Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Prompt information pushing method and device, service platform and storage medium

A technology that prompts information and is to be pushed. Applied in the field of information security, it can solve the problems of information harassment, limited security awareness efficiency, and limited security risk promotion effect, so as to achieve the effect of less information interference and good security warning effect.

Active Publication Date: 2019-02-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, it will lead to information harassment for users who do not need prompt information reminders; on the other hand, for users who need prompt information reminders, there may be untargeted problems, and users lose sensitivity to information due to frequent pushes, thus Loss of vigilance for prompt information, resulting in limited efficiency of prompt information push to improve users' security awareness, and limited effect of preventing security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Prompt information pushing method and device, service platform and storage medium
  • Prompt information pushing method and device, service platform and storage medium
  • Prompt information pushing method and device, service platform and storage medium

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0168] Such as Figure 7 As shown in the example, the prompt information push method implemented in this example includes:

[0169] Step S1: Report the detailed historical risk data (that is, the aforementioned predetermined type of data) through the risk monitoring platform and the mobile phone manager, which may specifically include: reporting the user's historical risk detailed data through the terminal of the risk monitoring platform and the mobile phone manager. The reported risk details data may include: attachments with records of fake base stations, receiving fraudulent calls, receiving fraudulent text messages, accessing malicious uniform resource addresses (URLs), and attachments with records of risky WiFi and mobile phone poisoning, etc. The risk detailed data here is one of the aforementioned predetermined types of data.

[0170] S2: Calculate the user's risk attributes through the susceptible population model, and dynamically update it, and maintain a user's risk...

example 2

[0178] Such as Figure 8 As shown, based on Example 1, this example provides a method for establishing a susceptible population model and generating a user risk attribute table, including:

[0179] S11: Risk monitoring platform detection, including: monitoring proprietary reporting channels, existing risk information databases and data exchange with partners;

[0180] S12: The mobile phone manager collects user operations.

[0181] S13: Report risk details data; susceptible population model;

[0182] S14: Establish a susceptible population model based on the reported risk details data, and obtain a user risk attribute table.

[0183] The establishment of the susceptible population model (equivalent to the aforementioned analysis model) is based on the details of the risk data of the user account. Only with sufficient data as the training set can the model be established more accurately. Data collection is divided into two parts. The first is the risk monitoring platform, wh...

example 3

[0185] Such as Figure 9 As shown, based on Example 1, this example provides a method for managing security information of a security resource pool, including:

[0186] First of all, the security information content resource pool needs to collect security information. Information sources may include: original manuscripts, manuscript collection, and information provided by media cooperation. The security advisory here is one of the aforementioned prompt messages.

[0187] Secondly, the security information content resource pool needs to classify resources to form security information in various aspects such as security reports, fake base stations, risky WiFi, social worker fraud, fraudulent text messages, fraudulent calls, viruses, and phishing websites.

[0188] In short, the security information content resource pool covers all security-related information content such as security reports, fake base stations, risky WiFi, social worker fraud, etc. It can enrich the content of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a prompt information pushing method and device, a service platform and a storage medium. The prompt information pushing method comprises the steps of queryinga user database to acquire a user account to be pushed; acquiring the risk attribute of the user account, wherein the risk attribute comprises a safety risk type that may be suffered by the user account and / or the probability of the corresponding safety risk type suffered by the user account, and the risk attribute is the information related to at least one of a historical operating behavior of the user account, the user attribute and an application scene where a user account operation terminal is located; matching the risk attribute with prompt attribute of prompt information to be pushed, wherein the prompt attribute at least comprises the information indicating the risk safety type prompted by the prompt information; according to a matching result, selecting target prompt information of which the prompt attribute matching the risk attribute from the prompt information to be pushed; and pushing the target prompt information to the corresponding user account.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method and device for pushing prompt information, a service platform and a storage medium. Background technique [0002] With the development of Internet technology and information technology, users use terminal equipment to obtain various information services such as various communication services and Internet services. In order to steal the user's property and / or information, criminals attack the user's terminal equipment by using fake base stations, viruses, fraudulent text messages, phone calls or risky hotspots, resulting in user information and / or property security issues. [0003] In order to solve the above problems, the service provider or the security service provider will push security information to the terminal device, prompt the user to take security precautions through the security information, and enhance the user's security awareness. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08
CPCH04L67/55
Inventor 习磊罗锦坚詹勋昌翁培臻鲁梦平
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products