CN101335920A - Rubbish short message recognition system and method based on calling number location and transmitted content - Google Patents

Rubbish short message recognition system and method based on calling number location and transmitted content Download PDF

Info

Publication number
CN101335920A
CN101335920A CNA200810116687XA CN200810116687A CN101335920A CN 101335920 A CN101335920 A CN 101335920A CN A200810116687X A CNA200810116687X A CN A200810116687XA CN 200810116687 A CN200810116687 A CN 200810116687A CN 101335920 A CN101335920 A CN 101335920A
Authority
CN
China
Prior art keywords
short message
calling number
content
junk
class
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA200810116687XA
Other languages
Chinese (zh)
Other versions
CN101335920B (en
Inventor
黄文良
张尼
邹欣
张岩
顾芳
刘德
王磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Communication Co Ltd
Original Assignee
China United Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Communication Co Ltd filed Critical China United Communication Co Ltd
Priority to CN200810116687XA priority Critical patent/CN101335920B/en
Publication of CN101335920A publication Critical patent/CN101335920A/en
Application granted granted Critical
Publication of CN101335920B publication Critical patent/CN101335920B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention relates to a rubbish short message identification system based on the position of the calling number and transmitted content and a method thereof, comprising: judging whether the amount of the transmitted short message having the same content reaches a first threshold, if true, counting the occurrence number of the position information of the calling number on the transmitted short message with the same content subsequent; judging the short message with the same content as the rubbish short message, if the sum of the occurrence number of the position information of all calling number of the short message with the same content reaches a second threshold, or if the sum of the occurrence number of the position information of any calling number of the short message with the same content reaches a third threshold; transmitting the calling number of the rubbish short message to a short message center, for filtering the rubbish short message for the short message center. The invention ensures that a great deal of short messages received by the short message center are filtered, sorted and processed in real time and high efficiency, and performs real time interception on the rubbish short message.

Description

Rubbish short message recognition system and method based on calling number location and transmission content
Technical field
The present invention relates to junk short message, relate in particular to rubbish short message recognition system and method based on calling number location and transmission content.
Background technology
In recent years, the situation that junk short message spreads unchecked grows in intensity, and almost each cellphone subscriber has been the invasion of junk short message.Investigation result according to the issue of China Internet association shows that China cellphone subscriber on average receives 8.29 junk short message weekly.
Junk short message can be divided into two kinds of patterns according to the mode of its transmission, a kind of is to utilize the short messaging gateway of mobile operator to send, when the user received short message, the transmission number of its demonstration was the Number for access of short message, rather than the phone number of domestic consumer.The junk short message that this kind method sends have speed fast, simple to operate, need characteristics such as operator's permission, short message types is in the majority with Commdity advertisement, service class.
Another kind is that the mobile phone card is inserted the mass-sending device, is connected on the computer by serial by serial port connecting wire, utilizes the mass-sending software on the computer to send (sending for the mass-sending device hereinafter to be referred as this mode) then.The mobile phone card (as M-ZONE, walk in the Divine Land etc.) that user or purchase need not to register is in a large number overdrawed, or just catches the weakness of preferential set meal to come mad short-message sending.This class mass-sending device can connect 16-20 simultaneously and can mass-send up to ten thousand short message in a short period of time with upper port, so operator often has little time to charge just by the malicious overdraft telephone expenses.When the user received short message, the transmission number of its demonstration was common phone number.The junk short message that the method sends has that number is many, speed soon, does not need characteristics such as operator's permission.In addition, during mass-sending, the junk short message flow is huge, certainly will take more Radio Resource, and for guaranteeing throughput, the junk short message sender can select a plurality of parallel transmissions of transmission point that are positioned at different base station usually.
Along with public's medium and the public opinion attention rate to junk short message constantly improves, mobile operator has strengthened utilizing short messaging gateway to send the renovation dynamics of junk short message, some simple, effective measures have been implemented, as strengthening contents supervision to the short message transmit port, in content of short message, add company's actual signature, improve and to utilize the port rate that send SMS message, close etc. complaining bigger port.
After above-mentioned measure was implemented, the phenomenon that sends junk short message by short messaging gateway obviously reduced.But still there are not effective filtration means at present for the phenomenon that the lawless person utilizes the mass-sending device to send junk short message.
Utilize the mass-sending device to send the means of junk short message at the lawless person, the present implementation method of operator mainly contains following two kinds:
1, the keyword coupling is filtered
After in a single day the attendant of short message service center receives user's junk short message complaint, just take out the related keyword in this junk short message, it is joined in the keyword filtration tabulation of short message service center, as long as short message service center receives the short message that comprises this keyword later on, to be tackled and be filtered this short message, be forbidden issuing of it.The advantage of this method is that system realizes simple.Shortcoming is to be easy to cause erroneous judgement, causes normal user's short message to be blocked and to filter, and causes user's complaint.Simultaneously, the junk short message sender is easy to walk around filtration by adding means such as separator, use homophone between change keyword, keyword.
2, send SMS message in the unit interval method of quantity of monitoring jack per line
Carry out the mass-sending of junk short message because the junk short message sender utilizes computer to connect mobile module, so the quantity that the quantity that sends SMS message in the unit interval of jack per line can send SMS message than the mobile phone of normal users is big.Therefore, the attendant of short message service center can set the short message quantity forwarded in the unit interval of jack per line, normally be made as and per hour be no more than 300, in case the quantity forwarded of short message surpasses this threshold value in the jack per line one hour, short message service center just adds blacklist with this number, and the number that adds blacklist no longer can send SMS message (comprising normal short message).Usually in order to prevent user's complaint, the number in the blacklist has ageing, after after a while, can remove this number from blacklist, recovers its normal sending function of short message.The advantage of this method is that system realizes easily, but two shortcomings are arranged: (1) jack per line several threshold value that sends SMS message in the unit interval is difficult to define, if establish too big, the effect that does not reach interception and filter; If too little, filter (along with popularizing of smart mobile phone, some mobile phones can support short message to mass-send in batches) for interception easily again the normal short message of normal users; (2) threshold parameter is easy to be tested out by the junk short message sender, in case after finding, they just can escape monitored by regulating the speed and interception.
Summary of the invention
In order to solve above-mentioned technical problem, the invention provides a kind of rubbish short message recognition system and method based on calling number location and transmission content, its purpose is, improves the discrimination of junk short message, filters the junk short message that utilizes the mass-sending device to send in real time.
The invention provides junk short message recognition methods, comprising based on calling number location and transmission content:
Step 1 judges whether the quantity of the short message with identical content that has sent reaches first threshold, if, execution in step 2;
Step 2, the positional information occurrence number of calling number that follow-up transmission is had the short message of described identical content is added up: reach second threshold value if having the positional information occurrence number sum of follow-up all calling numbers of the short message of described identical content, reach the 3rd threshold value if perhaps have any one positional information occurrence number of the short message of described identical content, the short message of then judging described identical content is a junk short message;
Step 3 is sent to short message service center with the calling number of junk short message, is used for filtering junk short message for short message service center.
Step 1 comprises:
Step 21 is calculated hashed value according to content of short message;
Step 22, the quantity of the short message that the hashed value that calculating has sent is identical, and judge whether this quantity reaches first threshold, if, execution in step 2.
In the step 21, only the length of content of short message is calculated the hashed value of its content of short message greater than the short message of preset value.
In the step 22, also that hashed value is identical short message is classified as a short message class, and the short message class that number of short surpasses first threshold is labeled as suspicious short message class.
In the step 3, short message service center also adds short message taboo blackout list with the calling number of junk short message.
Also comprise step 20 before the step 21: hash table is set, be used for according to short message class and the suspicious short message class of mark under the hashed value record short message, and write down the positional information occurrence number of the calling number of the short message that follow-up transmission belongs to suspicious short message class.
The positional information of described calling number is the on-site latitude and longitude information of calling number.
Step 2 comprises:
Step 61 receives the short message of follow-up transmission;
Step 62 is obtained the on-site latitude and longitude information of calling number that sends the short message that belongs to suspicious short message class by locating platform, and writes down the occurrence number of this latitude and longitude information in hash table;
Step 63, if the occurrence number sum of all latitude and longitude information reaches second threshold value, perhaps the occurrence number of any one latitude and longitude information reaches the 3rd threshold value, judges that then the short message that belongs to this suspicious short message class is a junk short message.
Also comprise step 4, regularly remove the non-suspicious short message class in the hash table.
The invention provides rubbish short message recognition system, comprising based on calling number location and transmission content:
Short message cluster module is used to judge whether the quantity of the short message with identical content that has sent reaches first threshold;
The junk short message identification module, be used for when the quantity of the short message with identical content that has sent reaches first threshold, the positional information occurrence number of calling number that follow-up transmission is had the short message of described identical content is added up: reach second threshold value if having the positional information occurrence number sum of all calling numbers of the short message of described identical content, reach the 3rd threshold value if perhaps have any one positional information occurrence number of the short message of described identical content, the short message of then judging described identical content is a junk short message; Also be used for the calling number of junk short message is sent to the calling number sending module;
The calling number sending module is used for the calling number of junk short message is sent to short message service center, is used for filtering junk short message for short message service center.
Short message cluster module also is used for calculating hashed value according to content of short message, the quantity of the short message that the hashed value that calculating has sent is identical, and judge whether this quantity reaches first threshold.
Short message cluster module is only calculated hashed value to the length of content of short message greater than the content of short message of preset value.
Short message cluster module also is used for the short message that hashed value is identical and is classified as a short message class, and the short message class that the quantity of short message surpasses first threshold is labeled as suspicious short message class.
Short message cluster module also is used to be provided with hash table, with the short message class under the foundation hashed value record short message, and writes down the positional information occurrence number of the calling number of the short message that follow-up transmission belongs to suspicious short message class.
The positional information of described calling number is the on-site latitude and longitude information of calling number.
The junk short message identification module also is used to utilize locating platform to obtain the on-site latitude and longitude information of calling number that sends the short message that belongs to suspicious short message class, and writes down the occurrence number of this latitude and longitude information in hash table; If the occurrence number sum of all latitude and longitude information reaches second threshold value, perhaps the occurrence number of any one latitude and longitude information reaches the 3rd threshold value, judges that then the short message that belongs to this suspicious short message class is a junk short message.
Also comprise administration module, be used for regularly removing the non-suspicious short message class of hash table.
The invention provides a kind of mobile network, comprise short message service center and locating platform, also comprise above-mentioned rubbish short message recognition system based on calling number location and transmission content; Rubbish short message recognition system is connected with locating platform with short message service center respectively; Rubbish short message recognition system obtains the positional information of calling number by locating platform.
The present invention can guarantee that a large amount of short messages that short message service center receives are filtered real-time and efficiently, classify and handle, and realizes the real-time blocking to junk short message.The present invention is at first according to a large amount of features that repeat of mass-sending junk short message, designs the effective hashing algorithm content that saves short message, and on this basis the short message flow carried out the poly-classification of content, makes the ONLINE RECOGNITION junk short message become possibility.The present invention further uses the geographical location information of calling number, thereby effectively the junk short message that device produces is mass-sended in identification, and the short message that involutory certain body and function family sends in batches can not produce wrong report.
Description of drawings
Fig. 1 is a rubbish short message recognition system structure chart provided by the invention;
Fig. 2 is junk short message identification process figure provided by the invention;
Fig. 3 obtains the positional information schematic diagram of calling number for using locating platform;
Fig. 4 is mobile network's schematic diagram that rubbish short message recognition system is installed.
Embodiment
Through a large amount of junk short message are carried out statistical analysis, find that the junk short message that uses the mass-sending device to send has following two outstanding features: the one, the junk short message content repeats in a large number, and the 2nd, send these message calling numbers and often be positioned at some or several fixing positions and send sum bigger.And the short message that portable terminal sends can not have above-mentioned feature simultaneously.
Based on above-mentioned conclusion, the present invention proposes a kind of junk short message recognition methods: at first use effective hashing algorithm, content of short message is converted into the hashed value that is easy to comparison and maintenance based on calling number location and transmission content; Secondly, according to the comparative result between hashed value a large amount of short messages that repeat of content being gathered is a class; Once more, if the short message quantity forwarded surpasses prior preset threshold f in certain short message class 0, then the calling number location information and the occurrence number of the identical short message of follow-up transmission are added up; If the positional information occurrence number sum of follow-up all calling numbers is greater than pre-set threshold f 1Or some positional information occurrence numbers are greater than pre-set threshold f 2, then all short messages are junk short message in this short message class.
Rubbish short message recognition system of the present invention (abbreviation recognition system) mainly is divided into four parts, as shown in Figure 1: short message cluster module 201, junk short message identification module 202, calling number sending module 203 and administration module 204.Short message cluster module 201 real time scan short message flows, the short message that content is repeated gathers into a class, and adds up all kinds of middle number of short, if number of short surpasses setting threshold f in certain class 0(f 0Be natural number), then this short message class is labeled as suspicious short message class, number of short does not reach threshold value f 0The short message class be non-suspicious short message class; The calling number location information of 202 pairs of follow-up short messages of suspicious short message class of junk short message identification module is added up, if the identical short message of content has identical geographical position and this geographical position occurrence number reaches f 2(f 2Be natural number) or the geographical position occurrence number of the identical short message of all the elements reach f 1(f 1Be natural number), then this short message class is the junk short message class, and the calling number of junk short message is sent to calling number sending module 203.Calling number sending module 203 is sent to short message service center with the calling number of current short message correspondence, and short message service center adds short message with this number and prohibits the blackout list, forbids that it further sends junk short message; Administration module 204 will regularly be deleted the short message class in the hash table, to guarantee the availability of internal memory.Usually, administration module 204 is in idle state; Every one-period t, administration module 204 is removed non-suspicious short message class in the hash table automatically according to the short-and-medium classes of messages attribute of hash table in addition.
Below content of short message being repeated identification problem is described: regard the body part (being designated hereinafter simply as short message) of an envelope short message as byte sequence M=b that length is x 1b 2B x. as an aspect of research short message cluster character, determine given k envelope short message, whether its content exists repetition.
Therefore, a kind of feasible method be successively relatively in the short message each byte sequence whether identical, be to improve relative efficiency, preserve the content of short message of visiting with data structure T.Run into the new short message of an envelope, at first with T in element relatively, if not therein, then it is added among the T, and the number of times that short message occurs is counted 1, otherwise the number of times that directly this short message among the T is occurred adds one.
A kind of concrete implementation method is that T is organized into a chained list, and the order according to short message arrives writes chained list successively with content of short message.For the short message that newly arrives, at first all short messages in the inquiry linked list if this short message occurs for the first time, then are added in the chained list afterbody with current short message, and this short message occurrence number is designated as 1; Otherwise the occurrence number that has had short message in the renewal chained list.Repeat this process.
For guaranteeing to finish operation and minimizing memory costs such as retrieval, comparison, statistics fast, guarantee the availability of algorithm, another kind of implementation method is that T is organized into a hash table.
Ashing technique has two kinds usually, and a kind of is that whole content of short message is done hash, and an envelope content of short message correspondence a hashed value, and this method is effective to the short hash object of length; Another kind method is that several byte subsequences of content of short message are cooked hash, the set that an envelope short message correspondence a hashed value, and this method is more effective to the bigger hash object of length.Consider content of short message length less (maximum length is 140 bytes), for guaranteeing readability, content of short message can change at random in once sending, and therefore selects first kind of ashing technique in the present invention for use.The codomain that will guarantee hashed value simultaneously is enough big, can the original short message of unique representative.That is, if two hashed values do not wait, then their the representative original short message difference; If two hashed values are identical, then the different probability of the original short message of their representatives is minimum.
In the present invention, use hashing algorithm to be the MD5 algorithm, hash to as if whole content of short message M, that preserve in the hash table is corresponding hashed value h iWherein: h i=MD5 (M).By the length of rubbish and non-junk short message is added up, find the general length of junk short message greater than 30 bytes, therefore in the present invention, only length is carried out the hash computing greater than the short message of 30 bytes; Length is not done any operation less than 30 short message.
Each list item all comprises basic list item and expansion list item in the hash table, and corresponding short message class.In the list item of basis three fields are arranged, first field record is included into the sum of short message in this short message class.The hashed value of second field record content of short message correspondence.The 3rd field record short message generic attribute is if be suspicious short message class then this field value is 1, if for the junk short message class then this field value is 2, if for non-suspicious short message class then this field value is 0.
The expansion list item is organized into a chained list, and each unit is h by sending hashed value in the chained list iThe on-site latitude and longitude information of calling number of short message and the occurrence number of this information form.
201 pairs of content of short message of receiving of short message cluster module carry out the hash of MD5 and calculate, and check hash table, if during hashed value Already in shows, then increase number of short; Otherwise a newly-built short message class in hash table, and be provided with that number of short is 1 in the class.Number of short reaches pre-set threshold f in such 0, then this short message class is labeled as suspicious short message class.In order to raise the efficiency, short message cluster module 201 also can be checked the length of the content of short message that receives earlier, if less than 30 bytes, does not then do any operation, otherwise content of short message is carried out the hash calculating of MD5, carries out respective handling then.
Among the present invention, hash table is left in the short message cluster module 201, all the other modules by with the interface accessing hash table of short message cluster module 201; Certainly hash table also can independently exist, and each module is independently communicated by letter with it in the invention, with the data in visit or the modification hash table.
In mobile communication system, mobile subscriber position all the time all may be indefinite, and the mobile network will provide professional at any time for each user, just requires to know at any time the position at mobile subscriber place, as information such as on-site LAC of user and Cell ID.Wherein LAC (Location Area Code) is a band of position number, is one 2 byte BCD coding; Cell ID is a cell identification number, is representing a sub-district in the LAC.When each mobile subscriber shifts one's position, all can initiatively get in touch, during as user's spanning position district, can report that VLR can preserve current up-to-date LAC of user and Cell ID to MSC/VLR by BSC with network.When the user crossed over the MSC service area border, VLR can report the position of user place VLR to HLR, also is the positional information that HLR always preserves the VLR at all user places.In mobile radio communication, the user can provide positioning service to obtain the positional information of certain calling number by existing locating platform.The operation principle of locating platform is as follows: the query interface input calling number to be looked into that the user provides by platform, platform communicates with corresponding HLR, MSC/VLR according to dialing number information, thereby obtain the radio environment information of this calling number correspondence,, and convert these parameters to calling number on-site latitude and longitude information and return to the user or/and Cell ID equivalence as LAC.
The calling number location information of 202 pairs of follow-up short messages of suspicious class of junk short message identification module is added up, if the positional information occurrence number sum of follow-up all calling numbers is greater than pre-set threshold f 1Or some positional information occurrence numbers are greater than pre-set threshold f 2(f 2Be natural number), then this short message class is the junk short message class.
If current short message is divided into suspicious short message class, junk short message identification module 202 at first utilizes the positional information of the real-time inquiring calling number of locating platform.After locating platform is received query requests, by communicating with HLR, MSC/VLR, obtain the on-site radio environment information of calling number, as LAC or/and Cell ID equivalence, and these parameters are converted into the on-site latitude and longitude information of calling number, offer junk short message identification module 202.If the inquiry failure, then junk short message identification module 202 finishes current short message handling process.Fig. 3 obtains the positional information schematic diagram of calling number for using locating platform.
Junk short message identification module 202 obtains the positional information of this calling number, (is h with this hashed value i) corresponding position information is kept in the expansion list item of hash table, describes the positional information of the calling number of follow-up short message in the suspicious short message class among the present invention with V, wherein V i=[L 1L m], m≤k.
If V iIn the positional information occurrence number sum of all calling numbers greater than pre-set threshold f 1Or certain positional information occurrence number is greater than pre-set threshold f 2, then should suspicious class be labeled as the junk short message class, and the calling number of this short message was submitted to calling number sending module 203.
Calling number sending module 203 is sent to short message service center with the calling number of junk short message, is used for filtering junk short message for short message service center.
Above-mentioned parameter f 0Value is 50, parameter f 1Value is 800, parameter f 2Value is 500, and the t value is 2 hours.
Method among the present invention comprises the steps: as shown in Figure 2
Step 301, initialization makes up the hash table of storage hashed value, receives a new short message.
Step 302 is calculated the hashed value of received new short message.
Step 303 judges whether hashed value is present in the hash table, if, execution in step 304, otherwise execution in step 311;
Step 304 is revised hash table, and then the number of times that hashed value is occurred increases by 1;
Whether step 305 judges the hashed value occurrence number greater than f0, if execution in step 306, otherwise execution in step 312;
Step 306 is by the positional information of the real-time inquiring calling number of locating platform;
Step 307 judges whether this inquiry is successful, if execution in step 308, otherwise execution in step 312;
Step 308 is obtained the on-site latitude and longitude information of calling number, if this latitude and longitude information occurs for the first time, then latitude and longitude information is write in the pairing list item of this hashed value, and its occurrence number is designated as 1; Otherwise its occurrence number increases by 1;
Step 309, judge among the Vi all latitude and longitude information occurrence number sums whether greater than pre-set threshold f1 or certain latitude and longitude information occurrence number whether greater than pre-set threshold f2; If at least one establishment of above-mentioned condition, execution in step 310, otherwise execution in step 312;
Step 310 adds blacklist, execution in step 312 with the calling number that sends this short message;
Step 311 adds hash table with hashed value, and the number of times that hashed value is occurred is designated as 1, and then execution in step 312;
Step 312 receives next envelope short message, and handles according to above-mentioned flow process.
Fig. 4 describes network configuration of the present invention in detail, sends a side shifting terminal and mass-sending instrument and exists simultaneously, enters network by Access Network, transmits by short message service center, arrives at last through the MSC routing and receives a side.Rubbish short message recognition system among the present invention is connected with short message service center, locating platform.Rubbish short message recognition system can obtain the mirror image of short message flow in the short message service center from short message service center, does not influence short message service center's normal handling work; Rubbish short message recognition system can be made the calling number of junk short message correspondence blacklist and pass to short message service center simultaneously, carries out real time filtering.Rubbish short message recognition system can obtain the positional information of calling number in real time by locating platform.Rubbish short message recognition system is handled the mirror image data of short message service center's shunting, and result is write daily record.
In addition, the short message filtering scheme has the good real-time performance energy, in case after finding junk short message, the calling number of this short message correspondence can be made blacklist, passes to short message service center in real time, in time the junk short message of the follow-up transmission of interception mass-sending device.In addition, any calling number of carrying out cluster sending business through operator permission can be arranged in the white list tabulation of short message service center, and the priority of this white list is higher than blacklist, so the present invention can not exert an influence to the cluster sending business of legal calling number.
Those skilled in the art can also carry out various modifications to above content under the condition that does not break away from the definite the spirit and scope of the present invention of claims.Therefore scope of the present invention is not limited in above explanation, but determine by the scope of claims.

Claims (18)

1, based on the junk short message recognition methods of calling number location and transmission content, it is characterized in that, comprising:
Step 1 judges whether the quantity of the short message with identical content that has sent reaches first threshold, if, execution in step 2;
Step 2, the positional information occurrence number of calling number that follow-up transmission is had the short message of described identical content is added up: reach second threshold value if having the positional information occurrence number sum of follow-up all calling numbers of the short message of described identical content, reach the 3rd threshold value if perhaps have any one positional information occurrence number of the short message of described identical content, the short message of then judging described identical content is a junk short message;
Step 3 is sent to short message service center with the calling number of junk short message, is used for filtering junk short message for short message service center.
2, the junk short message recognition methods based on calling number location and transmission content as claimed in claim 1 is characterized in that step 1 comprises:
Step 21 is calculated hashed value according to content of short message;
Step 22, the quantity of the short message that the hashed value that calculating has sent is identical, and judge whether this quantity reaches first threshold, if, execution in step 2.
3, the junk short message recognition methods based on calling number location and transmission content as claimed in claim 2 is characterized in that, in the step 21, only the length of content of short message is calculated the hashed value of its content of short message greater than the short message of preset value.
4, the junk short message recognition methods based on calling number location and transmission content as claimed in claim 2, it is characterized in that, in the step 22, also that hashed value is identical short message is classified as a short message class, and the short message class that number of short surpasses first threshold is labeled as suspicious short message class.
As claim 2,3 or 4 described junk short message recognition methodss, it is characterized in that 5, in the step 3, short message service center also adds short message taboo blackout list with the calling number of junk short message based on calling number location and transmission content.
6, the junk short message recognition methods based on calling number location and transmission content as claimed in claim 5, it is characterized in that, also comprise step 20 before the step 21: hash table is set, be used for according to short message class and the suspicious short message class of mark under the hashed value record short message, and write down the positional information occurrence number of the calling number of the short message that follow-up transmission belongs to suspicious short message class.
7, the junk short message recognition methods based on calling number location and transmission content as claimed in claim 5 is characterized in that the positional information of described calling number is the on-site latitude and longitude information of calling number.
8, the junk short message recognition methods based on calling number location and transmission content as claimed in claim 7 is characterized in that step 2 comprises:
Step 61 receives the short message of follow-up transmission;
Step 62 is obtained the on-site latitude and longitude information of calling number that sends the short message that belongs to suspicious short message class by locating platform, and writes down the occurrence number of this latitude and longitude information in hash table;
Step 63, if the occurrence number sum of all latitude and longitude information reaches second threshold value, perhaps the occurrence number of any one latitude and longitude information reaches the 3rd threshold value, judges that then the short message that belongs to this suspicious short message class is a junk short message.
9, as claim 6,7 or 8 described junk short message recognition methodss, it is characterized in that, also comprise step 4, regularly remove the non-suspicious short message class in the hash table based on calling number location and transmission content.
10, based on the rubbish short message recognition system of calling number location and transmission content, it is characterized in that, comprising:
Short message cluster module is used to judge whether the quantity of the short message with identical content that has sent reaches first threshold;
The junk short message identification module, be used for when the quantity of the short message with identical content that has sent reaches first threshold, the positional information occurrence number of calling number that follow-up transmission is had the short message of described identical content is added up: reach second threshold value if having the positional information occurrence number sum of all calling numbers of the short message of described identical content, reach the 3rd threshold value if perhaps have any one positional information occurrence number of the short message of described identical content, the short message of then judging described identical content is a junk short message; Also be used for the calling number of junk short message is sent to the calling number sending module;
The calling number sending module is used for the calling number of junk short message is sent to short message service center, is used for filtering junk short message for short message service center.
11, the rubbish short message recognition system based on calling number location and transmission content as claimed in claim 10, it is characterized in that, short message cluster module, also be used for calculating hashed value according to content of short message, the quantity of the short message that the hashed value that calculating has sent is identical, and judge whether this quantity reaches first threshold.
12, as claimed in claim 11 based on calling number location with send the rubbish short message recognition system of content, it is characterized in that short message cluster module is only calculated hashed value to the length of content of short message greater than the content of short message of preset value.
13, the rubbish short message recognition system based on calling number location and transmission content as claimed in claim 12, it is characterized in that, short message cluster module, also be used for the short message that hashed value is identical and be classified as a short message class, and the short message class that the quantity of short message surpasses first threshold is labeled as suspicious short message class.
14, as claim 10,11,12 or 13 described rubbish short message recognition systems based on calling number location and transmission content, it is characterized in that, short message cluster module, also be used to be provided with hash table, with the short message class under the foundation hashed value record short message, and write down the positional information occurrence number of the calling number of the short message that follow-up transmission belongs to suspicious short message class.
15, the rubbish short message recognition system based on calling number location and transmission content as claimed in claim 14 is characterized in that the positional information of described calling number is the on-site latitude and longitude information of calling number.
16, the rubbish short message recognition system based on calling number location and transmission content as claimed in claim 15, it is characterized in that, the junk short message identification module, also be used for obtaining the on-site latitude and longitude information of calling number that sends the short message that belongs to suspicious short message class, and in hash table, write down the occurrence number of this latitude and longitude information by locating platform; If the occurrence number sum of all latitude and longitude information reaches second threshold value, perhaps the occurrence number of any one latitude and longitude information reaches the 3rd threshold value, judges that then the short message that belongs to this suspicious short message class is a junk short message.
17, the rubbish short message recognition system based on calling number location and transmission content as claimed in claim 16 is characterized in that, also comprises administration module, is used for regularly removing the non-suspicious short message class of hash table.
18, a kind of mobile network comprises short message service center and locating platform, it is characterized in that, also comprises the rubbish short message recognition system based on calling number location and transmission content as claimed in claim 10; Rubbish short message recognition system is connected with locating platform with short message service center respectively; Rubbish short message recognition system obtains the positional information of calling number by locating platform.
CN200810116687XA 2008-07-15 2008-07-15 Rubbish short message recognition system and method based on calling number location and transmitted content Active CN101335920B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200810116687XA CN101335920B (en) 2008-07-15 2008-07-15 Rubbish short message recognition system and method based on calling number location and transmitted content

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200810116687XA CN101335920B (en) 2008-07-15 2008-07-15 Rubbish short message recognition system and method based on calling number location and transmitted content

Publications (2)

Publication Number Publication Date
CN101335920A true CN101335920A (en) 2008-12-31
CN101335920B CN101335920B (en) 2011-04-13

Family

ID=40198168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200810116687XA Active CN101335920B (en) 2008-07-15 2008-07-15 Rubbish short message recognition system and method based on calling number location and transmitted content

Country Status (1)

Country Link
CN (1) CN101335920B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101771966A (en) * 2010-03-11 2010-07-07 上海粱江通信系统股份有限公司 Keywords and frequency based method for identifying spam message sources
CN101938714A (en) * 2009-06-29 2011-01-05 国际商业机器公司 Method and equipment for detecting spam messages
CN101990172A (en) * 2009-07-30 2011-03-23 中国移动通信集团广东有限公司 Message discriminating method and device, message service processing method and system
CN102333291A (en) * 2011-06-23 2012-01-25 中兴通讯股份有限公司 SMS (short message service) processing method and device
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN101895828B (en) * 2009-05-20 2013-01-16 中兴通讯股份有限公司 Short message monitoring system and method
CN102905236A (en) * 2011-07-27 2013-01-30 华为技术有限公司 Method, device and system for monitoring spam short messages
CN103415004A (en) * 2013-07-26 2013-11-27 中国联合网络通信集团有限公司 Method and device for detecting junk short message
CN104703185A (en) * 2013-12-05 2015-06-10 中国联合网络通信集团有限公司 Information identification method, information identification system and mobile communication network
CN102111723B (en) * 2009-12-24 2015-07-01 上海粱江通信系统股份有限公司 Method for identifying spam short message user by analyzing short message frequency and content
CN104769590A (en) * 2012-11-02 2015-07-08 通用电气智能平台有限公司 Apparatus and method for intelligent querying and filtering
CN105592429A (en) * 2014-10-20 2016-05-18 中兴通讯股份有限公司 Short message filtering method and short message filtering device
CN103648165B (en) * 2013-12-30 2017-08-04 大唐移动通信设备有限公司 Paging control method and device under a kind of abnormal conditions
WO2017152765A1 (en) * 2016-03-10 2017-09-14 阿里巴巴集团控股有限公司 Automatic fusing-based message sending method, device and system
CN107241729A (en) * 2016-03-29 2017-10-10 努比亚技术有限公司 Pseudo-base station recognition methods and device
CN107509190A (en) * 2016-06-14 2017-12-22 中兴通讯股份有限公司 A kind of short message monitoring method, device and Surveillance center
CN110139280A (en) * 2019-07-02 2019-08-16 中国联合网络通信集团有限公司 Swindle detection method, device and the storage medium of number

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100571074C (en) * 2006-08-04 2009-12-16 华为技术有限公司 A kind of method and apparatus of message monitoring
CN101150762A (en) * 2007-11-06 2008-03-26 中国移动通信集团江苏有限公司 A spam real time interception method and system

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895828B (en) * 2009-05-20 2013-01-16 中兴通讯股份有限公司 Short message monitoring system and method
CN101938714A (en) * 2009-06-29 2011-01-05 国际商业机器公司 Method and equipment for detecting spam messages
US8539579B2 (en) 2009-06-29 2013-09-17 International Business Machines Corporation Detecting spam short messages based on sending characteristics
CN101990172A (en) * 2009-07-30 2011-03-23 中国移动通信集团广东有限公司 Message discriminating method and device, message service processing method and system
CN101990172B (en) * 2009-07-30 2013-05-29 中国移动通信集团广东有限公司 Message discriminating method and device, message service processing method and system
CN102111723B (en) * 2009-12-24 2015-07-01 上海粱江通信系统股份有限公司 Method for identifying spam short message user by analyzing short message frequency and content
CN101771966B (en) * 2010-03-11 2013-01-23 上海粱江通信系统股份有限公司 Keywords and frequency based method for identifying spam message sources
CN101771966A (en) * 2010-03-11 2010-07-07 上海粱江通信系统股份有限公司 Keywords and frequency based method for identifying spam message sources
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN102572747B (en) * 2010-12-28 2015-05-27 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN102333291A (en) * 2011-06-23 2012-01-25 中兴通讯股份有限公司 SMS (short message service) processing method and device
CN102905236A (en) * 2011-07-27 2013-01-30 华为技术有限公司 Method, device and system for monitoring spam short messages
CN104769590A (en) * 2012-11-02 2015-07-08 通用电气智能平台有限公司 Apparatus and method for intelligent querying and filtering
CN103415004A (en) * 2013-07-26 2013-11-27 中国联合网络通信集团有限公司 Method and device for detecting junk short message
CN104703185A (en) * 2013-12-05 2015-06-10 中国联合网络通信集团有限公司 Information identification method, information identification system and mobile communication network
CN103648165B (en) * 2013-12-30 2017-08-04 大唐移动通信设备有限公司 Paging control method and device under a kind of abnormal conditions
CN105592429A (en) * 2014-10-20 2016-05-18 中兴通讯股份有限公司 Short message filtering method and short message filtering device
WO2017152765A1 (en) * 2016-03-10 2017-09-14 阿里巴巴集团控股有限公司 Automatic fusing-based message sending method, device and system
CN107181664A (en) * 2016-03-10 2017-09-19 阿里巴巴集团控股有限公司 A kind of message method fused automatically, apparatus and system
TWI678086B (en) * 2016-03-10 2019-11-21 香港商阿里巴巴集團服務有限公司 Method, device and system for automatically melting message sending
CN107241729A (en) * 2016-03-29 2017-10-10 努比亚技术有限公司 Pseudo-base station recognition methods and device
CN107509190A (en) * 2016-06-14 2017-12-22 中兴通讯股份有限公司 A kind of short message monitoring method, device and Surveillance center
CN110139280A (en) * 2019-07-02 2019-08-16 中国联合网络通信集团有限公司 Swindle detection method, device and the storage medium of number

Also Published As

Publication number Publication date
CN101335920B (en) 2011-04-13

Similar Documents

Publication Publication Date Title
CN101335920B (en) Rubbish short message recognition system and method based on calling number location and transmitted content
CN101790142B (en) Method and system for identifying spam message sources by combining message contents and transmission frequency
CN102209326B (en) Malicious behavior detection method and system based on smartphone radio interface layer
CN103501374B (en) Telephone directory sequencing method and device, terminal
CN103607705B (en) Method for filtering spam short messages and engine
WO2016065908A1 (en) Method, device and system for detecting fraudulent user
CN101938565A (en) Short message processing method and mobile terminal
CN104867011A (en) Method and device for carrying out safety control on mobile payment
CN100589606C (en) A kind of SMS query analysis system and method
CN101389085B (en) Rubbish short message recognition system and method based on sending behavior
CN103763690A (en) Method and device for sending short messages to mobile terminal from detection fake base station
CN102982626B (en) A kind of method of POS terminal transfer alarm and device
CN101860822A (en) Method and system for monitoring spam messages
WO2010031294A1 (en) De-massing method of position advertising service based on regional strategy and system thereof
CN103874058A (en) Short message processing method and short message center
CN102801866B (en) Group-texting method of mobile terminal
CN103415004A (en) Method and device for detecting junk short message
CN102480705B (en) A kind of method and system according to number graph of a relation filtrating rubbish short message
CN102098640B (en) Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam
CN103796184A (en) Spam short message recognition method and system
CN108848278A (en) No.1 multiple terminals service security monitoring method, device and equipment
CN109104429B (en) Detection method for phishing information
AU2010209629A1 (en) Method and arrangement for gathering data from a communication network
CN105307134A (en) Short message monitoring method and device
CN103679934A (en) Method and device for processing bank card information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant