Abstract:
Embodiments of the present disclosure disclose a data response method, a terminal device, and a server. The method in the embodiments of the present disclosure includes: sending encrypted information to a terminal device; receiving a first honeypot character, the encrypted information, and user data from the terminal device; decrypting the encrypted information, to obtain a second honeypot character comprised in the encrypted information; determining whether the first honeypot character sent by the terminal device is the same as the second honeypot character decrypted from the encrypted information; and responding to the user data in response to the first honeypot character being the same as the second honeypot character.
Abstract:
Aspects of the disclosure provide a device positioning method and apparatus. The apparatus includes processing circuitry. The processing circuitry is configured to determine at least one target user identifier (ID) that uses a target device to be positioned. The processing circuitry obtains a plurality of pieces of login information of the at least one target user ID where each piece of login information includes the respective target user ID, a device ID of a login device, and a login site. The processing circuitry further determines a target login site based on the plurality of pieces of login information, and positions the target device according to the target login site.
Abstract:
A verification code generation method is performed at a computing device. The method includes: obtaining at least one pattern; determining an association relationship between the patterns and object attributes of the one or more objects in the patterns; generating at least one verification question according to the association relationship, and correspondingly marking an answer pattern matching each verification question from the at least one pattern; and generating at least one verification code picture according to the at least one pattern, the object attributes in the patterns, and the generated verification question, patterns in the verification code picture satisfying the association relationship, the verification code picture corresponding to the at least one verification question, the verification code picture including an answer area matching the corresponding verification question, and the answer area being an effective operation area that is determined according to an answer pattern of the corresponding verification question.
Abstract:
An information interception method, a terminal, and a computer storage medium are disclosed. The method includes: starting a first application, extracting an application list of applications that need to be intercepted, and separately configuring an interception policy for each to-be-intercepted application in the application list; obtaining a network request sent by a to-be-intercepted application, and monitoring, when the first application enters an interception mode, according to the configured interception policy, the network request sent by the to-be-intercepted application, to obtain, through matching, communication information that conforms to the interception policy, where the communication information is associated with the network request; and matching the communication information with a preset policy, when the communication information is specified target information corresponding to the preset policy, intercepting the network request and locating and tracing the to-be-intercepted application that sends the network request.
Abstract:
An instant messaging message processing method is disclosed and includes: receiving, by a server, an instant messaging message, user account information of a destination user terminal, and user account information of a source user terminal from the source user terminal; determining, by the server, a risk level of the instant messaging message according to a preset rule and the user account information of the source user terminal; and if the risk level of the instant messaging message reaches a first risk level, transmitting, by the server when, the instant messaging message and preset pre-warning information to the destination user terminal according to the user account information of the destination user terminal, wherein the pre-warning information comprises security prompt information which is used for prompting a user of the destination user terminal to notice a security risk of the instant messaging message. An instant messaging message processing device is also disclosed.
Abstract:
An information interception method, a terminal, and a computer storage medium are disclosed. The method includes: starting a first application, extracting an application list of applications that need to be intercepted, and separately configuring an interception policy for each to-be-intercepted application in the application list; obtaining a network request sent by a to-be-intercepted application, and monitoring, when the first application enters an interception mode, according to the configured interception policy, the network request sent by the to-be-intercepted application, to obtain, through matching, communication information that conforms to the interception policy, where the communication information is associated with the network request; and matching the communication information with a preset policy, when the communication information is specified target information corresponding to the preset policy, intercepting the network request and locating and tracing the to-be-intercepted application that sends the network request.
Abstract:
An identity verifying method, an account acquiring method, a mobile terminal, and a storage medium are disclosed, and the account acquiring method includes: receiving, by a first mobile terminal, a user operation of accepting identity verification on the first mobile terminal, playing voice information which is stored in the first mobile terminal and has a correspondence relationship with a user account of a user of the first mobile terminal, and meanwhile collecting voice data of the played voice information using voice receiving means; sending, by the first mobile terminal, verification information comprising the user account and the voice data to a server to allow the server to determine whether the user passes the identity verification according to the verification information; and receiving, by the first mobile terminal, an identity verification result returned by the server. Thus, the voice information is used for identity verification.
Abstract:
An instant messaging message processing method is disclosed and includes: receiving, by a server, an instant messaging message, user account information of a destination user terminal, and user account information of a source user terminal from the source user terminal; determining, by the server, a risk level of the instant messaging message according to a preset rule and the user account information of the source user terminal; and if the risk level of the instant messaging message reaches a first risk level, transmitting, by the server when, the instant messaging message and preset pre-warning information to the destination user terminal according to the user account information of the destination user terminal, wherein the pre-warning information comprises security prompt information which is used for prompting a user of the destination user terminal to notice a security risk of the instant messaging message. An instant messaging message processing device is also disclosed.