Risk identification method and equipment

A risk identification and risk technology, applied in the field of network information security, can solve problems such as the reduction of communication software security

Active Publication Date: 2017-05-03
ADVANCED NEW TECH CO LTD
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the embodiment of the present application provides a risk identification method and device, which are used to solve the problem in the prior art that illegal users ma

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk identification method and equipment
  • Risk identification method and equipment
  • Risk identification method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to achieve the purpose of this application, the embodiment of this application provides a risk identification method and device, the server obtains the information sent by the first user to the second user, and when it is determined that the information contains keywords, obtains the An identification picture used by the first user; according to the identification picture used by the first user, search for identification information of a third user who uses an identification picture whose similarity with the identification picture is greater than a set threshold; When the identification information of the third user determines that a social relationship has been established between the third user and the second user, it is determined that the first user is a risk user.

[0028] Through the method described in the embodiment of this application, when the server finds that some keywords appear in the communication content of both parties, it triggers the identific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a risk identification method and equipment. The method comprises the following steps that a server obtains information which is sent to a second user by a first user and obtains an identification picture used by the first user when the server determines that the information includes keywords; the server searches identification information of a third user according to the identification picture used by the first user, wherein the third user utilizes an identification picture and the similarity between the identification picture used by the third user and the identification picture used by the first user is greater than a set threshold; and the server determines the first user as a risk user when the server determines that a social relation between the third user and the second user is established according to the identification information of the third user. According to the method and the equipment, the occurrence of an event that an illegal user adopts an identity disguising way to utilize the trust of the user about a disguised person in order to defraud money or information of friends and relatives of the disguised person is effectively avoided, so that the security of Internet communication is improved.

Description

technical field [0001] The present application relates to the field of network information security, in particular to a risk identification method and equipment. Background technique [0002] With the rapid development of Internet technology, various communication software, such as QQ, Weibo, WeChat, etc., have appeared on the Internet application platform. People can use these communication software to communicate and communicate conveniently. In order to improve the user experience of the communication software, the developers of the communication software have added the personalized setting function of the user identification picture in the communication software, so that each user who uses the communication software can use the personalized setting function to set the picture that the user is interested in For the user's identification picture, for example: the user takes a photo containing his own facial features, and sets the photo as the user's identification picture....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 彭际群
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products