Unlock instant, AI-driven research and patent intelligence for your innovation.

Information processing method, system and terminal equipment

An information processing method and terminal equipment technology, which is applied in the fields of information processing methods, systems and terminal equipment, can solve problems such as inability to effectively prevent malicious behaviors, achieve the effects of simple and easy implementation, improve network security, and prevent malicious behaviors

Active Publication Date: 2019-05-24
SHENZHEN TENCENT COMP SYST CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention is to provide an information processing method to solve the problem that existing terminals without malicious information detection software cannot effectively prevent malicious behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method, system and terminal equipment
  • Information processing method, system and terminal equipment
  • Information processing method, system and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0021] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0022] figure 1 The network architecture of the information processing system 00 provided by an embodiment of the present invention is shown, and for convenience of description, only the parts related to the embodiment of the present invention are shown. Wherein, the system 00 includes a first party 1 and a second party 2 . Optionally, the system further includes at least one third party 3 and a server 4 .

[0023] Wherein, the first party 1 may be any terminal equipm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An information processing method, system and terminal device are disclosed by the present invention, which belongs to the field of Internet technology. The method includes: determining a sender of a malicious message and obtaining information of the sender of the malicious message when the terminal device determines that the malicious message exists in communication messages of the terminal device; and converting the information of the sender of the malicious message into corresponding audio data, and sending out the audio data by the way of playing. In the embodiments of the present invention, the third party which has not been installed with the malicious information detection software can also obtain the information of the sender of the malicious message at any time, thus effectively preventing malicious activities and improving the security of network.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to an information processing method, system and terminal equipment. Background technique [0002] With the popularization of the Internet, malicious behaviors on the Internet (including fraud, sending viruses, spam, etc.) are also becoming more and more rampant. As the owner of the account, send fraudulent information to his friends to defraud property. [0003] In the prior art, by installing malicious information detection software on the terminal, when receiving information, it is detected whether the received information matches the information in the malicious information feature database in the detection software, and if so, the received information is determined to be malicious information. Although the prior art can prevent the malicious behavior to a certain extent, the malicious behavior cannot be prevented effectively for the terminal without malicious i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/145H04L2463/146
Inventor 陈荣陈梦李德春董梁唐艳平孙增昕陈远斌刘飞飞
Owner SHENZHEN TENCENT COMP SYST CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More