WO2020155773A1 - Procédé de surveillance d'entrée de texte suspecte, dispositif, appareil informatique et support de sockage - Google Patents

Procédé de surveillance d'entrée de texte suspecte, dispositif, appareil informatique et support de sockage Download PDF

Info

Publication number
WO2020155773A1
WO2020155773A1 PCT/CN2019/118406 CN2019118406W WO2020155773A1 WO 2020155773 A1 WO2020155773 A1 WO 2020155773A1 CN 2019118406 W CN2019118406 W CN 2019118406W WO 2020155773 A1 WO2020155773 A1 WO 2020155773A1
Authority
WO
WIPO (PCT)
Prior art keywords
input
character
text input
preset
preset condition
Prior art date
Application number
PCT/CN2019/118406
Other languages
English (en)
Chinese (zh)
Inventor
黎立桂
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020155773A1 publication Critical patent/WO2020155773A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • This application relates to the field of computer application technology. Specifically, this application relates to a method, device, computer equipment, and storage medium for monitoring abnormal text input.
  • Abnormal user behavior refers to "abnormal" behavior that violates the social civilization norms or group behavior habits and standards. Especially with the improvement of people's awareness of public safety and network safety, there is increasing attention to abnormal behavior detection in crowd scenes, networks and other environments.
  • Abnormal behaviors include text box input abnormalities.
  • the verification code input or in the account password login input
  • the ticketing system when the verification code is input, if the machine automatically recognizes The input speed is very fast, which speeds up the login input.
  • the number of tickets is limited, if the automatic input method is used, it is easy to be stolen by people maliciously, resulting in unfair transactions. Therefore, a way to identify malicious enter.
  • the purpose of this application is to solve at least one of the above technical defects, and to disclose a method, device, computer equipment, and storage medium for monitoring abnormal text input, which can accurately and quickly monitor whether the text input box is abnormal input.
  • this application discloses a method for monitoring text input abnormalities, including:
  • the characteristic data includes the character type of the input character, the character input speed, and the first time difference when different characters are input;
  • the preset condition includes that the speed of the character input does not exceed a first threshold, and at the same time, the first time difference of each character input does not exceed a second threshold, and the method for judging whether the characteristic data meets the preset condition includes :
  • the speed of the character input and the first time difference are compared with the preset condition to determine whether the preset condition is met.
  • the preset condition includes that the character input speed does not exceed a first threshold, and at the same time, the first time difference of each character input does not exceed a second threshold, and it is determined whether the characteristic data meets the preset conditions.
  • Methods include:
  • the speed of the character input and the first time difference are compared with the preset condition to determine whether the preset condition is met.
  • the character type of the text input includes inputting one or more of numbers, symbols or text
  • the method of matching the preset conditions mapped by the character type from the condition library includes:
  • the method of comparing the character input speed and the first time difference with the preset condition includes:
  • the speed of character input in each subspace and the first time difference are compared with the corresponding sub-preset conditions in turn to determine whether the preset conditions are met.
  • the method for determining whether the preset conditions are met includes:
  • the characteristic data further includes a second time difference between the time when the user wakes up the text input box and the time when the first character is input; the preset condition further includes: the user wakes up the text input The second time difference between the time of the box and the time of inputting the first character is greater than the fourth threshold.
  • the method further includes:
  • the operation mode is a preset operation mode
  • the monitoring conditions mapped by the preset operation mode are compared to determine whether the input behavior is an abnormal input.
  • this application also discloses a text input abnormal monitoring device, including:
  • Obtaining module configured to perform the acquisition of characteristic data during character input in the text input box, where the characteristic data includes the character type of the input character, the character input speed, and the first time difference when different characters are input ;
  • Processing module judging whether the characteristic data meets a preset condition, wherein the preset condition changes according to the change of the character type;
  • Execution module configured to execute when the preset condition is not met, confirm that the input behavior in the text input box is abnormal input;
  • processing module includes:
  • the first recognition module recognize the character type of the text input
  • the first matching module matching the preset conditions for the character type mapping from a preset condition library, wherein the condition library is a set of mapping relationships between all character types and the preset conditions;
  • the first comparison module compares the character input speed and the first time difference with the preset condition to determine whether the preset condition is met.
  • the present application discloses a computer device including a memory and a processor.
  • the memory stores computer readable instructions.
  • the processor executes the above The steps of the published text input abnormal monitoring method.
  • this application also discloses a storage medium storing computer-readable instructions.
  • the computer-readable instructions are executed by one or more processors, one or more processors execute the above-disclosed text input exception. Steps of the monitoring method.
  • the present application discloses a method, device, computer equipment and storage medium for monitoring text input abnormalities.
  • the characteristic data is matched with corresponding preset conditions to determine whether the text input box is abnormal input
  • there are many kinds of feature data which can be used alone as matching data or combined for data evaluation.
  • the preset conditions are also different.
  • the text input box can be recognized Abnormal input is accurate and fast.
  • Figure 1 is a schematic diagram of a method for monitoring abnormalities in text input according to this application
  • Figure 2 is a flowchart of a method for determining whether the application meets the preset conditions
  • FIG. 3 is a flowchart of a method for mapping preset conditions by matching character types in this application
  • Figure 4 is a flowchart of a method for comparing character input speed and first time difference with preset conditions in this application;
  • Fig. 5 is a flowchart of a method for identifying abnormalities in the operating method of this application.
  • FIG. 6 is a schematic structural diagram of a device block diagram of a method for monitoring abnormal text input according to this application.
  • FIG. 7 is a block diagram of the basic structure of the computer equipment of this application.
  • terminal and terminal equipment used herein include both wireless signal receiver equipment, which only has wireless signal receiver equipment without transmitting capability, and also includes receiving and transmitting hardware equipment.
  • Such equipment may include: cellular or other communication equipment with a single-line display or multi-line display or cellular or other communication equipment without a multi-line display; PCS (Personal Communications Service, personal communication system), which can combine voice, data processing, fax and/or data communication capabilities; PDA (Personal Digital Assistant, personal digital assistant), which can include radio frequency receivers, pagers, Internet/Intranet access, web browsers, notepads, calendars and/or GPS (Global Positioning System (Global Positioning System) receiver; a conventional laptop and/or palmtop computer or other device, which has and/or includes a radio frequency receiver, a conventional laptop and/or palmtop computer or other device.
  • PCS Personal Communications Service
  • PDA Personal Digital Assistant
  • GPS Global Positioning System (Global Positioning System) receiver
  • a conventional laptop and/or palmtop computer or other device which has and/or includes a radio frequency receiver, a conventional laptop and/or palmtop computer or other device.
  • terminal and terminal equipment used here may be portable, transportable, installed in vehicles (aviation, sea and/or land), or suitable and/or configured to operate locally, and/or In a distributed form, it runs on the earth and/or any other location in space.
  • the "terminal” and “terminal equipment” used here can also be communication terminals, Internet terminals, music/video playback terminals, such as PDA, MID (Mobile Internet Device, mobile Internet device) and/or mobile phone with music/video playback function, it can also be a smart TV, set-top box and other devices.
  • This application discloses a method for monitoring abnormal text input, including:
  • the text input box is an interface for the user to input related information in a web page or application program. By entering related information in the text input box, the purpose of logging in to the web page, application program or searching for related content is achieved.
  • the text input box has many different types according to the specific location of the webpage or application.
  • the type of the text input box here refers to the type of the input label of the input box and the type of characters allowed to be input in the input box.
  • Common types of input tags in the text input box include: 1) Only numbers can be input; 2) Text and numbers can be input at the same time; 3) Text, numbers and symbols can be input at the same time; 3) Numbers and symbols can be input at the same time.
  • characters include Chinese characters, English characters, and characters in other languages, and symbols include punctuation marks or other characters that are not characters and numbers.
  • other combination types are also included, such as a combination of words and symbols.
  • it includes a character database, a number database, and a symbol database. By matching the obtained character in the text input box in each database, the character type of the character can be recognized.
  • the characteristic data obtained during character input in the text input box also includes the time interval when different characters are input. This time interval is the first Time difference, through the first time interval, you can get the speed of character input.
  • the preset condition is a condition set for the characteristic data according to the acquired characteristic data.
  • characteristic data There are multiple types of characteristic data, and different characteristic data are mapped to different preset conditions.
  • the feature data can be used alone to match the corresponding preset conditions, or multiple different feature data can be combined for matching, and the preset conditions of the combination method are different depending on the combined feature data.
  • the preset condition includes that the character input speed does not exceed the first threshold, and the first time difference of each character input does not exceed the first threshold.
  • the second threshold and the first threshold are a critical value for judging whether the character input speed is too fast. When the character input speed exceeds the critical value, it means that the current character input is too fast, which may not be manual input; the second threshold is for Determine whether the first time difference of each character input is too short and set the critical value. When the first time difference is lower than the second threshold, it means that the interval between each character input by the user is too fast, which may be through plug-in etc. Or the characters entered in the abnormal input mode have abnormal input phenomenon.
  • the comparison of the first threshold and the second threshold disclosed above can be used alone as the basis for the judgment of the corresponding preset condition, and similarly, the two can also be combined as the basis for the judgment of the preset condition.
  • the character input speed does not exceed the first threshold
  • it does not exceed the second threshold it means that the input character is too fast, and the input of each character
  • the time interval is short and does not belong to the normal input condition range.
  • the method of judging whether the characteristic data meets the preset conditions includes:
  • the text input box can be set by input permissions, so that multiple types of characters can be input at the same time. For example, numbers, characters, and symbols can be input in the text input box. Easy program, its input speed and time interval when inputting multiple characters will be different. Therefore, in this embodiment, the character type of the text input can be recognized from the text input box.
  • character databases are set for different types of characters, including text databases, digital databases, and symbol databases. All corresponding databases are collected in each database. Types of data, or designated commonly used data, when the input characters are obtained from the text input box, these characters are sequentially compared with the data in the character database to obtain the determined character type.
  • the character type of the recognition text input can also be recognized by a neural network model. Only the characters in the obtained text input box are input into the character recognition neural network model, and the corresponding character type can be output.
  • S2200 Match the preset conditions for mapping with the character type from a preset condition library, where the condition library is a set of mapping relationships between all character types and the preset conditions;
  • the preset condition library is for all character types and preset conditions. The set of mapping relationships between the two, by identifying the character type of the text input, and matching the type in the preset condition library, the corresponding preset condition can be matched.
  • the character type of the text input includes inputting one or more of numbers, symbols, or words, and the input speed of individually recognizing each character and the first time difference between the individual characters will cause data processing The amount increases, so that the matching workload increases. Therefore, in another embodiment, when there are multiple types of characters in the text input box and the number of characters is large, a method of matching the preset conditions mapped by the types of the characters is disclosed. Please refer to FIG. 3. include:
  • Preset a specified number value Due to the large number of characters in the text input box, these characters are cut into multiple subspaces according to this specified number. For example, when there are 80 characters in the text input box, the default specified number value is 20 , The text input box is cut into four subspaces. When multiple types of characters can be input in the text input box, each subspace may contain multiple types of characters, and different types of characters and combinations of different types of characters correspond to different preset conditions.
  • each subspace is recognized separately, and the type of characters in each subspace is recognized.
  • the recognition method is the same as that disclosed above. By dividing the characters Compare with the data in the character database to get the corresponding type.
  • a condition library is set, and the condition library is for A collection of mapping relationships between all character types and preset conditions, including preset conditions corresponding to a single type of character, and preset conditions corresponding to multiple different character combinations.
  • the corresponding sub-preset conditions are matched in the preset condition library. Since the character types of each subspace are different, the preset conditions for comparison of different subspaces are different. The characters in the same text input box are matched in segments to make the recognition of abnormal text input more accurate.
  • the preset conditions include the speed of character input and the first time difference of each character input
  • the speed of recognized character input is compared with the first threshold in the preset conditions, when the character When the input speed is greater than the first threshold, the current input is considered to be abnormal.
  • the character input speed is less than the first threshold, the first time difference is continued to match, and the first time difference is compared with the second threshold.
  • the time difference does not exceed the second threshold, it means that the current character input time interval is short and there may be an abnormal input.
  • the first time difference exceeds the second threshold, it can be regarded as a normal input.
  • the method of comparing the speed of character input and the first time difference with the preset condition includes:
  • S2320 Compare the speed of character input in each subspace and the first time difference with the corresponding sub-preset conditions in sequence to determine whether the preset conditions are met.
  • the speed of character input in each subspace and the first time difference are recognized, and the speed and first time difference of each character input obtained in the subspace are compared with the subspace.
  • the first threshold and the second threshold of the preset conditions corresponding to the space are compared.
  • each character can be The input speed is compared with the first threshold in the corresponding preset condition, and the first time difference between each character in the subspace is compared with the second threshold in the corresponding preset condition to determine whether the subspace Meet the sub-preset conditions.
  • the third threshold is a ratio value, which means that the number of subspaces that meet the respective sub-preset conditions accounts for the proportion of all subspaces.
  • the proportion of subspaces in the text input box reaches the third threshold, it means text input Most of the characters entered in the box are normal, and the characters entered in the entire text entry box can be considered legal input.
  • a threshold can also be set.
  • the threshold is the same as the third threshold and is a percentage value.
  • the speed of character input in this subspace is less than the first threshold of the corresponding preset condition, and the threshold between characters If the first time difference is greater than the second threshold, the sub-preset conditions of the subspace are satisfied, and the proportion of all characters that meet the sub-preset conditions to the number of characters is calculated.
  • the proportion reaches the above threshold, it means that the subspace The input of the space as a whole meets the preset conditions, and the characters in the subspace range are normal input.
  • alarm information may be generated according to the compared data to notify the user to view or process.
  • the characteristic data further includes a second time difference between the time when the user wakes up the text input box and the time when the first character is input; the preset condition further includes: the user wakes up the The second time difference between the time of the text input box and the time of inputting the first text does not exceed the fourth threshold.
  • the text input box When the user needs to enter characters in the text input box, the text input box needs to be awakened first.
  • a more common wake-up method is to click on the text input box with the mouse, or to change the current target working position in some way Move to the text input box for text input.
  • the characteristic data is defined as the second time difference.
  • the fourth threshold When it belongs to normal input, such as manual input, the user There will be a certain interval between waking up the text input box and inputting the first character, and when abnormal input is made, the second time difference from waking up the text input box to inputting the first character will be less than a certain threshold. This is called the fourth threshold.
  • the fourth threshold represents the shortest time difference that the user can reach from when the user manually wakes up the text input box to input the first character.
  • the second time difference is less than this shortest time difference, it means that the current text input is not human input. It can be considered an abnormal input.
  • the method further includes:
  • the operation mode is a preset operation mode
  • the operation method is the way to characterize the input in the text input box, such as manual input or copy and paste, or file import.
  • the text input box When it is manually input, the text input box will be connected to the corresponding input software. And can receive the input information about the input software.
  • it When it is copy and paste or file import, it will get the input instructions about copy and paste or file import.
  • the input information of the relevant input software and the corresponding input instructions are monitored, Then you can get the operation mode of the character.
  • an operation mode database stores all operation modes that conform to normal input.
  • the operation mode of the character is matched in the operation mode database to determine whether it belongs to the normal input mode.
  • the operation mode of the recognized character is no longer in the operation mode database, the current operation mode is determined to be an abnormal input.
  • this application also discloses a text input abnormal monitoring device, including:
  • the acquiring module 1000 configured to perform acquiring characteristic data during character input in a text input box, wherein the characteristic data includes the character type of the input character, the character input speed, and the first character when inputting different characters. Time difference; processing module 2000: configured to perform judgment whether the characteristic data meets a preset condition, wherein the preset condition changes according to changes in the character type; execution module 3000: configured to execute when the When the condition is preset, it is confirmed that the input behavior in the text input box is abnormal input.
  • FIG. 7 Please refer to FIG. 7 for the basic structural block diagram of the computer equipment provided by the embodiment of the present application.
  • the computer device includes a processor, a nonvolatile storage medium, a memory, and a network interface connected through a system bus.
  • the non-volatile storage medium of the computer device stores an operating system, a database, and computer-readable instructions.
  • the database may store control information sequences.
  • the processor can implement a A method for monitoring abnormal text input.
  • the processor of the computer equipment is used to provide calculation and control capabilities, and supports the operation of the entire computer equipment.
  • a computer readable instruction may be stored in the memory of the computer device, and when the computer readable instruction is executed by the processor, the processor may execute a method for monitoring abnormal text input.
  • the network interface of the computer device is used to connect and communicate with the terminal.
  • FIG. 7 is only a block diagram of part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the specific computer device may Including more or less parts than shown in the figure, or combining some parts, or having a different part arrangement.
  • the computer device receives the status information of the prompt behavior sent by the associated client, that is, whether the associated terminal opens the prompt and whether the lender closes the prompt task. By verifying whether the above task conditions are fulfilled, and then sending corresponding preset instructions to the associated terminal, so that the associated terminal can perform corresponding operations according to the preset instruction, thereby realizing effective supervision of the associated terminal.
  • the server side controls the associated terminal to continue ringing, so as to prevent the prompt task of the associated terminal from automatically terminating after a period of execution.
  • the present application also provides a storage medium storing computer-readable instructions.
  • the computer-readable instructions When the computer-readable instructions are executed by one or more processors, the one or more processors execute the text input described in any of the above embodiments. Abnormal monitoring method.
  • the computer-readable storage medium may be a non-volatile readable storage medium.
  • the computer program can be stored in a computer readable storage medium. When executed, it may include the procedures of the above-mentioned method embodiments.
  • the aforementioned storage medium can be a magnetic disk, an optical disk, a read-only storage memory (Read-Only Memory, ROM) and other non-volatile storage media, or random access memory (Random Access Memory, RAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)

Abstract

La présente invention concerne un procédé de surveillance d'une entrée de texte suspecte, un dispositif, un appareil informatique et un support de stockage. Le procédé consiste à : acquérir des données de caractéristiques tandis que des caractères sont entrés dans une fenêtre d'entrée de texte, les données de caractéristiques comprenant un type de caractère des caractères d'entrée, une vitesse d'entrée des caractères, et une première différence de temps entre des opérations d'entrée pour différents caractères; déterminer si les données de caractéristiques satisfont ou non une condition prédéterminée, la condition prédéterminée changeant selon le type de caractère; et si tel n'est pas le cas, déterminer qu'une action d'entrée par rapport à la fenêtre d'entrée de texte est une entrée suspecte. La présente invention acquiert les données de caractéristiques pendant que les caractères sont entrés dans la fenêtre d'entrée de texte, et détermine si une entrée suspecte se produit dans la fenêtre d'entrée de texte si les données de caractéristiques correspondent à une condition prédéfinie correspondante. L'invention présente de multiples types de données de caractéristiques et la condition prédéterminée change selon les différentes données de caractéristiques, ce qui permet d'obtenir une identification dynamique, et d'obtenir une identification précise et rapide d'une entrée suspecte dans une fenêtre d'entrée de texte.
PCT/CN2019/118406 2019-01-28 2019-11-14 Procédé de surveillance d'entrée de texte suspecte, dispositif, appareil informatique et support de sockage WO2020155773A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910081141.3 2019-01-28
CN201910081141.3A CN109873813B (zh) 2019-01-28 2019-01-28 文本输入异常监控方法、装置、计算机设备及存储介质

Publications (1)

Publication Number Publication Date
WO2020155773A1 true WO2020155773A1 (fr) 2020-08-06

Family

ID=66918165

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/118406 WO2020155773A1 (fr) 2019-01-28 2019-11-14 Procédé de surveillance d'entrée de texte suspecte, dispositif, appareil informatique et support de sockage

Country Status (2)

Country Link
CN (1) CN109873813B (fr)
WO (1) WO2020155773A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113343189A (zh) * 2021-07-01 2021-09-03 百融云创科技股份有限公司 防止恶意刷取短信验证码的方法及装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109873813B (zh) * 2019-01-28 2022-01-14 平安科技(深圳)有限公司 文本输入异常监控方法、装置、计算机设备及存储介质
CN110399281A (zh) * 2019-06-28 2019-11-01 平安科技(深圳)有限公司 异常操作识别方法、装置、计算机设备及存储介质
CN110502127A (zh) * 2019-08-26 2019-11-26 北京美鲜科技有限公司 一种基于输入框的智能输入提示方法及装置
CN110536017B (zh) * 2019-09-03 2021-05-11 中国联合网络通信集团有限公司 消息发送控制方法、消息发送控制装置
CN112307005B (zh) * 2020-11-11 2022-08-02 天津汇商共达科技有限责任公司 一种写入检查方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080059119A1 (en) * 2006-08-29 2008-03-06 Matsushita Electric Works, Ltd. Anomaly monitoring device and method
CN108182000A (zh) * 2017-12-25 2018-06-19 科大讯飞股份有限公司 键盘输入检测方法及装置、存储介质、电子设备
CN108400980A (zh) * 2018-02-08 2018-08-14 平安科技(深圳)有限公司 用户身份验证方法、装置、计算机设备和存储介质
CN108959869A (zh) * 2018-07-03 2018-12-07 北京润信恒达科技有限公司 一种自然人操作的识别方法及装置
CN109873813A (zh) * 2019-01-28 2019-06-11 平安科技(深圳)有限公司 文本输入异常监控方法、装置、计算机设备及存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9465789B1 (en) * 2013-03-27 2016-10-11 Google Inc. Apparatus and method for detecting spam
CN104301286B (zh) * 2013-07-15 2018-03-23 ***通信集团黑龙江有限公司 用户登录认证方法及装置
US9619045B1 (en) * 2014-04-28 2017-04-11 Amazon Technologies, Inc. User input source identification based on delayed input
CN105243301B (zh) * 2014-07-09 2019-01-18 阿里巴巴集团控股有限公司 键盘输入异常检测方法、装置以及安全提示方法、装置
CN104932712A (zh) * 2015-06-25 2015-09-23 小米科技有限责任公司 文本输入方法和装置
CN109145554A (zh) * 2018-07-12 2019-01-04 温州大学苍南研究院 一种基于支持向量机的击键特征异常用户识别方法及***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080059119A1 (en) * 2006-08-29 2008-03-06 Matsushita Electric Works, Ltd. Anomaly monitoring device and method
CN108182000A (zh) * 2017-12-25 2018-06-19 科大讯飞股份有限公司 键盘输入检测方法及装置、存储介质、电子设备
CN108400980A (zh) * 2018-02-08 2018-08-14 平安科技(深圳)有限公司 用户身份验证方法、装置、计算机设备和存储介质
CN108959869A (zh) * 2018-07-03 2018-12-07 北京润信恒达科技有限公司 一种自然人操作的识别方法及装置
CN109873813A (zh) * 2019-01-28 2019-06-11 平安科技(深圳)有限公司 文本输入异常监控方法、装置、计算机设备及存储介质

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113343189A (zh) * 2021-07-01 2021-09-03 百融云创科技股份有限公司 防止恶意刷取短信验证码的方法及装置

Also Published As

Publication number Publication date
CN109873813B (zh) 2022-01-14
CN109873813A (zh) 2019-06-11

Similar Documents

Publication Publication Date Title
WO2020155773A1 (fr) Procédé de surveillance d'entrée de texte suspecte, dispositif, appareil informatique et support de sockage
WO2020258657A1 (fr) Procédé et appareil de détection d'anomalie, dispositif informatique et support d'informations
WO2019037197A1 (fr) Procédé et dispositif d'apprentissage de classificateur de sujets, et support de stockage lisible par ordinateur
WO2019174090A1 (fr) Procédé, appareil et dispositif de commande de partage de fichier de capture d'écran, et support de stockage informatique
WO2020143322A1 (fr) Procédé et appareil de détection de demande d'utilisateur, dispositif informatique et support de stockage
WO2017113974A1 (fr) Procédé et dispositif de traitement de la parole, et terminal
WO2019103212A1 (fr) Système de surveillance pour terminal intelligent ido dans un navire utilisant un réseau de communication
EP3031213A1 (fr) Appareil, serveur et procédé pour fournir un sujet de conversation
WO2020258672A1 (fr) Procédé et dispositif de détection d'anomalie d'accès au réseau
EP2979154A1 (fr) Dispositif d'affichage et son procédé de commande
WO2020233060A1 (fr) Procédé et appareil de notification d'événement, serveur de notification d'événement et support de stockage
WO2015129983A1 (fr) Dispositif et procédé destinés à recommander un film en fonction de l'exploration distribuée de règles d'association imprécises
WO2021027143A1 (fr) Procédé, appareil et dispositif de poussée d'informations et support d'informations lisible par ordinateur
WO2017219661A1 (fr) Procédé et système de commande de processus de terminal
WO2014003354A1 (fr) Procédé de commande de terminal ayant recours à la sensibilité au contexte et terminal correspondant
WO2016123898A1 (fr) Procédé de gestion de message court et terminal mobile associé
WO2020073494A1 (fr) Procédé de détection de porte arrière de page web, dispositif, support d'informations et appareil
CN112153336B (zh) 监控方法以及相关设备
WO2015105289A1 (fr) Système d'authentification de sécurité d'utilisateur et procédé associé dans un environnement internet
WO2012165761A2 (fr) Système de service de renseignement collectif et procédé associé
WO2018032583A1 (fr) Procédé et appareil d'acquisition d'informations de localisation d'un terminal
WO2022005125A1 (fr) Concentrateur de l'internet des objets, ainsi que système d'authentification d'identité d'objet et procédé d'authentification d'identité d'objet
WO2014148784A1 (fr) Base de données de modèles linguistiques pour la reconnaissance linguistique, dispositif et procédé et système de reconnaissance linguistique
WO2016093652A2 (fr) Procédé de fourniture de service d'album familial permettant d'utiliser un album familial en permettant aux membres d'une famille d'accéder à un serveur cloud par un numéro de téléphone
WO2020258658A1 (fr) Procédé et appareil d'identification d'opération anormale, dispositif informatique et support d'enregistrement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19913650

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19913650

Country of ref document: EP

Kind code of ref document: A1