CN101137087A - Short message monitoring center and monitoring method - Google Patents

Short message monitoring center and monitoring method Download PDF

Info

Publication number
CN101137087A
CN101137087A CNA2007100704442A CN200710070444A CN101137087A CN 101137087 A CN101137087 A CN 101137087A CN A2007100704442 A CNA2007100704442 A CN A2007100704442A CN 200710070444 A CN200710070444 A CN 200710070444A CN 101137087 A CN101137087 A CN 101137087A
Authority
CN
China
Prior art keywords
short message
note
module
center
monitoring center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100704442A
Other languages
Chinese (zh)
Other versions
CN100576940C (en
Inventor
安庆敏
吴宁宁
陈思国
吴明光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN200710070444A priority Critical patent/CN100576940C/en
Publication of CN101137087A publication Critical patent/CN101137087A/en
Application granted granted Critical
Publication of CN100576940C publication Critical patent/CN100576940C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

This method combines the real-time filter with the call-bill analysis to filter the garbage notes (GN). It raises the intercepting rate of the GN supervision center and lowers the error judgment rate. Its advantages: 1) The Chinese key words adopt the blur-pinyin/ keyword matching mould-board technique to effectively clear the interfere info in GN. 2) According to the behavior character of GN, this method regulates dynamically the user trust levels, integrates the Garbage Degree Value of notes to judge the note genus. 3) The parallel real-time filter programs run on the multi-core hardware platform to reduce the influence of the note supervision center on the processing ability of the note business center. 4) The new strategy of note sorting and processing is: letting legal notes pass, intercepting GN, attaching runner's prompt on the question note, then letting it pass. 5) This system adopts Beyes method to learn off-line the note specimen and generates the GN keyword dictionary.

Description

Short message monitoring center and method for supervising
Technical field
The present invention relates to the short message monitoring technology in sms technique field, relate in particular to a kind of short message monitoring center and method for supervising.
Background technology
2000 to 2006, China's short message service amount was respectively: 1,000,000,000, average daily transmission in 18,900,000,000,90,000,000,000,1,371 hundred million, 2,177 hundred million, 4,296 hundred million, 2006 is 1,200,000,000.In so numerous notes, more than 30% refuse messages.So-called refuse messages is meant runs counter to the illegal or advertisement SMS that addresser's real information can't be rejected, be hidden to recipient's wish, recipient.Refuse messages has not only taken limited Internet resources, causes network congestion, has ruined the corporate image of operator in the public, and has had a strong impact on user's operate as normal and life.Even more serious, note has become the carrier that some unprincipled fellows implement crime, utilizes that note is swindled, the incident of pornographic transaction and reaction propaganda happens occasionally, and causes social public trust to descend, the realization of the target that is unfavorable for building a harmonious society.
Note application abroad is limited.Reason is that external post and telecommunication tariff is cheap, and user's ability to pay is strong, and the user is not extensive use of the custom of note.With Japan is example, and the operator never carries out short message service; This business was carried out in 1991 in Europe, short message service cradle, and up to now, scale is still very limited.Therefore, the research of developed country aspect short message monitoring was both insufficient also not deeply, and what wherein the bigger use of influence was more is the Mlilife Anti-SPAM product that Alcatel-Lucent releases, and is called for short ASA.ASA adopts the Vortex rule engine technique of Bell Laboratory patent, has self study and dynamic regulation rule function.ASA is necessarily used at home, but effect is barely satisfactory.Because ASA is based on the complete matching technique of keyword, the refuse messages sender is the annex interfere information in note, for example inserts insignificant character or nearly sound speech and substitutes etc., just can evade the interception of ASA; (behavioural characteristics such as short message content consistency are not considered in 100/h) rule interception to ASA, and the refuse messages sender only need make simple technique and handle the interception that just can evade ASA according to the note quantity forwarded.
Domestic research to the SMS monitoring center is stuck on " the SMS service center and the short message monitoring hub-interface standard " of promulgation in 2003, there is no substantive behave, following 3 points of tracing it to its cause: profit-seeking is the instinct as the operator of enterprise, note is the most important point of economic increase of operator at present, filtering note certainly will influence profit, so the operator holds a negative attitude for a long time; Based on first point, operator's passive attitude has a strong impact on short message monitoring center developer's input and enthusiasm; The property grasped of relevant specification of country, standard is not enough, has also influenced the exploitation at short message monitoring center.With the patent of invention to State Intellectual Property Office application is example, and applications ten remainders are only authorized three so far.Along with the lasting rising of regulation refuse messages society cry, the operator recognizes that enterprise should bear social responsibility, and since in October, 2006, the operator has accelerated research and the input to aspect, short message monitoring center.Now be summarized as follows with regard to the relevant patent of short message monitoring centre sphere application related technology and strategy:
A kind of method and system of disposal of refuse note (application number 200510117449.7) propose the user sets up Keyword List disposal of refuse note in the carrier network side method.
A kind of method and system of disposal of refuse note (application number 200510117448.2) propose the user sets up list of numbers disposal of refuse note in the carrier network side method.
The method of short message firewall system and setting-up short message fire compartment wall (application number 200610020383.4) has proposed the user personalized filtering short message rule has been set, and operator is provided with general filtering short message rule.
The linear dimensions fuzzy matching algorithm of short message content (application number 200410061270.X) has proposed the technology of introducing asterisk wildcard in the keyword, solves the problem that the keyword matching technique lost efficacy in the refuse messages of additional interference information.
A kind of method of mobile phone SMS filtering (ZL02137335.3) proposes user side the keyword filtrating rubbish short message is set.
A kind of method (ZL200410042668.9) of handset to filter short message proposes user side the telephone number filtrating rubbish short message is set.
Short message fire compartment wall implementation method (ZL20041008826.9) proposes user side rubbish number filtering refuse messages is set.
Above-mentioned achievement in research and certain reference of benefiting our pursuits, reference are worth, and its weak point can be summarized as follows: the validity of introducing asterisk wildcard fuzzy matching technology in the keyword has much room for improvement; Do not notice that refuse messages has tangible behavioural characteristic, especially consistent this key element of short message content; Short message monitoring center real time filtering influences the problem of SMS service center processing ability, lacks corresponding technical measures; Legal note erroneous judgement is compared with the refuse messages erroneous judgement, and the former brings bigger loss to the user, also causes the trouble of more crossing for operator, and this is lacked treatment technology and the strategy of taking into account each side's interests accordingly; The automatic generation technique of keyword dictionary.
Summary of the invention
The purpose of this invention is to provide a kind of short message monitoring center and method for supervising.
The short message monitoring center joins by GNS and SMS service center, the inside annexation at short message monitoring center is: the bill record collection module is exhaled the information bar number with rising, frequency sends the success rate statistical module, short message consistency discrimination module, users to trust grade module, Comprehensive Assessment short message class Modules, the black and white lists administration module, HLR attaching position register module is joined, bill record collection module and Bayes's short message study module, the keyword lexicon module, phonetic obfuscation keyword matching module, Comprehensive Assessment short message class Modules joins, and short message monitoring center hardware platform is the IBMX39508872-7RC multi-core environment.
Short message monitoring method adopts the bill record collection module to read in data from the accounting module at SMS service center, behavioural characteristics such as the information bar number of statistics short message, frequency, transmission success rate, the short message content consistency then adopts MD5 HASH algorithm, dynamically adjusts the users to trust grade; The bill record collection module is used for the Bayesian learning module simultaneously, upgrades the keyword dictionary of short message real time filtering; Phonetic obfuscation keyword matching template module draws short message rubbish degree value to the short message real time filtering of authentication request; Take all factors into consideration short message rubbish degree and users to trust grade factor, provide the discriminating response of short message classification, the black and white lists of Sheng Chenging feeds back to the SMS service center simultaneously; The short message monitoring center adopts the method for real time filtering mechanism fusion ticket analysis mechanisms to finish the filtration of refuse messages jointly, communication protocol between short message monitoring center and the SMS service center is SMPPV3.X, short message monitoring center hardware platform is the IBMX39508872-7RC multi-core environment, the parallel multithreading real time filtering program of operation under Linux symmetric multiprocessor framework.
Described phonetic obfuscation keyword matching template method: after system received note, system adopted phonetic obfuscation keyword matching template technology to mate after to the obfuscation of note phonetic, obtains the rubbish degree of note correspondence.Phonetic obfuscation keyword matching template technology can effectively be eliminated various artificial interfere informations in the refuse messages.
The method of described ticket analysis mechanisms: be conceived to the behavioural characteristic of refuse messages, comprised and exhaled information bar number, frequency, transmission success rate, short message content consistency etc., dynamically adjust user's reliability rating; In conjunction with the note rubbish degree that real time filtering is determined, the final classification of this note of Comprehensive Assessment.The short message content consistency is differentiated the MD5 HASH algorithm that adopts in the cryptography: every the note that enters Surveillance center is carried out the MD5 algorithm produce one 128 integer, and and a period of time in all HASH numbers of producing of the note that receives of Surveillance center compare, if there is identical integer, think that then two short message contents are identical, quantity forwarded to this note adds 1, computing function F (X, L, N), X is user's a reliability rating, and L is the rubbish degree of note, and N is the quantity that note sends, calculate and whether can continue to send this note, and handle accordingly according to result of calculation.If there is no identical integer then puts 1 with the note quantity forwarded, and this integer is inserted in the HASH formation.
Described short message monitoring center is divided three classes note: legal note, suspicious short message and refuse messages; Adopt legal note to let pass, intercepting rubbish short message, the strategy of letting pass behind the additional operator's signal language of suspicious short message.The keyword dictionary at short message monitoring center generates note sample off-line learning automatically by Bayes's method.
Advantage of the present invention: 1) Chinese keyword adopts phonetic obfuscation keyword matching template technology, the interfere information in the note that can effectively remove rubbish; 2) according to the behavioural characteristic of refuse messages, dynamically adjust user's reliability rating, in conjunction with based on the determined note rubbish of phonetic obfuscation keyword matching template real time filtering technology degree value, the classification of Comprehensive Assessment note has improved the interception rate of refuse messages and has differentiated accuracy; 3) on the multinuclear hardware platform, the real time filtering program that operation is parallel reduces the influence of short message monitoring center to SMS service center processing ability; 4) the SMS classified and New Policy handled, note is divided into legal note, suspicious short message and refuse messages, the legal note of letting pass, the catching rubbish note, and suspicious short message adopts the strategy of letting pass behind the additional operator signal language, in China's existing laws and regulations framework, taken into account the common interest of user and operator; 5) adopt Bayes's method that the note sample is carried out off-line learning, generate refuse messages keyword dictionary automatically.
Description of drawings
Fig. 1 is the structured flowchart at short message service center (SMS service center) and short message monitoring center (short message monitoring center);
Fig. 2 is the structured flowchart (having omitted GNS) at short message monitoring center (short message monitoring center);
Fig. 3 is a phonetic obfuscation keyword matching template algorithm flow chart;
Fig. 4 (a) is that the content of short message consistency is differentiated MD5 algorithm major cycle schematic diagram;
The once-through operation schematic diagram of Fig. 4 (b) during to be that the md5 encryption algorithm is every take turns;
Fig. 5 is that Bayes generates short message keyword dictionary flow chart automatically.
Embodiment
The note real time filtering has several different methods in theory, but the most widely used method that remains based on the keyword coupling.Adopt the artificial interfere information that increases at refuse messages, disturb the monitoring at short message monitoring center, propose phonetic obfuscation keyword matching template method, reach effective elimination interfere information, the purpose of filtrating rubbish short message.
In view of refuse messages is different from the fact of the remarkable behavioural characteristic of legal note, as high transmission frequency and traffic volume, the low characteristics such as success rate, short message content unanimity that send are differentiated in the ticket analytical method, and are dynamically adjusted user's reliability rating.In conjunction with the note rubbish degree that real time filtering is determined, the final classification of Comprehensive Assessment note.The short message content consistency is differentiated the MD5 HASH algorithm that adopts in the cryptography.
Put into operation in view of the short message monitoring center and can cause the fact of SMS service center processing ability drop about 30% usually; short message monitoring center hardware platform is selected multi-core environment; the parallel multithreading real time filtering program of operation under Linux symmetric multiprocessor framework, reducing the short message monitoring center influences SMS service center processing ability.
In view of the negative effect bigger fact of legal note erroneous judgement far beyond the refuse messages erroneous judgement, consider of the constraint of China's relevant laws and regulations to the operator, note is divided into legal note, suspicious short message and refuse messages.Legal note is let pass, and intercepting rubbish short message, suspicious short message then adopt the strategy of letting pass behind additional operator's signal language.With regard to the user, can avoid important information to be blocked the loss that causes; With regard to the operator, the interception note is free in accordance with regulations, too much interception certainly will influence income, even if while suspicious short message refuse messages, because added prompting, the operator does duty from the law angle, moreover whether rubbish is different with the people for a same note, and therefore above-mentioned strategy has been taken into account user and operator's interests.
The keyword dictionary is used for reference the achievement of filtering the spam field, adopts Bayes's method that note sample off-line learning is generated automatically.
The invention will be further described below in conjunction with accompanying drawing.
As shown in Figure 1, after each SMS service center receives the short message that domestic consumer sends or entity is submitted to, all send an authentication request to GNS, GNS is transmitted authentication request to the short message monitoring center.The short message monitoring center is judged short message content and behavioural characteristic, returns to SMS service center Authentication Response through GNS.If short message is legal, the authentication success message is returned at the short message monitoring center, and the recipient is handed down to this note in the SMS service center; If short message is suspicious, the short message monitoring center is returned authentication and is accepted message, and the recipient is handed down to after this note is added operator's signal language in the SMS service center; If short message is illegal, return failed authentication message, the SMS service center abandons this note.According to the Ministry of Information Industry " SMS service center and short message monitoring hub-interface standard ", information interaction between SMS service center and the short message monitoring center adopts the SMPP agreement of standard, the SMS service center will be risen by DELIVER SM and be exhaled MO (Mobile Original) information to submit to the short message monitoring center, short message test field contents among the DELIVER SM is extracted at the short message monitoring center, returns SMS service center SELIVER SM RESP authentication response message after handling according to established rule.If the time of SMS service center waits response is greater than 5s, then SMS service central record daily record, directly transmitting short message.
As shown in Figure 2, the inside annexation at short message monitoring center is: the bill record collection module exhales information bar number, frequency to send success rate statistical module, short message consistency discrimination module, users to trust grade module, Comprehensive Assessment short message class Modules, black and white lists administration module, HLR attaching position register module to join with rising, and bill record collection module and Bayes's short message study module, keyword lexicon module, phonetic obfuscation keyword matching module, Comprehensive Assessment short message class Modules join.
Short message monitoring method adopts the method for real time filtering mechanism fusion ticket analysis mechanisms to finish the filtration of refuse messages jointly, the bill record collection module is read in data from the accounting module at SMS service center, behavioural characteristics such as the information bar number of statistics short message, frequency, transmission success rate, the short message content consistency then adopts MD5 HASH algorithm, dynamically adjusts the users to trust grade; The bill record collection module is used for the Bayesian learning module simultaneously, upgrades the keyword dictionary of short message real time filtering; Phonetic obfuscation keyword matching template module draws short message rubbish degree value to the short message real time filtering of authentication request; Take all factors into consideration short message rubbish degree and users to trust grade factor, provide the discriminating response of short message classification, the black and white lists of Sheng Chenging feeds back to the SMS service center simultaneously; Communication protocol between short message monitoring center and the SMS service center is SMPPV3.X, short message monitoring center hardware platform is an IBMX3950 8872-7RC multi-core environment, the parallel multithreading real time filtering program of operation under Linux symmetric multiprocessor framework.
As shown in Figure 3, discuss phonetic obfuscation keyword matching template real time filtering technology in conjunction with example.Carry out the Bayesian learning of rubbish keyword by 30,000 notes, obtain refuse messages keyword " Falun Gong ", carry out being " FaLunGong " behind the alphabetizing, obtain " FaLunGong " corresponding rubbish degree, be made as M.After the illegal note such as receive " Falun Gong personnel burn oneself to death in the Tian'anmen Square ... " when system, system mates after to the note alphabetizing, matches " FaLunGong " and obtains corresponding rubbish degree.The lawless person mainly takes following several distortion to refuse messages:
Increase punctuation mark.As: " method, the wheel merit personnel burn oneself to death in the Tian'anmen Square ... " etc., punctuation mark is at first removed by system before coupling, and therefore above note can match " FaLunGong " equally.
Figure A20071007044400092
Increase decollator.As: " Falun Gong personnel burn oneself to death in the Tian'anmen Square ... ", decollator also can be removed by system after removing punctuation mark, and therefore above note can match " FaLunGong " equally.
Increase irrelevant speech.As: " method wheel merit personnel burn oneself to death in the Tian'anmen Square ... " short message keyword template matches technology, its core concept is that common keyword is decomposed into single word." it is limited that the irrelevant words that=75 Chinese characters, refuse messages insert in keyword is disturbed, and too much irrelevant words can make the readability of refuse messages degenerate simultaneously, losing deceitful effect in view of the length of a note.Keyword template matches technology is considered as three words with keyword " Falun Gong ": " method " " wheel " " merit "; The length of supposing template is length keywords X2, is example with keyword " Falun Gong ", and template length is 6.During real time filtering, the scanning note in full, the lead-in coupling of " method " word and refuse messages keyword " Falun Gong ", then intercepting template length (6 characters) content and keyword " Falun Gong " mate from note, and therefore above note can match " FaLunGong " equally.Refuse messages deformable bodys such as " method wheel merits " also can't be evaded the real time filtering interception at short message monitoring center like this.Template length is looked the operation result and is adjusted at any time.
Figure A20071007044400094
Replace with homophone, as: " sending out wheel merit personnel burns oneself to death in the Tian'anmen Square ... ", because system mates with phonetic, therefore " send out the opinion merit " and when being converted into phonetic, can match " FaLunGong " too.
Figure A20071007044400095
Replace with nearly sound word, as " the floral whorl merit personnel burn oneself to death in the Tian'anmen Square ... ", system is when carrying out Chinese character to the conversion of phonetic, can carry out Fuzzy Processing to similar phonetic, arrive " Fa " as " hua ", " run " arrives " lun ", and " neng " arrives " nen " etc.Therefore " floral whorl merit " carrying out also mating " FaLunGong " after the fuzzy conversion of phonetic.
In a word, phonetic obfuscation keyword matching template technology can effectively be eliminated various artificial interfere informations in the refuse messages.
Shown in Fig. 4 (a) and (b), in view of refuse messages has tangible malicious act feature, as high transmission frequency and traffic volume, lowly send features such as success rate, short message content are consistent, so behavioural characteristic of analytic induction refuse messages, the reliability rating of dynamically adjusting the user is feasible.Combine the effectiveness that can further improve the short message monitoring center with the real time filtering technology.The statistics of transmission frequency, traffic volume, transmission success rate belongs to known technology, comparison method is infeasible but the differentiation of short message content consistency scans one by one by traditional full text, scan in full the ample resources that comparison method one by one will expend the short message monitoring center, can't satisfy the requirement that real-time is required to be bordering on harsh short message monitoring center.
The full name of MD5 is Message-Digest Algorithm 5 (information one digest algorithm), and it is that a segment information (Message) is produced informative abstract (Message-Digest) that its typical case uses.MD5 is used as whole file as a big text message, by its irreversible character string mapping algorithm, has produced this unique MD5 informative abstract.If propagate afterwards in the process of this file, no matter any type of change (comprising error of transmission that the circuit instability causes in artificial modification or the process of transmitting etc.) has taken place in the content of file, as long as will find that informative abstract is inequality when this file is recomputated MD5, can determine the just incorrect file that obtains thus.In simple terms, the effect of MD5 is to allow note be ' compressed ' into a kind of secret form before filtration, just the byte serial of a random length is transformed into the big integer of a fixed length.
Consistency is differentiated message M and is divided into M 1, M 2... M k, K son grouping altogether.The input of one-way hash function is message grouping Mi and last message grouping M I-1The hashed value h of hashed value I-1, output hashed value h i, output hashed value h i=f (M i, h I-1).The message grouping M of this hashed value hi and next round I+1Together, as the next round input of one-way hash function, so repeatedly, the output of last group is exactly the hashed value of whole message to be encrypted.
The md5 encryption algorithm is a kind of one-way hash function of Ron Rivest design, it is grouped into processed in units input expressly (Plaintext) with 512, each 512 grouping is divided into 16 32 seat groupings again, and algorithm is output as 32 groupings of 4 cascades, forms 128 hashed value.It is as follows that the initialization of MD5 algorithm, major cycle and afterbody are handled three steps:
1. initialization.Algorithm initialization is divided into original plaintext initialization and two parts of link variable initialization.Expressly initialization at first is byte 0X8O of plaintext P back cascade to be encrypted of L with length, and several 0X00 of cascade are as filling again, and making its length is (512 *K-64) position (K is a positive integer). follow 64 plaintext length in byte of cascade again, this moment, expressly length was filled to be 512 integral multiple, guaranteed that simultaneously isolog can be not identical after filling.Four 32 link variables (Chaining Variable) are initialized as: A=0x01234567, B=0x89ABCDEF, C=0xFEDCBA98, D=0x76543210.These four link variables are most important for whole algorithm, and its value is directly connected to writing of corollary equipment software, these four link variables must be write correctly.
2. algorithm major cycle.The algorithm major cycle is shown in Fig. 4 (a).The major cycle number of times is the merchant of the clear data figure place of process filling divided by 512 gained.Link variable A, B, C, D are composed respectively to a, b, four variablees of c, d.Each major cycle all has four-wheel, and every the wheel carried out 16 operations, and each operation is carried out a nonlinear function computing to three among a, b, c, the d earlier, then the gained result is added successively the 4th variable, M i(a son grouping in the text) and a C i(constant) with gained indefinite constant S of ring shift left as a result, and then one of adds among a, b, c or the d, one of replaces among a, b, c or the d with this result at last.Each operating process is shown in Fig. 4 (b).
3. afterbody is handled.After major cycle is each time all finished, A, B, C and D are added a, b, c and d respectively.Then continue the operation algorithm with next grouping, last output hashed value is the cascade of A, B, C and D.Definition nonlinear function FF (a, b, c, d, M i, S, C i):
a=b+[F(b,c,d)+a+Mj+C i]<<<S
Wherein, S is the figure place of ring shift left, is a constant; Constant C iBe in i step 2 32*| sin (i) | integer part (i unit is a radian).Four-wheel is 16x4=64 time that altogether nonlinear function each time is all inequality.
As follows based on the MD5 HASH algorithm note method that recurrence send that judges whether to attach most importance to: as every the note that enters Surveillance center to be carried out the MD5 algorithm produce one 128 integer, and and a period of time in all HASH numbers of producing of the note that receives of Surveillance center compare, if there is identical integer, think that then two short message contents are identical, quantity forwarded to this note adds 1, computing function F (X, L, N), X is user's a reliability rating, and L is the rubbish degree of note, and N is the quantity that note sends, calculate and whether can continue to send this note, and handle accordingly according to result of calculation.If there is no identical integer then sends note, and the note quantity forwarded is put 1, and this integer is inserted in the HASH formation.
As shown in Figure 5, at short message monitoring center idle period, Bayes's short message study module screening short message sample automatically/by hand carries out Bayesian learning to the sample that filters out; The rubbish short message keyword that generates carries out the short message real time filtering for phonetic obfuscation keyword matching module.
Existing research and test shows, put into operation and reduce the disposal ability at SMS service center 30% usually in the short message monitoring center, because short message real time filtering---the software and hardware resources expense of phonetic obfuscation keyword matching template algorithm is bigger, and this is the thorny problem that the operator faces.The technical measures that solve this difficult problem are to adopt the multinuclear hardware platform, the real time filtering program that operation is parallel.The difficult point that multinuclear is used is at software, and the short message real time filtering has natural concurrency fortunately, and therefore parallel filter difficulty reduces greatly, is exemplified below.
The IBM X3950 8872-7RC server that hardware platform adopts contains 2 Intel Xeon 7020 dual core processors, meets the symmetric multiprocessor framework of linux system.The difference of polycaryon processor and multiprocessor is whether to adopt the channel of Front Side Bus as data sharing.The pattern that the parallel processing of short message should adopt the one process multithreading to handle, because contrast thread and process, the program that the establishment of thread and handover overhead are littler than process, the mode of inter-thread communication is Duoed and simple also more efficient, multithreading has the base library support that so many as to make the ox carrying them perspire and to fill a house to the rafters, a multithreading is more readily understood and revises than the program of multi-process.For the operating system of supporting the SMP framework, each thread is assigned to the scheme of different CPU nuclear and is dispatched automatically by system kernel, and scheduling scheme is that platform is relevant for kernel, and application programs has nothing to do.
Background application need comprise<pthread.h〉header file to be to create multithreading.The function prototype of creating new thread is extern int pthread_create_p ((pthread_t *_ thread, _ constpthread_attr_t *_ attr, void *( *_ start_routine) (void *), void *_ arg)); First parameter is for pointing to the pointer of thread identifier, and second parameter is used for being provided with the thread attribute, and the 3rd parameter is the initial address of thread operation function, and last parameter is the operation function parameters.After sub-thread is finished, main thread extern int pthread join P ((pthread t th, void *Thread retum)); Or extern void pthread_exit_P ((void *_ retval)) _ attribute_ ((_ noreturn_)); Wait for its end.
After creating sub-thread, can set thread with pthread attr setscope () and whether be tied to do on the light process and do not need the real-time processing of dispatching; Can use pthread attr setdetachstate (pthread attr t *Attr, int detachstate) sets thread and stop the mode of self; Also can use pthread_attr_getschedparam (﹠amp; Attr , ﹠amp; Param); Pthread_attr_setschedparam (﹠amp; Attr , ﹠amp; Param); Function is to revising the priority of thread.
In multithread programs,, also have a kind of data type relevant: thread-data with thread except global variable and local variable.In thread inside, each function can be as using global variable call it, but it is sightless to other thread of thread outside.Handle the return information (error code or result) of short message in the A-wire journey, can not be thought the second thread, so on need data binding to a key relevant with thread with the thread correspondence by process.Extern int pthread P ((pthread_key_t * _ key, void (* _ destr_function) (void *))); And pthread_once ((pthread once t*once_control, void (* initroutine) are (void))); Be used, guarantee that corresponding key only is created once.Extern int pthread_setspecific_P ((pthread_key_t_key, constvoid*_pointer)); With extern void*pthread_getspecific_P ((pthread_key_t_key)); Set up the read-write relation between short message processing return value and the key.Can delete this key with pthread_key_delete () at last.Parallel short message is handled the shared data read/write conflict that is faced and is solved by mutual exclusion lock.The mutual exclusion lock variable mutex of pthread_mutex_t type comprises the attributes object of a system assignment.Function pthread_mutex_init is with generating a mutual exclusion lock.State the mutual exclusion lock of particular community if desired, must call function pthread_mutexattr_init.Function pthread_mutexattr_setpshared and function pthread_mutexattr_settype are used for being provided with the mutual exclusion lock attribute.The pthread_mutex_lock statement begins to lock with mutual exclusion lock, and code is after this all locked till calling pthread_mutex_unlock, and promptly the same time can only be carried out by a thread dispatching.When a thread execution arrived the pthread_mutex_lock place, if this lock is used by another thread this moment, this thread got clogged, and promptly program will wait by the time another thread discharges this mutual exclusion lock.

Claims (5)

1. short message monitoring center, it is characterized in that the short message monitoring center joins by GNS and SMS service center, the inside annexation at short message monitoring center is: the bill record collection module is exhaled the information bar number with rising, frequency sends the success rate statistical module, short message consistency discrimination module, users to trust grade module, Comprehensive Assessment short message class Modules, the black and white lists administration module, HLR attaching position register module is joined, bill record collection module and Bayes's short message study module, the keyword lexicon module, phonetic obfuscation keyword matching module, Comprehensive Assessment short message class Modules joins, and short message monitoring center hardware platform is an IBMX3950 8872-7RC multi-core environment.
2. short message monitoring method that uses short message monitoring as claimed in claim 1 center, it is characterized in that adopting the machine-processed method that merges the ticket analysis mechanisms of real time filtering to finish the filtration of refuse messages jointly, the bill record collection module is read in data from the accounting module at SMS service center, behavioural characteristics such as the information bar number of statistics short message, frequency, transmission success rate, the short message content consistency then adopts MD5 HASH algorithm, dynamically adjusts the users to trust grade; The bill record collection module is used for the Bayesian learning module simultaneously, upgrades the keyword dictionary of short message real time filtering; Phonetic obfuscation keyword matching template module draws short message rubbish degree value to the short message real time filtering of authentication request; Take all factors into consideration short message rubbish degree and users to trust grade factor, provide the discriminating response of short message classification, the black and white lists of Sheng Chenging feeds back to the SMS service center simultaneously; Communication protocol between short message monitoring center and the SMS service center is SMPPV3.X, short message monitoring center hardware platform is an IBMX3950 8872-7RC multi-core environment, the parallel multithreading real time filtering program of operation under Linux symmetric multiprocessor framework.
3. a kind of short message monitoring method according to claim 2, it is characterized in that described phonetic obfuscation keyword matching template method: after system receives note, system adopts phonetic obfuscation keyword matching template technology to mate after to the obfuscation of note phonetic, obtains the rubbish degree of note correspondence.Phonetic obfuscation keyword matching template technology can effectively be eliminated various artificial interfere informations in the refuse messages.
4. a kind of short message monitoring method according to claim 2, the method that it is characterized in that described ticket analysis mechanisms: the behavioural characteristic that is conceived to refuse messages, comprised and exhaled information bar number, frequency, transmission success rate, short message content consistency etc., dynamically adjusted user's reliability rating; In conjunction with the note rubbish degree that real time filtering is determined, the final classification of this note of Comprehensive Assessment.The short message content consistency is differentiated the MD5 HASH algorithm that adopts in the cryptography: every the note that enters Surveillance center is carried out the MD5 algorithm produce one 128 integer, and and a period of time in all HASH numbers of producing of the note that receives of Surveillance center compare, if there is identical integer, think that then two short message contents are identical, quantity forwarded to this note adds 1, computing function F (X, L, N), X is user's a reliability rating, and L is the rubbish degree of note, and N is the quantity that note sends, calculate and whether can continue to send this note, and handle accordingly according to result of calculation.If there is no identical integer then puts 1 with the note quantity forwarded, and this integer is inserted in the HASH formation.
5. a kind of short message monitoring method according to claim 2 is characterized in that described short message monitoring center is divided three classes note: legal note, suspicious short message and refuse messages; Adopt legal note to let pass, intercepting rubbish short message, the strategy of letting pass behind the additional operator's signal language of suspicious short message.The keyword dictionary at short message monitoring center generates note sample off-line learning automatically by Bayes's method.
CN200710070444A 2007-08-01 2007-08-01 Short message monitoring center and method for supervising Expired - Fee Related CN100576940C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200710070444A CN100576940C (en) 2007-08-01 2007-08-01 Short message monitoring center and method for supervising

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200710070444A CN100576940C (en) 2007-08-01 2007-08-01 Short message monitoring center and method for supervising

Publications (2)

Publication Number Publication Date
CN101137087A true CN101137087A (en) 2008-03-05
CN100576940C CN100576940C (en) 2009-12-30

Family

ID=39160871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200710070444A Expired - Fee Related CN100576940C (en) 2007-08-01 2007-08-01 Short message monitoring center and method for supervising

Country Status (1)

Country Link
CN (1) CN100576940C (en)

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101790142A (en) * 2010-03-11 2010-07-28 上海粱江通信系统股份有限公司 Method and system for identifying spam message sources by combining message contents and transmission frequency
CN101945355A (en) * 2010-07-02 2011-01-12 中兴通讯股份有限公司 Spam message processing method and equipment
CN101977360A (en) * 2010-09-30 2011-02-16 北京新媒传信科技有限公司 Junk short message filter method
CN102096703A (en) * 2010-12-29 2011-06-15 北京新媒传信科技有限公司 Filtering method and equipment of short messages
CN102164355A (en) * 2010-02-22 2011-08-24 雅虎公司 Media event structure and context identification using short messages
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus
CN102323929A (en) * 2011-08-23 2012-01-18 上海粱江通信技术有限公司 Method for realizing fuzzy matching of Chinese short message with keyword
CN102340580A (en) * 2010-07-16 2012-02-01 希姆通信息技术(上海)有限公司 Mobile phone and method for preventing repeated sending of mobile phone by using same
CN101340693B (en) * 2008-08-12 2012-03-07 中兴通讯股份有限公司 System and implementing method for monitoring rubbish short message based on content length
CN101389085B (en) * 2008-10-14 2012-03-21 中国联合网络通信集团有限公司 Rubbish short message recognition system and method based on sending behavior
CN101335968B (en) * 2008-08-04 2012-05-09 中兴通讯股份有限公司 Method and system for rubbish short message monitoring post processing
CN102547621A (en) * 2010-12-23 2012-07-04 中国移动通信集团公司 System and device as well as method for monitoring and processing junk short messages
CN102761848A (en) * 2012-08-01 2012-10-31 成都四方信息技术有限公司 Method for determining short message intercepting key words
CN101730017B (en) * 2008-10-27 2012-12-05 中国移动通信集团吉林有限公司 Method and device for determining users sending spam short messages
CN102946400A (en) * 2012-11-29 2013-02-27 广东全通教育股份有限公司 Safety filtering method and system for mass short message content based on behavioural analysis
CN102946596A (en) * 2012-11-29 2013-02-27 广东全通教育股份有限公司 Method and system for preventing resending of short message based on digital signature technology
CN103001848A (en) * 2011-09-08 2013-03-27 中国电信股份有限公司 Spam filtering method and spam filtering device
CN103428185A (en) * 2012-05-24 2013-12-04 百度在线网络技术(北京)有限公司 Message filtering/speed limit method, system and device
WO2014019465A1 (en) * 2012-07-30 2014-02-06 腾讯科技(深圳)有限公司 Method, device, and storage medium for detecting abnormal message based on account attribute
CN103634797A (en) * 2013-12-06 2014-03-12 中国联合网络通信集团有限公司 Method and device for recognizing spam short messages
CN103686736A (en) * 2012-09-25 2014-03-26 中国电信股份有限公司 Garbage message interception method and platform
CN103702301A (en) * 2013-12-31 2014-04-02 大连环宇移动科技有限公司 Real-time sensing control system for inter-internet short message service
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN105120440A (en) * 2015-08-26 2015-12-02 小米科技有限责任公司 Information processing method and device
CN105354284A (en) * 2015-10-30 2016-02-24 小米科技有限责任公司 Template processing method and apparatus and short message identification method and apparatus
CN105704689A (en) * 2016-01-12 2016-06-22 深圳市深讯数据科技股份有限公司 Big data acquisition and analysis method and system of short message behaviors
CN105721539A (en) * 2016-01-12 2016-06-29 深圳市深讯数据科技股份有限公司 Short message classification apparatus and method based on behavior features
CN105786792A (en) * 2014-12-26 2016-07-20 中国移动通信集团公司 Information processing method and device
CN106294432A (en) * 2015-05-26 2017-01-04 中国移动通信集团公司 A kind of information processing method and device
CN106303992A (en) * 2016-08-22 2017-01-04 安徽拓通信科技集团股份有限公司 A kind of refuse messages automatically clear up system and method
CN106411704A (en) * 2016-09-19 2017-02-15 南京邮电大学 Distributed junk short message recognition method
CN106446032A (en) * 2016-08-30 2017-02-22 江苏博智软件科技有限公司 Junk information processing method and apparatus
WO2017028554A1 (en) * 2015-08-18 2017-02-23 中兴通讯股份有限公司 Method and system for implementing information harassment prevention
CN107071752A (en) * 2017-03-20 2017-08-18 唐承龙 Industry short message is counter to swindle anti-leakage system platform
CN107333248A (en) * 2017-06-29 2017-11-07 北京鸿联九五信息产业有限公司 A kind of real-time sending method of short message and system
CN107958072A (en) * 2017-12-06 2018-04-24 珠海市魅族科技有限公司 Rubbish method for cleaning and device, computer installation and computer-readable recording medium
CN108966158A (en) * 2018-08-21 2018-12-07 平安科技(深圳)有限公司 Note transmission method, system, computer equipment and storage medium
CN110266667A (en) * 2019-06-06 2019-09-20 惠州学院 A kind of network content security and risk prevention system system and method
CN111212390A (en) * 2019-12-23 2020-05-29 北京健康之家科技有限公司 Message queue processing method, device and equipment
CN111432358A (en) * 2020-03-30 2020-07-17 北京思特奇信息技术股份有限公司 Short message sending method, system, medium and equipment
CN111913994A (en) * 2020-08-12 2020-11-10 武汉众邦银行股份有限公司 Client risk data monitoring method based on inline data and external data
CN112040430A (en) * 2020-08-31 2020-12-04 北京达佳互联信息技术有限公司 Short message sending method, device, server and storage medium
CN113316099A (en) * 2021-05-26 2021-08-27 平安普惠企业管理有限公司 Fusing method, device, equipment and storage medium for user touch data
CN113434588A (en) * 2021-01-30 2021-09-24 河南信安通信技术股份有限公司 Data mining analysis method and device based on mobile communication ticket
CN114845254A (en) * 2022-04-28 2022-08-02 中国联合网络通信集团有限公司 Abnormal message processing method, platform, system and storage medium
CN114866643A (en) * 2022-05-02 2022-08-05 北京万合恒安科技有限公司 Communication data skynet monitoring system based on big data

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335968B (en) * 2008-08-04 2012-05-09 中兴通讯股份有限公司 Method and system for rubbish short message monitoring post processing
CN101340693B (en) * 2008-08-12 2012-03-07 中兴通讯股份有限公司 System and implementing method for monitoring rubbish short message based on content length
CN101389085B (en) * 2008-10-14 2012-03-21 中国联合网络通信集团有限公司 Rubbish short message recognition system and method based on sending behavior
CN101730017B (en) * 2008-10-27 2012-12-05 中国移动通信集团吉林有限公司 Method and device for determining users sending spam short messages
CN102164355B (en) * 2010-02-22 2015-09-09 雅虎公司 Use media event structure and the context recognition of short message
US9084096B2 (en) 2010-02-22 2015-07-14 Yahoo! Inc. Media event structure and context identification using short messages
CN105207887B (en) * 2010-02-22 2019-04-05 埃克斯凯利博Ip有限责任公司 Mthods, systems and devices for the identification of media event section
CN102164355A (en) * 2010-02-22 2011-08-24 雅虎公司 Media event structure and context identification using short messages
CN105207887A (en) * 2010-02-22 2015-12-30 雅虎公司 Media Event Structure And Context Identification Using Short Messages
CN101790142A (en) * 2010-03-11 2010-07-28 上海粱江通信系统股份有限公司 Method and system for identifying spam message sources by combining message contents and transmission frequency
CN101790142B (en) * 2010-03-11 2012-11-14 上海粱江通信系统股份有限公司 Method and system for identifying spam message sources by combining message contents and transmission frequency
CN101945355A (en) * 2010-07-02 2011-01-12 中兴通讯股份有限公司 Spam message processing method and equipment
CN102340580A (en) * 2010-07-16 2012-02-01 希姆通信息技术(上海)有限公司 Mobile phone and method for preventing repeated sending of mobile phone by using same
CN102340580B (en) * 2010-07-16 2016-04-13 希姆通信息技术(上海)有限公司 Mobile phone and the mobile phone that prevents utilizing this mobile phone to realize repeat the method sent
CN101977360B (en) * 2010-09-30 2013-07-03 北京新媒传信科技有限公司 Junk short message filter method
CN101977360A (en) * 2010-09-30 2011-02-16 北京新媒传信科技有限公司 Junk short message filter method
CN102547621A (en) * 2010-12-23 2012-07-04 中国移动通信集团公司 System and device as well as method for monitoring and processing junk short messages
CN102547621B (en) * 2010-12-23 2015-04-22 中国移动通信集团公司 System and device as well as method for monitoring and processing junk short messages
CN102096703A (en) * 2010-12-29 2011-06-15 北京新媒传信科技有限公司 Filtering method and equipment of short messages
CN102096703B (en) * 2010-12-29 2013-06-12 北京新媒传信科技有限公司 Filtering method and equipment of short messages
WO2012174821A1 (en) * 2011-06-22 2012-12-27 中兴通讯股份有限公司 Method and system for monitoring spam short message and monitoring processing device
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus
CN102323929A (en) * 2011-08-23 2012-01-18 上海粱江通信技术有限公司 Method for realizing fuzzy matching of Chinese short message with keyword
CN103001848A (en) * 2011-09-08 2013-03-27 中国电信股份有限公司 Spam filtering method and spam filtering device
CN103001848B (en) * 2011-09-08 2015-10-21 中国电信股份有限公司 Rubbish mail filtering method and device
CN103428185A (en) * 2012-05-24 2013-12-04 百度在线网络技术(北京)有限公司 Message filtering/speed limit method, system and device
CN103428185B (en) * 2012-05-24 2016-06-15 百度在线网络技术(北京)有限公司 Packet filtering/method for limiting speed, system and device
WO2014019465A1 (en) * 2012-07-30 2014-02-06 腾讯科技(深圳)有限公司 Method, device, and storage medium for detecting abnormal message based on account attribute
US10200329B2 (en) 2012-07-30 2019-02-05 Tencent Technology (Shenzhen) Company Limited Method and device for detecting abnormal message based on account attribute and storage medium
CN102761848B (en) * 2012-08-01 2015-05-06 成都四方信息技术有限公司 Method for determining short message intercepting key words
CN102761848A (en) * 2012-08-01 2012-10-31 成都四方信息技术有限公司 Method for determining short message intercepting key words
CN103686736A (en) * 2012-09-25 2014-03-26 中国电信股份有限公司 Garbage message interception method and platform
CN102946400A (en) * 2012-11-29 2013-02-27 广东全通教育股份有限公司 Safety filtering method and system for mass short message content based on behavioural analysis
CN102946596A (en) * 2012-11-29 2013-02-27 广东全通教育股份有限公司 Method and system for preventing resending of short message based on digital signature technology
CN102946400B (en) * 2012-11-29 2016-03-09 广东全通教育股份有限公司 The magnanimity short message content safety filtering method and system that a kind of Behavior-based control is analyzed
CN103634797A (en) * 2013-12-06 2014-03-12 中国联合网络通信集团有限公司 Method and device for recognizing spam short messages
CN103702301A (en) * 2013-12-31 2014-04-02 大连环宇移动科技有限公司 Real-time sensing control system for inter-internet short message service
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN105786792A (en) * 2014-12-26 2016-07-20 中国移动通信集团公司 Information processing method and device
CN106294432A (en) * 2015-05-26 2017-01-04 中国移动通信集团公司 A kind of information processing method and device
WO2017028554A1 (en) * 2015-08-18 2017-02-23 中兴通讯股份有限公司 Method and system for implementing information harassment prevention
CN105120440A (en) * 2015-08-26 2015-12-02 小米科技有限责任公司 Information processing method and device
CN105120440B (en) * 2015-08-26 2019-05-07 小米科技有限责任公司 Information processing method and device
CN105354284B (en) * 2015-10-30 2019-12-03 小米科技有限责任公司 Processing method and processing device, short message recognition methods and the device of template
CN105354284A (en) * 2015-10-30 2016-02-24 小米科技有限责任公司 Template processing method and apparatus and short message identification method and apparatus
CN105721539A (en) * 2016-01-12 2016-06-29 深圳市深讯数据科技股份有限公司 Short message classification apparatus and method based on behavior features
CN105721539B (en) * 2016-01-12 2019-08-09 深圳市深讯数据科技股份有限公司 A kind of SMS classified device and method of Behavior-based control feature
CN105704689A (en) * 2016-01-12 2016-06-22 深圳市深讯数据科技股份有限公司 Big data acquisition and analysis method and system of short message behaviors
CN106303992A (en) * 2016-08-22 2017-01-04 安徽拓通信科技集团股份有限公司 A kind of refuse messages automatically clear up system and method
CN106446032A (en) * 2016-08-30 2017-02-22 江苏博智软件科技有限公司 Junk information processing method and apparatus
CN106411704B (en) * 2016-09-19 2019-06-21 南京邮电大学 A kind of distribution refuse messages recognition methods
CN106411704A (en) * 2016-09-19 2017-02-15 南京邮电大学 Distributed junk short message recognition method
CN107071752A (en) * 2017-03-20 2017-08-18 唐承龙 Industry short message is counter to swindle anti-leakage system platform
CN107333248B (en) * 2017-06-29 2018-05-29 北京鸿联九五信息产业有限公司 A kind of real-time sending method of short message and system
CN107333248A (en) * 2017-06-29 2017-11-07 北京鸿联九五信息产业有限公司 A kind of real-time sending method of short message and system
CN107958072A (en) * 2017-12-06 2018-04-24 珠海市魅族科技有限公司 Rubbish method for cleaning and device, computer installation and computer-readable recording medium
CN108966158A (en) * 2018-08-21 2018-12-07 平安科技(深圳)有限公司 Note transmission method, system, computer equipment and storage medium
CN110266667A (en) * 2019-06-06 2019-09-20 惠州学院 A kind of network content security and risk prevention system system and method
CN111212390A (en) * 2019-12-23 2020-05-29 北京健康之家科技有限公司 Message queue processing method, device and equipment
CN111432358A (en) * 2020-03-30 2020-07-17 北京思特奇信息技术股份有限公司 Short message sending method, system, medium and equipment
CN111913994A (en) * 2020-08-12 2020-11-10 武汉众邦银行股份有限公司 Client risk data monitoring method based on inline data and external data
CN111913994B (en) * 2020-08-12 2023-09-15 武汉众邦银行股份有限公司 Customer risk data monitoring method based on in-line data and external data
CN112040430A (en) * 2020-08-31 2020-12-04 北京达佳互联信息技术有限公司 Short message sending method, device, server and storage medium
CN113434588A (en) * 2021-01-30 2021-09-24 河南信安通信技术股份有限公司 Data mining analysis method and device based on mobile communication ticket
CN113434588B (en) * 2021-01-30 2024-04-02 河南信安通信技术股份有限公司 Data mining analysis method and device based on mobile communication ticket
CN113316099A (en) * 2021-05-26 2021-08-27 平安普惠企业管理有限公司 Fusing method, device, equipment and storage medium for user touch data
CN113316099B (en) * 2021-05-26 2022-08-12 平安普惠企业管理有限公司 Fusing method, device, equipment and storage medium for user touch data
CN114845254A (en) * 2022-04-28 2022-08-02 中国联合网络通信集团有限公司 Abnormal message processing method, platform, system and storage medium
CN114845254B (en) * 2022-04-28 2023-07-11 中国联合网络通信集团有限公司 Abnormal message processing method, platform, system and storage medium
CN114866643A (en) * 2022-05-02 2022-08-05 北京万合恒安科技有限公司 Communication data skynet monitoring system based on big data
CN114866643B (en) * 2022-05-02 2024-01-12 西安唯海智慧安防技术有限公司 Communication data space network monitoring system based on big data

Also Published As

Publication number Publication date
CN100576940C (en) 2009-12-30

Similar Documents

Publication Publication Date Title
CN100576940C (en) Short message monitoring center and method for supervising
Püschel et al. What's in a Smart Thing? Development of a Multi-layer Taxonomy.
CN101730903B (en) Multi-dimensional reputation scoring
CN112732811A (en) Data open platform
CN105787366B (en) Android software visualization safety analytical method based on component relation
CN101784022A (en) Method and system for filtering and classifying short messages
CN102231873A (en) Method and system for monitoring garbage message and monitor processing apparatus
CN105323751A (en) Mobile phone short message monitoring device
CN101860822A (en) Method and system for monitoring spam messages
CN201066901Y (en) SMS monitoring center
CN106600243A (en) Mobile payment method and system based on mixed mode
Sun et al. Design and Application of an AI‐Based Text Content Moderation System
CN103235918B (en) The collection method of trusted file and system
CN102271331B (en) Method and system for detecting reliability of service provider (SP) site
Wu et al. Real-time monitoring and filtering system for mobile SMS
CN103078832B (en) A kind of Internet service safety defense method and system
Lomuscio et al. A complete and decidable security-specialised logic and its application to the TESLA protocol
Montasari Responding to Deepfake Challenges in the United Kingdom: Legal and Technical Insights with Recommendations
CN113011838A (en) Market main body registration intelligent approval system based on preset rule data verification
KR20200040038A (en) Block chain based civil affair document nature authenticity system
CN116862679B (en) Block chain-based data processing method, device, equipment and readable storage medium
Afriyie Exploring Methods Cybersecurity Managers Need to Implement to Minimize Cyber-Frauds in Mobile Money Services in Ghana
CN117668053B (en) Data acquisition and analysis system and method
Sun et al. Artificial Intelligence and Security: 8th International Conference, ICAIS 2022, Qinghai, China, July 15–20, 2022, Proceedings, Part III
Abidin Legal Review Of Liability From Deepfake Artificial Intelligence That Contains Pornography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091230

Termination date: 20120801