CN104038491A - Information interception method, device and system - Google Patents

Information interception method, device and system Download PDF

Info

Publication number
CN104038491A
CN104038491A CN201410253612.1A CN201410253612A CN104038491A CN 104038491 A CN104038491 A CN 104038491A CN 201410253612 A CN201410253612 A CN 201410253612A CN 104038491 A CN104038491 A CN 104038491A
Authority
CN
China
Prior art keywords
information
ciphertext data
identification
content
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410253612.1A
Other languages
Chinese (zh)
Other versions
CN104038491B (en
Inventor
王春雷
傅盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Conew Network Technology Beijing Co Ltd
Original Assignee
Conew Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Conew Network Technology Beijing Co Ltd filed Critical Conew Network Technology Beijing Co Ltd
Priority to CN201410253612.1A priority Critical patent/CN104038491B/en
Publication of CN104038491A publication Critical patent/CN104038491A/en
Application granted granted Critical
Publication of CN104038491B publication Critical patent/CN104038491B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention discloses an information interception method. The information interception method includes receiving content ciphertext data and identification ciphertext data sent by a client; detecting whether information indicated by the content ciphertext data is harassing information or not if the combination number of the received content ciphertext data and the identification ciphertext data is detected to reach a preset threshold value; if so, indicating the client to intercept the information. The embodiment of the invention also discloses a detecting terminal, a client and an information interception system. The information interception method, the detecting end, the client and the information interception system can effectively and timely intercept spam messages of mass texting and are simple in the method.

Description

Information interception method, device and system
Technical Field
The present invention relates to the field of information technologies, and in particular, to an information interception method, apparatus, and system.
Background
With the rapid development of mobile communication services, mobile phones have become an indispensable communication tool in people's daily life. Short messages have been widely used as one of the key information transmission modes between mobile terminals such as mobile phones, and bring great convenience to people. However, under the attraction of a large number of users using short messages, some lawless persons are tempted to earn benefits through a large number of spam short messages such as advertisement short messages and fraud short messages, and great harassment is caused to the users.
At present, some spam messages can be intercepted by an intercepting client on a mobile phone. When the client detects the spam messages, the spam messages are detected through a preset local rule, and the messages meeting the rule are intercepted. However, the method only performs rule judgment locally, has strong limitation, and is easy for lawless persons to avoid the keyword matching detection rule, for example, special symbols are added among keywords or homophones are used for substitution, and the like. Moreover, most spam messages are sent in a group by a short message group sender, and if the interception rule is modified and pushed to the local after a large number of users report, the spam messages sent in the group can be sent already, so that the spam messages cannot be intercepted effectively in time.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide an information intercepting method, apparatus and system, which can effectively intercept group-sending harassment information.
In order to solve the above technical problem, an embodiment of the present invention provides an information intercepting method, including:
receiving content ciphertext data and identification ciphertext data thereof, wherein the content ciphertext data is obtained by encrypting information content of received information by a client through a preset encryption algorithm, the identification ciphertext data is obtained by encrypting a user identification of the information by the client through the encryption algorithm, and the information comprises the information content and the user identification;
if the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, detecting whether the information is harassment information;
and if so, indicating the client to intercept the information.
Correspondingly, the embodiment of the invention also provides an information interception method, which comprises the following steps:
if information is received, content ciphertext data and identification ciphertext data corresponding to the information are obtained, wherein the information comprises information content and a user identification, the content ciphertext data is ciphertext data obtained by encrypting the information content through a first encryption algorithm, and the identification ciphertext data is ciphertext data obtained by encrypting the user identification through the first encryption algorithm;
sending the content ciphertext data and the identification ciphertext data thereof to a detection end so as to enable the detection end to detect whether the information is harassment information;
and if an interception instruction issued by the detection end when the detection end detects that the information is harassment information is received, intercepting the information and sending a message prompt.
Correspondingly, the embodiment of the invention also provides a detection end, which comprises:
the system comprises a receiving module and a sending module, wherein the receiving module is used for receiving content ciphertext data and identification ciphertext data thereof, the content ciphertext data is obtained by encrypting information content of received information through a preset encryption algorithm by a client, the identification ciphertext data is obtained by encrypting a user identification of the information through the encryption algorithm by the client, and the information comprises the information content and the user identification;
the detection module is used for detecting whether the information is harassment information or not if the received combination times of the content ciphertext data and the identification ciphertext data thereof reach a preset number threshold;
and the indicating module is used for indicating the client to intercept the information when the detecting module detects that the information is harassment information.
Correspondingly, an embodiment of the present invention further provides a client, including:
the device comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring content ciphertext data and identification ciphertext data corresponding to information if the information is received, the information comprises information content and user identification, the content ciphertext data is ciphertext data obtained by encrypting the information content through a first encryption algorithm, and the identification ciphertext data is ciphertext data obtained by encrypting the user identification through the first encryption algorithm;
the first sending module is used for sending the content ciphertext data and the identification ciphertext data thereof acquired by the first acquiring module to a detecting end so as to enable the detecting end to detect whether the information is harassment information;
and the interception module is used for intercepting the information and sending a message prompt if an interception instruction sent by the detection end when the information is detected to be harassment information is received.
Correspondingly, an embodiment of the present invention further provides an information interception system, including: the system comprises a detection end and at least one client end; wherein,
the client is used for acquiring content information abstract algorithm ciphertext data and identification ciphertext data corresponding to the information if the information is received; sending the content ciphertext data and the identification ciphertext data thereof to the detection end so as to enable the detection end to detect whether the information is harassment information;
the detection terminal is used for receiving the content ciphertext data and the identification ciphertext data thereof sent by the client; if the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, detecting whether the information indicated by the content ciphertext data is harassment information; if yes, the client is instructed to intercept the information;
the client is also used for intercepting the information and sending a message prompt if an interception instruction sent by the detection end when the information is detected to be harassment information is received.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention can respectively obtain the content ciphertext data and the identification ciphertext data corresponding to the receiving information through the client, the detection terminal carries out statistical analysis on the information content and the identification ciphertext data, when the combination times of the content and the identification ciphertext data reach the set threshold value and the receiving information is judged to be harassment information, the client is indicated to intercept, thereby effectively and timely intercepting the mass-sending spam messages, and the method is simple.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information interception method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another information interception method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of another information intercepting method according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of another information intercepting method according to an embodiment of the present invention;
fig. 5 is an interaction diagram of an information interception method according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a detecting end according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of another detecting end provided in the embodiment of the present invention;
fig. 8 is a schematic structural diagram of a client according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of another client according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an information interception system according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a schematic flow chart of an information interception method according to an embodiment of the present invention is shown, where the method according to the embodiment of the present invention is specifically applicable to a detection end, such as a cloud server, that is capable of detecting and storing information data, and specifically, the method includes:
s101: and receiving content ciphertext data and identification ciphertext data thereof sent by the client.
In a specific embodiment, the content ciphertext data and the identifier ciphertext data are obtained by the client encrypting information content and a user identifier of received information respectively through a preset encryption algorithm, and the information includes the information content and the user identifier. Specifically, the received information may be a short message, a mail, or the like.
Alternatively, the predetermined encryption Algorithm may refer to an encryption Algorithm that generates a uniquely determined value after encrypting the same plaintext data, such as MD5(Message Digest Algorithm5, fifth version of the Message Digest Algorithm), SHA (Secure Hash Algorithm), and so on.
S102: and if the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, detecting whether the information indicated by the content ciphertext data is harassment information.
In a specific embodiment, a detection end, such as a cloud end server, receives ciphertext data sent by a client, including content ciphertext data and corresponding identification ciphertext data, counts the number of times of combination of the content ciphertext data and the identification ciphertext data, and if the number of times of combination of the content ciphertext data and the identification ciphertext data reaches a preset number threshold, such as 10 times, can trigger detection of whether information corresponding to the content ciphertext data is harassment information. Specifically, whether the information is harassment information or not can be detected by acquiring specific information content and user identification.
S103: and if so, indicating the client to intercept the information.
And judging whether the short message is a harassing short message or not according to the specific content of the message and the user identification, such as the content of the short message and the telephone number of the short message. If the judgment result is yes, when other clients receive the same information, the client is indicated to intercept the information, and a message is sent to inform the user.
By implementing the embodiment of the invention, the content ciphertext data and the identification ciphertext data corresponding to the received information can be respectively obtained by the client, the detection end carries out statistical analysis on the ciphertext data of the information content and the identification, the client is indicated to intercept when the combination times of the ciphertext data of the content and the identification reach the set threshold value and the received information is judged to be harassment information, so that the mass-sending spam short messages can be effectively and timely intercepted, and the method is simple.
Referring to fig. 2, a schematic flow chart of another information intercepting method according to an embodiment of the present invention is shown, specifically, the method includes:
s201: and receiving content ciphertext data and identification ciphertext data thereof sent by the client.
S202: and detecting whether the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold value.
In a specific embodiment, the content ciphertext data and the identifier ciphertext data are ciphertext data obtained by encrypting information when the client receives the information, for example, content MD5 data obtained by processing the information content of the information through an information digest algorithm MD5, and identifier MD5 data obtained by encrypting a user identifier of the information. The detecting end, such as the cloud end, receives the content MD5 and the identifier MD5 sent by the client, and triggers to detect whether the information received by the client is harassment information or not when the content MD5 and the identifier MD5 reach a preset number threshold, for example, 10 times.
S203: and inquiring whether data matched with the identification ciphertext data exists in the ciphertext data stored at the local end.
In a specific embodiment, the cloud may preset an information interception blacklist, where the blacklist records identification data carrying prohibition indications, that is, identification data such as an identification MD5 that has sent harassment information once.
Optionally, the querying whether data matched with the identification ciphertext data exists in the ciphertext data stored at the local end may be triggering, when the content ciphertext data and the identification ciphertext data reach a preset number threshold value, querying whether the received identification ciphertext data is matched with any identification data recorded in the blacklist, that is, whether the identification MD5 exists in the preset blacklist, and if the identification MD5 is recorded in the blacklist, determining that the information is harassment information, and executing S206, directly instructing the client to intercept the information, and further, directly instructing the client to intercept the information when a subsequent other client receives the same information and requests a cloud.
Further optionally, the cloud may further preset an information interception white list, where the white list may record a preset type of identification data, such as an identification MD5 corresponding to each operator or subscription information. Whether data matched with the identification ciphertext data exists in the ciphertext data stored in the local end or not can be judged by triggering to judge whether the received identification ciphertext data is matched with any identification data recorded in the white list or not when the content ciphertext data and the identification ciphertext data which are obtained through cloud statistics reach a preset number threshold, and when the inquiry result is yes, namely the received identification MD5 is recorded in the white list, the information can be determined not to be harassment information, and the cloud end does not perform any processing.
Further, if it is found that there is no data matching the identification ciphertext data in the ciphertext data stored at the local end, that is, the received identification MD5 does not exist in the blacklist and the whitelist, S204 may be executed to obtain the specific content of the information and the user identification thereof.
S204: and sending an information content request to the client to acquire the information content corresponding to the content ciphertext data and the user identification corresponding to the identification ciphertext data.
S205: and receiving the information content and the user identification returned by the client in response to the information content request, and detecting whether the information indicated by the content ciphertext data is harassment information.
S206: and if so, indicating the client to intercept the information.
Specifically, if the cloud does not record that there is data matching the identifier MD5, it may send a request to the next requesting client (i.e., the client sending the next content MD5 and identifier MD5 to the detection end) to obtain the specific content and user identifier of the information. For example, when the message is a short message, the specific content and the corresponding number of the short message are obtained, and whether the number can be listed in the blacklist is considered according to the content and the number type (for example, an operator may also send a short message in a group, such as a 10086 number segment, and the number is not listed in the blacklist).
Further, after the information indicated by the content ciphertext data is detected to be harassment information, the identification ciphertext data (such as the identification MD5) may also be stored. Specifically, the preset blacklist may be obtained, a prohibition instruction is generated according to the identifier MD5 corresponding to the harassment information, and the identifier MD5 carrying the prohibition instruction is entered into the blacklist, so that when it is detected that the obtained ciphertext data matches the stored identifier ciphertext data, the client is directly instructed to intercept the information indicated by the ciphertext data.
By implementing the embodiment of the invention, the detection end can perform statistical analysis on the acquired information content and the ciphertext data of the identification, and inquire whether the local end records the corresponding identification ciphertext data or not when detecting that the combination frequency of the content and the ciphertext data of the identification reaches the set threshold value, and if the content and the ciphertext data of the identification are recorded, the client can be directly caused to intercept the information. Furthermore, if the record does not exist, the specific content and the user identification of the information can be obtained, and when the information is detected to be harassing information based on the specific content and the identification type of the received information, the client is indicated to intercept, so that the mass-sending spam short messages can be effectively and timely intercepted, and the method is simple.
Fig. 3 is a schematic flow chart of another information intercepting method according to an embodiment of the present invention, where the method is specifically applicable to a terminal device such as a mobile phone and a tablet computer, and specifically the method includes:
s301: and if the information is received, acquiring content ciphertext data and identification ciphertext data corresponding to the information.
In an embodiment, the received information may refer to a short message, a mail, and the like, and includes information content and a user identifier. Specifically, if the received message is a short message, the message content may be a short message content, and the user identifier may be a phone number (a calling number, i.e., a number corresponding to the short message sender) corresponding to the short message; if the received information is a mail, the information content may be a mail body, and the user identifier may be a mailbox address (i.e., a mailbox address corresponding to a sender of the mail).
The content ciphertext data and the identification ciphertext data are respectively ciphertext data obtained by encrypting the information content and the user identification of the received information through a preset encryption algorithm by the client.
Alternatively, the predetermined encryption algorithm may refer to an encryption algorithm that generates a uniquely determined value after encrypting the same plaintext data, such as MD5, SHA, and the like.
S302: and sending the content ciphertext data and the identification ciphertext data to a detection end so that the detection end detects whether the information is harassment information.
S303: and if an interception instruction issued by the detection end when the detection end detects that the information is harassment information is received, intercepting the information and sending a message prompt.
In a specific embodiment, after receiving the information and sending the content ciphertext data corresponding to the information and the identification ciphertext data thereof to the detection end, the client can intercept the information and send a message prompt to remind a user of the intercepted message if receiving an interception instruction issued by the detection end. Specifically, the prompting mode of the message includes, but is not limited to, a message prompt in the form of text, voice or picture.
By implementing the embodiment of the invention, the content ciphertext data and the identification ciphertext data of the received information are sent to the detection end to enable the detection end to detect, and if the client receives the interception instruction sent by the detection end, the information is intercepted and the message prompt is sent, so that the group-sending spam short messages are effectively and timely intercepted, and the method is simple.
Referring to fig. 4, a schematic flow chart of another information intercepting method according to an embodiment of the present invention is shown, specifically, the method includes:
s401: and if the information is received, detecting whether the information is harassment information or not through a preset local rule.
In a specific embodiment, before acquiring content ciphertext data and identification ciphertext data corresponding to received information, a client may further perform local rule judgment, for example, detect whether the information is harassment information according to a preset keyword matching rule, where the keyword matching detection rule includes a preset keyword combination, and when it is detected that the information satisfies the preset rule, that is, the information includes the preset keyword combination, that is, the information is harassment information, then S406 is executed, and the information is directly intercepted; otherwise, S402 may be performed.
S402: and acquiring content ciphertext data and identification ciphertext data thereof corresponding to the information.
S403: and sending the content ciphertext data and the identification ciphertext data thereof to a detection end.
If the information is not judged to be harassing information locally, the content ciphertext data and the identification ciphertext data corresponding to the information can be acquired. For example, if the received message is a short message including a short message content and a number, the content ciphertext data may be content MD5 data obtained by encrypting the short message content through an information digest algorithm MD5, the identification ciphertext data may be identification MD5 data obtained by encrypting the number of the short message through MD5, and the content MD5 and the identification MD5 thereof are sent to a detection end, such as a cloud, so that the detection end detects whether the message is harassment.
S404: and if an information content request sent by the detection end is received, acquiring the information content corresponding to the content ciphertext data and the user identification corresponding to the identification ciphertext data.
S405: and encrypting the information content and the user identification through a preset encryption algorithm, and sending the encrypted information content and the encrypted user identification to the detection terminal so as to enable the detection terminal to determine whether the information is harassment information.
S406: and if the information is detected to be harassing information, intercepting the information and sending a message prompt.
Further, if an information content request sent by the cloud is received, the client can trigger to acquire the information content and the identification thereof, for example, when the received information is a short message, the client triggers to acquire the content and the number of the short message, encrypts the content and the number of the short message through a preset encryption algorithm such as an asymmetric encryption algorithm RSA and then sends the encrypted content and the number to the cloud, so that the cloud can perform further detection.
It should be noted that, if the information received by the client is a short message, before acquiring the specific content and number of the short message, the client needs to register with the system, for example, register as a short message broadcast receiver, to obtain the right to extract the short message and the number thereof.
The client can detect whether the information is harassing information or not through the local rules when receiving the information, further, the client can send the content ciphertext data of the received information and the identification ciphertext data thereof to the detection end when the information is not harassing information through local detection so as to enable the detection end to detect whether the information is harassing information or not, further, the client can send the specific content and the identification thereof to the detection end so as to enable the detection end to carry out further detection, and when receiving the interception instruction sent by the detection end, the client intercepts the information and prompts the user to intercept the intercepted information, so that the mass texting spam messages are effectively and timely intercepted, and the method is simple.
Referring to fig. 5, an interaction diagram of an information interception method according to an embodiment of the present invention is shown, specifically, the method includes:
s501, the first client receives the information and detects whether the information is harassment information or not through a preset keyword matching rule.
In a specific embodiment, when receiving information, a client may first perform local rule judgment, for example, detect whether the information is harassment information through a preset keyword matching rule, and when meeting the preset rule, may indicate that the information is harassment information, and may directly intercept the information.
S502: if not, acquiring content ciphertext data and identification ciphertext data corresponding to the information.
S503: and the first client sends the content ciphertext data and the identification ciphertext data to the detection end.
Specifically, for example, when the received message is a short message, the client may obtain ciphertext data corresponding to the content and the number of the short message, such as the content MD5 and the number MD5 obtained through MD5 processing, and send the content MD5 and the number MD5 to the detection.
It should be noted that the client in the embodiment of the present invention may be configured in a terminal device such as a mobile phone, a tablet computer, and a PC, and the detection terminal may be a cloud terminal.
S504: and if the detection end detects that the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, inquiring whether the local end records the identification ciphertext data.
S505: and if the record exists, the detection end analyzes the operation instruction corresponding to the record.
Optionally, if the cloud detects that the combination of the content MD5 and the number MD5 reaches a set threshold, for example, 10 times, and finds that the cloud has recorded the number MD5, the cloud parses the operation instruction corresponding to the record. If the number MD5 is recorded in the number blacklist set by the cloud, the client can be instructed to directly intercept the received short message.
Further optionally, if the cloud resolves that the number MD5 is recorded in a white list set by the cloud, it may be determined that the information is not harassment information, and the cloud does not perform any processing. The white list records preset types of identification data, such as an identification MD5 corresponding to each operator or subscription information, indicating that information corresponding to the identification data can pass through.
S506: and if the information is not recorded, the detection end sends a content request to the next second client end which receives the same information.
S507: the second client responds to the request and returns the content and the identification of the information.
If the cloud end does not record the number MD5, it may send a request to the client end of the next request to obtain the specific content and number of the received short message, where the content and number may be encrypted by a preset encryption method, such as by an asymmetric encryption algorithm RSA, and then uploaded to the cloud end.
S508: and the detection end detects whether the information is harassment information or not according to the content and the identification.
S509: and if the information is detected as harassment information, indicating the second client to intercept the information.
Specifically, the cloud may determine whether the received short message is a spam message according to the content and the number type of the short message, and instruct other clients receiving the same information to intercept the information when the received short message is a spam message, for example, when receiving that the number MD5 sent by the other clients is the same as the number MD5 corresponding to the spam message, the cloud instructs the other clients to intercept the information. Further, the cloud may also add the number MD5 to a set blacklist in combination with the number characteristics.
S510: intercept the information and send out message prompt.
If an interception instruction sent by the cloud is received, the received information can be intercepted, and the user is prompted to intercept the information. Specifically, the prompting mode of the message includes, but is not limited to, a message prompt in the form of text, voice or picture.
By implementing the embodiment of the invention, the client can detect whether the information is harassment information or not through the local rule when receiving the information, further, when the information is detected to be non-harassment information locally, the information such as content ciphertext data, identification ciphertext data and the like of the information can be sent to the detection end so that the detection end can detect whether the information is harassment information or not, and when the detection end judges that the information is harassment information, the client is indicated to intercept and the user is prompted to intercept the message, so that the group-sending spam short messages are effectively and timely intercepted, and the method is simple.
Referring to fig. 6, a schematic structural diagram of a detection end according to an embodiment of the present invention is provided, where the detection end according to the embodiment of the present invention may be specifically disposed in a cloud server, and specifically, the detection end includes a receiving module 11, a detection module 12, and an indication module 13. Wherein,
the receiving module 11 is configured to receive content ciphertext data and identification ciphertext data thereof sent by the client.
In a specific embodiment, the content ciphertext data and the identifier ciphertext data are obtained by the client encrypting information content and a user identifier of received information respectively through a preset encryption algorithm, and the information includes the information content and the user identifier. Specifically, the received information may be a short message, a mail, or the like.
Alternatively, the predetermined encryption Algorithm may refer to an encryption Algorithm that generates a uniquely determined value after encrypting the same plaintext data, such as MD5(Message Digest Algorithm5, fifth version of the Message Digest Algorithm), SHA (Secure Hash Algorithm), and so on.
The detection module 12 is configured to detect whether the information is harassment information or not if it is detected that the number of times of combining the received content ciphertext data and the identification ciphertext data thereof reaches a preset number threshold.
In a specific embodiment, the receiving module 11 receives ciphertext data sent by the client, where the ciphertext data includes content ciphertext data and corresponding identification ciphertext data, counts the number of times that the content ciphertext data and the identification ciphertext data are combined, and if the number of times that the content ciphertext data and the identification ciphertext data are combined reaches a preset number threshold, for example, 10 times, may trigger the detecting module 12 to detect whether information corresponding to the content ciphertext data is harassment information. Specifically, the detection module 12 may detect whether the information is harassment information by acquiring specific information content and a user identifier.
The indicating module 13 is configured to indicate the client to intercept the information when the detecting module 12 detects that the information is harassment information.
The detection module 12 determines whether the short message is a harassment short message according to the specific content of the message and the user identifier, for example, according to the content of the short message and the phone number thereof. If the detection module 12 determines that the same information is received by other clients, the indication module 13 may indicate the client to intercept the information and send a message to notify the user.
By implementing the embodiment of the invention, the content ciphertext data and the identification ciphertext data corresponding to the received information can be respectively obtained by the client, the detection end carries out statistical analysis on the ciphertext data of the information content and the identification, the client is indicated to intercept when the combination times of the ciphertext data of the content and the identification reach the set threshold value and the received information is judged to be harassment information, so that the mass-sending spam short messages can be effectively and timely intercepted, and the method is simple.
Fig. 7 is a schematic structural diagram of another detecting end according to an embodiment of the present invention, where the detecting end according to the embodiment of the present invention may include the receiving module 11, the detecting module 12, and the indicating module 13 of the detecting end, and in the embodiment of the present invention, the detecting end may further include:
and the query module 14 is configured to query whether data matched with the identification ciphertext data exists in the ciphertext data stored at the local end if the number of times of detecting the received content ciphertext data and the identification ciphertext data reaches a preset number threshold.
In a specific embodiment, the content ciphertext data and the identifier ciphertext data are ciphertext data obtained by encrypting information when the client receives the information, for example, content MD5 data and identifier MD5 data are obtained by respectively processing the information content and the user identifier of the information through an information digest algorithm MD 5. After receiving the content MD5 and the identifier MD5 sent by the client, and counting that the content MD5 and the identifier MD5 reach a preset number threshold, for example, 10 times, the query module 14 may be triggered to query whether MD5 data matched with the identifier MD5 is stored in the cloud.
The notifying module 15 is configured to notify the detecting module 12 when the querying module 14 queries that there is no data matching the identification ciphertext data in the ciphertext data stored at the local end.
Further, in an embodiment of the present invention, the query module 14 may include:
a first obtaining unit 141, configured to obtain an information interception blacklist preset by a home terminal, where the blacklist includes identification data with a prohibition indication;
a first querying unit 142, configured to query whether the received identification ciphertext data matches any identification data recorded in the blacklist;
the first determining unit 143 is configured to determine that the information is harassment information when the query result of the first querying unit 142 is yes.
Further, the query module 14 may further include:
a second obtaining unit 144, configured to obtain an information interception white list preset at a home terminal, where the white list records identification data of a preset type;
a second querying unit 145, configured to query whether the received identification ciphertext data matches any identification data recorded in the white list;
a second determining unit 146, configured to determine that the information is not harassment information when the query result of the second querying unit 145 is yes.
In a specific embodiment, the cloud may preset an information interception blacklist, where the blacklist records identification data carrying prohibition indications, that is, identification data such as an identification MD5 that has sent harassment information once.
Optionally, the querying module 14 queries whether data matching the identification ciphertext data exists in the ciphertext data stored at the local end, where the querying module acquires a cloud-preset blacklist through the first acquiring unit 141 when the content MD5 and the identification MD5 reach a preset number threshold value by statistics, and triggers the first querying unit 142 to query whether the identification MD5 exists in the blacklist. If the first querying unit 142 queries that the identifier MD5 is recorded in the blacklist, the first determining unit 143 may determine that the information is harassment information, may directly instruct the client to intercept the information, and further, may directly instruct the client to intercept the information when other subsequent clients receive the same information and request the cloud.
Further optionally, the cloud may further preset an information interception white list, where the white list may record a preset type of identification data, such as an identification MD5 corresponding to each operator or subscription information. The query module 14 may also query whether data matching the identification ciphertext data exists in the ciphertext data stored at the local end, or when the content MD5 and the identification MD5 reach a preset number threshold value through cloud statistics, acquire a cloud preset white list through the second acquisition unit 144, and trigger the second query unit 145 to query whether the identification MD5 exists in the white list, and when the identification MD5 is recorded in the white list obtained through query by the second query unit 145, the second determination unit 146 may determine that the information is not harassment information, and the cloud does not perform any processing.
Further, if the query module 14 queries that there is no data matching the identification ciphertext data in the ciphertext data stored at the local end, that is, the received identification MD5 does not exist in the blacklist and the whitelist, the notification module 15 notifies the detection module 12.
Further, in the embodiment of the present invention, the detection module 12 may be specifically configured to:
and sending an information content request to the client, acquiring information content corresponding to the content ciphertext data and a user identifier corresponding to the identifier ciphertext data, and detecting whether the information is harassment information or not according to the information content and the identifier type of the user identifier.
The notification module 15 may notify the detection module 12 to send an information content request to the client when the query module 14 queries that there is no data matching the identification ciphertext data in the ciphertext data stored at the local end, so as to detect whether the information is harassment information.
Specifically, if the query module 14 does not find the user identifier, the notification module 15 may notify the detection module 12 to send a request to a next requesting client (i.e., a client that sends the content MD5 and the identifier MD5 to the detection end) to obtain the specific content and the user identifier of the information, for example, when the information is a short message, obtain the specific content and the corresponding number of the short message, and consider whether the number can be listed in a blacklist according to the content and the type of the number.
Further, in the embodiment of the present invention, the detecting end may further include:
and the storage module 16 is configured to store the identification ciphertext data if it is detected that the information indicated by the content ciphertext data is harassment information, so as to directly instruct the client to intercept the information indicated by the identification ciphertext data when it is detected that the acquired identification ciphertext data matches the stored identification ciphertext data.
In a specific embodiment, the storage module 16 may be specifically configured to:
and if the information is detected to be harassment information, generating a prohibition instruction, and inputting the identification ciphertext data carrying the prohibition instruction into the blacklist.
By implementing the embodiment of the invention, the detection end can perform statistical analysis on the acquired information content and the ciphertext data of the identification, and inquire whether the local end records the corresponding identification ciphertext data or not when detecting that the combination frequency of the content and the ciphertext data of the identification reaches the set threshold value, and if the content and the ciphertext data of the identification are recorded, the client can be directly caused to intercept the information. Furthermore, if the record does not exist, the specific content and the user identification of the information can be obtained, and when the information is detected to be harassing information based on the specific content and the identification type of the received information, the client is indicated to intercept, so that the mass-sending spam short messages can be effectively and timely intercepted, and the method is simple.
Fig. 8 is a schematic structural diagram of a client according to an embodiment of the present invention, where the client may be specifically disposed in a terminal device such as a mobile phone and a tablet computer, and specifically, the client includes a first obtaining module 21, a first sending module 22, and an intercepting module 23. Wherein,
the first obtaining module 21 is configured to, if information is received, obtain content ciphertext data and identifier ciphertext data thereof corresponding to the information.
In an embodiment, the received information may refer to a short message, a mail, and the like, and includes information content and a user identifier. Specifically, if the received message is a short message, the message content may be a short message content, and the user identifier may be a phone number corresponding to the short message; if the received information is a mail, the information content may be a mail text, and the user identifier may be a mailbox address.
The content ciphertext data and the identification ciphertext data are respectively ciphertext data obtained by encrypting the information content and the user identification of the received information through a preset encryption algorithm by the client.
Alternatively, the predetermined encryption algorithm may refer to an encryption algorithm that generates a uniquely determined value after encrypting the same plaintext data, such as MD5, SHA, and the like.
The first sending module 22 is configured to send the content ciphertext data and the identification ciphertext data thereof obtained by the first obtaining module 21 to a detection end, so that the detection end detects whether the information is harassment information.
The intercepting module 23 is configured to intercept the information and send a message prompt if an intercepting instruction issued by the detecting end when detecting that the information is harassment information is received.
In a specific embodiment, after the first obtaining module 21 receives the information and sends the content ciphertext data and the identification ciphertext data corresponding to the information to the detecting end through the first sending module 22, if an interception instruction sent by the detecting end is received, the information may be intercepted through the intercepting module 23, and a message prompt may be sent to remind the user of the intercepted message.
Optionally, the message prompt includes, but is not limited to, a message prompt in the form of text, voice, or picture.
By implementing the embodiment of the invention, the content ciphertext data and the identification ciphertext data of the received information are sent to the detection end to enable the detection end to detect, and if the client receives the interception instruction sent by the detection end, the information is intercepted and the message prompt is sent, so that the group-sending spam short messages are effectively and timely intercepted, and the method is simple.
Please refer to fig. 9, which is a schematic structural diagram of another client according to an embodiment of the present invention, where the client according to an embodiment of the present invention may include the first obtaining module 21, the first sending module 22, and the intercepting module 23 of the client, and in an embodiment of the present invention, the client may further include:
and the detection module 24 is configured to detect whether the received information is harassment information according to a preset local rule.
In a specific embodiment, after receiving the information, the client may perform local rule judgment through the detection module 24, for example, detect whether the information is harassment information through a preset keyword matching rule, and when the preset rule is satisfied, may indicate that the information is harassment information.
Further optionally, the preset local rule may include a keyword matching detection rule, where the keyword matching detection rule includes a preset keyword combination;
the detection module 24 may be specifically configured to:
detecting whether the received information contains the keyword combination or not, and determining the information as harassment information if the detection result is yes; otherwise, determining that the information is not harassment information.
A notifying module 25, configured to notify the first obtaining module 21 to obtain content ciphertext data and identifier ciphertext data corresponding to the information when the detecting module 24 detects that the information is not harassment information.
The intercepting module 23 is further configured to directly intercept the information and send a message prompt when the detecting module 24 detects that the information is harassment information.
In a specific embodiment, if the detection module 24 determines that the information is not harassment information, the notification module 25 may notify the first obtaining module 21 to obtain content ciphertext data and identification ciphertext data corresponding to the information; if the detection module 24 determines that the information is harassment information, the interception module 23 can directly intercept the information and prompt the user to intercept the message.
Further, in the embodiment of the present invention, the detecting end may further include:
a second obtaining module 26, configured to obtain, if an information content request sent by the detection end is received, information content corresponding to the content ciphertext data and a user identifier corresponding to the identifier ciphertext data.
A second sending module 27, configured to encrypt the information content and the user identifier obtained by the second obtaining module 26 through a preset second encryption algorithm, and send the encrypted information content and the user identifier to the detection end, so that the detection end determines whether the information is harassment information.
Further, if an information content request sent by the cloud is received, the information content and the identifier thereof may be obtained through the second obtaining module 26, for example, when the received information is a short message, the content and the number of the short message are triggered to be obtained, and the content and the number of the short message are encrypted through a preset encryption algorithm, such as an asymmetric encryption algorithm RSA, and then sent to the cloud through the second sending module 27, so that the cloud performs further detection.
Further, in the embodiment of the present invention, the detecting end may further include:
and a registration module 28, configured to register with the system to obtain the right to extract the information content of the information and the user identifier.
It should be noted that, if the information received by the client is a short message, before acquiring the specific content and number of the short message, the client needs to register with the system, for example, register as a short message broadcast receiver, to obtain the right to extract the short message and the number thereof.
The client can detect whether the information is harassing information or not through the local rules when receiving the information, further, the client can send the content ciphertext data of the received information and the identification ciphertext data thereof to the detection end when the information is detected to be non-harassing information locally so as to enable the detection end to detect whether the information is harassing information or not, further, the client can send the specific content and the identification thereof to the detection end so as to enable the detection end to carry out further detection, and when receiving the interception instruction sent by the detection end, the client intercepts the information and prompts the user to intercept the intercepted information, so that the mass texting spam messages are effectively and timely intercepted, and the method is simple.
Referring to fig. 10, a schematic structural diagram of an information interception system according to an embodiment of the present invention is shown, and specifically, the system includes: the system comprises a detection terminal 1 and at least one client terminal 2; wherein,
the client 2 is configured to, if receiving the information, obtain content information digest algorithm ciphertext data and identification ciphertext data thereof corresponding to the information; sending the content ciphertext data and the identification ciphertext data thereof to the detection end 1 so as to enable the detection end to detect whether the information is harassment information;
the detection terminal 1 is used for receiving the content ciphertext data and the identification ciphertext data thereof sent by the client; if the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, detecting whether the information indicated by the content ciphertext data is harassment information; if yes, indicating the client 2 to intercept the information;
the client 2 is further configured to intercept the information and send a message prompt if an interception instruction issued by the detection terminal 1 when detecting that the information is harassment information is received.
By implementing the embodiment of the invention, the content ciphertext data and the identification ciphertext data corresponding to the received information can be respectively obtained by the client, the detection end carries out statistical analysis on the ciphertext data of the information content and the identification, the client is indicated to intercept when the combination times of the ciphertext data of the content and the identification reach the set threshold value and the received information is judged to be harassment information, so that the mass-sending spam short messages can be effectively and timely intercepted, and the method is simple.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "a specific embodiment," "an example," "a specific example," or "some examples" or the like, mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (33)

1. An information interception method, comprising:
receiving content ciphertext data and identification ciphertext data thereof, wherein the content ciphertext data is obtained by encrypting information content of received information by a client through a preset encryption algorithm, the identification ciphertext data is obtained by encrypting a user identification of the information by the client through the encryption algorithm, and the information comprises the information content and the user identification;
if the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, detecting whether the information is harassment information;
and if so, indicating the client to intercept the information.
2. The method of claim 1, wherein said detecting whether the information is nuisance information comprises:
sending an information content request to the client to acquire information content corresponding to the content ciphertext data and a user identifier corresponding to the identifier ciphertext data;
and receiving the information content and the user identification returned by the client in response to the information content request, and detecting whether the information is harassment information or not according to the identification types of the information content and the user identification.
3. The method of claim 2, wherein prior to said sending an information content request to said client, further comprising:
if the number of times of combination of the received content ciphertext data and the identification ciphertext data reaches a preset number threshold value, inquiring whether data matched with the identification ciphertext data exists in ciphertext data stored at the local end;
and if not, executing the step of sending an information content request to the client to acquire the information content corresponding to the content ciphertext data and the user identification corresponding to the identification ciphertext data.
4. The method of claim 3, wherein the querying whether data matching the identification ciphertext data exists in the ciphertext data stored at the local end comprises:
acquiring an information interception blacklist preset by a home terminal, wherein the blacklist records identification data carrying prohibition instructions;
inquiring whether the received identification ciphertext data is matched with any identification data recorded in the blacklist;
and if so, determining the information as disturbance information.
5. The method according to claim 3, wherein the querying whether data matching the identification ciphertext data exists in the ciphertext data stored at the local end further comprises:
acquiring an information interception white list preset by a home terminal, wherein the white list records identification data of a preset type;
inquiring whether the received identification ciphertext data is matched with any identification data recorded in the white list;
and if so, determining that the information is not harassment information.
6. The method of any one of claims 1-5, further comprising:
and if the information is detected to be harassment information, storing the identification ciphertext data so as to directly instruct the client to intercept the information indicated by the identification ciphertext data when the acquired identification ciphertext data is detected to be matched with the stored identification ciphertext data.
7. The method of claim 6, wherein if the detected information is harassment information, the identification ciphertext data is stored, and specifically:
if the information is detected to be harassment information, acquiring the blacklist;
and generating a prohibition instruction, and inputting the identification ciphertext data carrying the prohibition instruction into the blacklist.
8. The method of any one of claims 1 to 7,
the preset encryption algorithm comprises an information digest algorithm or a secure hash algorithm.
9. An information interception method, comprising:
if information is received, content ciphertext data and identification ciphertext data corresponding to the information are obtained, wherein the information comprises information content and a user identification, the content ciphertext data is ciphertext data obtained by encrypting the information content through a first encryption algorithm, and the identification ciphertext data is ciphertext data obtained by encrypting the user identification through the first encryption algorithm;
sending the content ciphertext data and the identification ciphertext data thereof to a detection end so as to enable the detection end to detect whether the information is harassment information;
and if an interception instruction issued by the detection end when the detection end detects that the information is harassment information is received, intercepting the information and sending a message prompt.
10. The method according to claim 9, wherein before the obtaining of the content ciphertext data and the identification ciphertext data thereof corresponding to the information, the method further comprises:
detecting whether the received information is harassment information or not through a preset local rule;
if the information is detected to be harassment information, directly intercepting the information and sending a message prompt;
and if the information is detected not to be harassing information, executing the step of acquiring content ciphertext data and identification ciphertext data corresponding to the information.
11. The method of claim 10,
the preset local rule comprises a keyword matching detection rule, and the keyword matching detection rule comprises a preset keyword combination;
the step of detecting whether the received information is harassment information through a preset local rule comprises the following steps:
detecting whether the received information contains the keyword combination;
if the detection result is yes, determining the information as harassment information;
and if the detection result is negative, determining that the information is not harassment information.
12. The method according to any one of claims 9-11, wherein after said sending said content ciphertext data and its identification ciphertext data to a detection end, further comprising:
if an information content request sent by the detection end is received, acquiring information content corresponding to the content ciphertext data and a user identifier corresponding to the identifier ciphertext data;
and encrypting the information content and the user identification through a preset second encryption algorithm, and sending the encrypted information content and the encrypted user identification to the detection end so as to enable the detection end to determine whether the information is harassment information.
13. The method of claim 9, wherein if the message is a short message, before the obtaining of the content ciphertext data and the identification ciphertext data corresponding to the message, the method further comprises:
and registering the information with a system to obtain the information content for extracting the information and the authority of the user identification.
14. The method of claim 9,
the first encryption algorithm comprises a message digest algorithm or a secure hash algorithm.
15. The method of claim 12,
the second encryption algorithm comprises an asymmetric encryption RSA algorithm.
16. The method of any one of claims 9-15,
the message prompt comprises a message prompt in the form of text, voice or picture.
17. A sensing tip, comprising:
the system comprises a receiving module and a sending module, wherein the receiving module is used for receiving content ciphertext data and identification ciphertext data thereof, the content ciphertext data is obtained by encrypting information content of received information through a preset encryption algorithm by a client, the identification ciphertext data is obtained by encrypting a user identification of the information through the encryption algorithm by the client, and the information comprises the information content and the user identification;
the detection module is used for detecting whether the information is harassment information or not if the received combination times of the content ciphertext data and the identification ciphertext data thereof reach a preset number threshold;
and the indicating module is used for indicating the client to intercept the information when the detecting module detects that the information is harassment information.
18. The detection end according to claim 17, wherein the detection module is specifically configured to:
and sending an information content request to the client, acquiring information content corresponding to the content ciphertext data and a user identifier corresponding to the identifier ciphertext data, and detecting whether the information is harassment information or not according to the information content and the identifier type of the user identifier.
19. The sensing tip of claim 18, further comprising:
the query module is used for querying whether data matched with the identification ciphertext data exists in the ciphertext data stored at the local end if the combination times of the received content ciphertext data and the identification ciphertext data reaches a preset number threshold value;
and the notification module is used for notifying the detection module to send an information content request to the client when the query module queries that no data matched with the identification ciphertext data exists in the ciphertext data stored at the local terminal so as to detect whether the information is harassment information.
20. The detection terminal of claim 19, wherein the query module comprises:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring an information interception blacklist preset by a home terminal, and the blacklist records identification data with prohibition instructions;
the first query unit is used for querying whether the received identification ciphertext data is matched with any identification data recorded in the blacklist;
and the first determining unit is used for determining the information as harassment information when the query result of the first querying unit is yes.
21. The detection terminal of claim 19, wherein the query module further comprises:
the second acquisition unit is used for acquiring an information interception white list preset by a home terminal, and the white list records identification data of a preset type;
the second query unit is used for querying whether the received identification ciphertext data is matched with any identification data recorded in the white list;
and the second determining unit is used for determining that the information is not harassment information when the query result of the second querying unit is yes.
22. The sensing tip of any one of claims 17-21, further comprising:
and the storage module is used for storing the identification ciphertext data if the information indicated by the content ciphertext data is detected to be harassment information, so that the client is directly indicated to intercept the information indicated by the identification ciphertext data when the acquired identification ciphertext data is detected to be matched with the stored identification ciphertext data.
23. The detection end according to claim 22, wherein the storage module is specifically configured to:
and if the information is detected to be harassment information, generating a prohibition instruction, and inputting the identification ciphertext data carrying the prohibition instruction into the blacklist.
24. The sensing tip of any one of claims 17-23,
the preset encryption algorithm comprises an information digest algorithm or a secure hash algorithm.
25. A client, comprising:
the device comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring content ciphertext data and identification ciphertext data corresponding to information if the information is received, the information comprises information content and user identification, the content ciphertext data is ciphertext data obtained by encrypting the information content through a first encryption algorithm, and the identification ciphertext data is ciphertext data obtained by encrypting the user identification through the first encryption algorithm;
the first sending module is used for sending the content ciphertext data and the identification ciphertext data thereof acquired by the first acquiring module to a detecting end so as to enable the detecting end to detect whether the information is harassment information;
and the interception module is used for intercepting the information and sending a message prompt if an interception instruction sent by the detection end when the information is detected to be harassment information is received.
26. The client of claim 25, further comprising:
the detection module is used for detecting whether the received information is harassment information or not through a preset local rule;
the notification module is used for notifying the first acquisition module to acquire content ciphertext data and identification ciphertext data corresponding to the information when the detection module detects that the information is not harassment information;
the interception module is further configured to directly intercept the information and send a message prompt when the detection module detects that the information is harassment information.
27. The client of claim 26,
the preset local rule comprises a keyword matching detection rule, and the keyword matching detection rule comprises a preset keyword combination;
the detection module is specifically configured to:
detecting whether the received information contains the keyword combination or not, and determining the information as harassment information if the detection result is yes; otherwise, determining that the information is not harassment information.
28. The client of any one of claims 25-27, further comprising:
the second obtaining module is used for obtaining the information content corresponding to the content ciphertext data and the user identification corresponding to the identification ciphertext data if receiving the information content request sent by the detection end;
and the second sending module is used for encrypting the information content and the user identification acquired by the second acquisition module through a preset second encryption algorithm and sending the encrypted information content and the encrypted user identification to the detection end so as to enable the detection end to judge whether the information is harassment information.
29. The client of claim 25, further comprising:
and the registration module is used for registering to a system so as to obtain the information content of the information and the authority of the user identification.
30. The client of claim 25,
the first encryption algorithm comprises a message digest algorithm or a secure hash algorithm.
31. The client of claim 28,
the second encryption algorithm comprises an asymmetric encryption RSA algorithm.
32. The client of any one of claims 25-31,
the message prompt comprises a message prompt in the form of text, voice or picture.
33. An information interception system, comprising: the system comprises a detection end and at least one client end; wherein,
the client is used for acquiring content information abstract algorithm ciphertext data and identification ciphertext data corresponding to the information if the information is received; sending the content ciphertext data and the identification ciphertext data thereof to the detection end so as to enable the detection end to detect whether the information is harassment information;
the detection terminal is used for receiving the content ciphertext data and the identification ciphertext data thereof sent by the client; if the combination times of the received content ciphertext data and the identification ciphertext data thereof reach a preset number threshold, detecting whether the information indicated by the content ciphertext data is harassment information; if yes, the client is instructed to intercept the information;
the client is also used for intercepting the information and sending a message prompt if an interception instruction sent by the detection end when the information is detected to be harassment information is received.
CN201410253612.1A 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system Expired - Fee Related CN104038491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410253612.1A CN104038491B (en) 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410253612.1A CN104038491B (en) 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system

Publications (2)

Publication Number Publication Date
CN104038491A true CN104038491A (en) 2014-09-10
CN104038491B CN104038491B (en) 2018-08-17

Family

ID=51469080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410253612.1A Expired - Fee Related CN104038491B (en) 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system

Country Status (1)

Country Link
CN (1) CN104038491B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105578387A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Detection method of disturbance messages in iOS system, device and system
CN105744525A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Method, device and system for mobile communication terminal to identify harassing communication
CN110677251A (en) * 2018-07-03 2020-01-10 中移(杭州)信息技术有限公司 Information processing method, device, medium and equipment
CN117714216A (en) * 2024-02-06 2024-03-15 杭州城市大脑有限公司 Data unauthorized access control method based on encryption of multidimensional unique identification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105744525A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Method, device and system for mobile communication terminal to identify harassing communication
CN105578387A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Detection method of disturbance messages in iOS system, device and system
CN110677251A (en) * 2018-07-03 2020-01-10 中移(杭州)信息技术有限公司 Information processing method, device, medium and equipment
CN117714216A (en) * 2024-02-06 2024-03-15 杭州城市大脑有限公司 Data unauthorized access control method based on encryption of multidimensional unique identification
CN117714216B (en) * 2024-02-06 2024-04-30 杭州城市大脑有限公司 Data unauthorized access control method based on encryption of multidimensional unique identification

Also Published As

Publication number Publication date
CN104038491B (en) 2018-08-17

Similar Documents

Publication Publication Date Title
CN107800678B (en) Method and device for detecting abnormal registration of terminal
CN104038491B (en) A kind of information intercepting method, apparatus and system
US9633203B2 (en) Spam notification device
EP3169047A1 (en) Information processing method and information processing device
EP2861003A1 (en) Method and apparatus for controlling application right
US20140328478A1 (en) Method and system for identifying prank call, client, server, and storage medium
WO2014154069A1 (en) Method and device for prompting wi-fi signal
WO2014130145A1 (en) Public and private geo-fences
WO2008154835A1 (en) Electronic mail filtering method, device, and electronic mail server
US8959626B2 (en) Detecting a suspicious entity in a communication network
EP3198521B1 (en) Method and apparatus of processing a doi (digital object unique identifier) in interaction information
US10243900B2 (en) Using private tokens in electronic messages associated with a subscription-based messaging service
CN102883289A (en) Communication processing method, client and mobile terminal
CN113746722A (en) Information processing method, device, equipment and storage medium
US10104215B2 (en) Blacklist management method and device
CN103973884B (en) The display packing of information, device and terminal
WO2012151929A1 (en) Method and device for monitoring short message
CN112040057A (en) Device control method, device, electronic device, control system and storage medium
WO2016037489A1 (en) Method, device and system for monitoring rcs spam messages
CN104038552A (en) Information updating method and device
CN110245523B (en) Data verification method, system and device and computer readable storage medium
CN111901229A (en) Mail withdrawing method and device, electronic equipment and readable storage medium
CN103179523A (en) Remind method and remind device
WO2013044670A1 (en) Method, device, and system for integrating traditional short message and network message
CN106488449A (en) A kind of management method of Wireless Telecom Equipment and Wireless Telecom Equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180817

CF01 Termination of patent right due to non-payment of annual fee