属的业务类型与所述目标文本所指示的目标业务类型一致。
  24. 根据权利要求23所述的电子设备,其中,所述处理器还用于执行:
    根据所述目标文本的接收时间,确定所述目标时间段;
    对从所述第二区块存储的所述第二服务商的第二链接发布信息中包括的多个短链接进行筛选,获取所述至少一个短链接。
  25. 根据权利要求23所述的电子设备,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的业务类型,一个短链接对应一种业务类型;
    所述处理器还用于执行:
    对所述目标文本进行内容识别,确定所述待检测短链接对应的目标业务类型;
    从所述第二区块存储的所述第二服务商的第二链接发布信息中,获取属于所述目标业务类型的至少一个短链接。
  26. 根据权利要求23所述的电子设备,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的时限信息,所述时限信息用于指示所述短链接是否过期;
    所述处理器还用于执行:
    从所述第二区块存储的所述第二服务商的第二链接发布信息中获取至少一条时限信息;
    基于所述至少一条时限信息,从所述第二链接发布信息中获取未过期的至少一个短链接。
  27. 根据权利要求22所述的电子设备,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的时限信息,所述时限信息用于指示所述短链接是否过期;
    所述处理器还用于执行:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标时限信息,所述目标时限信息为从所述第二链接发布信息中获取到的所述待检测短链接对应的时限信息;
    响应于所述目标时限信息指示所述待检测短链接已过期,显示第一提示信息,所述第一提示信息用于提示所述待检测短链接已过期。
  28. 根据权利要求22所述的电子设备,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的第一内容信息,所述第一内容信息用于指示所述短链接对应的页面截图、页面特征值以及页面参数信息中的至少一种;
    所述处理器还用于执行:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标第一内容信息,所述目标第一内容信息为从所述第二链接发布信息中获取到的所述待检测短链接对应的第一内容信息;
    响应于所述目标第一内容信息与访问所述待检测短链接得到的内容信息不符,显示第二提示信息,所述第二提示信息用于指示所述待检测短链接为不安全的链接。
  29. 根据权利要求22所述的电子设备,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接所对应的原始链接,所述第一链接发布信息还包括所述原始链接对应的第二内容信息,所述第二内容信息用于指示所述原始链接对应的页面截图、页面特征值和页面参数信息中的至少一种;
    所述处理器还用于执行:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标原始链接,所述目标原始链接为从所述第二链接发布信息中获取到的所述待检测短链接对应的原始链接;
    获取目标第二内容信息,所述目标第二内容信息为从所述第一链接发布信息中获取到的所述目标原始链接对应的第二内容信息;
    响应于所述目标第二内容信息与访问所述待检测短链接得到的内容信息不符,显示第三提示信息,所述第三提示信息用于指示所述待检测短链接为不安全的链接。
  30. 根据权利要求22所述的电子设备,其中,所述第二链接发布信息还包括所述第二服务商生成的任一短链接对应的原始链接,所述第一链接发布信息还包括所述原始链接对应的账户名单,所述账户名单用于指示接收所述原始链接的至少一个账户;
    所述处理器还用于执行:
    响应于所述待检测短链接包括在所述至少一个短链接中,获取目标原始链接,所述目标原始链接为从所述第二链接发布信息中获取到的所述待检测短链接对应的原始链接;
    获取目标账户名单,所述目标账户名单为从所述第一链接发布信息中获取到的所述目标原始链接对应的账户名单;
    响应于终端当前登录的账户不在所述目标账户名单中,显示第四提示信息,所述第四提示信息用于指示所述待检测短链接为不安全的链接。
  31. 根据权利要求19所述的电子设备,其中,所述处理器还用于执行:
    响应于接收到存证指令,生成存证信息,所述存证信息用于指示与访问所述待检测短链接对应的页面的过程相关联的信息;
    提交所述存证信息。
  32. 根据权利要求31所述的电子设备,其中,所述处理器还用于执行:
    向取证设备发送举报请求,所述举报请求用于指示所述取证设备对所述待检测短链接进行取证。
  33. 根据权利要求19所述的电子设备,其中,所述处理器还用于执行:
    获取所述目标文本对应的目标处理方式,所述目标处理方式包括隔离、删除、标注、显示提示信息中的至少一种;
    基于所述目标处理方式,对所述目标文本进行处理。
  34. 根据权利要求19所述的电子设备,其中,所述处理器还用于执行:
    对所述目标文本进行标点符号检测;
    响应于检测到目标标点符号,将所述目标标点符号所指示的字段作为所述第一服务商信息。
  35. 根据权利要求19所述的电子设备,其中,所述待检测短链接与所述目标文本中的文字、图片、按钮以及视频中的至少一种相关联。
  36. 一种存储介质,所述存储介质用于存储至少一段程序代码,所述至少一段程序代码用于执行下述步骤:
    从目标文本中获取第一服务商信息,所述目标文本包括待检测短链接;
    基于所述第一服务商信息,获取至少一个短连接,所述短连接为第二服务商为第一服务商生成的满足目标条件的短链接,所述第一服务商为所述第一服务商信息所指示的服务商,所述第二服务商用于提供短链接生成服务;
    响应于所述待检测短链接不包括在所述至少一个短链接中,确定所述待检测短链接为不安全的链接。
PCT/CN2020/126051 2020-02-28 2020-11-03 链接检测方法、装置、电子设备及存储介质 WO2021169382A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/711,091 US11943256B2 (en) 2020-02-28 2022-04-01 Link detection method and apparatus, electronic device, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010131183.6A CN111355732B (zh) 2020-02-28 2020-02-28 链接检测方法、装置、电子设备及存储介质
CN202010131183.6 2020-02-28

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/711,091 Continuation US11943256B2 (en) 2020-02-28 2022-04-01 Link detection method and apparatus, electronic device, and storage medium

Publications (1)

Publication Number Publication Date
WO2021169382A1 true WO2021169382A1 (zh) 2021-09-02

Family

ID=71195838

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/126051 WO2021169382A1 (zh) 2020-02-28 2020-11-03 链接检测方法、装置、电子设备及存储介质

Country Status (3)

Country Link
US (1) US11943256B2 (zh)
CN (1) CN111355732B (zh)
WO (1) WO2021169382A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355732B (zh) 2020-02-28 2021-06-11 腾讯科技(深圳)有限公司 链接检测方法、装置、电子设备及存储介质
CN112307058B (zh) * 2020-10-27 2024-03-15 北京水滴科技集团有限公司 短链接的处理方法、装置、存储介质及计算机设备
CN112418790B (zh) * 2020-11-18 2024-03-26 江苏赞奇科技股份有限公司 一种基于区块链的服务链高有效性动态扩展追溯方法
CN112632372B (zh) * 2020-12-11 2022-05-13 杭州趣链科技有限公司 一种电子证据信息的上链方法、装置、区块链节点设备
CN114745722B (zh) * 2022-06-15 2022-08-12 安徽创瑞信息技术有限公司 一种短信平台安全审核检验方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120047577A1 (en) * 2010-08-23 2012-02-23 Microsoft Corporation Safe url shortening
CN104717185A (zh) * 2013-12-16 2015-06-17 腾讯科技(北京)有限公司 短统一资源定位符的展示响应方法、装置、服务器和系统
CN106126707A (zh) * 2016-06-30 2016-11-16 北京奇虎科技有限公司 信息识别方法和信息识别装置
CN110098979A (zh) * 2019-04-16 2019-08-06 深圳前海微众银行股份有限公司 一种基于区块链的短链接消息监听方法及装置
CN111355732A (zh) * 2020-02-28 2020-06-30 腾讯科技(深圳)有限公司 链接检测方法、装置、电子设备及存储介质

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8869271B2 (en) * 2010-02-02 2014-10-21 Mcafee, Inc. System and method for risk rating and detecting redirection activities
CN103618720B (zh) * 2013-11-29 2016-04-20 华中科技大学 一种木马网络通信检测与取证方法和系统
CN103745156B (zh) * 2014-01-07 2017-05-03 北京奇虎科技有限公司 一种在搜索引擎中提示风险信息的方法和装置
US10027702B1 (en) * 2014-06-13 2018-07-17 Trend Micro Incorporated Identification of malicious shortened uniform resource locators
CN104143055B (zh) * 2014-08-16 2017-02-15 合一网络技术(北京)有限公司 盗版视频监控方法与系统
CN104486140B (zh) * 2014-11-28 2017-12-19 华北电力大学 一种检测网页被劫持的装置及其检测方法
CN104735074A (zh) * 2015-03-31 2015-06-24 江苏通付盾信息科技有限公司 一种恶意url检测方法及其实现系统
CN104954372B (zh) * 2015-06-12 2018-07-24 中国科学院信息工程研究所 一种钓鱼网站的取证与验证方法及系统
CN104994183B (zh) * 2015-06-19 2018-09-04 小米科技有限责任公司 短网址确定方法和装置
CN105100119A (zh) * 2015-08-31 2015-11-25 百度在线网络技术(北京)有限公司 网址的检测方法及装置
CN107733972B (zh) * 2017-08-28 2020-09-08 阿里巴巴集团控股有限公司 一种短链接解析方法、装置及设备
CN108810003B (zh) * 2018-06-21 2021-02-26 吉旗(成都)科技有限公司 一种多业务方消息接入的安全验证方案
US10831850B2 (en) * 2018-08-14 2020-11-10 International Business Machines Corporation Secure URL shortening
CN109740384B (zh) * 2019-01-11 2023-11-10 众安信息技术服务有限公司 基于区块链的数据存证方法和装置
CN109951490A (zh) * 2019-03-27 2019-06-28 远光软件股份有限公司 基于区块链的网页防篡改方法、系统及电子设备
CN110278212A (zh) 2019-06-26 2019-09-24 中国工商银行股份有限公司 链接检测方法及装置
US11172258B1 (en) * 2021-01-26 2021-11-09 NortonLifeLock Inc. Protecting against an impersonation scam in a live video stream

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120047577A1 (en) * 2010-08-23 2012-02-23 Microsoft Corporation Safe url shortening
CN104717185A (zh) * 2013-12-16 2015-06-17 腾讯科技(北京)有限公司 短统一资源定位符的展示响应方法、装置、服务器和系统
CN106126707A (zh) * 2016-06-30 2016-11-16 北京奇虎科技有限公司 信息识别方法和信息识别装置
CN110098979A (zh) * 2019-04-16 2019-08-06 深圳前海微众银行股份有限公司 一种基于区块链的短链接消息监听方法及装置
CN111355732A (zh) * 2020-02-28 2020-06-30 腾讯科技(深圳)有限公司 链接检测方法、装置、电子设备及存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Third-party generated short link interface upgrade announcement", WEIBO OPEN PLATFORM, 29 January 2018 (2018-01-29), XP055841472, Retrieved from the Internet <URL:https://weibo.com/ttarticle/p/show?id=2309404201558857408545> *

Also Published As

Publication number Publication date
CN111355732B (zh) 2021-06-11
US11943256B2 (en) 2024-03-26
US20220224720A1 (en) 2022-07-14
CN111355732A (zh) 2020-06-30

Similar Documents

Publication Publication Date Title
US11488143B2 (en) Resource transaction method, node, device and storage medium
WO2021169382A1 (zh) 链接检测方法、装置、电子设备及存储介质
TWI713855B (zh) 憑證管理方法及系統
US11921839B2 (en) Multiple device credential sharing
JP6680840B2 (ja) 不正デジタル証明書の自動検出
CN110602089B (zh) 基于区块链的医疗数据存储方法、装置、设备及存储介质
CN108614878B (zh) 协议数据管理方法、装置、存储介质及系统
CN111475841B (zh) 一种访问控制的方法、相关装置、设备、系统及存储介质
CN110401715B (zh) 资源收集任务管理方法、装置、存储介质及系统
WO2021208615A1 (zh) 用户邀请方法、装置、计算机设备及计算机可读存储介质
WO2017034312A1 (en) Apparatus and method for trusted execution environment based secure payment transactions
CN107431924B (zh) 将设备标识符和用户标识符相关联的设备盗窃防护
CN111340482B (zh) 冲突检测方法、装置、节点设备及存储介质
CN112417425A (zh) 设备认证方法、装置、系统、终端设备及存储介质
CN110597924B (zh) 基于区块链的用户标识处理方法、装置、设备及存储介质
WO2015144066A1 (en) Sensitive operation verification method, apparatus, and system
US11895105B2 (en) Authenticated interface element interactions
CN112035897A (zh) 区块链存证方法和相关装置
JP2018512106A (ja) スマートイメージを使用したフィッシング対策のための方法およびシステム
CN111212074B (zh) 基于区块链的资格认定方法、装置、设备及存储介质
CN111667371B (zh) 基于区块链的资源聚合方法、系统、设备及存储介质
CN113821841B (zh) 资源管理方法、计算装置、计算设备和可读存储介质
WO2018153288A1 (zh) 数值转移方法、装置、设备及存储介质
CN111327427B (zh) 提交备选区块的方法、装置、节点设备、系统及存储介质
CN116800444A (zh) 账号认证方法、数字资源的兑换方法、装置、设备及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20921260

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20921260

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21/02/2023)

122 Ep: pct application non-entry in european phase

Ref document number: 20921260

Country of ref document: EP

Kind code of ref document: A1