CN104038491A - Information interception method, device and system - Google Patents

Information interception method, device and system Download PDF

Info

Publication number
CN104038491A
CN104038491A CN201410253612.1A CN201410253612A CN104038491A CN 104038491 A CN104038491 A CN 104038491A CN 201410253612 A CN201410253612 A CN 201410253612A CN 104038491 A CN104038491 A CN 104038491A
Authority
CN
China
Prior art keywords
information
encrypt data
content
mark
harassing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410253612.1A
Other languages
Chinese (zh)
Other versions
CN104038491B (en
Inventor
王春雷
傅盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Conew Network Technology Beijing Co Ltd
Original Assignee
Conew Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Conew Network Technology Beijing Co Ltd filed Critical Conew Network Technology Beijing Co Ltd
Priority to CN201410253612.1A priority Critical patent/CN104038491B/en
Publication of CN104038491A publication Critical patent/CN104038491A/en
Application granted granted Critical
Publication of CN104038491B publication Critical patent/CN104038491B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention discloses an information interception method. The information interception method includes receiving content ciphertext data and identification ciphertext data sent by a client; detecting whether information indicated by the content ciphertext data is harassing information or not if the combination number of the received content ciphertext data and the identification ciphertext data is detected to reach a preset threshold value; if so, indicating the client to intercept the information. The embodiment of the invention also discloses a detecting terminal, a client and an information interception system. The information interception method, the detecting end, the client and the information interception system can effectively and timely intercept spam messages of mass texting and are simple in the method.

Description

A kind of information intercepting method, Apparatus and system
Technical field
The present invention relates to areas of information technology, relate in particular to a kind of information intercepting method, Apparatus and system.
Background technology
Along with the fast development of mobile communication business, mobile phone has become means of communication indispensable in people's daily life.Note, as one of mode of intelligence transmission crucial between the mobile terminals such as mobile phone, is used widely, and brings great facility.But, being subject to the attraction of the mass users that uses note, some lawless persons but attempt to speculate by refuse messages such as mass advertising note, swindle notes, cause great harassing and wrecking to user.
At present, some refuse messages can be tackled by the interception client on mobile phone.This client, in the time carrying out the detection of refuse messages, is carried out the detection of refuse messages by default home town ruling, and interception meets this regular note.But the method is just carried out rule judgment in this locality, have stronger limitation, easily make lawless person hide easily this keyword match and detect rule, such as adding special symbol or replace etc. with homophone between keyword.And, most of refuse messages is mass-sended by sending short messages in groups device, if after a large number of users report by the time, then this rule is pushed to this locality by amendment interception rule, the refuse messages of this mass-sending may be sent already, therefore catching rubbish note timely and effectively.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, a kind of information intercepting method, Apparatus and system are provided, and can effectively tackle mass-sending class harassing and wrecking information.
In order to solve the problems of the technologies described above, the embodiment of the present invention provides a kind of information intercepting method, comprising:
Receive content encrypt data and mark encrypt data thereof that client sends, wherein, described content encrypt data is described client is encrypted acquisition encrypt data by the information content of default cryptographic algorithm docking collection of letters breath, described mark encrypt data is described client is encrypted acquisition to the user ID of described information encrypt data by described cryptographic algorithm, and described information comprises the described information content and described user ID;
The combination number of times of the described content encrypt data receiving if detect and mark encrypt data thereof reaches default amount threshold, and whether detect described information is harassing and wrecking information;
If so, indicate described client to tackle described information.
Correspondingly, the embodiment of the present invention also provides a kind of information intercepting method, comprising:
If the information of receiving, obtain content encrypt data corresponding to described information and mark encrypt data thereof, wherein, described information comprises the information content and user ID, described content encrypt data is the encrypt data that by the first cryptographic algorithm, the described information content is encrypted acquisition, and described mark encrypt data is the encrypt data that by described the first cryptographic algorithm, described user ID is encrypted acquisition;
Whether described content encrypt data and mark encrypt data thereof are sent to test side, be harassing and wrecking information so that described information is detected in described test side;
If receive described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
Correspondingly, the embodiment of the present invention also provides a kind of test side, comprising:
Receiver module, the content encrypt data and the mark encrypt data thereof that send for receiving client, wherein, described content encrypt data is described client is encrypted acquisition encrypt data by the information content of default cryptographic algorithm docking collection of letters breath, described mark encrypt data is described client is encrypted acquisition to the user ID of described information encrypt data by described cryptographic algorithm, and described information comprises the described information content and described user ID;
Detection module, whether if for detecting that the described content encrypt data receiving and the combination number of times that identifies encrypt data thereof reach default amount threshold, detecting described information is harassing and wrecking information;
Indicating module, in the time that described detection module detects that described information is harassing and wrecking information, indicates described client to tackle described information.
Correspondingly, the embodiment of the present invention also provides a kind of client, comprising:
The first acquisition module, if for receiving information, obtain content encrypt data corresponding to described information and mark encrypt data thereof, wherein, described information comprises the information content and user ID, described content encrypt data is the encrypt data that by the first cryptographic algorithm, the described information content is encrypted acquisition, and described mark encrypt data is the encrypt data that by described the first cryptographic algorithm, described user ID is encrypted acquisition;
Whether the first sending module, is sent to test side for content encrypt data and mark encrypt data thereof that described the first acquisition module is obtained, be harassing and wrecking information so that described information is detected in described test side;
Blocking module, if for receiving described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
Correspondingly, the embodiment of the present invention also provides a kind of information intercepting system, comprising: test side and at least one client; Wherein,
Described client, if for receiving information, obtains content information digest algorithm encrypt data corresponding to described information and mark encrypt data thereof; Whether described content encrypt data and mark encrypt data thereof are sent to described test side, be harassing and wrecking information so that described information is detected in described test side;
Described test side, the content encrypt data and the mark encrypt data thereof that send for receiving described client; The combination number of times of the described content encrypt data receiving if detect and mark encrypt data thereof reaches default amount threshold, and whether detect the indicated information of described content encrypt data is harassing and wrecking information; If so, indicate described client to tackle described information;
Described client, if also for receiving described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
Implement the embodiment of the present invention, there is following beneficial effect:
The embodiment of the present invention can be obtained respectively content encrypt data corresponding to reception information and mark encrypt data by client, statistical analysis is carried out to the encrypt data of this information content and mark in test side, reach the threshold value of setting at the combination number of times of encrypt data that this content and mark detected, and judging when this reception information is harassing and wrecking information indicates client to tackle, thereby can tackle effectively, in time mass-sending class refuse messages, method is simple.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the schematic flow sheet of a kind of information intercepting method of providing of the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the another kind of information intercepting method that provides of the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of another information intercepting method of providing of the embodiment of the present invention;
Fig. 4 is the schematic flow sheet of another information intercepting method of providing of the embodiment of the present invention;
Fig. 5 is the mutual schematic diagram of a kind of information intercepting method of providing of the embodiment of the present invention;
Fig. 6 is the structural representation of a kind of test side of providing of the embodiment of the present invention;
Fig. 7 is the structural representation of the another kind of test side that provides of the embodiment of the present invention;
Fig. 8 is the structural representation of a kind of client of providing of the embodiment of the present invention;
Fig. 9 is the structural representation of the another kind of client that provides of the embodiment of the present invention;
Figure 10 is the structural representation of a kind of information intercepting system of providing of the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1, it is the schematic flow sheet of a kind of information intercepting method of providing of the embodiment of the present invention, the described method of the embodiment of the present invention can specifically be applied to cloud server etc. can for detection of and the test side of storage information data in, concrete, described method comprises:
S101: receive content encrypt data and mark encrypt data thereof that client sends.
In specific embodiment, to be described client dock respectively the information content of the breath of collecting mail and user ID and be encrypted the encrypt data of acquisition by default cryptographic algorithm for described content encrypt data and mark encrypt data, and described information comprises the described information content and described user ID.Concrete, this reception information can be note, mail etc.
Alternatively, this default cryptographic algorithm can refer to identical clear data to be encrypted the cryptographic algorithm of the well-determined numerical value of rear generation, such as MD5 (Message Digest Algorithm5, message digest algorithm the 5th edition), SHA (Secure Hash Algorithm, SHA) etc.
S102: the combination number of times of the described content encrypt data receiving if detect and mark encrypt data thereof reaches default amount threshold, and whether detect the indicated information of described content encrypt data is harassing and wrecking information.
In specific embodiment, the encrypt data that test side sends as cloud server reception client, comprise content encrypt data and identify accordingly encrypt data, and add up this content encrypt data and mark encrypt data the two combination occur number of times, if the combination number of times of the two reaches default amount threshold, such as 10 times, can information corresponding to this content encrypt data of detection trigger whether be harassing and wrecking information.Concrete, can whether by obtaining the concrete information content and user ID, to detect this information be harassing and wrecking information.
S103: if so, indicate described client to tackle described information.
According to the particular content of this information and user ID, such as according to short message content and telephone number thereof, judge whether this note is harassing and wrecking notes.If be judged as YES, in the time that other clients arrive same information, indicate this client to tackle this information, and the notice that initiates a message is to user.
Implement the embodiment of the present invention and can obtain respectively content encrypt data corresponding to reception information and mark encrypt data by client, statistical analysis is carried out to the encrypt data of this information content and mark in test side, reach the threshold value of setting at the combination number of times of encrypt data that this content and mark detected, and judging when this reception information is harassing and wrecking information indicates client to tackle, thereby can tackle effectively, in time mass-sending class refuse messages, method is simple.
Referring to Fig. 2, is the schematic flow sheet of the another kind of information intercepting method that provides of the embodiment of the present invention, and concrete, described method comprises:
S201: receive content encrypt data and mark encrypt data thereof that client sends.
S202: whether the combination time of the described content encrypt data that detection receives and mark encrypt data thereof reaches default amount threshold.
In specific embodiment, this content encrypt data and mark encrypt data thereof are that client is encrypted to this information the encrypt data obtaining in the time receiving information, such as by message digest algorithm MD5, the information content of this information being processed and obtained content MD5 data, and the user ID of this information is encrypted and obtains identifying MD5 data.Test side cloudlike termination receive client send content MD5 and mark MD5, and can statistics obtain this content MD5 and mark MD5 reach default amount threshold, such as 10 times, detection trigger client to this information whether be harassing and wrecking information.
S203: whether have the data that match with described mark encrypt data in the encrypt data of inquiry local terminal storage.
In specific embodiment, high in the clouds can preset information interception blacklist, in this blacklist, record comprises and carries the identification data of forbidding instruction, once sends the identification data of harassing and wrecking information as mark MD5.
Alternatively, in the encrypt data of described inquiry local terminal storage, whether having the data that match with described mark encrypt data can be in the time that statistics obtains this content encrypt data and mark encrypt data and reaches default amount threshold, trigger inquire-receive to mark encrypt data whether with described blacklist in any one identification data that records match, be whether to have this mark MD5 in preset blacklist, there is this mark MD5 if recorded in this blacklist, can determine that this information is harassing and wrecking information, and carry out S206, directly this client of instruction is tackled this information, further, also can be at other follow-up clients to same information and while asking high in the clouds, directly instruction client is tackled this information.
Further alternatively, white list also can be tackled by preset information in high in the clouds, can record the identification data of preset kind, as each operator or mark MD5 corresponding to subscription information in this white list.In the encrypt data of described inquiry local terminal storage, whether having the data that match with described mark encrypt data can also be to add up beyond the clouds when obtaining this content encrypt data and mark encrypt data and reaching default amount threshold, trigger inquire-receive to mark encrypt data whether with this white list in any one identification data that records match, and be to be when record exists the mark MD5 that this receives in this white list at Query Result, can determine that described information is not harassing and wrecking information, high in the clouds is left intact.
Further, if inquire in the encrypt data of local terminal storage and do not have the data that match with described mark encrypt data, in this blacklist and white list, there is not this mark MD5 receiving, can carry out S204, obtain particular content and the user ID thereof of this information.
S204: send information content request to described client, to obtain the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding.
S205: whether receive information content request is returned described in described client end response the described information content and described user ID, detecting the indicated information of described content encrypt data is harassing and wrecking information.
S206: if so, indicate described client to tackle described information.
Concrete, there are if does not record in high in the clouds the data that match with this mark MD5, can send request particular content and the user ID of obtaining this information to the client of next one request (next transmission content MD5 and mark MD5 are to the client of test side).Such as obtain particular content and the corresponding number of this note in the time that this information is note, according to this content and the type of number consider this number whether can be put on the blacklist in (such as operator also can bulk SMS, as 10086 number segments, such number does not pipe off).
Further, obtain after the indicated information of described content encrypt data is harassing and wrecking information, also can storing described mark encrypt data (as this mark MD5) in detection.Concrete, can obtain described preset blacklist, generate and forbid instruction according to this mark MD5 corresponding to this harassing and wrecking information, and be input in described blacklist carrying this mark MD5 that forbids instruction, so that in the time that the mark encrypt data that the encrypt data that obtains and this storage detected matches, directly indicate client to tackle the indicated information of this encrypt data.
Implementing embodiment of the present invention test side can be by carrying out statistical analysis to the encrypt data of the information content getting and mark, and in the time that the combination number of times of encrypt data that this content and mark detected reaches the threshold value of setting, whether inquiry local terminal has recorded corresponding mark encrypt data, if there is record, can directly cause client to tackle this information.Further, if there is not this record, can obtain particular content and the user ID thereof of this information, and in the particular content based on this reception information and mark type detection while being harassing and wrecking information to this information, instruction client is tackled, thereby can tackle effectively, in time mass-sending class refuse messages, method is simple.
Referring to Fig. 3, is the schematic flow sheet of another information intercepting method of providing of the embodiment of the present invention, and described method can specifically be applied in the terminal equipment such as mobile phone, panel computer, and concrete, described method comprises:
S301: if the information of receiving is obtained content encrypt data corresponding to described information and mark encrypt data thereof.
In specific embodiment, this reception information can refer to note, mail etc., comprises the information content and user ID.Concrete, if this reception information is note, this information content can be short message content, this user ID can be telephone number corresponding to this note (calling number, i.e. number corresponding to this note transmit leg); If this reception information is mail, this information content can be message body, and this user ID can be email address (being email address corresponding to e-mail sending).
Wherein, described content encrypt data and mark encrypt data thereof are respectively described client the information content to this reception information and user ID are encrypted the encrypt data of acquisition by default cryptographic algorithm.
Alternatively, this default cryptographic algorithm can refer to identical clear data to be encrypted the cryptographic algorithm of the well-determined numerical value of rear generation, such as MD5, SHA etc.
S302: whether described content encrypt data and mark encrypt data thereof are sent to test side, be harassing and wrecking information so that described information is detected in described test side.
S303: if receive described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
In specific embodiment, client, after receiving this information and encrypt data is sent to test side by content encrypt data corresponding this information and mark thereof, if receive the interception instruction that test side issues, can be tackled this information, and the prompting that initiates a message, with this interception message of reminding user.Concrete, the prompting mode of this message includes but not limited to the message notifying of text, voice or picture form.
Implementing the embodiment of the present invention can be by being sent to test side so that test side is detected by the content encrypt data of the information of reception and mark encrypt data thereof, if client receives the interception instruction that this test side issues, tackle this information, and the prompting that initiates a message, thereby effectively, in time mass-sending class refuse messages is tackled,, method is simple.
Referring to Fig. 4, is the schematic flow sheet of another information intercepting method of providing of the embodiment of the present invention, and concrete, described method comprises:
S401: whether if the information of receiving, detecting described information by default home town ruling is harassing and wrecking information.
In specific embodiment, client is before obtaining content encrypt data corresponding to reception information and mark encrypt data thereof, also can carry out home town ruling judgement, such as whether information described in the keyword match rule detection by default is harassing and wrecking information, this keyword match detects rule and has comprised default key combination, detecting when this information meeting this preset rules this packets of information being containing default key combination, can represent that this information is harassing and wrecking information, carry out S406, directly tackle this information; Otherwise, can carry out S402.
S402: obtain content encrypt data corresponding to described information and mark encrypt data thereof.
S403: described content encrypt data and mark encrypt data thereof are sent to test side.
Judge that if local this information is not harassing and wrecking information, can obtain content encrypt data corresponding to this information and mark encrypt data thereof.Such as this reception information is note, comprise short message content and number, this content encrypt data can be and by message digest algorithm MD5, this short message content is encrypted the content MD5 data that obtain, this mark encrypt data can be the number of this note is carried out to the mark MD5 data that md5 encryption processing obtains, and this content MD5 and mark MD5 thereof are sent to test side as high in the clouds, whether be harassing and wrecking information so that this information is detected in this test side.
S404: if receive the information content request that described test side sends, obtain the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding.
S405: the described information content and described user ID are encrypted by default cryptographic algorithm, and the described information content and described user ID through encryption are sent to described test side, so that whether information is harassing and wrecking information described in described test side.
S406: described information is harassing and wrecking information if detect, tackles described information, and the prompting that initiates a message.
Further, if receive the information content request that high in the clouds sends, client can trigger obtains this information content and mark thereof, such as trigger the content and the number that obtain this note in the time that this reception information is note, and by the cryptographic algorithm by default such as rivest, shamir, adelman RSA is sent to high in the clouds after this short message content and number are encrypted, so that high in the clouds is further detected.
It should be noted that, if client information is note, before obtaining the particular content and number thereof of this note, also need to system registry, such as being registered as note radio receiver, to obtain the authority of extracting this note and number thereof.
Implementing embodiment of the present invention client can be in the time receiving information, whether detect this information by home town ruling is harassing and wrecking information, further, detect in this locality when the harassing and wrecking information can be by the content encrypt data of the information of reception and mark encrypt data thereof are sent to test side so that whether this information is detected in test side be harassing and wrecking information, further, this client also can be sent to test side by the particular content of this information and mark thereof, so that test side is further detected, in the time receiving the interception instruction that this test side issues, tackle this information, and point out user this interception message, thereby effectively, in time mass-sending class refuse messages is tackled, method is simple.
Referring to Fig. 5, is the mutual schematic diagram of a kind of information intercepting method of providing of the embodiment of the present invention, and concrete, described method comprises:
S501: whether the first client, to information, is harassing and wrecking information by information described in default keyword match rule detection.
In specific embodiment, client can first be carried out home town ruling judgement in the time receiving information, such as whether information described in the keyword match rule detection by default is harassing and wrecking information, in the time meeting this preset rules, can represent that this information is harassing and wrecking information, can directly tackle this information.
S502: if not, obtain content encrypt data corresponding to this information and mark encrypt data thereof.
S503: the first client sends content encrypt data and identifies encrypt data to test side.
Concrete, while being note such as this reception information, client can be obtained respectively the encrypt data corresponding with the content of this note and number as processed through MD5 the content MD5 and the number MD5 that obtain, and this content MD5 and number MD5 are sent to detection.
It should be noted that, the client in the embodiment of the present invention is configurable in the terminal equipments such as mobile phone, panel computer, PC, and described test side can be high in the clouds.
S504: reach default amount threshold if test side detects the described content encrypt data receiving and the combination number of times that identifies encrypt data thereof, whether inquiry local terminal records this mark encrypt data.
S505: if there is record, the operation instruction of this record correspondence is resolved in test side.
Alternatively, reach the threshold value of setting if high in the clouds detects the combination of this content MD5 and number MD5, such as 10 times, and search and obtain high in the clouds and recorded this number MD5, resolve the operation instruction of this record correspondence.If high in the clouds be resolved to this number MD5 be recorded in high in the clouds arrange number blacklist in, can indicate this client directly to tackle this reception note.
Further alternatively, be recorded in the white list that high in the clouds arranges if high in the clouds is resolved to this number MD5, can determine that described information is not for harassing and wrecking information, high in the clouds is left intact.Wherein, in this white list, record the identification data of preset kind, such as each operator or mark MD5 corresponding to subscription information, shown that the information that this identification data is corresponding can pass through.
S506: if record not, the second client that test side receives identical information to the next one sends content requests.
S507: the second client end response request is also returned to content and the mark of this information.
If this number MD5 is not recorded in high in the clouds, can send request to the client of next one request, obtain particular content and the number of this reception note, wherein, this content and number can be by default cipher mode such as by uploading to high in the clouds after rivest, shamir, adelman rsa encryption.
S508: whether test side is harassing and wrecking information according to this content and this information of label detection.
S509: if detect as harassing and wrecking information, instruction the second client is tackled this information.
Concrete, high in the clouds can judge whether this reception note is refuse messages according to short message content and the type of number, and in the time detecting as refuse messages, indicate other clients that receive identical information to tackle this information, such as high in the clouds is in the time that the number MD5 that receives other clients transmissions number MD5 corresponding with this refuse messages is identical, indicate these other clients to tackle this information.Further, high in the clouds also can add this number MD5 in the blacklist of setting in conjunction with number feature.
S510: tackle this information, and the prompting that initiates a message.
If receive the interception instruction that high in the clouds sends, can tackle this reception information, and point out user this interception message.Concrete, the prompting mode of this message includes but not limited to the message notifying of text, voice or picture form.
Implementing embodiment of the present invention client can be in the time receiving information, whether detect this information by home town ruling is harassing and wrecking information, further, detect in this locality when the non-harassing and wrecking information can be by the information such as the content encrypt data of this information and mark encrypt data thereof are sent to test side so that whether this information is detected in test side be harassing and wrecking information, test side is in the time judging that this information is harassing and wrecking information, instruction client is tackled, and point out user this interception message, thereby effectively, in time mass-sending class refuse messages is tackled,, method is simple.
Refer to Fig. 6, it is the structural representation of a kind of test side of providing of the embodiment of the present invention, the described test side of the embodiment of the present invention can specifically be arranged in cloud server, concrete, and described test side comprises receiver module 11, detection module 12 and indicating module 13.Wherein,
Described receiver module 11, the content encrypt data and the mark encrypt data thereof that send for receiving client.
In specific embodiment, to be described client dock respectively the information content of the breath of collecting mail and user ID and be encrypted the encrypt data of acquisition by default cryptographic algorithm for described content encrypt data and mark encrypt data, and described information comprises the described information content and described user ID.Concrete, this reception information can be note, mail etc.
Alternatively, this default cryptographic algorithm can refer to identical clear data to be encrypted the cryptographic algorithm of the well-determined numerical value of rear generation, such as MD5 (Message Digest Algorithm5, message digest algorithm the 5th edition), SHA (Secure Hash Algorithm, SHA) etc.
Described detection module 12, whether if for detecting that the described content encrypt data receiving and the combination number of times that identifies encrypt data thereof reach default amount threshold, detecting described information is harassing and wrecking information.
In specific embodiment, receiver module 11 receives the encrypt data that client sends, comprise content encrypt data and identify accordingly encrypt data, and add up this content encrypt data and mark encrypt data the two combination occur number of times, if the combination number of times of the two reaches default amount threshold, such as 10 times, can detection trigger module 12 detect whether information corresponding to this content encrypt data is harassing and wrecking information.Concrete, this detection module 12 can whether by obtaining the concrete information content and user ID, to detect this information be harassing and wrecking information.
Described indicating module 13, in the time that described detection module 12 detects that described information is harassing and wrecking information, indicates described client to tackle described information.
Detection module 12, according to the particular content of this information and user ID, such as according to short message content and telephone number thereof, judges whether this note is harassing and wrecking notes.If detection module 12 is judged as YES, in the time that other clients arrive same information, can tackle this information by indicating module 13 these clients of instruction, and the notice that initiates a message is to user.
Implement the embodiment of the present invention and can obtain respectively content encrypt data corresponding to reception information and mark encrypt data by client, statistical analysis is carried out to the encrypt data of this information content and mark in test side, reach the threshold value of setting at the combination number of times of encrypt data that this content and mark detected, and judging when this reception information is harassing and wrecking information indicates client to tackle, thereby can tackle effectively, in time mass-sending class refuse messages, method is simple.
Refer to Fig. 7, it is the structural representation of the another kind of test side that provides of the embodiment of the present invention, the described test side of the embodiment of the present invention can comprise receiver module 11, detection module 12 and the indicating module 13 of above-mentioned test side, and in embodiments of the present invention, described test side can further include:
Whether enquiry module 14, if the combination number of times of the described content encrypt data that obtains receiving for detection and mark encrypt data thereof reaches default amount threshold, there are the data that match with described mark encrypt data in the encrypt data of inquiry local terminal storage.
In specific embodiment, this content encrypt data and mark encrypt data thereof are that client is encrypted to this information the encrypt data obtaining in the time receiving information, such as by message digest algorithm MD5 the information content to this information and user ID processes respectively and obtains content MD5 data and identify MD5 data.At the content MD5 and the mark MD5 that are receiving client and send, and obtain this content MD5 and mark MD5 reaches default amount threshold in statistics, such as 10 times, can trigger enquiry module 14 and inquire about high in the clouds and whether store the MD5 data that match with this mark MD5.
Notification module 15, while there are not the data that match with described mark encrypt data, notifies described detection module 12 for inquire the encrypt data of local terminal storage at described enquiry module 14.
Further, in embodiments of the present invention, described enquiry module 14 can comprise:
The first acquiring unit 141, for obtaining the preset information intercepting blacklist of local terminal, in described blacklist record comprise carry forbid instruction identification data;
The first query unit 142, for inquire-receive to described mark encrypt data whether match with any one identification data that described blacklist records;
The first determining unit 143, for when the Query Result of described the first query unit 142 is when being, determines that described information is harassing and wrecking information.
Further, described enquiry module 14 can also comprise:
Second acquisition unit 144, for obtaining the preset information intercepting white list of local terminal, has recorded the identification data of preset kind in described white list;
The second query unit 145, for inquire-receive to described mark encrypt data whether match with any one identification data that described white list records;
The second determining unit 146, for when the Query Result of described the second query unit 145 is when being, determines that described information is not harassing and wrecking information.
In specific embodiment, high in the clouds can preset information interception blacklist, in this blacklist, record comprises and carries the identification data of forbidding instruction, once sends the identification data of harassing and wrecking information as mark MD5.
Alternatively, enquiry module 14 is inquired about and in the encrypt data of local terminal storage, whether had the data that match with described mark encrypt data can be in the time that statistics obtains this content MD5 and mark MD5 and reaches default amount threshold, obtain the preset blacklist in high in the clouds by the first acquiring unit 141, and trigger first this mark of query unit 142 inquiry MD5 and whether be present in this blacklist.If the first query unit 142 inquires in this blacklist and has recorded and had this mark MD5, the first determining unit 143 can determine that this information is harassing and wrecking information, can directly indicate this client to tackle this information, further, also can be at other follow-up clients to same information and while asking high in the clouds, directly indicate client to tackle this information.
Further alternatively, white list also can be tackled by preset information in high in the clouds, can record the identification data of preset kind, as each operator or mark MD5 corresponding to subscription information in this white list.Enquiry module 14 is inquired about and in the encrypt data of local terminal storage, whether had the data that match with described mark encrypt data can also be to add up beyond the clouds when obtaining this content MD5 and mark MD5 and reaching default amount threshold, obtain the preset white list in high in the clouds by second acquisition unit 144, and trigger second this mark of query unit 145 inquiry MD5 and whether be present in this white list, when there is this mark MD5 in record in the second query unit 145 inquiries obtain this white list, the second determining unit 146 can determine that described information is not harassing and wrecking information, and high in the clouds is left intact.
Further, if enquiry module 14 inquires in the encrypt data of local terminal storage and does not have the data that match with described mark encrypt data, in this blacklist and white list, do not have this mark MD5 receiving, 15 of notification modules are notified described detection module 12.
Further, in embodiments of the present invention, described detection module 12 can be specifically for:
Send information content request to described client, obtain the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding, and whether according to the mark type of the described information content and described user ID, detecting described information is harassing and wrecking information.
While can there are not the data that match with described mark encrypt data in described enquiry module 14 inquires the encrypt data of local terminal storage in described notification module 15, notify described detection module 12 to send information content request to described client, whether to detect described information as harassing and wrecking information.
Concrete, if enquiry module 14 does not find this user ID, can notify the client of described detection module 12 to next one request (the next content MD5 of transmission and mark MD5 are to the client of test side) to send request particular content and the user ID of obtaining this information by notification module 15, such as obtain particular content and the corresponding number of this note in the time that this information is note, consider according to this content and the type of number whether this number can be put on the blacklist.
Further, in embodiments of the present invention, described test side can further include:
Memory module 16, if obtaining the indicated information of described content encrypt data for detection is harassing and wrecking information, store described mark encrypt data, so that in the time that the described mark encrypt data that the mark encrypt data that obtains and storage detected matches, directly indicate described client to tackle the indicated information of described mark encrypt data.
In specific embodiment, described memory module 16 can be specifically for:
If detecting and obtaining described information is harassing and wrecking information, generate and forbid instruction, described in carrying, forbid that the described mark encrypt data of instruction is input in described blacklist.
Implementing embodiment of the present invention test side can be by carrying out statistical analysis to the encrypt data of the information content getting and mark, and in the time that the combination number of times of encrypt data that this content and mark detected reaches the threshold value of setting, whether inquiry local terminal has recorded corresponding mark encrypt data, if there is record, can directly cause client to tackle this information.Further, if there is not this record, can obtain particular content and the user ID thereof of this information, and in the particular content based on this reception information and mark type detection while being harassing and wrecking information to this information, instruction client is tackled, thereby can tackle effectively, in time mass-sending class refuse messages, method is simple.
Refer to Fig. 8, it is the structural representation of a kind of client of providing of the embodiment of the present invention, described client can specifically be arranged in the terminal equipment such as mobile phone, panel computer, concrete, and described client comprises the first acquisition module 21, the first sending module 22 and blocking module 23.Wherein,
Described the first acquisition module 21, if for receiving information, obtains content encrypt data corresponding to described information and mark encrypt data thereof.
In specific embodiment, this reception information can refer to note, mail etc., comprises the information content and user ID.Concrete, if this reception information is note, this information content can be short message content, this user ID can be telephone number corresponding to this note; If this reception information is mail, this information content can be message body, and this user ID can be email address.
Wherein, described content encrypt data and mark encrypt data thereof are respectively described client the information content to this reception information and user ID are encrypted the encrypt data of acquisition by default cryptographic algorithm.
Alternatively, this default cryptographic algorithm can refer to identical clear data to be encrypted the cryptographic algorithm of the well-determined numerical value of rear generation, such as MD5, SHA etc.
Whether described the first sending module 22, is sent to test side for content encrypt data and mark encrypt data thereof that described the first acquisition module 21 is obtained, be harassing and wrecking information so that described information is detected in described test side.
Described blocking module 23, if for receiving described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
In specific embodiment, the first acquisition module 21 is receiving this information, and after by the first sending module 22, by content encrypt data corresponding this information and mark thereof, encrypt data is sent to test side, if receive the interception instruction that test side issues, can be by blocking module 23 these information of interception, and the prompting that initiates a message, with this interception message of reminding user.
Alternatively, this message notifying includes but not limited to the message notifying of text, voice or picture form.
Implementing the embodiment of the present invention can be by being sent to test side so that test side is detected by the content encrypt data of the information of reception and mark encrypt data thereof, if client receives the interception instruction that this test side issues, tackle this information, and the prompting that initiates a message, thereby effectively, in time mass-sending class refuse messages is tackled,, method is simple.
Refer to Fig. 9, it is the structural representation of the another kind of client that provides of the embodiment of the present invention, the described client of the embodiment of the present invention can comprise the first acquisition module 21, the first sending module 22 and the blocking module 23 of above-mentioned client, in embodiments of the present invention, described client can further comprise:
Detection module 24, detects for the home town ruling by default whether the described information receiving is harassing and wrecking information.
In specific embodiment, client, after receiving information, can be carried out home town ruling judgement by detection module 24, such as whether information described in the keyword match rule detection by default is harassing and wrecking information, in the time meeting this preset rules, can represent that this information is harassing and wrecking information.
Further alternatively, described default home town ruling can comprise that keyword match detects rule, and described keyword match detects rule and comprises default key combination;
Described detection module 24 can be specifically for:
Whether the described information receiving described in detection comprises described key combination, and in testing result when being, determine that described information is harassing and wrecking information; Otherwise, determine that described information is not harassing and wrecking information.
Notification module 25, for detecting that when described detection module 24 described information is when the harassing and wrecking information, notifies described the first acquisition module 21 to obtain content encrypt data corresponding to described information and mark encrypt data thereof.
Described blocking module 23, also, in the time that described detection module 24 detects that described information is harassing and wrecking information, directly tackles described information, and the prompting that initiates a message.
In specific embodiment, be not harassing and wrecking information if detection module 24 judges this information, can notify the first acquisition module 21 to obtain content encrypt data corresponding to this information and mark encrypt data thereof by notification module 25; If it is harassing and wrecking information that detection module 24 judges this information, can directly tackles this information by blocking module 23, and point out user this interception message.
Further, in embodiments of the present invention, described test side can further include:
The second acquisition module 26, if the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding are obtained in the information content request sending for receiving described test side.
The second sending module 27, be encrypted for the information content and the described user ID described the second acquisition module 26 obtained by the second default cryptographic algorithm, and the described information content and described user ID through encryption are sent to described test side, so that whether information is harassing and wrecking information described in described test side.
Further, if receive the information content request that high in the clouds sends, can obtain this information content and mark thereof by the second acquisition module 26, such as trigger the content and the number that obtain this note in the time that this reception information is note, and by the second sending module 27 by through default cryptographic algorithm such as rivest, shamir, adelman RSA is sent to high in the clouds after this short message content and number are encrypted, so that high in the clouds is further detected.
Further, in embodiments of the present invention, described test side can further include:
Registering modules 28, for registering to system, extracts the information content of described information and the authority of user ID to obtain.
It should be noted that, if client information is note, before obtaining the particular content and number thereof of this note, also need to system registry, such as being registered as note radio receiver, to obtain the authority of extracting this note and number thereof.
Implementing embodiment of the present invention client can be in the time receiving information, whether detect this information by home town ruling is harassing and wrecking information, further, detect in this locality when the non-harassing and wrecking information can be by the content encrypt data of the information of reception and mark encrypt data thereof are sent to test side so that whether this information is detected in test side be harassing and wrecking information, further, this client also can be sent to test side by the particular content of this information and mark thereof, so that test side is further detected, in the time receiving the interception instruction that this test side issues, tackle this information, and point out user this interception message, thereby effectively, in time mass-sending class refuse messages is tackled, method is simple.
Referring to Figure 10, is the structural representation of a kind of information intercepting system of providing of the embodiment of the present invention, and concrete, described system comprises: test side 1 and at least one client 2; Wherein,
Described client 2, if for receiving information, obtains content information digest algorithm encrypt data corresponding to described information and mark encrypt data thereof; Whether described content encrypt data and mark encrypt data thereof are sent to described test side 1, be harassing and wrecking information so that described information is detected in described test side;
Described test side 1, the content encrypt data and the mark encrypt data thereof that send for receiving described client; The combination number of times of the described content encrypt data receiving if detect and mark encrypt data thereof reaches default amount threshold, and whether detect the indicated information of described content encrypt data is harassing and wrecking information; If so, indicate described client 2 to tackle described information;
Described client 2, if also for receiving described test side 1 in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
Implement the embodiment of the present invention and can obtain respectively content encrypt data corresponding to reception information and mark encrypt data by client, statistical analysis is carried out to the encrypt data of this information content and mark in test side, reach the threshold value of setting at the combination number of times of encrypt data that this content and mark detected, and judging when this reception information is harassing and wrecking information indicates client to tackle, thereby can tackle effectively, in time mass-sending class refuse messages, method is simple.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " specific embodiment " " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure, material or the feature of this embodiment or example description.In this manual, to the schematic statement of above-mentioned term not must for be identical embodiment or example.And, specific features, structure, material or the feature of description can one or more embodiment in office or example in suitable mode combination.In addition,, not conflicting in the situation that, those skilled in the art can carry out combination and combination by the feature of the different embodiment that describe in this specification or example and different embodiment or example.
In addition, term " first ", " second " be only for describing object, and can not be interpreted as instruction or hint relative importance or the implicit quantity that indicates indicated technical characterictic.Thus, at least one this feature can be expressed or impliedly be comprised to the feature that is limited with " first ", " second ".In description of the invention, the implication of " multiple " is at least two, for example two, and three etc., unless otherwise expressly limited specifically.
Any process of otherwise describing in flow chart or at this or method are described and can be understood to, represent to comprise that one or more is for realizing module, fragment or the part of code of executable instruction of step of specific logical function or process, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can be not according to order shown or that discuss, comprise according to related function by the mode of basic while or by contrary order, carry out function, this should be understood by embodiments of the invention person of ordinary skill in the field.
The logic and/or the step that in flow chart, represent or otherwise describe at this, for example, can be considered to the sequencing list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium, use for instruction execution system, device or equipment (as computer based system, comprise that the system of processor or other can and carry out the system of instruction from instruction execution system, device or equipment instruction fetch), or use in conjunction with these instruction execution systems, device or equipment.With regard to this specification, " computer-readable medium " can be anyly can comprise, device that storage, communication, propagation or transmission procedure use for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wirings, portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), the erasable read-only memory (EPROM or flash memory) of editing, fiber device, and portable optic disk read-only memory (CDROM).In addition, computer-readable medium can be even paper or other the suitable medium that can print described program thereon, because can be for example by paper or other media be carried out to optical scanner, then edit, decipher or process in electronics mode and obtain described program with other suitable methods if desired, be then stored in computer storage.
Should be appreciated that each several part of the present invention can realize with hardware, software, firmware or their combination.In the above-described embodiment, multiple steps or method can realize with being stored in software or the firmware carried out in memory and by suitable instruction execution system.For example, if realized with hardware, the same in another embodiment, can realize by any one in following technology well known in the art or their combination: there is the discrete logic for data-signal being realized to the logic gates of logic function, there is the application-specific integrated circuit (ASIC) of suitable combinational logic gate circuit, programmable gate array (PGA), field programmable gate array (FPGA) etc.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is can carry out the hardware that instruction is relevant by program to complete, described program can be stored in a kind of computer-readable recording medium, this program, in the time carrying out, comprises step of embodiment of the method one or a combination set of.
In addition, the each functional unit in each embodiment of the present invention can be integrated in a processing module, can be also that the independent physics of unit exists, and also can be integrated in a module two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and also can adopt the form of software function module to realize.If described integrated module realizes and during as production marketing independently or use, also can be stored in a computer read/write memory medium using the form of software function module.
The above-mentioned storage medium of mentioning can be read-only memory, disk or CD etc.Although illustrated and described embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, amendment, replacement and modification.

Claims (33)

1. an information intercepting method, is characterized in that, comprising:
Receive content encrypt data and mark encrypt data thereof that client sends, wherein, described content encrypt data is described client is encrypted acquisition encrypt data by the information content of default cryptographic algorithm docking collection of letters breath, described mark encrypt data is described client is encrypted acquisition to the user ID of described information encrypt data by described cryptographic algorithm, and described information comprises the described information content and described user ID;
The combination number of times of the described content encrypt data receiving if detect and mark encrypt data thereof reaches default amount threshold, and whether detect described information is harassing and wrecking information;
If so, indicate described client to tackle described information.
2. the method for claim 1, is characterized in that, whether the described information of described detection is harassing and wrecking information, comprising:
Send information content request to described client, to obtain the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding;
Receive information content request is returned described in described client end response the described information content and described user ID, and whether according to the mark type of the described information content and described user ID, detecting described information is harassing and wrecking information.
3. method as claimed in claim 2, is characterized in that,, before the request of the described client transmission information content, also comprises described:
The combination number of times of the described content encrypt data that obtains receiving if detect and mark encrypt data thereof reaches default amount threshold, in the encrypt data of inquiry local terminal storage, whether has the data that match with described mark encrypt data;
If not, carry out describedly sending information content request to described client, to obtain the step of the user ID that the information content that described content encrypt data is corresponding and described mark encrypt data are corresponding.
4. method as claimed in claim 3, is characterized in that, whether has the data that match with described mark encrypt data in the encrypt data of described inquiry local terminal storage, comprising:
Obtain the preset information intercepting blacklist of local terminal, in described blacklist record comprise carry forbid instruction identification data;
Inquire-receive to described mark encrypt data whether with described blacklist in any one identification data that records match;
If so, determine that described information is harassing and wrecking information.
5. method as claimed in claim 3, is characterized in that, whether has the data that match with described mark encrypt data in the encrypt data of described inquiry local terminal storage, also comprises:
Obtain the preset information intercepting white list of local terminal, in described white list, recorded the identification data of preset kind;
Inquire-receive to described mark encrypt data whether with described white list in any one identification data that records match;
If so, determine that described information is not harassing and wrecking information.
6. the method as described in claim 1-5 any one, is characterized in that, also comprises:
If detecting and obtaining described information is harassing and wrecking information, store described mark encrypt data, so that in the time that the described mark encrypt data that the mark encrypt data that obtains and storage detected matches, directly indicate described client to tackle the indicated information of described mark encrypt data.
7. method as claimed in claim 6, is characterized in that, is harassing and wrecking information if described detection obtains described information, stores described mark encrypt data, specifically carries out:
If detecting and obtaining described information is harassing and wrecking information, obtain described blacklist;
Instruction is forbidden in generation, and forbids that the described mark encrypt data of instruction is input in described blacklist described in carrying.
8. the method as described in claim 1-7 any one, is characterized in that,
Described default cryptographic algorithm comprises message digest algorithm or SHA.
9. an information intercepting method, is characterized in that, comprising:
If the information of receiving, obtain content encrypt data corresponding to described information and mark encrypt data thereof, wherein, described information comprises the information content and user ID, described content encrypt data is the encrypt data that by the first cryptographic algorithm, the described information content is encrypted acquisition, and described mark encrypt data is the encrypt data that by described the first cryptographic algorithm, described user ID is encrypted acquisition;
Whether described content encrypt data and mark encrypt data thereof are sent to test side, be harassing and wrecking information so that described information is detected in described test side;
If receive described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
10. method as claimed in claim 9, is characterized in that, described obtain content encrypt data corresponding to described information and mark encrypt data before, also comprise:
Detect by default home town ruling whether the described information receiving is harassing and wrecking information;
If detect, described information is harassing and wrecking information, directly tackles described information the prompting that initiates a message;
If detect, described information is not harassing and wrecking information, obtains the step of content encrypt data corresponding to described information and mark encrypt data thereof described in carrying out.
11. methods as claimed in claim 10, is characterized in that,
Described default home town ruling comprises that keyword match detects rule, and described keyword match detects rule and comprises default key combination;
Describedly detect by default home town ruling whether the described information receiving is harassing and wrecking information, comprising:
Whether the described information receiving described in detection comprises described key combination;
If testing result is yes, determine that described information is harassing and wrecking information;
If testing result is no, determine that described information is not harassing and wrecking information.
12. methods as described in claim 9-11 any one, is characterized in that, described described content encrypt data and mark encrypt data thereof are sent to test side after, also comprise:
If receive the information content request that described test side sends, obtain the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding;
By the second default cryptographic algorithm, the described information content and described user ID are encrypted, and the described information content and described user ID through encryption are sent to described test side, so that whether information is harassing and wrecking information described in described test side.
13. methods as claimed in claim 9, is characterized in that, if described information is note, described obtain content encrypt data corresponding to described information and mark encrypt data before, also comprise:
Register to system, extract the information content of described information and the authority of user ID to obtain.
14. methods as claimed in claim 9, is characterized in that,
Described the first cryptographic algorithm comprises message digest algorithm or SHA.
15. methods as claimed in claim 12, is characterized in that,
Described the second cryptographic algorithm comprises asymmetric encryption RSA Algorithm.
16. methods as described in claim 9-15 any one, is characterized in that,
Described message notifying comprises the message notifying of text, voice or picture form.
17. 1 kinds of test sides, is characterized in that, comprising:
Receiver module, the content encrypt data and the mark encrypt data thereof that send for receiving client, wherein, described content encrypt data is described client is encrypted acquisition encrypt data by the information content of default cryptographic algorithm docking collection of letters breath, described mark encrypt data is described client is encrypted acquisition to the user ID of described information encrypt data by described cryptographic algorithm, and described information comprises the described information content and described user ID;
Detection module, whether if for detecting that the described content encrypt data receiving and the combination number of times that identifies encrypt data thereof reach default amount threshold, detecting described information is harassing and wrecking information;
Indicating module, in the time that described detection module detects that described information is harassing and wrecking information, indicates described client to tackle described information.
18. test sides as claimed in claim 17, is characterized in that, described detection module specifically for:
Send information content request to described client, obtain the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding, and whether according to the mark type of the described information content and described user ID, detecting described information is harassing and wrecking information.
19. test sides as claimed in claim 18, is characterized in that, also comprise:
Whether enquiry module, if the combination number of times of the described content encrypt data that obtains receiving for detection and mark encrypt data thereof reaches default amount threshold, there are the data that match with described mark encrypt data in the encrypt data of inquiry local terminal storage;
Notification module, while there are not for inquire the encrypt data of local terminal storage at described enquiry module the data that match with described mark encrypt data, notify described detection module to send information content request to described client, whether to detect described information as harassing and wrecking information.
20. test sides as claimed in claim 19, is characterized in that, described enquiry module comprises:
The first acquiring unit, for obtaining the preset information intercepting blacklist of local terminal, in described blacklist record comprise carry forbid instruction identification data;
The first query unit, for inquire-receive to described mark encrypt data whether match with any one identification data that described blacklist records;
The first determining unit, for when the Query Result of described the first query unit is when being, determines that described information is harassing and wrecking information.
21. test sides as claimed in claim 19, is characterized in that, described enquiry module also comprises:
Second acquisition unit, for obtaining the preset information intercepting white list of local terminal, has recorded the identification data of preset kind in described white list;
The second query unit, for inquire-receive to described mark encrypt data whether match with any one identification data that described white list records;
The second determining unit, for when the Query Result of described the second query unit is when being, determines that described information is not harassing and wrecking information.
22. test sides as described in claim 17-21 any one, is characterized in that, also comprise:
Memory module, if obtaining the indicated information of described content encrypt data for detection is harassing and wrecking information, store described mark encrypt data, so that in the time that the described mark encrypt data that the mark encrypt data that obtains and storage detected matches, directly indicate described client to tackle the indicated information of described mark encrypt data.
23. test sides as claimed in claim 22, is characterized in that, described memory module specifically for:
If detecting and obtaining described information is harassing and wrecking information, generate and forbid instruction, described in carrying, forbid that the described mark encrypt data of instruction is input in described blacklist.
24. test sides as described in claim 17-23 any one, is characterized in that,
Described default cryptographic algorithm comprises message digest algorithm or SHA.
25. 1 kinds of clients, is characterized in that, comprising:
The first acquisition module, if for receiving information, obtain content encrypt data corresponding to described information and mark encrypt data thereof, wherein, described information comprises the information content and user ID, described content encrypt data is the encrypt data that by the first cryptographic algorithm, the described information content is encrypted acquisition, and described mark encrypt data is the encrypt data that by described the first cryptographic algorithm, described user ID is encrypted acquisition;
Whether the first sending module, is sent to test side for content encrypt data and mark encrypt data thereof that described the first acquisition module is obtained, be harassing and wrecking information so that described information is detected in described test side;
Blocking module, if for receiving described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
26. clients as claimed in claim 25, is characterized in that, also comprise:
Detection module, detects for the home town ruling by default whether the described information receiving is harassing and wrecking information;
Notification module, for detecting that when described detection module described information is when the harassing and wrecking information, notifies described the first acquisition module to obtain content encrypt data corresponding to described information and mark encrypt data thereof;
Described blocking module, also, in the time that described detection module detects that described information is harassing and wrecking information, directly tackles described information, and the prompting that initiates a message.
27. clients as claimed in claim 26, is characterized in that,
Described default home town ruling comprises that keyword match detects rule, and described keyword match detects rule and comprises default key combination;
Described detection module specifically for:
Whether the described information receiving described in detection comprises described key combination, and in testing result when being, determine that described information is harassing and wrecking information; Otherwise, determine that described information is not harassing and wrecking information.
28. clients as described in claim 25-27 any one, is characterized in that, also comprise:
The second acquisition module, if the information content and user ID corresponding to described mark encrypt data that described content encrypt data is corresponding are obtained in the information content request sending for receiving described test side;
The second sending module, be encrypted for the information content and the described user ID described the second acquisition module obtained by the second default cryptographic algorithm, and the described information content and described user ID through encryption are sent to described test side, so that whether information is harassing and wrecking information described in described test side.
29. clients as claimed in claim 25, is characterized in that, also comprise:
Registering modules, for registering to system, extracts the information content of described information and the authority of user ID to obtain.
30. clients as claimed in claim 25, is characterized in that,
Described the first cryptographic algorithm comprises message digest algorithm or SHA.
31. clients as claimed in claim 28, is characterized in that,
Described the second cryptographic algorithm comprises asymmetric encryption RSA Algorithm.
32. clients as described in claim 25-31 any one, is characterized in that,
Described message notifying comprises the message notifying of text, voice or picture form.
33. 1 kinds of information intercepting systems, is characterized in that, comprising: test side and at least one client; Wherein,
Described client, if for receiving information, obtains content information digest algorithm encrypt data corresponding to described information and mark encrypt data thereof; Whether described content encrypt data and mark encrypt data thereof are sent to described test side, be harassing and wrecking information so that described information is detected in described test side;
Described test side, the content encrypt data and the mark encrypt data thereof that send for receiving described client; The combination number of times of the described content encrypt data receiving if detect and mark encrypt data thereof reaches default amount threshold, and whether detect the indicated information of described content encrypt data is harassing and wrecking information; If so, indicate described client to tackle described information;
Described client, if also for receiving described test side in the interception instruction that detects that described information issues while being harassing and wrecking information, tackle described information, and the prompting that initiates a message.
CN201410253612.1A 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system Expired - Fee Related CN104038491B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410253612.1A CN104038491B (en) 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410253612.1A CN104038491B (en) 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system

Publications (2)

Publication Number Publication Date
CN104038491A true CN104038491A (en) 2014-09-10
CN104038491B CN104038491B (en) 2018-08-17

Family

ID=51469080

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410253612.1A Expired - Fee Related CN104038491B (en) 2014-06-09 2014-06-09 A kind of information intercepting method, apparatus and system

Country Status (1)

Country Link
CN (1) CN104038491B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105578387A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Detection method of disturbance messages in iOS system, device and system
CN105744525A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Method, device and system for mobile communication terminal to identify harassing communication
CN110677251A (en) * 2018-07-03 2020-01-10 中移(杭州)信息技术有限公司 Information processing method, device, medium and equipment
CN117714216A (en) * 2024-02-06 2024-03-15 杭州城市大脑有限公司 Data unauthorized access control method based on encryption of multidimensional unique identification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105744525A (en) * 2014-12-08 2016-07-06 北京奇虎科技有限公司 Method, device and system for mobile communication terminal to identify harassing communication
CN105578387A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Detection method of disturbance messages in iOS system, device and system
CN110677251A (en) * 2018-07-03 2020-01-10 中移(杭州)信息技术有限公司 Information processing method, device, medium and equipment
CN117714216A (en) * 2024-02-06 2024-03-15 杭州城市大脑有限公司 Data unauthorized access control method based on encryption of multidimensional unique identification
CN117714216B (en) * 2024-02-06 2024-04-30 杭州城市大脑有限公司 Data unauthorized access control method based on encryption of multidimensional unique identification

Also Published As

Publication number Publication date
CN104038491B (en) 2018-08-17

Similar Documents

Publication Publication Date Title
EP3552363B1 (en) Near real-time detection of suspicious outbound traffic
EP2666318B1 (en) Method, apparatus, and computer program product for managing unwanted traffic in a wireless network
CN107040494B (en) User account abnormity prevention method and system
US11283743B1 (en) Techniques for scam detection and prevention
US20230085233A1 (en) Cloud-based spam detection
WO2016045191A1 (en) Information processing method and information processing device
CN105263142A (en) Method and device for identifying pseudo base station
CN103763690A (en) Method and device for sending short messages to mobile terminal from detection fake base station
US9633203B2 (en) Spam notification device
CN106973319B (en) Virtual gift display method and system
US20100106781A1 (en) Automatic update of contact information in messaging
CN104954322A (en) Account binding method, device and system
US11233816B2 (en) User-determined network traffic filtering
CN104038491A (en) Information interception method, device and system
CN104010284A (en) Method and device for processing spam short message
US20160142275A1 (en) Method, system and apparatus for detecting instant message spam
KR20200020946A (en) Techniques for Multi-Agent Messaging
CN102611746A (en) Method and system for sharing contact person information
US20130086632A1 (en) System, method, and computer program product for applying a rule to associated events
CN109167669A (en) Message treatment method, calculates equipment and storage medium at device
CN104796519A (en) Terminal
CN106912032B (en) Information processing method, system, client and server
US8463235B1 (en) Protection from telephone phishing
CN114339627A (en) Message centralized control forwarding method
US9928512B2 (en) Intelligent detection of changed user parameters in a system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180817