[go: up one dir, main page]

CN109981644B - Method and equipment for sending target message - Google Patents

Method and equipment for sending target message Download PDF

Info

Publication number
CN109981644B
CN109981644B CN201910233410.3A CN201910233410A CN109981644B CN 109981644 B CN109981644 B CN 109981644B CN 201910233410 A CN201910233410 A CN 201910233410A CN 109981644 B CN109981644 B CN 109981644B
Authority
CN
China
Prior art keywords
real
user
user equipment
time
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910233410.3A
Other languages
Chinese (zh)
Other versions
CN109981644A (en
Inventor
陈晓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zongzhang Technology Group Co.,Ltd.
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201910233410.3A priority Critical patent/CN109981644B/en
Publication of CN109981644A publication Critical patent/CN109981644A/en
Application granted granted Critical
Publication of CN109981644B publication Critical patent/CN109981644B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请的目的是提供一种用于发送目标消息的方法和设备,第一用户设备向网络设备发送目标消息;所述网络设备检测所述目标消息是否满足预设的实时验证条件,向所述第一用户设备发送实时验证指令;所述第一用户设备基于所述实时验证指令,实时采集对应的第一用户的待验证信息,并向所述网络设备发送所述待验证信息;所述网络设备向所述第二用户设备发送所述待验证信息以及所述目标消息;所述第二用户设备接收所述待验证信息以及所述目标消息。本申请使消息的接收方能够根据接收到的内容验证发送方的身份,从而避免消息的接收方上当受骗。

Figure 201910233410

The purpose of this application is to provide a method and device for sending a target message. A first user equipment sends a target message to a network device; the network device detects whether the target message satisfies a preset real-time verification condition, and sends the target message to the network device. The first user equipment sends a real-time verification instruction; the first user equipment collects real-time verification information of the corresponding first user based on the real-time verification instruction, and sends the to-be-verified information to the network device; the network The device sends the information to be verified and the target message to the second user equipment; the second user equipment receives the information to be verified and the target message. The present application enables the receiver of the message to verify the identity of the sender according to the received content, thereby preventing the receiver of the message from being deceived.

Figure 201910233410

Description

一种用于发送目标消息的方法与设备A method and device for sending a target message

技术领域technical field

本申请涉及通信领域,尤其涉及一种用于发送目标消息的技术。The present application relates to the field of communications, and in particular, to a technology for sending a target message.

背景技术Background technique

随着手机等智能设备的普及,即时通讯软件等社交软件拥有越来越多的用户,在用户之间架起了沟通的桥梁。但与此同时,诈骗的情况也时有发生,例如有些恶意用户(或安装于某台设备上的恶意软件)会通过社交软件向其他用户发送诈骗消息以骗取钱财或个人敏感信息。即便是用户在收到疑似诈骗消息后系统给出一些提示(类似“请注意核实对方身份”等提醒),仍然不足以引起用户的警惕,有部分用户仍然会选择点击诈骗消息或根据诈骗消息进行相关操作(例如填写个人信息、执行转账操作等) 而遭受个人信息或财产的损失。With the popularization of smart devices such as mobile phones, instant messaging software and other social software have more and more users, building a bridge of communication between users. But at the same time, scams also happen from time to time. For example, some malicious users (or malware installed on a certain device) send scam messages to other users through social software to defraud money or sensitive personal information. Even if the user receives a suspected fraud message, the system gives some prompts (like "please verify the identity of the other party" and other reminders), it is still not enough to arouse the user's vigilance. related operations (such as filling in personal information, performing transfer operations, etc.) and suffer loss of personal information or property.

发明内容SUMMARY OF THE INVENTION

本申请的一个目的是提供一种用于发送目标消息的方法与设备。An object of the present application is to provide a method and device for sending a target message.

根据本申请的一个方面,提供了一种在网络设备端用于发送目标消息的方法,该方法包括:According to one aspect of the present application, a method for sending a target message at a network device side is provided, the method comprising:

接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中所述目标消息的目标接收方为第二用户设备;receiving a target message sent by the first user equipment, and detecting whether the target message satisfies a preset real-time verification condition, wherein the target recipient of the target message is the second user equipment;

若所述目标消息满足所述实时验证条件,向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;If the target message satisfies the real-time verification condition, send a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to collect real-time data corresponding to the first user equipment The information to be verified of the first user;

接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息;receiving the information to be verified sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified to the second user equipment;

向所述第二用户设备发送所述目标消息。The target message is sent to the second user equipment.

根据本申请的另一方面,提供了一种在第一用户设备端用于发送目标消息的方法,该方法包括:According to another aspect of the present application, a method for sending a target message at the first user equipment side is provided, the method comprising:

向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备;sending a target message to the network device, wherein the target recipient of the target message is the second user equipment;

接收所述网络设备所发送的实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;receiving a real-time verification instruction sent by the network device, wherein the real-time verification instruction is used for the first user equipment to collect the information to be verified of the first user corresponding to the first user equipment in real time;

基于所述实时验证指令,实时采集对应的第一用户的待验证信息;Based on the real-time verification instruction, collect the information to be verified of the corresponding first user in real time;

向所述网络设备发送所述待验证信息。Send the to-be-verified information to the network device.

根据本申请的又一方面,提供了一种在第二用户设备端用于发送目标消息的方法,该方法包括:According to yet another aspect of the present application, a method for sending a target message at a second user equipment side is provided, the method comprising:

接收网络设备所发送的待验证信息;Receive the information to be verified sent by the network device;

接收所述网络设备所发送的目标消息;receiving the target message sent by the network device;

其中所述待验证信息是由第一用户设备基于实时验证指令发送的,所述实时验证指令由所述网络设备在接收到所述第一用户设备所发送的目标消息后发送至所述第一用户设备,所述目标消息的目标接收方为所述第二用户设备。The information to be verified is sent by the first user equipment based on a real-time verification instruction, and the real-time verification instruction is sent by the network device to the first user equipment after receiving the target message sent by the first user equipment User equipment, where the target recipient of the target message is the second user equipment.

根据本申请的另一方面,提供了一种用于发送目标消息的方法,该方法包括:According to another aspect of the present application, there is provided a method for sending a target message, the method comprising:

第一用户设备向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备;The first user equipment sends a target message to the network device, wherein the target recipient of the target message is the second user equipment;

所述网络设备接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件;The network device receives the target message sent by the first user equipment, and detects whether the target message satisfies a preset real-time verification condition;

若所述目标消息满足所述实时验证条件,所述网络设备向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;If the target message satisfies the real-time verification condition, the network device sends a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to collect the first user in real time The information to be verified of the first user corresponding to the device;

所述第一用户设备接收所述网络设备所发送的实时验证指令,基于所述实时验证指令,实时采集对应的第一用户的待验证信息,并向所述网络设备发送所述待验证信息;The first user equipment receives the real-time verification instruction sent by the network device, collects the information to be verified of the corresponding first user in real time based on the real-time verification instruction, and sends the to-be-verified information to the network device;

所述网络设备接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息以及所述目标消息;receiving, by the network device, the information to be verified sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified and the target message to the second user equipment;

所述第二用户设备接收所述待验证信息以及所述目标消息。The second user equipment receives the information to be verified and the target message.

根据本申请的一个方面,提供了一种用于发送目标消息的设备,其中,该设备包括:According to one aspect of the present application, there is provided a device for sending a target message, wherein the device includes:

处理器;以及processor; and

被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以上任一项所述方法的操作。a memory arranged to store computer-executable instructions which, when executed, cause the processor to perform the operations of any of the methods described above.

根据本申请的另一方面,提供了一种存储指令的计算机可读介质,所述指令在被执行时使得系统执行以上任一项所述方法的操作。According to another aspect of the present application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.

与现有技术相比,基于本申请,系统在检测到可疑消息时要求发送方实时提供用于验证身份的信息(例如实时拍摄图片/视频等)至接收方,以便消息的接收方根据接收到的内容验证消息的发送方的身份,避免消息的接收方上当受骗。在某些情形下,系统还可拦截该可疑消息,并在收到上述用于验证身份的信息后将该信息和上述可疑信息一通发送至消息的接收方,从而进一步保障消息的接收方的信息和财产安全。Compared with the prior art, based on this application, when a suspicious message is detected, the system requires the sender to provide real-time identity verification information (such as taking pictures/videos in real time, etc.) The content of the message verifies the identity of the sender of the message and prevents the receiver of the message from being deceived. In some cases, the system can also intercept the suspicious message, and after receiving the above-mentioned information for identity verification, send the information and the above-mentioned suspicious information to the recipient of the message, so as to further protect the information of the recipient of the message and property safety.

附图说明Description of drawings

通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:Other features, objects and advantages of the present application will become more apparent by reading the detailed description of non-limiting embodiments made with reference to the following drawings:

图1示出根据本申请一个实施例的一种系统拓扑示意图;FIG. 1 shows a schematic diagram of a system topology according to an embodiment of the present application;

图2是根据本申请一个实施例的用于发送目标消息的方法的流程图;2 is a flowchart of a method for sending a target message according to an embodiment of the present application;

图3是根据本申请另一实施例的在网络设备端用于发送目标消息的方法的流程图;3 is a flowchart of a method for sending a target message at a network device end according to another embodiment of the present application;

图4是根据本申请另一实施例的在第一用户设备端用于发送目标消息的方法的流程图;4 is a flowchart of a method for sending a target message at a first user equipment end according to another embodiment of the present application;

图5是根据本申请另一实施例的在第二用户设备端用于接收目标消息的方法的流程图;5 is a flowchart of a method for receiving a target message at a second user equipment end according to another embodiment of the present application;

图6示出根据本申请一个实施例的用于发送目标消息的网络设备的功能模块;6 shows functional modules of a network device for sending a target message according to an embodiment of the present application;

图7示出根据本申请另一实施例的用于发送目标消息的第一用户设备的功能模块;FIG. 7 shows functional modules of a first user equipment for sending a target message according to another embodiment of the present application;

图8示出根据本申请另一实施例的用于接收目标消息的第二用户设备的功能模块;FIG. 8 shows functional modules of a second user equipment for receiving a target message according to another embodiment of the present application;

图9示出本申请的一种示例性系统的功能模块。FIG. 9 illustrates functional modules of an exemplary system of the present application.

附图中相同或相似的附图标记代表相同或相似的部件。The same or similar reference numbers in the drawings represent the same or similar parts.

具体实施方式Detailed ways

下面结合附图对本申请作进一步详细描述。The present application will be described in further detail below with reference to the accompanying drawings.

在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(例如,中央处理器(Central Processing Unit,CPU))、输入/输出接口、网络接口和内存。In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party all include one or more processors (for example, a central processing unit (CPU)), an input/output interface, a network interface, and Memory.

内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器 (RandomAccess Memory,RAM)和/或非易失性内存等形式,如只读存储器 (Read Only Memory,ROM)或闪存(Flash Memory)。内存是计算机可读介质的示例。Memory may include non-persistent memory in computer-readable media, random access memory (RAM) and/or non-volatile memory, such as read only memory (ROM) or flash memory (Flash). Memory). Memory is an example of a computer-readable medium.

计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(Phase-Change Memory,PCM)、可编程随机存取存储器 (Programmable Random Access Memory,PRAM)、静态随机存取存储器(Static Random-Access Memory,SRAM)、动态随机存取存储器(Dynamic Random AccessMemory,DRAM)、其他类型的随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦除可编程只读存储器(Electrically-ErasableProgrammable Read-Only Memory, EEPROM)、快闪记忆体(Flash Memory)或其他内存技术、只读光盘只读存储器(Compact Disc Read-Only Memory,CD-ROM)、数字多功能光盘(Digital Versatile Disc,DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (Phase-Change Memory, PCM), programmable random access memory (Programmable Random Access Memory, PRAM), static random access memory (Static Random-Access Memory, SRAM), dynamic random access memory (Dynamic Random Access Memory, DRAM), other types of random access memory (Random Access Memory, RAM), read-only memory (Read-Only Memory, ROM), electrically erasable programmable only memory Read-Only Memory (Electrically-ErasableProgrammable Read-Only Memory, EEPROM), Flash Memory (Flash Memory) or other memory technologies, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (Digital Versatile Disc, DVD) or other optical storage, magnetic cassette tape, magnetic tape disk storage or other magnetic storage device or any other non-transmission medium that can be used to store information that can be accessed by a computing device.

本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如 Android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(Application Specific IntegratedCircuit, ASIC)、可编程逻辑器件(Programmable Logic Device,PLD)、现场可编程门阵列(Field Programmable Gate Array,FPGA)、数字信号处理器(Digital Signal Processor,DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc Network)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。The equipment referred to in this application includes, but is not limited to, user equipment, network equipment, or equipment formed by integrating user equipment and network equipment through a network. The user equipment includes, but is not limited to, any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc., and the mobile electronic product can use any operation. system, such as Android operating system, iOS operating system, etc. Wherein, the network device includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions, and its hardware includes but is not limited to a microprocessor, an application specific integrated circuit (ASIC) , Programmable Logic Device (PLD), Field Programmable Gate Array (Field Programmable Gate Array, FPGA), Digital Signal Processor (Digital Signal Processor, DSP), embedded devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. The network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network, and the like. Preferably, the device may also be a program running on the user equipment, network equipment, or a device formed by user equipment and network equipment, network equipment, touch terminal or network equipment and touch terminal integrated through a network.

当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。Of course, those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible devices that may appear in the future, if applicable to this application, should also be included within the protection scope of this application, and are included in this application by reference. this.

在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。In the description of this application, "plurality" means two or more, unless expressly and specifically defined otherwise.

图1示出用于实施本申请的用于发送目标消息的方法的一种系统的拓扑结构,该系统包括一网络设备100、至少一台第一用户设备200和至少一台第三用户设备200。以图中示出的第一用户设备200和第二用户设备 300为例,第一用户设备200欲向第二用户设备300发送一条消息(下称目标消息),该消息将经网络设备100发送至第二用户300。其中,该消息可能触发系统的验证消息发送者的身份的机制,例如系统判定该消息可能为诈骗消息,或者系统判定该消息满足其他的实时验证条件,从而发送者需要向接收者验证其身份。FIG. 1 shows the topology of a system for implementing the method for sending a target message of the present application. The system includes a network device 100 , at least one first user equipment 200 and at least one third user equipment 200 . Taking the first user equipment 200 and the second user equipment 300 shown in the figure as an example, the first user equipment 200 wants to send a message (hereinafter referred to as the target message) to the second user equipment 300, and the message will be sent via the network device 100 to the second user 300. The message may trigger the system's mechanism for verifying the identity of the message sender. For example, the system determines that the message may be a fraudulent message, or the system determines that the message meets other real-time verification conditions, so that the sender needs to verify its identity with the receiver.

基于上述系统,根据本申请的一个方面,提供了一种用于发送目标消息的方法。参考图2,该方法包括以下步骤:Based on the above system, according to an aspect of the present application, a method for sending a target message is provided. Referring to Figure 2, the method includes the following steps:

第一用户设备向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备;The first user equipment sends a target message to the network device, wherein the target recipient of the target message is the second user equipment;

所述网络设备接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件;The network device receives the target message sent by the first user equipment, and detects whether the target message satisfies a preset real-time verification condition;

若所述目标消息满足所述实时验证条件,所述网络设备向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;If the target message satisfies the real-time verification condition, the network device sends a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to collect the first user in real time The information to be verified of the first user corresponding to the device;

所述第一用户设备接收所述网络设备所发送的实时验证指令,基于所述实时验证指令,实时采集对应的第一用户的待验证信息,并向所述网络设备发送所述待验证信息;The first user equipment receives the real-time verification instruction sent by the network device, collects the information to be verified of the corresponding first user in real time based on the real-time verification instruction, and sends the to-be-verified information to the network device;

所述网络设备接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息;receiving, by the network device, the information to be verified sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified to the second user equipment;

所述第二用户设备接收所述待验证信息,以及所述目标消息。The second user equipment receives the information to be verified and the target message.

以下将分别从网络设备、第一用户设备和第二用户设备的角度详细描述上述方法的具体实施方式。Specific implementations of the above method will be described in detail below from the perspectives of the network device, the first user equipment, and the second user equipment, respectively.

根据本申请的一个方面,还提供了一种在网络设备端用于发送目标消息的方法。参考图3,该方法包括步骤S101、步骤S102、步骤S103和步骤S104。其中,在步骤S101中,网络设备接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中所述目标消息的目标接收方为第二用户设备;在步骤S102中,若所述目标消息满足所述实时验证条件,网络设备向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;在步骤S103中,网络设备接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息;在步骤S104中,网络设备向所述第二用户设备发送所述目标消息。According to an aspect of the present application, a method for sending a target message at a network device side is also provided. Referring to FIG. 3 , the method includes step S101 , step S102 , step S103 and step S104 . Wherein, in step S101, the network device receives the target message sent by the first user equipment, and detects whether the target message satisfies a preset real-time verification condition, wherein the target recipient of the target message is the second user equipment; In step S102, if the target message satisfies the real-time verification condition, the network device sends a real-time verification instruction to the first user equipment, wherein the real-time verification instruction is used for the first user equipment to collect the real-time verification information to be verified of the first user corresponding to the first user equipment; in step S103, the network device receives the information to be verified sent by the first user equipment based on the real-time verification instruction, and sends the verification information to the second user equipment Send the information to be verified; in step S104, the network device sends the target message to the second user equipment.

具体而言,在步骤S101中,网络设备接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中所述目标消息的目标接收方为第二用户设备。例如,在一些实施例中,该目标消息的头部包含接收方(即第二用户设备)的标识信息,该标识信息包括但不限于第二用户设备的设备标识信息,或者相应的第二用户的标识信息 (例如,该第二用户已在用于接收消息的应用中登录)。Specifically, in step S101, the network device receives the target message sent by the first user equipment, and detects whether the target message satisfies a preset real-time verification condition, wherein the target recipient of the target message is the second user equipment. For example, in some embodiments, the header of the target message includes identification information of the recipient (ie, the second user equipment), and the identification information includes but is not limited to the device identification information of the second user equipment, or the corresponding second user equipment. (eg, the second user is logged in in the application for receiving the message).

其中,所述实时验证条件用于判定该目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,从而保证信息和财产安全,避免上当受骗。相应地,在步骤S102中,若所述目标消息满足所述实时验证条件,网络设备向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息。The real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity, so as to ensure the safety of information and property and avoid being deceived. Correspondingly, in step S102, if the target message satisfies the real-time verification condition, the network device sends a real-time verification instruction to the first user equipment, wherein the real-time verification instruction is used for the real-time verification of the first user equipment. Collect the to-be-verified information of the first user corresponding to the first user equipment.

之后,若第一用户设备在接收上述实时验证指令之后进行了响应,例如发送了相应的待验证信息(用于发送至接收方,即第二用户设备,以供验证身份),在步骤S103中,网络设备接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息。After that, if the first user equipment responds after receiving the above-mentioned real-time verification instruction, for example, sends the corresponding information to be verified (for sending to the receiver, that is, the second user equipment, for identity verification), in step S103 , the network device receives the information to be verified sent by the first user equipment based on the real-time verification instruction, and sends the information to be verified to the second user equipment.

而在步骤S104中,网络设备向所述第二用户设备发送所述目标消息。In step S104, the network device sends the target message to the second user equipment.

其中需要说明的是,本申请各实施例并未对以上所述的待验证信息和所述目标消息的发送顺序进行特别限定,例如所述待验证信息可先于或迟于所述目标消息而被发送至所述第二用户设备。It should be noted that the embodiments of the present application do not specifically limit the sending order of the above-mentioned information to be verified and the target message. For example, the information to be verified may be sent before or after the target message. is sent to the second user equipment.

在一些实施例中,所述待验证信息包括以下任一项,或以下任意若干项的组合:In some embodiments, the information to be verified includes any one of the following, or a combination of any of the following:

-所述第一用户的实时照片,例如第一用户设备实时调用其前置摄像头而拍摄的、含有正在操作该第一用户设备的第一用户的面部的照片;- a real-time photo of the first user, for example, a photo taken by the first user equipment by calling its front camera in real time and containing the face of the first user who is operating the first user equipment;

-所述第一用户的实时视频,例如第一用户设备实时调用其前置摄像头而拍摄的视频;- the real-time video of the first user, for example, the video captured by the first user's equipment calling its front camera in real time;

-所述第一用户的实时语音,例如该实时语音由第一用户设备实时调用其麦克风而录制,在一些实施例中也可用于供第一用户与第二用户设备所对应的第二用户进行实时的语音沟通。- the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment calling its microphone in real time, and in some embodiments, it can also be used for the first user and the second user corresponding to the second user equipment Real-time voice communication.

在一些实施例中,上述步骤S102包括子步骤S102a、子步骤S102b 和子步骤S102c(均未示出)。在子步骤S102a中,网络设备向所述第二用户设备发送验证征询信息,例如系统询问第二用户(消息接收方)是否要验证发送者的身份,若需要,则进一步获取上述待验证信息以供验证第一用户(消息发送方)的身份;在一些实施例中,若第二用户不需要验证第一用户的身份,则流程结束或系统直接提供上述目标消息至第二用户设备,以简化流程,提高用户的操作效率和避免对用户造成过多的干扰。相应地,在子步骤S102b中,网络设备接收所述第二用户设备基于所述验证征询信息所发送的实时验证请求;在子步骤S102c中,网络设备基于所述实时验证请求,向所述第一用户设备发送实时验证指令。In some embodiments, the above-mentioned step S102 includes sub-step S102a, sub-step S102b and sub-step S102c (none of which are shown). In sub-step S102a, the network device sends verification inquiry information to the second user equipment, for example, the system asks the second user (message receiver) whether to verify the identity of the sender, and if necessary, further obtains the above-mentioned information to be verified to For verifying the identity of the first user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process ends or the system directly provides the above target message to the second user equipment to simplify process, improve the user's operation efficiency and avoid excessive interference to the user. Correspondingly, in sub-step S102b, the network device receives a real-time verification request sent by the second user equipment based on the verification inquiry information; in sub-step S102c, based on the real-time verification request, the network device sends a request to the second user equipment. A user equipment sends a real-time verification command.

其中,在一些实施例中,为了保护第一用户的隐私,以及避免对第一用户造成过多的干扰,对第一用户的待验证信息的采集是在第一用户同意实时验证的情况下执行的。相应地,在上述步骤S103中,网络设备接收所述第一用户设备基于所述实时验证指令所发送的验证响应信息(例如,该验证响应信息可能包含“允许验证”,或者“不允许验证”,或者“稍后验证”等),若所述验证响应信息包括允许验证,则网络设备接收所述第一用户设备所发送的待验证信息,并向所述第二用户设备发送所述待验证信息。Wherein, in some embodiments, in order to protect the privacy of the first user and avoid causing too much interference to the first user, the collection of the information to be verified of the first user is performed under the condition that the first user agrees to real-time verification of. Correspondingly, in the above step S103, the network device receives the verification response information sent by the first user equipment based on the real-time verification instruction (for example, the verification response information may contain "verification allowed", or "verification not allowed" , or "verify later", etc.), if the verification response information includes the verification permission, the network device receives the information to be verified sent by the first user equipment, and sends the to-be-verified information to the second user equipment information.

在一些实施例中,若第一用户同意进行实时验证的情况下,为了进一步加强验证效果和避免第一用户作假,可为第一用户和第二用户提供互动。相应地,上述方法还包括步骤S105(未示出)。在步骤S105中,网络设备基于所述实时验证请求,接收所述第二用户设备所发送的第二实时消息,并向所述第一用户设备发送所述第二实时消息。其中,所述第二实时消息包括以下任一项,或者任意若干项的组合:In some embodiments, if the first user agrees to perform real-time verification, in order to further enhance the verification effect and prevent the first user from cheating, interaction can be provided for the first user and the second user. Correspondingly, the above method further includes step S105 (not shown). In step S105, the network device receives the second real-time message sent by the second user equipment based on the real-time verification request, and sends the second real-time message to the first user equipment. Wherein, the second real-time message includes any one of the following, or a combination of any number of items:

-所述第二用户设备所对应的第二用户的实时视频;- the real-time video of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户的实时语音;- the real-time voice of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户实时输入的文本。- the text input in real time by the second user corresponding to the second user equipment.

例如,第二用户可与第一用户进行一些对话(例如让第一用户回答一些问题),或者要求第一用户根据第二用户的要求做某些操作或某些动作,以加强第一用户的身份验证结果的可信度。For example, the second user can have some conversations with the first user (for example, ask the first user to answer some questions), or ask the first user to do certain operations or actions according to the second user's request, so as to strengthen the first user's The reliability of authentication results.

当然,第一用户也可拒绝身份验证,例如第一用户当前不方便采集实时视频。在一些实施例中,上述方法还包括步骤S106(未示出)。在步骤 S106中,网络设备若所述第一用户设备基于所述实时验证指令所发送的验证响应信息包括不允许验证,或者所述实时验证指令响应超时,则丢弃所述目标消息,网络设备不再向第二用户设备发送该目标消息,以避免对第二用户造成干扰,从而提升用户的使用体验。例如,第二用户对该目标消息是无感的。Of course, the first user may also refuse the authentication, for example, it is currently inconvenient for the first user to collect real-time video. In some embodiments, the above method further includes step S106 (not shown). In step S106, if the verification response information sent by the first user equipment based on the real-time verification instruction includes verification not allowed, or the real-time verification instruction response times out, the network device discards the target message, and the network device does not The target message is then sent to the second user equipment to avoid interference to the second user, thereby improving the user's use experience. For example, the second user is indifferent to the target message.

在一些实施例中,所述实时验证条件包括以下任一项,或任意若干项的组合:In some embodiments, the real-time verification conditions include any one of the following, or a combination of any number of items:

-所述目标消息包含银行账号信息,例如系统在该目标消息中检测到特定位数(例如15位、16位、19位等)的数字。- the target message contains bank account information, eg the system detects a number of a certain number of digits (eg 15, 16, 19, etc.) in the target message.

-所述目标消息包含预设关键词,例如“银行”“转账”“存款”“现金”等。- The target message contains preset keywords, such as "bank", "transfer", "deposit", "cash" and so on.

-所述目标消息的发送用户被包含于可疑用户集合,例如,该集合由系统提供,其中系统创建了可疑用户列表,这个列表里的用户发送消息给其他用户,都需要首先验证身份,以尽可能避免可疑用户对合法用户的信息和财产安全造成威胁;又例如,该集合由接收者创建,例如该集合对应于一黑名单,该黑名单里的用户给该接收者发消息,都需要验证身份,此时对于每个接收者而言这个集合都可能是不同的;- The sending user of the target message is included in the suspicious user set, for example, the set is provided by the system, where the system creates a list of suspicious users, and the users in this list send messages to other users, all need to verify their identities first, in order to avoid It may prevent suspicious users from threatening the information and property security of legitimate users; for another example, the set is created by the receiver, for example, the set corresponds to a blacklist, and users in the blacklist send messages to the receiver, all need to be verified Identity, this set may be different for each recipient at this time;

-所述目标消息的发送用户的可信度低于一可信度阈值,其中该可信度可基于消息发送者的历史行为计算得到,当该可信度足够高时,该消息发送者在向其他用户发送消息时就无需进行身份验证,从而提升合法用户的操作效率和使用体验。- the credibility of the sending user of the target message is lower than a credibility threshold, wherein the credibility can be calculated based on the historical behavior of the message sender, when the credibility is high enough, the message sender is in the There is no need to authenticate when sending messages to other users, thereby improving the operational efficiency and experience for legitimate users.

在此基础上,在上述实时验证条件包括所述目标消息的发送用户被包含于可疑用户集合时,上述方法还包括步骤S107(未示出)。在步骤S107 中,网络设备接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可疑用户集合。例如,在某个用户未通过接收者的验证(可以以“抽查”的形式进行验证以提升用户操作效率和使用体验),或者在该用户未通过验证达到一定的次数的情况下,将该用户加入上述可疑用户集合;又例如,若某个用户原先在该可疑用户集合中,而该用户由接收者验证通过(或者通过达到一定的次数),将该用户从该可疑用户集合中移除。藉此,可避免消息接收者误操作或者恶意操作而对消息发送者的正常操作造成困扰。On this basis, when the above-mentioned real-time verification condition includes that the sending user of the target message is included in the set of suspicious users, the above-mentioned method further includes step S107 (not shown). In step S107, the network device receives the verification result information of the second user equipment based on the information to be verified, and updates the suspicious user set based on the verification result information. For example, when a user fails the verification of the receiver (verification can be carried out in the form of "spot check" to improve user operation efficiency and user experience), or if the user fails the verification for a certain number of times, the user Join the above-mentioned suspicious user set; for another example, if a certain user is originally in the suspicious user set, and the user is verified by the receiver (or passes a certain number of times), the user is removed from the suspicious user set. In this way, it is possible to avoid the misoperation or malicious operation of the message receiver from causing trouble to the normal operation of the message sender.

而在上述实时验证条件包括所述目标消息的发送用户的可信度低于可信度阈值时,上述方法则还包括步骤S108(未示出)。在步骤S108中,网络设备接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可信度。例如,在某个用户在系统中的可信度过低的情况下,始终在该用户向其他用户发送消息对该用户进行实时验证;而在某个用户在系统中的可信度较高的情况下,不对该用户进行实时验证,或者仅以“抽查”的形式进行验证。在一些实施例中,若第一用户在实时验证过程中未通过验证,则降低其可信度;而若第一用户在实时验证的过程中通过验证,则提高其可信度。藉此,可避免消息接收者误操作或者恶意操作而对消息发送者的正常操作造成困扰,并实现对用户可信度的动态管理。When the above real-time verification condition includes that the reliability of the sending user of the target message is lower than the reliability threshold, the above method further includes step S108 (not shown). In step S108, the network device receives the verification result information of the second user equipment based on the information to be verified, and updates the reliability based on the verification result information. For example, when the credibility of a user in the system is too low, the user is always verified in real time when the user sends messages to other users. In this case, the user is not verified in real time, or only in the form of "spot check". In some embodiments, if the first user fails the verification in the real-time verification process, its credibility is lowered; and if the first user passes the verification in the real-time verification process, its credibility is increased. In this way, it is possible to avoid the misoperation or malicious operation of the message receiver from causing trouble to the normal operation of the message sender, and to realize the dynamic management of the user's credibility.

即使第一用户未通过实时验证,若将目标消息发送至第二用户设备,仍有可能使第二用户困惑而受骗,或者误操作而遭受损失。为避免这种情况,在一些实施例中,在上述步骤S104中,网络设备接收所述第二用户设备基于所述待验证信息所发送的验证结果信息,若所述验证结果信息包括验证通过,向所述第二用户设备发送所述目标消息。Even if the first user does not pass the real-time verification, if the target message is sent to the second user device, the second user may still be confused and deceived, or suffer losses due to misoperation. In order to avoid this situation, in some embodiments, in the above step S104, the network device receives the verification result information sent by the second user equipment based on the information to be verified, if the verification result information includes the verification passed, The target message is sent to the second user equipment.

与以上所述的在网络设备端用于发送目标消息的方法相对应地,根据本申请的另一方面,还提供了一种在第一用户设备端用于发送目标消息的方法。参考图4,该方法包括步骤S201、步骤S202、步骤S203和步骤S204。在步骤S201中,第一用户设备向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备;在步骤S202中,第一用户设备接收所述网络设备所发送的实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;在步骤S203中,第一用户设备基于所述实时验证指令,实时采集对应的第一用户的待验证信息;在步骤S204中,第一用户设备向所述网络设备发送所述待验证信息。Corresponding to the above-mentioned method for sending a target message on the network device side, according to another aspect of the present application, a method for sending a target message on the first user equipment side is also provided. Referring to FIG. 4, the method includes step S201, step S202, step S203 and step S204. In step S201, the first user equipment sends a target message to the network device, wherein the target recipient of the target message is the second user equipment; in step S202, the first user equipment receives the real-time verification sent by the network device. instruction, wherein the real-time verification instruction is used for the first user equipment to collect the information to be verified of the first user corresponding to the first user equipment in real time; in step S203, the first user equipment based on the real-time verification instruction to collect the information to be verified of the corresponding first user in real time; in step S204, the first user equipment sends the information to be verified to the network device.

具体而言,在步骤S201中,第一用户设备向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备。例如,在一些实施例中,该目标消息的头部包含接收方(即第二用户设备)的标识信息,该标识信息包括但不限于第二用户设备的设备标识信息,或者相应的第二用户的标识信息(例如,该第二用户已在用于接收消息的应用中登录)。Specifically, in step S201, the first user equipment sends a target message to the network device, where the target recipient of the target message is the second user equipment. For example, in some embodiments, the header of the target message includes identification information of the recipient (ie, the second user equipment), and the identification information includes but is not limited to the device identification information of the second user equipment, or the corresponding second user equipment. (eg, the second user is logged in in the application for receiving the message).

在步骤S202中,第一用户设备接收所述网络设备所发送的实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息。例如,所述网络设备检测该目标消息是否满足实时验证条件,并在满足该条件时发送该实时验证指令。所述实时验证条件用于判定该目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,从而保证信息和财产安全,避免上当受骗。In step S202, the first user equipment receives a real-time verification instruction sent by the network device, wherein the real-time verification instruction is used for the first user equipment to collect the first user corresponding to the first user equipment in real time information to be verified. For example, the network device detects whether the target message satisfies the real-time verification condition, and sends the real-time verification instruction when the condition is satisfied. The real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity, so as to ensure the safety of information and property and avoid being deceived.

在步骤S203中,第一用户设备基于所述实时验证指令,实时采集对应的第一用户的待验证信息。例如,该待验证信息由第一用户设备实时采集该第一用户的生物特征、视频、照片、声音等信息,该信息用于发送至第二用户设备以供相应的第二用户验证第一用户的身份。In step S203, based on the real-time verification instruction, the first user equipment collects the information to be verified of the corresponding first user in real time. For example, the information to be verified is collected by the first user equipment in real time, such as biometric features, videos, photos, sounds and other information of the first user, and the information is used to send the information to the second user equipment for the corresponding second user to verify the first user. identity of.

在步骤S204中,第一用户设备向所述网络设备发送所述待验证信息。In step S204, the first user equipment sends the information to be verified to the network device.

在一些实施例中,所述待验证信息包括以下任一项,或以下任意若干项的组合:In some embodiments, the information to be verified includes any one of the following, or a combination of any of the following:

-所述第一用户的实时照片,例如第一用户设备实时调用其前置摄像头而拍摄的、含有正在操作该第一用户设备的第一用户的面部的照片;- a real-time photo of the first user, for example, a photo taken by the first user equipment by calling its front camera in real time and containing the face of the first user who is operating the first user equipment;

-所述第一用户的实时视频,例如第一用户设备实时调用其前置摄像头而拍摄的视频;- the real-time video of the first user, for example, the video captured by the first user's equipment calling its front camera in real time;

-所述第一用户的实时语音,例如该实时语音由第一用户设备实时调用其麦克风而录制,在一些实施例中也可用于供第一用户与第二用户设备所对应的第二用户进行实时的语音沟通。- the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment calling its microphone in real time, and in some embodiments, it can also be used for the first user and the second user corresponding to the second user equipment Real-time voice communication.

在一些实施例中,为了保护第一用户的隐私,以及避免对第一用户造成过多的干扰,对第一用户的待验证信息的采集是在第一用户同意实时验证的情况下执行的。相应地,在步骤S203中,第一用户设备基于所述第一用户对所述实时验证指令的验证响应操作,确定相应的验证响应信息,并向所述网络设备发送所述验证响应信息。随后在步骤S204中,若所述验证响应信息包括允许验证,第一用户设备向所述网络设备发送所述待验证信息。In some embodiments, in order to protect the privacy of the first user and avoid causing excessive interference to the first user, the collection of the information to be verified of the first user is performed under the condition that the first user agrees to real-time verification. Correspondingly, in step S203, the first user equipment determines corresponding verification response information based on the verification response operation of the first user to the real-time verification instruction, and sends the verification response information to the network device. Then in step S204, if the verification response information includes verification permission, the first user equipment sends the to-be-verified information to the network device.

在一些实施例中,若第一用户同意进行实时验证的情况下,为了进一步加强验证效果和避免第一用户作假,可为第一用户和第二用户提供互动。相应地,上述方法还包括步骤S205(未示出)。在步骤S205中,第一用户设备接收所述网络设备所发送的第二实时消息,其中所述第二实时消息是由所述第二用户设备发送至所述网络设备的。其中,所述第二实时消息包括以下任一项,或者任意若干项的组合:In some embodiments, if the first user agrees to perform real-time verification, in order to further enhance the verification effect and prevent the first user from cheating, interaction can be provided for the first user and the second user. Correspondingly, the above method further includes step S205 (not shown). In step S205, the first user equipment receives a second real-time message sent by the network device, where the second real-time message is sent by the second user equipment to the network device. Wherein, the second real-time message includes any one of the following, or a combination of any number of items:

-所述第二用户设备所对应的第二用户的实时视频;- the real-time video of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户的实时语音;- the real-time voice of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户实时输入的文本。- the text input in real time by the second user corresponding to the second user equipment.

例如,第二用户可与第一用户进行一些对话(例如让第一用户回答一些问题),或者要求第一用户根据第二用户的要求做某些操作或某些动作,以加强第一用户的身份验证结果的可信度。For example, the second user can have some conversations with the first user (for example, ask the first user to answer some questions), or ask the first user to do certain operations or actions according to the second user's request, so as to strengthen the first user's The reliability of authentication results.

当然,第一用户也可拒绝身份验证(例如第一用户当前不方便采集实时视频),则上述验证响应信息包括不允许验证。Of course, the first user may also refuse the identity verification (for example, the first user is currently inconvenient to collect real-time video), and the above verification response information includes verification not allowed.

与以上所述的在网络设备端用于发送目标消息的方法相对应地,根据本申请的另一方面,还提供了一种在第二用户设备端用于接收目标消息的方法。参考图5,该方法包括步骤S301、步骤S302。在步骤S301中,第二用户设备接收网络设备所发送的待验证信息;在步骤S302中,第二用户设备接收所述网络设备所发送的目标消息。其中,所述待验证信息是由第一用户设备基于实时验证指令发送的,所述实时验证指令由所述网络设备在接收到所述第一用户设备所发送的目标消息后发送至所述第一用户设备,所述目标消息的目标接收方为所述第二用户设备。Corresponding to the above-mentioned method for sending a target message on a network device side, according to another aspect of the present application, a method for receiving a target message on a second user equipment side is also provided. Referring to FIG. 5 , the method includes steps S301 and S302. In step S301, the second user equipment receives the information to be verified sent by the network device; in step S302, the second user equipment receives the target message sent by the network device. The information to be verified is sent by the first user equipment based on a real-time verification instruction, and the real-time verification instruction is sent by the network device to the first user equipment after receiving the target message sent by the first user equipment. A user equipment, and the target recipient of the target message is the second user equipment.

例如,在一些实施例中,该目标消息的头部包含接收方(即第二用户设备)的标识信息,该标识信息包括但不限于第二用户设备的设备标识信息,或者相应的第二用户的标识信息(例如,该第二用户已在用于接收消息的应用中登录)。所述网络设备检测该目标消息是否满足实时验证条件,并在满足该条件时发送该实时验证指令。所述实时验证条件用于判定该目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,从而保证信息和财产安全,避免上当受骗。在此,有关该实时验证条件的具体实施方式与以上所述的有关实时验证条件的具体实施方式相同或基本相同,不予赘述,并以引用的方式包含于此。For example, in some embodiments, the header of the target message includes identification information of the recipient (ie, the second user equipment), and the identification information includes but is not limited to the device identification information of the second user equipment, or the corresponding second user equipment. (eg, the second user is logged in in the application for receiving the message). The network device detects whether the target message satisfies the real-time verification condition, and sends the real-time verification instruction when the condition is satisfied. The real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity, so as to ensure the safety of information and property and avoid being deceived. Here, the specific implementation of the real-time verification condition is the same or substantially the same as the above-mentioned specific implementation of the real-time verification condition, which is not repeated here, and is incorporated herein by reference.

其中需要说明的是,本申请各实施例并未对以上所述的待验证信息和所述目标消息的接收顺序进行特别限定,例如所述待验证信息可先于或迟于所述目标消息而由所述第二用户设备接收。It should be noted that the embodiments of the present application do not specifically limit the receiving order of the above-mentioned information to be verified and the target message. For example, the information to be verified may be earlier or later than the target message. received by the second user equipment.

在一些实施例中,上述方法还包括步骤S303和步骤S304(均未示出)。在步骤S303中,第二用户设备接收网络设备所发送的验证征询信息,例如系统询问第二用户(消息接收方)是否要验证发送者的身份,若需要,则进一步获取上述待验证信息以供验证第一用户(消息发送方)的身份;在一些实施例中,若第二用户不需要验证第一用户的身份,则流程结束或系统直接提供上述目标消息至第二用户设备,以简化流程,提高用户的操作效率和避免对用户造成过多的干扰。在步骤S304中,第二用户设备根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求。随后,在步骤S301中,第二用户设备接收所述网络设备基于所述实时验证请求所发送的待验证信息。In some embodiments, the above method further includes step S303 and step S304 (neither are shown). In step S303, the second user equipment receives the verification inquiry information sent by the network device, for example, the system asks the second user (message receiver) whether to verify the identity of the sender, and if necessary, further obtains the above-mentioned information to be verified for use in Verify the identity of the first user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process ends or the system directly provides the above target message to the second user equipment to simplify the process , improve the user's operation efficiency and avoid excessive interference to the user. In step S304, the second user equipment sends a real-time verification request to the network device according to the verification request operation of the verification inquiry information by the second user corresponding to the second user equipment. Subsequently, in step S301, the second user equipment receives the information to be verified sent by the network device based on the real-time verification request.

在一些实施例中,若第一用户同意进行实时验证的情况下,为了进一步加强验证效果和避免第一用户作假,可为第一用户和第二用户提供互动。相应地,在上述步骤S304中,第二用户设备根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求以及第二实时消息。其中,所述第二实时消息包括以下任一项,或者任意若干项的组合:In some embodiments, if the first user agrees to perform real-time verification, in order to further enhance the verification effect and prevent the first user from cheating, interaction can be provided for the first user and the second user. Correspondingly, in the above step S304, the second user equipment sends the real-time verification request and the second real-time verification request to the network device according to the verification request operation of the verification inquiry information by the second user corresponding to the second user equipment. information. Wherein, the second real-time message includes any one of the following, or a combination of any number of items:

-所述第二用户设备所对应的第二用户的实时视频;- the real-time video of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户的实时语音;- the real-time voice of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户实时输入的文本。- the text input in real time by the second user corresponding to the second user equipment.

例如,第二用户可与第一用户进行一些对话(例如让第一用户回答一些问题),或者要求第一用户根据第二用户的要求做某些操作或某些动作,以加强第一用户的身份验证结果的可信度。For example, the second user can have some conversations with the first user (for example, ask the first user to answer some questions), or ask the first user to do certain operations or actions according to the second user's request, so as to strengthen the first user's The reliability of authentication results.

在一些实施例中,上述方法还包括步骤S305(未示出)。在步骤S305 中,第二用户设备基于所述待验证信息,向所述网络设备发送对应的验证结果信息。在一些实施例中,网络设备仅在第一用户的身份得到第二用户确认之后才向第二用户设备发送上述目标消息;或者,网络设备基于第二用户对第一用户的身份的实时验证结果将第一用户加入一可疑用户集合,或者调整第一用户在系统中的可信度。具体实施方式已在前文详细描述,不予赘述,并以引用的方式包含于此。例如,在步骤S302中,若所述验证结果信息包括验证通过,第二用户设备接收所述网络设备所发送的目标消息。In some embodiments, the above method further includes step S305 (not shown). In step S305, the second user equipment sends corresponding verification result information to the network device based on the information to be verified. In some embodiments, the network device sends the above-mentioned target message to the second user device only after the identity of the first user is confirmed by the second user; or, the network device sends the above-mentioned target message to the second user device based on the real-time verification result of the identity of the first user by the second user The first user is added to a set of suspicious users, or the credibility of the first user in the system is adjusted. The specific embodiments have been described in detail above, and will not be repeated, and are incorporated herein by reference. For example, in step S302, if the verification result information includes verification passed, the second user equipment receives the target message sent by the network device.

根据本申请的一个方面,还提供了一种用于发送目标消息的网络设备 100。参考图6,该网络设备100包括第一一模块101、第一二模块102、第一三模块103和第一四模块104。其中,第一一模块101接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中所述目标消息的目标接收方为第二用户设备;若所述目标消息满足所述实时验证条件,第一二模块102向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;第一三模块103接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息;第一四模块104向所述第二用户设备发送所述目标消息。According to an aspect of the present application, a network device 100 for sending a target message is also provided. Referring to FIG. 6 , the network device 100 includes a first first module 101 , a first second module 102 , a first third module 103 and a first fourth module 104 . The first-to-one module 101 receives the target message sent by the first user equipment, and detects whether the target message satisfies the preset real-time verification condition, wherein the target recipient of the target message is the second user equipment; If the target message satisfies the real-time verification condition, the first and second modules 102 send a real-time verification instruction to the first user equipment, wherein the real-time verification instruction is used for the first user equipment to collect the first user equipment in real time The information to be verified of the corresponding first user; the first third module 103 receives the information to be verified sent by the first user equipment based on the real-time verification instruction, and sends the information to be verified to the second user equipment ; the first fourth module 104 sends the target message to the second user equipment.

具体而言,第一一模块101接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中所述目标消息的目标接收方为第二用户设备。例如,在一些实施例中,该目标消息的头部包含接收方(即第二用户设备)的标识信息,该标识信息包括但不限于第二用户设备的设备标识信息,或者相应的第二用户的标识信息(例如,该第二用户已在用于接收消息的应用中登录)。Specifically, the first-first module 101 receives the target message sent by the first user equipment, and detects whether the target message satisfies the preset real-time verification condition, wherein the target recipient of the target message is the second user equipment. For example, in some embodiments, the header of the target message includes identification information of the recipient (ie, the second user equipment), and the identification information includes but is not limited to the device identification information of the second user equipment, or the corresponding second user equipment. (eg, the second user is logged in in the application for receiving the message).

其中,所述实时验证条件用于判定该目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,从而保证信息和财产安全,避免上当受骗。相应地,若所述目标消息满足所述实时验证条件,第一二模块 102向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息。The real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity, so as to ensure the safety of information and property and avoid being deceived. Correspondingly, if the target message satisfies the real-time verification condition, the first and second modules 102 send a real-time verification instruction to the first user equipment, wherein the real-time verification instruction is used for the first user equipment to collect all data in real time. The to-be-verified information of the first user corresponding to the first user equipment.

之后,若第一用户设备在接收上述实时验证指令之后进行了响应,例如发送了相应的待验证信息(用于发送至接收方,即第二用户设备,以供验证身份),第一三模块103接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息。After that, if the first user equipment responds after receiving the above-mentioned real-time verification instruction, for example, sends the corresponding information to be verified (for sending to the receiver, that is, the second user equipment, for identity verification), the first and third modules 103 Receive the information to be verified sent by the first user equipment based on the real-time verification instruction, and send the information to be verified to the second user equipment.

而第一四模块104向所述第二用户设备发送所述目标消息。And the first four modules 104 send the target message to the second user equipment.

其中需要说明的是,本申请各实施例并未对以上所述的待验证信息和所述目标消息的发送顺序进行特别限定,例如所述待验证信息可先于或迟于所述目标消息而被发送至所述第二用户设备。It should be noted that the embodiments of the present application do not specifically limit the sending order of the above-mentioned information to be verified and the target message. For example, the information to be verified may be sent before or after the target message. is sent to the second user equipment.

在一些实施例中,所述待验证信息包括以下任一项,或以下任意若干项的组合:In some embodiments, the information to be verified includes any one of the following, or a combination of any of the following:

-所述第一用户的实时照片,例如第一用户设备实时调用其前置摄像头而拍摄的、含有正在操作该第一用户设备的第一用户的面部的照片;- a real-time photo of the first user, for example, a photo taken by the first user equipment by calling its front camera in real time and containing the face of the first user who is operating the first user equipment;

-所述第一用户的实时视频,例如第一用户设备实时调用其前置摄像头而拍摄的视频;- the real-time video of the first user, for example, the video captured by the first user's equipment calling its front camera in real time;

-所述第一用户的实时语音,例如该实时语音由第一用户设备实时调用其麦克风而录制,在一些实施例中也可用于供第一用户与第二用户设备所对应的第二用户进行实时的语音沟通。- the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment calling its microphone in real time, and in some embodiments, it can also be used for the first user and the second user corresponding to the second user equipment Real-time voice communication.

在一些实施例中,上述第一二模块102包括第一单元102a、第二单元 102b和第三单元102c(均未示出)。第一单元102a向所述第二用户设备发送验证征询信息,例如系统询问第二用户(消息接收方)是否要验证发送者的身份,若需要,则进一步获取上述待验证信息以供验证第一用户(消息发送方)的身份;在一些实施例中,若第二用户不需要验证第一用户的身份,则流程结束或系统直接提供上述目标消息至第二用户设备,以简化流程,提高用户的操作效率和避免对用户造成过多的干扰。相应地,第二单元102b接收所述第二用户设备基于所述验证征询信息所发送的实时验证请求;第三单元102c基于所述实时验证请求,向所述第一用户设备发送实时验证指令。In some embodiments, the first and second modules 102 described above include a first unit 102a, a second unit 102b, and a third unit 102c (none of which are shown). The first unit 102a sends verification inquiry information to the second user equipment, for example, the system asks the second user (message receiver) whether to verify the identity of the sender, and if necessary, further obtains the above-mentioned information to be verified for verifying the first The identity of the user (message sender); in some embodiments, if the second user does not need to verify the identity of the first user, the process ends or the system directly provides the above target message to the second user equipment to simplify the process and improve the user experience. operational efficiency and avoid excessive disruption to users. Correspondingly, the second unit 102b receives a real-time verification request sent by the second user equipment based on the verification inquiry information; the third unit 102c sends a real-time verification instruction to the first user equipment based on the real-time verification request.

其中,在一些实施例中,为了保护第一用户的隐私,以及避免对第一用户造成过多的干扰,对第一用户的待验证信息的采集是在第一用户同意实时验证的情况下执行的。相应地,上述第一三模块103接收所述第一用户设备基于所述实时验证指令所发送的验证响应信息(例如,该验证响应信息可能包含“允许验证”,或者“不允许验证”,或者“稍后验证”等),若所述验证响应信息包括允许验证,则网络设备接收所述第一用户设备所发送的待验证信息,并向所述第二用户设备发送所述待验证信息。Wherein, in some embodiments, in order to protect the privacy of the first user and avoid causing too much interference to the first user, the collection of the information to be verified of the first user is performed under the condition that the first user agrees to real-time verification of. Correspondingly, the above-mentioned first and third modules 103 receive the verification response information sent by the first user equipment based on the real-time verification instruction (for example, the verification response information may contain "verification allowed", or "verification not allowed", or "Verify later", etc.), if the verification response information includes verification permission, the network device receives the information to be verified sent by the first user equipment, and sends the information to be verified to the second user equipment.

在一些实施例中,若第一用户同意进行实时验证的情况下,为了进一步加强验证效果和避免第一用户作假,可为第一用户和第二用户提供互动。相应地,上述网络设备还包括第一五模块105(未示出)。第一五模块105 基于所述实时验证请求,接收所述第二用户设备所发送的第二实时消息,并向所述第一用户设备发送所述第二实时消息。其中,所述第二实时消息包括以下任一项,或者任意若干项的组合:In some embodiments, if the first user agrees to perform real-time verification, in order to further enhance the verification effect and prevent the first user from cheating, interaction can be provided for the first user and the second user. Correspondingly, the above-mentioned network device further includes the first and fifth modules 105 (not shown). The first fifth module 105 receives the second real-time message sent by the second user equipment based on the real-time verification request, and sends the second real-time message to the first user equipment. Wherein, the second real-time message includes any one of the following, or a combination of any number of items:

-所述第二用户设备所对应的第二用户的实时视频;- the real-time video of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户的实时语音;- the real-time voice of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户实时输入的文本。- the text input in real time by the second user corresponding to the second user equipment.

例如,第二用户可与第一用户进行一些对话(例如让第一用户回答一些问题),或者要求第一用户根据第二用户的要求做某些操作或某些动作,以加强第一用户的身份验证结果的可信度。For example, the second user can have some conversations with the first user (for example, ask the first user to answer some questions), or ask the first user to do certain operations or actions according to the second user's request, so as to strengthen the first user's The reliability of authentication results.

当然,第一用户也可拒绝身份验证,例如第一用户当前不方便采集实时视频。在一些实施例中,上述网络设备还包括第一六模块106(未示出)。若所述第一用户设备基于所述实时验证指令所发送的验证响应信息包括不允许验证,或者所述实时验证指令响应超时,则第一六模块106丢弃所述目标消息,网络设备不再向第二用户设备发送该目标消息,以避免对第二用户造成干扰,从而提升用户的使用体验。例如,第二用户对该目标消息是无感的。Of course, the first user may also refuse the authentication, for example, it is currently inconvenient for the first user to collect real-time video. In some embodiments, the aforementioned network device further includes a first six modules 106 (not shown). If the verification response information sent by the first user equipment based on the real-time verification instruction includes that verification is not allowed, or the real-time verification instruction response times out, the first sixth module 106 discards the target message, and the network device no longer sends the The second user equipment sends the target message to avoid causing interference to the second user, thereby improving the user's use experience. For example, the second user is indifferent to the target message.

在一些实施例中,所述实时验证条件包括以下任一项,或任意若干项的组合:In some embodiments, the real-time verification conditions include any one of the following, or a combination of any number of items:

-所述目标消息包含银行账号信息,例如系统在该目标消息中检测到特定位数(例如15位、16位、19位等)的数字。- the target message contains bank account information, eg the system detects a number of a certain number of digits (eg 15, 16, 19, etc.) in the target message.

-所述目标消息包含预设关键词,例如“银行”“转账”“存款”“现金”等。- The target message contains preset keywords, such as "bank", "transfer", "deposit", "cash" and so on.

-所述目标消息的发送用户被包含于可疑用户集合,例如,该集合由系统提供,其中系统创建了可疑用户列表,这个列表里的用户发送消息给其他用户,都需要首先验证身份,以尽可能避免可疑用户对合法用户的信息和财产安全造成威胁;又例如,该集合由接收者创建,例如该集合对应于一黑名单,该黑名单里的用户给该接收者发消息,都需要验证身份,此时对于每个接收者而言这个集合都可能是不同的;- The sending user of the target message is included in the suspicious user set, for example, the set is provided by the system, where the system creates a list of suspicious users, and the users in this list send messages to other users, all need to verify their identities first, in order to avoid It may prevent suspicious users from threatening the information and property security of legitimate users; for another example, the set is created by the receiver, for example, the set corresponds to a blacklist, and users in the blacklist send messages to the receiver, all need to be verified Identity, this set may be different for each recipient at this time;

-所述目标消息的发送用户的可信度低于一可信度阈值,其中该可信度可基于消息发送者的历史行为计算得到,当该可信度足够高时,该消息发送者在向其他用户发送消息时就无需进行身份验证,从而提升合法用户的操作效率和使用体验。- the credibility of the sending user of the target message is lower than a credibility threshold, wherein the credibility can be calculated based on the historical behavior of the message sender, when the credibility is high enough, the message sender is in the There is no need to authenticate when sending messages to other users, thereby improving the operational efficiency and experience for legitimate users.

在此基础上,在上述实时验证条件包括所述目标消息的发送用户被包含于可疑用户集合时,上述网络设备还包括第一七模块107(未示出)。第一七模块107接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可疑用户集合。例如,在某个用户未通过接收者的验证(可以以“抽查”的形式进行验证以提升用户操作效率和使用体验),或者在该用户未通过验证达到一定的次数的情况下,将该用户加入上述可疑用户集合;又例如,若某个用户原先在该可疑用户集合中,而该用户由接收者验证通过(或者通过达到一定的次数),将该用户从该可疑用户集合中移除。藉此,可避免消息接收者误操作或者恶意操作而对消息发送者的正常操作造成困扰。On this basis, when the above-mentioned real-time verification condition includes that the sending user of the target message is included in the set of suspicious users, the above-mentioned network device further includes a first seventh module 107 (not shown). The first seventh module 107 receives the verification result information of the second user equipment based on the information to be verified, and updates the suspicious user set based on the verification result information. For example, when a user fails the verification of the receiver (verification can be carried out in the form of "spot check" to improve user operation efficiency and user experience), or if the user fails the verification for a certain number of times, the user Join the above-mentioned suspicious user set; for another example, if a certain user is originally in the suspicious user set, and the user is verified by the receiver (or passes a certain number of times), the user is removed from the suspicious user set. In this way, it is possible to avoid the misoperation or malicious operation of the message receiver from causing trouble to the normal operation of the message sender.

而在上述实时验证条件包括所述目标消息的发送用户的可信度低于可信度阈值时,上述网络设备则还包括第一八模块108(未示出)。第一八模块108接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可信度。例如,在某个用户在系统中的可信度过低的情况下,始终在该用户向其他用户发送消息对该用户进行实时验证;而在某个用户在系统中的可信度较高的情况下,不对该用户进行实时验证,或者仅以“抽查”的形式进行验证。在一些实施例中,若第一用户在实时验证过程中未通过验证,则降低其可信度;而若第一用户在实时验证的过程中通过验证,则提高其可信度。藉此,可避免消息接收者误操作或者恶意操作而对消息发送者的正常操作造成困扰,并实现对用户可信度的动态管理。And when the above-mentioned real-time verification condition includes that the credibility of the sending user of the target message is lower than the credibility threshold, the above-mentioned network device further includes the first eight modules 108 (not shown). The first eight modules 108 receive the verification result information of the second user equipment based on the information to be verified, and update the reliability based on the verification result information. For example, when the credibility of a user in the system is too low, the user is always verified in real time when the user sends messages to other users. In this case, the user is not verified in real time, or only in the form of "spot check". In some embodiments, if the first user fails the verification in the real-time verification process, its credibility is lowered; and if the first user passes the verification in the real-time verification process, its credibility is increased. In this way, it is possible to avoid the misoperation or malicious operation of the message receiver from causing trouble to the normal operation of the message sender, and to realize the dynamic management of the user's credibility.

即使第一用户未通过实时验证,若将目标消息发送至第二用户设备,仍有可能使第二用户困惑而受骗,或者误操作而遭受损失。为避免这种情况,在一些实施例中,上述第一四模块104接收所述第二用户设备基于所述待验证信息所发送的验证结果信息,若所述验证结果信息包括验证通过,向所述第二用户设备发送所述目标消息。Even if the first user does not pass the real-time verification, if the target message is sent to the second user device, the second user may still be confused and deceived, or suffer losses due to misoperation. To avoid this situation, in some embodiments, the above-mentioned first and fourth modules 104 receive the verification result information sent by the second user equipment based on the information to be verified. The second user equipment sends the target message.

与以上所述的用于发送目标消息的网络设备相对应地,根据本申请的另一方面,还提供了一种用于发送目标消息的第一用户设备200。参考图 7,该用户设备200包括第二一模块201、第二二模块202、第二三模块203 和第二四模块204。第二一模块201向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备;第二二模块202接收所述网络设备所发送的实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息;第二三模块203基于所述实时验证指令,实时采集对应的第一用户的待验证信息;第二四模块204向所述网络设备发送所述待验证信息。Corresponding to the above-mentioned network device for sending a target message, according to another aspect of the present application, a first user equipment 200 for sending a target message is also provided. Referring to FIG. 7 , the user equipment 200 includes a second first module 201 , a second second module 202 , a second third module 203 and a second fourth module 204 . The second-first module 201 sends a target message to the network device, wherein the target recipient of the target message is the second user equipment; the second-second module 202 receives the real-time verification instruction sent by the network device, wherein the real-time verification instruction It is used for the first user equipment to collect in real time the information to be verified of the first user corresponding to the first user equipment; the second and third modules 203 collect in real time the to-be-verified information of the corresponding first user based on the real-time verification instruction information; the second fourth module 204 sends the to-be-verified information to the network device.

具体而言,第二一模块201向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备。例如,在一些实施例中,该目标消息的头部包含接收方(即第二用户设备)的标识信息,该标识信息包括但不限于第二用户设备的设备标识信息,或者相应的第二用户的标识信息(例如,该第二用户已在用于接收消息的应用中登录)。Specifically, the second-first module 201 sends a target message to the network device, wherein the target recipient of the target message is the second user equipment. For example, in some embodiments, the header of the target message includes identification information of the recipient (ie, the second user equipment), and the identification information includes but is not limited to the device identification information of the second user equipment, or the corresponding second user equipment. (eg, the second user is logged in in the application for receiving the message).

第二二模块202接收所述网络设备所发送的实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息。例如,所述网络设备检测该目标消息是否满足实时验证条件,并在满足该条件时发送该实时验证指令。所述实时验证条件用于判定该目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,从而保证信息和财产安全,避免上当受骗。The second second module 202 receives the real-time verification instruction sent by the network device, wherein the real-time verification instruction is used for the first user equipment to collect the information to be verified of the first user corresponding to the first user equipment in real time . For example, the network device detects whether the target message satisfies the real-time verification condition, and sends the real-time verification instruction when the condition is satisfied. The real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity, so as to ensure the safety of information and property and avoid being deceived.

第二三模块203基于所述实时验证指令,实时采集对应的第一用户的待验证信息。例如,该待验证信息由第一用户设备实时采集该第一用户的生物特征、视频、照片、声音等信息,该信息用于发送至第二用户设备以供相应的第二用户验证第一用户的身份。The second and third modules 203 collect in real time the information to be verified of the corresponding first user based on the real-time verification instruction. For example, the information to be verified is collected by the first user equipment in real time, such as biometric features, videos, photos, sounds and other information of the first user, and the information is used to send the information to the second user equipment for the corresponding second user to verify the first user. identity of.

第二四模块204向所述网络设备发送所述待验证信息。The second and fourth modules 204 send the information to be verified to the network device.

在一些实施例中,所述待验证信息包括以下任一项,或以下任意若干项的组合:In some embodiments, the information to be verified includes any one of the following, or a combination of any of the following:

-所述第一用户的实时照片,例如第一用户设备实时调用其前置摄像头而拍摄的、含有正在操作该第一用户设备的第一用户的面部的照片;- a real-time photo of the first user, for example, a photo taken by the first user equipment by calling its front camera in real time and containing the face of the first user who is operating the first user equipment;

-所述第一用户的实时视频,例如第一用户设备实时调用其前置摄像头而拍摄的视频;- the real-time video of the first user, for example, the video captured by the first user's equipment calling its front camera in real time;

-所述第一用户的实时语音,例如该实时语音由第一用户设备实时调用其麦克风而录制,在一些实施例中也可用于供第一用户与第二用户设备所对应的第二用户进行实时的语音沟通。- the real-time voice of the first user, for example, the real-time voice is recorded by the first user equipment calling its microphone in real time, and in some embodiments, it can also be used for the first user and the second user corresponding to the second user equipment Real-time voice communication.

在一些实施例中,为了保护第一用户的隐私,以及避免对第一用户造成过多的干扰,对第一用户的待验证信息的采集是在第一用户同意实时验证的情况下执行的。相应地,第二三模块203基于所述第一用户对所述实时验证指令的验证响应操作,确定相应的验证响应信息,并向所述网络设备发送所述验证响应信息。随后,若所述验证响应信息包括允许验证,第二四模块204向所述网络设备发送所述待验证信息。In some embodiments, in order to protect the privacy of the first user and avoid causing excessive interference to the first user, the collection of the information to be verified of the first user is performed under the condition that the first user agrees to real-time verification. Correspondingly, the second and third modules 203 determine corresponding verification response information based on the verification response operation of the first user to the real-time verification instruction, and send the verification response information to the network device. Subsequently, if the verification response information includes verification permission, the second fourth module 204 sends the to-be-verified information to the network device.

在一些实施例中,若第一用户同意进行实时验证的情况下,为了进一步加强验证效果和避免第一用户作假,可为第一用户和第二用户提供互动。相应地,上述第一用户设备还包括第二五模块205(未示出)。第二五模块 205接收所述网络设备所发送的第二实时消息,其中所述第二实时消息是由所述第二用户设备发送至所述网络设备的。其中,所述第二实时消息包括以下任一项,或者任意若干项的组合:In some embodiments, if the first user agrees to perform real-time verification, in order to further enhance the verification effect and prevent the first user from cheating, interaction can be provided for the first user and the second user. Correspondingly, the above-mentioned first user equipment further includes a second fifth module 205 (not shown). The second fifth module 205 receives a second real-time message sent by the network device, wherein the second real-time message is sent by the second user equipment to the network device. Wherein, the second real-time message includes any one of the following, or a combination of any number of items:

-所述第二用户设备所对应的第二用户的实时视频;- the real-time video of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户的实时语音;- the real-time voice of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户实时输入的文本。- the text input in real time by the second user corresponding to the second user equipment.

例如,第二用户可与第一用户进行一些对话(例如让第一用户回答一些问题),或者要求第一用户根据第二用户的要求做某些操作或某些动作,以加强第一用户的身份验证结果的可信度。For example, the second user can have some conversations with the first user (for example, ask the first user to answer some questions), or ask the first user to do certain operations or actions according to the second user's request, so as to strengthen the first user's The reliability of authentication results.

当然,第一用户也可拒绝身份验证(例如第一用户当前不方便采集实时视频),则上述验证响应信息包括不允许验证。Of course, the first user may also refuse the identity verification (for example, the first user is currently inconvenient to collect real-time video), and the above verification response information includes verification not allowed.

与以上所述的用于发送目标消息的网络设备相对应地,根据本申请的另一方面,还提供了一种用于接收目标消息的第二用户设备300。参考图 8,该第二用户设备300包括第三一模块301、第三二模块302。第三一模块301接收网络设备所发送的待验证信息;第三二模块302接收所述网络设备所发送的目标消息。其中,所述待验证信息是由第一用户设备基于实时验证指令发送的,所述实时验证指令由所述网络设备在接收到所述第一用户设备所发送的目标消息后发送至所述第一用户设备,所述目标消息的目标接收方为所述第二用户设备。Corresponding to the above-mentioned network device for sending a target message, according to another aspect of the present application, a second user equipment 300 for receiving a target message is also provided. Referring to FIG. 8 , the second user equipment 300 includes a third first module 301 and a third second module 302. The third first module 301 receives the information to be verified sent by the network device; the third second module 302 receives the target message sent by the network device. The information to be verified is sent by the first user equipment based on a real-time verification instruction, and the real-time verification instruction is sent by the network device to the first user equipment after receiving the target message sent by the first user equipment. A user equipment, and the target recipient of the target message is the second user equipment.

例如,在一些实施例中,该目标消息的头部包含接收方(即第二用户设备)的标识信息,该标识信息包括但不限于第二用户设备的设备标识信息,或者相应的第二用户的标识信息(例如,该第二用户已在用于接收消息的应用中登录)。所述网络设备检测该目标消息是否满足实时验证条件,并在满足该条件时发送该实时验证指令。所述实时验证条件用于判定该目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,从而保证信息和财产安全,避免上当受骗。在此,有关该实时验证条件的具体实施方式与以上所述的有关实时验证条件的具体实施方式相同或基本相同,不予赘述,并以引用的方式包含于此。For example, in some embodiments, the header of the target message includes identification information of the recipient (ie, the second user equipment), and the identification information includes but is not limited to the device identification information of the second user equipment, or the corresponding second user equipment. (eg, the second user is logged in in the application for receiving the message). The network device detects whether the target message satisfies the real-time verification condition, and sends the real-time verification instruction when the condition is satisfied. The real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity, so as to ensure the safety of information and property and avoid being deceived. Here, the specific implementation of the real-time verification condition is the same or substantially the same as the above-mentioned specific implementation of the real-time verification condition, which is not repeated here, and is incorporated herein by reference.

其中需要说明的是,本申请各实施例并未对以上所述的待验证信息和所述目标消息的接收顺序进行特别限定,例如所述待验证信息可先于或迟于所述目标消息而由所述第二用户设备接收。It should be noted that the embodiments of the present application do not specifically limit the receiving order of the above-mentioned information to be verified and the target message. For example, the information to be verified may be earlier or later than the target message. received by the second user equipment.

在一些实施例中,上述第二用户设备还包括第三三模块303和第三四模块304(均未示出)。第三三模块303接收网络设备所发送的验证征询信息,例如系统询问第二用户(消息接收方)是否要验证发送者的身份,若需要,则进一步获取上述待验证信息以供验证第一用户(消息发送方)的身份;在一些实施例中,若第二用户不需要验证第一用户的身份,则流程结束或系统直接提供上述目标消息至第二用户设备,以简化流程,提高用户的操作效率和避免对用户造成过多的干扰。第三四模块304根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求。随后,第三一模块301接收所述网络设备基于所述实时验证请求所发送的待验证信息。In some embodiments, the above-mentioned second user equipment further includes a third third module 303 and a third fourth module 304 (neither are shown). The third and third modules 303 receive the verification inquiry information sent by the network device, for example, the system asks the second user (message receiver) whether to verify the identity of the sender, and if necessary, further obtains the above-mentioned information to be verified for verifying the first user (message sender) identity; in some embodiments, if the second user does not need to verify the identity of the first user, the process ends or the system directly provides the above-mentioned target message to the second user equipment, so as to simplify the process and improve the user's Operational efficiency and avoid excessive disruption to users. The third and fourth modules 304 send a real-time verification request to the network device according to the verification request operation of the verification inquiry information by the second user corresponding to the second user equipment. Subsequently, the third-first module 301 receives the information to be verified sent by the network device based on the real-time verification request.

在一些实施例中,若第一用户同意进行实时验证的情况下,为了进一步加强验证效果和避免第一用户作假,可为第一用户和第二用户提供互动。相应地,上述第三四模块304根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求以及第二实时消息。其中,所述第二实时消息包括以下任一项,或者任意若干项的组合:In some embodiments, if the first user agrees to perform real-time verification, in order to further enhance the verification effect and prevent the first user from cheating, interaction can be provided for the first user and the second user. Correspondingly, the above-mentioned third and fourth modules 304 send a real-time verification request and a second real-time message to the network device according to the verification request operation of the verification inquiry information by the second user corresponding to the second user equipment. Wherein, the second real-time message includes any one of the following, or a combination of any number of items:

-所述第二用户设备所对应的第二用户的实时视频;- the real-time video of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户的实时语音;- the real-time voice of the second user corresponding to the second user equipment;

-所述第二用户设备所对应的第二用户实时输入的文本。- the text input in real time by the second user corresponding to the second user equipment.

例如,第二用户可与第一用户进行一些对话(例如让第一用户回答一些问题),或者要求第一用户根据第二用户的要求做某些操作或某些动作,以加强第一用户的身份验证结果的可信度。For example, the second user can have some conversations with the first user (for example, ask the first user to answer some questions), or ask the first user to do certain operations or actions according to the second user's request, so as to strengthen the first user's The reliability of authentication results.

在一些实施例中,上述第二用户设备还包括第三五模块305(未示出)。第三五模块305基于所述待验证信息,向所述网络设备发送对应的验证结果信息。在一些实施例中,网络设备仅在第一用户的身份得到第二用户确认之后才向第二用户设备发送上述目标消息;或者,网络设备基于第二用户对第一用户的身份的实时验证结果将第一用户加入一可疑用户集合,或者调整第一用户在系统中的可信度。具体实施方式已在前文详细描述,不予赘述,并以引用的方式包含于此。例如,若所述验证结果信息包括验证通过,第三二模块302接收所述网络设备所发送的目标消息。In some embodiments, the above-mentioned second user equipment further includes a third and fifth module 305 (not shown). The third and fifth module 305 sends corresponding verification result information to the network device based on the information to be verified. In some embodiments, the network device sends the above-mentioned target message to the second user device only after the identity of the first user is confirmed by the second user; or, the network device sends the above-mentioned target message to the second user device based on the real-time verification result of the identity of the first user by the second user The first user is added to a set of suspicious users, or the credibility of the first user in the system is adjusted. The specific embodiments have been described in detail above, and will not be repeated, and are incorporated herein by reference. For example, if the verification result information includes the verification passed, the third second module 302 receives the target message sent by the network device.

本申请还提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机代码,当所述计算机代码被执行时,如前任一项所述的方法被执行。The present application also provides a computer-readable storage medium, where the computer-readable storage medium stores computer code, and when the computer code is executed, the method described in any preceding item is executed.

本申请还提供了一种计算机程序产品,当所述计算机程序产品被计算机设备执行时,如前任一项所述的方法被执行。The present application also provides a computer program product, when the computer program product is executed by a computer device, the method according to any one of the preceding items is executed.

本申请还提供了一种计算机设备,所述计算机设备包括:The present application also provides a computer device, the computer device comprising:

一个或多个处理器;one or more processors;

存储器,用于存储一个或多个计算机程序;memory for storing one or more computer programs;

当所述一个或多个计算机程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如前任一项所述的方法。The one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding item.

图9示出了可被用于实施本申请中所述的各个实施例的示例性系统;FIG. 9 illustrates an exemplary system that may be used to implement various embodiments described in this application;

如图9所示在一些实施例中,系统1000能够作为各所述实施例中的任意一个网络设备、第一用户设备或第二用户设备。在一些实施例中,系统1000可包括具有指令的一个或多个计算机可读介质(例如,系统存储器或NVM/存储设备1020)以及与该一个或多个计算机可读介质耦合并被配置为执行指令以实现模块从而执行本申请中所述的动作的一个或多个处理器(例如,(一个或多个)处理器1005)。As shown in FIG. 9 , in some embodiments, the system 1000 can function as any one of the network equipment, the first user equipment, or the second user equipment in each of the embodiments. In some embodiments, system 1000 may include one or more computer-readable media (eg, system memory or NVM/storage device 1020 ) having instructions and be coupled to the one or more computer-readable media and configured to execute Instructions to implement a module to perform one or more processors (eg, processor(s) 1005 ) to perform the actions described herein.

对于一个实施例,系统控制模块1010可包括任意适当的接口控制器,以向(一个或多个)处理器1005中的至少一个和/或与系统控制模块1010通信的任意适当的设备或组件提供任意适当的接口。For one embodiment, the system control module 1010 may include any suitable interface controller to provide at least one of the processor(s) 1005 and/or any suitable device or component in communication with the system control module 1010 any appropriate interface.

系统控制模块1010可包括存储器控制器模块1030,以向系统存储器 1015提供接口。存储器控制器模块1030可以是硬件模块、软件模块和/ 或固件模块。The system control module 1010 may include a memory controller module 1030 to provide an interface to the system memory 1015. The memory controller module 1030 may be a hardware module, a software module, and/or a firmware module.

系统存储器1015可被用于例如为系统1000加载和存储数据和/或指令。对于一个实施例,系统存储器1015可包括任意适当的易失性存储器,例如,适当的DRAM。在一些实施例中,系统存储器1015可包括双倍数据速率类型四同步动态随机存取存储器(DDR4SDRAM)。System memory 1015 may be used, for example, to load and store data and/or instructions for system 1000 . For one embodiment, system memory 1015 may include any suitable volatile memory, eg, suitable DRAM. In some embodiments, system memory 1015 may include double data rate type quad synchronous dynamic random access memory (DDR4 SDRAM).

对于一个实施例,系统控制模块1010可包括一个或多个输入/输出(I/O) 控制器,以向NVM/存储设备1020及(一个或多个)通信接口1025提供接口。For one embodiment, system control module 1010 may include one or more input/output (I/O) controllers to provide interfaces to NVM/storage device 1020 and communication interface(s) 1025 .

例如,NVM/存储设备1020可被用于存储数据和/或指令。NVM/存储设备1020可包括任意适当的非易失性存储器(例如,闪存)和/或可包括任意适当的(一个或多个)非易失性存储设备(例如,一个或多个硬盘驱动器 (Hard Disk,HDD)、一个或多个光盘(CD)驱动器和/或一个或多个数字通用光盘(DVD)驱动器)。For example, NVM/storage device 1020 may be used to store data and/or instructions. NVM/storage device 1020 may include any suitable non-volatile memory (eg, flash memory) and/or may include any suitable non-volatile storage device(s) (eg, one or more hard disk drives ( Hard Disk, HDD), one or more compact disc (CD) drives and/or one or more digital versatile disc (DVD) drives).

NVM/存储设备1020可包括在物理上作为系统1000被安装在其上的设备的一部分的存储资源,或者其可被该设备访问而不必作为该设备的一部分。例如,NVM/存储设备1020可通过网络经由(一个或多个)通信接口 1025进行访问。NVM/storage device 1020 may include storage resources that are physically part of the device on which system 1000 is installed, or it may be accessed by the device without necessarily being part of the device. For example, NVM/storage device 1020 may be accessed via communication interface(s) 1025 over a network.

(一个或多个)通信接口1025可为系统1000提供接口以通过一个或多个网络和/或与任意其他适当的设备通信。系统1000可根据一个或多个无线网络标准和/或协议中的任意标准和/或协议来与无线网络的一个或多个组件进行无线通信。Communication interface(s) 1025 may provide an interface for system 1000 to communicate over one or more networks and/or with any other suitable device. System 1000 can wirelessly communicate with one or more components of a wireless network in accordance with any of one or more wireless network standards and/or protocols.

对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010的一个或多个控制器(例如,存储器控制器模块1030)的逻辑封装在一起。对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010的一个或多个控制器的逻辑封装在一起以形成系统级封装(SiP)。对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块1010的一个或多个控制器的逻辑集成在同一模具上。对于一个实施例,(一个或多个)处理器1005中的至少一个可与系统控制模块 1010的一个或多个控制器的逻辑集成在同一模具上以形成片上系统(SoC)。For one embodiment, at least one of the processor(s) 1005 may be packaged with the logic of one or more controllers of the system control module 1010 (eg, the memory controller module 1030 ). For one embodiment, at least one of the processor(s) 1005 may be packaged with logic of one or more controllers of the system control module 1010 to form a system-in-package (SiP). For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with the logic of one or more controllers of the system control module 1010 . For one embodiment, at least one of the processor(s) 1005 may be integrated on the same die with logic of one or more controllers of the system control module 1010 to form a system-on-chip (SoC).

在各个实施例中,系统1000可以但不限于是:服务器、工作站、台式计算设备或移动计算设备(例如,膝上型计算设备、手持计算设备、平板电脑、上网本等)。在各个实施例中,系统1000可具有更多或更少的组件和/或不同的架构。例如,在一些实施例中,系统1000包括一个或多个摄像机、键盘、液晶显示器(LCD)屏幕(包括触屏显示器)、非易失性存储器端口、多个天线、图形芯片、专用集成电路(ASIC)和扬声器。In various embodiments, system 1000 may be, but is not limited to, a server, workstation, desktop computing device, or mobile computing device (eg, laptop computing device, handheld computing device, tablet computer, netbook, etc.). In various embodiments, system 1000 may have more or fewer components and/or different architectures. For example, in some embodiments, system 1000 includes one or more cameras, keyboards, liquid crystal display (LCD) screens (including touch screen displays), non-volatile memory ports, multiple antennas, graphics chips, application specific integrated circuits ( ASIC) and speakers.

需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。It should be noted that the present application may be implemented in software and/or a combination of software and hardware, eg, an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device. In one embodiment, the software program of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer-readable recording medium, such as RAM memory, magnetic or optical drives or floppy disks, and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.

另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。In addition, a part of the present application can be applied as a computer program product, such as computer program instructions, which when executed by a computer, through the operation of the computer, can invoke or provide methods and/or technical solutions according to the present application. Those skilled in the art should understand that the existing forms of computer program instructions in computer-readable media include but are not limited to source files, executable files, installation package files, etc. Correspondingly, the ways in which computer program instructions are executed by a computer include but are not limited to Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding post-installation program. program. Here, the computer-readable medium can be any available computer-readable storage medium or communication medium that can be accessed by a computer.

通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。Communication media includes media by which communication signals containing, for example, computer readable instructions, data structures, program modules or other data are transmitted from one system to another. Communication media may include conducted transmission media such as cables and wires (eg, fiber optic, coaxial, etc.) and wireless (unconducted transmission) media capable of propagating energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared . Computer readable instructions, data structures, program modules or other data may be embodied, for example, as a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology. The term "modulated data signal" refers to a signal whose one or more characteristics are altered or set in a manner that encodes information in the signal. Modulation can be analog, digital or hybrid modulation techniques.

作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM, SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。By way of example and not limitation, computer-readable storage media may include volatile and non-volatile, readable storage media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Removable and non-removable media. For example, computer-readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and non-volatile memory, such as flash memory, various read-only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memory (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other media now known or later developed capable of storing data for computer systems Computer readable information/data used.

在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。Here, an embodiment according to the present application includes an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein, when the computer program instructions are executed by the processor, a trigger is The apparatus operates based on the aforementioned methods and/or technical solutions according to various embodiments of the present application.

对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。It will be apparent to those skilled in the art that the present application is not limited to the details of the above-described exemplary embodiments, but that the present application may be implemented in other specific forms without departing from the spirit or essential characteristics of the present application. Accordingly, the embodiments are to be regarded in all respects as illustrative and not restrictive, and the scope of the application is to be defined by the appended claims rather than the foregoing description, which is therefore intended to fall within the scope of the claims. All changes within the meaning and scope of the equivalents of , are included in this application. Any reference signs in the claims shall not be construed as limiting the involved claim. Furthermore, it is clear that the word "comprising" does not exclude other units or steps and the singular does not exclude the plural. Several units or means recited in the device claims can also be realized by one unit or means by means of software or hardware. The terms first, second, etc. are used to denote names and do not denote any particular order.

Claims (19)

1.一种在网络设备端用于发送目标消息的方法,其中,该方法包括:1. A method for sending a target message at a network device side, wherein the method comprises: 接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中所述目标消息的目标接收方为第二用户设备,所述实时验证条件用于判定所述目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,所述实时验证条件包括所述目标消息的发送用户的可信度低于一可信度阈值,所述可信度基于所述发送用户的历史行为计算得到;Receive the target message sent by the first user equipment, and detect whether the target message satisfies a preset real-time verification condition, wherein the target recipient of the target message is the second user equipment, and the real-time verification condition is used to determine the Whether the target message requires the sender to provide additional information for the recipient to verify the sender's identity, the real-time verification condition includes that the credibility of the sender of the target message is lower than a credibility threshold, and the credibility The degree is calculated based on the historical behavior of the sending user; 若所述目标消息的发送用户的可信度高于或等于所述可信度阈值,则所述目标消息不满足所述实时验证条件,直接向所述第二用户设备发送所述目标消息;If the reliability of the sending user of the target message is higher than or equal to the reliability threshold, the target message does not meet the real-time verification condition, and the target message is directly sent to the second user equipment; 若所述目标消息满足所述实时验证条件,向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息,所述向所述第一用户设备发送实时验证指令包括:向所述第二用户设备发送验证征询信息;接收所述第二用户设备基于所述验证征询信息所发送的实时验证请求,其中,所述第二用户设备对应的第二用户需要验证所述第一用户的身份;基于所述实时验证请求,向所述第一用户设备发送实时验证指令;若所述第二用户不需要验证所述第一用户的身份,则直接结束流程;If the target message satisfies the real-time verification condition, send a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to collect real-time data corresponding to the first user equipment The information to be verified of the first user, the sending a real-time verification instruction to the first user equipment includes: sending verification inquiry information to the second user equipment; receiving the information sent by the second user equipment based on the verification inquiry information real-time verification request, wherein the second user corresponding to the second user equipment needs to verify the identity of the first user; based on the real-time verification request, send a real-time verification instruction to the first user equipment; if the The second user does not need to verify the identity of the first user, then directly ends the process; 接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息;receiving the information to be verified sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified to the second user equipment; 接收所述第二用户设备基于所述待验证信息所发送的验证结果信息,若所述验证结果信息包括验证通过,向所述第二用户设备发送所述目标消息;Receive the verification result information sent by the second user equipment based on the information to be verified, and if the verification result information includes the verification passed, send the target message to the second user equipment; 其中,所述方法还包括:基于所述验证结果信息更新所述可信度,以避免所述第二用户误操作或者恶意操作而对所述第一用户的正常操作造成困扰。Wherein, the method further includes: updating the reliability based on the verification result information, so as to avoid the misoperation or malicious operation of the second user from disturbing the normal operation of the first user. 2.根据权利要求1所述的方法,其中,所述待验证信息包括以下至少任一项:2. The method according to claim 1, wherein the information to be verified comprises at least any one of the following: 所述第一用户的实时照片;a real-time photo of the first user; 所述第一用户的实时视频;the real-time video of the first user; 所述第一用户的实时语音。the real-time voice of the first user. 3.根据权利要求1所述的方法,其中,所述接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息,包括:3. The method according to claim 1, wherein the receiving the information to be verified sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified to the second user equipment, include: 接收所述第一用户设备基于所述实时验证指令所发送的验证响应信息;receiving verification response information sent by the first user equipment based on the real-time verification instruction; 若所述验证响应信息包括允许验证,接收所述第一用户设备所发送的待验证信息,并向所述第二用户设备发送所述待验证信息。If the verification response information includes verification permission, receive the information to be verified sent by the first user equipment, and send the information to be verified to the second user equipment. 4.根据权利要求3所述的方法,其中,所述方法还包括:4. The method of claim 3, wherein the method further comprises: 基于所述实时验证请求,接收所述第二用户设备所发送的第二实时消息;receiving, based on the real-time verification request, a second real-time message sent by the second user equipment; 向所述第一用户设备发送所述第二实时消息;sending the second real-time message to the first user equipment; 其中,所述第二实时消息包括以下至少任一项:Wherein, the second real-time message includes at least any one of the following: 所述第二用户设备所对应的第二用户的实时视频;real-time video of the second user corresponding to the second user equipment; 所述第二用户设备所对应的第二用户的实时语音;the real-time voice of the second user corresponding to the second user equipment; 所述第二用户设备所对应的第二用户实时输入的文本。The text input in real time by the second user corresponding to the second user equipment. 5.根据权利要求1所述的方法,其中,所述方法还包括:5. The method of claim 1, wherein the method further comprises: 若所述第一用户设备基于所述实时验证指令所发送的验证响应信息包括不允许验证,或者所述实时验证指令响应超时,则丢弃所述目标消息。If the verification response information sent by the first user equipment based on the real-time verification instruction includes that verification is not allowed, or the real-time verification instruction response times out, the target message is discarded. 6.根据权利要求1所述的方法,其中,所述实时验证条件还包括以下至少任一项:6. The method of claim 1, wherein the real-time verification condition further comprises at least any of the following: 所述目标消息包含银行账号信息;The target message includes bank account information; 所述目标消息包含预设关键词;The target message contains preset keywords; 所述目标消息的发送用户被包含于可疑用户集合。The sending user of the target message is included in the suspicious user set. 7.根据权利要求6所述的方法,其中,所述实时验证条件包括:所述目标消息的发送用户被包含于可疑用户集合;7. The method according to claim 6, wherein the real-time verification condition comprises: the sending user of the target message is included in a suspicious user set; 所述方法还包括:The method also includes: 接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可疑用户集合。Receive verification result information of the second user equipment based on the information to be verified, and update the suspicious user set based on the verification result information. 8.根据权利要求1所述的方法,其中,所述向所述第二用户设备发送所述目标消息,包括:8. The method of claim 1, wherein the sending the target message to the second user equipment comprises: 接收所述第二用户设备基于所述待验证信息所发送的验证结果信息;receiving verification result information sent by the second user equipment based on the information to be verified; 若所述验证结果信息包括验证通过,向所述第二用户设备发送所述目标消息。If the verification result information includes verification passed, the target message is sent to the second user equipment. 9.一种在第一用户设备端用于发送目标消息的方法,其中,该方法包括:9. A method for sending a target message at a first user equipment side, wherein the method comprises: 向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备,所述目标消息满足实时验证条件,所述实时验证条件包括所述目标消息的发送用户的可信度低于一可信度阈值,所述可信度基于所述发送用户的历史行为计算得到,所述实时验证条件用于判定所述目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份;若所述目标消息的发送用户的可信度高于或等于所述可信度阈值,则所述目标消息不满足所述实时验证条件,所述网络设备直接向所述第二用户设备发送所述目标消息;Sending a target message to a network device, wherein the target recipient of the target message is a second user equipment, and the target message satisfies a real-time verification condition, where the real-time verification condition includes that the reliability of the user who sends the target message is lower than a credibility threshold, the credibility is calculated based on the historical behavior of the sending user, and the real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender's identity; if the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the network device directly reports to the second user equipment sending the target message; 接收所述网络设备所发送的实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息,所述网络设备基于实时验证请求向所述第一用户设备发送所述实时验证指令,所述实时验证请求由所述第二用户设备基于所述网络设备发送的验证征询信息发送,所述第二用户设备对应的第二用户需要验证所述第一用户的身份;若所述第二用户不需要验证所述第一用户的身份,则所述网络设备直接结束流程;Receive a real-time verification instruction sent by the network device, wherein the real-time verification instruction is used for the first user equipment to collect in real time the information to be verified of the first user corresponding to the first user equipment, and the network device The real-time verification instruction is sent to the first user equipment based on the real-time verification request, the real-time verification request is sent by the second user equipment based on the verification inquiry information sent by the network device, and the second user equipment corresponds to The second user needs to verify the identity of the first user; if the second user does not need to verify the identity of the first user, the network device directly ends the process; 基于所述实时验证指令,实时采集对应的第一用户的待验证信息;Based on the real-time verification instruction, collect the information to be verified of the corresponding first user in real time; 向所述网络设备发送所述待验证信息,其中,所述网络设备接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可信度,以避免所述第二用户误操作或者恶意操作而对所述第一用户的正常操作造成困扰。sending the information to be verified to the network device, wherein the network device receives the verification result information of the second user equipment based on the information to be verified, and updates the reliability based on the verification result information, In order to avoid the misoperation or malicious operation of the second user from causing trouble to the normal operation of the first user. 10.根据权利要求9所述的方法,其中,所述基于所述实时验证指令,实时采集对应的第一用户的待验证信息,包括:10. The method according to claim 9, wherein, based on the real-time verification instruction, collecting the information to be verified of the corresponding first user in real time, comprising: 基于所述第一用户对所述实时验证指令的验证响应操作,确定相应的验证响应信息;Determine corresponding verification response information based on the verification response operation of the first user to the real-time verification instruction; 向所述网络设备发送所述验证响应信息;sending the verification response information to the network device; 所述向所述网络设备发送所述待验证信息,包括:The sending the information to be verified to the network device includes: 若所述验证响应信息包括允许验证,向所述网络设备发送所述待验证信息。If the verification response information includes the verification permission, send the to-be-verified information to the network device. 11.根据权利要求10所述的方法,其中,所述方法还包括:11. The method of claim 10, wherein the method further comprises: 接收所述网络设备所发送的第二实时消息,其中所述第二实时消息是由所述第二用户设备发送至所述网络设备的;receiving a second real-time message sent by the network device, wherein the second real-time message is sent by the second user equipment to the network device; 其中,所述第二实时消息包括以下至少任一项:Wherein, the second real-time message includes at least any one of the following: 所述第二用户设备所对应的第二用户的实时视频;real-time video of the second user corresponding to the second user equipment; 所述第二用户设备所对应的第二用户的实时语音;the real-time voice of the second user corresponding to the second user equipment; 所述第二用户设备所对应的第二用户实时输入的文本。The text input in real time by the second user corresponding to the second user equipment. 12.一种在第二用户设备端用于接收目标消息的方法,其中,该方法包括:12. A method for receiving a target message at a second user equipment side, wherein the method comprises: 接收网络设备所发送的待验证信息;Receive the information to be verified sent by the network device; 接收所述网络设备所发送的目标消息;receiving the target message sent by the network device; 其中所述待验证信息是由第一用户设备基于实时验证指令发送的,所述实时验证指令由所述网络设备在接收到所述第一用户设备所发送的目标消息后基于实时验证请求发送至所述第一用户设备,所述目标消息的目标接收方为所述第二用户设备,所述目标消息满足实时验证条件,所述实时验证条件包括所述目标消息的发送用户的可信度低于一可信度阈值,所述可信度基于所述发送用户的历史行为计算得到,所述实时验证条件用于判定所述目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份,若所述目标消息的发送用户的可信度高于或等于所述可信度阈值,则所述目标消息不满足所述实时验证条件,所述网络设备直接向所述第二用户设备发送所述目标消息;所述实时验证请求由所述第二用户设备基于所述网络设备发送的验证征询信息发送,所述第二用户设备对应的第二用户需要验证所述第一用户的身份;若所述第二用户不需要验证所述第一用户的身份,则所述网络设备直接结束流程;The information to be verified is sent by the first user equipment based on a real-time verification instruction, and the real-time verification instruction is sent by the network device based on a real-time verification request to the network device after receiving the target message sent by the first user equipment. For the first user equipment, the target recipient of the target message is the second user equipment, and the target message satisfies a real-time verification condition, where the real-time verification condition includes a low reliability of the sending user of the target message At a credibility threshold, the credibility is calculated based on the historical behavior of the sending user, and the real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender If the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the network device directly reports to the second user device sends the target message; the real-time verification request is sent by the second user equipment based on the verification inquiry information sent by the network device, and the second user corresponding to the second user equipment needs to verify the first user's identity; if the second user does not need to verify the identity of the first user, the network device directly ends the process; 其中,所述网络设备接收所述第二用户设备基于所述待验证信息的验证结果信息,并基于所述验证结果信息更新所述可信度,以避免所述第二用户误操作或者恶意操作而对所述第一用户的正常操作造成困扰。Wherein, the network device receives the verification result information of the second user equipment based on the information to be verified, and updates the reliability based on the verification result information, so as to avoid misoperation or malicious operation by the second user This causes trouble to the normal operation of the first user. 13.根据权利要求12所述的方法,其中,所述方法还包括:13. The method of claim 12, wherein the method further comprises: 接收网络设备所发送的验证征询信息;Receive the verification inquiry information sent by the network device; 根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求;sending a real-time verification request to the network device according to the verification request operation of the verification inquiry information by the second user corresponding to the second user equipment; 所述接收网络设备所发送的待验证信息,包括:The receiving information to be verified sent by the network device includes: 接收所述网络设备基于所述实时验证请求所发送的待验证信息。Receive the information to be verified sent by the network device based on the real-time verification request. 14.根据权利要求13所述的方法,其中,所述根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求,包括:14 . The method according to claim 13 , wherein the sending a real-time verification request to the network device according to a verification request operation on the verification inquiry information by a second user corresponding to the second user equipment comprises: 14 . : 根据所述第二用户设备所对应的第二用户对所述验证征询信息的验证请求操作,向所述网络设备发送实时验证请求以及第二实时消息;sending a real-time verification request and a second real-time message to the network device according to the verification request operation of the verification inquiry information by the second user corresponding to the second user equipment; 其中,所述第二实时消息包括以下至少任一项:Wherein, the second real-time message includes at least any one of the following: 所述第二用户设备所对应的第二用户的实时视频;real-time video of the second user corresponding to the second user equipment; 所述第二用户设备所对应的第二用户的实时语音;the real-time voice of the second user corresponding to the second user equipment; 所述第二用户设备所对应的第二用户实时输入的文本。The text input in real time by the second user corresponding to the second user equipment. 15.根据权利要求12所述的方法,其中,所述方法还包括:15. The method of claim 12, wherein the method further comprises: 基于所述待验证信息,向所述网络设备发送对应的验证结果信息。Based on the information to be verified, corresponding verification result information is sent to the network device. 16.根据权利要求15所述的方法,其中,所述接收所述网络设备所发送的目标消息,包括:16. The method according to claim 15, wherein the receiving the target message sent by the network device comprises: 若所述验证结果信息包括验证通过,接收所述网络设备所发送的目标消息。If the verification result information includes verification passed, the target message sent by the network device is received. 17.一种用于发送目标消息的方法,其中,该方法包括:17. A method for sending a targeted message, wherein the method comprises: 第一用户设备向网络设备发送目标消息,其中所述目标消息的目标接收方为第二用户设备;The first user equipment sends a target message to the network device, wherein the target recipient of the target message is the second user equipment; 所述网络设备接收第一用户设备所发送的目标消息,并检测所述目标消息是否满足预设的实时验证条件,其中,所述实时验证条件包括所述目标消息的发送用户的可信度低于一可信度阈值,所述可信度基于所述发送用户的历史行为计算得到,所述实时验证条件用于判定所述目标消息是否需要发送者提供额外的信息以供接收者核实发送者的身份;The network device receives the target message sent by the first user equipment, and detects whether the target message satisfies a preset real-time verification condition, wherein the real-time verification condition includes a low reliability of the user who sends the target message At a credibility threshold, the credibility is calculated based on the historical behavior of the sending user, and the real-time verification condition is used to determine whether the target message requires the sender to provide additional information for the receiver to verify the sender identity of; 若所述目标消息的发送用户的可信度高于或等于所述可信度阈值,则所述目标消息不满足所述实时验证条件,所述网络设备直接向所述第二用户设备发送所述目标消息;If the credibility of the sending user of the target message is higher than or equal to the credibility threshold, the target message does not meet the real-time verification condition, and the network device directly sends the second user equipment the target message; 若所述目标消息满足所述实时验证条件,所述网络设备向所述第一用户设备发送实时验证指令,其中所述实时验证指令用于供所述第一用户设备实时采集所述第一用户设备所对应的第一用户的待验证信息,所述向所述第一用户设备发送实时验证指令包括:向所述第二用户设备发送验证征询信息;接收所述第二用户设备基于所述验证征询信息所发送的实时验证请求,其中,所述第二用户设备对应的第二用户需要验证所述第一用户的身份;基于所述实时验证请求,向所述第一用户设备发送实时验证指令;若所述第二用户不需要验证所述第一用户的身份,则直接结束流程;If the target message satisfies the real-time verification condition, the network device sends a real-time verification instruction to the first user equipment, where the real-time verification instruction is used for the first user equipment to collect the first user in real time information to be verified of the first user corresponding to the device, the sending a real-time verification instruction to the first user equipment includes: sending verification inquiry information to the second user equipment; receiving the verification based on the verification by the second user equipment The real-time verification request sent by the inquiry information, wherein the second user corresponding to the second user equipment needs to verify the identity of the first user; based on the real-time verification request, a real-time verification instruction is sent to the first user equipment ; If the second user does not need to verify the identity of the first user, then directly end the process; 所述第一用户设备接收所述网络设备所发送的实时验证指令,基于所述实时验证指令,实时采集对应的第一用户的待验证信息,并向所述网络设备发送所述待验证信息;The first user equipment receives the real-time verification instruction sent by the network device, collects the information to be verified of the corresponding first user in real time based on the real-time verification instruction, and sends the to-be-verified information to the network device; 所述网络设备接收所述第一用户设备基于所述实时验证指令所发送的待验证信息,并向所述第二用户设备发送所述待验证信息;receiving, by the network device, the information to be verified sent by the first user equipment based on the real-time verification instruction, and sending the information to be verified to the second user equipment; 所述网络设备接收所述第二用户设备基于所述待验证信息的验证结果信息,若所述验证结果包括验证通过,向所述第二用户设备发送所述目标消息;The network device receives the verification result information of the second user equipment based on the information to be verified, and if the verification result includes the verification passed, sends the target message to the second user equipment; 所述第二用户设备接收所述待验证信息以及所述目标消息;receiving, by the second user equipment, the information to be verified and the target message; 其中,所述网络设备基于所述验证结果信息更新所述可信度,以避免所述第二用户误操作或者恶意操作而对所述第一用户的正常操作造成困扰。Wherein, the network device updates the reliability based on the verification result information, so as to avoid the misoperation or malicious operation of the second user from causing trouble to the normal operation of the first user. 18.一种用于发送目标消息的设备,其中,该设备包括:18. An apparatus for sending a targeted message, wherein the apparatus comprises: 处理器;以及processor; and 被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求1至16中任一项所述方法的操作。a memory arranged to store computer-executable instructions which, when executed, cause the processor to perform operations according to the method of any of claims 1 to 16. 19.一种存储指令的计算机可读介质,所述指令在被执行时使得系统执行根据权利要求1至16中任一项所述方法的操作。19. A computer readable medium storing instructions that, when executed, cause a system to perform operations according to the method of any one of claims 1 to 16.
CN201910233410.3A 2019-03-26 2019-03-26 Method and equipment for sending target message Active CN109981644B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910233410.3A CN109981644B (en) 2019-03-26 2019-03-26 Method and equipment for sending target message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910233410.3A CN109981644B (en) 2019-03-26 2019-03-26 Method and equipment for sending target message

Publications (2)

Publication Number Publication Date
CN109981644A CN109981644A (en) 2019-07-05
CN109981644B true CN109981644B (en) 2022-10-11

Family

ID=67080622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910233410.3A Active CN109981644B (en) 2019-03-26 2019-03-26 Method and equipment for sending target message

Country Status (1)

Country Link
CN (1) CN109981644B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104883293A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Message interaction method and related device and communication system
CN104980899A (en) * 2015-05-28 2015-10-14 广东欧珀移动通信有限公司 Communication method and system for mobile terminal, mobile terminal and server
CN106161183A (en) * 2015-03-30 2016-11-23 重庆邮电大学 Method for message interaction and social interaction server device and communication system
CN107294724A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of up verification method of short message and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9886693B2 (en) * 2009-03-30 2018-02-06 Yuh-Shen Song Privacy protected anti identity theft and payment network
CN102291369A (en) * 2010-06-21 2011-12-21 上海薄荷信息科技有限公司 Control method and corresponding control device for verifying junk information settings
US9483623B2 (en) * 2012-10-10 2016-11-01 Adobe Systems Incorporated Displaying targeted website content based on social user profile data
CN104615335B (en) * 2015-02-13 2019-02-22 腾讯科技(北京)有限公司 A kind of information processing method, client

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161183A (en) * 2015-03-30 2016-11-23 重庆邮电大学 Method for message interaction and social interaction server device and communication system
CN104883293A (en) * 2015-04-30 2015-09-02 广东欧珀移动通信有限公司 Message interaction method and related device and communication system
CN104980899A (en) * 2015-05-28 2015-10-14 广东欧珀移动通信有限公司 Communication method and system for mobile terminal, mobile terminal and server
CN107294724A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of up verification method of short message and device

Also Published As

Publication number Publication date
CN109981644A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
US10255444B2 (en) Method and system for utilizing secure profiles in event detection
US9319425B2 (en) Systems and methods for self-tuning network intrusion detection and prevention
US9781143B1 (en) Systems and methods for detecting near field communication risks
US20210392149A1 (en) Systems and methods for efficient combining of characteristc detection rules
US11176276B1 (en) Systems and methods for managing endpoint security states using passive data integrity attestations
WO2021019429A1 (en) Techniques for incentivized intrusion detection system
US12063227B2 (en) Systems and methods for threat response
CN112073578B (en) A method and device for using or restricting application functions in social applications
US11671422B1 (en) Systems and methods for securing authentication procedures
WO2019037581A1 (en) Method and device for carrying out wireless connection pre-authorization for user equipment
CN114697450A (en) A method, device and medium for determining an outbound call line
CN116611058A (en) A kind of blackmail virus detection method and related system
CN111932230A (en) Method and equipment for modifying red envelope
CN111182050B (en) Method and equipment for realizing communication between application and server
CN109981644B (en) Method and equipment for sending target message
KR102642586B1 (en) Method and system for verifing messages
CN110958315A (en) A method and device for presenting a message notification
CN111934981A (en) Method and equipment for withdrawing red packet
CN108848076B (en) Method and equipment for detecting DNS hijacking through user equipment
CN108282786B (en) Method and equipment for detecting DNS spoofing attack in wireless local area network
US10609030B1 (en) Systems and methods for identifying untrusted devices in peer-to-peer communication
US10019582B1 (en) Detecting application leaks
CN113099025B (en) Method and device for adding friends in social application
CN112866265B (en) CSRF attack protection method and device
CN112311556B (en) Device authentication method, device control method, node, device and blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Room 80536, Shanghai

Patentee after: Shanghai Zongzhang Technology Group Co.,Ltd.

Country or region after: China

Address before: Room 80536, Shanghai

Patentee before: SHANGHAI ZHANGMEN SCIENCE AND TECHNOLOGY Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address