Method, device, equipment and storage medium for prompting fraud application program

文档序号:1964655 发布日期:2021-12-14 浏览:21次 中文

阅读说明:本技术 诈骗类应用程序的提示方法、装置、设备和存储介质 (Method, device, equipment and storage medium for prompting fraud application program ) 是由 张元杰 胡小燕 王美青 吕军 程建波 于 2020-12-18 设计创作,主要内容包括:本申请提出一种诈骗类应用程序的提示方法、装置、设备和存储介质,其中,包括:接收客户端的业务请求,并判断业务请求所请求的是否为目标类型业务;如果业务请求所请求的是目标类型业务,则获取客户端之中安装的应用程序安装列表;检测应用程序安装列表中各个应用程序是否在黑名单之中;如果各个应用程序之中任一个位于黑名单之中,则拦截业务请求,并通过客户端发送提示信息。由此,实现针对目标类型业务的业务请求,进行识别诈骗类应用程序,从而及时对相关业务请求进行拦截并提示用户,提高客户端安全性。(The application provides a method, a device, equipment and a storage medium for prompting fraud application programs, wherein the method comprises the following steps: receiving a service request of a client, and judging whether the service request is a target type service; if the service request requests the target type service, acquiring an application program installation list installed in the client; detecting whether each application program in the application program installation list is in a blacklist or not; and if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client. Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time, the user is prompted, and the safety of the client is improved.)

1. A method for prompting a fraud application, comprising:

receiving a service request of a client, and judging whether the service request is a target type service;

if the service request requests the target type service, acquiring an application program installation list installed in the client;

detecting whether each application program in the application program installation list is in a blacklist or not;

and if any one of the application programs is positioned in the blacklist, intercepting the service request and sending prompt information through the client.

2. The method for prompting a fraud-type application of claim 1, further comprising:

receiving feedback information sent by the client; wherein the feedback information comprises an application program identifier and an application program name;

storing the application identification and the application name in the blacklist.

3. The method for prompting a fraud-type application of claim 1, further comprising:

monitoring the operation information of the client within a preset time period;

under the condition that the operation information meets the preset condition, acquiring an operation application program identifier and an operation application program name corresponding to the operation information;

storing the operating application identification and the operating application name in the blacklist.

4. The method for prompting a fraud-type application of claim 1, further comprising:

acquiring each application program identifier in the blacklist;

analyzing each application program identifier, and determining a target field in each application program identifier;

and acquiring an application program identifier matched with the target field and adding the application program identifier into the blacklist.

5. The method for prompting a fraud-type application of any one of claims 1-4, wherein said detecting whether each application in said application installation list is in a blacklist comprises:

detecting whether the application program identification of each application program in the application program installation list is matched with the application program identification in the blacklist;

and in the case of matching, detecting whether the application name of the matched application program is matched with the corresponding application name in the blacklist.

6. The method for prompting a fraud-type application of any one of claims 1-4, wherein said sending, by said client, a prompt message comprises:

and controlling the artificial intelligent voice equipment of the client to carry out voice broadcasting on the prompt information.

7. A fraud application prompting apparatus, comprising:

the receiving and judging module is used for receiving a service request of a client and judging whether the service request is a target type service;

a first obtaining module, configured to obtain an application installation list installed in the client if the service request requests the target type service;

the detection module is used for detecting whether each application program in the application program installation list is in a blacklist or not;

the processing module is used for intercepting the service request if any one of the application programs is positioned in the blacklist;

and the prompt module is used for sending prompt information through the client.

8. The apparatus for prompting a fraud application of claim 7, wherein the detection module is specifically configured to:

detecting whether the application program identification of each application program in the application program installation list is matched with the application program identification in the blacklist;

and in the case of matching, detecting whether the application name of the matched application program is matched with the corresponding application name in the blacklist.

9. A server, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of prompting for a fraud-type application as recited in any one of claims 1-6 when executing the program.

10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the method for prompting a fraud-type application as recited in any one of claims 1-6.

Technical Field

The present application relates to the field of information security technologies, and in particular, to a method, an apparatus, a device, and a storage medium for prompting fraud applications.

Background

Generally, during the process of using the mobile phone by the user, the short message link and the related text information are received, so that the user installs the related fraud application program, thereby collecting the user information and reducing the security of using the mobile phone.

In the related art, the operation behavior in the official application program allows the related operation as long as the operation is performed in the secure environment, and the related operation cannot be analyzed with respect to the unofficial application program, so that the user information and the security of the use of the mobile phone cannot be effectively avoided.

Disclosure of Invention

The present application is directed to solving, at least to some extent, one of the technical problems in the related art.

The application provides a prompt method, a prompt device, prompt equipment and a storage medium of fraud application programs, so as to realize identification of fraud application programs aiming at service requests of target type services, intercept related service requests and prompt users in time, improve client security, and solve the technical problem that in the prior art, the client security is poor due to the fact that fraud application programs cannot be effectively identified.

An embodiment of a first aspect of the present application provides a method for prompting a fraud application, including:

receiving a service request of a client, and judging whether the service request is a target type service;

if the service request requests the target type service, acquiring an application program installation list installed in the client;

detecting whether each application program in the application program installation list is in a blacklist or not;

and if any one of the application programs is positioned in the blacklist, intercepting the service request and sending prompt information through the client.

The prompt method of the fraud application program of the embodiment of the application receives the service request of the client and judges whether the service request is a target type service; if the service request requests the target type service, acquiring an application program installation list installed in the client; detecting whether each application program in the application program installation list is in a blacklist or not; and if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client. Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time, the user is prompted, and the safety of the client is improved.

In a second aspect of the present application, an embodiment of the present application provides another fraud application prompting apparatus, including:

the receiving and judging module is used for receiving a service request of a client and judging whether the service request is a target type service;

a first obtaining module, configured to obtain an application installation list installed in the client if the service request requests the target type service;

the detection module is used for detecting whether each application program in the application program installation list is in a blacklist or not;

the processing module is used for intercepting the service request if any one of the application programs is positioned in the blacklist;

and the prompt module is used for sending prompt information through the client.

The prompt device for the fraud application program of the embodiment of the application receives the service request of the client and judges whether the service request is a target type service; if the service request requests the target type service, acquiring an application program installation list installed in the client; detecting whether each application program in the application program installation list is in a blacklist or not; and if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client. Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time, the user is prompted, and the safety of the client is improved.

An embodiment of a third aspect of the present application provides a server, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the prompt method of the fraud application program as proposed by the first and second aspect embodiments of the application.

An embodiment of a fourth aspect of the present application proposes a non-transitory computer-readable storage medium, storing a computer program, which when executed by a processor, implements a method for prompting a fraud-type application as proposed in the embodiments of the first and second aspects of the present application.

A fifth aspect of the present application proposes a computer program product, which when executed by an instruction processor, executes the method for prompting a fraud application proposed in the first and second aspects of the present application.

Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.

Drawings

The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:

FIG. 1 is a flowchart illustrating a method for prompting a fraud application according to an embodiment of the present application;

FIG. 2 is a flowchart illustrating a method for prompting a fraud application according to a second embodiment of the present application;

FIG. 3 is a flowchart illustrating a method for prompting a fraud application according to a third embodiment of the present application;

FIG. 4 is a flowchart illustrating a method for prompting a fraud application according to a fourth embodiment of the present application;

FIG. 5 is a flowchart illustrating a method for prompting a fraud application according to a fifth embodiment of the present application;

FIG. 6 is a schematic structural diagram of a device for prompting a fraud application according to a sixth embodiment of the present application;

FIG. 7 is a schematic structural diagram of a device for prompting a fraud application according to a seventh embodiment of the present application;

FIG. 8 is a schematic structural diagram of a device for prompting a fraud application provided in an eighth embodiment of the present application;

FIG. 9 is a schematic structural diagram of a fraud application prompting device according to a ninth embodiment of the present application;

FIG. 10 illustrates a block diagram of an exemplary server suitable for use in implementing embodiments of the present application.

Detailed Description

Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.

In practical application, the hot data are discovered through the client and stored in the client, and each client independently discovers the hot data, so that the hot data are compared on one side, the hot data cannot be synchronously updated in time, and the flexibility is poor.

Aiming at the problems, the application provides a prompt method of a fraud application program, which receives a service request of a client and judges whether the service request is a target type service; if the service request requests the target type service, acquiring an application program installation list installed in the client; detecting whether each application program in the application program installation list is in a blacklist or not; and if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client.

Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time and the user is prompted, the client security is improved, and the technical problem that the client security is poor due to the fact that the fraud application program cannot be identified effectively in the prior art is solved.

A method, an apparatus, a device, and a storage medium for prompting a fraud-type application according to an embodiment of the present application are described below with reference to the drawings.

Fig. 1 is a flowchart illustrating a method for prompting a fraud application according to an embodiment of the present application.

The embodiment of the application is exemplified by the method for prompting the fraud application being configured in the prompting device of the fraud application, and the prompting device of the fraud application can be applied to any server, so that the server can execute the prompting function of the fraud application.

As shown in fig. 1, the method for prompting a fraud application may include the following steps:

step 101, receiving a service request from a client, and determining whether the service request is a target type service.

In the embodiment of the application, one or more service requests sent by one or more clients can be received simultaneously; the service request may be a request of different services, such as a target type service request for extraction, payment, and the like; and for example, interactive service requests such as collection, sharing and comment can be specifically selected and set according to application scenes.

In the embodiment of the application, the target type service may be selectively set according to an application scenario, such as a credit service, an information sharing service, and the like.

In the embodiment of the present application, after receiving a service request from a client, there are various ways to determine whether the service request is a target type service, which are described as follows.

In the first example, the service request is analyzed to obtain a request identifier, where the request identifier is a target type service identifier and is determined to be a target type service.

For example, the service request is analyzed, a white bar application identifier is obtained, and the target type service is determined.

In the second example, the service request is analyzed to obtain the request content, and the request content is matched with the target type service content and determined as the target type service.

Step 102, if the service request requests the target type service, acquiring an installation list of the application programs installed in the client.

In the embodiment of the application, after it is determined that the service request requests the target type service, an application installation list installed in the client is obtained, that is, all application information installed by the client is obtained.

In the embodiment of the present application, there are many ways to obtain the installation list of the application installed in the client, which are described as follows.

In a first example, an authorization acquisition permission request is sent to a client, after the receiving client has granted the acquisition permission, application program identifiers and corresponding application program names of all application programs installed in the client are collected, and an application program installation list is generated.

In a second example, an application information obtaining request is sent to a client, all pieces of installed application information sent by the client are received, and an application installation list is generated according to all pieces of installed application information.

Step 103, detecting whether each application program in the application program installation list is in a blacklist.

And step 104, if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client.

In the embodiment of the application, the blacklist can be understood as a list corresponding to the fraud application, and there are various ways to identify the fraud application, for example, in an actual application process, feedback information sent by a client is received; the feedback information comprises an application program identifier and an application program name, and a blacklist is generated according to the feedback information; for another example, a preset time period is monitored, for example, in a time period from 1 point in the morning to six points in the morning, operations such as password modification and payment are tried for multiple times, and an application program identifier and an application program name corresponding to the operation are obtained to generate a blacklist.

In the embodiment of the present application, there are many ways to detect whether each application in the application installation list is in the blacklist, and the setting may be selected according to the application scenario needs, which is exemplified as follows.

In a first example, whether the application program identifier of each application program in the application program installation list is matched with the application program identifier in the blacklist is detected, and in the case of matching, whether the application name of the matched application program is matched with the corresponding application name in the blacklist is detected.

In a second example, whether the application name of each application program in the application program installation list is matched with the application name in the blacklist is detected, and in the case of matching, whether the application program identifier of the matched application program is matched with the corresponding application program identifier in the blacklist is detected.

In the embodiment of the application, the application identifier can uniquely identify one application, and can be selectively set according to application requirements, such as an application package name.

In the embodiment of the application, any one of the application programs installed on the client is located in the blacklist, which means that the fraud application program installed on the client needs to intercept the target type service request, and the client sends the prompt message to realize the identification of the fraud application program aiming at the service request of the target type service, so that the related service request is intercepted in time and the user is prompted, and the security of the client is improved.

In the embodiment of the present application, there are many ways to send the prompt message through the client, and the prompt message may be selectively set according to the application scenario requirement, which is described as follows.

In the first example, the artificial intelligence voice device of the client is controlled to perform voice broadcasting voice prompt information.

In a second example, the interactive information popup of the client is controlled to send prompt text information, and the user can be further prompted to pay attention to the operation security in a mode of combining vibration, ringing and the like.

The prompt information may be set according to a scene, such as "install counterfeit application", "please verify operation security", and the like, and the user may also customize the prompt information to further meet the personalized needs of the user.

It should be noted that none of the applications installed on the client is on the blacklist, which means that the client does not install the fraud application and can perform normal processing on the service request.

In the embodiment of the application, the application program identifier and the application program name may also be obtained from a legal application program database, a white list is generated, and all the application programs installed on the client are in the white list, which indicates that the client does not install a fraud application program, and normal processing may be performed on the service request.

The prompt method of the fraud application program of the embodiment of the application receives the service request of the client and judges whether the service request is a target type service; if the service request requests the target type service, acquiring an application program installation list installed in the client; detecting whether each application program in the application program installation list is in a blacklist or not; and if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client. Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time, the user is prompted, and the safety of the client is improved.

In a possible implementation manner of the embodiment of the present application, the blacklist may be continuously updated in practical application to further improve the security of the client, and different ways of updating the blacklist are described in detail below with reference to fig. 2 to 4.

Fig. 2 is a flowchart illustrating a method for prompting a fraud application according to a second embodiment of the present application.

As shown in fig. 2, the method for prompting a fraud-type application may include the following steps:

step 201, receiving feedback information sent by a client; wherein the feedback information comprises an application identification and an application name.

At step 202, the application identification and application name are stored in a blacklist.

In the embodiment of the application, in the actual application process, if the client is swindled by the fraud application or knows the fraud application, the feedback information can be sent to the server, wherein the feedback information comprises the application identifier and the application name, and after the feedback information sent by the client is received, the application identifier and the application name are stored in the blacklist, so that the blacklist can be continuously updated, the accuracy of the prompt of the fraud application is further improved, and the security of the client is further improved.

Fig. 3 is a flowchart illustrating a method for prompting a fraud application according to a third embodiment of the present application.

As shown in fig. 3, the method for prompting a fraud-type application may include the following steps:

step 301, monitoring operation information of the client within a preset time period.

Step 302, acquiring an operation application program identifier and an operation application program name corresponding to the operation information under the condition that the operation information meets the preset condition.

Step 303, store the operating application identification and operating application name in a blacklist.

In the embodiment of the application, operation information of the client in some time periods, such as operations of changing an application login password at a high frequency or paying at a high frequency, can be flexibly set according to needs, and the operation application identifier and the operation application name for performing the operations can be stored in the blacklist, so that the blacklist can be continuously updated, the accuracy of the prompt of the fraud application can be further improved, and the security of the client can be further improved.

Fig. 4 is a flowchart illustrating a method for prompting a fraud application according to a fourth embodiment of the present application.

As shown in fig. 4, the method for prompting a fraud application may include the following steps:

step 401, obtaining the identifiers of the application programs in the blacklist.

Step 402, analyzing each application program identifier and determining a target field in each application program identifier.

And step 403, acquiring the application program identifier matched with the target field and adding the application program identifier to a blacklist.

In the embodiment of the application, the application program identifier may be an application package name, each application program in the blacklist is a fraud application program, the application package name of the fraud application program is analyzed, a target field, such as beginning with a target field AAA, is obtained as the fraud application program, and thus, the application program identifier matching the target field AAA can be added to the blacklist, thereby further identifying the fraud application program and continuously updating the blacklist, improving the accuracy of the prompt of the fraud application program, and further improving the security of the client.

Fig. 5 is a flowchart illustrating a method for prompting a fraud application according to a fifth embodiment of the present application. As shown in fig. 5, the method for prompting a fraud application may include the following steps:

step 501, receiving a service request from a client, and determining whether the service request is a target type service.

In the embodiment of the application, one or more service requests sent by one or more clients can be received simultaneously; the service request may be a request of different services, such as a target type service request for extraction, payment, and the like; and for example, interactive service requests such as collection, sharing and comment can be specifically selected and set according to application scenes.

In the embodiment of the present application, after receiving a service request from a client, there are various ways to determine whether the service request is a target type service, which are described as follows.

In the first example, the service request is analyzed to obtain a request identifier, where the request identifier is a target type service identifier and is determined to be a target type service.

For example, the service request is analyzed, a white bar application identifier is obtained, and the target type service is determined.

In the second example, the service request is analyzed to obtain the request content, and the request content is matched with the target type service content and determined as the target type service.

Step 502, if the service request requests the target type service, acquiring an installation list of the application programs installed in the client.

In the embodiment of the application, after it is determined that the service request requests the target type service, an application installation list installed in the client is obtained, that is, all application information installed by the client is obtained.

In the embodiment of the present application, there are many ways to obtain the installation list of the application installed in the client, which are described as follows.

In a first example, an authorization acquisition permission request is sent to a client, after the receiving client has granted the acquisition permission, application program identifiers and corresponding application program names of all application programs installed in the client are collected, and an application program installation list is generated.

In a second example, an application information obtaining request is sent to a client, all pieces of installed application information sent by the client are received, and an application installation list is generated according to all pieces of installed application information.

Step 503, detecting whether the application program identifier and the application name of each application program in the application program installation list are matched with the application program identifier and the application name in the blacklist, if the application program identifier and the application name are matched with each other, intercepting the service request, and sending a prompt message through the client.

In the embodiment of the application, the application identifier can uniquely identify one application, and can be selectively set according to application requirements, such as an application package name.

In the embodiment of the application, any one of the application programs installed on the client is located in the blacklist, which means that the fraud application program installed on the client needs to intercept the target type service request, and the client sends the prompt message to realize the identification of the fraud application program aiming at the service request of the target type service, so that the related service request is intercepted in time and the user is prompted, and the security of the client is improved.

In the embodiment of the present application, there are many ways to send the prompt message through the client, and the prompt message may be selectively set according to the application scenario requirement, which is described as follows.

In the first example, the artificial intelligence voice device of the client is controlled to perform voice broadcasting voice prompt information.

In a second example, the interactive information popup of the client is controlled to send prompt text information, and the user can be further prompted to pay attention to the operation security in a mode of combining vibration, ringing and the like.

The prompt information may be set according to a scene, such as "install counterfeit application", "please verify operation security", and the like, and the user may also customize the prompt information to further meet the personalized needs of the user.

It should be noted that none of the applications installed on the client is on the blacklist, which means that the client does not install the fraud application and can perform normal processing on the service request.

Step 504, detecting whether each application program in the application program installation list is in the white list, and responding to the service request if each application program is in the white list.

The application program identification and the application program name are obtained from the legal application program database, a white list is generated, all the application programs installed on the client side are in the white list, the fact that the client side does not install the fraud application program is indicated, and normal processing can be conducted on the service request.

Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time, the user is prompted, and the safety of the client is improved.

In order to implement the above embodiments, the present application further provides a device for prompting a fraud application.

Fig. 6 is a schematic structural diagram of a prompting device for a fraud application according to a sixth embodiment of the present application.

As shown in fig. 6, the fraud application prompting device 600 may include: a receiving judgment module 601, a first obtaining module 602, a detection module 603, a processing module 604 and a prompt module 605.

The receiving and determining module 601 is configured to receive a service request from a client, and determine whether the service request is a target type service.

A first obtaining module 602, configured to obtain an installation list of applications installed in the client if the service request requests the target type service.

The detecting module 603 is configured to detect whether each application in the application installation list is in the blacklist.

A processing module 604, configured to intercept the service request if any one of the applications is in the blacklist.

And the prompt module 605 is configured to send prompt information through the client.

Further, in a possible implementation manner of the embodiment of the present application, referring to fig. 7, on the basis of the embodiment shown in fig. 6, the prompting device 600 for a fraud-type application may further include: a receiving module 606 and a first storing module 607.

A receiving module 606, configured to receive feedback information sent by a client; wherein the feedback information comprises an application identification and an application name.

A first storage module 607 for storing the application identification and the application name in the blacklist.

Further, in a possible implementation manner of the embodiment of the present application, referring to fig. 8, on the basis of the embodiment shown in fig. 6, the prompting device 600 for a fraud-type application may further include: a monitoring module 608, a second obtaining module 609 and a second storing module 610.

And the monitoring module 608 is configured to monitor operation information of the client within a preset time period.

The second obtaining module 609 is configured to obtain the operation application identifier and the operation application name corresponding to the operation information when the operation information meets the preset condition.

A second storing module 610, configured to store the operating application identifier and the operating application name in a blacklist.

Further, in a possible implementation manner of the embodiment of the present application, referring to fig. 9, on the basis of the embodiment shown in fig. 6, the prompting device 600 for a fraud-type application may further include: a third acquisition module 611, a determination module 612, and a fourth acquisition module 613.

The third obtaining module 611 is configured to obtain each application identifier in the blacklist.

The determining module 612 is configured to analyze each application identifier and determine a target field in each application identifier.

A fourth obtaining module 613, configured to obtain the application identifier that matches the target field and add the application identifier to the blacklist.

Further, in a possible implementation manner of the embodiment of the present application, the detecting module 603 is specifically configured to:

detecting whether the application program identification of each application program in the application program installation list is matched with the application program identification in the blacklist or not; and in the case of matching, detecting whether the application name of the matched application program is matched with the corresponding application name in the blacklist.

Further, in a possible implementation manner of the embodiment of the present application, the prompt module 605 is specifically configured to: and controlling the artificial intelligent voice equipment of the client to carry out voice broadcasting prompt information.

It should be noted that the above explanation of the embodiment of the method for prompting fraud applications is also applicable to the device for prompting fraud applications in this embodiment, and is not repeated herein.

The prompt device for the fraud application program of the embodiment of the application receives the service request of the client and judges whether the service request is a target type service; if the service request requests the target type service, acquiring an application program installation list installed in the client; detecting whether each application program in the application program installation list is in a blacklist or not; and if any one of the application programs is in the blacklist, intercepting the service request and sending prompt information through the client. Therefore, the fraud application program is identified aiming at the service request of the target type service, so that the related service request is intercepted in time, the user is prompted, and the safety of the client is improved.

In order to implement the foregoing embodiment, the present application further provides a server, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein when the processor executes the program, the method for prompting the fraud application program provided by the previous embodiment of the application is realized.

In order to implement the foregoing embodiments, the present application further proposes a non-transitory computer-readable storage medium storing a computer program, which when executed by a processor implements the method for prompting a fraud-type application as proposed by the foregoing embodiments of the present application.

In order to implement the foregoing embodiments, the present application also proposes a computer program product, which when executed by an instruction processor in the computer program product, executes the method for prompting a fraud-type application as proposed in the foregoing embodiments of the present application.

FIG. 10 illustrates a block diagram of an exemplary server suitable for use in implementing embodiments of the present application. The server 12 shown in fig. 10 is only an example, and should not bring any limitation to the function and the scope of use of the embodiments of the present application.

As shown in FIG. 10, the server 12 is in the form of a general purpose computing device. The components of the server 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.

Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. These architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, to name a few.

The server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by server 12 and includes both volatile and nonvolatile media, removable and non-removable media.

Memory 28 may include computer system readable media in the form of volatile Memory, such as Random Access Memory (RAM) 30 and/or cache Memory 32. The server 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 10, and commonly referred to as a "hard drive"). Although not shown in FIG. 10, a disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a Compact disk Read Only Memory (CD-ROM), a Digital versatile disk Read Only Memory (DVD-ROM), or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. Memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the application.

A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 42 generally perform the functions and/or methodologies of the embodiments described herein.

The server 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with the server 12, and/or with any devices (e.g., network card, modem, etc.) that enable the server 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Moreover, the server 12 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public Network such as the Internet) via the Network adapter 20. As shown in FIG. 10, the network adapter 20 communicates with the other modules of the server 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the server 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.

The processing unit 16 executes various functional applications and data processing by executing programs stored in the system memory 28, for example, implementing the method of prompting for fraud-type applications mentioned in the foregoing embodiments.

In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.

Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.

Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present application in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.

The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.

It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. If implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.

It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.

In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.

The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

19页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种基于联盟链和物联网的散养猪溯源防伪系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!