CN106060000A - Method and device of identifying verification information - Google Patents

Method and device of identifying verification information Download PDF

Info

Publication number
CN106060000A
CN106060000A CN201610298475.2A CN201610298475A CN106060000A CN 106060000 A CN106060000 A CN 106060000A CN 201610298475 A CN201610298475 A CN 201610298475A CN 106060000 A CN106060000 A CN 106060000A
Authority
CN
China
Prior art keywords
message
subordinate sentence
target information
distance
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610298475.2A
Other languages
Chinese (zh)
Other versions
CN106060000B (en
Inventor
张博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN202010038902.XA priority Critical patent/CN111277579B/en
Priority to CN201610298475.2A priority patent/CN106060000B/en
Publication of CN106060000A publication Critical patent/CN106060000A/en
Application granted granted Critical
Publication of CN106060000B publication Critical patent/CN106060000B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to the electronic technology field, in particular to a method and device of identifying verification information used for solving the problems in the prior art that in order to identify the verification information, the format requirements of the received information have more limitations, and the identification accuracy is lower. The method of the embodiment of the present invention comprises the steps of extracting the clauses containing the key information and the target information from messages, determining the distance between the key information and the target information in each clause, and taking the target information in the clause having the minimum distance as the verification information. According to the present invention, the verification information is determined from all target information according to the distances between the target information and the key information in the clauses, thereby being able to be suitable for more information formats, and improving the identification accuracy.

Description

A kind of method and apparatus identifying checking information
Technical field
The present invention relates to electronic technology field, particularly to a kind of method and apparatus identifying checking information.
Background technology
Along with the rise of online transaction, the quantity of the user carrying out online transaction gets more and more.In order to improve the peace of shopping Quan Xing, large-scale website especially shopping website, be provided with mobile phone short message verification code function, this function by send identifying code to Mobile phone, can more accurately and safely ensure the safety of shopping, and the correctness of checking user, is maximally effective identifying code system System.
Except shopping at network above-mentioned, the most a lot of scenes also can use identifying code, such as registers, activates or logs in Etc. scene, corresponding website all can be by the identifying code in note after the mobile phone transmission notice checking note specified, user receive Be filled up on website, website the identifying code filled in user is verified.
But user is from receiving SMS notification to checking note, and recognizes identifying code from short message text, at identifying code Identifying code is filled in place accordingly, interface, and its step is the most loaded down with trivial details, especially also will be in same shifting when the part of input validation code The when of completing on dynamic equipment, its step is more loaded down with trivial details, needs frequently to switch between note application interface and identifying code interface.
Current a kind of scheme is to identify numeral, letter or a combination thereof of continuous print more than 4 from the information received, And the information solicitation that will identify that is on identifying code interface.If but the information received having multiple continuous print more than 4 Numeral, letter or a combination thereof, then cannot be carried out identifying.
In sum, identify that the call format of the checking information information to receiving compares limitation, recognition accuracy ratio at present Relatively low.
Summary of the invention
The present invention provides a kind of method and apparatus identifying checking information, in order to solve to identify in prior art checking information The call format of the information received is compared limitation, and recognition accuracy is than relatively low problem.
The embodiment of the present invention provides a kind of method identifying checking information, and the method includes:
After receiving message, from described message, extract the subordinate sentence comprising key message and target information;
Determine the distance between key message and target information described in each described subordinate sentence;
Using the target information in subordinate sentence minimum for described distance as checking information.
The embodiment of the present invention provides a kind of equipment identifying checking information, and this equipment includes:
Extraction module, for after receiving message, extract from described message comprise key message and target information point Sentence;
Distance determines module, for determining in each described subordinate sentence the distance between key message and target information;
Information determination module, is used for the target information in subordinate sentence minimum for described distance as checking information.The present invention Embodiment extracts the subordinate sentence comprising key message and target information from described message, determines key message in each described subordinate sentence And the distance between target information, using the target information in subordinate sentence minimum for described distance as checking information, due to according to dividing Distance between target information in Ju and the key message in subordinate sentence, determines checking information from all target informations, is receiving To information in have multiple continuous print numeral, letter or during a combination thereof, can extract from whole information comprise each continuously The subordinate sentence of numeral, letter or a combination thereof, then by the continuous print numeral comprised in subordinate sentence minimum for distance, letter or its Combination is as checking information such that it is able to be suitable for the form of more information, improves recognition accuracy.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make Accompanying drawing briefly introduce, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for this From the point of view of the those of ordinary skill in field, on the premise of not paying creative work, it is also possible to obtain it according to these accompanying drawings His accompanying drawing.
Fig. 1 is the method flow schematic diagram of embodiment of the present invention identification checking information;
Fig. 2 is the method flow schematic diagram that the embodiment of the present invention extracts subordinate sentence;
Fig. 3 is the complete method schematic flow sheet of embodiment of the present invention identification checking information;
Fig. 4 is the device structure schematic diagram of embodiment of the present invention identification checking information.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing the present invention made into One step ground describes in detail, it is clear that described embodiment is only some embodiments of the present invention rather than whole enforcement Example.Based on the embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise All other embodiments, broadly fall into the scope of protection of the invention.
As it is shown in figure 1, the method for embodiment of the present invention identification checking information includes:
Step 100, after receiving message, extract from described message and comprise the subordinate sentence of key message and target information;
Step 101, determine the distance between key message and target information in each described subordinate sentence;
Step 102, using the target information in subordinate sentence minimum for described distance as checking information.
Wherein, the embodiment of the present invention can arrange the form of target information, as long as meeting the information of form just as target Information.Such as can using N continuous position and above be all numeral, be all that letter and numeral and the information of monogram are as mesh Mark information.
It is 4 citings with N, if message has 1234, it is determined that for target information;If message has ABCD, it is determined that For target information;If message has 12B3CD, it is determined that for target information.
The form of above-mentioned target information is merely illustrative, and any form is all by the scheme of the embodiment of the present invention.
The key message of the embodiment of the present invention can be any information that can represent in message and have checking information, such as: Active coding, dynamic code, check code, identifying code, confirmation code, check code, Validation Code, activation code, check code, dynamic generation Code, inspection code, confirmation code, note password, dynamic password, transaction code, activate, school, , generation activation Dai Jiaodai, generation, generation, generation, password of surfing the Net, dynamically log in close Code, dynamic log password etc..
The message of the embodiment of the present invention can be any type of message received, and is such as received by instant communication software Message, the short message etc. that received by note.
Optionally, after receiving message, can first judge whether the message received is notice class message, if notice class Message, is judging whether the key message that includes pre-setting further;If not notice class message, can not be performed this The scheme of bright embodiment.
The message of multi-form, it may be judged whether the mode for notice class message differs.As a example by short message, can pass through The number sending short message judges.
The number beginning of general individual is 131,138,139 etc., if number beginning is not the individual of setting when judging Number, it is possible to determine send this message number for notice number, this message for notice class message.
Optionally, after determining that the message received includes key message and/or target information, extract from described message Comprise the subordinate sentence of key message and target information.
Judge whether message includes key message and/or target information, after can being notice class message determining message Judge;Can also judge simultaneously;Can also first judge whether to include key message and/or target information, after determining and having, Judge whether message is notice class message again.
Optionally, extract when comprising the subordinate sentence of key message and target information from described message, have a two ways:
Extracting mode one, extract from described message and comprise the subordinate sentence of key message;From the subordinate sentence comprising key message Extract the subordinate sentence comprising target information.
If all subordinate sentences the most do not comprise the subordinate sentence of target information, then the message received is shown to user, by with Family determines checking information.
If all subordinate sentences have the subordinate sentence comprising target information, then for the subordinate sentence selected, determine in subordinate sentence The distance between key message in target information and subordinate sentence.
The content of the information such as received be " there is the transaction of 206.00 yuan in your account, check code: 650717, Kill and be not able to tell that others' check code, check code query hot line 12345.”
The subordinate sentence extracted from message is " check code: 650717 ", " kill be not able to tell that others' check code " and " school Test a yard query hot line 12345 ".The subordinate sentence comprising target information is " check code: 650717 " and " check code query hot line 12345”。
Optionally, when extracting the subordinate sentence comprising key message from message, determine that the message received includes all Key message;
For a key message, from message, determine that before being positioned at key message one is preset mark and is positioned at pass Nearest after key information one presets mark, using two contents preset between mark as a subordinate sentence.
Here default mark can rule of thumb wait and be set, and presets in mark and can include the portion in following message Divide or whole:
(being applicable to before key message the situation not having punctuate, such as key message is in the message received for punctuate, blank Foremost).
Here punctuate can include one, it is also possible to includes multiple.Specifically can according to the language habits and comprise checking The form of the message of information determines.In being embodied as, a large amount of message can be gathered and carry out perfect, and network pair can be passed through Default mark is updated.
Such as punctuate includes comma and fullstop.
The message received is for " [AA] welcomes to use AA, 907050 (dynamic verification codes).Please filled in 30 minutes, contact Phone 1008222.”
In this message, can judge whether it is identifying code note by " identifying code ", if containing " testing in this note Card code " this key message, then look for a comma before " identifying code " or fullstop (first comma before usually or sentence Number), and a comma afterwards or fullstop (first comma after usually or fullstop), two are preset between mark Content as a subordinate sentence, i.e. 907050 (dynamic verification codes) are a subordinate sentence.
In force, if key message is positioned in bracket (such as bracket, round bracket, braces etc.), it is also possible to look for A comma before left bracket or fullstop (first comma before usually or fullstop), and after right parenthesis Comma or fullstop (first comma before usually or fullstop), using two contents preset between mark as one point Sentence.
The content of the information the most such as received be " there is the transaction of 206.00 yuan in your account, check code: 650717, kill and be not able to tell that others' check code.”
Two subordinate sentences can be obtained: " check code: 650717 " and " kill and all can not accuse according to the scheme of said extracted subordinate sentence Tell others' check code "
When selecting to comprise the subordinate sentence of target information from all subordinate sentences, due in " kill be not able to tell that others' check code " Do not include target information, so the last subordinate sentence comprising target information that obtains is " check code: 650717 ".
Extracting mode two, extract from described message and comprise the subordinate sentence of target information;From the subordinate sentence comprising target information Extract the subordinate sentence comprising key message.
If all subordinate sentences the most do not comprise the subordinate sentence of key message, then the message received is shown to user, by with Family determines checking information.
If all subordinate sentences have the subordinate sentence comprising key message, then for the subordinate sentence selected, determine in subordinate sentence The distance between key message in target information and subordinate sentence.
Optionally, when extracting the subordinate sentence comprising target information from described message, determine what the message received included All target informations;
Determine from described message the default mark being positioned at before described target information and be positioned at described target information it The most nearest default mark, using two contents preset between mark as subordinate sentence.
Here default mark can rule of thumb wait and be set, and presets in mark and can include the portion in following message Divide or whole:
(being applicable to before key message the situation not having punctuate, such as key message is in the message received for punctuate, blank Foremost).
Here punctuate can include one, it is also possible to includes multiple.Specifically can according to the language habits and comprise checking The form of the message of information determines.In being embodied as, a large amount of message can be gathered and carry out perfect, and network pair can be passed through Default mark is updated.
Concrete extraction process is similar with extracting mode one, does not repeats them here.
In force, if target information is positioned in bracket (such as bracket, round bracket, braces etc.), it is also possible to look for A comma before left bracket or fullstop (first comma before usually or fullstop), and after right parenthesis Comma or fullstop (first comma before usually or fullstop), using two contents preset between mark as one point Sentence.
Concrete extraction process is similar with extracting mode one, does not repeats them here.
For the subordinate sentence selected, determine the distance between the target information in subordinate sentence and the key message in subordinate sentence Time, owing to target information is different with the position of key message, it is possible to target information is positioned at before key message, it is also possible to mesh Mark information is positioned at after key message, so for different situations, the embodiment of the present invention gives two kinds of sides determining distance Formula.
Determine mode one, for the subordinate sentence selected, if the target information in subordinate sentence is positioned at before key message, then The distance between key message in the target information being determined according to the following equation in subordinate sentence and subordinate sentence:
Distance=p_keyword-(p_number+length_number);
Wherein, the distance between the target information during distance is subordinate sentence and the key message in subordinate sentence;
P_number is the distance between first symbol of target information in subordinate sentence and first symbol of message;
Length_number is the length of target information;
P_keyword is the distance between first symbol of key message in message and first symbol of message.
Assume that the message received is " [AA] 907050 (dynamic verification code).Please filled in 30 minutes ".One of them point Sentence is " [AA] 907050 (dynamic verification code) ", and the distance of this branch office is:
First symbol in message, " position of [" is defined as 0, and position below adds 1 successively, then target information The position p_number of first symbol " 9 " of " 907050 " is just 4;Length length_ of target information " 907050 " Number is 6, and the position p_keyword that first symbol of key message " dynamic verification code " " moves " is 11;Then distance For 11-(4+6)=1.
Determine mode two, for the subordinate sentence selected, if the target information in subordinate sentence is positioned at after key message, then The distance between key message in the target information being determined according to the following equation in subordinate sentence and subordinate sentence:
Distance=p_number-(p_keyword+length_keyword);
Wherein, the distance between the target information during distance is subordinate sentence and the key message in subordinate sentence;
P_number is the distance between first symbol of target information in subordinate sentence and first symbol of message;
P_keyword is the distance between first symbol of key message in message and first symbol of message;
Length_keyword is the length of key message.
Assume that the message received is " [AA] (dynamic verification code) 907050.Please filled in 30 minutes ".One of them point Sentence is " [AA] 907050 (dynamic verification code) ", and the distance of this branch office is:
First symbol in message, " position of [" is defined as 0, and position below adds 1 successively, then target information The position p_number of first symbol " 9 " of " 907050 " is just 11;Length length_ of key message " dynamic verification code " Keyword is 5;The position p_keyword that first symbol of key message " dynamic verification code " " moves " is 5;Then distance For 11-(5+5)=1.
The embodiment of the present invention can be using a letter, a numeral, a punctuate and a Chinese character as a symbol.
Optionally, according to all distances determined, all target informations from the subordinate sentence selected determine checking information Time, using the target information the shortest with key message distance as checking information.
The content of the information such as received be " there is the transaction of 206.00 yuan in your account, check code: 650717, Kill and be not able to tell that others' check code, check code query hot line 12345.”
The subordinate sentence extracted from message is " check code: 650717 ", " kill be not able to tell that others' check code " and " school Test a yard query hot line 12345 ".
Selecting the subordinate sentence comprising target information from all subordinate sentences is " check code: 650717 " and " check code query hot line 12345”。
Determine that " check code: 650717 " distance is for 23-(19+3)=1 in the manner described above;
Determine that " check code query hot line 12345 " distance is 50-(43+3)=4 in the manner described above.
Owing to " check code: 650717 " distance (i.e. 1) is less than " check code query hot line 12345 " distance (i.e. 4), then will Target information 650717 in " check code: 650717 " is as check information.
In force, the embodiment of the present invention, after determining check information, determines the page of checking check information, and will verification Information Auto-writing is on the position filling in check information in the page determined.This page can be Webpage, it is also possible to be The application page, it is also possible to be the page of other forms unlatching.
As in figure 2 it is shown, the method that the embodiment of the present invention extracts subordinate sentence includes:
Step 200, reception message.
Whether the message that step 201, judgement receive includes the key message pre-set;If it is, execution step 202, otherwise jump out this flow process.
Step 202, determine a undrawn key message in message.
Whether the key message that step 203, judgement determine is in bracket, if it is, perform step 204;Otherwise, perform Step 205.
Step 204, look for first comma before left bracket or fullstop, and look for first comma after right parenthesis or Fullstop, and perform step 206.
Step 205, look for first comma before key message or fullstop, and look for first after key message to tease Number or fullstop, and perform step 206.
Step 206, by first comma before key message or first comma after fullstop, and key message Or the content between fullstop is as a subordinate sentence.
Step 207, judge whether the most undrawn key message, if it has, then return step 202;Otherwise continue to hold The step of the follow-up subordinate sentence selecting to comprise target information from all subordinate sentences of row.
As a example by extracting mode one, the solution of the present invention is illustrated below.
As it is shown on figure 3, the complete method of embodiment of the present invention identification checking information includes:
Step 300, reception message.
Step 301, after determining the key message that the message received includes pre-setting, from message, extract at least one Individual subordinate sentence.(detailed process of step 301 sees Fig. 2)
Step 302, judge whether all subordinate sentences have the subordinate sentence comprising target information, if it is, perform step 303; Otherwise, the message received is displayed to the user that.
Step 303, from all subordinate sentences, select to comprise the subordinate sentence of target information.
Whether step 304, judgement comprise the quantity of the subordinate sentence of target information not less than 2;If it is, perform step 305; Otherwise, step 309 is performed.
Step 305, from all subordinate sentences select a subordinate sentence not determining distance.
Distance between step 306, the key message determined in subordinate sentence in each target information and subordinate sentence.
Step 307, judge whether that all subordinate sentences all determine distance, if it is, perform step 309;Otherwise return step 305。
Step 308, using with the key message the shortest target information of distance as checking information.
Step 309, using the target information in subordinate sentence as checking information.
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of equipment identifying checking information, owing to this sets The principle of standby solution problem is similar to the method for embodiment of the present invention identification checking information, and therefore the enforcement of this equipment may refer to The enforcement of method, repeats no more in place of repetition.
As shown in Figure 4, the equipment of embodiment of the present invention identification checking information includes:
Extraction module 400, for after receiving message, extracts from described message and comprises key message and target information Subordinate sentence;
Distance determines module 401, for determining in each described subordinate sentence the distance between key message and target information;
Information determination module 402, is used for the target information in subordinate sentence minimum for described distance as checking information.
Wherein, the embodiment of the present invention can arrange the form of target information, as long as meeting the information of form just as target Information.Such as can using N continuous position and above be all numeral, be all that letter and numeral and the information of monogram are as mesh Mark information.
It is 4 citings with N, if message has 1234, it is determined that for target information;If message has ABCD, it is determined that For target information;If message has 12B3CD, it is determined that for target information.
The form of above-mentioned target information is merely illustrative, and any form is all by the scheme of the embodiment of the present invention.
The key message of the embodiment of the present invention can be any information that can represent in message and have checking information, such as: Active coding, dynamic code, check code, identifying code, confirmation code, check code, Validation Code, activation code, check code, dynamic generation Code, inspection code, confirmation code, note password, dynamic password, transaction code, activate, school, , generation activation Dai Jiaodai, generation, generation, generation, password of surfing the Net, dynamically log in close Code, dynamic log password etc..
The message of the embodiment of the present invention can be any type of message received, and is such as received by instant communication software Message, the short message etc. that received by note.
Optionally, after receiving message, extraction module 400 can first judge whether the message received is notice class message, After determining that the message received is for notice class message, after receiving message;If not notice class message, the present invention can not be performed The scheme of embodiment.
The message of multi-form, it may be judged whether the mode for notice class message differs.As a example by short message, can pass through The number sending short message judges.
The number beginning of general individual is 131,138,139 etc., if number beginning is not the individual of setting when judging Number, it is possible to determine send this message number for notice number, this message for notice class message.
Optionally, extraction module 400 is after determining that the message received includes key message and/or target information, from institute State the subordinate sentence that in message, extraction comprises key message and target information.
Judge whether message includes key message and/or target information, after can being notice class message determining message Judge;Can also judge simultaneously;Can also first judge whether to include key message and/or target information, after determining and having, Judge whether message is notice class message again.
Optionally, extract when comprising the subordinate sentence of key message and target information from described message, have a two ways:
Extracting mode one, extraction module 400 extract the subordinate sentence comprising key message from described message;From comprising crucial letter The subordinate sentence of breath extracts the subordinate sentence comprising target information.
If all subordinate sentences the most do not comprise the subordinate sentence of target information, then the message that extraction module 400 can will receive It is shown to user, user determines checking information.
If there being the subordinate sentence comprising target information in all subordinate sentences, then distance determines that module 401 is for point selected Sentence, determines the distance between the target information in subordinate sentence and the key message in subordinate sentence.
Optionally, extraction module 400 extract from message comprise key message time, determine what the message received included All key messages;For a key message, determine from message be positioned at before key message preset mark and Nearest after being positioned at key message one presets mark, using two contents preset between mark as a subordinate sentence.
Here default mark can rule of thumb wait and be set, and presets in mark and can include the portion in following message Divide or whole:
(being applicable to before key message the situation not having punctuate, such as key message is in the message received for punctuate, blank Foremost).
Here punctuate can include one, it is also possible to includes multiple.Specifically can according to the language habits and comprise checking The form of the message of information determines.In being embodied as, a large amount of message can be gathered and carry out perfect, and network pair can be passed through Default mark is updated.
Such as punctuate includes comma and fullstop.
The message received is for " [AA] welcomes to use AA, 907050 (dynamic verification codes).Please filled in 30 minutes, contact Phone 1008222.”
In this message, can judge whether it is identifying code note by " identifying code ", if containing " testing in this note Card code " this key message, then look for a comma before " identifying code " or fullstop (first comma before usually or sentence Number), and a comma afterwards or fullstop (first comma after usually or fullstop), two are preset between mark Content as a subordinate sentence, i.e. 907050 (dynamic verification codes) are a subordinate sentence.
In force, if key message is positioned in bracket (such as bracket, round bracket, braces etc.), it is also possible to look for A comma before left bracket or fullstop (first comma before usually or fullstop), and after right parenthesis Comma or fullstop (first comma before usually or fullstop), using two contents preset between mark as one point Sentence.
The content of the information the most such as received be " there is the transaction of 206.00 yuan in your account, check code: 650717, kill and be not able to tell that others' check code.”
Two subordinate sentences can be obtained: " check code: 650717 " and " kill and all can not accuse according to the scheme of said extracted subordinate sentence Tell others' check code "
When selecting to comprise the subordinate sentence of target information from all subordinate sentences, due in " kill be not able to tell that others' check code " Do not include target information, so the last subordinate sentence comprising target information that obtains is " check code: 650717 ".
Extracting mode two, extraction module 400 extract the subordinate sentence comprising target information from described message;From comprising target letter The subordinate sentence of breath extracts the subordinate sentence comprising key message.
If all subordinate sentences the most do not comprise the subordinate sentence of key message, then the message received is shown to user, by with Family determines checking information.
If all subordinate sentences have the subordinate sentence comprising key message, then for the subordinate sentence selected, determine in subordinate sentence The distance between key message in target information and subordinate sentence.
Optionally, extraction module 400, when extracting the subordinate sentence comprising target information from described message, determines that receive disappears All target informations that breath includes;
Determine from described message the default mark being positioned at before described target information and be positioned at described target information it The most nearest default mark, using two contents preset between mark as subordinate sentence.
Here default mark can rule of thumb wait and be set, and presets in mark and can include the portion in following message Divide or whole:
(being applicable to before key message the situation not having punctuate, such as key message is in the message received for punctuate, blank Foremost).
Here punctuate can include one, it is also possible to includes multiple.Specifically can according to the language habits and comprise checking The form of the message of information determines.In being embodied as, a large amount of message can be gathered and carry out perfect, and network pair can be passed through Default mark is updated.
Concrete extraction process is similar with extracting mode one, does not repeats them here.
In force, if target information is positioned in bracket (such as bracket, round bracket, braces etc.), it is also possible to look for A comma before left bracket or fullstop (first comma before usually or fullstop), and after right parenthesis Comma or fullstop (first comma before usually or fullstop), using two contents preset between mark as one point Sentence.
Concrete extraction process is similar with extracting mode one, does not repeats them here.
For the subordinate sentence selected, determine the distance between the target information in subordinate sentence and the key message in subordinate sentence Time, owing to target information is different with the position of key message, it is possible to target information is positioned at before key message, it is also possible to mesh Mark information is positioned at after key message, so for different situations, the embodiment of the present invention gives two kinds of sides determining distance Formula.
Determine mode one, for the subordinate sentence selected, if the target information in subordinate sentence is positioned at before key message, then Distance determines the distance between the key message in the target information and subordinate sentence that module 401 is determined according to the following equation in subordinate sentence:
Distance=p_keyword-(p_number+length_number);
Wherein, the distance between the target information during distance is subordinate sentence and the key message in subordinate sentence;
P_number is the distance between first symbol of target information in subordinate sentence and first symbol of message;
Length_number is the length of target information;
P_keyword is the distance between first symbol of key message in message and first symbol of message.
Assume that the message received is " [AA] 907050 (dynamic verification code).Please filled in 30 minutes ".One of them point Sentence is " [AA] 907050 (dynamic verification code) ", and the distance of this branch office is:
First symbol in message, " position of [" is defined as 0, and position below adds 1 successively, then target information The position p_number of first symbol " 9 " of " 907050 " is just 4;Length length_ of key message " 907050 " Number is 6, and the position p_keyword that first symbol of target information " dynamic verification code " " moves " is 11;Then distance For 11-(4+6)=1.
Determine mode two, for the subordinate sentence selected, if the target information in subordinate sentence is positioned at after key message, then Distance determines the distance between the key message in the target information and subordinate sentence that module 401 is determined according to the following equation in subordinate sentence:
Distance=p_number-(p_keyword+length_keyword);
Wherein, the distance between the target information during distance is subordinate sentence and the key message in subordinate sentence;
P_number is the distance between first symbol of target information in subordinate sentence and first symbol of message;
P_keyword is the distance between first symbol of key message in message and first symbol of message;
Length_keyword is the length of key message.
Assume that the message received is " [AA] (dynamic verification code) 907050.Please filled in 30 minutes ".One of them point Sentence is " [AA] 907050 (dynamic verification code) ", and the distance of this branch office is:
First symbol in message, " position of [" is defined as 0, and position below adds 1 successively, then target information The position p_number of first symbol " 9 " of " 907050 " is just 11;Length length_ of key message " dynamic verification code " Keyword is 5;The position p_keyword that first symbol of key message " dynamic verification code " " moves " is 5;Then distance For 11-(5+5)=1.
The embodiment of the present invention can be using a letter, a numeral, a punctuate and a Chinese character as a symbol.
Optionally, information determination module 402 is according to all distances determined, all target informations from the subordinate sentence selected In when determining checking information, using the target information the shortest with key message distance as checking information.
The content of the information such as received be " there is the transaction of 206.00 yuan in your account, check code: 650717, Kill and be not able to tell that others' check code, check code query hot line 12345.”
The subordinate sentence extracted from message is " check code: 650717 ", " kill be not able to tell that others' check code " and " school Test a yard query hot line 12345 ".
Selecting the subordinate sentence comprising target information from all subordinate sentences is " check code: 650717 " and " check code query hot line 12345”。
Determine that " check code: 650717 " distance is for 23-(19+3)=1 in the manner described above;
Determine that " check code query hot line 12345 " distance is 50-(43+3)=4 in the manner described above.
Owing to " check code: 650717 " distance (i.e. 1) is less than " check code query hot line 12345 " distance (i.e. 4), then will Target information 650717 in " check code: 650717 " is as check information.
In force, the embodiment of the present invention, after determining check information, determines the page of checking check information, and will verification Information Auto-writing is on the position filling in check information in the page determined.This page can be Webpage, it is also possible to be The application page, it is also possible to be the page of other forms unlatching.
It can be seen from the above: the embodiment of the present invention is extracted from described message and comprised key message and target information Subordinate sentence, determine the distance between key message and target information in each described subordinate sentence, by subordinate sentence minimum for described distance Target information as checking information, due to according to the distance between the target information in subordinate sentence and the key message in subordinate sentence, In the information received, have multiple continuous print numeral, letter or during a combination thereof, can extract from whole information comprise each Continuous print numeral, letter or the subordinate sentence of a combination thereof, then by the continuous print numeral comprised in subordinate sentence minimum for distance, letter or Person's a combination thereof, as checking information, determines checking information such that it is able to be suitable for the form of more information from all target informations, Improve recognition accuracy.
Above by reference to the method illustrated according to the embodiment of the present application, device (system) and/or the frame of computer program Figure and/or flow chart describe the application.Should be understood that and can realize block diagram and/or flow process diagram by computer program instructions One block of figure and the combination of the block of block diagram and/or flowchart illustration.Can be supplied to lead to by these computer program instructions By computer, the processor of special-purpose computer and/or other programmable data processing means, to produce machine so that via meter The instruction that calculation machine processor and/or other programmable data processing means perform creates and is used for realizing block diagram and/or flow chart block The method of the function/action specified by.
Correspondingly, it is also possible to implement the application with hardware and/or software (including firmware, resident software, microcode etc.).More Further, the application can take computer to use or the shape of computer program on computer-readable recording medium Formula, it has the computer realized in media as well and can use or computer readable program code, to be made by instruction execution system With or combined command perform system and use.In the present context, computer can use or computer-readable medium is permissible Being arbitrary medium, it can comprise, stores, communicates, transmit or transmission program, to be made by instruction execution system, device or equipment With, or combined command execution system, device or equipment use.
Obviously, those skilled in the art can carry out various change and the modification essence without deviating from the present invention to the present invention God and scope.So, if these amendments of the present invention and modification belong to the scope of the claims in the present invention and equivalent technologies thereof Within, then the present invention is also intended to comprise these change and modification.

Claims (14)

1. the method identifying checking information, it is characterised in that the method includes:
After receiving message, from described message, extract the subordinate sentence comprising key message and target information;
Determine the distance between key message and target information described in each described subordinate sentence;
Using the target information in subordinate sentence minimum for described distance as checking information.
2. the method for claim 1, it is characterised in that described extraction from described message comprises key message and target Before the subordinate sentence of information, also include:
Determine that the message received is notice class message.
3. the method for claim 1, it is characterised in that described extraction from described message comprises key message and target Before the subordinate sentence of information, also include:
Determine that the message received includes key message and/or target information.
4. the method for claim 1, it is characterised in that described extraction from described message comprises key message and target The subordinate sentence of information, including:
The subordinate sentence comprising key message is extracted from described message;Extract from the subordinate sentence comprising key message and comprise target information Subordinate sentence;Or
The subordinate sentence comprising target information is extracted from described message;Extract from the subordinate sentence comprising target information and comprise key message Subordinate sentence.
5. method as claimed in claim 3, it is characterised in that described extraction from described message comprises dividing of key message Sentence, including:
Determine all key messages that the message received includes;
After determining the default mark being positioned at before described key message from described message and being positioned at described key message Near default mark, using two contents preset between mark as subordinate sentence.
6. method as claimed in claim 3, it is characterised in that described extraction from described message comprises dividing of target information Sentence, including:
Determine all target informations that the message received includes;
After determining the default mark being positioned at before described target information from described message and being positioned at described target information Near default mark, using two contents preset between mark as subordinate sentence.
7. the method as described in as arbitrary in claim 1~6, it is characterised in that described determine described in each described subordinate sentence crucial Distance between information and target information, including:
If the described target information in described subordinate sentence is positioned at before described key message, then it is determined according to the following equation described point Distance between target information in Ju and the key message in described subordinate sentence:
Distance=p_keyword-(p_number+length_number);
If the described target information in described subordinate sentence is positioned at after described key message, then it is determined according to the following equation described point Distance between target information in Ju and the key message in described subordinate sentence:
Distance=p_number-(p_keyword+length_keyword);
Wherein, the distance between the target information during distance is described subordinate sentence and the key message in described subordinate sentence;
P_number is between first symbol of target information described in described subordinate sentence and first symbol of described message Distance;
Length_number is the length of described target information;
P_keyword is between first symbol of key message described in described message and first symbol of described message Distance;
Length_keyword is the length of described key message.
8. the equipment identifying checking information, it is characterised in that this equipment includes:
Extraction module, for after receiving message, extracts the subordinate sentence comprising key message and target information from described message;
Distance determines module, for determining in each described subordinate sentence the distance between key message and target information;
Information determination module, is used for the target information in subordinate sentence minimum for described distance as checking information.
9. equipment as claimed in claim 8, it is characterised in that described extraction module is additionally operable to:
After determining that the message that receives is for notice class message, extract from described message comprise key message and target information point Sentence.
10. equipment as claimed in claim 8, it is characterised in that described extraction module is additionally operable to:
After determining that the message received includes key message and/or target information, extract from described message and comprise pass Key information and the subordinate sentence of target information.
11. equipment as claimed in claim 8, it is characterised in that described extraction module specifically for:
The subordinate sentence comprising key message is extracted from described message;Extract from the subordinate sentence comprising key message and comprise target information Subordinate sentence;Or
The subordinate sentence comprising target information is extracted from described message;Extract from the subordinate sentence comprising target information and comprise key message Subordinate sentence.
12. equipment as claimed in claim 11, it is characterised in that described extraction module specifically for:
Determine all key messages that the message received includes;
After determining the default mark being positioned at before described key message from described message and being positioned at described key message Near default mark, using two contents preset between mark as subordinate sentence.
13. equipment as claimed in claim 11, it is characterised in that described extraction module specifically for:
Determine all target informations that the message received includes;
After determining the default mark being positioned at before described target information from described message and being positioned at described target information Near default mark, using two contents preset between mark as subordinate sentence.
14. as arbitrary in claim 8~13 as described in equipment, it is characterised in that described distance determine module specifically for:
If the described target information in described subordinate sentence is positioned at before described key message, then it is determined according to the following equation described point Distance between target information in Ju and the key message in described subordinate sentence:
Distance=p_keyword-(p_number+length_number);
If the described target information in described subordinate sentence is positioned at after described key message, then it is determined according to the following equation described point Distance between target information in Ju and the key message in described subordinate sentence:
Distance=p_number-(p_keyword+length_keyword);
Wherein, the distance between the target information during distance is described subordinate sentence and the key message in described subordinate sentence;
P_number is between first symbol of target information described in described subordinate sentence and first symbol of described message Distance;
Length_number is the length of described target information;
P_keyword is between first symbol of key message described in described message and first symbol of described message Distance;
Length_keyword is the length of described key message.
CN201610298475.2A 2016-05-06 2016-05-06 Method and equipment for identifying verification information Active CN106060000B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010038902.XA CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information
CN201610298475.2A CN106060000B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610298475.2A CN106060000B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202010038902.XA Division CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Publications (2)

Publication Number Publication Date
CN106060000A true CN106060000A (en) 2016-10-26
CN106060000B CN106060000B (en) 2020-02-07

Family

ID=57176835

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010038902.XA Active CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information
CN201610298475.2A Active CN106060000B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202010038902.XA Active CN111277579B (en) 2016-05-06 2016-05-06 Method and equipment for identifying verification information

Country Status (1)

Country Link
CN (2) CN111277579B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106388713A (en) * 2016-10-31 2017-02-15 南昌大学 Intelligent sweeping robot
CN108270567A (en) * 2016-12-30 2018-07-10 阿里巴巴集团控股有限公司 Informed source verification method, device and system and message method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484841B (en) * 2023-05-10 2023-10-03 道有道科技集团股份公司 Information verification system and method based on automatic auditing

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027984A1 (en) * 2003-07-09 2005-02-03 Kabushiki Kaisha Toshiba Information communication device, information communication system, and computer program product for transmission control
CN103186857A (en) * 2011-12-31 2013-07-03 ***股份有限公司 Bank card payment method and system
CN104021376A (en) * 2014-06-05 2014-09-03 北京乐动卓越科技有限公司 Verification code identifying method and device
CN105117384A (en) * 2015-08-19 2015-12-02 小米科技有限责任公司 Classifier training method, and type identification method and apparatus
CN105488025A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Template construction method and apparatus and information identification method and apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7376893B2 (en) * 2002-12-16 2008-05-20 Palo Alto Research Center Incorporated Systems and methods for sentence based interactive topic-based text summarization
CN104283682A (en) * 2013-07-08 2015-01-14 深圳市腾讯计算机***有限公司 Method, device and system conducting verification through verification codes
CN104683963A (en) * 2015-02-15 2015-06-03 联想(北京)有限公司 Information processing method and electronic equipment
CN104853329B (en) * 2015-04-27 2018-06-12 小米科技有限责任公司 The method and apparatus of identification number
CN105447750B (en) * 2015-11-17 2022-06-03 小米科技有限责任公司 Information identification method and device, terminal and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050027984A1 (en) * 2003-07-09 2005-02-03 Kabushiki Kaisha Toshiba Information communication device, information communication system, and computer program product for transmission control
CN103186857A (en) * 2011-12-31 2013-07-03 ***股份有限公司 Bank card payment method and system
CN104021376A (en) * 2014-06-05 2014-09-03 北京乐动卓越科技有限公司 Verification code identifying method and device
CN105117384A (en) * 2015-08-19 2015-12-02 小米科技有限责任公司 Classifier training method, and type identification method and apparatus
CN105488025A (en) * 2015-11-24 2016-04-13 小米科技有限责任公司 Template construction method and apparatus and information identification method and apparatus

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106388713A (en) * 2016-10-31 2017-02-15 南昌大学 Intelligent sweeping robot
CN108270567A (en) * 2016-12-30 2018-07-10 阿里巴巴集团控股有限公司 Informed source verification method, device and system and message method and device
CN108270567B (en) * 2016-12-30 2021-09-28 阿里巴巴集团控股有限公司 Message source verification method, device and system and message sending method and device

Also Published As

Publication number Publication date
CN111277579B (en) 2023-01-17
CN111277579A (en) 2020-06-12
CN106060000B (en) 2020-02-07

Similar Documents

Publication Publication Date Title
US10795629B2 (en) Text and custom format information processing method, client, server, and computer-readable storage medium
CN105591885B (en) resource sharing method and device
CN104468531B (en) The authorization method of sensitive data, device and system
CN102324004A (en) Verification method for webpage form input information and device
CN103546877A (en) Method and system for obtaining and inputting content code and mobile terminal
US20140074950A1 (en) Determining additional information associated with geographic location information
CN106515244B (en) A kind of express delivery singles impression method, system, mobile terminal and printer
CN111787154A (en) Information processing method and electronic equipment
CN104252479A (en) Method, device and system for processing information
CN106060000A (en) Method and device of identifying verification information
CN105376636B (en) Fill in method, householder method, smart television and the intelligent mobile terminal of identifying code
CN105227431B (en) The method and apparatus that good friend or group are fast added in instant messaging
CN106911554B (en) Historical information display method and device
US20160154959A1 (en) A method and system for monitoring website defacements
CN105915700A (en) Verification code prompting method and equipment
CN108920955B (en) Webpage backdoor detection method, device, equipment and storage medium
CN107493229A (en) Message group sending method, server and the computer-readable storage medium of converged communication
CN115344315B (en) Skin switching method and device of applet page and electronic equipment
CN110109594A (en) A kind of draw data sharing method, device, storage medium and equipment
CN104935436A (en) User verification method and user verification system
CN104778554A (en) Method and device for identifying multiple matched users
CN104252309B (en) A kind of method and system for realizing intelligent terminal Chinese version editor
CN112840305B (en) Font switching method and related product
CN108985059B (en) Webpage backdoor detection method, device, equipment and storage medium
CN108882239B (en) Information sending method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee after: Qingdao Hisense Mobile Communication Technology Co.,Ltd.

Address before: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee before: HISENSE MOBILE COMMUNICATIONS TECHNOLOGY Co.,Ltd.