CN106685796B - A kind of information identifying method, device and system - Google Patents

A kind of information identifying method, device and system Download PDF

Info

Publication number
CN106685796B
CN106685796B CN201610494211.4A CN201610494211A CN106685796B CN 106685796 B CN106685796 B CN 106685796B CN 201610494211 A CN201610494211 A CN 201610494211A CN 106685796 B CN106685796 B CN 106685796B
Authority
CN
China
Prior art keywords
user
information
instant communication
communication information
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610494211.4A
Other languages
Chinese (zh)
Other versions
CN106685796A (en
Inventor
袁灿材
杨田从雨
许振声
王亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610494211.4A priority Critical patent/CN106685796B/en
Publication of CN106685796A publication Critical patent/CN106685796A/en
Application granted granted Critical
Publication of CN106685796B publication Critical patent/CN106685796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of information identifying method, device and system;The present embodiment is using reception instant communication information, determine whether transmission user belongs to default linkman set according to the user identifier carried in the instant communication information, if so, extracting the content of the instant communication information, the instant communication information is identified according to the content;Otherwise, if being not belonging to default linkman set, the instant communication information is identified according to the user identifier;The program can substantially improve interception effect, improve the safety of information.

Description

A kind of information identifying method, device and system
Technical field
The present invention relates to fields of communication technology, and in particular to a kind of information identifying method, device and system.
Background technology
In recent years, the communication technology has obtained development at full speed, at the same time, various harassing and wrecking short messages and swindle Information is also increasingly to spread unchecked, for this purpose, how these information being identified and be intercepted, also at concerned problem.
In the prior art, generally information can be identified and intercepted by the way of white and black list, than Such as, when terminal receives a short message, it can be determined that the number belonging to the short message whether in white list, if in white list, Then without intercepting, otherwise, if not in white list, judge whether the number belonging to the short message is located in blacklist, if In blacklist, then intercepted, if not in blacklist, without interception, etc..This mode, to a certain extent may be used It is intercepted with the junk information to a part, such as harassing and wrecking short message and fraud information etc., still, due to existing many rubbish Information is all checked numbers by pseudo-base station and is pretended, for example, the number for the operator that disguises oneself as or user contact when sending Number, etc., therefore, for such information, interception can not be reached by the way of white and black list Effect, moreover, because be the disguise oneself as number of operator or the number of user contact, therefore, the probability that user is cheated also compared with Greatly, user's property loss is easily caused, or so that user terminal is invaded by viral wooden horse, that is to say, that existing side Case interception effect is simultaneously bad, leverages the safety of information.
Invention content
A kind of information identifying method of offer of the embodiment of the present invention, device and system, can improve interception effect, improve information Safety.
The embodiment of the present invention provides a kind of information identifying method, including:
Instant communication information is received, the instant communication information carries the user identifier for sending user;
Determine whether the transmission user belongs to default linkman set according to the user identifier;
If belonging to default linkman set, the content of the instant communication information is extracted, determines whether the content is full Sufficient preset condition intercepts the instant communication information if meeting condition, if being unsatisfactory for condition, according to the use The instant communication information is identified in family mark;
If being not belonging to default linkman set, the instant communication information is identified according to the user identifier.
Correspondingly, the embodiment of the present invention also provides a kind of information recognition device, including:
Receiving unit, for receiving instant communication information, the instant communication information carries the user identifier for sending user;
Determination unit, for determining whether the transmission user belongs to default linkman set according to the user identifier;
First recognition unit, for when determination unit determines that the transmission user belongs to default linkman set, extracting The content of the instant communication information, determines whether the content meets preset condition, if satisfied, then believing the instant messaging Breath is intercepted;It is executed according to the user identifier to the instant communication information if not satisfied, then triggering the second recognition unit The operation being identified;
Second recognition unit, for when determination unit determines that the transmission user is not belonging to default linkman set, or Person, when the first recognition unit determines that the content is unsatisfactory for preset condition, according to the user identifier to the instant messaging Information is identified.
In addition, the embodiment of the present invention also provides a kind of information identification system, including any that the embodiment of the present invention is provided Kind information recognition device.
The embodiment of the present invention is true according to the user identifier carried in the instant communication information using reception instant communication information Whether fixed transmission user belongs to default linkman set, if so, the content of the instant communication information is extracted, according to the content The instant communication information is identified;Otherwise, instant to this according to the user identifier if being not belonging to default linkman set Communication information is identified;Since the program is for presetting the instant communication information transmitted by the user in linkman set, It can make further identification by extracting content, it can thus be avoided due to sending user to user mark, such as phone number The generation for pretend the situation of caused identification mistake, can substantially improve interception effect, improve the safety of information.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 a are the schematic diagram of a scenario of information identifying method provided in an embodiment of the present invention;
Fig. 1 b are the flow diagrams of information identifying method provided in an embodiment of the present invention;
Fig. 2 is another flow diagram of information identifying method provided in an embodiment of the present invention;
Fig. 3 a are the structural schematic diagrams of information recognition device provided in an embodiment of the present invention;
Fig. 3 b are another structural schematic diagrams of information recognition device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, the every other implementation that those skilled in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
A kind of information identifying method of offer of the embodiment of the present invention, device and system.
Wherein, which may include information recognition device, which can specifically be integrated in In terminal, in addition, the information identification system can also include other equipment, such as server (such as cloud device), it is used for Receive terminal transmission key message when, which is verified, for example, can by the key message with it is preset High in the clouds verification information is matched, and returns to matching result to terminal, etc..
For example, as shown in Figure 1a, which can receive instant communication information, then, according in the instant communication information The user identifier of carrying determines whether transmission user belongs to default linkman set, if so, extracting the instant communication information Content, instant communication information is identified according to the content, for example, can by extracting the key message in the content, The key message is supplied to server, and receives the matching result of server return, need are determined whether according to matching result The instant communication information is carried out intercepting, etc.;Otherwise, if the user identifier is not belonging to preset linkman set, for example, The user is then identified instant communication information according to the user identifier not in address list, for example, using blacklist and/or The mode of white list is filtered and intercepts, etc., is not influencing existing instant communication information processing block as far as possible to realize Under the premise of frame, improves interception effect, the purpose of Information Security is provided.
It is described in detail separately below, it should be noted that, the serial number of following embodiment is not as embodiment priority Limitation.
Embodiment one,
The present embodiment will be described from the angle of information recognition device, which can specifically be integrated in end End, for example receive in terminal, the terminal may include mobile phone, tablet computer, laptop or personal computer (PC, Personal Computer) etc. equipment.
A kind of information identifying method, including:Instant communication information is received, which carries the use for sending user Family identifies;Determine whether transmission user belongs to default linkman set according to the user identifier;If so, extracting the Instant Messenger The content for interrogating information, is identified the instant communication information according to the content;If it is not, then instant to this according to the user identifier Communication information is identified.
As shown in Figure 1 b, the detailed process of the information identifying method can be as follows:
101, instant communication information is received.
The instant communication information that terminal is sent is sent for example, can specifically receive, wherein the instant communication information can be taken With information such as the user identifiers for sending user.
Wherein, which may include the communication information in short message, multimedia message and each instant messaging application Etc. information;The user identifier may include terminal iidentification, such as user identity identification code (SIM, Subscriber Identity ) or the International Mobile Station Equipment Identification of terminal (IMEI, International Mobile Equipment Identity) Module Deng alternatively, the user identifier can also include the information such as user's name, subscriber mailbox, and/or the Instant Messenger of user signal.
102, determine whether transmission user belongs to default linkman set according to the user identifier, if so, executing step Rapid 103, if it is not, thening follow the steps 104.
Wherein, which can in advance be established according to the demand of practical application, which includes At least one contact person, for example, the linkman set is specifically as follows the reception terminal local or high in the clouds preserves address list, connection It is that people is thin, and/or buddy list etc..
It, then at this point, can for example, it is specially address list to preset linkman set with this, and for transmission user is Zhang San To determine whether the Zhang San belongs in address list according to the user identifier, if in address list, 103 are thened follow the steps, Otherwise, if Zhang San thens follow the steps 104 not in address list.
103, the content for extracting the instant communication information is identified the instant communication information according to the content;For example, It can be as follows:
Determine whether the content meets preset condition, if so, being intercepted to the instant communication information;If it is not, then basis The instant communication information is identified in the user identifier, that is, executes step 104.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets If the mode of condition can also there are many, for example, can be identified (i.e. in the reception terminal local) local, alternatively, It can be identified beyond the clouds, alternatively, can be combined with local and high in the clouds identifies together, etc., i.e., step " determines that the content is It is no to meet preset condition " it can specifically include:
Key message is extracted from the content, which is matched with preset local authentication information, if Match, it is determined that the content meets preset condition;If mismatching, it is determined that the content is unsatisfactory for preset condition.
Wherein, which can extract according to preset rules, for example, multiple keywords can be pre-set, Such as " prize-winning ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to which the class for the content that some needs extract is arranged Type, such as network address, telephone number and/or account etc..
After being extracted key message, can by the key message of extraction and preset local authentication information, such as Preset keyword, network address, telephone number and/or account etc. are matched, if for example, including net in the key message of extraction Location " 123456789.com ", and there is also " 123456789.com " in preset local authentication information, than as already indicated Website corresponding to network address " 123456789.com " is swindle network address, then at this point, can determine that the instant communication information is swindleness Information is deceived, so, which is intercepted, otherwise, if being not present in preset local authentication information The relative recording of " 123456789.com ", then at this point it is possible to which the instant communication information is identified according to the user identifier, Execute step 104.
Wherein, local authentication information can be pre-stored in local (i.e. reception terminal according to the demand of practical application In), optionally, in order to improve the accuracy of identification, can also timing or the local authentication information is updated in real time.
Optionally, in order to improve the accuracy of identification, if there is currently networks, for example, the reception terminal has been networked, then also Can the key message be sent to cloud device to be identified, i.e., in step " by the key message and testing in default template Card information is matched " before, which can also include:
It determines whether to have networked;If failed cluster, execute by the key message and preset local authentication information into The step of row matching;If having networked, the key message is sent to cloud device, reception cloud device is by the key message and in advance If high in the clouds verification information matched after the matching result that returns, if matching result instruction matching, it is determined that the content is full Sufficient preset condition, if matching result instruction mismatches, it is determined that the content is unsatisfactory for preset condition.
Wherein, high in the clouds verification information can be pre-stored according to the demand of practical application in cloud device, optionally, be The accuracy of identification is improved, it can also periodically or to the end, verification information is updated in real time, for example, can be according to network In each reporting of user or the information of report the verification information to the high in the clouds is updated, etc. in real time.
Optionally, can also the key message be directly sent to cloud device to be identified, i.e., step " determines that this is interior Whether appearance meets preset condition " can also include:
Key message is extracted from the content;The key message is sent to cloud device, so that cloud device is by the key Information is matched with preset high in the clouds verification information;Receive the matching result that cloud device returns;If the matching result indicates Matching, it is determined that the content meets preset condition;If matching result instruction mismatches, it is determined that the content is unsatisfactory for default item Part.
104, the instant communication information is identified according to the user identifier, for example, specifically can be as follows:
Determine whether transmission user is the user preset in blacklist according to the user identifier, if so, instant to this Communication information is intercepted;If it is not, the instant communication information is then shown, alternatively, using preset rules to the instant communication information After being filtered, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set It is single, i.e., before step " user during whether transmission user is default blacklist determined according to the user identifier ", the information Recognition methods can also include:
Determine whether transmission user is the user preset in white list according to the user identifier, if so, display should be i.e. When communication information;Determine whether transmission user is the user preset in blacklist according to the user identifier if it is not, just executing Step.
Wherein, blacklist refers to that intransitable user is arranged, and white list is then with blacklist on the contrary, refer to being arranged Can by user.
Optionally, it is operated in order to facilitate user, it, can also basis after being intercepted to the instant communication information The instant communication information generates prompting message, and shows the prompting message.
Wherein, can also include interface for asking to verify information in the prompting message, i.e. the interface is main Checking request instruction for receiving user's triggering, to be verified to the instant communication information, for example, making further deep Verification, or even carry out manual verification, etc., i.e., after step " showing the prompting message ", which can be with Including:
The checking request instruction triggered by interface user, cloud device is sent to by the checking request instruction, Receive the verification result that cloud device is returned according to the checking request instruction.
In this way, user can determine whether the instant communication information is safe according to the verification result, such as, if for swindleness Deceive short message or promote short message, etc., to facilitate user to make further operation, for example, instant communication information institute is right The transmission user answered pulls in blacklist, is added to contact person or to the instant communication information report, etc., herein not It repeats again.
From the foregoing, it will be observed that the present embodiment, which uses, receives instant communication information, according to the user carried in the instant communication information Mark determines whether transmission user belongs to default linkman set, if so, the content of the instant communication information is extracted, according to The instant communication information is identified in the content;Otherwise, if default linkman set is not belonging to, according to the user identifier pair The instant communication information is identified;Since the program is believed for presetting the instant messaging transmitted by the user in linkman set Breath can make further identification, it can thus be avoided due to sending user to user mark, such as hand by extracting content Machine number pretend the generation of the situation of caused identification mistake, can substantially improve interception effect, improve the peace of information Quan Xing.
Embodiment two,
According to method described in embodiment one, citing is described in further detail below.
In the present embodiment, it will be specifically integrated in terminal A with the information recognition device, and the instant communication information is specific To be illustrated for short message.
As shown in Fig. 2, a kind of information identifying method, detailed process can be as follows:
201, terminal A receives the short message that user's first is sent by terminal B, wherein the short message can carry user's first The information such as user identifier.
The user identifier may include terminal iidentification, such as SIM card number (such as phone number) or IMEI code etc., alternatively, The user identifier can also include the information such as user's name, subscriber mailbox, and/or the Instant Messenger of user signal.
202, terminal A determines whether user's first belongs to default linkman set according to the user identifier, if so, executing step Rapid 203, if it is not, thening follow the steps 205.
Wherein, which can in advance be established according to the demand of practical application, which includes At least one contact person, for example, the linkman set is specifically as follows the reception terminal local or high in the clouds preserves address list, connection It is that people is thin, and/or buddy list etc..
For example, it is specially address list to preset linkman set with this, and for the user identifier is cell-phone number, then at this point, It can specifically determine that the cell-phone number of user's first whether in the address list of terminal A, if in address list, thens follow the steps 203, otherwise, if not being located in address list, then follow the steps 204.
203, terminal A extracts the content of the short message, determines whether the content meets preset condition, if so, executing step Rapid 204, if it is not, thening follow the steps 205.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets If the mode of condition can also there are many, for example, any one following mode may be used:
(1) first way;
Terminal A extracts key message from the content, by the local authentication information preserved in the key message and terminal A into Row matching, if matching, it is determined that the content meets preset condition, executes step 204;If mismatching, it is determined that the content is discontented Sufficient preset condition executes step 205.
(2) second way;
Terminal A extracts key message from the content, sends the key message to cloud device, cloud device is receiving After the key message, which is matched with preset high in the clouds verification information, obtain matching result, and by the matching As a result terminal A is returned to, if matching result instruction matching, terminal A determine that the content meets preset condition, execute step 204;If matching result instruction mismatches, terminal A determines that the content is unsatisfactory for preset condition, executes step 205.
(3) the third mode;
Terminal A extracts key message from the content, and determines whether to have networked;If failed cluster, by the key Information is matched with the local authentication information preserved in terminal A, if matching, it is determined that the content meets preset condition, executes Step 204;If mismatching, it is determined that the content is unsatisfactory for preset condition, executes step 205;Otherwise, if currently having networked, The key message is sent to cloud device, cloud device is after receiving the key message, by the key message and preset cloud End verification information is matched, and obtains matching result, and the matching result is returned to terminal A, if matching result instruction Match, then terminal A determines that the content meets preset condition, executes step 204;If matching result instruction mismatches, terminal A is true The fixed content is unsatisfactory for preset condition, executes step 205.
Wherein, which can extract according to preset rules, for example, multiple keywords can be pre-set, Such as " prize-winning ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to which the class for the content that some needs extract is arranged Type, such as network address, telephone number and/or Bank Account Number etc. can use canonical then when needing to extract key message The method matched extracts network address, such as uniform resource locator (URL, Uniform Resource from the short message Locator), and/or Bank Account Number and telephone number etc. are extracted, to obtain key message.
It, can be by the key message of extraction and preset local authentication information or high in the clouds after being extracted key message Verification information, such as preset keyword, network address, telephone number and/or Bank Account Number etc. are matched, if for example, extraction Include Bank Account Number " 123456789 " and telephone number " 19000000000 " in key message, and is verified in preset high in the clouds Indicate that Bank Account Number " 123456789 " and telephone number " 19000000000 " institute are right in information (or local authentication information) The short message answered is swindle network address, then at this point, can determine that the short message is fraud information, so, which is carried out It intercepts, that is, executes step 204;Otherwise, if bank's account is not present in preset high in the clouds verification information (or local authentication information) The relative recording of number " 123456789 " and telephone number " 19000000000 ", then at this point it is possible to according to the user of user's first The short message is identified in mark, that is, executes step 205.
It should be noted that in order to improve the accuracy of identification, it can be periodically or in real time to the local authentication information and cloud End verification information is updated, for example, the information that each terminal is reported or reported on network can be received by cloud device, then It is identified and counts according to these information, and high in the clouds verification information is updated based on statistical result.Further, it is also possible to by Cloud device timing is in real time updated the local authentication information in terminal, alternatively, can also be by terminal according to itself Demand timing or download corresponding update packet to cloud device in real time, to be carried out more to the local authentication information in terminal New, etc., details are not described herein.
204, terminal A intercepts the short message.
For example, the short message can be added in preset interception file by terminal A, without in corresponding short message Display in inbox (normal short message can be shown in inbox), alternatively, the short message can also be deleted directly.
Optionally, it operates in order to facilitate user, after being intercepted to the short message, short can also be disappeared according to this Breath generates prompting message, and shows the prompting message, for example, can be in the form of pop-up, wicket or short message, in terminal A Screen on show the prompting message.
Wherein, the network address etc. for may include the phone of alarm in the prompting message and reporting or reporting.
Optionally, it in the prompting message can also include for asking to verify information interface, in this way, working as user After second receives the prompting message by terminal A, corresponding checking request instruction can be triggered by the interface so that terminal The checking request instruction is sent to cloud device by A, further to be verified, such as make further deep verification or into Then row manual verification, etc. receives the verification result that cloud device returns, in this way, user's second can be according to the verification knot Fruit determines whether the short message is safe, such as, if it is fraud text message or distribution short message, etc., to facilitate user's second to make Further operation, for example, transmission user's first corresponding to the short message is pulled in blacklist, is added to contact person or right The short message report, etc., and details are not described herein.
205, terminal A determines whether user's first is the user preset in white list according to the user identifier, if so, holding Row step 207;If it is not, thening follow the steps 206.
If for example, saving 3 telephone numbers in white list:" 19000000001 ", " 19000000002 " and " 19000000003 ", and the telephone number of user's first is " 19000000000 ", then at this point, can determine that user's first does not belong to User in the white list then executes step 206;If conversely, the telephone number of user's first be " 19000000001 ", Any one in " 19000000002 " and " 19000000003 ", for example be " 19000000001 ", then at this point, it can be true Fixed user's first belongs to the user in the white list, then executes step 207.
206, terminal A determines whether transmission user is the user preset in blacklist according to the user identifier, if so, 204 are returned to step, if it is not, thening follow the steps 207.
If for example, saving 2 telephone numbers in blacklist:" 19000000000 " and " 19000000004 ", and user The telephone number of first is " 19000000000 ", then at this point, can determine that user's first belongs to the user in the blacklist, in It is to be intercepted to the short message, that is, returns to step 204;If conversely, the telephone number of user's first be except Other numbers except " 19000000000 " and " 19000000004 ", for example, for " 19000000005 " or " 19000000006 " then execute step then at this point, can determine that user's first is not belonging to the user in the blacklist 207。
207, terminal A does not intercept the short message, for example, can show the short message, such as in the receipts of short message The short message, etc. is shown in part case.
From the foregoing, it will be observed that the terminal of the present embodiment is after receiving short message, it can be according to the user carried in the short message Mark, which determines, sends whether user belongs to default linkman set, if so, the content of the short message is extracted, according to the content pair The short message is identified;Otherwise, if being not belonging to default linkman set, the short message is known according to the user identifier Not;Due to the program for preset linkman set in user transmitted by short message, can by extract content make into One step identifies, it can thus be avoided identified due to sending user to user, for example phone number carries out pretending caused identification The generation of the situation of mistake can substantially improve interception effect, improve the safety of information, attenuating user terminal is invaded and wealth Produce the probability of loss;Further, since after having intercepted short message, corresponding prompting message can also be generated, and is provided corresponding Interface is verified, so, the convenience and friendly of operation can also be improved.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of information recognition device, as shown in Figure 3a, The information recognition device includes receiving unit 301, determination unit 302, the first recognition unit 303 and the second recognition unit 304, such as Under:
(1) receiving unit 301;
Receiving unit 301, for receiving instant communication information.
For example, receiving unit 301, specifically can be used for receiving the instant communication information for sending terminal transmission, wherein should be i.e. When communication information can carry the information such as user identifier for sending user.
Wherein, which may include the communication information in short message, multimedia message and each instant messaging application Etc. information;The user identifier may include terminal iidentification, such as the IMEI etc. of SIM or terminal, alternatively, the user identifier can also Including information such as user's name, subscriber mailbox, and/or the Instant Messenger of user signals.
(2) determination unit 302;
Determination unit 302, for determining whether transmission user belongs to default linkman set according to the user identifier.
Wherein, which can in advance be established according to the demand of practical application, which includes At least one contact person, for example, the linkman set is specifically as follows the reception terminal local or high in the clouds preserves address list, connection It is that people is thin, and/or buddy list etc..
(3) first recognition units 303;
First recognition unit 303, for determination unit 302 determine transmission user belong to default linkman set when, The content for extracting the instant communication information is identified the instant communication information according to the content.
For example, first recognition unit 303, is specifically determined for whether the content meets preset condition;If so, right The instant communication information is intercepted;It is executed according to the user identifier to the Instant Messenger if it is not, then triggering the second recognition unit 304 The operation that news information is identified.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets If the mode of condition can also there are many, for example, can be identified (i.e. in the reception terminal local) local, alternatively, It can be identified beyond the clouds, alternatively, can be combined with local and high in the clouds identifies together, etc., i.e.,:
First recognition unit 303, specifically for extracting key message from the content, by the key message with it is preset Local authentication information is matched, if matching, it is determined that the content meets preset condition, if mismatching, it is determined that the content is not Meet preset condition.
Wherein, which can extract according to preset rules, for example, multiple keywords can be pre-set, Such as " prize-winning ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to which the class for the content that some needs extract is arranged Type, such as network address, telephone number and/or account etc..
Wherein, local authentication information can be pre-stored in local (i.e. reception terminal according to the demand of practical application In), optionally, in order to improve the accuracy of identification, can also timing or the local authentication information is updated in real time.
Optionally, in order to improve the accuracy of identification, if there is currently networks, for example, the reception terminal has been networked, then also Can the key message be sent to cloud device to be identified, i.e.,:
First recognition unit 303 can be also used for determining whether to have networked;If failed cluster, execute the pass Key information carries out matched operation with preset local authentication information;If having networked, the key message is sent to cloud device, The matching result returned after cloud device is matched the key message with preset high in the clouds verification information is received, if the matching As a result instruction matching, it is determined that the content meets preset condition, if matching result instruction mismatches, it is determined that the content is discontented Sufficient preset condition.
Wherein, high in the clouds verification information can be pre-stored according to the demand of practical application in cloud device, optionally, be The accuracy of identification is improved, it can also periodically or to the end, verification information is updated in real time, for example, can be according to network In each reporting of user or the information of report the verification information to the high in the clouds is updated, etc. in real time.
Optionally, directly to be identified, i.e., the key message can also be sent to cloud device:
First recognition unit 303 specifically can be used for extracting key message from the content;Being sent to cloud device should Key message, so that cloud device matches the key message with preset high in the clouds verification information;Cloud device is received to return The matching result returned;If matching result instruction matching, it is determined that the content meets preset condition;If the matching result indicates not Matching, it is determined that the content is unsatisfactory for preset condition.
(4) second recognition units 304;
Second recognition unit 304, for determining that transmission user is not belonging to default linkman set in determination unit 302 When, alternatively, when the first recognition unit determines that the content of the instant communication information is unsatisfactory for preset condition, according to the user identifier The instant communication information is identified.
For example, second recognition unit 304, specifically can be used for according to the user identifier determine transmission user whether be User in default blacklist;If so, being intercepted to the instant communication information;If it is not, then show the instant communication information, Alternatively, after being filtered to the instant communication information using preset rules, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set It is single, i.e.,:
Second recognition unit 304 can be also used for determining whether transmission user is default white according to the user identifier User in list;If so, showing the instant communication information;Determine that the transmission is used according to the user identifier if it is not, then executing Whether family is the operation for presetting the user in blacklist.
Wherein, blacklist refers to that intransitable user is arranged, and white list is then with blacklist on the contrary, refer to being arranged Can by user.
Optionally, it is operated in order to facilitate user, it, can also basis after being intercepted to the instant communication information The instant communication information generates prompting message, and shows the prompting message, i.e., as shown in Figure 3b, which can be with It is as follows including reminding unit 305:
The reminding unit 305, can be used for after being intercepted to the instant communication information, be believed according to the instant messaging Breath generates prompting message, shows the prompting message.
Wherein, can also include interface for asking to verify information in the prompting message, i.e.,:
The reminding unit 305 can be also used for the checking request instruction triggered by interface user, by the verification Request instruction is sent to cloud device, receives the verification result that cloud device is returned according to the checking request instruction.
In this way, user can determine whether the instant communication information is safe according to the verification result, such as, if for swindleness Deceive short message or promote short message, etc., to facilitate user to make further operation, for example, instant communication information institute is right The transmission user answered pulls in blacklist, is added to contact person or to the instant communication information report, etc., herein not It repeats again.
When it is implemented, above each unit can be realized as independent entity, arbitrary combination can also be carried out, is made It is realized for same or several entities, the specific implementation of above each unit can be found in the embodiment of the method for front, herein not It repeats again.
The information recognition device can specifically be integrated in terminal, for example receive in terminal, which may include mobile phone, puts down The equipment such as plate computer, laptop or PC.
From the foregoing, it will be observed that the receiving unit 301 of the information recognition device of the present embodiment can receive instant communication information, so Afterwards, determine whether transmission user belongs to default according to the user identifier carried in the instant communication information by determination unit 302 Linkman set, if so, by the first recognition unit 303 extract the instant communication information content, be to this according to the content When communication information be identified;Otherwise, if default linkman set is not belonging to, by the second recognition unit 304 according to the user The instant communication information is identified in mark;Since the program is instant transmitted by the user in linkman set for presetting Communication information can make further identification by extracting content, it can thus be avoided due to sending user to user mark, For example phone number pretend the generation of the situation of caused identification mistake, can substantially improve interception effect, improve letter The safety of breath.
Example IV,
Correspondingly, the embodiment of the present invention provides a kind of information identification system, including any that the embodiment of the present invention is provided Kind information recognition device, for details, reference can be made to embodiments three.Wherein, which can specifically integrate in the terminal, example It such as, can be as follows:
Terminal, for receiving instant communication information, which carries the user identifier for sending user;According to this User identifier determines whether transmission user belongs to default linkman set;If so, the content of the instant communication information is extracted, The instant communication information is identified according to the content;If it is not, then being carried out to the instant communication information according to the user identifier Identification.
For example, the terminal, specifically can be used for when determining that transmission user belongs to default linkman set, extraction should be i.e. When communication information content, determine whether the content meets preset condition, if so, being intercepted to the instant communication information;If It is no, then the instant communication information is identified according to the user identifier.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets If the mode of condition can also there are many, for details, reference can be made to the embodiments of front, and details are not described herein.
Wherein, the mode instant communication information being identified according to the user identifier can also there are many, for example, can With as follows:
Terminal specifically can be used for determining whether transmission user is the use preset in blacklist according to the user identifier Family, if so, being intercepted to the instant communication information;If it is not, the instant communication information is then shown, alternatively, using default rule After being then filtered to the instant communication information, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set It is single, i.e.,:
Terminal specifically can be used for determining whether transmission user is the use preset in white list according to the user identifier Family, if so, showing the instant communication information;Determine whether transmission user is pre- according to the user identifier if it is not, just executing If the operation of the user in blacklist.
Wherein, blacklist refers to that intransitable user is arranged, and white list is then with blacklist on the contrary, refer to being arranged Can by user.
Optionally, it is operated in order to facilitate user, after being intercepted to the instant communication information, which may be used also It to generate prompting message according to the instant communication information, and shows the prompting message, refers to the embodiment of front, it is no longer superfluous herein It states.
In addition, the information identification system can also include other equipment, such as cloud device, it is as follows:
Cloud device, for when receiving the key message of terminal transmission, being verified to the key message, for example, The key message can be matched with preset high in the clouds verification information, and returns to matching result to terminal, etc..
The specific implementation of above each equipment can be found in the embodiment of front, and details are not described herein.
Since the information identification system may include any information recognition device that the embodiment of the present invention is provided, because This, may be implemented the advantageous effect achieved by any information recognition device that the embodiment of the present invention is provided, and refer to front Embodiment, details are not described herein.
Embodiment five,
Correspondingly, the embodiment of the present invention also provides a kind of terminal, can integrate the embodiment of the present invention provided it is any Information recognition device.As shown in figure 4, the terminal may include radio frequency (RF, Radio Frequency) circuit 401, include one A or more than one computer readable storage medium memory 402, input unit 403, display unit 404, sensor 405, Voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407 including there are one or more than one at Manage the components such as processor 408 and the power supply 409 of core.It will be understood by those skilled in the art that terminal knot shown in Fig. 4 The restriction of structure not structure paired terminal may include either combining certain components or not than illustrating more or fewer components Same component arrangement.Wherein:
RF circuits 401 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, one or the processing of more than one processor 408 are transferred to;In addition, the data for being related to uplink are sent to Base station.In general, RF circuits 401 include but not limited to antenna, at least one amplifier, tuner, one or more oscillators, use Family identity module (SIM, Subscriber Identity Module) card, transceiver, coupler, low-noise amplifier (LNA, Low Noise Amplifier), duplexer etc..In addition, RF circuits 401 can also by radio communication with network and its He communicates equipment.The wireless communication can use any communication standard or agreement, including but not limited to global system for mobile telecommunications system Unite (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division it is more Location (WCDMA, Wideband Code Division Multiple Access), long term evolution (LTE, Long Term Evolution), Email, short message service (SMS, Short Messaging Service) etc..
Memory 402 can be used for storing software program and module, and processor 408 is stored in memory 402 by operation Software program and module, to perform various functions application and data processing.Memory 402 can include mainly storage journey Sequence area and storage data field, wherein storing program area can storage program area, the application program (ratio needed at least one function Such as sound-playing function, image player function) etc.;Storage data field can be stored uses created data according to terminal (such as audio data, phone directory etc.) etc..In addition, memory 402 may include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory 402 can also include Memory Controller, to provide processor 408 and input unit 403 to memory 402 Access.
Input unit 403 can be used for receiving the number or character information of input, and generate and user setting and function Control related keyboard, mouse, operating lever, optics or the input of trace ball signal.Specifically, in a specific embodiment In, input unit 403 may include touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or tactile Control plate, collect user on it or neighbouring touch operation (such as user using any suitable object such as finger, stylus or Operation of the attachment on touch sensitive surface or near touch sensitive surface), and corresponding connection dress is driven according to preset formula It sets.Optionally, touch sensitive surface may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 408, and can reception processing Order that device 408 is sent simultaneously is executed.Furthermore, it is possible to a variety of using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes touch sensitive surface.In addition to touch sensitive surface, input unit 403 can also include other input equipments.Specifically, other are defeated Enter equipment and can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse It is one or more in mark, operating lever etc..
Display unit 404 can be used for showing information input by user or be supplied to user information and terminal it is various Graphical user interface, these graphical user interface can be made of figure, text, icon, video and its arbitrary combination.Display Unit 404 may include display panel, optionally, may be used liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) configure display panel.Further , touch sensitive surface can cover display panel, when touch sensitive surface detects on it or after neighbouring touch operation, send processing to Device 408 is followed by subsequent processing device 408 and is provided on a display panel accordingly according to the type of touch event to determine the type of touch event Visual output.Although in Fig. 4, touch sensitive surface and display panel are to realize input and input as two independent components Function, but in some embodiments it is possible to touch sensitive surface and display panel are integrated and realizes and outputs and inputs function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel, proximity sensor can close display panel and/or the back of the body when terminal is moved in one's ear Light.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally three axis) acceleration Size can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as terminal The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 406, loud speaker, microphone can provide the audio interface between user and terminal.Voicefrequency circuit 406 can By the transformed electric signal of the audio data received, it is transferred to loud speaker, voice signal output is converted to by loud speaker;It is another The voice signal of collection is converted to electric signal by aspect, microphone, and audio data is converted to after being received by voicefrequency circuit 406, then After the processing of audio data output processor 408, through RF circuits 401 to be sent to such as another terminal, or by audio data Output is further processed to memory 402.Voicefrequency circuit 406 is also possible that earphone jack, with provide peripheral hardware earphone with The communication of terminal.
WiFi belongs to short range wireless transmission technology, and terminal can help user's transceiver electronics postal by WiFi module 407 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 4 is shown WiFi module 407, but it is understood that, and it is not belonging to must be configured into for terminal, it can not change as needed completely Become in the range of the essence of invention and omits.
Processor 408 is the control centre of terminal, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 402, and call and be stored in memory 402 Data execute the various functions and processing data of terminal, to carry out integral monitoring to mobile phone.Optionally, processor 408 can wrap Include one or more processing cores;Preferably, processor 408 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 408.
Terminal further includes the power supply 409 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 408 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.Power supply 409 can also include one or more direct current or AC power, recharging system, power failure inspection The random components such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal can also include camera, bluetooth module etc., and details are not described herein.Specifically in this implementation In example, the processor 408 in terminal can be corresponding by the process of one or more application program according to following instruction Executable file is loaded into memory 402, and runs the application program being stored in memory 402 by processor 408, from And realize various functions:
Instant communication information is received, which carries the user identifier for sending user;According to the user identifier Determine whether transmission user belongs to default linkman set;If so, the content of the instant communication information is extracted, it is interior according to this The instant communication information is identified in appearance;If it is not, then the instant communication information is identified according to the user identifier.
For example, the processor 408, can execute for realizing the application program of following function:
When determining that transmission user belongs to default linkman set, the content of the instant communication information is extracted, determining should Whether content meets preset condition, if so, being intercepted to the instant communication information;If it is not, then according to the user identifier to this Instant communication information is identified.
Wherein, which can be configured according to the demand of practical application, and it is pre- to determine whether the content meets If the mode of condition can also there are many, for details, reference can be made to the embodiments of front, and details are not described herein.
Wherein, the mode instant communication information being identified according to the user identifier can also there are many, i.e., at this Device 408 is managed, can be executed for realizing the application program of following function:
Determine whether transmission user is the user preset in blacklist according to the user identifier, if so, instant to this Communication information is intercepted;If it is not, the instant communication information is then shown, alternatively, using preset rules to the instant communication information After being filtered, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, other than blacklist is set, corresponding white name can also be set List, the i.e. processor 408, can also be performed for realizing the application program of following function:
Determine whether transmission user is the user preset in white list according to the user identifier, if so, display should be i.e. When communication information;Determine whether transmission user is the user preset in blacklist according to the user identifier if it is not, just executing Operation.
Optionally, it is operated in order to facilitate user, it, can also basis after being intercepted to the instant communication information The instant communication information generates prompting message, and shows the prompting message.
The specific implementation of above each operation can be found in the embodiment of front, and details are not described herein.
From the foregoing, it will be observed that the terminal of the present embodiment is after receiving instant communication information, it can be according to the instant communication information The user identifier of middle carrying determines whether transmission user belongs to default linkman set, if so, extracting instant messaging letter The content of breath is identified the instant communication information according to the content;Otherwise, if being not belonging to default linkman set, root The instant communication information is identified according to the user identifier;Since the program is sent out for presetting the user in linkman set The instant communication information sent, can by extract content make further identification, it can thus be avoided due to send user to Family identifies, for example phone number pretend the generation of the situation of caused identification mistake, can substantially improve interception effect, Improve the safety of information.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can be stored in a computer readable storage medium, storage Medium may include:Read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
Be provided for the embodiments of the invention a kind of information identifying method above, device and system are described in detail, Principle and implementation of the present invention are described for specific case used herein, and the explanation of above example is only used In facilitating the understanding of the method and its core concept of the invention;Meanwhile for those skilled in the art, think of according to the present invention Think, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not be construed as pair The limitation of the present invention.

Claims (13)

1. a kind of information identifying method, which is characterized in that including:
Instant communication information is received, the instant communication information carries the user identifier for sending user;
Determine whether the transmission user belongs to default linkman set according to the user identifier;
If belonging to default linkman set, the content of the instant communication information is extracted, crucial letter is extracted from the content Breath, the key message is matched with preset local authentication information or high in the clouds verification information, if matching, is to described When communication information intercepted, if mismatch, the instant communication information is identified according to the user identifier;
If being not belonging to default linkman set, the instant communication information is identified according to the user identifier;
It is described that the instant communication information is identified according to the user identifier, including:It is determined according to the user identifier It is described to send whether user is the user preset in blacklist, if so, being intercepted to the instant communication information;If it is not, Then show the instant communication information, or after being filtered to the instant communication information using preset rules, display is described i.e. When communication information.
2. according to the method described in claim 1, it is characterized in that, by the key message and preset local authentication information into Before row matching, further include:
It determines whether to have networked;
If failed cluster, the step of being matched the key message with preset local authentication information is executed;
If having networked, the key message is sent to cloud device, receive cloud device by the key message with it is preset The matching result that high in the clouds verification information returns after being matched.
3. according to the method described in claim 1, it is characterized in that, by the key message and the progress of high in the clouds verification information Match, including:
The key message is sent to cloud device, so that cloud device is by the key message and preset high in the clouds verification information It is matched;
Receive the matching result that cloud device returns.
4. according to the method described in claim 1, it is characterized in that, described determine the transmission user according to the user identifier Before whether being the user preset in blacklist, further include:
Determine whether the transmission user is the user preset in white list according to the user identifier;
If so, showing the instant communication information;
Determine whether the transmission user is the step for presetting the user in blacklist according to the user identifier if it is not, then executing Suddenly.
5. method according to any one of claims 1 to 4, which is characterized in that described to be carried out to the instant communication information After interception, further include:
Prompting message is generated according to the instant communication information;
Show the prompting message.
6. according to the method described in claim 5, it is characterized in that, the prompting message includes for asking to carry out information The interface of verification further includes then after the display prompting message
The checking request instruction triggered by the interface user;
The checking request instruction is sent to cloud device;
Receive the verification result that cloud device is returned according to the checking request instruction.
7. a kind of information recognition device, which is characterized in that including:
Receiving unit, for receiving instant communication information, the instant communication information carries the user identifier for sending user;
Determination unit, for determining whether the transmission user belongs to default linkman set according to the user identifier;
First recognition unit, for when determination unit determines that the transmission user belongs to default linkman set, described in extraction The content of instant communication information extracts key message from the content, and the key message and preset local verification are believed Breath or high in the clouds verification information are matched, if matching, intercepts the instant communication information;If mismatching, trigger Second recognition unit is executed determines whether the transmission user is the user preset in blacklist according to according to the user identifier Operation;
Second recognition unit, for when determination unit determines that the transmission user is not belonging to default linkman set, alternatively, When first recognition unit determines that the content is unsatisfactory for preset condition, whether the transmission user is determined according to the user identifier For the user for presetting in blacklist;If so, being intercepted to the instant communication information;If it is not, then showing the Instant Messenger News information shows the instant communication information alternatively, after being filtered to the instant communication information using preset rules.
8. device according to claim 7, which is characterized in that
First recognition unit is additionally operable to determine whether to have networked;If failed cluster, execute by the key message with Preset local authentication information carries out matched operation;If having networked, the key message is sent to cloud device, receives cloud The matching result that end equipment returns after being matched the key message with preset high in the clouds verification information.
9. device according to claim 7, which is characterized in that
First recognition unit is specifically used for sending the key message to cloud device, so that cloud device is by the pass Key information is matched with preset high in the clouds verification information;Receive the matching result that cloud device returns.
10. device according to claim 7, which is characterized in that
Second recognition unit is additionally operable to determine whether the transmission user is in default white list according to the user identifier User;If so, showing the instant communication information;Determine that the transmission is used according to the user identifier if it is not, then executing Whether family is the operation for presetting the user in blacklist.
11. according to claim 7 to 10 any one of them device, which is characterized in that further include reminding unit;
The reminding unit, for after being intercepted to the instant communication information, being given birth to according to the instant communication information At prompting message, the prompting message is shown.
12. according to the devices described in claim 11, which is characterized in that the prompting message include for ask to information into The interface of row verification, then:
The reminding unit is additionally operable to the checking request instruction triggered by the interface user, by the checking request Instruction is sent to cloud device, receives the verification result that cloud device is returned according to the checking request instruction.
13. a kind of information identification system, which is characterized in that including claim 7 to 12 any one of them information recognition device.
CN201610494211.4A 2016-06-29 2016-06-29 A kind of information identifying method, device and system Active CN106685796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610494211.4A CN106685796B (en) 2016-06-29 2016-06-29 A kind of information identifying method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610494211.4A CN106685796B (en) 2016-06-29 2016-06-29 A kind of information identifying method, device and system

Publications (2)

Publication Number Publication Date
CN106685796A CN106685796A (en) 2017-05-17
CN106685796B true CN106685796B (en) 2018-09-04

Family

ID=58839756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610494211.4A Active CN106685796B (en) 2016-06-29 2016-06-29 A kind of information identifying method, device and system

Country Status (1)

Country Link
CN (1) CN106685796B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300049B (en) * 2018-03-23 2022-05-27 阿里巴巴集团控股有限公司 Message shielding method, device and system based on instant messaging
CN110391970B (en) * 2019-07-17 2021-09-10 广州市百果园信息技术有限公司 Message management system, method, device and storage medium for communication application

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653606B2 (en) * 2003-10-03 2010-01-26 Axway Inc. Dynamic message filtering
CN101888445A (en) * 2010-04-30 2010-11-17 南京邮电大学 Integrated method for filtering short message by introducing query software
CN103634473A (en) * 2013-12-05 2014-03-12 南京理工大学连云港研究院 Naive Bayesian classification based mobile phone spam short message filtering method and system
CN103812826A (en) * 2012-11-08 2014-05-21 中国电信股份有限公司 Identification method, identification system, and filter system of spam mail
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140229557A1 (en) * 2013-02-12 2014-08-14 Infinite Convergence Solutions, Inc Method and Apparatus for Intercarrier Chat Message Blacklist and Whitelist

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653606B2 (en) * 2003-10-03 2010-01-26 Axway Inc. Dynamic message filtering
CN101888445A (en) * 2010-04-30 2010-11-17 南京邮电大学 Integrated method for filtering short message by introducing query software
CN103812826A (en) * 2012-11-08 2014-05-21 中国电信股份有限公司 Identification method, identification system, and filter system of spam mail
CN103634473A (en) * 2013-12-05 2014-03-12 南京理工大学连云港研究院 Naive Bayesian classification based mobile phone spam short message filtering method and system
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system

Also Published As

Publication number Publication date
CN106685796A (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN106126562B (en) A kind of pop-up hold-up interception method and terminal
CN104735671B (en) A kind of method and apparatus of identification malicious call
CN104580167B (en) A kind of methods, devices and systems transmitting data
EP3200487B1 (en) Message processing method and apparatus
CN104796385B (en) Terminal binding method, apparatus and system
CN104243155B (en) The method and device of safety verification
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106709347B (en) Using the method and device of operation
CN107743086A (en) A kind of message treatment method and system, message is sent and reception device
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
CN106375478B (en) A kind of synchronous method of mobile terminal data, apparatus and system
CN107133498A (en) A kind of privacy application management method and device and mobile terminal
CN107466041B (en) Method and device for identifying pseudo base station and mobile terminal
CN106506321A (en) One population message treatment method and terminal device
CN104639354B (en) Router administration method and apparatus
CN108881103A (en) A kind of method and device accessing network
CN107145794A (en) A kind of data processing method and device and mobile terminal
CN109089229A (en) Carry out method, apparatus, storage medium and the terminal of indicating risk
CN106603740B (en) It is connected to the network abnormal processing method and terminal device
CN106130735A (en) The processing method of a kind of communication information, device and mobile terminal
CN109039989A (en) Address resolution protocol cheat detecting method and device
CN104573437B (en) Information authentication method, device and terminal
CN106302603A (en) The method and apparatus remotely deleting information
CN106709340B (en) Checking and killing virus method and device
CN106020945B (en) Shortcut item adding method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant