Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A key detection method, device and electronic equipment

A detection method and key technology, applied in the computer field, can solve the problems of high detection risk and low recognition accuracy, and achieve the effects of avoiding data leakage, improving security, and improving accuracy

Active Publication Date: 2022-06-03
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this specification provides a key detection method, device and electronic equipment to solve the problems of low recognition accuracy and high detection risk in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key detection method, device and electronic equipment
  • A key detection method, device and electronic equipment
  • A key detection method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make those skilled in the art better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below with reference to the accompanying drawings in the embodiments of this specification. Obviously, the described The embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments of the present specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0027] With the rapid development of Internet technology, service applications and platforms based on Internet technology are also changing with each passing day, but Internet security has always been one of the most concerned topics for users, so the research on Internet security has never stopped. In order to ensure the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide a key detection method, device and electronic equipment. The method includes: extracting one or more target character strings from the text according to a predetermined extraction rule, the predetermined extraction rule is a rule generated according to a predetermined key type; performing a detection operation on the target character string , so as to filter out the character string corresponding to the key to be determined from the target character string; use a predetermined search method to search the text to obtain the character string corresponding to the account identifier to be determined; obtain the character string corresponding to the key to be determined and one or more feature data respectively corresponding to the account ID to be determined, and match the key to be determined with the account ID to be determined according to the feature data to obtain a matching score of the key to be determined, based on the The matching score determines the key corresponding to the key type, thereby realizing the detection of the key.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular, to a key detection method, device, and electronic device. Background technique [0002] With the development of Internet technology, the security requirements for Internet platforms or Internet products have also increased. In order to ensure the security of information or data platforms, users can be verified to confirm the permissions and qualifications of users. Sensitive information entered by the user is authenticated. As a kind of sensitive information, the key can be used to verify the user in combination with the user account. After the user obtains the account assigned by the platform and the corresponding key, he can use the key to access the platform. Therefore, the key is also more important information. However, due to some reasons, the plaintext of many keys is exposed in public platforms (for example, technical websites or code platforms, etc.), which po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46G06F21/62
CPCG06F21/46G06F21/6245
Inventor 林博
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products