WO2005018152A1 - A system and method of intelligently monitoring the message centers - Google Patents

A system and method of intelligently monitoring the message centers Download PDF

Info

Publication number
WO2005018152A1
WO2005018152A1 PCT/CN2004/000486 CN2004000486W WO2005018152A1 WO 2005018152 A1 WO2005018152 A1 WO 2005018152A1 CN 2004000486 W CN2004000486 W CN 2004000486W WO 2005018152 A1 WO2005018152 A1 WO 2005018152A1
Authority
WO
WIPO (PCT)
Prior art keywords
monitoring
message
user
blacklist
server
Prior art date
Application number
PCT/CN2004/000486
Other languages
French (fr)
Chinese (zh)
Inventor
Kai Fu
Zhigui Yuan
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Publication of WO2005018152A1 publication Critical patent/WO2005018152A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Definitions

  • the present invention relates to the technical field of monitoring message centers in communication systems, and in particular, to a system and method for intelligently monitoring short message centers, multimedia message centers, mail centers, etc. of CDMA communication systems, GSM communication systems, and wireless local telephone systems.
  • the function of the message center in the communication system is becoming increasingly powerful, and it has developed from a short message center to a multimedia message center and a mail center.
  • the number of users who use the message center is increasing, and the use of the message center to promote advertising is endless, and communication networks have gradually realized interconnection.
  • the amount of messages flowing between communication networks has grown geometrically.
  • Spam attacks in a short period of time can cause the transmission volume of communication networks to increase rapidly and easily cause network paralysis. Frequent spam and malicious messages, etc. It will also annoy users who use the message center; and reactionary and rumorous messages will have extremely bad social impact.
  • the monitoring methods of the message center are mainly as follows: The manager of the message center manually sets a blacklist number on the service processor of the message center for specified filtering, but this method is inconvenient and inaccurate, and cannot be real-time according to the network conditions. Modifying the blacklist number is very time-consuming and cannot cope with the large message traffic of the current message center. Therefore, there is an urgent need for a system and method that can automatically monitor the message center. However, no publicly similar technical solution has been found.
  • the technical problem to be solved by the present invention is to provide a system and method for intelligently monitoring a message center.
  • This method can automatically monitor various types of message centers, and modify the monitoring configuration parameters according to the actual situation of the communication network to avoid the spread of spam and malicious messages and ensure the stability of the message center.
  • the system of the intelligent monitoring message center of the present invention includes a service processor, a monitoring server, and at least one monitoring management station, wherein the service processor is configured to process a received information service and send a message to be monitored to the monitoring server, And controlling the processing of information services according to the user blacklist returned by the monitoring server; the monitoring server is configured to process the messages to be monitored according to the monitoring configuration parameters output by the monitoring management station, and generate a user blacklist to output to the service processing The monitoring management station is configured to generate monitoring configuration parameters and send the monitoring configuration parameters to the monitoring server.
  • a message database is provided for storing records generated during the message monitoring process, including the banned messages themselves and the monitoring results.
  • the service processor is further provided with a user blacklist table for storing the user blacklist, and performing blacklist monitoring on the user according to the user blacklist.
  • the monitoring server is also provided with a message flow monitoring table for storing information of monitoring users.
  • the method for intelligently monitoring a message center according to the present invention includes the following steps: a service processor sends a message to be monitored to a monitoring server; the monitoring server monitors the monitoring message in real time according to the monitoring configuration parameters sent by the monitoring management station; the monitoring server The forbidden user generates a user blacklist and sends it to the service processor; the service processor controls the processing of information services according to the user blacklist.
  • the monitoring server monitors the monitored messages in real time, including monitoring the message content and monitoring the message traffic.
  • the system and method according to the present invention can automatically intercept suspicious objects according to the monitoring configuration parameters, and set them as blacklisted users, and the service processor immediately closes the message source corresponding to the user; meanwhile, it can also automatically The user is deleted from the blacklist, so that the corresponding message source is unblocked immediately.
  • the invention can modify the monitoring configuration parameters in real time, and the monitoring operation takes effect immediately.
  • the present invention can be Control configuration for multi-channel alarms; each remote terminal with authority can monitor the monitoring status in real time, and can query and analyze its historical records at any time.
  • the invention can be applied to the monitoring of various short message centers, multimedia message centers, and mail centers.
  • FIG. 1 is a schematic diagram of a network structure of a system of an intelligent monitoring message center according to the present invention
  • FIG. 3 is a schematic flowchart of monitoring user message traffic in the method of the present invention.
  • FIG. 5 is a schematic flowchart of a service processor controlling information service processing according to a user blacklist in the method of the present invention.
  • the message centers of various communication systems generally include a service processor 110, a service access server 160, a switching center 140, and a WW server 150.
  • the service access server 160 is mainly used to access information services from the switching center 140 and the stomach server 150.
  • the service processor 110 is used to process various types of information services, such as short messages, multimedia short messages, and multimedia mails, and to perform various types of messages and mail interactions with the switching center 140 and WW server 150 through the service access server 16 Send and receive.
  • the system for intelligently monitoring a message center includes: a service processor 110 located in the message center, a monitoring server 120 and a monitoring management station 130.
  • the business processor 110 communicates with the monitoring server 120.
  • the business processor 110 also sends messages to be monitored to the monitoring server 120.
  • the monitoring server 120 is separately connected to the business processor 110 and the monitoring management station. 130 is connected and communicates in real time, and is used for real-time monitoring of the monitored messages according to the monitoring configuration parameters, and generates a user blacklist and a blacklist unban list, and sends it to the service processor 110; the monitoring management station 130 is used to set monitoring configuration parameters and send them to the monitoring server 120.
  • the monitoring server 120 may also send the monitoring result to the monitoring management station 130.
  • the monitoring server 120 is also provided with at least one remote interface 180 to provide an interface for remote users.
  • the monitoring server 120 may be connected to a remote terminal 181 or a browser 182 through the remote interface 180 to provide a remote user with a configuration interface or a monitoring interface for monitoring configuration parameters.
  • the monitoring server 120 may also be connected to a log printing device 191 or an acousto-optic alarm device 192 to output and display a monitoring result.
  • a message database is set in the business processor 110 and the monitoring server 120, and is used to store records generated during the monitoring process of the message, including the banned messages themselves and the monitoring results.
  • the above message database may be located in the memory of the business processor 110 and the monitoring server 120, and is a data table organized in a HASH manner.
  • the specific implementation is: apply for a structure array area in the memory, each member structure of the array corresponds to a India record; a certain member in the member structure is used as an index, such as a number.
  • Hash algorithm is used to locate the corresponding record according to the index, which can locate the data at high speed.
  • the monitoring configuration parameters are information used to guide the monitoring server 120 to perform monitoring, including configuration parameters of the monitoring mode, parameters of monitoring result processing, blacklist user lifting conditions, super users, monitoring keywords, etc., where the monitoring mode refers to the monitoring server 120 Information of the messages to be monitored, such as message traffic monitoring, message content monitoring, etc.
  • Super users are users who do not perform message monitoring.
  • Configuration parameters for message traffic monitoring include monitoring time, monitoring count, threshold, etc .
  • configuration parameters for message content monitoring include monitoring keywords
  • parameters for processing monitoring results include "generate user blacklist", “monitoring results feedback”, “sound and light”"Alarm”,"Logprint”,”Notifyadministrator", etc.
  • the monitoring management station 130 generates monitoring configuration parameters and sends the monitoring configuration parameters to the monitoring server 120.
  • the monitoring configuration parameters are global structural variables stored in the memory of the monitoring server 120.
  • the monitoring server 120 monitors the messages to be monitored in real time according to the specific monitoring configuration parameters. After receiving the monitoring configuration parameters of the monitoring management station 130, the monitoring server 120 immediately modifies the monitoring configuration parameter items in the memory, and the monitoring server 120 performs monitoring according to the new monitoring configuration parameters. At the same time, the monitoring server 120 writes the new configuration parameters into the monitoring configuration file to prevent the configuration parameters from being lost, and is also available for the monitoring management station 130 to verify.
  • the monitoring server 120 monitors the monitored messages according to the monitoring configuration parameters, which may be the traffic of the monitored messages and / or the content of the messages.
  • the monitoring server 120 is provided with a message flow monitoring table for storing information of monitoring users.
  • the message flow monitoring table is a memory table that uses a structured array area in memory, such as HASH.
  • the LRU algorithm can be further used to ensure the security of the table and the effectiveness of the records in the table.
  • the monitoring server 120 generates a user blacklist for users who meet the prohibition conditions according to the monitoring result, and sends the user blacklist to the service processor 110.
  • the service processor 110 controls the processing of information services according to the blacklist, and filters the blacklist users.
  • a user blacklist table is set in the service processor 110 for storing the user blacklist.
  • the blacklist table can also be a memory table that uses a structured array area in memory, and further uses the LRU algorithm to ensure the security of the table and the effectiveness of the records in the table.
  • the method for intelligently monitoring a message center includes: the service processor 110 sends a message to be monitored to the monitoring server 120; the monitoring server 120 monitors the monitoring message in real time according to the monitoring configuration parameters sent by the monitoring management station 130; the monitoring server 120 According to the monitoring results, automatically select the users who meet the prohibition conditions and generate a user blacklist, and send it to the business processor 110; business processing The machine 110 controls the processing of information services according to the user blacklist, and closes the message sources of the blacklisted users.
  • the monitoring configuration parameters are configured by the administrator on the monitoring management station 130 through a graphical configuration interface.
  • the monitoring server 120 may also send the monitoring results to the monitoring management station 130 or other authorized remote terminals or users, and may also perform all-round alarms, including sound and light alarms.
  • the monitoring server 120 may also automatically generate a blacklist unbanning list and send it to the service processor 110, and the service processor 110 deletes the unbanned blacklist user from the user blacklist table, thereby unbanning the user.
  • the message to be monitored may be the information received by the service processor 110 itself, or it may be a simplification of the above information, such as a bill, etc .;
  • the data flow D is The user blacklist or blacklist unban list sent by the monitoring server 120 to the business processor 110; data streams 1, 2, and 3 are monitoring configuration parameters sent by the monitoring management station 130 or other remote users to the monitoring server 120; data stream 4 , 5, 6, 7, 8, and 9 are messages sent by the monitoring server 120 to the monitoring management station 130 and other various terminals for alarm, browsing, and tracking analysis.
  • the method of the present invention is specifically as follows: after receiving the information to be processed or mail, that is, data flow A, the service processor 110 sends the data to the subsequent processing server for normal processing (data flow B), and also monitors
  • the server 120 sends a message to be monitored, that is, the data stream C for monitoring, and the data stream C sent to the monitoring server 120 may carry only basic information required for monitoring.
  • the monitoring server 120 monitors the monitoring messages in real time according to the monitoring configuration parameters sent by each monitoring management station 130, that is, data streams 1, 2, and 3, and sends monitoring results that are data streams 4, 5, 6, 7, 8, and 9 To each monitoring management station 130, analysis terminal, alarm device, or printing device.
  • the monitoring server 120 monitors the obtained user blacklist data, namely The data stream D is immediately sent to the service processor 110 and stored in the user blacklist table, so that the information service of the user is closed.
  • the monitoring server 120 also periodically checks the user blacklist table according to the unbanning conditions configured by the monitoring management station 1 30, filters out the blacklisted users who meet the unbanning conditions, generates a blacklist unbanning list, and sends the blacklist to the service processor 110.
  • the blacklisted users in the unbanned list are deleted, and the information services of these users are lifted.
  • the monitoring of message traffic refers to monitoring whether the amount of information sent by the information user within a set unit time exceeds a set threshold, and if it exceeds, a user blacklist is generated; then the monitoring server 120 sends the user blacklist to the service processor 110 Or output to the alarm device or perform other monitoring results processing.
  • a message traffic monitoring table is set in the monitoring server 120, which is used to store information of the monitoring users, including at least the user's number, the current monitoring time, and the current monitoring count value.
  • the message flow monitoring table uses the form of an in-memory database.
  • the monitoring server 120 records the information of the user in the message flow monitoring table, where the count value of the recording monitoring is 1, and the recording current time is the monitoring start time (step 303). The monitoring server 120 then checks whether the count value of the user exceeds the set monitoring count threshold (step 306). If the count value does not exceed the monitoring count threshold, it indicates that the message traffic of the user does not exceed the preset threshold, and ends the monitoring.
  • the monitoring server 120 processes the monitoring result (step 307), which may be: generating a blacklist of the user and sending it to the business process machine 110, either feedback the monitoring result to the monitoring management station 130, or perform an acousto-optic alarm or the like, or all of the above three processes. Then the monitoring server 120 resets the record of the user, the count value returns to 0 (step 308), and the monitoring ends.
  • the monitoring server 120 checks whether the current monitoring time of the user reaches the set monitoring time interval (step 304). If the monitoring time interval is exceeded, the monitoring server 120 resets the user Record, the count value returns to 0 (step 308), and the monitoring ends. If the monitoring time interval has not been exceeded, the monitoring server 120 checks whether the user's record has just been reset (step 305), and if so, sets the user's count value to 1 and sets the current time as the monitoring start time, Then step 306 is performed; if it has not just been reset, then the count value of the user is incremented by 1, and then step 306 is performed.
  • the monitoring of the content of the message refers to monitoring the content of the short message, the content of the multimedia short message, and the subject of the multimedia mail according to the monitoring keywords configured by the monitoring management station 130.
  • the monitoring server 120 receives the message to be monitored sent by the service processor 110 (step 401), and then checks whether the content of the received message to be monitored contains the set monitoring key. Word (step 402). If it does, the monitoring server 120 processes the monitoring result (step 403), which may be: generating a user blacklist and sending it to the service processor 110, or performing an audible and visual alarm, or feeding back the monitoring result to the monitoring management station 130, Or all three processes described above are performed. If there is no monitoring keyword, the monitoring is ended (step 404).
  • a super user is set in the monitoring management station 130, check whether the user of the message to be monitored is a super user before monitoring the monitored messages, and if so, do not perform monitoring processing on the monitored messages; if not, perform subsequent monitoring deal with.
  • the method further includes: judging whether the monitored suspicious user meets the blacklist generating widget set by the monitoring management station 130 (such as being detected in a unit time). In order to determine whether the frequency of suspicious users reaches the specified threshold, suspicious users who meet the blacklist generation conditions are determined as blacklisted users.
  • the service processor 110 After receiving the user blacklist from the monitoring server 120, the service processor 110 stores the user blacklist in the user blacklist table.
  • This table may use a memory table in the form of an in-memory database.
  • the service processor 110 performs filtering processing on the blacklisted users according to the user blacklist table, intercepts messages of the users in the user blacklist table, and processes only messages of legitimate users.
  • the monitoring server 120 periodically checks the user blacklist table according to the banning conditions configured by the monitoring management station 130, selects the blacklist users who meet the banning conditions, generates a blacklist banning list, and sends it to the service processor 110.
  • the service processor 110 After receiving the blacklist lifted list, the service processor 110 deletes the users in the lifted list from the user blacklist and unblocks its information services.
  • Figure 5 shows the process of the service processor controlling the information service processing according to the user blacklist.
  • the service processor 110 receives the information to be processed (step 501), and then checks whether the user of the information is recorded in the user blacklist (step 502). If it has been recorded in the user blacklist, the service processor 110 terminates the processing of the information service, and can determine whether to save the truncated information according to the configuration of the system (step 503). If the information user is not a blacklisted user, the service processor 110 performs normal processing on the information service (step 504).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This invention provides a system of intelligently monitoring message centers, includes a service processor, a monitor server and a monitor administration station, the service processor sends message which need to be monitored, the monitor server processes the message which need to be monitored depends on monitor parameters sent by the monitor administration station, output the user blacklist table produced to the service processor, service processor controls the processing of the message service depends on the user blacklist ; this invention can automatically capture the doubtful objects, and set them as blacklist users, the service processor cutoffs all message sources from this user; at the same time delete the users which meet unrestricted condition from the blacklist table , and immediately stop restricting the corresponding message sources . Furthermore, this invention can modify monitor configure parameters in time, and can be applied to the monitoring of all kinds of short message, multimedia message centers and mail center etc.

Description

一种智能监控消息中心的系统和方法 技术领域  System and method for intelligently monitoring message center
本发明涉及监控通信系统中消息中心的技术领域,尤其涉及对 CDMA通信系 统、 GSM通信系统以及无线市话系统等的短消息中心、 多媒体消息中心、 邮件 中心等进行智能监控的系统和方法。  The present invention relates to the technical field of monitoring message centers in communication systems, and in particular, to a system and method for intelligently monitoring short message centers, multimedia message centers, mail centers, etc. of CDMA communication systems, GSM communication systems, and wireless local telephone systems.
背景技术 Background technique
目前, 通信系统中消息中心的功能日臻强大, 已从短消息中心发展到多媒 体消息中心和邮件中心等。 使用消息中心的用户数量曰益增长, 利用消息中心 进^"宣传的方式层出不穷, 各通信网络之间也逐步实现了互连互通, 在通信网 络间流动的消息量成几何级数增长。 在这种市场环境下, 不可避免地会出现大 量的垃圾消息和恶意消息等。 短时间内的垃圾消息攻击可使得通信网络的传输 量迅猛增长, 容易造成网络瘫痪; 而频繁的垃圾消息和恶意消息等也会让使用 消息中心的用户不胜其烦; 而具有反动性质的、 谣言性质的消息更会造成极坏 的社会影响。  At present, the function of the message center in the communication system is becoming increasingly powerful, and it has developed from a short message center to a multimedia message center and a mail center. The number of users who use the message center is increasing, and the use of the message center to promote advertising is endless, and communication networks have gradually realized interconnection. The amount of messages flowing between communication networks has grown geometrically. Here Under this kind of market environment, a large number of spam and malicious messages will inevitably appear. Spam attacks in a short period of time can cause the transmission volume of communication networks to increase rapidly and easily cause network paralysis. Frequent spam and malicious messages, etc. It will also annoy users who use the message center; and reactionary and rumorous messages will have extremely bad social impact.
因此需对各类消息中心进行监控, 包括消息流量和消息内容等。 目前对消 息中心进行监控的方法主要是: 消息中心的管理者通过人工方式在消息中心的 业务处理机上设置黑名单号码, 进行指定过滤, 但该方法既不方便又不准确, 无法根据网络情况实时修改黑名单号码, 时效性很差, 无法应付目前消息中心 的大消息流量, 因此急需有一种可自动监控消息中心的系统和方法, 但目前尚 未发现有公开的相近的技术方案。  Therefore, various types of message centers need to be monitored, including message traffic and message content. At present, the monitoring methods of the message center are mainly as follows: The manager of the message center manually sets a blacklist number on the service processor of the message center for specified filtering, but this method is inconvenient and inaccurate, and cannot be real-time according to the network conditions. Modifying the blacklist number is very time-consuming and cannot cope with the large message traffic of the current message center. Therefore, there is an urgent need for a system and method that can automatically monitor the message center. However, no publicly similar technical solution has been found.
发明内容 Summary of the invention
本发明所要解决的技术问题在于提供一种智能监控消息中心的系统和方 法, 可实现对各类消息中心进行自动监控, 并根据通信网络的实际情况修改监 控配置参数, 避免垃圾消息和恶意消息的传播, 保证消息中心的稳定。 The technical problem to be solved by the present invention is to provide a system and method for intelligently monitoring a message center. This method can automatically monitor various types of message centers, and modify the monitoring configuration parameters according to the actual situation of the communication network to avoid the spread of spam and malicious messages and ensure the stability of the message center.
本发明所述智能监控消息中心的系统, 包括业务处理机、 监控服务器和至 少一个监控管理台, 其中所述业务处理机用于处理收到的信息业务, 向所述监 控服务器发送待监控消息, 并根据所述监控服务器返回的用户黑名单控制信息 业务的处理; 所述监控服务器, 用于根据所述监控管理台输出的监控配置参数 处理待监控消息, 生成用户黑名单输出到所述业务处理机; 所述监控管理台, 用于生成监控配置参数, 并发送给所述监控服务器。  The system of the intelligent monitoring message center of the present invention includes a service processor, a monitoring server, and at least one monitoring management station, wherein the service processor is configured to process a received information service and send a message to be monitored to the monitoring server, And controlling the processing of information services according to the user blacklist returned by the monitoring server; the monitoring server is configured to process the messages to be monitored according to the monitoring configuration parameters output by the monitoring management station, and generate a user blacklist to output to the service processing The monitoring management station is configured to generate monitoring configuration parameters and send the monitoring configuration parameters to the monitoring server.
在所述业务处理机和所述监控服务器中, 均设置有一个消息数据库, 用于 存放消息监控过程中产生的记录, 包括被禁发的消息本身以及监控结果。  In the service processor and the monitoring server, a message database is provided for storing records generated during the message monitoring process, including the banned messages themselves and the monitoring results.
所述业务处理机还设置有用户黑名单表, 用于存放用户黑名单, 根据该用 户黑名单对用户进行黑名单监控。  The service processor is further provided with a user blacklist table for storing the user blacklist, and performing blacklist monitoring on the user according to the user blacklist.
所述监控服务器还设置有消息流量监控表, 用于存放监控用户的信息。 本发明所述智能监控消息中心的方法, 包括以下步骤: 业务处理机将待监 控消息发送给监控服务器; 监控服务器根据监控管理台发送的监控配置参数对 待监控消息进行实时监控;监控服务器对满足加禁条件的用户生成用户黑名单, 发送给业务处理机; 业务处理机根据用户黑名单控制信息业务的处理。  The monitoring server is also provided with a message flow monitoring table for storing information of monitoring users. The method for intelligently monitoring a message center according to the present invention includes the following steps: a service processor sends a message to be monitored to a monitoring server; the monitoring server monitors the monitoring message in real time according to the monitoring configuration parameters sent by the monitoring management station; the monitoring server The forbidden user generates a user blacklist and sends it to the service processor; the service processor controls the processing of information services according to the user blacklist.
所述监控服务器对待监控消息进行实时监控, 包括对消息内容的监控和对 消息流量的监控。  The monitoring server monitors the monitored messages in real time, including monitoring the message content and monitoring the message traffic.
本发明所述系统和方法, 可根据监控配置参数自动截获可疑对象, 并将其 设定为黑名单用户, 由业务处理机即时封闭对应该用户的消息源; 同时也可自 动将满足解禁条件的用户从黑名单表中删除, 从而即时解禁对应的消息源。 本 发明可实时修改监控配置参数, 监控操作即时生效。 另外, 本发明可以根据监 控配置进行多渠道的告警; 各有权限的远程终端可即时监视监控状态, 并可随 时查询分析其历史曰志。 本发明可应用于对各类短消息中心、 多媒体消息中心 和邮件中心等的监控。 The system and method according to the present invention can automatically intercept suspicious objects according to the monitoring configuration parameters, and set them as blacklisted users, and the service processor immediately closes the message source corresponding to the user; meanwhile, it can also automatically The user is deleted from the blacklist, so that the corresponding message source is unblocked immediately. The invention can modify the monitoring configuration parameters in real time, and the monitoring operation takes effect immediately. In addition, the present invention can be Control configuration for multi-channel alarms; each remote terminal with authority can monitor the monitoring status in real time, and can query and analyze its historical records at any time. The invention can be applied to the monitoring of various short message centers, multimedia message centers, and mail centers.
附图说明 BRIEF DESCRIPTION OF THE DRAWINGS
图 1是本发明智能监控消息中心的系统的网络结构示意图;  FIG. 1 is a schematic diagram of a network structure of a system of an intelligent monitoring message center according to the present invention;
图 2是本发明智能监控消息中心的系统的数据流示意图;  2 is a schematic diagram of a data flow of a system of an intelligent monitoring message center according to the present invention;
图 3是本发明方法中对用户消息流量进行监控的流程示意图;  3 is a schematic flowchart of monitoring user message traffic in the method of the present invention;
图 4是本发明方法中对消息内容进行监控的流程示意图;  4 is a schematic flowchart of monitoring message content in the method of the present invention;
图 5是本发明方法中业务处理机根据用户黑名单控制信息业务处理的流程 示意图。  FIG. 5 is a schematic flowchart of a service processor controlling information service processing according to a user blacklist in the method of the present invention.
具体实施方式 detailed description
下面结合附图和实施例, 对本发明的技术方案做进一步的详细介绍。  The technical solution of the present invention will be further described in detail below with reference to the accompanying drawings and embodiments.
各类通信系统的消息中心,一般包括业务处理机 110、业务接入服务器 160、 交换中心 140 和 WW 服务器 150 , 其中业务接入服务器 160主要用于从交换中 心 140、胃服务器 150接入信息业务; 业务处理机 110则用于处理各类信息业 务, 如短消息、 多媒体短消息、 多媒体邮件等, 并通过业务接入服务器 16与交 换中心 140、 WW服务器 150进行各类消息、 邮件的交互和收发。  The message centers of various communication systems generally include a service processor 110, a service access server 160, a switching center 140, and a WW server 150. The service access server 160 is mainly used to access information services from the switching center 140 and the stomach server 150. The service processor 110 is used to process various types of information services, such as short messages, multimedia short messages, and multimedia mails, and to perform various types of messages and mail interactions with the switching center 140 and WW server 150 through the service access server 16 Send and receive.
如图 1所示, 本发明提供的智能监控消息中心的系统, 包括: 位于消息中 心的业务处理机 110, 监控服务器 120和监控管理台 130。 其中业务处理机 110 与监控服务器 120进行通讯, 业务处理机 110除了完成一般的信息业务处理之 外, 还将待监控消息发送给监控服务器 120; 监控服务器 120分别与业务处理 机 110、 监控管理台 130连接并实时通信, 用于根据监控配置参数对待监控消 息进行实时监控, 并生成用户黑名单和黑名单解禁名单, 发送给业务处理机 110; 监控管理台 130用于设置监控配置参数, 并将其发送给监控服务器 120。 此外, 监控服务器 120也可将监控结果发给监控管理台 130。 As shown in FIG. 1, the system for intelligently monitoring a message center provided by the present invention includes: a service processor 110 located in the message center, a monitoring server 120 and a monitoring management station 130. The business processor 110 communicates with the monitoring server 120. In addition to completing general information service processing, the business processor 110 also sends messages to be monitored to the monitoring server 120. The monitoring server 120 is separately connected to the business processor 110 and the monitoring management station. 130 is connected and communicates in real time, and is used for real-time monitoring of the monitored messages according to the monitoring configuration parameters, and generates a user blacklist and a blacklist unban list, and sends it to the service processor 110; the monitoring management station 130 is used to set monitoring configuration parameters and send them to the monitoring server 120. In addition, the monitoring server 120 may also send the monitoring result to the monitoring management station 130.
业务处理机 110发送给监控服务器 120的待监控消息可以是接收到的信息 本身; 或者是信息的简化, 如话单等。  The message to be monitored sent by the service processor 110 to the monitoring server 120 may be the received information itself; or it may be a simplification of the information, such as a bill.
在监控服务器 120上还设置有至少一个远端接口 180, 为远程用户提供接 口。监控服务器 120通过该远端接口 180可以连接有远程终端 181或浏览器 182 , 为远程用户提供监控配置参数的配置界面或监视界面等。 此外, 所述监控服务 器 120还可以与日志打印装置 191或声光告警装置 192相连, 将监控结果输出 显示。  The monitoring server 120 is also provided with at least one remote interface 180 to provide an interface for remote users. The monitoring server 120 may be connected to a remote terminal 181 or a browser 182 through the remote interface 180 to provide a remote user with a configuration interface or a monitoring interface for monitoring configuration parameters. In addition, the monitoring server 120 may also be connected to a log printing device 191 or an acousto-optic alarm device 192 to output and display a monitoring result.
在业务处理机 110和监控服务器 120中都设置了一个消息数据库, 用于存 放消息监控过程中产生的记录, 包括被禁发的消息本身以及监控结果。 上述消 息数据库可位于业务处理机 110和监控服务器 120的内存中,是采用 HASH方式 组织的数据表。 具体实现为: 在内存中申请一块结构数组区, 数组的每一个成 员结构对应一奈记录; 将成员结构中的某个成员作为索引, 如号码。 根据索引 定位到对应的记录采用 HASH算法完成, 可以高速定位数据。 解决 HASH冲突的 方法采用链地址法, 即用空闲队列管理内存表的使用情况: 每当在内存表中插 入一奈记录, 就从空闲队列头取走一个单元; 每当删除一条记录, 就将对应的 单元置于空闲队列尾。这样,对内存表的操作可以像操作物理数据库一样方便, 同时又因为在内存中则更加实时高效。  A message database is set in the business processor 110 and the monitoring server 120, and is used to store records generated during the monitoring process of the message, including the banned messages themselves and the monitoring results. The above message database may be located in the memory of the business processor 110 and the monitoring server 120, and is a data table organized in a HASH manner. The specific implementation is: apply for a structure array area in the memory, each member structure of the array corresponds to a Chennai record; a certain member in the member structure is used as an index, such as a number. Hash algorithm is used to locate the corresponding record according to the index, which can locate the data at high speed. The method of resolving HASH conflicts uses the chain address method, that is, using the free queue to manage the usage of the memory table: whenever a record is inserted in the memory table, a unit is removed from the head of the idle queue; whenever a record is deleted, the The corresponding unit is placed at the end of the idle queue. In this way, the operation of the memory table can be as convenient as operating a physical database, and it is more real-time and efficient because it is in memory.
监控配置参数是用于指导监控服务器 120进行监控的信息, 包括监控方式 的配置参数、 监控结果处理的参数、 黑名单用户解禁条件、 超级用户、 监控关 键字等, 其中监控方式是指监控服务器 120应监控的待监控消息的信息, 如消 息流量监控、 消息内容监控等; 超级用户是指不进行消息监控的用户。 具体地, 消息流量监控的配置参数包括监控时间、 监控计数值、 阈值等; 消息内容监控 的配置参数包括监控关键字;监控结果处理的参数包括"生成用户黑名单"、 "监 控结果反馈"、 "声光报警"、 "日志打印"、 "通知管理员" 等。 The monitoring configuration parameters are information used to guide the monitoring server 120 to perform monitoring, including configuration parameters of the monitoring mode, parameters of monitoring result processing, blacklist user lifting conditions, super users, monitoring keywords, etc., where the monitoring mode refers to the monitoring server 120 Information of the messages to be monitored, such as message traffic monitoring, message content monitoring, etc. Super users are users who do not perform message monitoring. specifically, Configuration parameters for message traffic monitoring include monitoring time, monitoring count, threshold, etc .; configuration parameters for message content monitoring include monitoring keywords; parameters for processing monitoring results include "generate user blacklist", "monitoring results feedback", "sound and light""Alarm","Logprint","Notifyadministrator", etc.
监控管理台 130生成监控配置参数后, 发送给监控服务器 120。 监控配置 参数是存放在监控服务器 120内存中的全局结构变量, 监控服务器 120根据具 体的监控配置参数, 对待监控的消息进行实时监控。 监控服务器 120接收到监 控管理台 130的监控配置参数后, 即时修改内存中的监控配置参数项, 监控服 务器 120遂按照新的监控配置参数进行监控。 同时监控服务器 120将新的配置 参数写入监控配置文件中防止配置参数丟失, 也可供监控管理台 130查证。  The monitoring management station 130 generates monitoring configuration parameters and sends the monitoring configuration parameters to the monitoring server 120. The monitoring configuration parameters are global structural variables stored in the memory of the monitoring server 120. The monitoring server 120 monitors the messages to be monitored in real time according to the specific monitoring configuration parameters. After receiving the monitoring configuration parameters of the monitoring management station 130, the monitoring server 120 immediately modifies the monitoring configuration parameter items in the memory, and the monitoring server 120 performs monitoring according to the new monitoring configuration parameters. At the same time, the monitoring server 120 writes the new configuration parameters into the monitoring configuration file to prevent the configuration parameters from being lost, and is also available for the monitoring management station 130 to verify.
监控服务器 120按照监控配置参数对待监控消息进行监控, 可以是监控消 息的流量和 /或消息的内容。在监控服务器 120中设置了用于存放监控用户的信 息的消息流量监控表。 消息流量监控表是在内存中采用结构数组区的内存表, 如 HASH方式, 同时为防止记录数大于内存表的容量规模, 还可进一步采用 LRU 算法确保表的安全和表中记录的实效性。  The monitoring server 120 monitors the monitored messages according to the monitoring configuration parameters, which may be the traffic of the monitored messages and / or the content of the messages. The monitoring server 120 is provided with a message flow monitoring table for storing information of monitoring users. The message flow monitoring table is a memory table that uses a structured array area in memory, such as HASH. At the same time, in order to prevent the number of records from being larger than the capacity of the memory table, the LRU algorithm can be further used to ensure the security of the table and the effectiveness of the records in the table.
监控服务器 120根据监控结果, 对满足加禁条件的用户生成用户黑名单, 发送给业务处理机 110, 由业务处理机 110根据此黑名单控制信息业务的处理, 过滤黑名单用户。 为此, 在业务处理机 110中设置了用户黑名单表, 用于存放 用户黑名单。 黑名单表也可以是在内存中采用结构数组区构成的内存表, 并且 进一步采用 LRU算法确保表的安全和表中记录的实效性。  The monitoring server 120 generates a user blacklist for users who meet the prohibition conditions according to the monitoring result, and sends the user blacklist to the service processor 110. The service processor 110 controls the processing of information services according to the blacklist, and filters the blacklist users. To this end, a user blacklist table is set in the service processor 110 for storing the user blacklist. The blacklist table can also be a memory table that uses a structured array area in memory, and further uses the LRU algorithm to ensure the security of the table and the effectiveness of the records in the table.
本发明所述智能监控消息中心的方法, 包括: 业务处理机 110将待监控消 息发送给监控服务器 120; 监控服务器 120根据监控管理台 130发送的监控配 置参数对待监控消息进行实时监控; 监控服务器 120根据监控结果, 自动筛选 出满足加禁条件的用户并生成用户黑名单, 发送给业务处理机 110; 业务处理 机 110根据用户黑名单, 控制信息业务的处理, 封闭黑名单用户的消息源。 在上述过程中, 监控配置参数是由管理员通过图形化的配置界面在所述监 控管理台 130上配置的。 监控服务器 120还可以将监控结果发送给监控管理台 130 或其他有权限的远程终端或用户, 同时还可以进行全方位告警, 包括声光 告警等。 此外, 监控服务器 120还可以自动生成黑名单解禁名单, 发送给业务 处理机 110, 由业务处理机 110将解禁黑名单用户从用户黑名单表中删除, 从 而对该用户解禁。 The method for intelligently monitoring a message center according to the present invention includes: the service processor 110 sends a message to be monitored to the monitoring server 120; the monitoring server 120 monitors the monitoring message in real time according to the monitoring configuration parameters sent by the monitoring management station 130; the monitoring server 120 According to the monitoring results, automatically select the users who meet the prohibition conditions and generate a user blacklist, and send it to the business processor 110; business processing The machine 110 controls the processing of information services according to the user blacklist, and closes the message sources of the blacklisted users. In the above process, the monitoring configuration parameters are configured by the administrator on the monitoring management station 130 through a graphical configuration interface. The monitoring server 120 may also send the monitoring results to the monitoring management station 130 or other authorized remote terminals or users, and may also perform all-round alarms, including sound and light alarms. In addition, the monitoring server 120 may also automatically generate a blacklist unbanning list and send it to the service processor 110, and the service processor 110 deletes the unbanned blacklist user from the user blacklist table, thereby unbanning the user.
在本发明所述方法中, 消息中心与监控系统之间的数据流向如图 2所示, 其中数据流 A为业务处理机 110收到的待处理信息; 数据 B是业务处理机处理 后的信息; 数据 C是业务处理机 110发往监控服务器 120的待监控消息, 待监 控消息可以是业务处理机 110收到的信息本身, 也可以是上述信息的简化, 如 话单等; 数据流 D是监控服务器 120发往业务处理机 110的用户黑名单或黑名 单解禁名单; 数据流 1、 2、 3分别是由监控管理台 130或其他远程用户发往监 控服务器 120的监控配置参数; 数据流 4、 5、 6、 7、 8、 9则是监控服务器 120 将监控结果发给监控管理台 130及其它各类终端的消息, 供告警、 浏览、 跟踪 分析用。  In the method of the present invention, the data flow between the message center and the monitoring system is shown in FIG. 2, where data flow A is the information to be processed received by the business processor 110; data B is the information processed by the business processor Data C is the message to be monitored sent by the service processor 110 to the monitoring server 120. The message to be monitored may be the information received by the service processor 110 itself, or it may be a simplification of the above information, such as a bill, etc .; The data flow D is The user blacklist or blacklist unban list sent by the monitoring server 120 to the business processor 110; data streams 1, 2, and 3 are monitoring configuration parameters sent by the monitoring management station 130 or other remote users to the monitoring server 120; data stream 4 , 5, 6, 7, 8, and 9 are messages sent by the monitoring server 120 to the monitoring management station 130 and other various terminals for alarm, browsing, and tracking analysis.
本发明方法从数据流的角度, 具体为: 业务处理机 110收到待处理的信息 或邮件即数据流 A后进行处理,发往后续处理服务器进行正常处理(数据流 B ), 同时也向监控服务器 120发送待监控消息即数据流 C进行监控, 发往监控服务 器 120的数据流 C可以只带监控所需基本信息。 监控服务器 120按照各监控管 理台 130发来的监控配置参数即数据流 1、 2、 3, 对待监控消息进行实时监控, 并将监控结果即数据流 4、 5、 6、 7、 8、 9发往各监控管理台 130或分析终端或 告警装置或打印装置等。 监控服务器 120将监控得到的用户黑名单数据, 即数 据流 D即时发往业务处理机 110, 存放在用户黑名单表中, 从而对该用户的信 息业务实现封闭。 监控服务器 120同时根据监控管理台 1 30配置的解禁条件, 定时检查用户黑名单表, 筛选出满足解禁条件的黑名单用户, 生成黑名单解禁 名单, 发送给业务处理机 110, 由业务处理机 110将解禁名单中的黑名单用户 删除, 对这些用户的信息业务解禁。 From the perspective of data flow, the method of the present invention is specifically as follows: after receiving the information to be processed or mail, that is, data flow A, the service processor 110 sends the data to the subsequent processing server for normal processing (data flow B), and also monitors The server 120 sends a message to be monitored, that is, the data stream C for monitoring, and the data stream C sent to the monitoring server 120 may carry only basic information required for monitoring. The monitoring server 120 monitors the monitoring messages in real time according to the monitoring configuration parameters sent by each monitoring management station 130, that is, data streams 1, 2, and 3, and sends monitoring results that are data streams 4, 5, 6, 7, 8, and 9 To each monitoring management station 130, analysis terminal, alarm device, or printing device. The monitoring server 120 monitors the obtained user blacklist data, namely The data stream D is immediately sent to the service processor 110 and stored in the user blacklist table, so that the information service of the user is closed. The monitoring server 120 also periodically checks the user blacklist table according to the unbanning conditions configured by the monitoring management station 1 30, filters out the blacklisted users who meet the unbanning conditions, generates a blacklist unbanning list, and sends the blacklist to the service processor 110. The blacklisted users in the unbanned list are deleted, and the information services of these users are lifted.
对待监控消息的监控包括消息流量的监控和消息内容的监控。  The monitoring of monitored messages includes monitoring of message traffic and monitoring of message content.
消息流量的监控是指监控信息用户在设置的单位时间内发送信息的数量是 否超过设置的阔值, 如果超过, 则生成用户黑名单; 然后由监控服务器 120将 用户黑名单发到业务处理机 110或者输出到告警装置或者进行其他的监控结果 处理。  The monitoring of message traffic refers to monitoring whether the amount of information sent by the information user within a set unit time exceeds a set threshold, and if it exceeds, a user blacklist is generated; then the monitoring server 120 sends the user blacklist to the service processor 110 Or output to the alarm device or perform other monitoring results processing.
为实现对消息流量的监控, 在监控服务器 120中设置了消息流量监控表, 用于存放监控用户的信息, 至少包括用户的号码、 本次监控时间和本次监控的 计数值。 消息流量监控表采用了内存数据库的形式。  In order to monitor the message traffic, a message traffic monitoring table is set in the monitoring server 120, which is used to store information of the monitoring users, including at least the user's number, the current monitoring time, and the current monitoring count value. The message flow monitoring table uses the form of an in-memory database.
如图 3所示, 监控服务器 120进行消息流量监控的具体步骤包括: 首先监 控服务器 120收到业务处理机 110发来的待监控消息(步骤 301 ) , 监控服务 器 O检查该待监控消息的用户是否已在消息流量监控表中存在(步骤 302 ) 。  As shown in FIG. 3, the specific steps for monitoring the message traffic by the monitoring server 120 include: First, the monitoring server 120 receives the message to be monitored sent by the service processor 110 (step 301), and the monitoring server O checks whether the user of the message to be monitored is It already exists in the message flow monitoring table (step 302).
如果该用户不在消息流量监控表中, 则监控服务器 120将该用户的信息记 录在消息流量监控表中, 其中记录监控的计数值为 1, 记录当前时间为监控起 始时间 (步骤 303 ) 。 然后监控服务器 120检查该用户的计数值是否超过设置 的监控计数阈值(步骤 306 ) , 如果计数值没有超过监控计数阈值, 则表明该 用户的消息流量没有超过预设阈值, 结束此次监控。 如果计数值超过监控计数 阈值, 则表明该用户的信息流量已超过预设阈值, 监控服务器 120对该监控结 杲进行处理(步骤 307 ) , 可以是: 生成该用户的黑名单, 发送给业务处理机 110,或者向监控管理台 130反馈监控结果,或者进行声光告警等或者上述三种 处理都进行。 然后监控服务器 120重置该用户的记录, 计数值恢复为 0 (步骤 308 ) , 结束此次监控。 If the user is not in the message flow monitoring table, the monitoring server 120 records the information of the user in the message flow monitoring table, where the count value of the recording monitoring is 1, and the recording current time is the monitoring start time (step 303). The monitoring server 120 then checks whether the count value of the user exceeds the set monitoring count threshold (step 306). If the count value does not exceed the monitoring count threshold, it indicates that the message traffic of the user does not exceed the preset threshold, and ends the monitoring. If the count value exceeds the monitoring count threshold, it indicates that the information traffic of the user has exceeded a preset threshold, and the monitoring server 120 processes the monitoring result (step 307), which may be: generating a blacklist of the user and sending it to the business process machine 110, either feedback the monitoring result to the monitoring management station 130, or perform an acousto-optic alarm or the like, or all of the above three processes. Then the monitoring server 120 resets the record of the user, the count value returns to 0 (step 308), and the monitoring ends.
如果该用户已记录在消息流量监控表中, 则监控服务器 120检查该用户的 本次监控时间是否到达设置的监控时间间隔(步骤 304 ) , 如果超过监控时间 间隔, 则监控服务器 120重置该用户的记录, 计数值恢复为 0 (步骤 308 ) , 结 束此次监控。 如果没有超过监控时间间隔, 则监控服务器 120检查该用户的记 录是否刚被重置(步骤 305 ) , 如果是, 则将该用户的计数值设置为 1, 设置当 前时间为监控的起始时间, 然后执行步骤 306; 如果不是刚被重置, 则将该用 户的计数值加 1, 然后执行步骤 306。  If the user has been recorded in the message flow monitoring table, the monitoring server 120 checks whether the current monitoring time of the user reaches the set monitoring time interval (step 304). If the monitoring time interval is exceeded, the monitoring server 120 resets the user Record, the count value returns to 0 (step 308), and the monitoring ends. If the monitoring time interval has not been exceeded, the monitoring server 120 checks whether the user's record has just been reset (step 305), and if so, sets the user's count value to 1 and sets the current time as the monitoring start time, Then step 306 is performed; if it has not just been reset, then the count value of the user is incremented by 1, and then step 306 is performed.
对消息内容的监控是指对短消息的内容、 多媒体短消息的内容以及多媒体 邮件的主题等按照监控管理台 130配置的监控关键字进行监控。  The monitoring of the content of the message refers to monitoring the content of the short message, the content of the multimedia short message, and the subject of the multimedia mail according to the monitoring keywords configured by the monitoring management station 130.
对消息内容的监控流程如图 4所示, 首先监控服务器 120收到业务处理机 110发来的待监控消息(步骤 401 ), 然后检查收到的待监控消息的内容中是否 包含设置的监控关键字(步骤 402 )。 如果含有, 则监控服务器 120对该监控结 杲进行处理(步骤 403 ), 可以是: 生成用户黑名单发送给业务处理机 110, 或 者进行声光告警, 或者将监控结果反馈给监控管理台 130, 或者上述三种处理 都进行。 如果不含有监控关键字, 则结束此次监控(步骤 404 )。  The monitoring process of the message content is shown in Figure 4. First, the monitoring server 120 receives the message to be monitored sent by the service processor 110 (step 401), and then checks whether the content of the received message to be monitored contains the set monitoring key. Word (step 402). If it does, the monitoring server 120 processes the monitoring result (step 403), which may be: generating a user blacklist and sending it to the service processor 110, or performing an audible and visual alarm, or feeding back the monitoring result to the monitoring management station 130, Or all three processes described above are performed. If there is no monitoring keyword, the monitoring is ended (step 404).
如果监控管理台 130设置了超级用户, 则在对待监控消息进行监控前, 先 检查待监控消息用户是否是超级用户, 如果是, 则对待监控消息不进行监控处 理; 如果不是, 再进行后续的监控处理。  If a super user is set in the monitoring management station 130, check whether the user of the message to be monitored is a super user before monitoring the monitored messages, and if so, do not perform monitoring processing on the monitored messages; if not, perform subsequent monitoring deal with.
此外, 在监控 1务器 120生成用户黑名单之前, 还包括: 判断监测到的可 疑用户是否满足监控管理台 130设置的黑名单生成奈件(如单位时间内被检测 为可疑用户的频度是否达到规定的阔值),将满足黑名单生成条件的可疑用户确 定为黑名单用户。 In addition, before the monitoring server 120 generates the user blacklist, the method further includes: judging whether the monitored suspicious user meets the blacklist generating widget set by the monitoring management station 130 (such as being detected in a unit time). In order to determine whether the frequency of suspicious users reaches the specified threshold, suspicious users who meet the blacklist generation conditions are determined as blacklisted users.
业务处理机 110收到监控服务器 120发来的用户黑名单后, 存放在用户黑 名单表中, 该表可以釆用内存数据库形式的内存表。 业务处理机 110根据用户 黑名单表对黑名单用户进行过滤处理, 拦截用户黑名单表中的用户的消息, 只 对合法用户的消息进行处理。 另外, 监控服务器 120根据监控管理台 130配置 的解禁条件, 定期检查用户黑名单表, 挑选出满足解禁条件的黑名单用户, 生 成黑名单解禁名单, 发送给业务处理机 110。  After receiving the user blacklist from the monitoring server 120, the service processor 110 stores the user blacklist in the user blacklist table. This table may use a memory table in the form of an in-memory database. The service processor 110 performs filtering processing on the blacklisted users according to the user blacklist table, intercepts messages of the users in the user blacklist table, and processes only messages of legitimate users. In addition, the monitoring server 120 periodically checks the user blacklist table according to the banning conditions configured by the monitoring management station 130, selects the blacklist users who meet the banning conditions, generates a blacklist banning list, and sends it to the service processor 110.
业务处理机 110收到黑名单解禁名单后, 从用户黑名单表中删除解禁名单 中的用户, 对其信息业务解禁。  After receiving the blacklist lifted list, the service processor 110 deletes the users in the lifted list from the user blacklist and unblocks its information services.
图 5给出了业务处理机根据用户黑名单控制信息业务处理的过程。 首先业 务处理机 110接收到待处理的信息(步骤 501 ), 然后检查该信息用户是否记录 在用户黑名单表中 (步骤 502 )。 如果已在用户黑名单表中记录, 则业务处理机 110 中止该信息业务的处理, 并可根据系统的配置确定是否需保存被截掉的信 息(步骤 503 )。 如果该信息用户不是黑名单用户, 则业务处理机 110对该信息 业务进行正常的处理(步骤 504 )。  Figure 5 shows the process of the service processor controlling the information service processing according to the user blacklist. First, the service processor 110 receives the information to be processed (step 501), and then checks whether the user of the information is recorded in the user blacklist (step 502). If it has been recorded in the user blacklist, the service processor 110 terminates the processing of the information service, and can determine whether to save the truncated information according to the configuration of the system (step 503). If the information user is not a blacklisted user, the service processor 110 performs normal processing on the information service (step 504).
需要指出的是, 本发明系统和方法中采用的监控方式并不仅限于上述的消 息流量和消息内容的监控, 对其他监控方式可以参考上述两类监控方式, 而且 本发明并未限定必须同时使用对上述两种参数的监控。  It should be pointed out that the monitoring methods used in the system and method of the present invention are not limited to the above-mentioned monitoring of message traffic and message content. For other monitoring methods, reference may be made to the above two types of monitoring methods, and the present invention does not limit the use of Monitoring of the above two parameters.
最后所应说明的是, 以上实施例仅用以说明本发明的技术方案而非限制, 尽管参照较佳实施例对本发明进行了详细说明 , 本领域的普通技术人员应当理 解, 可以对本发明的技术方案进行修改或者等同替换, 而不脱离本发明技术方 案的精神和范围, 其均应涵盖在本发明的权利要求范围当中。  Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention and are not limiting. Although the present invention is described in detail with reference to the preferred embodiments, those skilled in the art should understand that the technology of the present invention can be Modifications or equivalent replacements of the solutions without departing from the spirit and scope of the technical solutions of the present invention should be covered by the claims of the present invention.

Claims

权利要求书 Claim
1、 一种智能监控消息中心的系统, 其特征在于, 包括业务处理机、 监控 服务器和至少一个监控管理台; 其中  1. A system for intelligently monitoring a message center, comprising a business processor, a monitoring server, and at least one monitoring management station;
所述业务处理机, 用于处理收到的信息业务, 向所述监控服务器发送待监 控消息, 并才艮据所述监控服务器返回的用户黑名单控制信息业务的处理;  The service processor is configured to process the received information service, send a message to be monitored to the monitoring server, and control the processing of the information service according to the user blacklist returned by the monitoring server;
所述监控服务器, 用于根据所述监控管理台输出的监控配置参数处理待监 控消息, 生成用户黑名单输出到所述业务处理机;  The monitoring server is configured to process a message to be monitored according to the monitoring configuration parameters output by the monitoring management station, and generate a user blacklist to output to the service processor;
所述监控管理台, 用于生成监控配置参数, 并发送给所述监控服务器。 The monitoring management station is configured to generate monitoring configuration parameters and send the monitoring configuration parameters to the monitoring server.
2、 才艮据权利要求 1所述的智能监控消息中心的系统, 其特征在于, 在所 述业务处理机和所述监控服务器中, 均设置有一个消息数据库, 用于存放消息 监控过程中产生的记录。 2. The intelligent monitoring message center system according to claim 1, wherein the service processor and the monitoring server are each provided with a message database for storing messages generated during the message monitoring process. record of.
3、 居权利要求 2所述的智能监控消息中心的系统, 其特征在于, 所述 记录至少包括被禁发的消息本身及其监控结果。  3. The system for intelligently monitoring a message center according to claim 2, wherein the record includes at least the banned message itself and its monitoring result.
4、 才艮据权利要求 1所述的智能监控消息中心的系统, 其特征在于, 所述 业务处理机设置有至少一个用户黑名单表, 用于存放用户黑名单, 根据该用户 黑名单对用户进行黑名单监控。  4. The system for intelligently monitoring a message center according to claim 1, wherein the service processor is provided with at least one user blacklist table for storing the user blacklist, and according to the user blacklist, the user is Perform blacklist monitoring.
5、 才艮据权利要求 1所述的智能监控消息中心的系统, 其特征在于, 所述 监控服务器设置有至少一个消息流量监控表, 用于存放监控用户的信息。  5. The intelligent monitoring message center system according to claim 1, wherein the monitoring server is provided with at least one message flow monitoring table for storing information of monitoring users.
6、 根据权利要求 2或 4或 5所述的智能监控消息中心的系统, 其特征在 于, 所述消息数据库、 所述用户黑名单表和所述消息流量监控表均为在内存中 由结构数组区构成的内存表。  6. The system for intelligently monitoring a message center according to claim 2 or 4 or 5, wherein the message database, the user blacklist table, and the message traffic monitoring table are all structured arrays in memory. Memory table.
7、 才艮据权利要求 6所述的智能监控消息中心的系统, 其特征在于, 所述 消息数据库采用 HASH算法构成内存表。 7. The intelligent monitoring message center system according to claim 6, wherein the message database uses a HASH algorithm to form a memory table.
8、 根据权利要求 7所述的智能监控消息中心的系统, 其特征在于, 所述 内存表通过空闲队列管理, 当记录存入内存表时, 从空闲队列头取走单元, 当 删除记录时将释放的单元置于空闲队列的队尾。 8. The system of intelligent monitoring message center according to claim 7, wherein the memory table is managed by an idle queue, and when the record is stored in the memory table, the unit is removed from the head of the idle queue, and when the record is deleted, The released unit is placed at the end of the idle queue.
9、 根据权利要求 6所述的智能监控消息中心的系统, 其特征在于, 所述 消息数据库、 所述用户黑名单表和所述消息流量监控表采用 LRU算法控制记录 数。  9. The system for intelligently monitoring a message center according to claim 6, wherein the message database, the user blacklist table, and the message traffic monitoring table use a LRU algorithm to control the number of records.
10、 根据权利要求 1所述的智能监控消息中心的系统,其特征在于, 所述 监控配置参数至少包括: 监控方式的配置参数、 监控结果处理的参数、 黑名单 用户解禁条件、 超级用户和监控关键字, 其中监控方式是指监控服务器应监控 的待监控消息的信息; 超级用户是指不进行消息监控的用户。  10. The system for intelligently monitoring a message center according to claim 1, wherein the monitoring configuration parameters include at least: configuration parameters of a monitoring mode, parameters of processing of monitoring results, conditions for lifting a blacklisted user, superusers, and monitoring Keywords, where the monitoring mode refers to the information of the message to be monitored that the monitoring server should monitor; the super user refers to the user who does not perform message monitoring.
11、 根据权利要求 1所述的智能监控消息中心的系统,其特征在于, 所述 监控服务器还包括至少一个远端接口 , 为远程用户提供接入接口。  11. The system of intelligent monitoring message center according to claim 1, wherein the monitoring server further comprises at least one remote interface to provide an access interface for remote users.
12、 根据权利要求 11所述的智能监控消息中心的系统, 其特征在于, 所 述监控服务器还可以与打印装置或声光告警装置相连, 输出监控结果。  12. The system of intelligent monitoring message center according to claim 11, wherein the monitoring server is further connected to a printing device or an acousto-optic alarm device to output a monitoring result.
13、 一种智能监控消息中心的方法, 其特征在于, 包括以下步骤: 业务处 理机将待监控消息发送给监控服务器; 监控服务器根据监控管理台发送的监控 配置参数对待监控消息进行实时监控; 监控服务器对满足加禁条件的用户生成 用户黑名单, 发送给业务处理机; 业务处理机根据用户黑名单控制信息业务的 处理。  13. A method for intelligently monitoring a message center, comprising the following steps: a service processor sends a message to be monitored to a monitoring server; the monitoring server monitors the monitoring message in real time according to the monitoring configuration parameters sent by the monitoring management station; monitoring The server generates a user blacklist for users who meet the prohibition conditions and sends it to the service processor; the service processor controls the processing of information services according to the user blacklist.
14、 根据权利要求 13所述的智能监控消息中心的方法, 其特征在于, 所 述监控服务器对待监控消息进行实时监控 ,包括对消息内容的监控和 /或对消息 流量的监控。  14. The method for intelligently monitoring a message center according to claim 13, wherein the monitoring server monitors messages to be monitored in real time, including monitoring message content and / or monitoring message traffic.
15、 根据权利要求 13所述的智能监控消息中心的方法, 其特征在于, 所 述方法还包括监控服务器定时检查用户黑名单表, 查看黑名单用户是否满足解 禁条件, 如果满足, 则将满足条件的黑名单用户生成黑名单解禁名单, 发送给 业务处理机; 业务处理机收到黑名单解禁名单后, 删除用户黑名单表中可以解 禁的黑名单用户。 15. The method for intelligently monitoring a message center according to claim 13, wherein: The method further includes monitoring the server regularly checking the user blacklist table to see whether the blacklist users meet the conditions for lifting the ban, and if so, generating the blacklist users who meet the conditions from the blacklist to ban the list and sending them to the service processor; the service processor receives After the blacklist is lifted, the blacklist users who can be lifted from the user blacklist are deleted.
16、 根据权利要求 14所述的智能监控消息中心的方法, 其特征在于, 如 杲监控管理台配置了超级用户参数, 则在对待监控消息进行监控前, 先检查待 监控消息用户是否是超级用户, 如果是, 则对待监控消息不进行监控处理; 如 果不是, 再进行后续的监控处理。  16. The method for intelligently monitoring a message center according to claim 14, wherein, if the monitoring management station is configured with super user parameters, it is checked whether the user of the message to be monitored is a super user before monitoring the monitored message. If yes, no monitoring processing is performed on the monitored messages; if not, subsequent monitoring processing is performed.
17、 根据权利要求 13所述的智能监控消息中心的方法, 其特征在于, 在 监控服务器 120生成用户黑名单之前, 还包括: 判断监测到的可疑用户是否满 足监控管理台 130设置的黑名单生成条件, 将满足黑名单生成条件的可疑用户 确定为黑名单用户。  17. The method for intelligently monitoring a message center according to claim 13, before the monitoring server 120 generates the user blacklist, further comprising: judging whether the monitored suspicious users meet the blacklist generation set by the monitoring management station 130 Condition, the suspicious user who meets the blacklist generation condition is determined as the blacklist user.
18、 根据权利要求 13至 17任一所述的智能监控消息中心的方法,其特征 在于, 所述方法还包括: 监控服务器在发送用户黑名单的同时, 将监控结果发 给监控管理台或者进行声光告警处理或者打印输出或者发送给有查看监控结果 权限的远端用户。  18. The method for intelligently monitoring a message center according to any one of claims 13 to 17, wherein the method further comprises: the monitoring server sends a monitoring result to a monitoring management station or performs The audible and visual alarms are processed or printed out or sent to remote users who have permission to view the monitoring results.
19、 才 据权利要求 14或 16所述的智能监控消息中心的方法,其特征在于, 所述对消息的内容进行监控具体是: 监控服务器检查待监控消息的内容中是否 含有监控关键字,如果有, 则该消息的发送用户成为可疑用户,生成该待监控消 息的用户黑名单, 发送给业务处理机, 结束该条消息的内容监控; 如果待监控 消息不含有监控关键字, 则结束此次监控。  19. The method for intelligently monitoring a message center according to claim 14 or 16, wherein the monitoring the content of the message is specifically: the monitoring server checks whether the content of the message to be monitored contains a monitoring keyword, if If yes, the sender of the message becomes a suspicious user, and a blacklist of users of the message to be monitored is generated and sent to the service processor to end the monitoring of the content of the message; if the message to be monitored does not contain a monitoring keyword, the end of this time monitor.
20、 根据权利要求 14或 16所述的智能监控消息中心的方法,其特征在于, 所述对消息流量的监控具体是-. 步骤 1 )监控服务器检查待监控消息的用户是否已记录在消息流量监控表 中; 如果该用户已记录在消息流量监控表中, 则转至步骤 2 ); 如果该用户没有 记录在消息流量监控表中, 则转至步骤 4 ); 20. The method of intelligently monitoring a message center according to claim 14 or 16, characterized in that the monitoring of the message traffic is specifically-. Step 1) The monitoring server checks whether the user whose message is to be monitored is recorded in the message flow monitoring table; if the user is already recorded in the message flow monitoring table, go to step 2); if the user is not recorded in the message flow monitoring table In, then go to step 4);
步骤 2 )检查该用户的监控时间是否到达监控时间间隔, 如果到达, 则将 消息流量监控表中该用户的记录重置, 计数值重置为 0; 结束此次监控;  Step 2) Check whether the monitoring time of the user reaches the monitoring time interval, and if it arrives, reset the record of the user in the message flow monitoring table and reset the count value to 0; end the monitoring;
步骤 3 )如果该用户的监控时间未达到监控时间间隔, 则判断该用户是否 刚被重置, 如果是, 则将该用户的计数值置为 1 , 记录当前时间为监控起始时 间, 转至步骤 5 ); 如果该用户不是刚被重置, 则将该用户的计数值加 1 ; 转至 步骤 5 )  Step 3) If the monitoring time of the user does not reach the monitoring time interval, determine whether the user has just been reset, and if so, set the count value of the user to 1, record the current time as the monitoring start time, and go to Step 5); if the user is not just reset, then increase the user's count value by 1; go to step 5)
步骤 4 )将该用户的信息记录在消息流量监控表中, 并记录监控的计数值 为 1, 记录当前时间为监控起始时间;  Step 4) Record the information of the user in the message flow monitoring table, and record the monitored count value as 1, and record the current time as the monitoring start time;
步骤 5 )监控服务器检查该用户的计数值是否超过监控计数阈值, 如果计 数值超过监控计数阈值, 则对该用户生成用户黑名单, 发送到业务处理机, 结 束此次监控; 如果计数值未超过监控计数阈值, 则结束此次监控。  Step 5) The monitoring server checks whether the count value of the user exceeds the monitoring count threshold. If the count value exceeds the monitoring count threshold, a user blacklist is generated for the user and sent to the business processor to end the monitoring; if the count value does not exceed If the monitoring count threshold is reached, the monitoring ends.
21、 根据权利要求 13至 17任一所述的智能监控消息中心的方法,其特征 在于, 所述业务处理机控制信息业务的处理的步骤包括: 业务处理机收到监控 服务器发来的用户黑名单后, 将用户黑名单存放在用户黑名单表中; 业务处理 机接收用户发送的待处理信息后,检查该用户是否属于用户黑名单表中的用户, 如果属于, 则中止该信息业务的处理; 如果不属于, 则正常处理该信息业务。  21. The method for intelligently monitoring a message center according to any one of claims 13 to 17, wherein the step of the service processor controlling the processing of the information service comprises: the service processor receives a user black message from the monitoring server. After the list, the user blacklist is stored in the user blacklist table; after receiving the pending information sent by the user, the service processor checks whether the user belongs to the user in the user blacklist table, and if it belongs, the processing of the information service is suspended If not, the information service is processed normally.
PCT/CN2004/000486 2003-08-15 2004-05-14 A system and method of intelligently monitoring the message centers WO2005018152A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CNB03140202XA CN1314293C (en) 2003-08-15 2003-08-15 System and method for intelligent monitoring message center
CN03140202.X 2003-08-15

Publications (1)

Publication Number Publication Date
WO2005018152A1 true WO2005018152A1 (en) 2005-02-24

Family

ID=34155246

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2004/000486 WO2005018152A1 (en) 2003-08-15 2004-05-14 A system and method of intelligently monitoring the message centers

Country Status (2)

Country Link
CN (1) CN1314293C (en)
WO (1) WO2005018152A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491518A (en) * 2013-09-09 2014-01-01 北京思特奇信息技术股份有限公司 Method for safely and effectively avoiding malice arrearage of mobile subscriber

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101142805B (en) * 2005-03-18 2011-08-03 艾利森电话股份有限公司 Lawful interception of unauthorized subscribers and equipments
CN1997058B (en) * 2005-12-29 2010-09-29 山东移动通信有限责任公司 A method for monitoring of the high-traffic short message
CN101453528B (en) * 2007-11-30 2010-12-15 上海粱江通信系统股份有限公司 System and method for implementing call authentication gateway
CN101600170A (en) * 2009-06-01 2009-12-09 中兴通讯股份有限公司 A kind of message monitoring device, supervisory control system and method for supervising
CN101609319B (en) * 2009-07-17 2012-09-05 中国印钞造币总公司 Circuit device for monitoring running state of programs in real time
CN101997730B (en) * 2009-08-20 2012-11-21 中国移动通信集团辽宁有限公司 Method and system for warning service triggering
CN104734895B (en) * 2013-12-18 2018-05-22 青岛海尔空调器有限总公司 Service monitoring system and business monitoring method
CN108452525B (en) * 2017-12-25 2021-06-29 福建省天奕网络科技有限公司 Method and system for monitoring chat information in game

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1350246A (en) * 2001-12-03 2002-05-22 上海交通大学 Intelligent e-mail content filtering method
CN1422050A (en) * 2001-11-26 2003-06-04 深圳市中兴通讯股份有限公司上海第二研究所 Short message filtering supervision gateway and method
CN1426214A (en) * 2001-12-19 2003-06-25 深圳市中兴通讯股份有限公司上海第二研究所 Monitoring method and equipment for short-messages

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FI106509B (en) * 1997-09-26 2001-02-15 Nokia Networks Oy Legal interception in a telecommunications network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1422050A (en) * 2001-11-26 2003-06-04 深圳市中兴通讯股份有限公司上海第二研究所 Short message filtering supervision gateway and method
CN1350246A (en) * 2001-12-03 2002-05-22 上海交通大学 Intelligent e-mail content filtering method
CN1426214A (en) * 2001-12-19 2003-06-25 深圳市中兴通讯股份有限公司上海第二研究所 Monitoring method and equipment for short-messages

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491518A (en) * 2013-09-09 2014-01-01 北京思特奇信息技术股份有限公司 Method for safely and effectively avoiding malice arrearage of mobile subscriber

Also Published As

Publication number Publication date
CN1314293C (en) 2007-05-02
CN1582038A (en) 2005-02-16

Similar Documents

Publication Publication Date Title
JP6385896B2 (en) Apparatus and method for managing content conversion in a wireless device
JP4512361B2 (en) System and method for traffic management control in a data transmission network
US8590043B2 (en) Method and systems for computer security
KR101010302B1 (en) Security management system and method of irc and http botnet
US9069954B2 (en) Security threat detection associated with security events and an actor category model
CN1942007B (en) Telephony extension attack detection, recording, and intelligent prevention
WO2016197675A1 (en) Method and apparatus for identifying crank call
CN113032710A (en) Comprehensive audit supervisory system
CN107733863B (en) Log debugging method and device under distributed hadoop environment
US20070230486A1 (en) Communication and compliance monitoring system
CN100417087C (en) Alarm managing method for SNMP protocol network managing system
CN111277421B (en) System and method for network camera access safety protection
CN102404741B (en) Method and device for detecting abnormal online of mobile terminal
CN101431434A (en) Content monitoring and plugging system and method based on WAP
WO2011143847A1 (en) Short message monitoring system and method
CN111597173A (en) Data warehouse system
WO2011149773A2 (en) Security threat detection associated with security events and an actor category model
WO2005018152A1 (en) A system and method of intelligently monitoring the message centers
GB2391419A (en) Restricting the propagation of a virus within a network
US6542932B1 (en) Domain access control for logging systems
CN102271331A (en) Method and system for detecting reliability of service provider (SP) site
CN109600395A (en) A kind of device and implementation method of terminal network access control system
US20100175103A1 (en) Reactive throttling of inbound messages and ranges
WO2013078798A1 (en) Method and system for monitoring a short message
CN108040031A (en) One kind is based on portal protocol realization AC black and white lists control methods

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase