CN105682059A - Information intercepting method and device - Google Patents

Information intercepting method and device Download PDF

Info

Publication number
CN105682059A
CN105682059A CN201510990579.5A CN201510990579A CN105682059A CN 105682059 A CN105682059 A CN 105682059A CN 201510990579 A CN201510990579 A CN 201510990579A CN 105682059 A CN105682059 A CN 105682059A
Authority
CN
China
Prior art keywords
word
sensitive word
sensitive
information
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510990579.5A
Other languages
Chinese (zh)
Inventor
徐晓利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510990579.5A priority Critical patent/CN105682059A/en
Publication of CN105682059A publication Critical patent/CN105682059A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/332Query formulation
    • G06F16/3329Natural language query formulation or dialogue systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/36Creation of semantic tools, e.g. ontology or thesauri
    • G06F16/374Thesaurus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The embodiment of the invention discloses an information intercepting method. The method comprises following steps of receiving character information; determining whether sensitive words are in the character information; when the sensitive words are in the character information, setting the character information as intercepting information. Further, the embodiment of the invention also discloses an information intercepting device.

Description

A kind of information intercepting method and device
Technical field
The present invention relates to the information security technology of the communications field, particularly relate to a kind of information intercepting method and device.
Background technology
Along with mobile terminal intelligence degree is more and more higher, the application of mobile terminal is also more and more extensive, between a lot of users, and links up such as through transmission Word message between businessman and user.
But owing to the privacy of user is paid little attention to by current social; a lot of companies peddle the privacy information of user even in violation of rules and regulations; the phone number making user is easy to be compromised; some illegal retailers are after the phone number getting user; in order to speculate; often send the junk information such as distribution, swindle, insurance to user, upset the orthobiosis of user.
In prior art, it is possible to intercept according to the number of information sender, but being based on the technology such as pseudo-base station, the transmission number of a lot of junk information is randomly generated, and user cannot predict in advance and intercept, and therefore the effect of this hold-up interception method is poor.
Summary of the invention
For solving above-mentioned technical problem, embodiment of the present invention expectation provides a kind of information intercepting method and device, it is possible to increase the effective percentage of information intercepting, and then improves Consumer's Experience.
The technical scheme is that and be achieved in that:
On the one hand, the embodiment of the present invention provides a kind of information intercepting method, including:
Receive Word message;
Determine in described Word message whether there is sensitive word;
When described Word message exists sensitive word, described Word message is set to intercept information.
Optionally, described determine that whether there is sensitive word in described Word message includes:
Described Word message is divided into N number of word fragment, and described N is the integer more than or equal to 2;
Determine whether i-th word fragment exists sensitive word, described i is more than or equal to 1, less than or equal to the integer of N;
Described when described Word message exists sensitive word, described Word message is set to intercept information and includes:
When described i-th word fragment exists sensitive word, described Word message is set to intercept information.
Optionally, described determine whether described Word message exists sensitive word before, described method also includes:
Receive the sensitive word information of user's input;
According to described sensitive word information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described determine that whether there is sensitive word in described Word message includes:
Determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
Optionally, described determine whether described Word message exists sensitive word before, described method also includes:
Receiving the sensitive word recommendation information that server sends, described sensitive word recommendation information includes multiple sensitive words that described server obtains according to descending utilization rate;
According to described sensitive word recommendation information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described determine that whether there is sensitive word in described Word message includes:
Determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
Optionally, each sensitive word is provided with the interception time period of correspondence;
Described when described Word message exists sensitive word, described Word message is set to intercept information and includes:
When there is sensitive word in described Word message, it is determined that whether current time is positioned at the interception time period of described sensitive word;
If current time is positioned at the interception time period of described sensitive word, described Word message is set to intercept information.
On the other hand, the embodiment of the present invention provides a kind of information intercepting device, including:
First receives unit, is used for receiving Word message;
First determines unit, is used for determining in described Word message whether there is sensitive word;
Unit is set, for when there is sensitive word in described Word message, described Word message being set to intercept information.
Optionally, described first determine unit specifically for:
Described Word message is divided into N number of word fragment, and described N is the integer more than or equal to 2;
Determine whether i-th word fragment exists sensitive word, described i is more than or equal to 1, less than or equal to the integer of N;
Described arrange unit specifically for: when described i-th word fragment exists sensitive word, described Word message is set to intercept information.
Optionally, described device also includes:
Second receives unit, for receiving the sensitive word information of user's input;
Second determines unit, and for according to described sensitive word information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described first determine unit specifically for: determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
Optionally, described device also includes:
3rd receives unit, and for receiving the sensitive word recommendation information that server sends, described sensitive word recommendation information includes multiple sensitive words that described server obtains according to descending utilization rate;
3rd determines unit, and for according to described sensitive word recommendation information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described first determine unit specifically for: determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
Optionally, each sensitive word is provided with the interception time period of correspondence;
Described device also includes:
4th determines unit, for when there is sensitive word in described Word message, it is determined that whether current time is positioned at the interception time period of described sensitive word;
Described arrange unit specifically for: when described Word message exists sensitive word, and current time be positioned at described sensitive word the interception time period time, described Word message is set to intercept information.
Embodiments providing a kind of information intercepting method and device, described information intercepting method includes: receive Word message; Determine in described Word message whether there is sensitive word; When described Word message exists sensitive word, described Word message is set to intercept information. Compared to prior art, no matter whether the number of information sender is known, also no matter the number of information sender is which type of number, as long as the Word message received includes sensitive word, information can be intercepted, improve the effective percentage of information intercepting, and then improve Consumer's Experience.
Accompanying drawing explanation
Fig. 1 is the hardware architecture diagram of a kind of mobile terminal realizing each embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
The schematic flow sheet 1 of a kind of information intercepting method that Fig. 3 provides for the embodiment of the present invention;
The schematic diagram of a kind of sensitive word data base that Fig. 4 provides for the embodiment of the present invention;
The schematic diagram of a kind of new added pages that Fig. 5 provides for the embodiment of the present invention;
A kind of schematic diagram recommending the page that Fig. 6 provides for the embodiment of the present invention;
The schematic diagram of a kind of edit page that Fig. 7 provides for the embodiment of the present invention;
A kind of schematic diagram starting the page that Fig. 8 provides for the embodiment of the present invention;
The schematic diagram of a kind of word-information display page that Fig. 9 provides for the embodiment of the present invention;
The schematic flow sheet 2 of a kind of information intercepting method that Figure 10 provides for the embodiment of the present invention;
The structural representation Fig. 1 of a kind of information intercepting device that Figure 11 provides for the embodiment of the present invention;
The structural representation Fig. 2 of a kind of information intercepting device that Figure 12 provides for the embodiment of the present invention;
The structural representation Fig. 3 of a kind of information intercepting device that Figure 13 provides for the embodiment of the present invention;
The structural representation Fig. 4 of a kind of information intercepting device that Figure 14 provides for the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described. Should be appreciated that specific embodiment described herein is only in order to explain the present invention, is not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing. In follow-up description, use the suffix being used for representing such as " module ", " parts " or " unit " of element only for being conducive to the explanation of the present invention, itself do not have specific meaning. Therefore, " module " and " parts " can mixedly use.
Mobile terminal can be implemented in a variety of manners. Such as, the terminal described in the present invention can include the mobile terminal of such as mobile phone, smart phone, notebook computer, digit broadcasting receiver, personal digital assistant (PDA), panel computer (PAD), portable media player (PMP), guider etc. and the fixed terminal of such as numeral TV, desk computer etc. Hereinafter it is assumed that terminal is mobile terminal. However, it will be understood by those skilled in the art that, except being used in particular for the element of mobile purpose, structure according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram realizing the optional a kind of mobile terminal of the embodiment of the present invention.
Mobile terminal 100 can include wireless communication unit 110, user input unit 130, output unit 150, memorizer 160, controller 180 and power subsystem 190 etc. Fig. 1 illustrates the mobile terminal with various assembly, it should be understood that be not required for implementing all assemblies illustrated. Can alternatively implement more or less of assembly. Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows the radio communication between mobile terminal 100 and wireless communication system or network. Such as, wireless communication unit can include at least one in mobile communication module 112, wireless Internet module 113 and short range communication module 114.
Mobile communication module 112 sends radio signals at least one in base station (such as, access point, node B etc.), exterior terminal and server and/or receives from it radio signal.Such radio signal can include voice call signal, video calling signal or the various types of data sending according to text and/or Multimedia Message and/or receiving.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal. This module can internally or externally be couple to terminal. Wi-Fi (Wireless Internet Access) technology involved by this module can include WLAN (WLAN) (Wi-Fi), WiMAX (Wibro), worldwide interoperability for microwave accesses (Wimax), high-speed downlink packet accesses (HSDPA) etc.
Short range communication module 114 is the module for supporting junction service. Some examples of short-range communication technology include bluetoothTM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybeeTMEtc..
User input unit 130 can generate key input data to control the various operations of mobile terminal according to the order of user's input. User input unit 130 allows user to input various types of information, and can include keyboard, metal dome, touch pad (such as, detection due to touched and cause resistance, pressure, electric capacity etc. the sensitive component of change), roller, rocking bar etc. Especially, when touch pad is superimposed upon on display unit 151 as a layer, it is possible to form touch screen.
Display unit 151 may be displayed on the information processed in mobile terminal 100. Such as, when mobile terminal 100 is in telephone calling model, display unit 151 can show the user interface (UI) relevant with call or other communicate (such as, text messaging, multimedia file download etc.) or graphic user interface (GUI). When being in video calling pattern or image capture mode when mobile terminal 100, display unit 151 can show the image of image and/or the reception caught, UI or GUI illustrating video or image and correlation function etc.
Meanwhile, when display unit 151 and touch pad as a layer superposed on one another to form touch screen time, display unit 151 can serve as input equipment and output device. Display unit 151 can include at least one in liquid crystal display (LCD), thin film transistor (TFT) LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. Some in these display may be constructed such that transparence is to allow user to watch from outside, and this is properly termed as transparent display, and typical transparent display can be such as TOLED (transparent organic light emitting diode) display etc. According to the specific embodiment wanted, mobile terminal 100 can include two or more display units (or other display device), such as, mobile terminal can include outernal display unit (not shown) and inner display unit (not shown). Touch screen can be used for detecting touch input pressure and touch input position and touch input area.
Memorizer 160 can store the process performed by controller 180 and control software program etc. of operation, or can temporarily store and export the data (such as, telephone directory, message, still image, video etc.) that maybe will export. And, memorizer 160 can store the vibration about the various modes exported when touching and being applied to touch screen and the data of audio signal.
Memorizer 160 can include the storage medium of at least one type, described storage medium includes flash memory, hard disk, multimedia card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static random-access memory (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc.And, mobile terminal 100 can be connected the network storage device cooperation of the storage function performing memorizer 160 with by network.
Controller 180 generally controls the overall operation of mobile terminal. Such as, controller 180 performs the control relevant to voice call, data communication, video calling etc. and process.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides the suitable electric power operated needed for each element and assembly.
Various embodiment described herein can to use such as computer software, hardware or its any combination of computer-readable medium to implement. Hardware is implemented, embodiment described herein can pass through to use application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processor, controller, microcontroller, microprocessor, at least one that is designed to perform in the electronic unit of function described herein to implement, in some cases, such embodiment can be implemented in controller 180. Implementing for software, the embodiment of such as process or function can be implemented with allowing the independent software module performing at least one function or operation. Software code can be implemented by the software application (or program) write with any suitable programming language, and software code can be stored in memorizer 160 and be performed by controller 180.
So far, mobile terminal is described according to its function. Below, for the sake of brevity, by the slide type mobile terminal in the various types of mobile terminals describing such as folded form, board-type, oscillating-type, slide type mobile terminal etc. exemplarily. Therefore, the present invention can be applied to any kind of mobile terminal, and is not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that utilization operates via such as wired and wireless communication system and the satellite-based communication system of frame or packet transmission data.
The communication system being wherein operable to according to the mobile terminal of the present invention is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer. Such as, the air interface used by communication system includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and UMTS (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc. As non-limiting example, as explained below relates to cdma communication system, but such instruction is equally applicable to other type of system.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 100, multiple base station (BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 280. MSC280 is configured to form interface with Public Switched Telephony Network (PSTN) 290. MSC280 is also structured to and the BSC275 formation interface that can be couple to base station 270 via back haul link. Back haul link can construct according to any one in some known interfaces, and described interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL. It will be appreciated that system as shown in Figure 2 can include multiple BSC275.
Each BS270 can service one or more subregion (or region), by each subregion of multidirectional antenna or the antenna covering pointing to specific direction radially away from BS270.Or, each subregion can be covered by two or more antennas for diversity reception. Each BS270 may be constructed such that support multiple frequencies distribution, and the distribution of each frequency has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel. BS270 can also be referred to as base station transceiver subsystem (BTS) or other equivalent terms. In this case, term " base station " may be used for broadly representing single BSC275 and at least one BS270. Base station can also be referred to as " cellular station ". Or, each subregion of specific BS270 can be referred to as multiple cellular station.
As shown in Figure 2, broadcast singal is sent in system the mobile terminal 100 of operation by broadcsting transmitter (BT) 295. The broadcast reception module of mobile terminal 100 can receive the broadcast singal sent by BT295. In fig. 2 it is shown that several global positioning systems (GPS) satellite 300. Satellite 300 helps to position at least one in multiple mobile terminals 100.
In fig. 2, depict multiple satellite 300, it is understood that be, it is possible to use any number of satellite obtains useful location information. The GPS module of mobile terminal 100 is generally configured to coordinate the location information wanted with acquisition with satellite 300. Substitute GPS tracking technique or outside GPS tracking technique, it is possible to use other technology of the position of mobile terminal can be followed the tracks of. It addition, at least one gps satellite 300 can optionally or additionally process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link signal from various mobile terminals 100. Mobile terminal 100 generally participates in call, information receiving and transmitting communicates with other type of. Each reverse link signal that certain base station 270 receives is processed in specific BS270. The data obtained are forwarded to relevant BSC275. BSC provides call resource distribution and the mobile management function of the coordination of soft switching process included between BS270. The data received also are routed to MSC280 by BSC275, and it provides the extra route service for forming interface with PSTN290. Similarly, PSTN290 and MSC280 forms interface, and MSC and BSC275 forms interface, and BSC275 correspondingly controls BS270 so that forward link signals to be sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described.
Embodiment one
The embodiment of the present invention provides a kind of information intercepting method, is applied to terminal, and described terminal can be mobile phone, panel computer, and other are able to receive that the terminal of Word message, and this is not limited by the embodiment of the present invention. As it is shown on figure 3, described information intercepting method includes:
Step 301, reception Word message.
Example, described Word message can be note, Fetion, or the information received in other instant messengers, and this is not limited by the embodiment of the present invention.
Illustrating for mobile phone, mobile phone is generally connected with base station radio, and the information that information sender sends, by base station transfer, is then sent to mobile phone, and therefore generally mobile phone receives Word message by base station. But, some illegal retailers are in order to improve the success rate of fishing swindle, pseudo-base station can be adopted to send deceptive information on a large scale, therefore the information that mobile phone receives is likely to and derives from pseudo-base station, any number and pseudo-base station can disguise oneself as, or even some official's numbers, the phone 10086 of such as China Mobile, the phone 95566 of Bank of China, or the 95588 of the Industrial and Commercial Bank of China so that user believes the verity of word content, lure that user is taken in into, therefore, simple number catching rubbish information of passing through can not meet user's request.
Step 302, determine in described Word message whether there is sensitive word.
Example, sensitive word data base can be set in the terminal, described sensitive word data base includes all sensitive words that user's needs carry out intercepting, after receiving Word message, it is possible to determine whether there are all sensitive words that sensitive word data base includes in Word message successively.
Example, described sensitive word data base can store sensitive word according to the form of list, and as shown in Figure 4, this list have recorded all sensitive words in sensitive word data base successively in described list. In practical application, it is also possible to obtain the use probability of each sensitive word, then according to use the order of the descending arrangement sensitive word of probability, it is possible to increase judge the efficiency that whether there is sensitive word in Word message. Optionally, sensitive word data base can also record the interception time that each sensitive word is corresponding, such as, the refuse messages that the used car that nearest user receives is bought is more, owing to user is currently without the plan of buying car, it is likely to after half a year and is only possible to out rate buying car, therefore can be that to arrange the interception time be on July 1,1 day to 2016 January in 2016 to sensitive word " buying car ", only within the interception time period, just the note " buying car " occur is intercepted, exceed this time period, stop the note to " buying car " occurs and intercept. Owing to user can independently arrange the interception time of sensitive word, improve the motility of information intercepting.
Optionally, described sensitive word data base can also arrange what's new, example, user can click the region 401 in Fig. 4, then new added pages is opened, as it is shown in figure 5, user inputs the sensitive word needing to intercept in newly-increased sensitive word input frame, then click on, sensitive word can have been increased in sensitive word data base. Meanwhile, user is when the newly-increased sensitive word of input, it is also possible to be simultaneously entered the interception time of newly-increased sensitive word, namely in the interception time input frame of new added pages, input the interception time of newly-increased sensitive word, after having inputted, click button, the operation of newly-increased sensitive word can have been completed. If being not desired to input, it is also possible to click cancel button.
Optionally, described sensitive word data base can also arrange recommendation function, example, user can click the region 402 in Fig. 4, then opens the recommendation page, as shown in Figure 6, showing multiple sensitive words that server is recommended on the described recommendation page, the plurality of sensitive word can be that the user that server is drawn by data analysis intercepts higher sensitive word, and described data analysis can be data mining, artificial intelligences etc., this is not limited by the embodiment of the present invention. User can select to recommend the sensitive word on the page, and clicks importing button, and the sensitive word chosen is stored in sensitive word data base. At the same time it can also be arrange the interception time for each sensitive word being stored in.
Optionally, described sensitive word data base can also arrange editting function, for the interception time of each sensitive word in editor's sensitivity word data base, example, user can click any one sensitive word in Fig. 4, then opens the edit page of this sensitive word, as shown in Figure 7, showing the sensitive word needing to carry out editing and the interception time editing frame of this sensitive word on described edit page, user inputs the interception time of this sensitive word in described interception time editing frame.
Optionally, described sensitive word data base can also arrange startup function, example, user can click the region 403 in Fig. 4, is then on the page, as shown in Figure 8, the described startup page is provided with the startup button 801 intercepting function, when starting button 801 and being in open mode, illustrate that user needs to carry out information intercepting, then intercept function on;When starting button 801 and being closed, illustrate that user needs not carry out information intercepting, then intercept function and close. This startup page can also arrange backup button 802 simultaneously, if backup button 802 is in open mode, illustrate that user needs sensitive word data base is backed-up, then by sensitive word DB Backup to server, in order to the sensitive word data base that server is uploaded according to each user carries out data analysis. The time that user will not frequently use terminal generally can be selected to be backed-up. If backup button 802 is closed, illustrating that sensitive word data base need not be backed-up by user, now sensitive word data base will not be backed-up. But generally, it is proposed that open backup button 802, unnecessary data traffic so can be avoided to waste.
Step 103, when there is sensitive word in described Word message, described Word message is set to intercept information.
Example, when described Word message exists sensitive word, illustrate that this Word message is probably the refuse messages that user does not want to see that, therefore this information can be set to intercept information, do not show in general information list. In order to save the memory space of terminal, it is also possible to directly will appear from the Word message of sensitive word and delete. But, it is not that each occurs that the Word message induction user of sensitive word is taken in, a portion is also likely to be normal Word message, only relate to sensitive word by chance, if such Word message is also deleted as intercept information, may result in user and lose important information, affect Consumer's Experience. Therefore, in practical application, it is possible to terminal arranges intercept information list again, this intercept information list have recorded all intercepted Word messages, in order to user checks.
Example, the word-information display page of terminal can be as shown in Figure 9, the described word-information display page shows the Word message not intercepted sequentially in time, and be provided with intercept information and check button 901, when user needs to check intercept information, intercept information can be clicked and check button 901, the now terminal demonstration intercept information display page 902, the described intercept information display page 902 shows all Word messages being set to intercept information sequentially in time, each intercept information can be operated by user, such as, when user chooses intercept information A for a long time, deletion button 903 can be ejected, user clicks this deletion button 903, intercept information A can be deleted.
Embodiments provide a kind of information intercepting method, including: receive Word message; Determine in described Word message whether there is sensitive word; When described Word message exists sensitive word, described Word message is set to intercept information. Compared to prior art, no matter whether the number of information sender is known, also no matter the number of information sender is which type of number, as long as the Word message received includes sensitive word, information can be intercepted, improve the effective percentage of information intercepting, and then improve Consumer's Experience.
Embodiment two
The embodiment of the present invention provides a kind of information intercepting method, as shown in Figure 10, and including:
Step 1001, sensitive word data base is set, performs step 1002.
Example, it is possible to the sensitive word information according to user's input, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word. Such as, user buys house the plan of buying car currently without loan, therefore can by " loan ", " buying house ", " buying car " these three word is input to terminal as sensitive word, and terminal is according to " loan ", " buy house ", " buying car " these three word, sensitive word data base is set.
Example, can also first receive the sensitive word recommendation information that server sends, described sensitive word recommendation information includes multiple sensitive words that described server obtains according to descending utilization rate, such as, the sensitive word that multiple terminals can be uploaded by server carries out data analysis, and be ranked up according to utilization rate is descending, and obtain front 20 sensitive words and generate sensitive word recommendation information and be sent to terminal, then the sensitive word recommendation information that terminal can send according to server, it is determined that sensitive word data base.
Step 1002, reception Word message, perform step 1003.
Example, the Word message that terminal receives can be note, Fetion, it is also possible to being the information of the word class that other chat softwares receive, this is not limited by the embodiment of the present invention.
Step 1003, described Word message is divided into N number of word fragment, performs step 1004.
Example, after terminal receives Word message, it is possible to Word message first carries out segmentation, and each word fragment includes at least one word, and described N is the integer more than or equal to 2.
Such as, according to 3GPP (3rdGenerationPartnershipProject, third generation partner program) agreement, Word message content is if GSM is (GlobalSystemforMobilecommunication, global system for mobile communications) coding, the greatest length of short message is 160 characters, long SMS every length is 163 characters, can be now Word message segmentation according to character, the number of characters assuming each word fragment is 50, then N, described G are the number of characters that Word message is total. If Unicode (ten thousand country codes) coding, the greatest length of short message is 70 Chinese characters, long SMS every length is 67 Chinese characters, can be now Word message segmentation according to Chinese character number, owing to China's terminal is mainly Chinese short message, so the Chinese character number of each word fragment can be set to 70, thenDescribed H is the Chinese character number that Word message is total.
Step 1004, acquisition i-th word fragment, described i=1, perform step 1005.
Example, it is possible to according to the tandem of Word message, obtain first word fragment.
Step 1005, determine in i-th word fragment whether there is sensitive word, when i-th word fragment is absent from sensitive word, perform step 1006; When i-th word fragment exists sensitive word, perform step 1009.
Example, it is assumed that sensitive word data base includes " loan ", " buying house ", " buying car " these three sensitive word, after getting i-th word fragment, it is possible to judges whether described i-th word fragment includes " loan " successively, " buying house ", " buying car ". If i-th word fragment includes described " loan ", " buying house ", at least one of " buying car " these three sensitive word, namely can determine that in described i-th word fragment there is sensitive word. If i-th word fragment does not include described " loan ", " buying house ", any one of " buying car " these three sensitive word, namely can determine that in described i-th word fragment and be absent from sensitive word.
Step 1006, determine that whether i is more than or equal to N, if i is less than N, perform step 1007; If i is more than or equal to N, perform step 1008.
Example, when i-th word fragment is absent from sensitive word, can not illustrate whole Word message is all absent from sensitive word, can only illustrate front i-1 word fragment is absent from sensitive word, and whether N-i follow-up word fragment includes sensitive word, in addition it is also necessary to continue to judge.
Step 1007, by i+1 assignment in i, perform step 1005.
Example, in order to ensure the accuracy intercepted, need to obtain the determination that each word fragment is made whether to there is sensitive word successively, when being therefore absent from sensitive word in determining i-th word fragment, obtain i+1 word fragment, and continue executing with step 1004, it is determined that whether next word fragment includes sensitive word.
Step 1008, described Word message being set to general information, this flow process terminates.
Example, if i is more than or equal to N, illustrate that all word fragments divided by whole Word message have been sequentially carried out to determine, each section of word fragment does not all include sensitive information, then illustrate that this Word message is safe, it is made without intercepting, therefore described Word message can be set to general information.
Step 1009, described Word message is set to intercept information.
Example, when there is sensitive word in i-th word fragment, illustrate now Word message to have occurred in that sensitive word, no matter follow-up whether N-i word fragment exists sensitive word, this Word message can be determined that the information needing to carry out intercepting, in order to save resource, it is possible to do not carry out further fragments, directly described Word message is set to intercept information.
It should be noted that; the sequencing of the information intercepting method step that the embodiment of the present invention provides can suitably adjust; step can also according to circumstances increase and decrease accordingly; any those familiar with the art is in the technical scope that the invention discloses; the method that can readily occur in change; all should be encompassed within protection scope of the present invention, therefore repeat no more.
Embodiments provide a kind of information intercepting method, compared to prior art, no matter whether the number of information sender is known, also no matter the number of information sender is which type of number, as long as the Word message received includes sensitive word, information can be intercepted, improve the effective percentage of information intercepting, and then improve Consumer's Experience.
Embodiment three
The embodiment of the present invention provides a kind of information intercepting device 110, as shown in figure 11, and including:
First receives unit 1101, is used for receiving Word message.
First determines unit 1102, is used for determining in described Word message whether there is sensitive word.
Unit 1103 is set, for when there is sensitive word in described Word message, described Word message being set to intercept information.
So, no matter the number of information sender whether it can be seen that also no matter the number of information sender is which type of number, as long as the Word message received includes sensitive word, information can be intercepted, improve the effective percentage of information intercepting, and then improve Consumer's Experience.
Optionally, described first determine unit 1102 specifically for: described Word message is divided into N number of word fragment, and described N is the integer more than or equal to 2; Determine whether i-th word fragment exists sensitive word, described i is more than or equal to 1, less than or equal to the integer of N. Described arrange unit 1103 specifically for: when described i-th word fragment exists sensitive word, described Word message is set to intercept information.
Optionally, as shown in figure 12, described device 110 also includes: second receives unit 1104, for the sensitive word information for receiving user's input. Second determines unit 1105, for according to described sensitive word information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word. Described first determine unit 1102 specifically for: determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
Optionally, as shown in figure 13, described device 110 also includes: the 3rd receives unit 1106, and for receiving the sensitive word recommendation information that server sends, described sensitive word recommendation information includes multiple sensitive words that described server obtains according to descending utilization rate.3rd determines unit 1107, for according to described sensitive word recommendation information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word. Described first determine unit 1102 specifically for: determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
Optionally, as shown in figure 14, each sensitive word is provided with the interception time period of correspondence; Described device 110 also includes: the 4th determines unit 1108, for when there is sensitive word in described Word message, it is determined that whether current time is positioned at the interception time period of described sensitive word; Described arrange unit 1103 specifically for: when described Word message exists sensitive word, and current time be positioned at described sensitive word the interception time period time, described Word message is set to intercept information.
It should be noted that first, those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the device of foregoing description and the specific works process of unit, it is possible to reference to the corresponding process in preceding method embodiment, do not repeat them here.
Second, in actual applications, described first determines unit 1102, unit 1103 is set, second receives unit 1104, second determines unit 1105, 3rd determines that unit 1107 and the 4th determines that unit 1108 all can by the central processing unit (CentralProcessingUnit being arranged in information intercepting device 110, CPU), microprocessor (MicroProcessorUnit, MPU), digital signal processor (DigitalSignalProcessor, DSP), or field programmable gate array (FieldProgrammableGateArray, etc. FPGA) realize. described first reception unit 1101 and the 3rd reception unit 1106 can be realized by wireless receiving module or limited acceptance module.
Embodiments provide a kind of information intercepting device, including: first receives unit, is used for receiving Word message. First determines unit, is used for determining in described Word message whether there is sensitive word. Unit is set, for when there is sensitive word in described Word message, described Word message being set to intercept information. Compared to prior art, no matter whether the number of information sender is known, also no matter the number of information sender is which type of number, as long as the Word message received includes sensitive word, information can be intercepted, improve the effective percentage of information intercepting, and then improve Consumer's Experience.
The above, be only presently preferred embodiments of the present invention, is not intended to limit protection scope of the present invention.

Claims (10)

1. an information intercepting method, it is characterised in that including:
Receive Word message;
Determine in described Word message whether there is sensitive word;
When described Word message exists sensitive word, described Word message is set to intercept information.
2. method according to claim 1, it is characterised in that described determine that whether there is sensitive word in described Word message includes:
Described Word message is divided into N number of word fragment, and described N is the integer more than or equal to 2;
Determine whether i-th word fragment exists sensitive word, described i is more than or equal to 1, less than or equal to the integer of N;
Described when described Word message exists sensitive word, described Word message is set to intercept information and includes:
When described i-th word fragment exists sensitive word, described Word message is set to intercept information.
3. method according to claim 1 and 2, it is characterised in that described determine whether described Word message exists sensitive word before, described method also includes:
Receive the sensitive word information of user's input;
According to described sensitive word information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described determine that whether there is sensitive word in described Word message includes:
Determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
4. method according to claim 1 and 2, it is characterised in that described determine whether described Word message exists sensitive word before, described method also includes:
Receiving the sensitive word recommendation information that server sends, described sensitive word recommendation information includes multiple sensitive words that described server obtains according to descending utilization rate;
According to described sensitive word recommendation information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described determine that whether there is sensitive word in described Word message includes:
Determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
5. method according to claim 1 and 2, it is characterised in that each sensitive word is provided with the interception time period of correspondence;
Described when described Word message exists sensitive word, described Word message is set to intercept information and includes:
When there is sensitive word in described Word message, it is determined that whether current time is positioned at the interception time period of described sensitive word;
If current time is positioned at the interception time period of described sensitive word, described Word message is set to intercept information.
6. an information intercepting device, it is characterised in that including:
First receives unit, is used for receiving Word message;
First determines unit, is used for determining in described Word message whether there is sensitive word;
Unit is set, for when there is sensitive word in described Word message, described Word message being set to intercept information.
7. device according to claim 6, it is characterised in that
Described first determine unit specifically for:
Described Word message is divided into N number of word fragment, and described N is the integer more than or equal to 2;
Determine whether i-th word fragment exists sensitive word, described i is more than or equal to 1, less than or equal to the integer of N;
Described arrange unit specifically for: when described i-th word fragment exists sensitive word, described Word message is set to intercept information.
8. the device according to claim 6 or 7, it is characterised in that described device also includes:
Second receives unit, for receiving the sensitive word information of user's input;
Second determines unit, and for according to described sensitive word information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described first determine unit specifically for: determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
9. the device according to claim 6 or 7, it is characterised in that described device also includes:
3rd receives unit, and for receiving the sensitive word recommendation information that server sends, described sensitive word recommendation information includes multiple sensitive words that described server obtains according to descending utilization rate;
3rd determines unit, and for according to described sensitive word recommendation information, it is determined that sensitive word data base, described sensitive word data base includes multiple sensitive word;
Described first determine unit specifically for: determine at least one sensitive word whether existing in the plurality of sensitive word in described Word message.
10. the device according to claim 6 or 7, it is characterised in that each sensitive word is provided with the interception time period of correspondence;
Described device also includes:
4th determines unit, for when there is sensitive word in described Word message, it is determined that whether current time is positioned at the interception time period of described sensitive word;
Described arrange unit specifically for: when described Word message exists sensitive word, and current time be positioned at described sensitive word the interception time period time, described Word message is set to intercept information.
CN201510990579.5A 2015-12-24 2015-12-24 Information intercepting method and device Pending CN105682059A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510990579.5A CN105682059A (en) 2015-12-24 2015-12-24 Information intercepting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510990579.5A CN105682059A (en) 2015-12-24 2015-12-24 Information intercepting method and device

Publications (1)

Publication Number Publication Date
CN105682059A true CN105682059A (en) 2016-06-15

Family

ID=56189616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510990579.5A Pending CN105682059A (en) 2015-12-24 2015-12-24 Information intercepting method and device

Country Status (1)

Country Link
CN (1) CN105682059A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447239A (en) * 2016-11-21 2017-02-22 北京字节跳动科技有限公司 Auditing method and device for data release
CN109194636A (en) * 2018-08-23 2019-01-11 吾达软件(武汉)股份有限公司 A kind of electronic information content release processing method and system
CN110162616A (en) * 2019-05-22 2019-08-23 广州虎牙信息科技有限公司 Text filtering method, system, equipment and storage medium
CN111093188A (en) * 2019-12-05 2020-05-01 任子行网络技术股份有限公司 Method and device for monitoring harmful Bluetooth information
WO2021087747A1 (en) * 2019-11-05 2021-05-14 深圳市欢太科技有限公司 Method and apparatus for processing push content, and electronic device and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068154A (en) * 2006-07-27 2007-11-07 腾讯科技(深圳)有限公司 Junk information filtering method and device
CN101815262A (en) * 2010-04-13 2010-08-25 深圳市五巨科技有限公司 Method and device for shielding spam short messages of mobile terminal
CN103179530A (en) * 2011-12-26 2013-06-26 中国移动通信集团设计院有限公司 Method and device for intercepting short messages
CN103995834A (en) * 2014-04-24 2014-08-20 小米科技有限责任公司 Sensitive information detection method and related device
CN104168548A (en) * 2014-08-21 2014-11-26 北京奇虎科技有限公司 Short message intercepting method and device and cloud server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068154A (en) * 2006-07-27 2007-11-07 腾讯科技(深圳)有限公司 Junk information filtering method and device
CN101815262A (en) * 2010-04-13 2010-08-25 深圳市五巨科技有限公司 Method and device for shielding spam short messages of mobile terminal
CN103179530A (en) * 2011-12-26 2013-06-26 中国移动通信集团设计院有限公司 Method and device for intercepting short messages
CN103995834A (en) * 2014-04-24 2014-08-20 小米科技有限责任公司 Sensitive information detection method and related device
CN104168548A (en) * 2014-08-21 2014-11-26 北京奇虎科技有限公司 Short message intercepting method and device and cloud server

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447239A (en) * 2016-11-21 2017-02-22 北京字节跳动科技有限公司 Auditing method and device for data release
CN109194636A (en) * 2018-08-23 2019-01-11 吾达软件(武汉)股份有限公司 A kind of electronic information content release processing method and system
CN110162616A (en) * 2019-05-22 2019-08-23 广州虎牙信息科技有限公司 Text filtering method, system, equipment and storage medium
WO2021087747A1 (en) * 2019-11-05 2021-05-14 深圳市欢太科技有限公司 Method and apparatus for processing push content, and electronic device and storage medium
CN111093188A (en) * 2019-12-05 2020-05-01 任子行网络技术股份有限公司 Method and device for monitoring harmful Bluetooth information
CN111093188B (en) * 2019-12-05 2023-04-07 任子行网络技术股份有限公司 Method and device for monitoring harmful Bluetooth information

Similar Documents

Publication Publication Date Title
CN106550146A (en) A kind of chat message dispensing device and method
CN106648369A (en) Switching device and method for application program
CN105682059A (en) Information intercepting method and device
CN106254557A (en) Individual's stroke intelligently pushing method and device
CN105303398A (en) Information display method and system
CN105306736A (en) Message reminding mobile terminal and message reminding method
CN105681561A (en) Advertisement blocking device and method
CN106331330A (en) Automatic application program sequencing system and method
CN104793849A (en) Application icon display method and device
CN105094555A (en) Method and device for switching application program through swipe gesture
CN105739820A (en) Message prompt display method and device
CN106034069A (en) Method for controlling push message display and mobile terminal
CN104809221A (en) Recommending method for music information and device
CN105792327A (en) Wireless access method, mobile terminal and server
CN105263195A (en) Data transmission device and method
CN106682062A (en) URL navigation processing method and terminal
CN105611071A (en) Schedule information display method and terminal
CN104780278B (en) Route generation method based on communication data and device
CN106453849A (en) Group chat interface display method and mobile terminal
CN105335055A (en) Self-response type realization method and system of menu as well as terminal equipment
CN105491221B (en) A kind of functional module divides and the processing method and terminal of centralized displaying
CN105096962A (en) Information processing method and terminal
CN104657484A (en) Method, device and system for downloading application software
CN104898927B (en) The method and device of information search
CN105681434A (en) Application data synchronization method and device of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160615

RJ01 Rejection of invention patent application after publication