Prompt information push method and device, service platform and storage medium

A technology for prompting information and geographical location, applied in the field of information security, can solve the problems of information harassment, limited efficiency of security awareness, lack of pertinence, etc., and achieve the effect of small information interference and good security warning effect

Active Publication Date: 2021-06-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, it will lead to information harassment for users who do not need prompt information reminders; on the other hand, for users who need prompt information reminders, there may be untargeted problems, and users lose sensitivity to information due to frequent pushes, thus Loss of vigilance for prompt information, resulting in limited efficiency of prompt information push to improve users' security awareness, and limited effect of preventing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Prompt information push method and device, service platform and storage medium
  • Prompt information push method and device, service platform and storage medium
  • Prompt information push method and device, service platform and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0168] Such as Figure 7 As shown in the example, the prompt information push method implemented in this example includes:

[0169] Step S1: Report the detailed historical risk data (that is, the aforementioned predetermined type of data) through the risk monitoring platform and the mobile phone manager, which may specifically include: reporting the user's historical risk detailed data through the terminal of the risk monitoring platform and the mobile phone manager. The reported risk details data may include: attachments with records of fake base stations, receiving fraudulent calls, receiving fraudulent text messages, accessing malicious uniform resource addresses (URLs), and attachments with records of risky WiFi and mobile phone poisoning, etc. The risk detailed data here is one of the aforementioned predetermined types of data.

[0170] S2: Calculate the user's risk attributes through the susceptible population model, and dynamically update it, and maintain a user's risk...

example 2

[0178] Such as Figure 8 As shown, based on Example 1, this example provides a method for establishing a susceptible population model and generating a user risk attribute table, including:

[0179] S11: Risk monitoring platform detection, including: monitoring proprietary reporting channels, existing risk information databases and data exchange with partners;

[0180] S12: The mobile phone manager collects user operations.

[0181] S13: Report risk details data; susceptible population model;

[0182] S14: Establish a susceptible population model based on the reported risk details data, and obtain a user risk attribute table.

[0183] The establishment of the susceptible population model (equivalent to the aforementioned analysis model) is based on the details of the risk data of the user account. Only with sufficient data as the training set can the model be established more accurately. Data collection is divided into two parts. The first is the risk monitoring platform, wh...

example 3

[0185] Such as Figure 9 As shown, based on Example 1, this example provides a method for managing security information of a security resource pool, including:

[0186] First of all, the security information content resource pool needs to collect security information. Information sources may include: original manuscripts, manuscript collection, and information provided by media cooperation. The security advisory here is one of the aforementioned prompt messages.

[0187] Secondly, the security information content resource pool needs to classify resources to form security information in various aspects such as security reports, fake base stations, risky WiFi, social worker fraud, fraudulent text messages, fraudulent calls, viruses, and phishing websites.

[0188] In short, the security information content resource pool covers all security-related information content such as security reports, fake base stations, risky WiFi, social worker fraud, etc. It can enrich the content of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a prompt information push method and device, a service platform, and a storage medium. The prompt information push method includes: querying a user database to obtain a user account to be pushed; obtaining the risk attribute of the user account, wherein , the risk attribute includes: the type of security risk that the user account may currently suffer and / or the probability of suffering the corresponding type of security risk; and the risk attribute is related to the historical operation behavior of the user account, user attributes, and the Information related to at least one of the application scenarios of the terminal run by the user account; matching the risk attribute with the prompt attribute of the prompt information to be pushed, wherein the prompt attribute at least includes: indicating the prompt information The information of the security risk type that is prompted; according to the matching result, select the target prompt information whose prompt attribute matches the risk attribute from the prompt information to be pushed; push the target prompt information to the corresponding user account.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for pushing prompt information, a service platform and a storage medium. Background technique [0002] With the development of Internet technology and information technology, users use terminal equipment to obtain various information services such as various communication services and Internet services. In order to steal the user's property and / or information, criminals attack the user's terminal equipment by using fake base stations, viruses, fraudulent text messages, phone calls or risky hotspots, resulting in user information and / or property security problems. [0003] In order to solve the above problems, the service provider or the security service provider will push security information to the terminal device, prompt the user to take security precautions through the security information, and enhance the user's security awareness. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCH04L67/55
Inventor 习磊罗锦坚詹勋昌翁培臻鲁梦平
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products