CN106685796B - A kind of information identifying method, device and system - Google Patents
A kind of information identifying method, device and system Download PDFInfo
- Publication number
- CN106685796B CN106685796B CN201610494211.4A CN201610494211A CN106685796B CN 106685796 B CN106685796 B CN 106685796B CN 201610494211 A CN201610494211 A CN 201610494211A CN 106685796 B CN106685796 B CN 106685796B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- instant communication
- communication information
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a kind of information identifying method, device and system;The present embodiment is using reception instant communication information, determine whether transmission user belongs to default linkman set according to the user identifier carried in the instant communication information, if so, extracting the content of the instant communication information, the instant communication information is identified according to the content;Otherwise, if being not belonging to default linkman set, the instant communication information is identified according to the user identifier;The program can substantially improve interception effect, improve the safety of information.
Description
Technical field
The present invention relates to fields of communication technology, and in particular to a kind of information identifying method, device and system.
Background technology
In recent years, the communication technology has obtained development at full speed, at the same time, various harassing and wrecking short messages and swindle
Information is also increasingly to spread unchecked, for this purpose, how these information being identified and be intercepted, also at concerned problem.
In the prior art, generally information can be identified and intercepted by the way of white and black list, than
Such as, when terminal receives a short message, it can be determined that the number belonging to the short message whether in white list, if in white list,
Then without intercepting, otherwise, if not in white list, judge whether the number belonging to the short message is located in blacklist, if
In blacklist, then intercepted, if not in blacklist, without interception, etc..This mode, to a certain extent may be used
It is intercepted with the junk information to a part, such as harassing and wrecking short message and fraud information etc., still, due to existing many rubbish
Information is all checked numbers by pseudo-base station and is pretended, for example, the number for the operator that disguises oneself as or user contact when sending
Number, etc., therefore, for such information, interception can not be reached by the way of white and black list
Effect, moreover, because be the disguise oneself as number of operator or the number of user contact, therefore, the probability that user is cheated also compared with
Greatly, user's property loss is easily caused, or so that user terminal is invaded by viral wooden horse, that is to say, that existing side
Case interception effect is simultaneously bad, leverages the safety of information.
Invention content
A kind of information identifying method of offer of the embodiment of the present invention, device and system, can improve interception effect, improve information
Safety.
The embodiment of the present invention provides a kind of information identifying method, including:
Instant communication information is received, the instant communication information carries the user identifier for sending user;
Determine whether the transmission user belongs to default linkman set according to the user identifier;
If belonging to default linkman set, the content of the instant communication information is extracted, determines whether the content is full
Sufficient preset condition intercepts the instant communication information if meeting condition, if being unsatisfactory for condition, according to the use
The instant communication information is identified in family mark;
If being not belonging to default linkman set, the instant communication information is identified according to the user identifier.
Correspondingly, the embodiment of the present invention also provides a kind of information recognition device, including:
Receiving unit, for receiving instant communication information, the instant communication information carries the user identifier for sending user;
Determination unit, for determining whether the transmission user belongs to default linkman set according to the user identifier;
First recognition unit, for when determination unit determines that the transmission user belongs to default linkman set, extracting
The content of the instant communication information, determines whether the content meets preset condition, if satisfied, then believing the instant messaging
Breath is intercepted;It is executed according to the user identifier to the instant communication information if not satisfied, then triggering the second recognition unit
The operation being identified;
Second recognition unit, for when determination unit determines that the transmission user is not belonging to default linkman set, or
Person, when the first recognition unit determines that the content is unsatisfactory for preset condition, according to the user identifier to the instant messaging
Information is identified.
In addition, the embodiment of the present invention also provides a kind of information identification system, including any that the embodiment of the present invention is provided
Kind information recognition device.
The embodiment of the present invention is true according to the user identifier carried in the instant communication information using reception instant communication information
Whether fixed transmission user belongs to default linkman set, if so, the content of the instant communication information is extracted, according to the content
The instant communication information is identified;Otherwise, instant to this according to the user identifier if being not belonging to default linkman set
Communication information is identified;Since the program is for presetting the instant communication information transmitted by the user in linkman set,
It can make further identification by extracting content, it can thus be avoided due to sending user to user mark, such as phone number
The generation for pretend the situation of caused identification mistake, can substantially improve interception effect, improve the safety of information.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 a are the schematic diagram of a scenario of information identifying method provided in an embodiment of the present invention;
Fig. 1 b are the flow diagrams of information identifying method provided in an embodiment of the present invention;
Fig. 2 is another flow diagram of information identifying method provided in an embodiment of the present invention;
Fig. 3 a are the structural schematic diagrams of information recognition device provided in an embodiment of the present invention;
Fig. 3 b are another structural schematic diagrams of information recognition device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, the every other implementation that those skilled in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
A kind of information identifying method of offer of the embodiment of the present invention, device and system.
Wherein, which may include information recognition device, which can specifically be integrated in
In terminal, in addition, the information identification system can also include other equipment, such as server (such as cloud device), it is used for
Receive terminal transmission key message when, which is verified, for example, can by the key message with it is preset
High in the clouds verification information is matched, and returns to matching result to terminal, etc..
For example, as shown in Figure 1a, which can receive instant communication information, then, according in the instant communication information
The user identifier of carrying determines whether transmission user belongs to default linkman set, if so, extracting the instant communication information
Content, instant communication information is identified according to the content, for example, can by extracting the key message in the content,
The key message is supplied to server, and receives the matching result of server return, need are determined whether according to matching result
The instant communication information is carried out intercepting, etc.;Otherwise, if the user identifier is not belonging to preset linkman set, for example,
The user is then identified instant communication information according to the user identifier not in address list, for example, using blacklist and/or
The mode of white list is filtered and intercepts, etc., is not influencing existing instant communication information processing block as far as possible to realize
Under the premise of frame, improves interception effect, the purpose of Information Security is provided.
It is described in detail separately below, it should be noted that, the serial number of following embodiment is not as embodiment priority
Limitation.
Embodiment one,
The present embodiment will be described from the angle of information recognition device, which can specifically be integrated in end
End, for example receive in terminal, the terminal may include mobile phone, tablet computer, laptop or personal computer (PC,
Personal Computer) etc. equipment.
A kind of information identifying method, including:Instant communication information is received, which carries the use for sending user
Family identifies;Determine whether transmission user belongs to default linkman set according to the user identifier;If so, extracting the Instant Messenger
The content for interrogating information, is identified the instant communication information according to the content;If it is not, then instant to this according to the user identifier
Communication information is identified.
As shown in Figure 1 b, the detailed process of the information identifying method can be as follows:
101, instant communication information is received.
The instant communication information that terminal is sent is sent for example, can specifically receive, wherein the instant communication information can be taken
With information such as the user identifiers for sending user.
Wherein, which may include the communication information in short message, multimedia message and each instant messaging application
Etc. information;The user identifier may include terminal iidentification, such as user identity identification code (SIM, Subscriber Identity
) or the International Mobile Station Equipment Identification of terminal (IMEI, International Mobile Equipment Identity) Module
Deng alternatively, the user identifier can also include the information such as user's name, subscriber mailbox, and/or the Instant Messenger of user signal.
102, determine whether transmission user belongs to default linkman set according to the user identifier, if so, executing step
Rapid 103, if it is not, thening follow the steps 104.
Wherein, which can in advance be established according to the demand of practical application, which includes
At least one contact person, for example, the linkman set is specifically as follows the reception terminal local or high in the clouds preserves address list, connection
It is that people is thin, and/or buddy list etc..
It, then at this point, can for example, it is specially address list to preset linkman set with this, and for transmission user is Zhang San
To determine whether the Zhang San belongs in address list according to the user identifier, if in address list, 103 are thened follow the steps,
Otherwise, if Zhang San thens follow the steps 104 not in address list.
103, the content for extracting the instant communication information is identified the instant communication information according to the content;For example,
It can be as follows:
Determine whether the content meets preset condition, if so, being intercepted to the instant communication information;If it is not, then basis
The instant communication information is identified in the user identifier, that is, executes step 104.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets
If the mode of condition can also there are many, for example, can be identified (i.e. in the reception terminal local) local, alternatively,
It can be identified beyond the clouds, alternatively, can be combined with local and high in the clouds identifies together, etc., i.e., step " determines that the content is
It is no to meet preset condition " it can specifically include:
Key message is extracted from the content, which is matched with preset local authentication information, if
Match, it is determined that the content meets preset condition;If mismatching, it is determined that the content is unsatisfactory for preset condition.
Wherein, which can extract according to preset rules, for example, multiple keywords can be pre-set,
Such as " prize-winning ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to which the class for the content that some needs extract is arranged
Type, such as network address, telephone number and/or account etc..
After being extracted key message, can by the key message of extraction and preset local authentication information, such as
Preset keyword, network address, telephone number and/or account etc. are matched, if for example, including net in the key message of extraction
Location " 123456789.com ", and there is also " 123456789.com " in preset local authentication information, than as already indicated
Website corresponding to network address " 123456789.com " is swindle network address, then at this point, can determine that the instant communication information is swindleness
Information is deceived, so, which is intercepted, otherwise, if being not present in preset local authentication information
The relative recording of " 123456789.com ", then at this point it is possible to which the instant communication information is identified according to the user identifier,
Execute step 104.
Wherein, local authentication information can be pre-stored in local (i.e. reception terminal according to the demand of practical application
In), optionally, in order to improve the accuracy of identification, can also timing or the local authentication information is updated in real time.
Optionally, in order to improve the accuracy of identification, if there is currently networks, for example, the reception terminal has been networked, then also
Can the key message be sent to cloud device to be identified, i.e., in step " by the key message and testing in default template
Card information is matched " before, which can also include:
It determines whether to have networked;If failed cluster, execute by the key message and preset local authentication information into
The step of row matching;If having networked, the key message is sent to cloud device, reception cloud device is by the key message and in advance
If high in the clouds verification information matched after the matching result that returns, if matching result instruction matching, it is determined that the content is full
Sufficient preset condition, if matching result instruction mismatches, it is determined that the content is unsatisfactory for preset condition.
Wherein, high in the clouds verification information can be pre-stored according to the demand of practical application in cloud device, optionally, be
The accuracy of identification is improved, it can also periodically or to the end, verification information is updated in real time, for example, can be according to network
In each reporting of user or the information of report the verification information to the high in the clouds is updated, etc. in real time.
Optionally, can also the key message be directly sent to cloud device to be identified, i.e., step " determines that this is interior
Whether appearance meets preset condition " can also include:
Key message is extracted from the content;The key message is sent to cloud device, so that cloud device is by the key
Information is matched with preset high in the clouds verification information;Receive the matching result that cloud device returns;If the matching result indicates
Matching, it is determined that the content meets preset condition;If matching result instruction mismatches, it is determined that the content is unsatisfactory for default item
Part.
104, the instant communication information is identified according to the user identifier, for example, specifically can be as follows:
Determine whether transmission user is the user preset in blacklist according to the user identifier, if so, instant to this
Communication information is intercepted;If it is not, the instant communication information is then shown, alternatively, using preset rules to the instant communication information
After being filtered, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set
It is single, i.e., before step " user during whether transmission user is default blacklist determined according to the user identifier ", the information
Recognition methods can also include:
Determine whether transmission user is the user preset in white list according to the user identifier, if so, display should be i.e.
When communication information;Determine whether transmission user is the user preset in blacklist according to the user identifier if it is not, just executing
Step.
Wherein, blacklist refers to that intransitable user is arranged, and white list is then with blacklist on the contrary, refer to being arranged
Can by user.
Optionally, it is operated in order to facilitate user, it, can also basis after being intercepted to the instant communication information
The instant communication information generates prompting message, and shows the prompting message.
Wherein, can also include interface for asking to verify information in the prompting message, i.e. the interface is main
Checking request instruction for receiving user's triggering, to be verified to the instant communication information, for example, making further deep
Verification, or even carry out manual verification, etc., i.e., after step " showing the prompting message ", which can be with
Including:
The checking request instruction triggered by interface user, cloud device is sent to by the checking request instruction,
Receive the verification result that cloud device is returned according to the checking request instruction.
In this way, user can determine whether the instant communication information is safe according to the verification result, such as, if for swindleness
Deceive short message or promote short message, etc., to facilitate user to make further operation, for example, instant communication information institute is right
The transmission user answered pulls in blacklist, is added to contact person or to the instant communication information report, etc., herein not
It repeats again.
From the foregoing, it will be observed that the present embodiment, which uses, receives instant communication information, according to the user carried in the instant communication information
Mark determines whether transmission user belongs to default linkman set, if so, the content of the instant communication information is extracted, according to
The instant communication information is identified in the content;Otherwise, if default linkman set is not belonging to, according to the user identifier pair
The instant communication information is identified;Since the program is believed for presetting the instant messaging transmitted by the user in linkman set
Breath can make further identification, it can thus be avoided due to sending user to user mark, such as hand by extracting content
Machine number pretend the generation of the situation of caused identification mistake, can substantially improve interception effect, improve the peace of information
Quan Xing.
Embodiment two,
According to method described in embodiment one, citing is described in further detail below.
In the present embodiment, it will be specifically integrated in terminal A with the information recognition device, and the instant communication information is specific
To be illustrated for short message.
As shown in Fig. 2, a kind of information identifying method, detailed process can be as follows:
201, terminal A receives the short message that user's first is sent by terminal B, wherein the short message can carry user's first
The information such as user identifier.
The user identifier may include terminal iidentification, such as SIM card number (such as phone number) or IMEI code etc., alternatively,
The user identifier can also include the information such as user's name, subscriber mailbox, and/or the Instant Messenger of user signal.
202, terminal A determines whether user's first belongs to default linkman set according to the user identifier, if so, executing step
Rapid 203, if it is not, thening follow the steps 205.
Wherein, which can in advance be established according to the demand of practical application, which includes
At least one contact person, for example, the linkman set is specifically as follows the reception terminal local or high in the clouds preserves address list, connection
It is that people is thin, and/or buddy list etc..
For example, it is specially address list to preset linkman set with this, and for the user identifier is cell-phone number, then at this point,
It can specifically determine that the cell-phone number of user's first whether in the address list of terminal A, if in address list, thens follow the steps
203, otherwise, if not being located in address list, then follow the steps 204.
203, terminal A extracts the content of the short message, determines whether the content meets preset condition, if so, executing step
Rapid 204, if it is not, thening follow the steps 205.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets
If the mode of condition can also there are many, for example, any one following mode may be used:
(1) first way;
Terminal A extracts key message from the content, by the local authentication information preserved in the key message and terminal A into
Row matching, if matching, it is determined that the content meets preset condition, executes step 204;If mismatching, it is determined that the content is discontented
Sufficient preset condition executes step 205.
(2) second way;
Terminal A extracts key message from the content, sends the key message to cloud device, cloud device is receiving
After the key message, which is matched with preset high in the clouds verification information, obtain matching result, and by the matching
As a result terminal A is returned to, if matching result instruction matching, terminal A determine that the content meets preset condition, execute step
204;If matching result instruction mismatches, terminal A determines that the content is unsatisfactory for preset condition, executes step 205.
(3) the third mode;
Terminal A extracts key message from the content, and determines whether to have networked;If failed cluster, by the key
Information is matched with the local authentication information preserved in terminal A, if matching, it is determined that the content meets preset condition, executes
Step 204;If mismatching, it is determined that the content is unsatisfactory for preset condition, executes step 205;Otherwise, if currently having networked,
The key message is sent to cloud device, cloud device is after receiving the key message, by the key message and preset cloud
End verification information is matched, and obtains matching result, and the matching result is returned to terminal A, if matching result instruction
Match, then terminal A determines that the content meets preset condition, executes step 204;If matching result instruction mismatches, terminal A is true
The fixed content is unsatisfactory for preset condition, executes step 205.
Wherein, which can extract according to preset rules, for example, multiple keywords can be pre-set,
Such as " prize-winning ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to which the class for the content that some needs extract is arranged
Type, such as network address, telephone number and/or Bank Account Number etc. can use canonical then when needing to extract key message
The method matched extracts network address, such as uniform resource locator (URL, Uniform Resource from the short message
Locator), and/or Bank Account Number and telephone number etc. are extracted, to obtain key message.
It, can be by the key message of extraction and preset local authentication information or high in the clouds after being extracted key message
Verification information, such as preset keyword, network address, telephone number and/or Bank Account Number etc. are matched, if for example, extraction
Include Bank Account Number " 123456789 " and telephone number " 19000000000 " in key message, and is verified in preset high in the clouds
Indicate that Bank Account Number " 123456789 " and telephone number " 19000000000 " institute are right in information (or local authentication information)
The short message answered is swindle network address, then at this point, can determine that the short message is fraud information, so, which is carried out
It intercepts, that is, executes step 204;Otherwise, if bank's account is not present in preset high in the clouds verification information (or local authentication information)
The relative recording of number " 123456789 " and telephone number " 19000000000 ", then at this point it is possible to according to the user of user's first
The short message is identified in mark, that is, executes step 205.
It should be noted that in order to improve the accuracy of identification, it can be periodically or in real time to the local authentication information and cloud
End verification information is updated, for example, the information that each terminal is reported or reported on network can be received by cloud device, then
It is identified and counts according to these information, and high in the clouds verification information is updated based on statistical result.Further, it is also possible to by
Cloud device timing is in real time updated the local authentication information in terminal, alternatively, can also be by terminal according to itself
Demand timing or download corresponding update packet to cloud device in real time, to be carried out more to the local authentication information in terminal
New, etc., details are not described herein.
204, terminal A intercepts the short message.
For example, the short message can be added in preset interception file by terminal A, without in corresponding short message
Display in inbox (normal short message can be shown in inbox), alternatively, the short message can also be deleted directly.
Optionally, it operates in order to facilitate user, after being intercepted to the short message, short can also be disappeared according to this
Breath generates prompting message, and shows the prompting message, for example, can be in the form of pop-up, wicket or short message, in terminal A
Screen on show the prompting message.
Wherein, the network address etc. for may include the phone of alarm in the prompting message and reporting or reporting.
Optionally, it in the prompting message can also include for asking to verify information interface, in this way, working as user
After second receives the prompting message by terminal A, corresponding checking request instruction can be triggered by the interface so that terminal
The checking request instruction is sent to cloud device by A, further to be verified, such as make further deep verification or into
Then row manual verification, etc. receives the verification result that cloud device returns, in this way, user's second can be according to the verification knot
Fruit determines whether the short message is safe, such as, if it is fraud text message or distribution short message, etc., to facilitate user's second to make
Further operation, for example, transmission user's first corresponding to the short message is pulled in blacklist, is added to contact person or right
The short message report, etc., and details are not described herein.
205, terminal A determines whether user's first is the user preset in white list according to the user identifier, if so, holding
Row step 207;If it is not, thening follow the steps 206.
If for example, saving 3 telephone numbers in white list:" 19000000001 ", " 19000000002 " and
" 19000000003 ", and the telephone number of user's first is " 19000000000 ", then at this point, can determine that user's first does not belong to
User in the white list then executes step 206;If conversely, the telephone number of user's first be " 19000000001 ",
Any one in " 19000000002 " and " 19000000003 ", for example be " 19000000001 ", then at this point, it can be true
Fixed user's first belongs to the user in the white list, then executes step 207.
206, terminal A determines whether transmission user is the user preset in blacklist according to the user identifier, if so,
204 are returned to step, if it is not, thening follow the steps 207.
If for example, saving 2 telephone numbers in blacklist:" 19000000000 " and " 19000000004 ", and user
The telephone number of first is " 19000000000 ", then at this point, can determine that user's first belongs to the user in the blacklist, in
It is to be intercepted to the short message, that is, returns to step 204;If conversely, the telephone number of user's first be except
Other numbers except " 19000000000 " and " 19000000004 ", for example, for " 19000000005 " or
" 19000000006 " then execute step then at this point, can determine that user's first is not belonging to the user in the blacklist
207。
207, terminal A does not intercept the short message, for example, can show the short message, such as in the receipts of short message
The short message, etc. is shown in part case.
From the foregoing, it will be observed that the terminal of the present embodiment is after receiving short message, it can be according to the user carried in the short message
Mark, which determines, sends whether user belongs to default linkman set, if so, the content of the short message is extracted, according to the content pair
The short message is identified;Otherwise, if being not belonging to default linkman set, the short message is known according to the user identifier
Not;Due to the program for preset linkman set in user transmitted by short message, can by extract content make into
One step identifies, it can thus be avoided identified due to sending user to user, for example phone number carries out pretending caused identification
The generation of the situation of mistake can substantially improve interception effect, improve the safety of information, attenuating user terminal is invaded and wealth
Produce the probability of loss;Further, since after having intercepted short message, corresponding prompting message can also be generated, and is provided corresponding
Interface is verified, so, the convenience and friendly of operation can also be improved.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of information recognition device, as shown in Figure 3a,
The information recognition device includes receiving unit 301, determination unit 302, the first recognition unit 303 and the second recognition unit 304, such as
Under:
(1) receiving unit 301;
Receiving unit 301, for receiving instant communication information.
For example, receiving unit 301, specifically can be used for receiving the instant communication information for sending terminal transmission, wherein should be i.e.
When communication information can carry the information such as user identifier for sending user.
Wherein, which may include the communication information in short message, multimedia message and each instant messaging application
Etc. information;The user identifier may include terminal iidentification, such as the IMEI etc. of SIM or terminal, alternatively, the user identifier can also
Including information such as user's name, subscriber mailbox, and/or the Instant Messenger of user signals.
(2) determination unit 302;
Determination unit 302, for determining whether transmission user belongs to default linkman set according to the user identifier.
Wherein, which can in advance be established according to the demand of practical application, which includes
At least one contact person, for example, the linkman set is specifically as follows the reception terminal local or high in the clouds preserves address list, connection
It is that people is thin, and/or buddy list etc..
(3) first recognition units 303;
First recognition unit 303, for determination unit 302 determine transmission user belong to default linkman set when,
The content for extracting the instant communication information is identified the instant communication information according to the content.
For example, first recognition unit 303, is specifically determined for whether the content meets preset condition;If so, right
The instant communication information is intercepted;It is executed according to the user identifier to the Instant Messenger if it is not, then triggering the second recognition unit 304
The operation that news information is identified.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets
If the mode of condition can also there are many, for example, can be identified (i.e. in the reception terminal local) local, alternatively,
It can be identified beyond the clouds, alternatively, can be combined with local and high in the clouds identifies together, etc., i.e.,:
First recognition unit 303, specifically for extracting key message from the content, by the key message with it is preset
Local authentication information is matched, if matching, it is determined that the content meets preset condition, if mismatching, it is determined that the content is not
Meet preset condition.
Wherein, which can extract according to preset rules, for example, multiple keywords can be pre-set,
Such as " prize-winning ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to which the class for the content that some needs extract is arranged
Type, such as network address, telephone number and/or account etc..
Wherein, local authentication information can be pre-stored in local (i.e. reception terminal according to the demand of practical application
In), optionally, in order to improve the accuracy of identification, can also timing or the local authentication information is updated in real time.
Optionally, in order to improve the accuracy of identification, if there is currently networks, for example, the reception terminal has been networked, then also
Can the key message be sent to cloud device to be identified, i.e.,:
First recognition unit 303 can be also used for determining whether to have networked;If failed cluster, execute the pass
Key information carries out matched operation with preset local authentication information;If having networked, the key message is sent to cloud device,
The matching result returned after cloud device is matched the key message with preset high in the clouds verification information is received, if the matching
As a result instruction matching, it is determined that the content meets preset condition, if matching result instruction mismatches, it is determined that the content is discontented
Sufficient preset condition.
Wherein, high in the clouds verification information can be pre-stored according to the demand of practical application in cloud device, optionally, be
The accuracy of identification is improved, it can also periodically or to the end, verification information is updated in real time, for example, can be according to network
In each reporting of user or the information of report the verification information to the high in the clouds is updated, etc. in real time.
Optionally, directly to be identified, i.e., the key message can also be sent to cloud device:
First recognition unit 303 specifically can be used for extracting key message from the content;Being sent to cloud device should
Key message, so that cloud device matches the key message with preset high in the clouds verification information;Cloud device is received to return
The matching result returned;If matching result instruction matching, it is determined that the content meets preset condition;If the matching result indicates not
Matching, it is determined that the content is unsatisfactory for preset condition.
(4) second recognition units 304;
Second recognition unit 304, for determining that transmission user is not belonging to default linkman set in determination unit 302
When, alternatively, when the first recognition unit determines that the content of the instant communication information is unsatisfactory for preset condition, according to the user identifier
The instant communication information is identified.
For example, second recognition unit 304, specifically can be used for according to the user identifier determine transmission user whether be
User in default blacklist;If so, being intercepted to the instant communication information;If it is not, then show the instant communication information,
Alternatively, after being filtered to the instant communication information using preset rules, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set
It is single, i.e.,:
Second recognition unit 304 can be also used for determining whether transmission user is default white according to the user identifier
User in list;If so, showing the instant communication information;Determine that the transmission is used according to the user identifier if it is not, then executing
Whether family is the operation for presetting the user in blacklist.
Wherein, blacklist refers to that intransitable user is arranged, and white list is then with blacklist on the contrary, refer to being arranged
Can by user.
Optionally, it is operated in order to facilitate user, it, can also basis after being intercepted to the instant communication information
The instant communication information generates prompting message, and shows the prompting message, i.e., as shown in Figure 3b, which can be with
It is as follows including reminding unit 305:
The reminding unit 305, can be used for after being intercepted to the instant communication information, be believed according to the instant messaging
Breath generates prompting message, shows the prompting message.
Wherein, can also include interface for asking to verify information in the prompting message, i.e.,:
The reminding unit 305 can be also used for the checking request instruction triggered by interface user, by the verification
Request instruction is sent to cloud device, receives the verification result that cloud device is returned according to the checking request instruction.
In this way, user can determine whether the instant communication information is safe according to the verification result, such as, if for swindleness
Deceive short message or promote short message, etc., to facilitate user to make further operation, for example, instant communication information institute is right
The transmission user answered pulls in blacklist, is added to contact person or to the instant communication information report, etc., herein not
It repeats again.
When it is implemented, above each unit can be realized as independent entity, arbitrary combination can also be carried out, is made
It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not
It repeats again.
The information recognition device can specifically be integrated in terminal, for example receive in terminal, which may include mobile phone, puts down
The equipment such as plate computer, laptop or PC.
From the foregoing, it will be observed that the receiving unit 301 of the information recognition device of the present embodiment can receive instant communication information, so
Afterwards, determine whether transmission user belongs to default according to the user identifier carried in the instant communication information by determination unit 302
Linkman set, if so, by the first recognition unit 303 extract the instant communication information content, be to this according to the content
When communication information be identified;Otherwise, if default linkman set is not belonging to, by the second recognition unit 304 according to the user
The instant communication information is identified in mark;Since the program is instant transmitted by the user in linkman set for presetting
Communication information can make further identification by extracting content, it can thus be avoided due to sending user to user mark,
For example phone number pretend the generation of the situation of caused identification mistake, can substantially improve interception effect, improve letter
The safety of breath.
Example IV,
Correspondingly, the embodiment of the present invention provides a kind of information identification system, including any that the embodiment of the present invention is provided
Kind information recognition device, for details, reference can be made to embodiments three.Wherein, which can specifically integrate in the terminal, example
It such as, can be as follows:
Terminal, for receiving instant communication information, which carries the user identifier for sending user;According to this
User identifier determines whether transmission user belongs to default linkman set;If so, the content of the instant communication information is extracted,
The instant communication information is identified according to the content;If it is not, then being carried out to the instant communication information according to the user identifier
Identification.
For example, the terminal, specifically can be used for when determining that transmission user belongs to default linkman set, extraction should be i.e.
When communication information content, determine whether the content meets preset condition, if so, being intercepted to the instant communication information;If
It is no, then the instant communication information is identified according to the user identifier.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets
If the mode of condition can also there are many, for details, reference can be made to the embodiments of front, and details are not described herein.
Wherein, the mode instant communication information being identified according to the user identifier can also there are many, for example, can
With as follows:
Terminal specifically can be used for determining whether transmission user is the use preset in blacklist according to the user identifier
Family, if so, being intercepted to the instant communication information;If it is not, the instant communication information is then shown, alternatively, using default rule
After being then filtered to the instant communication information, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set
It is single, i.e.,:
Terminal specifically can be used for determining whether transmission user is the use preset in white list according to the user identifier
Family, if so, showing the instant communication information;Determine whether transmission user is pre- according to the user identifier if it is not, just executing
If the operation of the user in blacklist.
Wherein, blacklist refers to that intransitable user is arranged, and white list is then with blacklist on the contrary, refer to being arranged
Can by user.
Optionally, it is operated in order to facilitate user, after being intercepted to the instant communication information, which may be used also
It to generate prompting message according to the instant communication information, and shows the prompting message, refers to the embodiment of front, it is no longer superfluous herein
It states.
In addition, the information identification system can also include other equipment, such as cloud device, it is as follows:
Cloud device, for when receiving the key message of terminal transmission, being verified to the key message, for example,
The key message can be matched with preset high in the clouds verification information, and returns to matching result to terminal, etc..
The specific implementation of above each equipment can be found in the embodiment of front, and details are not described herein.
Since the information identification system may include any information recognition device that the embodiment of the present invention is provided, because
This, may be implemented the advantageous effect achieved by any information recognition device that the embodiment of the present invention is provided, and refer to front
Embodiment, details are not described herein.
Embodiment five,
Correspondingly, the embodiment of the present invention also provides a kind of terminal, can integrate the embodiment of the present invention provided it is any
Information recognition device.As shown in figure 4, the terminal may include radio frequency (RF, Radio Frequency) circuit 401, include one
A or more than one computer readable storage medium memory 402, input unit 403, display unit 404, sensor 405,
Voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407 including there are one or more than one at
Manage the components such as processor 408 and the power supply 409 of core.It will be understood by those skilled in the art that terminal knot shown in Fig. 4
The restriction of structure not structure paired terminal may include either combining certain components or not than illustrating more or fewer components
Same component arrangement.Wherein:
RF circuits 401 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 408 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuits 401 include but not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier
(LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuits 401 can also by radio communication with network and its
He communicates equipment.The wireless communication can use any communication standard or agreement, including but not limited to global system for mobile telecommunications system
Unite (GSM, Global System of Mobile communication), general packet radio service (GPRS, General
Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more
Location (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term
Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 402 can be used for storing software program and module, and processor 408 is stored in memory 402 by operation
Software program and module, to perform various functions application and data processing.Memory 402 can include mainly storage journey
Sequence area and storage data field, wherein storing program area can storage program area, the application program (ratio needed at least one function
Such as sound-playing function, image player function) etc.;Storage data field can be stored uses created data according to terminal
(such as audio data, phone directory etc.) etc..In addition, memory 402 may include high-speed random access memory, can also include
Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memory 402 can also include Memory Controller, to provide processor 408 and input unit 403 to memory 402
Access.
Input unit 403 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating lever, optics or the input of trace ball signal.Specifically, in a specific embodiment
In, input unit 403 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or tactile
Control plate, collect user on it or neighbouring touch operation (such as user using any suitable object such as finger, stylus or
Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula
It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined
The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from
Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 408, and can reception processing
Order that device 408 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 403 can also include other input equipments.Specifically, other are defeated
Enter equipment and can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse
It is one or more in mark, operating lever etc..
Display unit 404 can be used for showing information input by user or be supplied to user information and terminal it is various
Graphical user interface, these graphical user interface can be made of figure, text, icon, video and its arbitrary combination.Display
Unit 404 may include display panel, optionally, may be used liquid crystal display (LCD, Liquid Crystal Display),
The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further
, touch sensitive surface can cover display panel, when touch sensitive surface detects on it or after neighbouring touch operation, send processing to
Device 408 is followed by subsequent processing device 408 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event
Visual output.Although in Fig. 4, touch sensitive surface and display panel are to realize input and input as two independent components
Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or the back of the body when terminal is moved in one's ear
Light.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) acceleration
Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 406, loud speaker, microphone can provide the audio interface between user and terminal.Voicefrequency circuit 406 can
By the transformed electric signal of the audio data received, it is transferred to loud speaker, voice signal output is converted to by loud speaker;It is another
The voice signal of collection is converted to electric signal by aspect, microphone, and audio data is converted to after being received by voicefrequency circuit 406, then
After the processing of audio data output processor 408, through RF circuits 401 to be sent to such as another terminal, or by audio data
Output is further processed to memory 402.Voicefrequency circuit 406 is also possible that earphone jack, with provide peripheral hardware earphone with
The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 407
Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 4 is shown
WiFi module 407, but it is understood that, and it is not belonging to must be configured into for terminal, it can not change as needed completely
Become in the range of the essence of invention and omits.
Processor 408 is the control centre of terminal, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 402, and call and be stored in memory 402
Data execute the various functions and processing data of terminal, to carry out integral monitoring to mobile phone.Optionally, processor 408 can wrap
Include one or more processing cores;Preferably, processor 408 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 408.
Terminal further includes the power supply 409 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 408 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.Power supply 409 can also include one or more direct current or AC power, recharging system, power failure inspection
The random components such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal can also include camera, bluetooth module etc., and details are not described herein.Specifically in this implementation
In example, the processor 408 in terminal can be corresponding by the process of one or more application program according to following instruction
Executable file is loaded into memory 402, and runs the application program being stored in memory 402 by processor 408, from
And realize various functions:
Instant communication information is received, which carries the user identifier for sending user;According to the user identifier
Determine whether transmission user belongs to default linkman set;If so, the content of the instant communication information is extracted, it is interior according to this
The instant communication information is identified in appearance;If it is not, then the instant communication information is identified according to the user identifier.
For example, the processor 408, can execute for realizing the application program of following function:
When determining that transmission user belongs to default linkman set, the content of the instant communication information is extracted, determining should
Whether content meets preset condition, if so, being intercepted to the instant communication information;If it is not, then according to the user identifier to this
Instant communication information is identified.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets
If the mode of condition can also there are many, for details, reference can be made to the embodiments of front, and details are not described herein.
Wherein, the mode instant communication information being identified according to the user identifier can also there are many, i.e., at this
Device 408 is managed, can be executed for realizing the application program of following function:
Determine whether transmission user is the user preset in blacklist according to the user identifier, if so, instant to this
Communication information is intercepted;If it is not, the instant communication information is then shown, alternatively, using preset rules to the instant communication information
After being filtered, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set
List, the i.e. processor 408, can also be performed for realizing the application program of following function:
Determine whether transmission user is the user preset in white list according to the user identifier, if so, display should be i.e.
When communication information;Determine whether transmission user is the user preset in blacklist according to the user identifier if it is not, just executing
Operation.
Optionally, it is operated in order to facilitate user, it, can also basis after being intercepted to the instant communication information
The instant communication information generates prompting message, and shows the prompting message.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the terminal of the present embodiment is after receiving instant communication information, it can be according to the instant communication information
The user identifier of middle carrying determines whether transmission user belongs to default linkman set, if so, extracting instant messaging letter
The content of breath is identified the instant communication information according to the content;Otherwise, if being not belonging to default linkman set, root
The instant communication information is identified according to the user identifier;Since the program is sent out for presetting the user in linkman set
The instant communication information sent, can by extract content make further identification, it can thus be avoided due to send user to
Family identifies, for example phone number pretend the generation of the situation of caused identification mistake, can substantially improve interception effect,
Improve the safety of information.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage
Medium may include:Read-only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
Be provided for the embodiments of the invention a kind of information identifying method above, device and system are described in detail,
Principle and implementation of the present invention are described for specific case used herein, and the explanation of above example is only used
In facilitating the understanding of the method and its core concept of the invention;Meanwhile for those skilled in the art, think of according to the present invention
Think, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as pair
The limitation of the present invention.
Claims (13)
1. a kind of information identifying method, which is characterized in that including:
Instant communication information is received, the instant communication information carries the user identifier for sending user;
Determine whether the transmission user belongs to default linkman set according to the user identifier;
If belonging to default linkman set, the content of the instant communication information is extracted, crucial letter is extracted from the content
Breath, the key message is matched with preset local authentication information or high in the clouds verification information, if matching, is to described
When communication information intercepted, if mismatch, the instant communication information is identified according to the user identifier;
If being not belonging to default linkman set, the instant communication information is identified according to the user identifier;
It is described that the instant communication information is identified according to the user identifier, including:It is determined according to the user identifier
It is described to send whether user is the user preset in blacklist, if so, being intercepted to the instant communication information;If it is not,
Then show the instant communication information, or after being filtered to the instant communication information using preset rules, display is described i.e.
When communication information.
2. according to the method described in claim 1, it is characterized in that, by the key message and preset local authentication information into
Before row matching, further include:
It determines whether to have networked;
If failed cluster, the step of being matched the key message with preset local authentication information is executed;
If having networked, the key message is sent to cloud device, receive cloud device by the key message with it is preset
The matching result that high in the clouds verification information returns after being matched.
3. according to the method described in claim 1, it is characterized in that, by the key message and the progress of high in the clouds verification information
Match, including:
The key message is sent to cloud device, so that cloud device is by the key message and preset high in the clouds verification information
It is matched;
Receive the matching result that cloud device returns.
4. according to the method described in claim 1, it is characterized in that, described determine the transmission user according to the user identifier
Before whether being the user preset in blacklist, further include:
Determine whether the transmission user is the user preset in white list according to the user identifier;
If so, showing the instant communication information;
Determine whether the transmission user is the step for presetting the user in blacklist according to the user identifier if it is not, then executing
Suddenly.
5. method according to any one of claims 1 to 4, which is characterized in that described to be carried out to the instant communication information
After interception, further include:
Prompting message is generated according to the instant communication information;
Show the prompting message.
6. according to the method described in claim 5, it is characterized in that, the prompting message includes for asking to carry out information
The interface of verification further includes then after the display prompting message
The checking request instruction triggered by the interface user;
The checking request instruction is sent to cloud device;
Receive the verification result that cloud device is returned according to the checking request instruction.
7. a kind of information recognition device, which is characterized in that including:
Receiving unit, for receiving instant communication information, the instant communication information carries the user identifier for sending user;
Determination unit, for determining whether the transmission user belongs to default linkman set according to the user identifier;
First recognition unit, for when determination unit determines that the transmission user belongs to default linkman set, described in extraction
The content of instant communication information extracts key message from the content, and the key message and preset local verification are believed
Breath or high in the clouds verification information are matched, if matching, intercepts the instant communication information;If mismatching, trigger
Second recognition unit is executed determines whether the transmission user is the user preset in blacklist according to according to the user identifier
Operation;
Second recognition unit, for when determination unit determines that the transmission user is not belonging to default linkman set, alternatively,
When first recognition unit determines that the content is unsatisfactory for preset condition, whether the transmission user is determined according to the user identifier
For the user for presetting in blacklist;If so, being intercepted to the instant communication information;If it is not, then showing the Instant Messenger
News information shows the instant communication information alternatively, after being filtered to the instant communication information using preset rules.
8. device according to claim 7, which is characterized in that
First recognition unit is additionally operable to determine whether to have networked;If failed cluster, execute by the key message with
Preset local authentication information carries out matched operation;If having networked, the key message is sent to cloud device, receives cloud
The matching result that end equipment returns after being matched the key message with preset high in the clouds verification information.
9. device according to claim 7, which is characterized in that
First recognition unit is specifically used for sending the key message to cloud device, so that cloud device is by the pass
Key information is matched with preset high in the clouds verification information;Receive the matching result that cloud device returns.
10. device according to claim 7, which is characterized in that
Second recognition unit is additionally operable to determine whether the transmission user is in default white list according to the user identifier
User;If so, showing the instant communication information;Determine that the transmission is used according to the user identifier if it is not, then executing
Whether family is the operation for presetting the user in blacklist.
11. according to claim 7 to 10 any one of them device, which is characterized in that further include reminding unit;
The reminding unit, for after being intercepted to the instant communication information, being given birth to according to the instant communication information
At prompting message, the prompting message is shown.
12. according to the devices described in claim 11, which is characterized in that the prompting message include for ask to information into
The interface of row verification, then:
The reminding unit is additionally operable to the checking request instruction triggered by the interface user, by the checking request
Instruction is sent to cloud device, receives the verification result that cloud device is returned according to the checking request instruction.
13. a kind of information identification system, which is characterized in that including claim 7 to 12 any one of them information recognition device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610494211.4A CN106685796B (en) | 2016-06-29 | 2016-06-29 | A kind of information identifying method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610494211.4A CN106685796B (en) | 2016-06-29 | 2016-06-29 | A kind of information identifying method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106685796A CN106685796A (en) | 2017-05-17 |
CN106685796B true CN106685796B (en) | 2018-09-04 |
Family
ID=58839756
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610494211.4A Active CN106685796B (en) | 2016-06-29 | 2016-06-29 | A kind of information identifying method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685796B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110300049B (en) * | 2018-03-23 | 2022-05-27 | 阿里巴巴集团控股有限公司 | Message shielding method, device and system based on instant messaging |
CN110391970B (en) * | 2019-07-17 | 2021-09-10 | 广州市百果园信息技术有限公司 | Message management system, method, device and storage medium for communication application |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7653606B2 (en) * | 2003-10-03 | 2010-01-26 | Axway Inc. | Dynamic message filtering |
CN101888445A (en) * | 2010-04-30 | 2010-11-17 | 南京邮电大学 | Integrated method for filtering short message by introducing query software |
CN103634473A (en) * | 2013-12-05 | 2014-03-12 | 南京理工大学连云港研究院 | Naive Bayesian classification based mobile phone spam short message filtering method and system |
CN103812826A (en) * | 2012-11-08 | 2014-05-21 | 中国电信股份有限公司 | Identification method, identification system, and filter system of spam mail |
CN104883671A (en) * | 2014-02-27 | 2015-09-02 | 珠海市君天电子科技有限公司 | Junk message determining method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140229557A1 (en) * | 2013-02-12 | 2014-08-14 | Infinite Convergence Solutions, Inc | Method and Apparatus for Intercarrier Chat Message Blacklist and Whitelist |
-
2016
- 2016-06-29 CN CN201610494211.4A patent/CN106685796B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7653606B2 (en) * | 2003-10-03 | 2010-01-26 | Axway Inc. | Dynamic message filtering |
CN101888445A (en) * | 2010-04-30 | 2010-11-17 | 南京邮电大学 | Integrated method for filtering short message by introducing query software |
CN103812826A (en) * | 2012-11-08 | 2014-05-21 | 中国电信股份有限公司 | Identification method, identification system, and filter system of spam mail |
CN103634473A (en) * | 2013-12-05 | 2014-03-12 | 南京理工大学连云港研究院 | Naive Bayesian classification based mobile phone spam short message filtering method and system |
CN104883671A (en) * | 2014-02-27 | 2015-09-02 | 珠海市君天电子科技有限公司 | Junk message determining method and system |
Also Published As
Publication number | Publication date |
---|---|
CN106685796A (en) | 2017-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106126562B (en) | A kind of pop-up hold-up interception method and terminal | |
CN104735671B (en) | A kind of method and apparatus of identification malicious call | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
EP3200487B1 (en) | Message processing method and apparatus | |
CN104796385B (en) | Terminal binding method, apparatus and system | |
CN104243155B (en) | The method and device of safety verification | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106709347B (en) | Using the method and device of operation | |
CN107743086A (en) | A kind of message treatment method and system, message is sent and reception device | |
CN106657690A (en) | Method and device for preventing phone scam, and mobile terminal | |
CN106375478B (en) | A kind of synchronous method of mobile terminal data, apparatus and system | |
CN107133498A (en) | A kind of privacy application management method and device and mobile terminal | |
CN107466041B (en) | Method and device for identifying pseudo base station and mobile terminal | |
CN106506321A (en) | One population message treatment method and terminal device | |
CN104639354B (en) | Router administration method and apparatus | |
CN108881103A (en) | A kind of method and device accessing network | |
CN107145794A (en) | A kind of data processing method and device and mobile terminal | |
CN109089229A (en) | Carry out method, apparatus, storage medium and the terminal of indicating risk | |
CN106603740B (en) | It is connected to the network abnormal processing method and terminal device | |
CN106130735A (en) | The processing method of a kind of communication information, device and mobile terminal | |
CN109039989A (en) | Address resolution protocol cheat detecting method and device | |
CN104573437B (en) | Information authentication method, device and terminal | |
CN106302603A (en) | The method and apparatus remotely deleting information | |
CN106709340B (en) | Checking and killing virus method and device | |
CN106020945B (en) | Shortcut item adding method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |