[go: up one dir, main page]

CN116503071A - Risk prevention and control method and device thereof - Google Patents

Risk prevention and control method and device thereof Download PDF

Info

Publication number
CN116503071A
CN116503071A CN202210050721.8A CN202210050721A CN116503071A CN 116503071 A CN116503071 A CN 116503071A CN 202210050721 A CN202210050721 A CN 202210050721A CN 116503071 A CN116503071 A CN 116503071A
Authority
CN
China
Prior art keywords
risk
interface
control
incoming call
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210050721.8A
Other languages
Chinese (zh)
Inventor
张兴旺
王庆坛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pateo Network Technology Service Co Ltd
Original Assignee
Shanghai Pateo Network Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pateo Network Technology Service Co Ltd filed Critical Shanghai Pateo Network Technology Service Co Ltd
Priority to CN202210050721.8A priority Critical patent/CN116503071A/en
Publication of CN116503071A publication Critical patent/CN116503071A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Managing shopping lists, e.g. compiling or processing purchase lists
    • G06Q30/0635Managing shopping lists, e.g. compiling or processing purchase lists replenishment orders; recurring orders
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0641Electronic shopping [e-shopping] utilising user interfaces specially adapted for shopping

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a risk prevention and control method and device. According to the risk prevention and control method and device, the incoming call information is displayed through the main interface module, the identification module identifies the incoming call information in the main interface module, the conclusion of the risk incoming call information is generated, the identification conclusion is transmitted to the setting module, and the risk control interface in the setting module responds to the identification conclusion to lock and control the risk operation interface according to the established logic, so that loss of personal and property is avoided. The identification conclusion comprises a coping mode and a risk item, wherein the coping mode comprises a risk early warning interface. The risk prevention and control method and the risk prevention and control device are responsive to at least one end of a first terminal and at least one end of a second terminal, and the first terminal can carry out delay control on the second terminal.

Description

Risk prevention and control method and device thereof
Technical Field
The invention relates to the technical field of Internet information, in particular to a risk prevention and control method and a risk prevention and control device.
Background
With the vigorous development of the information age, the manner of acquiring information is changed from a paper manner to a network manner. Through the network, the information can be acquired more quickly and conveniently, but a plurality of risks exist in the network information. Such as network risk links, network vulnerabilities, fraud phones, fraud messages, etc. Neither telephone contact nor short message contact is possible for both parties to see each other, and the environment of such non-face-to-face communication presents a fraud risk that provides a condition for fraud to be implemented. The cheated masses often easily enter into the fraud set by the fraudsters, and are convinced that the fraudsters are numbed to follow the instructions of the fraudsters to perform the fraudsters, and the fraudsters cannot be found by telephone or short messages until the fraudsters are conscious.
In the prior art, for fraud calls, the user can only be alerted before answering. If the call is in the middle of receiving, the current situation cannot be known by an external supervision method. There is no effective way to alert users to the receipt of fraud short messages or phishing links, which often fills with tremendous temptation, and some have a way to direct to payment or payment, forcing users to be tricked against current mental state. Some prior art discloses calculating the total call frequency of the called number and the calling number in the real-time call ticket according to the call ticket of the history call between the called number and the calling number, determining the dangerous grade information corresponding to the call behavior corresponding to the real-time call ticket, and further giving an alarm. However, on one hand, the cheater has entered the loop, and the warning effect is very little; on the other hand, there are many users who do not install or update software or applications on the mobile end, resulting in a lack of ability to cope with new risks.
Other prior art aims at the operating system of the user terminal, and judges whether a malicious plug-in or a risk vulnerability exists in the operating system by detecting the system environment currently in operation. However, if the risk is generated by the active operation of the user, it is not possible for the system to accurately distinguish whether the risk is the special requirement of the user, and thus the warning of the user cannot be effectively performed, and therefore, the risks cannot be effectively dealt with by the prior art.
Disclosure of Invention
The invention provides a risk prevention and control method and a risk prevention and control device, which can perform risk early warning on incoming call information, and monitor the incoming call information from a source so as to ensure the reliability of the incoming call information. And the method can perform real-time risk early warning and risk prevention and control in the process of acquiring the incoming call information so as to remind a user not to enter a risk environment and prevent the occurrence of cheating behaviors.
Another object of the present invention is to provide a risk prevention and control method and apparatus thereof, which are suitable for an intelligent cabin scenario, and can provide timely feedback for risk information received during driving, whether bluetooth phone or car phone, and provide subsequent monitoring and control.
Another object of the present invention is to provide a risk prevention and control method and a device thereof, based on interconnection between a vehicle terminal and a mobile terminal, the vehicle terminal identifies and reminds incoming call information content in real time during a call, and monitors and controls the mobile terminal in real time.
Another object of the present invention is to provide a risk prevention and control method and a device thereof, which are based on interconnection between a vehicle terminal and a mobile terminal, and give timely feedback or control to the mobile terminal connected to the vehicle terminal through recognition and prompt of the vehicle terminal.
Another object of the present invention is to provide a risk prevention and control method and a device thereof, which are based on interconnection between a vehicle terminal and a mobile terminal, and by identifying and reminding the vehicle terminal, the risk prevention and control method and device can obtain timely feedback and provide subsequent monitoring and control without installing additional prevention and control software on the mobile terminal. The invention also aims to provide a risk prevention and control method and a risk prevention and control device thereof, wherein a user can set risk early warning and prompting and risk control operations independently, and meanwhile, the method can help the user to carry out reverse verification and automatic alarming on incoming call information, and the personal and property safety of the user is ensured in all directions.
Other objects and features of the present invention will become more fully apparent from the following detailed description, and may be learned by the practice of the invention as set forth hereinafter particularly as set forth in the appended claims.
According to one aspect of the present invention, a risk prevention and control method of the present invention, which can achieve the foregoing and other objects and advantages, is adapted to control an operation interface, and includes the steps of:
identifying incoming call information, wherein risks exist in response to the incoming call information;
generating an identification conclusion, wherein the identification conclusion comprises a coping mode and a risk item; and
and the risk control interface responds to the identification conclusion and displays the control authority on the risk operation interface.
According to the embodiment of the invention, the risk prevention and control method is realized by a built-in interconnection framework in response to terminal interconnection, particularly between the first terminal and the second terminal. Wherein the terminal interconnection comprises at least one of a wired connection and a wireless connection. The first terminal is a vehicle terminal, and the second terminal is a mobile terminal, such as a mobile phone, a notebook computer and the like.
According to one embodiment of the present invention, the relevant control authority further includes, in addition to the control authority of the first terminal on the risk operation interface thereof, the relevant control authority of the first terminal on the risk operation interface of the second terminal.
According to one embodiment of the present invention, the first terminal's related control over the second terminal further includes delay control.
According to one embodiment of the present invention, the trigger mechanism of delay control includes: at least one of a hang-up, a movement and/or a stop of the second terminal, the first terminal.
According to one embodiment of the invention, the trigger mechanism is based on monitoring of the first terminal.
According to one embodiment of the present invention, the incoming call recognition information is at least one of text recognition and voice recognition. And obtaining keywords through the incoming call identification information, and further generating an identification conclusion.
According to an embodiment of the present invention, before the identifying the incoming call information, the method further includes: and monitoring and storing the incoming call number, identifying the incoming call information content, and obtaining keywords. The incoming call number includes: at least one of a numeric number, an already identified number, and an address book remark number. The incoming call information content further includes: at least one of telephone number, short message content.
According to one embodiment of the present invention, the coping means includes: at least one of early warning of risk incoming call information, verification dialing, setting interception and uploading of national anti-fraud centers. The authentication dial includes: prompting to dial at least one of an emergency contact, police, verification channel. The prompt dials the verification channel based on the keyword. The setting interception includes: at least one of applying for adding a blacklist and applying for direct hanging-up. The uploading national anti-fraud center is a countermeasure based on the identification conclusion generated after the incoming call is put through.
According to one embodiment of the present invention, the early warning of the risk incoming call information includes: the risk early warning interface further includes: at least one of voice early warning and visual early warning. And the content of the risk early warning interface prompt is obtained based on the keyword content. The voice pre-warning, the prompting further comprises: a false personal information offer reference reminder is provided. The providing false personal information includes: at least one of identification card number, mobile phone number, bank card number, various payment passwords and shopping order number.
According to an embodiment of the present invention, the visual early warning and reminding method further includes: still picture form, moving picture form, text box text form. A reminder source, further comprising: at least one of the network, the intelligent cockpit local storage.
According to an embodiment of the present invention, the identifying conclusion, the occurrence time includes: at least one stage of before, during and after the call is put through.
According to one embodiment of the invention, the risk item comprises: navigation to at least one of identify a risk location, transfer to identified incoming call information using a payment/remittance application, provide personal information, provide shopping information, impersonate surrounding people to seek monetary assistance. According to one embodiment of the invention, the key further provides a location for the risk control interface to control the risk operation interface.
According to one embodiment of the invention, the risk control interface is locked to the control of the risk operation interface.
According to one embodiment of the invention, the locking the risk operation interface is based on an overlay of a risk control interface provided by the requested control authority.
According to an embodiment of the present invention, the risk control interface may preset its control time for the risk operation interface, including setting of delay control time.
According to one embodiment of the invention, the key comprises: at least one of risk location, personal sensitive information, phonebook remark personnel emergency. Wherein the risk site comprises at least: a company name, a banking name, a company name, etc., the personally sensitive information including at least: identification card number, mobile phone number, bank card number, various payment passwords, shopping order number, money transfer, unpaid shopping order, etc., the telephone book remark emergency at least comprises: disease, car accident, kidnapping, crime, etc.
According to one embodiment of the invention, the interface dimensions of the risk control interface are adapted to the risk operation interface to ensure proper operation of the other interfaces.
According to one embodiment of the invention, the colors of the risk control interfaces are set differently for the risk level of the risk operation interface.
According to one embodiment of the invention, the risk control interface is provided with a closing button, which can manually close the risk control interface. And closing the risk control interface, namely closing the locking of the current risk operation interface.
According to one embodiment of the invention, the prompt dials to emergency contacts based on the risk control interface being closed.
According to one embodiment of the invention, the risk control interface may control multiple risk operation interfaces simultaneously.
According to one embodiment of the present invention, the plurality of risk operation interfaces includes: at least one of different risk operation interfaces existing at the vehicle-machine end, different risk operation interfaces existing at the mobile end and different risk operation interfaces existing at the vehicle-machine end and the mobile end.
According to another aspect of the present invention, the present invention further provides a risk prevention and control device, including:
the main interface module comprises an operation interface, a risk early warning interface and a risk control interface;
the identification module is used for identifying incoming call information; and
the setting module is used for providing the risk early warning interface and the risk control interface, wherein the identification module transmits the identification conclusion to the setting module, and the setting module is supplied to display the risk early warning interface and the risk control interface on the main interface module according to established logic.
According to one embodiment of the present invention, the operation interface includes: at least one of an incoming call interface, a desktop interface, a function interface and a content interface. When the operation interface relates to the risk item, the operation interface is defined as a risk operation interface.
According to one embodiment of the invention, the setting module is provided with an opening button and a closing button of the risk prevention and control authority. And in a default state, the risk prevention and control authority is in an open state.
According to one embodiment of the invention, the risk prevention and control authority can be opened to automatically record and screen incoming calls.
According to one embodiment of the present invention, the manner in which the risk early warning interface and the risk control interface exist in the main interface includes: the risk early warning interface and the risk control interface are arranged on the main interface in parallel, the risk early warning interface is arranged on the risk control interface, and the risk early warning interface is arranged under the risk control interface.
According to one embodiment of the invention, the setting module can set the voice early warning reminding and the visual early warning reminding in the recognition conclusion. The user can set the voice early warning reminding volume and the visual early warning reminding text size according to the self condition requirement.
According to one embodiment of the invention, the setting module may perform setting of the lock time in the risk control interface, the color of the risk control interface, and the delay control. The lock time includes at least one of a lock on time and a lock off count time.
According to one embodiment of the invention, the setting module may set information of the risk emergency contact, where the risk emergency contact information includes an emergency contact name and an emergency contact phone number. When the risk control interface is forced to be closed, the risk prevention and control method and the risk prevention and control device automatically dial contacts and/or send short messages.
These and other objects, features and advantages of the present invention will become more fully apparent from the following detailed description, the accompanying drawings and the appended claims.
Drawings
Fig. 1 is a diagram of a risk prevention and control apparatus according to a preferred embodiment of the present invention.
Fig. 2 is a flow chart of risk prevention and control for incoming call information being a digital number according to a preferred embodiment of the present invention.
Fig. 3 is a flow chart of a risk prevention and control interface response in accordance with a preferred embodiment of the present invention.
Fig. 4 is a flow chart of early warning and control of risk information according to a preferred embodiment of the present invention.
Fig. 5 is a user interaction interface for risk prevention and control when a terminal call is not completed according to a preferred embodiment of the present invention.
Fig. 6A-6C are risk prevention and control user interaction interfaces for a terminal to be connected and to be in a risk conclusion, according to a preferred embodiment of the present invention.
Fig. 7 is a risk prevention and control user interface for risk text information in accordance with a preferred embodiment of the present invention.
Detailed Description
The following description is presented to enable one of ordinary skill in the art to make and use the invention. The preferred embodiments in the following description are by way of example only and other obvious variations will occur to those skilled in the art. The basic principles of the invention defined in the following description may be applied to other embodiments, variations, modifications, equivalents, and other technical solutions without departing from the spirit and scope of the invention.
Those of ordinary skill in the art will appreciate that the various illustrative logical blocks (illustrative logical block, abbreviated ILBs) and steps described in connection with the embodiments disclosed herein can be implemented in electronic hardware, or in combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
Fig. 1 shows a block diagram of the risk prevention and control apparatus 100 of the present embodiment. As shown in fig. 1, the risk prevention and control device 100 includes four modules, namely a main interface module 110, an identification module 120, and a setting module 130. The main interface module 110 includes a risk operation interface 111, a risk early warning interface 112, and a risk control interface 113. The identification module 120 includes a receiving device 121 for receiving incoming call information, a recording device 122 for recording the received incoming call information, a processing device 123 for processing the received incoming call information and the recorded recording information to obtain the identification conclusion, and a storage device 124 for storing the received incoming call information, the recorded recording information, and the identification conclusion. The setting module 130 performs risk prevention and control on the main interface module 110 based on established logic in response to the identification conclusion processed by the identification module 120.
The incoming call information includes at least one of a digital incoming call number, a memo incoming call number, a number that has been identified as a risk incoming call, a short message number, and a short message content. The recording information is based on the recording information after the incoming call number is the digital number.
In some embodiments, the identification module 120 processes the incoming call information through one or more processing devices 123 to obtain the identification conclusion that the incoming call information is at risk, and sends the identification conclusion to the setting module 130 through the processing device 123 again. The setting module 130 responds to the identification conclusion, and performs corresponding risk prevention and control on the main interface module 110 according to the identification conclusion of the identification module 120 according to a given risk prevention and control setting.
In other embodiments, the risk prevention setting of the setting module 130 may be configured in a personalized manner, where a user may set, according to the degree of consciousness, the early warning time of the risk early warning interface 112, the risk early warning prompt sound, for example, the personalized sound of the device itself, the recorded sound of the user, the risk early warning prompt volume, and the dwell time, the delay control time, and the display color of the risk control interface 113, and set the emergency contact number when the risk control interface 113 is forcibly turned off within the set predetermined time.
It should be noted that, the risk control interface 113 further includes a display size in addition to the residence time, the delay control time, and the display color, where the display size of the risk control interface 113 is the corresponding size according to the risk information content in the identification conclusion. If an application program exists in the identification conclusion, the risk control interface 113 sets the risk control interface 113 according to the size of the application program icon with risk, preferably the display size of the risk control interface 113 is the same as the size of the application program icon, so as to provide coverage of the application program icon, and further lock control is performed on the application program; if the text information exists in the recognition conclusion, setting the risk control interface 113 according to the keywords of the text information with risk, preferably, covering the interface related to the keywords by the display size of the risk control interface 113 so as to provide coverage of the text information interface and further lock control of the text information interface; if there is a payment operation in the recognition conclusion, for the payment operation with risk, the risk control interface 113 is set according to the size of the payment operation input box with risk, preferably the display size of the risk control interface 113 is the same as that of the payment operation input box, so as to provide coverage of the payment operation input box, and further perform locking control on the payment operation. In this embodiment, the payment operation refers to a funds delivery act on payment, money transfer, etc., including, but not limited to, entering a monetary amount, entering a password, biometric verification, such as entering a fingerprint, entering a face, entering an iris, etc.
In other embodiments, the risk early warning interface 112 provides early warning cues. The identification module 120 identifies the risk incoming call information, generates an identification conclusion, and displays the risk early warning interface 112 based on the identification conclusion. The risk early warning interface 112 provides early warning prompt information according to the identification conclusion. For example, the incoming call information of "transfer" and/or "remittance" is heard, the incoming call information is identified as risk incoming call information, an identification conclusion is generated, a risk early warning interface 112 is displayed based on the identification conclusion, and the risk control interface 113 performs locking control on the risk operation interface 111, wherein the risk early warning interface 112 sends an early warning prompt based on the identification conclusion, if the incoming call information is at risk, and the transfer and/or remittance application program is used carefully. The risk early warning interface 112 and the risk control interface 113 are set to be closed, and in some embodiments, the risk early warning interface 112 and the early warning prompt are displayed after the risk control interface 113 is closed. In some embodiments, based on the identification conclusion, the risk early warning interface 112 and the risk control interface 113 are displayed, wherein the risk early warning interface 112 provides the early warning prompt.
Further, to better protect and respect the privacy of the user, the corresponding pre-warning and control of the risk operation interface 111 in the main interface module 110 is based on the opening of risk prevention and control rights, wherein the user may perform the opening and/or closing of risk prevention and control related rights in the setting module 130. The relevant rights of the risk prevention and control comprise: phonebook content rights, call recording rights, risk early warning interface 112 display rights, risk control interface 113 display rights, barrier-free rights, etc. And the risk control interface 113 determines the position of the risk operation interface 111 according to the identified keywords and/or icons based on the identification conclusion in the identification module 120, and the risk control interface 113 responds to the determined position and displays the determined position on the risk operation interface 111 so as to perform locking control. The risk control interface 113 covers the risk operation interface 111 to prevent the risk operation interface 111 from acquiring the effect of the operation instruction, so as to achieve locking control.
The risk prevention and control device 100 according to the present embodiment can start risk prevention and control when an incoming call is not connected. In some embodiments, the incoming call information is identified fraud call, nuisance call, fraud short message, nuisance short message, etc., the identification module 120 identifies the incoming call information as risk incoming call information through the identified keyword, and stores the risk incoming call information, the identification module 120 transmits the identification conclusion to the setting module 130, and the setting module 130 directly hangs up and blackens the incoming call information according to the established logic. In addition, the risk early warning interface 112 is controlled by the setting module 130 to send a risk reminder to remind the caller of the identified risk caller, so as to avoid the influence of the risk information on the user from the source.
It should be understood by those skilled in the art that some technologies in the risk prevention and control device overlap with the existing technologies, but the purpose of the present invention is not limited to performing risk prevention and control on the identified incoming call information, and the above-mentioned embodiments are used to illustrate that the risk prevention and control method and device according to the present invention can not only prevent and control the situation that the following risk information exists, but also prevent and control the situation that the above-mentioned risk information exists, so that the risk prevention and control method and device according to the present invention are further illustrated as an invention main body that can be implemented comprehensively, and can achieve a higher level of prevention and control effect.
The flow of a risk prevention and control method in this embodiment is shown in fig. 2. The risk prevention and control method comprises the following steps: on the condition that the incoming call 200 is received, identifying incoming call information 201, storing incoming call number 202 for the incoming call information, identifying whether incoming call information content is risk information 203 for the incoming call information, generating an identification conclusion 204 for whether the identified incoming call information content is risk information 203, and performing risk prevention and control 205 in response to the identification conclusion to achieve identification and risk prevention and control of the incoming call information.
An example is given of the case where the incoming call information is a digital number. In fig. 2, in the case of the received incoming call 200, the identification incoming call information 201 is a digital number, and the operation of storing the incoming call number 202 is performed. At this time, there is a possibility that the incoming call information is not recognized to be at risk. After the incoming call is completed, the operation of identifying whether the incoming call information content is the risk information 203 is executed, and if the risk information is not identified in the process of identifying whether the incoming call information content is the risk information 203, the incoming call answering operation is completed. If risk information is identified in the process of identifying whether the incoming call information content is the risk information 203, the operation of generating the identification conclusion 204 is executed, and the operation of performing risk prevention and control 205 is continuously executed. Wherein the recognition conclusion includes coping style and risk item.
The coping mode at least comprises the following steps: early warning of risk incoming call information, verification dialing, setting interception, uploading to a national anti-fraud center, and the like. The risk items include at least navigation to identify risk locations, transfer of money to identified incoming call information using a payment/remittance Application (App), providing personal information, providing shopping information, impersonating surrounding people to seek monetary assistance, and the like. The risk prevention and control 205 responds to the identification conclusion to perform further locking control on the risk operation interface 111. For the risk item in the identification conclusion, preferably, the risk prevention and control 205 immediately performs a corresponding locking control operation on the related application program, the related content interface, the related function interface, the related incoming call interface, the related desktop, and the like.
An example will be given for the case where the incoming call information is voice content. The process of identifying whether the incoming call information content is the risk information 203 identifies that the incoming call content is voice content, and further identifies that the risk item possibly related to the voice content is risk information through keywords. For example, information such as providing personal information, making money transfers, logging into a designated website, and the like is required. After the incoming call is turned on and the real-time call is made, based on the voice content, the generated recognition conclusion 204 sends a risk early warning prompt in the coping mode. In this embodiment, the risk early warning alert includes a voice alert or a visual alert. Of course, in other embodiments, the voice alert and the visual alert may be sent simultaneously in order to alert the user of a greater variety of categories.
The voice alert further includes a jammer alert to the party. If the caller requires to provide personal information, the risk information 203 identifies whether the voice content is at risk, and the risk early warning reminder automatically sends false personal information according to the identified keywords, so as to disturb the caller. Preferably, the false personal information is set in advance as the scramble alert. More preferably, false information that does not correspond to the usual personal information logic, e.g. the usual personal information has an identification card number of 18 digits and the tamper alert is set to 17 digits. On one hand, the leakage of the true information of the user is avoided, and on the other hand, the leakage of the information of other possible individuals is avoided.
Taking the case that the incoming call information is text content as an example, the process of identifying whether the incoming call information content is the risk information 203 identifies that the incoming call content is text content, for example, a risk website, a network vulnerability, a fraud sms, etc., and further identifies that the risk item exists in the text content through keywords of the text content. The generation and identification conclusion 204 sends out the risk early warning prompt, and the risk prevention and control 205 performs locking control on the interface of the text content with risk so as to reduce the occurrence of risk behaviors caused by hunting psychology and misoperation, thereby causing loss of property and personal information.
The implementation of the risk prevention method requires a different interface to respond. Fig. 3 shows a response flow chart of the present embodiment to different interfaces of the risk incoming call information 300. The responding step of the different interfaces comprises the following steps: the operation interface 301 displays the risk incoming call information 300, the identification module 120 identifies the risk incoming call information 300 and generates the identification conclusion, based on the identification conclusion and the condition of opening the related authority described in embodiment 1, the identification module 120 reads the information of the operation interface 301, so as to obtain and determine the position of the risk operation interface 111, based on the position of the risk operation interface 111, the risk early warning interface 112 sends a risk early warning, and the risk control interface 113 performs locking control on the risk operation interface 111 related to the risk item in response to the identification conclusion. The operation interface 301 includes the risk operation interface 111 and other operation interfaces. The reading of the information of the operation interface 301 by the identification module 120 at least includes: keywords, icons, etc. And identifying the risk operation interface 111 through the read keywords and/or icon information, thereby capturing and determining the position of the risk operation interface 111 in the operation interface 301, and performing locking control on the position of the risk operation interface 111 by the risk control interface 113 based on the identification conclusion. In particular, the reading of the information of the operation interface 301 by the identification module 120 is based on the opening of the barrier-free authority in embodiment 1. The information of the operation interface 301 is read by the identification module 120, so that the risk control interface 113 is more accurate and more efficient in locking control, so that normal use of other operation interfaces is not affected while risk prevention and control are performed.
The operation interface 301 is an interface that is presented by the electronic device under the power-on condition, and is capable of interacting with a user to obtain an operation instruction. The electronic equipment at least comprises a car machine, a car instrument, a smart phone, a smart watch, a notebook computer, a desktop computer and the like. The operation interface 301 at least includes: incoming call interfaces, desktop interfaces, functional interfaces, content interfaces, etc. As shown in fig. 1, the main interface module 110 includes a risk operation interface 111, a risk early warning interface 112, and a risk control interface 113. As shown in fig. 3, an interface identified as involving a risk operation among the operation interfaces 301 is the risk operation interface 111. Further, from the explanation of the existence position, the main interface module is stored in the risk prevention and control device 100, the risk prevention and control device 100 is stored at the vehicle end, and the operation interface 301 exists at least one of the vehicle end and the mobile end.
The operation interface 301 provides the display of the risk operation interface 111, the risk early warning interface 112 and the risk control interface 113. The risk operation interface 111, the risk early warning interface 112, and the risk control interface 113 are displayed through hierarchical arrangement, and a high-level interface is displayed at the uppermost end. In the hierarchy setting, the risk operation interface 111 is set to the lowest hierarchy, and the hierarchy setting of the risk early warning interface 112 and the risk control interface 113 includes: the risk early warning interface 112 and the risk control interface 113 are arranged at the same level, for example, the risk early warning interface 112 and the risk control interface 113 coexist on the operation interface 301 at the same time; the risk early warning interface 112 is arranged at the highest level, e.g. the risk early warning interface 112 is present on top of the risk control interface 113, and the risk control interface 113 is in turn present on top of the operation interface 301. In particular, the above-mentioned "up and down" of the location is not referred to on the interface, but is displayed by a hierarchical relationship in response to the recognition conclusion, that is, the risk early-warning interface 112 and the risk control interface 113 may not be arranged on top of each other or may be arranged on top of each other.
For example, the risk early warning interface 112 and the risk control interface 113 are not overlapped with each other and are applied to the risk control interface 113 to perform risk prevention and control on the risk application icons related to the risk items, the risk control interface 113 can perform locking control on the risk application in a corresponding size, the risk early warning interface 112 is used for performing risk early warning on the identification conclusion, and for better early warning, the interface display of the risk early warning interface 112 should be displayed in a protruding manner without interfering with normal use of other applications, so that the risk prevention and control of the risk application adopts a mode that the risk early warning interface 112 and the risk control interface 113 are not overlapped with each other. The risk early warning interface 112 and the risk control interface 113 are overlapped with each other and are applied to the risk control interface 113 to perform full-interface locking control on the risk links, the risk web pages, the risk short messages and the like related to the risk items, so that the locking control on the risk links, the risk web pages, the risk short messages and the like can be more effectively and comprehensively performed. The interface color of the risk control interface 113 may be set individually, and in the case that the color of the risk control interface 113 is a dark color system, the risk early warning interface 112 exists under the risk control interface 113, which affects the early warning effect.
It should be noted that, the risk early warning interface 112 is one of the ways of coping in the recognition conclusion, and the risk control interface 113 responds to the recognition conclusion again. The response display manner of the risk control interface 113 includes: after the risk early warning interface 112 sends the risk early warning, the risk incoming call information 300 is closed, so that the risk control interface 113 does not need to be continuously displayed. The response display manner of the risk control interface 113 further includes: the risk early warning interface 112 sends out risk early warning, and the risk control interface 113 immediately performs locking control on the risk operation interface 111 in response to the identification conclusion. The response display manner of the risk control interface 113 further includes: after the risk early warning interface 112 sends out the risk early warning, the risk control interface 113 responds to the identification conclusion, and performs locking control on the risk operation interface 111 according to the set delay control time.
In other embodiments, the risk early warning interface 112 may send risk early warning reminders to different interconnected terminals at the same time, and the risk control interface 113 performs locking control on each risk operation interface 111 of different terminals based on the identification conclusion. The risk control interface 113 may perform locking control on different risk operation interfaces according to the risk items in the identification conclusion.
Further, the interconnected different terminals include at least one end of the first terminal and the second terminal. The risk prevention and control of the operation interface 301 of the second terminal is based on the related control rights of the first terminal to the second terminal. And the related control of the first terminal to the second terminal is realized through a built-in interconnection framework of the first terminal and the second terminal. Under the support of the built-in interconnection framework, the screen-throwing application of the second terminal can respond to the relevant control authority of the first terminal to send out risk early warning and locking control to the risk operation interface 111 of the second terminal. Particularly, through the response of the built-in interconnection framework supporting the screen-projection application of the second terminal, the second terminal does not need to download related 'risk prevention and control software', and performs related risk operation early warning and control based on the related control authority of the first terminal. The screen-throwing application is used as terminal interconnection equipment, is essentially used as a bridge for interconnecting the first terminal and the second terminal, and is not a 'risk prevention and control software' specially aiming at risk information. The related control authority of the first terminal to the second terminal at least comprises: the identification authority of the risk operation interface 111 of the second terminal, the display authority of the risk early warning interface 112 and the risk control interface 113, the locking control authority and the delay control authority of the risk control interface 113 to the risk operation interface 111. The relevant control authority of the first terminal to the second terminal is based on the opening of the risk prevention and control authority in the setting module 130 in the first terminal.
Fig. 4 shows a flowchart of a risk prevention and control method for identifying the incoming call information 204 as risk information 401 according to the present embodiment. As shown in fig. 4, the steps of the risk prevention and control method for identifying the incoming call information content 204 as the risk information 401 include: on the one hand, the identification incoming call information 204 is obtained to obtain the identification conclusion as the risk information 401, the operation of risk early warning 402 is executed, further, risk anti-verification information 403 is sent out according to keywords related to the risk items in the identification conclusion, and application anti-verification 404 is sent out according to the risk anti-verification information 403. Wherein the risk verification information 403 includes at least the risk sites involved in the risk item, such as official phones of police office phones, company phones, relatives phones, friend phones, banking phones, communication company phones, shopping platforms, etc. The application anti-verification 404 issues a dialing application and/or an alarm application based on the risk anti-verification information 403. On the other hand, the risk information 401 is obtained as the identification conclusion for the identification incoming call information 204, and the operation of the risk control 405 is performed, so that the risk operation interface 111 related to the identification incoming call information content 204 is subjected to locking control.
In some embodiments, the process of identifying whether the incoming call information content is the risk information 203 identifies that the memo remark name encounters an emergency, and immediately transfers the memo remark name to be the risk information, further identifies that the incoming call information exists in the risk information 401 through the keywords of the incoming call information, and simultaneously identifies that the keywords of the incoming call information relate to the remark names in the user phone book, generates the identification conclusion, sends out the risk anti-verification information 403, provides the contact manner of the relatives related to the identification conclusion, and sends out the application anti-verification 404. The authenticity of the incoming call information can be obtained through further verification. Based on the recognition conclusion, the risk control 405 performs lock control on the risk control interface 111 related to the keyword of the incoming call information. Preferably, the application anti-verification 404 identifies the risk location and the memo remark name related to the risk anti-verification information 403 according to the keyword, and issues a dial verification application. More preferably, the application counter-verification 404 further provides an alert application based on the verified information after providing the dial-up verification application. On the one hand, the authenticity of the risk information 401 is determined, the omission of real information is avoided, and on the other hand, the cheating risk of other people is reduced.
Fig. 5 shows a risk prevention and control user interaction interface for the case that the terminal call is not connected in this embodiment. The user interaction interface is at least one of the vehicle-mounted terminal screen, the mobile terminal screen and the screen throwing screen after interaction between the mobile terminal and the vehicle-mounted terminal.
As shown in fig. 5, the caller id display interface 500 displays a key 501, a hang-up key 502, a record key 503, a caller number field 511, a caller number already-identified information field 512, a caller number attribution information field 513, and the risk early warning interface 112 based on the identification conclusion.
The case where the terminal call is not connected and is already identified as a risky call is illustrated. In fig. 2, the caller id display interface 500 displays the on key 501, the hang-up key 502, the record key 503, the caller number field 511, the caller number already-identified information field 512, the caller number attribution information field 513, and the risk early warning interface 112, wherein the caller number already-identified information field 512 displays that the call is the risk call. The risk early warning interface 112 sends out the voice and/or visual risk early warning prompt, and sends out an application of directly hanging up the incoming call and blackening the incoming call based on the recognition conclusion. After receiving an instruction to agree to hang up and pull down the blacklist, the hang up key 502 is activated. In the case of the risk early warning alert and the incoming call is put through, the recording key 503 is automatically started to start recording.
The case where the terminal call is not connected and is already identified as a memo number is illustrated. In fig. 2, the caller id display interface 500 displays the on key 501, the hang-up key 502, the record key 503, and the caller id identification information field 512, wherein the caller id identification information field 512 displays that the caller is the memo number. The recording key 503 is manually activated when recording is required during the answering of an incoming call. Therefore, the record and the identification of the strange incoming call information in the embodiment are shown, and the personal and property safety is protected and the privacy is protected to a greater degree.
A user interaction interface for the risk prevention and control of the incoming call information being a digital number and the terminal being connected is shown in FIGS. 6A-6C. In conjunction with the user interaction interface shown in fig. 5, the number incoming call is turned on, and the display interface 600 includes: the call interface 601, the call time bar 602, the hang-up key 502, the record key 503 records the digital incoming call and generates the recognition conclusion, and based on the recognition conclusion, the risk control interface 113 and the risk control time bar 611 are displayed on the display interface 600. Fig. 6A shows a car-end navigation operation interface after the mobile end and the car-end are interconnected, where the call interface 601 may be displayed in a reduced manner as shown in fig. 6A-6B, and the call interface 601 is a call interface after the mobile end and the car-end are interconnected. In the call process, the call interface 601 displays the call time bar 602, records the incoming call of the digital number, identifies and generates the identification conclusion of "transfer to the business hall of China banking", and the risk control interface 113 performs locking control on the call interface 601 and the navigation display interface 620 with risk operation based on the identification conclusion, wherein the key identification and locking control is a navigation word and/or icon of the navigation interface 620.
In other embodiments, a user interface is shown in fig. 6B-6C, where 6B represents a vehicle-side operation interface after the mobile terminal is interconnected with the vehicle-side, and 6C represents a mobile-side operation interface after the mobile terminal is interconnected with the vehicle-side. In the call process, the call interface 601 displays the call time bar 602, records the number incoming call, generates an identification conclusion, the risk early warning interface 112 sends the risk early warning prompt through the identification conclusion, and the risk control interface 113 performs locking control on the risk operation interface 111 related to the identification conclusion. The risk control interface 113 simultaneously locks the risk operations application 621 in the call interface 601 and the display interface 600. Wherein the lock control for the risk application 621 is based on the risk item identified by the keyword, thereby lock controlling the icon of the risk application 621. At the same time as the lock, the risk control time bar 611 is activated, displaying the time of the lock control and/or the time of the unlock control. Those skilled in the art will appreciate that the risk control time bar 611 may exist anywhere on the display interface 600. In the vehicle-side operation interface shown in fig. 6B, the risk anti-verification information 403 is generated based on the risk location and/or the memo name involved in the recognition conclusion, and the display interface 600 displays the risk anti-verification information interface 630. The risk anti-verification information interface 630 includes correct verification information 631 based on the risk conclusion, and provides for risk anti-verification to ensure authenticity of the identification conclusion, thereby further ensuring reliability of risk prevention and control of the risk wind control method and device. Wherein the correct verification information is the actual information identifying the risk location and/or memo note name involved in the conclusion. For example, the identification incoming call information content 201 includes risk information related to "mom, illness, transfer" and the like, the identification conclusion is that the incoming call is a risk incoming call, the risk early warning interface 112 sends a risk early warning, the risk control interface 113 performs locking control on an application program related to transfer, further, the display interface 600 displays a risk anti-verification information interface 630 and correct verification information 631, displays a phone number of the "mom" of the memo, and performs the application anti-verification 404. The risk verification information interface 630 may exist anywhere on the display interface 600, as will be appreciated by those skilled in the art. As shown in fig. 6C, in the mobile terminal operation interface 640, the vehicle terminal generates the identification conclusion, and based on the control authority of the vehicle terminal on the mobile terminal, the risk control interface 113 performs locking control on the risk application 621 of the mobile terminal. The risk prevention and control method and the device thereof in this embodiment perform risk prevention and control on the risk operation interface 111 of the mobile terminal interconnected with the vehicle machine terminal based on the related control authority, specifically, based on the recognition conclusion, the risk control interface 113 performs lock control on the risk application 621 in the mobile terminal operation interface 640, so as to prevent the occurrence of the risk operation behavior of the mobile terminal.
6A-6C, the size of the risk control interface 113 is based on the size of the risk operation interface 111 that needs to be locked, and different sizes of the risk control interfaces 113 may exist in the same display interface 600 at the same time. For lock control of the risk application 621, the size and color of the risk control interface 113 are the size and color of the identified risk application 621. From the user's perspective, the risk application 621 that is locked by the risk control interface 113 is visually indistinguishable from the unlocked control, and the risk application 621 that is locked by the risk control interface 113 is not able to continue executing instructions for a certain period of time.
In some embodiments, the lock control of the risk control interface 113 to the risk operation interface 111 is a time delay control. In the incoming call answering process, the identification conclusion is generated according to the incoming call information, the vehicle machine side monitors incoming call answering action instructions, then the vehicle is monitored to be running, the risk prevention and control method and the risk prevention and control device start the delay control, and the risk control interface 113 does not lock and control the identified risk operation interface 111. When the vehicle terminal further monitors at least one trigger mechanism of delay control in the hanging-up of the incoming call, stopping of the vehicle, stepping on the brake, moving of the mobile terminal, unlocking of the screen of the mobile terminal, the risk control interface 113 performs locking control on the risk operation interface 111 in the identification conclusion. In particular, the delay time of the delay control is the time from receiving incoming call information to monitoring the trigger mechanism. For example, in order to ensure driving safety during running of a vehicle, an owner does not perform operations affecting driving safety except receiving incoming call information, and in order to enhance reliability and comprehensiveness of risk prevention and control, the risk prevention and control method and device thereof set the delay control, and perform risk early warning and locking control on the risk incoming call information through monitoring a delay trigger mechanism. It should be understood by those skilled in the art that the delay control does not rely solely on the monitoring of the trigger mechanism by the vehicle side to start risk control, and the risk control is performed when the vehicle side monitors the trigger mechanism within the delay control time based on the setting of the delay control time; and beyond the delay control time, the vehicle-mounted terminal does not monitor the trigger mechanism and control the risk.
In the age of informatization, the terminal easily receives links, short messages, web pages, etc. in which fraud information exists. As shown in fig. 7, the present embodiment provides a user interaction interface for risk prevention and control of risk text information. The display interface 600 displays the caller number field 511, the risk content information field 700, identifies the risk information content field 700 to generate the identification conclusion, and displays the risk early warning interface 112 and the risk control interface 113 based on the identification conclusion.
Describing the case that the risk text information is from a short message, the display interface 600 displays the caller number field 511 to display the caller number as a short message number, the risk content information field 700 displays the risk text information, the identification conclusion is generated by identifying the risk text information, and based on the identification conclusion, the risk control interface 113, the risk control time field 611 and the risk early warning interface 112 are displayed in the display interface 600. The risk early warning interface 112 sends out a request for blackening the short message number and/or uploading the short message number to a national anti-fraud center while sending out a risk reminder.
Describing the case that the risk text information comes from a web page, the risk content information bar 700 is displayed in the display interface 600, the risk control interface 113 performs locking control on the interface of the risk content information bar 700 based on the identification conclusion, and the risk control time bar 611 and the risk early warning interface 112 are displayed in the display interface 600. Wherein the risk content information field 700 represents a web page interface. When the web interface is opened, the risk control interface 113 responds to the identification conclusion to perform risk prevention and control on the display interface 600, meanwhile, the risk control time bar 611 is started, and the risk early warning interface 112 sends a request for closing the web interface while sending a risk reminding.
In some embodiments, the risk control interface 113 is turned off within the set risk control time, and recognizes that the risk behavior operation is being performed, and in this embodiment, the risk prevention and control method and the device thereof immediately dial and/or send a reminder of a sms to the set risk emergency contact.
1-7, the risk prevention and control method and the device thereof can comprehensively and real-timely identify and monitor incoming call information, timely feed back the risk information to a vehicle machine end and a mobile end for risk early warning and locking control, and further provide risk information anti-verification and dialing application. The loss of property and the possibility of information leakage are reduced through various prevention and control.
The risk prevention and control method and the device thereof provided by the invention fill the defect of the related technology of preventing and controlling the risk information under the condition that the vehicle-machine end and the mobile end are connected, and perform more accurate and more effective risk prevention and control on the risk incoming call information under the driving environment. Compared with the existing risk prevention and control software of the mobile terminal, the risk prevention and control method can prevent risks of risk operation from the vehicle machine terminal when a user is in a driving environment. The prevention and control range of the risk incoming call information is enlarged.
The corresponding structures, acts, and equivalents of all means or step elements in this invention are intended to include any structure, act, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the various preferred embodiments of the invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the various modifications and equivalent arrangements. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or the technical improvement over the technology found in the marketplace, and to achieve the objects of the invention fully and effectively. The functional and structural principles of the present invention have been shown and described in the examples and embodiments of the invention may be modified or practiced without departing from the principles described.

Claims (21)

1. A risk prevention and control method, comprising the steps of:
identifying incoming call information, wherein risks exist in response to the incoming call information;
generating an identification conclusion, wherein the identification conclusion comprises a coping mode and a risk item; and
and providing a risk control interface according to the relevant control authority of the identification conclusion, wherein the risk control interface responds to the identification conclusion and displays the control authority on a risk operation interface.
2. The method according to claim 1, wherein the method is implemented by a built-in interconnection framework in response to terminal interconnection, in particular between a first terminal and a second terminal.
3. The method of claim 2, wherein the associated control rights further comprises: and the first terminal controls the relative control authority of the second terminal.
4. A method according to claim 3, wherein the first terminal's associated control of the second terminal further comprises delay control.
5. The method of claim 4, wherein the delay controlled trigger mechanism comprises: at least one of a hang-up, a movement and/or a stop of the second terminal, the first terminal.
6. The method of claim 5, wherein the trigger mechanism is based on monitoring of the first terminal.
7. The method of claim 1, the risk control interface being displayed on a risk operations interface with control rights as lock control in response to the identification conclusion.
8. The method of claim 7, wherein the lock control is based on an override of a risk control interface provided by the requested control authority.
9. The method of claim 1, wherein the identifying incoming call information comprises obtaining keywords by speech recognition and/or text recognition, generating the identification conclusion.
10. The method of claim 1, wherein prior to identifying incoming call information, further comprising: and monitoring and storing the incoming call number, identifying the incoming call information content, and obtaining keywords.
11. The method of claim 10, wherein the keyword obtained by the identifying incoming call information further provides a location for control of the risk operator interface by the risk controller interface.
12. The method of claim 1, wherein the coping style comprises: at least one of early warning of risk incoming call information, verification dialing, setting interception and uploading of national anti-fraud centers.
13. The method of claim 12, the risk incoming call information pre-warning, further comprising: and the risk early warning interface is used for further providing at least one of voice early warning and text early warning.
14. The method of claim 1, wherein the risk item comprises:
navigation to at least one of identify a risk location, transfer to identified incoming call information using a payment/remittance application, provide personal information, provide shopping information, impersonate surrounding people to seek monetary assistance.
15. The method according to claim 1, wherein the risk control interface is capable of presetting its control time for the risk operation interface, including setting of a delay control time.
16. The method of claim 1, wherein an interface size of the risk control interface is compatible with a risk operation interface.
17. The method of claim 1, wherein the risk control interface, the color of which comprises:
and carrying out corresponding preset setting on the color of the risk control interface according to the risk level of the risk operation interface.
18. The method of claim 1, wherein the risk control interface is capable of locking control of multiple risk control interfaces, respectively.
19. The method of claim 18, wherein the plurality of risk operation interfaces comprises: at least one of a risk operation interface existing in the first terminal, a risk operation interface existing in the second terminal and the first terminal.
20. A device for providing risk prevention and control, comprising:
the main interface module comprises an operation interface, a risk early warning interface and a risk control interface;
The identification module is used for identifying incoming call information; and
the setting module is used for providing the risk control interface, wherein the identification module transmits the identification conclusion to the setting module, and the supply setting module displays the risk control interface on the main interface module according to the established logic.
21. The risk prevention and control device of claim 20, the operator interface comprising: at least one of an incoming call interface, a desktop interface, a function interface and a content interface.
CN202210050721.8A 2022-01-17 2022-01-17 Risk prevention and control method and device thereof Pending CN116503071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210050721.8A CN116503071A (en) 2022-01-17 2022-01-17 Risk prevention and control method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210050721.8A CN116503071A (en) 2022-01-17 2022-01-17 Risk prevention and control method and device thereof

Publications (1)

Publication Number Publication Date
CN116503071A true CN116503071A (en) 2023-07-28

Family

ID=87317106

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210050721.8A Pending CN116503071A (en) 2022-01-17 2022-01-17 Risk prevention and control method and device thereof

Country Status (1)

Country Link
CN (1) CN116503071A (en)

Similar Documents

Publication Publication Date Title
US7647638B2 (en) Apparatus and a method for preventing unauthorized use and a device with a function of preventing unauthorized use
US8463234B2 (en) Method for providing security services by using mobile terminal password and mobile terminal thereof
EP3048592B1 (en) Method, device, and self service equipment thereof for card processing in card reader
US20040158523A1 (en) Method providing contingency access to valuable accounts or information
US20030079127A1 (en) Method for protecting against theft the authenticating value of multiple application smart cards, smart cards therefor and terminals designed to receive said cards
US7480805B1 (en) Method and system for identifying and processing an unauthorized access request
EP1569480B1 (en) Mobile phone with restriction on use thereof and method for restricting use of mobile phone
JP2013161261A (en) Information processing terminal, authentication control method and authentication control program of the same
CN104243708A (en) Mobile terminal and anti-theft method and device of mobile terminal
CN116503071A (en) Risk prevention and control method and device thereof
CA2898364C (en) Method for protecting an electronic terminal, corresponding computer program and electronic terminal
US20040158525A1 (en) System and method providing contingency biometric security activation
US20150261961A1 (en) Scenario-based security method and system
JP4705346B2 (en) Resident management system, occupant management server, and occupant management program
JP4333196B2 (en) Automatic transaction equipment, automatic transaction system
KR102736921B1 (en) A parking number plate temporary number display system and a method thereof
KR101816501B1 (en) Electronic apparatus, control system, recoding medium, and method using supplemental code
KR20050002106A (en) Finance security system using a picture-comparison
KR101544749B1 (en) Security system, apparatus, and method using disguise code
KR20150101899A (en) Security system, apparatus, and method using disguise code
CN119233266A (en) Short message display method and device and computer equipment
JP2005173633A (en) Unauthorized use prevention system
KR20160087065A (en) Security system, apparatus, and method using supplemental code
JP2006107137A (en) Admission management device
KR20160090993A (en) Security system, apparatus, and method using disguise code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination