CN108347374B - Message pushing method and device for preventing illegal messages - Google Patents

Message pushing method and device for preventing illegal messages Download PDF

Info

Publication number
CN108347374B
CN108347374B CN201810057348.2A CN201810057348A CN108347374B CN 108347374 B CN108347374 B CN 108347374B CN 201810057348 A CN201810057348 A CN 201810057348A CN 108347374 B CN108347374 B CN 108347374B
Authority
CN
China
Prior art keywords
message
pushed
messages
pushing
security audit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810057348.2A
Other languages
Chinese (zh)
Other versions
CN108347374A (en
Inventor
颜文德
徐�明
王华松
叶祖锋
吴洋洋
谭治
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Ocs Information Technology Co ltd
Original Assignee
Guangzhou Ocs Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Ocs Information Technology Co ltd filed Critical Guangzhou Ocs Information Technology Co ltd
Priority to CN201810057348.2A priority Critical patent/CN108347374B/en
Publication of CN108347374A publication Critical patent/CN108347374A/en
Application granted granted Critical
Publication of CN108347374B publication Critical patent/CN108347374B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/566Grouping or aggregating service requests, e.g. for unified processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a message pushing method and a device for preventing illegal messages, wherein the method comprises the steps of obtaining a pushing request sent by a pusher, carrying out security audit on the pushing request, stopping pushing a corresponding message to be pushed according to a security audit result, packaging the pushing request into a read-only file, storing the read-only file or receiving the message to be pushed by using a corresponding channel receiver, sequentially placing the message to be pushed into a corresponding message queue, and then sending a plurality of messages to be pushed stored in the message queue to a corresponding target channel according to the storage sequence of the message queue; the system comprises a message acquisition module, a security audit module, a message queue module and a message sending module; the apparatus includes a memory and a processor. The invention can solve the problems of messiness and safety of message sending, and is convenient for further processing the message to be pushed so as to supervise a message receiving and sending system. The invention is applied to the technical field of the Internet.

Description

Message pushing method and device for preventing illegal messages
Technical Field
The invention relates to the technical field of internet, in particular to a message pushing method and a message pushing device for preventing illegal messages.
Background
In the internet and communications fields, a large number of messages need to be delivered frequently. Traditional communication modes such as mobile phone short messages and emails, and social APP such as WeChat, microblog and nailing can conveniently send and receive messages. The use habits of each person are different, and the communication software used by each person is different, for example, in the current social APP, many people are still used to send and receive short messages by using a mobile phone. Thus, there are inevitably a large number of messages from different source channels that need to be sent to different target channels.
In order to realize message pushing across channels, different interfaces need to be developed. For example, in order to push a message sent by a wechat to an email, it is necessary to interface with the wechat through one interface, receive the message sent by the wechat, interface with the email through another interface, and send the message to the email. However, because of many message channels, the number of the combined messages is also very large, in order to realize free transmission of messages, respective development interfaces are needed, the workload is very large, and the software development efficiency and the message transmission efficiency are low.
In order to solve the problems, some message pushing platforms appear in the market, which develop interfaces for interfacing with mainstream application programs such as enterprise wechat, enterprise nail, short message gateway, email, third party IM and the like in advance, and then encapsulate the interfaces into a uniform message pushing API, so as to provide a full-terminal message channel service for the third party and realize application access configurability. However, these products are only simple integration of interfaces, only have the effect of simple message transfer, and the messages from different channels lack connection, so that these messages cannot be processed, and the messaging system lacks supervision, and is not under the policy of abusive false messages, fraudulent messages and other illegal message bundles containing illegal contents.
Disclosure of Invention
In order to solve the above technical problems, a first object of the present invention is to provide a message pushing method for blocking illegal messages, a second object is to provide a message pushing system for blocking illegal messages, and a third object is to provide a message pushing apparatus for blocking illegal messages.
The first technical scheme adopted by the invention is as follows:
a message push method of deterring illegitimate messages, comprising:
acquiring a push request sent by a pusher, wherein the push request comprises a message to be pushed, identity information of the pusher, a source channel and a target channel;
performing safety audit on the pushing request, if the safety audit result is qualified, executing the next step, otherwise, if the safety audit result is unqualified, stopping pushing the corresponding message to be pushed, packaging the pushing request into a read-only file and storing the read-only file;
receiving messages to be pushed by using corresponding channel receivers according to source channels, and sequentially placing the messages to be pushed into corresponding message queues;
sending each plurality of messages to be pushed stored in the message queue to a corresponding target channel according to the storage sequence of the message queue;
the message queue stores a plurality of messages to be pushed which are put in this time and before in sequence.
Further, the step of performing security audit on the push request specifically includes:
checking whether the corresponding identity information of the pusher is in a permanent blacklist, if so, judging that the safety audit result is unqualified, ending the safety audit step, otherwise, executing the next step;
searching in a preset illegal information database aiming at the message to be pushed so as to determine whether the message to be pushed contains illegal contents;
and if the message to be pushed contains illegal contents, the security audit result is unqualified, then the corresponding identity information of the pusher and the corresponding security audit result are listed in a permanent blacklist, and otherwise, the security audit result is qualified.
Further, the method also comprises the following steps of rechecking the message queue:
detecting the identity information of the pushers corresponding to all messages to be pushed in the message queue, and extracting all messages to be pushed corresponding to the same pushers;
classifying all extracted messages to be pushed by taking corresponding pushers as classification bases, and splicing the messages to be pushed which are classified into the same class into combined messages;
and respectively carrying out security audit on each combined message, if the security audit result is qualified, reserving the corresponding combined message in the message queue, otherwise, packaging each push request corresponding to the corresponding combined message into a read-only file, storing the read-only file, and then deleting the corresponding combined message from the message queue.
Further, the method also comprises the step of storing the push request corresponding to the sent message to be pushed into the history record.
Further, the method also comprises the following steps of reviewing the message queue and the history record:
detecting the identity information of the pushers corresponding to all messages to be pushed in the message queue and the history record, and extracting all messages to be pushed corresponding to the same pushers;
classifying all extracted messages to be pushed by taking corresponding pushers as classification bases, and splicing the messages to be pushed which are classified into the same class into combined messages;
and respectively carrying out security audit on each combined message, if the security audit result is qualified, reserving the corresponding combined message in the message queue, otherwise, packaging each push request corresponding to the corresponding combined message into a read-only file, storing the read-only file, and then deleting the corresponding combined message from the message queue.
Further, after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of sending a withdrawal instruction to a corresponding target channel is also executed; the withdrawing instruction is used for informing the corresponding target channel to withdraw or delete the received push message sent by the corresponding pusher.
Further, after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of sending advisory message to a corresponding target channel is also executed; the advisory message is used to remind the pushed person to deny trust in the received illegal content.
Further, after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of sending warning information to the corresponding pusher is also executed; the warning information is used for informing the pushers of technical consequences and legal consequences of pushing behaviors.
The second technical scheme adopted by the invention is as follows:
a message push system for blocking illegal messages, comprising:
the system comprises a message acquisition module, a message sending module and a message sending module, wherein the message acquisition module is used for acquiring a pushing request sent by a pusher, and the pushing request comprises a message to be pushed, identity information of the pusher, a source channel and a target channel;
the safety audit module is used for carrying out safety audit on the pushing request, executing the next step if the safety audit result is qualified, otherwise, stopping pushing the corresponding message to be pushed if the safety audit result is unqualified, packaging the pushing request into a read-only file and storing the read-only file;
the message queue module is used for receiving the messages to be pushed by using the corresponding channel receiver according to the source channel and sequentially putting the messages to be pushed into the corresponding message queue;
the message sending module is used for sending each plurality of messages to be pushed stored in the message queue to a corresponding target channel according to the storage sequence of the message queue;
the message queue stores a plurality of messages to be pushed which are put in this time and before in sequence.
The third technical scheme adopted by the invention is as follows:
a message push apparatus for blocking illegal messages, comprising:
a memory for storing at least one program;
a processor for loading the at least one program to perform the message pushing method for blocking illegal messages.
The invention has the beneficial effects that: through the integrated message interface and the unified message centralized processing, the message can be pushed in time only by calling the message interface, the workload of an application system for developing a message pushing module is reduced, the repeated development of interfaces butted among different channels is avoided, and the problem of messy message sending is solved. The push request is checked through security audit, so that the propagation of illegal messages can be prevented, the network environment is maintained to be clean, and once the illegal messages are detected, a pusher can be timely tracked and electronic evidence can be reserved, so that the legal responsibility of the pusher can be followed, and the safety problem of message sending is solved. The message queue is used for buffering the message to be pushed, so that the robustness of the system can be enhanced, and the message to be pushed can be conveniently further processed to supervise a message receiving and transmitting system.
Drawings
FIG. 1 is a flow chart of a message pushing method for preventing illegal messages according to the present invention;
fig. 2 is a block diagram of a message pushing apparatus for preventing illegal messages according to the present invention.
Detailed Description
Example 1
The invention provides a message pushing method for preventing illegal messages, as shown in figure 1, comprising the following steps:
acquiring a push request sent by a pusher, wherein the push request comprises a message to be pushed, identity information of the pusher, a source channel and a target channel;
performing safety audit on the pushing request, if the safety audit result is qualified, executing the next step, otherwise, if the safety audit result is unqualified, stopping pushing the corresponding message to be pushed, packaging the pushing request into a read-only file and storing the read-only file;
receiving messages to be pushed by using corresponding channel receivers according to source channels, and sequentially placing the messages to be pushed into corresponding message queues;
sending each plurality of messages to be pushed stored in the message queue to a corresponding target channel according to the storage sequence of the message queue;
the message queue stores a plurality of messages to be pushed which are put in this time and before in sequence.
The pusher can be a user of communication software such as mobile phone short messages, emails, micro-mails, micro-blogs, nails and the like. In order to realize cross-channel message pushing, the obtained pushing request sent by the pusher at least comprises corresponding pusher identity information, a source channel and a target channel besides the message to be pushed, and also can comprise information such as pushing request receiving time, message pushing time and the like. The source channel marks the channel from which the message to be pushed comes, e.g. a WeChat or email. The target channel marks the channel to which the message to be pushed is to be sent, so that the system using the message pushing method can call the corresponding interface to send the message to be pushed to the corresponding channel.
By using the message pushing method, the pushing of the message can be completed in time only by calling the message interface through the integrated message interface and the unified message centralized processing, the workload of an application system for developing a message pushing module is reduced, the repeated development of interfaces butted among different channels is avoided, and the problem of messy message transmission is solved.
In order to solve the safety problem of message sending, the message pushing method determines whether to accept and respond to the pushing request sent by the pusher through safety audit. The safety audit of the push request mainly refers to the examination of the identity information of a push person and the content of a message to be pushed.
The identity information of the pusher represents the real identity of the pusher, the examination of the identity information of the pusher is to check whether the pusher per se meets the access condition, and the examination can be realized through a registration authentication mechanism, namely, the examination only responds to the pushing request sent by the pusher which is registered and authenticated in advance, and refuses to respond to the pushing request sent by the pusher which is not authenticated. The registration authentication mechanism can be embodied as a black list and a white list, if the pusher is in the black list, the corresponding security audit result is unqualified, and if the pusher is not in the black list or in the white list, the corresponding security audit result is qualified.
And examining the content of the message to be pushed, which is mainly to examine whether the message to be pushed contains illegal contents such as fraud, violence, pornography, horror, action and the like, if the illegal contents do not exist in the message to be pushed, the corresponding safety audit result is unqualified, otherwise, the corresponding safety audit result is qualified. The result of the security audit is related to whether the push request is accepted, that is, whether the message to be pushed is pushed out.
The illegal messages contained in the messages to be pushed often relate to law violation and even crimes, and the corresponding pushers need to be under the investigation of laws. And if the security audit result is unqualified, the pushing request is packaged into a read-only file and the read-only file is stored except for stopping pushing the corresponding message to be pushed. The read-only file can ensure the integrity of the stored content, and the read-only file records the real identity information of the related presenter and the complete message to be pushed, and can be used as powerful electronic data evidence to be provided for related departments to carry out further investigation, so that illegal message pushing behaviors are struck.
The message queue is a middleware, which is used as a container to store the messages to be pushed in a certain sequence, and can generate a buffering effect and facilitate further processing of the messages to be pushed. Only one total message queue can be set, or a plurality of sub message queues can be set respectively for different source channels or different target channels, and each message queue only stores one message to be pushed with the same source channel or target channel. The channel receiver may include a program to identify and classify the message to be pushed. And the messages to be pushed received by the channel receiver are stored into the total message queue or the plurality of sub-message queues according to a time sequence or a set sequence. The messages to be pushed stored in the message queue can be pushed to the target channel according to the first-in first-out, first-in last-out or set sequence.
The manager of the system using the method of the present invention can perform statistical analysis on the pushed messages according to the history. For example, the total number of messages pushed in different time periods and the variation trend thereof can be output in the form of a report or a statistical chart, or the total number of messages from different source channels, pushed to different target channels, or further the information of the ratio of the number of messages from different source channels, etc. can be output in different time periods. According to the statistical information, the manager can know the history situation of message pushing, so as to adjust parameters such as interfaces.
Further as a preferred embodiment, the step of performing security audit on the push request specifically includes:
checking whether the corresponding identity information of the pusher is in a permanent blacklist or a temporary blacklist, if so, judging that the safety audit result is unqualified, and ending the safety audit step, otherwise, executing the next step;
searching in a preset illegal information database aiming at the message to be pushed so as to determine whether the message to be pushed contains illegal contents;
and if the message to be pushed contains illegal contents, the security audit result is unqualified, then the corresponding identity information of the pusher and the corresponding security audit result are listed in a permanent blacklist, and otherwise, the security audit result is qualified.
If the pusher is in the permanent blacklist or the temporary blacklist, the security audit result can be directly judged to be unqualified, otherwise, the content of the message to be pushed is checked. For the message to be pushed, extracting keywords from the message to be pushed, searching and comparing the keywords in an illegal information database, and judging whether the message to be pushed contains the keywords with illegal contents; the method of full text retrieval can also be used for searching the whole message to be pushed in the corresponding illegal information database, so as to better judge whether the message to be pushed contains illegal contents.
And if the message to be pushed contains illegal contents, the security audit result is unqualified. Because the illegal contents pushed by the pusher are suspected of being illegal or even criminal, the corresponding identity information of the pusher and the corresponding security audit result are listed in a permanent blacklist. The content in the permanent blacklist is permanently stored unless it is changed for the administrator, and can be used to prevent the pushers who have pushed illegal content from pushing the message again.
Further as a preferred embodiment, the method further includes the following steps of reviewing the message queue:
detecting the identity information of the pushers corresponding to all messages to be pushed in the message queue, and extracting all messages to be pushed corresponding to the same pushers;
classifying all extracted messages to be pushed by taking corresponding pushers as classification bases, and splicing the messages to be pushed which are classified into the same class into combined messages;
and respectively carrying out security audit on each combined message, if the security audit result is qualified, reserving the corresponding combined message in the message queue, otherwise, packaging each push request corresponding to the corresponding combined message into a read-only file, storing the read-only file, and then deleting the corresponding combined message from the message queue.
With the increasing strength of attack on illegal messages, the means of related pushers become various and complex, and the pushers may use various means to avoid checking the content of the messages, for example, a complete message containing the illegal content is divided into a plurality of parts, corresponding to a plurality of messages, each message can obtain qualified security audit results independently no matter through keyword retrieval or full-text retrieval, and after the plurality of messages are simultaneously pushed to a target channel and sent to a receiver, the synthesized complete message at the receiver can reproduce the illegal content.
The illegal means can be solved by rechecking the message queue. The messages to be pushed are stored in the message queue, qualified results of which are obtained through the security audit step, and the messages are sent after waiting for a period of time due to the buffering effect of the message queue, so that the messages in the message queue can be reviewed at any time. The method with the highest efficiency is to classify all the messages to be pushed in the current message queue according to the pushers, for example, all the messages to be pushed of the pusher A are grouped into one group, all the messages to be pushed of the pusher B are grouped into another group, then all the groups of messages are spliced into combined messages with higher integrity respectively, and then the combined messages are subjected to security audit, so that the phenomenon that missed-network fishes exist in the security audit of a single message can be avoided to the greatest extent. It is also possible to combine all the messages to be pushed in the message queue into one combined message, or to randomly extract several messages to be pushed from the combined message to form one combined message. The security audit step executed in the reexamination step of the message queue, the processing object of which is the combined message, can be known only by simply replacing the object of the security audit step explained above.
Further, as a preferred embodiment, the method further includes the step of storing the push request corresponding to the sent message to be pushed into the history.
Further as a preferred implementation, the method also comprises the step of reviewing the message queue and the history. The combined message obtained by splicing the message queue and the history record can comprise the message to be pushed in the message queue and the history record, namely, the combined message comprises the message to be pushed by the same pusher and the pushed message, so that the range of the rechecking can be expanded, and the tightness of the security audit is improved.
Further as a preferred embodiment, after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of sending a withdrawal instruction to a corresponding target channel is also executed; the withdrawing instruction is used for informing the corresponding target channel to withdraw or delete the received message to be pushed sent by the corresponding pusher.
Further as a preferred embodiment, after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of sending an advisory message to a corresponding target channel is also executed; the advisory message is used to remind the pushed person to deny trust in the received illegal content.
Further as a preferred embodiment, after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of sending warning information to the corresponding pusher is also executed; the warning information is used for informing the pushers of technical consequences and legal consequences of pushing behaviors.
If the security audit result obtained after the security audit is unqualified, the method can be used for passive response, and the result of illegal message propagation can be relieved in an active mode.
The proactive approach includes issuing a withdrawal instruction to the corresponding target channel. Since the illegal message is often pushed continuously, that is, a sender has pushed a message containing illegal contents once, other messages previously pushed by the sender are likely to contain illegal contents, and the message previously pushed by the sender may not be detected by the security audit step and may have been received. For safety, a withdrawal instruction can be sent to the target channel, and after receiving the withdrawal instruction, the target channel deletes or returns the message which is already received by the pushed party and sent by the blacklisted pushed party by the safety audit step, so as to prevent the message from being read and spread.
The proactive approach also includes issuing an advisory message, which may be in text or multimedia form, to the corresponding target channel to remind and advise the presenter of the relevant message to do not trust to reduce the adverse effects of illegal messages in the event that the withdrawal instruction fails to take effect.
The active mode also comprises sending out warning information to the corresponding pusher, and the warning information can be in a text or multimedia form. The warning message informs the pusher that the pushing action has resulted in technical consequences of being permanently blacklisted, being unable to push messages any more, and possibly also legal consequences, for preventing further pushing actions by the pusher.
Example 2
The invention relates to a message pushing system for preventing illegal messages, which comprises:
the system comprises a message acquisition module, a message sending module and a message sending module, wherein the message acquisition module is used for acquiring a pushing request sent by a pusher, and the pushing request comprises a message to be pushed, identity information of the pusher, a source channel and a target channel;
the safety audit module is used for carrying out safety audit on the pushing request, executing the next step if the safety audit result is qualified, otherwise, stopping pushing the corresponding message to be pushed if the safety audit result is unqualified, packaging the pushing request into a read-only file and storing the read-only file;
the message queue module is used for receiving the messages to be pushed by using the corresponding channel receiver according to the source channel and sequentially putting the messages to be pushed into the corresponding message queue;
the message sending module is used for sending each plurality of messages to be pushed stored in the message queue to a corresponding target channel according to the storage sequence of the message queue;
the message queue stores a plurality of messages to be pushed which are put in this time and before in sequence.
Each functional module in this embodiment may be implemented by a corresponding program module. The system can execute the message pushing method for preventing the illegal messages provided by the embodiment 1 of the invention, can execute any combination implementation steps of the embodiment of the method, and has corresponding functions and beneficial effects of the method.
Example 3
The invention relates to a message pushing device for preventing illegal messages, as shown in figure 2, comprising:
a memory for storing at least one program;
a processor for loading the at least one program to execute the message pushing method for preventing illegal messages according to embodiment 1.
The device can execute the message pushing method for preventing the illegal messages provided by the embodiment 1 of the invention, can execute any combination implementation steps of the embodiment of the method, and has corresponding functions and beneficial effects of the method.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A message push method for preventing illegal messages, comprising:
acquiring a push request sent by a pusher, wherein the push request comprises a message to be pushed, identity information of the pusher, a source channel and a target channel;
performing safety audit on the pushing request, if the safety audit result is qualified, receiving messages to be pushed by using a corresponding channel receiver according to a source channel, sequentially placing the messages to be pushed into a corresponding message queue, and sending each plurality of messages to be pushed stored in the message queue to a corresponding target channel according to the storage sequence of the message queue; otherwise, if the security audit result is unqualified, stopping pushing the corresponding message to be pushed, packaging the pushing request into a read-only file and storing the read-only file;
the method comprises the following steps of sequentially storing a plurality of messages to be pushed placed at this time and in the previous time in a message queue, and performing security audit on a pushing request, wherein the steps specifically comprise:
checking whether the corresponding identity information of the pusher is in a permanent blacklist, if so, determining that the safety audit result is unqualified, ending the safety audit step, otherwise, searching in a preset illegal information database aiming at the message to be pushed so as to determine whether the message to be pushed contains illegal contents, if so, determining that the safety audit result is unqualified, and then listing the corresponding identity information of the pusher and the corresponding safety audit result in the permanent blacklist, otherwise, determining that the safety audit result is qualified.
2. The message pushing method for preventing illegal messages according to claim 1, further comprising the following steps of reviewing the message queue:
detecting the identity information of the pushers corresponding to all messages to be pushed in the message queue, and extracting all messages to be pushed corresponding to the same pushers;
classifying all extracted messages to be pushed by taking corresponding pushers as classification bases, and splicing the messages to be pushed which are classified into the same class into combined messages;
and respectively carrying out security audit on each combined message, if the security audit result is qualified, reserving the corresponding combined message in the message queue, otherwise, packaging each push request corresponding to the corresponding combined message into a read-only file, storing the read-only file, and then deleting the corresponding combined message from the message queue.
3. The message pushing method for preventing illegal messages according to claim 2, further comprising the step of storing the push request corresponding to the sent message to be pushed into the history.
4. The message pushing method for preventing illegal messages according to claim 3, further comprising the following steps of reviewing message queues and history records:
detecting the identity information of the pushers corresponding to all messages to be pushed in the message queue and the history record, and extracting all messages to be pushed corresponding to the same pushers;
classifying all extracted messages to be pushed by taking corresponding pushers as classification bases, and splicing the messages to be pushed which are classified into the same class into combined messages;
and respectively carrying out security audit on each combined message, if the security audit result is qualified, reserving the corresponding combined message in the message queue, otherwise, packaging each push request corresponding to the corresponding combined message into a read-only file, storing the read-only file, and then deleting the corresponding combined message from the message queue.
5. The message pushing method for preventing illegal messages according to any one of claims 2-4, characterized in that after the step of performing security audit on each combined message, if the result of the security audit is not qualified, the step of issuing a withdrawal instruction to a corresponding target channel is also performed; the withdrawing instruction is used for informing the corresponding target channel to withdraw or delete the received push message sent by the corresponding pusher.
6. The message pushing method for preventing illegal messages according to any of claims 2-4, characterized in that after the step of performing security audit on each combined message, if the security audit result is unqualified, the step of issuing advisory message to corresponding target channel is also performed; the advisory message is used to remind the pushed person to deny trust in the received illegal content.
7. The message pushing method for preventing illegal messages according to any of claims 2-4, characterized in that after the step of performing security audit on each combined message, if the result of the security audit is not qualified, the step of sending warning information to the corresponding pusher is also performed; the warning information is used for informing the pushers of technical consequences and legal consequences of pushing behaviors.
8. A message push apparatus for blocking illegal messages, comprising:
a memory for storing at least one program;
a processor for loading the at least one program to perform a message pushing method of blocking illegitimate messages as claimed in any one of claims 1-7.
CN201810057348.2A 2018-01-22 2018-01-22 Message pushing method and device for preventing illegal messages Active CN108347374B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810057348.2A CN108347374B (en) 2018-01-22 2018-01-22 Message pushing method and device for preventing illegal messages

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810057348.2A CN108347374B (en) 2018-01-22 2018-01-22 Message pushing method and device for preventing illegal messages

Publications (2)

Publication Number Publication Date
CN108347374A CN108347374A (en) 2018-07-31
CN108347374B true CN108347374B (en) 2021-06-29

Family

ID=62960841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810057348.2A Active CN108347374B (en) 2018-01-22 2018-01-22 Message pushing method and device for preventing illegal messages

Country Status (1)

Country Link
CN (1) CN108347374B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110838970B (en) * 2019-11-04 2022-03-01 宜人恒业科技发展(北京)有限公司 Message distribution method, device and system
CN111131392A (en) * 2019-11-27 2020-05-08 北京文渊佳科技有限公司 Method, device, electronic equipment and medium for processing message
CN113132764A (en) * 2019-12-31 2021-07-16 中兴通讯股份有限公司 Method, system and storage medium for offline of content
CN111614548A (en) * 2020-05-20 2020-09-01 广州平云小匠科技有限公司 Message pushing method and device, computer equipment and storage medium
CN112637282B (en) * 2020-12-08 2023-02-03 平安普惠企业管理有限公司 Information pushing method and device, computer equipment and storage medium
CN114466075B (en) * 2022-01-14 2024-04-16 北京快乐茄信息技术有限公司 Request processing method and device, electronic equipment and storage medium
CN114979250A (en) * 2022-04-18 2022-08-30 北京嗨学网教育科技股份有限公司 Message pushing method, device and equipment
CN114827254A (en) * 2022-04-22 2022-07-29 深圳微言科技有限责任公司 Message pushing method, system and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118138A (en) * 2013-03-04 2013-05-22 中国信息安全测评中心 Cloud service based message queue stream processing method
KR101379711B1 (en) * 2013-11-14 2014-04-01 (주)지란지교소프트 Method for file encryption and decryption using telephone number
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
EP2890074A1 (en) * 2013-12-31 2015-07-01 Gemalto SA Method for transmitting push messages
CN105743939A (en) * 2014-12-09 2016-07-06 中国移动通信集团江苏有限公司 Message push method and device
CN105808288A (en) * 2016-02-26 2016-07-27 深圳天珑无线科技有限公司 Message push control method and device of operating system
CN106603422A (en) * 2016-12-09 2017-04-26 上海斐讯数据通信技术有限公司 Network steal prevention method of wireless router, and wireless router
CN106789582A (en) * 2016-12-26 2017-05-31 安徽尚果信息科技有限公司 A kind of app information push methods
CN107171834A (en) * 2017-05-05 2017-09-15 四川长虹电器股份有限公司 Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8634810B2 (en) * 2011-09-29 2014-01-21 International Business Machines Corporation Pushing secure notifications to mobile computing devices

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103118138A (en) * 2013-03-04 2013-05-22 中国信息安全测评中心 Cloud service based message queue stream processing method
KR101379711B1 (en) * 2013-11-14 2014-04-01 (주)지란지교소프트 Method for file encryption and decryption using telephone number
EP2890074A1 (en) * 2013-12-31 2015-07-01 Gemalto SA Method for transmitting push messages
CN105743939A (en) * 2014-12-09 2016-07-06 中国移动通信集团江苏有限公司 Message push method and device
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN105808288A (en) * 2016-02-26 2016-07-27 深圳天珑无线科技有限公司 Message push control method and device of operating system
CN106603422A (en) * 2016-12-09 2017-04-26 上海斐讯数据通信技术有限公司 Network steal prevention method of wireless router, and wireless router
CN106789582A (en) * 2016-12-26 2017-05-31 安徽尚果信息科技有限公司 A kind of app information push methods
CN107171834A (en) * 2017-05-05 2017-09-15 四川长虹电器股份有限公司 Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond

Also Published As

Publication number Publication date
CN108347374A (en) 2018-07-31

Similar Documents

Publication Publication Date Title
CN108347374B (en) Message pushing method and device for preventing illegal messages
US10581780B1 (en) Tertiary classification of communications
CN108400927B (en) Message pushing method and device for high-concurrency messages
CN105704005B (en) Malicious user reporting method and device, and reported information processing method and device
US20110119730A1 (en) Enforcing Centralized Communication Policies
US20110280160A1 (en) VoIP Caller Reputation System
KR102464629B1 (en) Device and its operation methods for providing E-mail security service using hierarchical architecture based on security level
CN110851872B (en) Risk assessment method and device for private data leakage
JP2009512082A (en) Electronic message authentication
CN111160740A (en) Network taxi appointment risk control system and control method
KR20100006371A (en) A decision method and system of suitability for web contents using white/black list
US20230179705A1 (en) Dynamically providing safe phone numbers for responding to inbound communications
CN108011805A (en) Method, apparatus, intermediate server and the car networking system of message screening
CN104239798B (en) Mobile terminal, server end in mobile office system and its virus method and system
CN104754374A (en) Audio-video file detection management method and device
CN105630855B (en) File sharing method, shared file system and terminal
CN110225109B (en) Multi-queue data transmission method based on 'industrial and commercial connection' platform
US20070124389A1 (en) Anti-spam application storage system
US20240015182A1 (en) Device for providing protective service against email security-based zero-day url attack and method for operating same
WO2016037489A1 (en) Method, device and system for monitoring rcs spam messages
CN110995570A (en) Pending approval message reminding method, system, storage medium and computer equipment
KR102546068B1 (en) Device and its operation methods for providing E-mail security service using hierarchical architecture based on security level
CN104702671B (en) Method and server for reporting information
CN113850283A (en) Method and device for identifying violation of RCS (Rich client System) message
CN108270567B (en) Message source verification method, device and system and message sending method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant