WO2019153586A1 - Procédé et appareil de traitement de données de dialogue en ligne, dispositif informatique et support d'informations - Google Patents

Procédé et appareil de traitement de données de dialogue en ligne, dispositif informatique et support d'informations Download PDF

Info

Publication number
WO2019153586A1
WO2019153586A1 PCT/CN2018/089010 CN2018089010W WO2019153586A1 WO 2019153586 A1 WO2019153586 A1 WO 2019153586A1 CN 2018089010 W CN2018089010 W CN 2018089010W WO 2019153586 A1 WO2019153586 A1 WO 2019153586A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
login
chat data
current
chat
Prior art date
Application number
PCT/CN2018/089010
Other languages
English (en)
Chinese (zh)
Inventor
张澍滋
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019153586A1 publication Critical patent/WO2019153586A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/063Content adaptation, e.g. replacement of unsuitable content

Definitions

  • the present application relates to a chat data processing method, apparatus, computer device, and storage medium.
  • a chat data processing method is provided.
  • a method of processing chat data comprising:
  • a chat data processing device includes:
  • a first obtaining module configured to obtain a login identifier, and query an authentication result corresponding to the login identifier
  • a second acquiring module configured to acquire login data corresponding to the login identifier, and obtain current chat data corresponding to the login data, when the authentication result corresponding to the login identifier is successful;
  • a query module configured to acquire current suspicious chat data in the current chat data according to preset query logic
  • a storage module configured to search for an associated source identifier according to the current suspicious chat data, obtain associated suspicious chat data according to the associated source identifier, and store the associated suspicious chat data;
  • An extracting module configured to extract a first network address carried by the first user terminal corresponding to the current suspicious chat data, and extract a second network address carried by the second user terminal corresponding to the associated suspicious chat data, A network address is monitored with the second network address.
  • a computer device comprising a memory and one or more processors having stored therein computer readable instructions, the computer readable instructions being executable by the processor to cause the one or more processors to execute The following steps:
  • One or more non-transitory computer readable storage mediums storing computer readable instructions, when executed by one or more processors, cause one or more processors to perform the steps of:
  • FIG. 1 is an application scenario diagram of a chat data processing method according to one or more embodiments.
  • FIG. 2 is a flow diagram of a method of processing chat data in accordance with one or more embodiments.
  • FIG. 3 is a block diagram of a chat data processing device in accordance with one or more embodiments.
  • FIG. 4 is a block diagram of a computer device in accordance with one or more embodiments.
  • the chat data processing method provided by the present application can be applied to an application environment as shown in FIG. 1.
  • the login terminal 102 communicates with the server 104 over the network via the network.
  • the login terminal 102 obtains the login identifier and queries the corresponding authentication result of the login identifier.
  • the login terminal 102 can perform data interaction with the server 104, and the login terminal 102 acquires the login data corresponding to the login identifier, and further
  • the login terminal 102 obtains the current chat data corresponding to the login data.
  • the current chat data is obtained, the current suspicious chat data in the current chat data is obtained according to the preset query logic, and the associated source identifier is searched according to the current suspicious chat data, according to the association.
  • the source identifier obtains the associated suspicious chat data, stores the associated suspicious chat data, extracts the first network address carried by the first user terminal corresponding to the current suspicious chat data, and extracts the second user terminal carried by the second user terminal corresponding to the suspicious chat data.
  • the network address monitors the first network address and the second network address.
  • the login terminal 102 can be, but is not limited to, a variety of personal computers, notebook computers, smart phones, tablets, and portable wearable devices.
  • the server 104 can be implemented as a standalone server 104 or a cluster of servers 104 comprised of multiple servers 104.
  • a method for processing a chat data is provided.
  • the method is applied to the login terminal in FIG. 1 as an example, and includes the following steps:
  • S202 Acquire a login identifier, and query an authentication result corresponding to the login identifier.
  • the login identifier is an identifier that is obtained from the server and carries the data to be authenticated.
  • the login identifier can be authenticated by the server, so that the login terminal and the server perform data interaction identification.
  • the login identifier can be a login QR code.
  • the login identifier is obtained, and the result of whether the authentication is passed is checked.
  • the data interaction may be established with the server to perform data interaction.
  • the login QR code is sent to the server for verification.
  • the authentication result of the login QR code passing the server authentication is successful, the login is performed.
  • the terminal can perform data interaction with the server, such as obtaining chat data corresponding to the corresponding login data.
  • the login data refers to the authentication information requesting to acquire the data stored on the server, where the authentication information is stored in the server, and the login data may be the identity verification information of the corresponding chat data stored by the server, and the identity verification information.
  • the login data Stored in the server, and stored with the chat data corresponding to the authentication information, for example, the login data may be a user account or the like.
  • the chat data refers to data that is exchanged by different login data.
  • the chat data may be text data, and may be image data or digital data.
  • the chat data may be a chat record between the current login data and its login data, and the chat data may be The data may also be a chat record that the current login data receives or sends in different chat groups.
  • the login data corresponding to the login identifier is obtained, and the server can perform data interaction, and then the chat data corresponding to the current login data is obtained from the server.
  • the login terminal obtains the login QR code and queries the current login QR code to be authenticated by the server, and the corresponding authentication result is successful
  • the corresponding user account is obtained from the server, and according to the obtained corresponding
  • the user account obtains the chat data between the user account and other user accounts, for example, the chat record between the user account and other user accounts can be obtained, and the chat received or sent in the group chat joined by the user account can also be obtained. Record and so on.
  • S206 Acquire current suspicious chat data in current chat data according to preset query logic.
  • the query logic refers to whether a preset query data of the chat data with a risk level greater than a preset level exists in the preset chat data; the suspicious chat data refers to the data in the current chat data that has a risk level greater than a preset level, and is suspicious.
  • the chat data may be picture data, may be text data, or may be digital data.
  • the query logic is used to match the acquired chat data one by one until all the chat data is traversed, and when at least one chat data in the chat data matches the query logic successfully,
  • the chat data has chat data with a risk level greater than a preset level, that is, the current chat data including the data whose risk level is greater than the preset level is the current suspicious chat data. For example, if the query logic is to query whether the "Ping An Bank” and the "Activity" exist in the chat data, the "Ping An Bank” and the chat data are first matched one by one.
  • chat data containing "Ping An Bank” When the chat data containing "Ping An Bank” is queried, The chat data including “Ping An Bank” is extracted, and then the extracted chat data including “Ping An Bank” is matched with “Activity” one by one. When the match is successful, “Ping An Bank” and “Activity” will be included. The chat data is extracted, and the chat data including “Ping An Bank” and “Activity” is the current suspicious chat data when the data with the risk level greater than the preset level is present.
  • S208 Search for the associated source identifier according to the current suspicious chat data, obtain the associated suspicious chat data according to the associated source identifier, and store the associated suspicious chat data.
  • the associated source identifier refers to an overall identifier of a plurality of different objects associated with the basic information in the current suspicious chat data, and the associated source identifier may be associated with the corresponding user personal information in the current suspicious chat data.
  • the overall identifier of the different objects for example, the associated source identifier may be the group number of the group associated with the corresponding account in the current suspicious chat data, and the like.
  • Logic query whether the associated suspicious chat data exists in the associated chat data, and querying whether the associated suspicious chat data exists in the associated chat data by using the query logic may use the query logic to match the associated chat data one by one. When the matching is successful, the association is performed. If there is chat data with a risk level greater than the preset level in the chat data, the associated chat data including the data with the risk level greater than the preset level is the associated suspicious chat data, and the associated suspicious chat data is stored.
  • S210 Extract a first network address carried by the first user terminal corresponding to the current suspicious chat data, and extract a second network address carried by the second user terminal corresponding to the suspicious chat data, and perform the first network address and the second network address. monitor.
  • the first network address refers to a network address of a computer in which the first user terminal corresponding to the current suspicious chat data is located in a network, and the network address can uniquely identify the user terminal in the network, and the user terminal performs with other computers.
  • the network address can be used as the communication identifier during communication.
  • the network address can be an IP (Internet Protocol) address or the like.
  • the second network address refers to a network address of a computer in which the second user terminal corresponding to the suspicious chat data is located in a network, and the network address can uniquely identify the user terminal in the network, and the user terminal can communicate with other computers.
  • the network address is used as the communication identifier.
  • the network address may be an IP (Internet Protocol) address or the like.
  • the first network address carried by the first user terminal corresponding to the current chat data is extracted, and the second user terminal corresponding to the suspicious chat data is extracted.
  • the network address is further monitored, and the first network address and the second network address are further monitored, and the number of account registrations corresponding to the first network address and the number of account registrations corresponding to the second network address may be monitored, and the other network address corresponding to the first network address may be monitored.
  • the chat data may also monitor other chat data and the like corresponding to the second network address, so as to further process the monitored first network address and the second network address, such as limiting the first network address or the other terminal corresponding to the second network address. Web page access, etc.
  • the server when the login identifier is successfully authenticated, can communicate with the server, obtain the login data, obtain the current chat data according to the login data, obtain the current chat data reliably, and then query the current chat data according to the query logic.
  • Obtain the current suspicious data in the current chat data improve the accuracy of the query, and when the current suspicious chat data is obtained, query the associated source identifier according to the current suspicious chat data, and query the associated suspicious chat data according to the associated source identifier, instead of merely Query only the current suspicious chat data in the current chat data, avoiding omissions in the query, and querying other suspicious data of the associated chat by the current suspicious chat data, improving the query efficiency, and the first user terminal corresponding to the current suspicious chat data.
  • the first network address carried and the second network address carried by the second user terminal corresponding to the suspicious chat data are monitored to further improve query efficiency and enhance applicability.
  • the step S202 may include: when the login identifier is scanned, sending the login terminal information to the scanning terminal that scans the login identifier, so that the scanning terminal will log in to the terminal. Information and login data are forwarded to the server.
  • the login data sent by the scanning terminal to the server is authenticated by the server, the authentication result returned by the server according to the login terminal information is received.
  • the scanning terminal refers to a device that can receive the login terminal information corresponding to the login identifier, and the scanning terminal may be a smart phone, a tablet computer, etc.; the login terminal information refers to the identity verification information of the currently logged in device, and the identity verification information may be hidden.
  • the login terminal information may be the network environment identifier of the current login terminal, and the login terminal information may also be the device information corresponding to the currently logged-in terminal.
  • the login terminal information may be hidden in the current login identifier.
  • the server presets the authentication information, and the login terminal information may be an IP (Internet Protocol) address corresponding to the currently logged-in terminal.
  • IP Internet Protocol
  • the login terminal information is sent to the scanning terminal that scans the login identifier, so that the scanning terminal forwards the login terminal information and the login data to the server.
  • the scanning terminal scans the login identifier
  • the scanning terminal sends a scanning request to the login terminal.
  • the login terminal receives the scanning request, it identifies that the login terminal is scanned, and further sends the login terminal to the scanning terminal that scans the login identifier.
  • the information about the server may be sent to the scanning terminal, and the authentication information of the server that is hidden in the login identifier may be sent, or the IP address of the currently logged-in terminal may be sent, and the scanning terminal receives the login terminal verification information, such as the server preset hidden in the login identifier.
  • the verification information or the IP address of the currently logged-in terminal sends the login terminal information and the current login data, such as a user account or a user account and a password, to the server.
  • the login terminal information sent to the scan terminal may be any type of login terminal information, or may be a combination of multiple login terminal information.
  • the login terminal may perform data interaction with the server, that is, the other corresponding to the login data may be obtained from the server.
  • the data receives the result of the authentication passed by the server based on the login terminal information.
  • the scanning terminal server sends the login data
  • the server matches the login data with the pre-stored login data one by one.
  • the login data is regarded as pre-stored login data, and the login terminal can be connected to the server.
  • Data interaction is performed, that is, the chat data corresponding to the number of logins can be obtained from the server, and the result of the authentication that the server receives the return based on the login terminal information is registered.
  • the server matches the received account password with the account password in the pre-existing server one by one.
  • the login terminal can communicate with the server. Therefore, the data interaction may be performed, for example, the chat data corresponding to the current account password may be requested from the server, and the result of the authentication that the login terminal receives the server according to the login terminal information, such as the login terminal receiving server returns to the IP address corresponding to the login terminal.
  • the result of the verification of the login terminal is performed, that is, the chat data corresponding to the number of logins can be obtained from the server, and the result of the authentication that the server receives the return based on the login terminal information is registered.
  • the login data sent by the scanning terminal to the server is an account password
  • the server matches the received account password with the account password in the pre-existing server one by one.
  • the login terminal may not perform data interaction with the server, that is, the login cannot be obtained from the server.
  • the login terminal when the login identifier is scanned, the login terminal sends the login terminal information to the scan terminal, so that the scan terminal forwards the login terminal information and the login data to the server, and then the login data sent by the scan terminal to the server is verified by the server.
  • the receiving server Upon completion, the receiving server returns the authentication result according to the login terminal information, and the login terminal is authenticated to perform data interaction with the server, thereby ensuring that the chat data acquired by the login terminal is accurate, thereby accurately analyzing the chat data.
  • the method may further include: outputting the failure prompt information when the authentication result returned by the server has not been received within the preset time period.
  • a re-operation instruction corresponding to the failure prompt information is received. The step of updating the login ID according to the re-operation instruction and continuing to obtain the login ID.
  • the failure prompt information refers to the prompt information for performing different operations
  • the failure prompt information may be information displayed on the login terminal
  • the failure prompt information may be a text prompt, which may be a symbol prompt, etc.
  • the failure prompt information may be The message prompt box containing the current operation timeout and whether to re-acquire the login ID is displayed on the login terminal. Further, in the preset time period, if the authentication result returned by the server is not received, the current login identifier is not scanned for a long time, and the scanning terminal that steals the login data is subsequently scanned to cause the current login data to be corresponding. If the data is stolen, the current login ID is invalid, and the failure prompt information is output, and a new login identifier is obtained.
  • the current login ID is not scanned for a long time.
  • the current If the login ID is invalid, and the scanning terminal cannot scan, you need to obtain a new login ID, and then output the corresponding failure prompt information.
  • the failure prompt message of “Current operation timeout, re-acquisition of login ID?” is output. It should be noted that the preset time may also be 10 seconds, 50 seconds, 1 minute 20 seconds, and the like.
  • the re-operation instruction in the step of receiving the re-operation instruction corresponding to the failure prompt information refers to an instruction for the login terminal to select a subsequent operation.
  • the re-operation instruction may be an instruction to obtain an updated login identifier, and the re-operation instruction may also be Obtain an instruction to update the login ID, and so on.
  • the login terminal outputs the failure prompt information
  • the re-operation instruction corresponding to the failure prompt information is received.
  • the login terminal outputs the failure prompt information
  • the user selects the subsequent operation according to the failure prompt information
  • the login terminal receives the re-operation instruction generated according to the user's selection according to the user's selection.
  • the login terminal outputs a failure prompt message “Current operation timeout, whether to re-acquire the login identifier?”, the user selects according to the failure prompt information, and when the selection is “Yes”, generates a corresponding re-operation instruction for acquiring a new login terminal.
  • the login terminal receives a re-operation instruction for acquiring a new login terminal generated according to the user's selection.
  • the server sends a request for acquiring a new login identifier to the server according to the re-operation instruction, and then receives the new login identifier to update the current login identifier, thereby continuing the query.
  • the authentication result corresponding to the login identifier is obtained.
  • the login identifier is successfully authenticated, the login data corresponding to the login identifier is obtained, and the current chat data corresponding to the login data is obtained, and the current suspicious chat data in the current chat data is obtained according to the preset query logic.
  • the associated source identifier is searched, and the associated suspicious chat data is obtained according to the associated source identifier, and the associated suspicious chat data is stored.
  • the re-operation instruction generated according to the failure prompt information is further received, and the login identifier is updated according to the re-operation instruction to ensure It is safe and ensures that the obtained chat data is safe, so as to ensure the subsequent identification of the chat data is accurate.
  • the step of obtaining the current chat data corresponding to the login data in step S204 may include: receiving an interface address of the parameter retrieval interface returned by the server, and obtaining and registering the data through the parameter acquisition interface according to the interface address.
  • Corresponding login confirmation parameters Obtain the group basic data corresponding to the login confirmation parameter.
  • the group chat data corresponding to the group basic data is obtained as current chat data.
  • the group chat data refers to a group in which the login data is added, and the login terminal receives the chat data in the group to which the login data is added.
  • the group chat data corresponding to the group basic data is obtained as the current chat data.
  • the parameter acquisition interface refers to a port that can be configured to obtain different parameters
  • the parameter acquisition interface can be a verification parameter for obtaining a successful login.
  • the interface address is an identifier of a port that can be configured to obtain different parameters.
  • the address can be the interface number of the interface corresponding to the interface.
  • the login confirmation parameter refers to the confirmation identifier of the current login status returned by the server.
  • the login confirmation parameter can be a pre-stored character string or a pre-stored parameter value.
  • the login confirmation parameter corresponds to the login data, and the login terminal can perform the same with the server.
  • Data interaction, and other data corresponding to the login data, such as chat data can be obtained.
  • the login terminal receives the interface address of the interface obtained by the server, and obtains the interface number of the interface, and then obtains the parameter acquisition interface corresponding to the interface number, and obtains the corresponding login confirmation parameter through the interface, for example, obtaining
  • the login data corresponding to the server passes the verification confirmation identifier, and the login terminal and the server can perform data interaction, so that the login terminal can obtain other data corresponding to the login data, such as chat data.
  • the login terminal receives the interface number of the parameter acquisition interface returned by the server, and obtains the login confirmation parameter corresponding to the account according to the interface number, such as Ptwebqq parameter.
  • the group basic data in the group basic data step corresponding to the login confirmation parameter refers to the basic information of the group to which the login data is added, and the group basic data may be text data, may be picture data, or may be digital data.
  • the group basic data may be a group name of a group to which the login data is added, the group basic data may be a group group number of the login data added to the group, and the group basic data may also be the login data added to the group. Group avatar pictures, etc.
  • the login confirmation parameter is obtained, the corresponding group information parameter is obtained according to the login confirmation parameter, and the corresponding group basic data is read according to the group information parameter.
  • the login terminal obtains the login confirmation parameter
  • the current login data is successfully verified, and the login terminal can perform data interaction with the server, and then obtain corresponding group information parameters according to the login confirmation parameter, and send the group to the server.
  • the corresponding server is a QQ chat server
  • the login terminal obtains a login confirmation parameter, such as a ptwebqq parameter
  • the corresponding group information parameter is obtained according to the ptwebqq parameter
  • the group information parameter may be a vfwebqq parameter.
  • the group information parameter refers to a parameter that can obtain corresponding group basic information.
  • the group information parameter may be a vfwebqq parameter or the like.
  • Obtaining the group chat data corresponding to the group basic data as the group chat data in the current chat data step refers to the group in which the login data is added, and the login terminal receives the chat data in the group to which the login data is added. Further, when the group basic data is obtained, the message request parameter is obtained, and then the chat data acquisition request corresponding to the message request parameter is sent to the server, and the group basic data stored on the server is obtained according to the acquisition request. Group chat data is used as current chat data.
  • the login terminal When the login terminal obtains the group basic data, the message request parameter is obtained, and then the chat data acquisition request corresponding to the message request parameter is sent to the server, and when the server verification message request data is a legitimate message request data,
  • the login terminal can obtain the group chat data corresponding to the group basic data stored on the server, and the login terminal obtains the group chat data as the current chat data.
  • the message request parameter is obtained, and the message request parameter may be a uin parameter, and the login terminal sends the chat data carrying the uin parameter to the server.
  • the server When the server receives the chat data acquisition request, the server verifies that the uin parameter is a valid uin parameter, and then sends the chat data to the login terminal, so that the login terminal acquires the group chat data and chats the group.
  • the data is used as the current chat data.
  • the message request parameter refers to a parameter that can obtain the corresponding chat data after the server is successfully verified.
  • the message request parameter may be a uin parameter or the like.
  • the login terminal receives the interface address of the parameter acquisition interface returned by the server, obtains the login confirmation parameter corresponding to the login data through the parameter acquisition interface, and obtains the group basic data corresponding to the login confirmation parameter, and obtains the group.
  • the group chat data corresponding to the basic data is used as the current chat data, and the manner of obtaining the chat data is reliable, and the current chat data is guaranteed to be reliable for the suspicious chat data.
  • the step S206 may include: determining, by using the preset query logic, whether the current chat data has data with a risk level greater than a preset level. .
  • the keyword in the current chat data including the data whose risk level is greater than the preset level is extracted. Get the category corresponding to the keyword.
  • the current chat data including data whose risk level is greater than the preset level is stored under the acquired category.
  • the query logic refers to a judgment rule pre-stored in the server, and the query logic may be a rule for judging whether there is suspicious chat data.
  • the risk level can be used to evaluate the level of threatening information in the current chat data. For example, the risk level can be set from low to high according to the level. The higher the risk level, the higher the risk of the corresponding chat data exists. For example, the risk level is set to level 1 to level 5, indicating that the risk corresponding to the chat data is increasing. The higher.
  • the current chat data is matched with the query logic one by one until all the current chat data is traversed, and when the matching is successful, the risk level in the current chat data is greater than the pre- Set the level of data, and then the current chat data is suspicious chat data.
  • the login terminal obtains the pre-stored query logic, and uses the query logic to match the current chat data to the query logic one by one until all current chat data is traversed.
  • the current chat data is at risk.
  • the data whose level is greater than the preset level that is, the data with high risk level exists in the current chat data, and then the current chat data of the login terminal is suspicious chat data.
  • the pre-stored query logic obtained by the login terminal queries whether the “Ping An Bank has an activity” in the current chat data
  • the “Ping An Bank has an activity” is matched with the current chat data one by one, and when the matching is successful, the article is The current chat data has data with a risk level greater than a preset level, and then the current chat data is the current suspicious chat data.
  • the chat data including the data whose risk level is greater than the preset level is threatening, that is, the current chat data is currently suspicious.
  • Data which in turn extracts keywords from the current chat data.
  • the chat data that includes the data whose risk level is greater than the preset level is threatening when the login terminal queries the current chat data according to the query logic, and the current chat data is The current suspicious data, and then the login terminal extracts the keywords in the current chat data.
  • the login terminal queries that the current chat data includes “Ping An Bank has an activity”
  • the current chat data including “Ping An Bank has an activity” is threatening, that is, the current chat data is current suspicious data, and then the terminal is logged in. Extract keywords such as "bank” in the current chat data.
  • the category to which the keyword belongs is obtained according to the obtained keyword in the current chat data that includes the data whose risk level is greater than the preset level.
  • the login terminal may pre-store different data categories, for example, the data category is “bank category”, and the data category is “web page category”.
  • the login terminal obtains the current chat according to the acquired data including the risk level greater than the preset level.
  • the keyword in the data the category to which the keyword belongs. For example, the login terminal obtains the corresponding category as “bank category” according to the obtained keyword in the current chat data including the data whose risk level is greater than the preset level.
  • current chat data including data whose risk level is greater than the preset level is stored under the corresponding category.
  • the login terminal obtains the data whose risk level is greater than the preset level
  • the keyword in the current chat data including the data whose risk level is greater than the preset level is extracted, and then the current chat data is stored according to the keyword.
  • the login terminal obtains the data whose risk level is greater than the preset level as “Ping An Bank has activities”, and then extracts the keyword containing the current chat data of “Ping An Bank has activities” as “Bank”, and then will include “Ping An Bank has The current chat data of the activity is stored under the corresponding "Bank” category.
  • the query logic is used to query the current chat data, and then the keywords in the current chat data including the data whose risk level is greater than the preset level are extracted, and the current chat data is stored in the category corresponding to the keyword, and the query is performed. Suspicious chat data is accurate, and query logic is used to query, which improves query efficiency.
  • the step S208 is to obtain the associated source identifier according to the current suspicious chat data, obtain the associated suspicious chat data according to the associated source identifier, and store the associated suspicious chat data, which may include: acquiring the network address corresponding to the network address.
  • the chat receives the log, and obtains the associated source identifier corresponding to the user terminal identifier in the chat receiving log. Get the associated chat data corresponding to the associated source identifier.
  • the preset query logic determines whether there is data with a risk level greater than a preset level in the associated chat data. When the data with the risk level greater than the preset level is queried, the keyword according to the associated message data is stored under the corresponding category. Extract the network address of the user terminal identifier corresponding to the current suspicious chat data.
  • the user terminal identifier refers to the identity identifier of the user terminal corresponding to the current suspicious chat data
  • the user terminal identifier may be a text identifier, which may be a picture identifier, or may be a digital identifier, for example, the user terminal identifier may be the current
  • the user name of the user who is suspicious of the chat data may be the user's avatar of the user who sends the current suspicious chat data.
  • the suspicious chat data obtained according to the foregoing method is used to extract the user terminal identifier corresponding to the current suspicious data, and further, query the network address corresponding to the user terminal identifier.
  • the login terminal extracts the current suspicious chat data
  • the user identity identifier corresponding to the current suspicious chat data is sent, and the user name of the user is extracted, and the user name is queried to the user name.
  • the IP address to which the terminal belongs is used to extract the user terminal identifier.
  • the chat receiving log in the step of storing the data associated with the chat data, and the chat receiving log may be stored There is corresponding chat data, and the user terminal identifier corresponding to the chat data can be stored. Further, when the network address is obtained, the chat receiving log corresponding to the network address is obtained, and the chat receiving log is queried, so as to obtain the associated source identifier corresponding to the obtained user terminal identifier.
  • the login terminal when the login terminal obtains the network address, the login terminal obtains the chat reception log corresponding to the network address, and queries the obtained user terminal identifier, such as the other associated source identifier corresponding to the user name of the user, in the chat reception log. For example, the group number of another group corresponding to the user name is obtained, that is, the group number of another group to which the user corresponding to the user name is added is obtained.
  • the associated chat data in the step of obtaining the associated chat data corresponding to the associated source identifier refers to the chat data corresponding to the associated source identifier, and the associated chat data may be text data, image data, digital data, etc., for example, the associated chat data may be a group. Chat information in .
  • the associated source identifier is obtained, the associated chat data corresponding to the corresponding associated source identifier is extracted. Further, when the login terminal obtains the associated source identifier, the user corresponding to the current login data is queried in the group corresponding to the current association source identifier, and the user corresponding to the login data exists in the group corresponding to the current source identifier.
  • the server sends a request to the server to add to the current source identifier.
  • the associated chat data corresponding to the associated source identifier is obtained.
  • the obtained association source identifier is the group number of the other chat group added by the user identifier corresponding to the obtained suspicious chat data, and further, the login terminal queries whether the user corresponding to the login data is added to the group corresponding to the group number.
  • the associated chat data in the group is obtained; when the user corresponding to the login data is not added to the group corresponding to the group number, The login terminal sends a request to the server to add to the group corresponding to the group number.
  • the user corresponding to the login data is added to the group corresponding to the group number, the associated chat data in the group is obtained.
  • the associated chat data is matched with the query logic one by one until all the associated chat data is traversed, and when the matching is successful, the risk level existing in the associated chat data is greater than
  • the data of the preset level when there is data in the associated chat data that has a risk level greater than the preset level, the associated chat data is the associated suspicious chat data, and the keywords in the associated chat data are extracted, according to the extracted key Word, the associated chat data is stored under the category corresponding to the keyword.
  • the query logic in the login terminal is “Ping An Bank has a reward”, and the associated chat data is matched with the query logic one by one until all the associated chat data is traversed.
  • the associated chat data is associated with the suspicious chat data, and the keyword “bank” in the associated chat data is extracted, and the associated chat data is stored in the “bank” category corresponding to the keyword according to the extracted keyword. under.
  • the network address of the user terminal identifier corresponding to the current suspicious chat data is queried, and the associated source identifier corresponding to the user terminal is further queried, that is, only the associated terminal identifier can be queried through the user terminal identifier, and the query is simple, and A plurality of other associated source identifiers can be obtained at the same time, the query efficiency is high, and the corresponding associated chat data is obtained according to the associated source identifier, and the associated query logic determines whether there is data with a risk level greater than a preset level in the associated chat data.
  • the keywords according to the associated message data are stored under the corresponding category, so as to avoid querying only the current suspicious message data, and the query is omitted, thereby enhancing applicability.
  • the first network address carried by the first user terminal corresponding to the current suspicious chat data is extracted, and the second network address carried by the second user terminal corresponding to the suspicious chat data is extracted.
  • the step of monitoring the network address and the second network address may include: extracting a first network address carried by the first user terminal corresponding to the current suspicious chat data and a second network address carried by the second user terminal corresponding to the associated chat data The first network address and the second network address corresponding to the number of account applications in the preset time period are respectively queried.
  • the network address corresponding to the account application account exceeding the preset value is As the suspicious network address, the monitoring identifier is added to the suspicious network address, and the network address is monitored according to the monitoring identifier.
  • the terminal corresponding to the network address is a terminal whose risk level is greater than a preset level, and further restricts the terminal corresponding to the network address from performing webpage access.
  • the network address carried by the first user terminal corresponding to the current suspicious chat data is taken as an example.
  • the first query is performed within 5 minutes. The number of account applications corresponding to the network address.
  • the first network address is a suspicious network address, and the terminal corresponding to the first network address may be malicious.
  • the preset time period may be 3 minutes, may be 10 minutes, and the like.
  • the default number of account applications can be 100, which can be 200 or so.
  • the second network address carried by the second terminal corresponding to the suspicious chat data may be monitored in the same manner, and details are not described herein.
  • the suspicious chat data when the suspicious chat data is monitored, and according to the network address of the user terminal identifier corresponding to the suspicious chat data, it is queried whether the network address is a suspicious network address, and when it is a suspicious network address, marking is performed for subsequent monitoring.
  • the network address is a suspicious network address, and when it is a suspicious network address, marking is performed for subsequent monitoring.
  • steps in the flowchart of FIG. 2 are sequentially displayed as indicated by the arrows, these steps are not necessarily performed in the order indicated by the arrows. Except as explicitly stated herein, the execution of these steps is not strictly limited, and the steps may be performed in other orders. Moreover, at least some of the steps in FIG. 2 may include a plurality of sub-steps or stages, which are not necessarily performed at the same time, but may be executed at different times, the execution of these sub-steps or stages The order is also not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of the other steps.
  • a chat data processing apparatus 300 including: a first obtaining module 310, a second obtaining module 320, a querying module 330, and a storage module 340, wherein:
  • the first obtaining module 310 is configured to obtain a login identifier, and query an authentication result corresponding to the login identifier.
  • the second obtaining module 320 is configured to acquire login data corresponding to the login identifier when the authentication result of the login identifier is successful, and obtain current chat data corresponding to the login data.
  • the query module 330 is configured to obtain current suspicious chat data in the current chat data according to the preset query logic.
  • the storage module 340 is configured to search for the associated source identifier according to the current suspicious chat data, obtain the associated suspicious chat data according to the associated source identifier, and store the associated suspicious chat data.
  • the extracting module 350 is configured to extract a first network address carried by the first user terminal corresponding to the current suspicious chat data, and extract a second network address carried by the second user terminal corresponding to the suspicious chat data, and the first network address and the first network address Two network addresses are monitored.
  • the first obtaining module 310 may include:
  • a sending unit configured to: when the login identifier is scanned, send the login terminal information to the scanning terminal that scans the login identifier, so that the scanning terminal forwards the login terminal information and the login data to the server.
  • the receiving unit is configured to: when the login data sent by the scanning terminal to the server is authenticated by the server, receive the authentication result returned by the server according to the login terminal information.
  • the chat data processing apparatus 300 may further include:
  • the output module is configured to output a failure prompt message when the authentication result returned by the server is not received within a preset time period.
  • the receiving module is configured to receive a re-operation instruction corresponding to the failure prompt information.
  • the update module is configured to update the login identifier according to the re-operation instruction and continue to obtain the login identifier.
  • the second obtaining module 320 may include:
  • the login confirmation parameter obtaining unit is configured to receive an interface address of the parameter obtaining interface returned by the server, and obtain a login confirmation parameter corresponding to the login data by using the parameter obtaining interface according to the interface address.
  • the group basic data acquiring unit is configured to acquire group basic data corresponding to the login confirmation parameter.
  • the group chat data obtaining unit is configured to acquire group chat data corresponding to the group basic data as the current chat data.
  • the query module 330 can include:
  • the determining unit is configured to determine, by using the preset query logic, whether there is data in the current chat data that has a risk level greater than a preset level.
  • the keyword extracting unit is configured to: when the data of the current chat data has a risk level greater than the preset level, extract the keyword in the current chat data that includes the data whose risk level is greater than the preset level.
  • a category obtaining unit configured to obtain a category corresponding to the keyword.
  • the first storage unit is configured to store current chat data including data with a risk level greater than a preset level under the acquired category.
  • the storage module can include:
  • the network address extracting unit is configured to extract a network address of the user terminal identifier corresponding to the current suspicious chat data.
  • the associated source identifier query unit is configured to obtain a chat receiving log corresponding to the network address, and query the associated source identifier corresponding to the user terminal identifier in the chat receiving log.
  • the associated chat data obtaining unit is configured to acquire associated chat data corresponding to the associated source identifier.
  • the second storage unit is configured to determine, by using the preset query logic, whether there is data with a risk level greater than a preset level in the associated chat data, and when the data with the risk level greater than the preset level is queried, the keyword is stored according to the keyword of the associated message data to Under the corresponding category.
  • chat data processing device For the specific definition of the chat data processing device, reference may be made to the above definition of the chat data processing method, and details are not described herein again.
  • Each of the above-described chat data processing devices may be implemented in whole or in part by software, hardware, and combinations thereof.
  • Each of the above modules may be embedded in or independent of the processor in the computer device, or may be stored in a memory in the computer device in a software form, so that the processor invokes the operations corresponding to the above modules.
  • a computer device which may be a terminal, and its internal structure diagram may be as shown in FIG.
  • the computer device includes a processor, memory, network interface, display screen, and input device connected by a system bus.
  • the processor of the computer device is used to provide computing and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium, an internal memory.
  • the non-volatile storage medium stores operating systems and computer readable instructions.
  • the internal memory provides an environment for operation of an operating system and computer readable instructions in a non-volatile storage medium.
  • the network interface of the computer device is used to communicate with an external terminal via a network connection.
  • the computer readable instructions are executed by a processor to implement a chat data processing method.
  • the display screen of the computer device may be a liquid crystal display or an electronic ink display screen
  • the input device of the computer device may be a touch layer covered on the display screen, or may be a button, a trackball or a touchpad provided on the computer device casing. It can also be an external keyboard, trackpad or mouse.
  • FIG. 3 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation of the computer device to which the solution of the present application is applied.
  • the specific computer device may It includes more or fewer components than those shown in the figures, or some components are combined, or have different component arrangements.
  • a computer apparatus comprising a memory, a processor, and computer readable instructions stored on the memory and executable on the processor, the processor performing the following steps: obtaining the login when executing the computer readable instructions Identify and query the authentication result corresponding to the login ID.
  • the authentication result of the login identifier is that the authentication is successful
  • the login data corresponding to the login identifier is obtained, and the current chat data corresponding to the login data is obtained.
  • Find the associated source identifier according to the current suspicious chat data obtain the associated suspicious chat data according to the associated source identifier, and store the associated suspicious chat data.
  • the first network address carried by the first user terminal corresponding to the current suspicious chat data is extracted, and the second network address carried by the second user terminal corresponding to the suspicious chat data is extracted, and the first network address and the second network address are monitored.
  • a computer device comprising a memory and one or more processors having stored therein computer readable instructions, the computer readable instructions being executed by the processor such that the one or more processors perform the step of: when the login identification is scanned Then, the login terminal information is sent to the scanning terminal that scans the login identifier, so that the scanning terminal forwards the login terminal information and the login data to the server.
  • the login data sent by the scanning terminal to the server is authenticated by the server, the authentication result returned by the server according to the login terminal information is received.
  • the processor when the processor executes the computer readable instructions, the processor further implements the step of outputting the failure prompt information when the authentication result returned by the server is not received within the preset time period.
  • a re-operation instruction corresponding to the failure prompt information is received. The step of updating the login ID according to the re-operation instruction and continuing to obtain the login identifier.
  • the step of obtaining the current chat data corresponding to the login data when the processor executes the computer readable instructions may further include: receiving an interface address of the parameter retrieval interface returned by the server, and obtaining the parameter according to the interface address.
  • the interface obtains the login confirmation parameter corresponding to the login data.
  • the group chat data corresponding to the group basic data is obtained as current chat data.
  • the step of acquiring the current suspicious chat data in the current message data according to the query logic may further include: determining, by using the preset query logic, whether there is a risk level in the current chat data. Data larger than the preset level.
  • the keyword in the current chat data including the data whose risk level is greater than the preset level is extracted. Get the category corresponding to the keyword.
  • the current chat data including data whose risk level is greater than the preset level is stored under the acquired category.
  • the step of searching for the associated source identifier according to the current suspicious chat data, obtaining the associated suspicious chat data according to the associated source identifier, and storing the associated suspicious chat data includes: extracting the current The network address of the user terminal identifier corresponding to the suspicious chat data. Obtain a chat receiving log corresponding to the network address, and query the associated source identifier corresponding to the user terminal identifier in the chat receiving log. Get the associated chat data corresponding to the associated source identifier.
  • the preset query logic determines whether there is data with a risk level greater than a preset level in the associated chat data. When the data with the risk level greater than the preset level is queried, the keyword according to the associated message data is stored under the corresponding category.
  • One or more non-transitory computer readable storage mediums storing computer readable instructions, when executed by one or more processors, cause one or more processors to perform the steps of: computer readable instructions
  • the computer readable instruction obtains the login identifier, and queries the authentication result corresponding to the login identifier.
  • the authentication result of the login identifier is that the authentication is successful
  • the login data corresponding to the login identifier is obtained, and the current chat data corresponding to the login data is obtained.
  • Find the associated source identifier according to the current suspicious chat data obtain the associated suspicious chat data according to the associated source identifier, and store the associated suspicious chat data.
  • the first network address carried by the first user terminal corresponding to the current suspicious chat data is extracted, and the second network address carried by the second user terminal corresponding to the suspicious chat data is extracted, and the first network address and the second network address are monitored.
  • the step of implementing the authentication result of querying the login identifier when the computer readable instruction is executed by the processor may further include: when the login identifier is scanned, sending the login terminal information to the scanning terminal scanning the login identifier, So that the scanning terminal forwards the login terminal information and the login data to the server.
  • the login data sent by the scanning terminal to the server is authenticated by the server, the authentication result returned by the server according to the login terminal information is received.
  • the following steps are further implemented: when the authentication result returned by the server is not received within the preset time period, the failure prompt information is output. A re-operation instruction corresponding to the failure prompt information is received. The step of updating the login ID according to the re-operation instruction and continuing to obtain the login identifier.
  • the step of acquiring the current chat data corresponding to the login data when the computer readable instructions are executed by the processor may further include: receiving an interface address of the parameter acquisition interface returned by the server, and passing the parameter according to the interface address
  • the obtaining interface obtains the login confirmation parameter corresponding to the login data.
  • the group chat data corresponding to the group basic data is obtained as current chat data.
  • the step of acquiring the current suspicious chat data in the current message data according to the query logic may further include: determining, by using the preset query logic, whether there is a risk in the current chat data. Data with a level greater than the preset level. When there is data in the current chat data whose risk level is greater than the preset level, the keyword in the current chat data including the data whose risk level is greater than the preset level is extracted. Get the category corresponding to the keyword. The current chat data including data whose risk level is greater than the preset level is stored under the acquired category.
  • the step of searching for the associated source identifier according to the current suspicious chat data, obtaining the associated suspicious chat data according to the associated source identifier, and storing the associated suspicious chat data includes: extracting The network address of the user terminal identifier corresponding to the current suspicious chat data. Obtain a chat receiving log corresponding to the network address, and query the associated source identifier corresponding to the user terminal identifier in the chat receiving log. Get the associated chat data corresponding to the associated source identifier.
  • the preset query logic determines whether there is data with a risk level greater than a preset level in the associated chat data. When the data with the risk level greater than the preset level is queried, the keyword according to the associated message data is stored under the corresponding category.
  • Non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM) or external cache memory.
  • RAM is available in a variety of formats, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronization chain.
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDRSDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • Synchlink DRAM SLDRAM
  • Memory Bus Radbus
  • RDRAM Direct RAM
  • DRAM Direct Memory Bus Dynamic RAM
  • RDRAM Memory Bus Dynamic RAM

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un procédé de traitement de données de dialogue en ligne, comprenant les étapes consistant : à acquérir un identifiant de connexion et à demander un résultat d'authentification correspondant à l'identifiant de connexion ; lorsque le résultat d'authentification de l'identifiant de connexion est une authentification réussie, à acquérir des données de connexion correspondant à l'identifiant de connexion, et à acquérir des données de dialogue en ligne en cours correspondant aux données de connexion ; à acquérir des données de dialogue en ligne suspectes en cours dans les données de dialogue en ligne en cours en fonction d'une logique d'interrogation prédéfinie ; à rechercher un identifiant de source associé en fonction des données de dialogue en ligne suspectes en cours, à acquérir des données de dialogue en ligne suspectes associées en fonction de l'identifiant de source associé, et à stocker les données de dialogue en ligne suspectes associées ; et à extraire une première adresse de réseau véhiculée par un premier terminal d'utilisateur correspondant aux données de dialogue en ligne suspectes en cours, à extraire une seconde adresse de réseau véhiculée par un second terminal d'utilisateur correspondant aux données de dialogue en ligne suspectes associées, et à surveiller la première adresse de réseau et la seconde adresse de réseau.
PCT/CN2018/089010 2018-02-07 2018-05-30 Procédé et appareil de traitement de données de dialogue en ligne, dispositif informatique et support d'informations WO2019153586A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810125078.4A CN108418809B (zh) 2018-02-07 2018-02-07 聊天数据处理方法、装置、计算机设备及存储介质
CN201810125078.4 2018-02-07

Publications (1)

Publication Number Publication Date
WO2019153586A1 true WO2019153586A1 (fr) 2019-08-15

Family

ID=63127980

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/089010 WO2019153586A1 (fr) 2018-02-07 2018-05-30 Procédé et appareil de traitement de données de dialogue en ligne, dispositif informatique et support d'informations

Country Status (2)

Country Link
CN (1) CN108418809B (fr)
WO (1) WO2019153586A1 (fr)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110503517A (zh) * 2019-08-13 2019-11-26 蚌埠聚本电子商务产业园有限公司 一种用于电子商务的恶意信息检测及处置方法
CN112669138B (zh) * 2020-12-23 2022-04-26 平安科技(深圳)有限公司 数据处理方法及相关设备
CN116561668A (zh) * 2023-07-11 2023-08-08 深圳传趣网络技术有限公司 聊天会话的风险等级划分方法、装置、设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130080928A1 (en) * 2011-09-26 2013-03-28 Sparxo, Inc. Embeddable context sensitive chat system
CN103795612A (zh) * 2014-01-15 2014-05-14 五八同城信息技术有限公司 即时通讯中的垃圾和违法信息检测方法
US20150163182A1 (en) * 2013-12-06 2015-06-11 Verizon Patent And Licensing Inc. Confidential messages in a group chat
CN104811352A (zh) * 2015-04-21 2015-07-29 广州多益网络科技有限公司 一种企业群的信息检测方法及***
CN105873064A (zh) * 2016-03-28 2016-08-17 伍文华 一种互联网app垃圾信息鉴定***及方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3462317A1 (fr) * 2011-02-18 2019-04-03 CSidentity Corporation Système et procédés permettant d'identifier des informations d'identification personnelle compromises sur internet
CN103490978A (zh) * 2013-09-02 2014-01-01 用友软件股份有限公司 终端、服务器和消息监视方法
CN104506382A (zh) * 2014-12-17 2015-04-08 百度在线网络技术(北京)有限公司 消息监控方法及***
CN106559260A (zh) * 2016-11-02 2017-04-05 合肥微梦软件技术有限公司 一种基于互联网信息中心网络监管***
CN107613474A (zh) * 2017-09-22 2018-01-19 刘三满 一种手机短消息网络监管的方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130080928A1 (en) * 2011-09-26 2013-03-28 Sparxo, Inc. Embeddable context sensitive chat system
US20150163182A1 (en) * 2013-12-06 2015-06-11 Verizon Patent And Licensing Inc. Confidential messages in a group chat
CN103795612A (zh) * 2014-01-15 2014-05-14 五八同城信息技术有限公司 即时通讯中的垃圾和违法信息检测方法
CN104811352A (zh) * 2015-04-21 2015-07-29 广州多益网络科技有限公司 一种企业群的信息检测方法及***
CN105873064A (zh) * 2016-03-28 2016-08-17 伍文华 一种互联网app垃圾信息鉴定***及方法

Also Published As

Publication number Publication date
CN108418809B (zh) 2020-09-18
CN108418809A (zh) 2018-08-17

Similar Documents

Publication Publication Date Title
US10554655B2 (en) Method and system for verifying an account operation
US11252171B2 (en) Methods and systems for detecting abnormal user activity
US11854003B2 (en) Signature verification method, apparatus, and system
US11256812B2 (en) End user social network protection portal
US9032495B2 (en) Online user account login method and a server system implementing the method
US9027134B2 (en) Social threat scoring
WO2017107956A1 (fr) Procédé, client et serveur de traitement de données
WO2019127881A1 (fr) Procédé et dispositif de traitement de données de page web, dispositif informatique et support d'informations d'ordinateur
US9674212B2 (en) Social network data removal
WO2018113690A1 (fr) Procédé et appareil d'autorisation de connexion, et procédé et appareil de connexion
US20140337973A1 (en) Social risk management
WO2015144058A1 (fr) Procédé, appareil et système de traitement de liaison de compte
WO2019109529A1 (fr) Procédé d'identification d'une page web, dispositif, appareil informatique et support d'informations informatique
US10607263B2 (en) Computerized systems and methods for authenticating users on a network device via dynamically allocated authenticating state machines hosted on a computer network
WO2015143855A1 (fr) Procédé, appareil et système pour accéder à des ressources de données
TWI637279B (zh) Method, system and web server for uploading form attachments
US11165801B2 (en) Social threat correlation
WO2020228038A1 (fr) Procédé de traitement de nom de domaine, appareil, dispositif électronique et support de stockage
WO2020206906A1 (fr) Procédé et appareil de traitement d'informations d'enregistrement, dispositif informatique et support de stockage
CN109547426B (zh) 业务响应方法及服务器
WO2019153586A1 (fr) Procédé et appareil de traitement de données de dialogue en ligne, dispositif informatique et support d'informations
WO2019153589A1 (fr) Appareil et procédé de traitement de données de message, et dispositif informatique et support d'informations
TW201318376A (zh) 偵測釣魚網站方法以及其網路裝置以及電腦可讀取記錄媒體
WO2019200754A1 (fr) Procédé et appareil d'évaluation du risque de transmission des données, dispositif informatique et support d'informations
US20230121470A1 (en) Preventing phishing attempts of one-time passwords

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18905291

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03/11/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18905291

Country of ref document: EP

Kind code of ref document: A1