CN107613474A - A kind of method of SMS network supervision - Google Patents

A kind of method of SMS network supervision Download PDF

Info

Publication number
CN107613474A
CN107613474A CN201710864353.XA CN201710864353A CN107613474A CN 107613474 A CN107613474 A CN 107613474A CN 201710864353 A CN201710864353 A CN 201710864353A CN 107613474 A CN107613474 A CN 107613474A
Authority
CN
China
Prior art keywords
transmission code
character
languages
message
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710864353.XA
Other languages
Chinese (zh)
Inventor
刘三满
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanxi Police College
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710864353.XA priority Critical patent/CN107613474A/en
Publication of CN107613474A publication Critical patent/CN107613474A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of SMS, including SMS, handset Wechat message interior network supervision method, it is related to technical field of communication network, the transmission code that calling party sends is identified suspect message after languages identify, sensitive vocabulary identifies first;Secondly manual identified is carried out to suspect message, improves recognition accuracy, avoid misrecognition;The invalid message finally confirmed to manual identified confirms its illegal grade, is handled and reported to safety management department accordingly according to illegal grade.This method can identify a variety of SMSs by specially treated, and recognition accuracy is high, just find and prevent in time at the beginning of criminal offence occurs, be capable of the safety of powerful guarantee people's lives and properties.

Description

A kind of method of SMS network supervision
Technical field
The present invention relates to technical field of communication network, more particularly to a kind of method of SMS network supervision.
Background technology
The transmission of SMS be telecom operators on its SMS platform, according to agreement agreement and unified coding Rule come to transmission character carry out coding transmission.Such as China's telecommunication department according to CMPT agreements and unified coding standard to short message Breath is encoded and sent, referred to herein as transmission code.Transmission code is sent to calling party's mobile short-message by calling party base station Center, then sent by callee base station to the mobile phone terminal of callee, content of short message can be shown by carrying out decoding.
With developing rapidly for mobile communication business, the people to be communicated using short message is also more and more, but due to Using the complexity of crowd, the situation that illegal activity is carried out by short message is also increasingly serious.More not When method molecule propagates such as violence, salaciousness information using the short message Jing Guo specially treated, existing short message monitoring and managing method Have begun to seem unable to do what one wishes.
The content of the invention
The embodiment provides a kind of method of SMS network supervision, to solve to deposit in the prior art The problem of.
A kind of method of SMS network supervision, the described method comprises the following steps:
The transmission code from calling party is received, inquiry code character corresponding with the transmission code is concentrated in database Character, judge languages corresponding to character;
If only existing the coding of a languages in the transmission code, judge to compile with the presence or absence of symbol in the transmission code Code;
String encoding corresponding to the transmission code is compiled according to symbol if it symbolic coding be present in the transmission code Code is divided into multiple character strings, by character Series Code corresponding to the transmission code if symbolic coding is not present in the transmission code Code is divided into multiple character strings according to the division rule of setting;
According to languages corresponding to transmission code, obtained multiple character strings and the sensitive vocabulary of the storage in database will be divided Word in corpus is compareed, if sensitive Lexical Similarity is more than predetermined value with the corpus in character string, It is suspect message then to think the short message;
If sensitive Lexical Similarity is less than or equal to predetermined value with the corpus in character string, by each character Character inside string carries out independent assortment, and the character in the character in each character string and other character strings is carried out freely Combination, obtains multiple character strings, then these character strings are compareed with the word in the corpus, if in character string and Sensitive Lexical Similarity is more than predetermined value in the corpus, then it is assumed that the short message is suspect message;
For suspect message, manual identified is carried out, confirms as invalid message or legitimate messages;
The information of invalid message calling party is sent to safety management department.
Preferably, before the information of invalid message calling party is sent into safety management department, methods described also includes:
The sensitive vocabulary in invalid message is extracted, the illegal grade of invalid message, including Gao Fei are determined according to sensitive vocabulary Method grade and low illegal grade;
For high-grade illegal short message, reported in time to safety management department, by the telephone number of calling party and Name, address information are sent to safety management department in the lump;For the illegal short message of inferior grade, inquiry calling party is for a period of time The illegal situation of the short message of interior transmission, should if the invalid message quantity sent in this period exceedes the value of setting The telephone number and name of calling party, address information report are to safety management department.
Preferably, if in character string or between character string the obtained character string of character independent assortment with it is quick in the corpus Sense Lexical Similarity is less than or equal to predetermined value, then it is assumed that the short message is legitimate messages;
After manual identified confirms short message for legitimate messages, the legitimate messages are sent to called according to called party information On the communication terminal of side.
Preferably, if the coding of multiple languages in the transmission code be present, each languages are corresponded in code by transmitting Coding separates, and the son transmission code according to the sequential concatenation in former transmission code into multiple single languages, by the sub- transmission code Or transmission code carries out subsequent treatment using identical method.
Preferably, in the son transmission code in splitting transmission code, the former coding for transmitting each languages in code is calculated first and is accounted for The ratio of editor-in-chief's number of codes, the maximum languages of ratio are main languages, and other keep original position as time languages, the coding of subject kind It is motionless, the coding of secondary languages is taken out to one sentence of composition respectively.
A kind of method of SMS network supervision in the embodiment of the present invention, the transmission code that calling party sends is passed through first Suspect message is identified after crossing languages identification, the identification of sensitive vocabulary;Secondly manual identified is carried out to suspect message, improves and know Other accuracy rate, avoids misrecognition;The invalid message finally confirmed to manual identified confirms its illegal grade, according to illegal etc. Level is handled and reported to safety management department accordingly.This method can identify a variety of short messages by specially treated, Recognition accuracy is high, just finds and prevents in time at the beginning of criminal offence occurs, being capable of powerful guarantee people's lives and properties Safety.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of SMS network supervision method provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Reference picture 1, the embodiments of the invention provide a kind of method of SMS network supervision, the hand that this method is directed to Various SMSs of the machine short message including SMS and handset Wechat message, this method comprise the following steps:
Step 100, the transmission code from calling party is received, the inquiry coded word corresponding with the transmission code in database The character concentrated is accorded with, languages corresponding to character are judged, if an only languages, into step 120, if multiple languages Kind, then into step 110.
Step 110, often occur in short message in actual conditions and use some languages as interference information, other languages Situation of the kind as real information, in order to effectively identify such case, the coding transmitted in code corresponding to each languages is separated, And the son transmission code according to the sequential concatenation in former transmission code into multiple single languages.
Specifically, in this example, it is necessary first to which the coding for calculating each languages in former transmission code accounts for editor-in-chief's number of codes Ratio, the maximum languages of ratio are main languages, and other are as time languages, and the coding of subject kind keeps original position motionless, by secondary language The coding of kind takes out one sentence of composition respectively.That is the coding of subject kind inherits the information such as the structure of former transmission code, punctuation mark, And secondary languages only inherit the order in former transmission code, without punctuation mark.
In other embodiments, subject kind and time languages can also be made to inherit structure and punctuation mark of former transmission code etc. Information.
Step 120, the languages of code are transmitted according to above-mentioned transmission code or son, judge that transmitting code or son transmits and whether there is in code The coding of the punctuation marks such as comma, fullstop, question mark, referred to as symbolic coding, it is if there is symbolic coding, then no into step 140 Then enter step 130.
Step 130, according to division rule set in advance, by string encoding corresponding to the transmission code or son transmission code It is divided into multiple character strings;The division rule set described in the present embodiment can be that each two or three characters are divided into one Character string.
Step 140, with the symbolic coding will transmit code or son transmission code corresponding to string encoding be divided into multiple words Symbol string.
Step 150, according to languages corresponding to transmission code or son transmission code, obtained multiple character strings and database will be divided In storage sensitive vocabulary corpus in word compareed, if in character string with the corpus sensitive vocabulary phase It is more than predetermined value like degree, then it is assumed that the short message is suspect message, and enters step 180;Otherwise step 160 is entered.
Step 160, also there is a situation where to send verse with a hidden head using short message in actual conditions, will be truly between character use Separated every certain amount of interference character, such case is relatively difficult to., will in same languages for such case Character inside each character string carries out independent assortment, and by the character in the character in each character string and other character strings Independent assortment is carried out, obtains multiple character strings, then these character strings are compareed with the word in the corpus, if word Sensitive Lexical Similarity is more than predetermined value with the corpus in symbol string, then it is assumed that the short message is suspect message, is entered Step 180.
Step 170, if the character string obtained after independent assortment and sensitive Lexical Similarity in the corpus are small In or equal to predetermined value, then it is assumed that short message is legitimate messages, and the legitimate messages are sent to called according to called party information On the communication terminal of side.
Step 180, for suspect message, it is possible to change the true meaning of original short message after above-mentioned processing Think, can just produce the situation of wrong identification, especially character in step 160 unavoidably if directly carrying out shielding delete processing The combination of character between string, the structure of original short message is changed completely, true intention can not be expressed, therefore be needed These suspect messages of manual identified are wanted, for being defined as invalid message, then into step 190, if it is determined that be legitimate messages, then The legitimate messages are sent to the communication terminal of callee according to called party information.
Step 190, the sensitive vocabulary in invalid message is extracted, the illegal grade of invalid message is determined according to sensitive vocabulary. In the present embodiment, if sensitive vocabulary include violence, instigate, homicide, the vocabulary such as terrified crime when, determine the invalid message Illegal grade to be high-grade, if sensitive vocabulary includes the vocabulary such as obscene pornographic, multiple level marketing, gambling, determine described illegally to disappear The illegal grade of breath is inferior grade.
Sexual behavior part is greatly mass-sended because the short messages such as incitement to violence most likely result in the social dangers such as violent crime, because This must enhance your vigilance for such short message, and its social harm of the short message such as obscene pornographic is relatively small, therefore pay attention to Grade is lower slightly.
Step 200, for high-grade illegal short message, reported in time to safety management department, by the phone of calling party The information such as number and name, address is sent to safety management department in the lump.For the illegal short message of inferior grade, caller is inquired about The illegal situation of the short message sent in side's a period of time, if the invalid message quantity sent in this period exceedes setting Value, then report the information such as the telephone number of the calling party and name, address to safety management department.Due to public security bureau, group Go out the limited personnel of waited safety management department, it is necessary to the big short message of the harm such as priority treatment violent crime, for obscene color The less short message of the social harms such as feelings, it is only necessary to calling party for a long time, high-frequency be engaged in this kind of unlawful activities when just by Safety management department is handled.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (5)

  1. A kind of 1. method of SMS network supervision, it is characterised in that the described method comprises the following steps:
    The transmission code from calling party is received, the word that inquiry code character corresponding with the transmission code is concentrated in database Symbol, judges languages corresponding to character;
    If only existing the coding of a languages in the transmission code, judge to whether there is symbolic coding in the transmission code;
    String encoding corresponding to the transmission code is drawn according to symbolic coding if it symbolic coding be present in the transmission code It is divided into multiple character strings, presses string encoding corresponding to the transmission code if symbolic coding is not present in the transmission code Multiple character strings are divided into according to the division rule of setting;
    According to languages corresponding to transmission code, obtained multiple character strings and the sensitive vocabulary language material of the storage in database will be divided Word in storehouse is compareed, if sensitive Lexical Similarity is more than predetermined value with the corpus in character string, is recognized It is suspect message for the short message;
    If sensitive Lexical Similarity is less than or equal to predetermined value with the corpus in character string, by each character string The character in portion carries out independent assortment, and the character in the character in each character string and other character strings is carried out into free group Close, obtain multiple character strings, then these character strings are compareed with the word in the corpus, if in character string with institute State sensitive Lexical Similarity in corpus and be more than predetermined value, then it is assumed that the short message is suspect message;
    For suspect message, manual identified is carried out, confirms as invalid message or legitimate messages;
    The information of invalid message calling party is sent to safety management department.
  2. 2. the method for SMS network supervision as claimed in claim 1, it is characterised in that by invalid message calling party Information be sent to safety management department before, methods described includes:
    The sensitive vocabulary in invalid message is extracted, determines the illegal grade of invalid message according to sensitive vocabulary, including it is high illegal etc. Level and low illegal grade;
    For high-grade illegal short message, reported in time to safety management department, by the telephone number of calling party and name, Address information is sent to safety management department in the lump;For the illegal short message of inferior grade, calling party's interior hair for a period of time is inquired about The illegal situation for the SMS sent, should if the invalid message quantity sent in this period exceedes the value of setting The telephone number and name of calling party, address information report are to safety management department.
  3. 3. the method for SMS network supervision as claimed in claim 1, it is characterised in that if character string in or character The character string that character independent assortment obtains between string is less than or equal to predetermined value with sensitive Lexical Similarity in the corpus, then It is legitimate messages to think the short message;
    After manual identified confirms short message for legitimate messages, the legitimate messages are sent to callee's according to called party information On communication terminal.
  4. 4. the method for SMS network supervision as claimed in claim 1, it is characterised in that if deposited in the transmission code In the coding of multiple languages, the coding transmitted in code corresponding to each languages is separated, and according to the order in former transmission code The son transmission code of multiple single languages is spliced into, the sub- transmission code or transmission code are subsequently located using identical method Reason.
  5. 5. the method for SMS network supervision as claimed in claim 4, it is characterised in that splitting the son in transmitting code When transmitting code, the coding for calculating each languages in former transmission code first accounts for the ratio of editor-in-chief's number of codes, and the maximum languages of ratio are Subject kind, other keep original position motionless, the coding of secondary languages are taken out into composition one respectively as time languages, the coding of subject kind Individual sentence.
CN201710864353.XA 2017-09-22 2017-09-22 A kind of method of SMS network supervision Pending CN107613474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710864353.XA CN107613474A (en) 2017-09-22 2017-09-22 A kind of method of SMS network supervision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710864353.XA CN107613474A (en) 2017-09-22 2017-09-22 A kind of method of SMS network supervision

Publications (1)

Publication Number Publication Date
CN107613474A true CN107613474A (en) 2018-01-19

Family

ID=61061605

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710864353.XA Pending CN107613474A (en) 2017-09-22 2017-09-22 A kind of method of SMS network supervision

Country Status (1)

Country Link
CN (1) CN107613474A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418809A (en) * 2018-02-07 2018-08-17 平安科技(深圳)有限公司 Chat data processing method, device, computer equipment and storage medium
CN109617781A (en) * 2018-10-19 2019-04-12 中国平安人寿保险股份有限公司 Instant communication information monitoring method, device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101976231A (en) * 2010-08-25 2011-02-16 孙强国 Network supervision method for multi-language short messages
DE102010020763A1 (en) * 2010-05-17 2011-11-17 Giesecke & Devrient Gmbh Method for generating short messaging service in mobile radio terminal e.g. smart phone, involves inserting personal information of receiver into created text message in location of wildcard character for personalizing text message
CN104168548A (en) * 2014-08-21 2014-11-26 北京奇虎科技有限公司 Short message intercepting method and device and cloud server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102010020763A1 (en) * 2010-05-17 2011-11-17 Giesecke & Devrient Gmbh Method for generating short messaging service in mobile radio terminal e.g. smart phone, involves inserting personal information of receiver into created text message in location of wildcard character for personalizing text message
CN101976231A (en) * 2010-08-25 2011-02-16 孙强国 Network supervision method for multi-language short messages
CN104168548A (en) * 2014-08-21 2014-11-26 北京奇虎科技有限公司 Short message intercepting method and device and cloud server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108418809A (en) * 2018-02-07 2018-08-17 平安科技(深圳)有限公司 Chat data processing method, device, computer equipment and storage medium
CN108418809B (en) * 2018-02-07 2020-09-18 平安科技(深圳)有限公司 Chat data processing method and device, computer equipment and storage medium
CN109617781A (en) * 2018-10-19 2019-04-12 中国平安人寿保险股份有限公司 Instant communication information monitoring method, device, computer equipment and storage medium
CN109617781B (en) * 2018-10-19 2022-08-02 中国平安人寿保险股份有限公司 Instant communication message monitoring method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104468611B (en) The data safety processing method and device switched based on dual system
US10447838B2 (en) Telephone fraud management system and method
CN101771535B (en) Mutual authentication method between terminal and server
CN106973075A (en) Share comment method and system, domain name code-transferring method, client and server
CN104424277A (en) Processing method and device for report information
CN107479798A (en) Multi-screen interaction method and device
CN103096316A (en) Terminal, network side equipment system and method for authenticating user identification card
CN107613474A (en) A kind of method of SMS network supervision
CN110519056A (en) A kind of login method, method for generating cipher code and its relevant apparatus
CN105681389A (en) Identification method and device based on different function communication streams of Skype
CN111447202B (en) Visual arrangement system of security policy
KR101306074B1 (en) Method and system to prevent phishing
CN105430623A (en) Monitoring method, device and system for RCS junk message
CN105451233B (en) A kind of anti-method monitored, system and mobile terminal
CN115543392B (en) Trusted program upgrading method, device, equipment and storage medium
CN107295488A (en) A kind of short message transmission system and its method based on text important attribute labeling method
CN103984730B (en) information processing method and electronic equipment
CN103139740A (en) Identification and processing method and device of illegal signaling
CN104821978B (en) A kind of Number Reorganization display methods and device
CN103546296B (en) The smart mobile phone App login method that a kind of safety and convenience are taken into account
CN105813085A (en) Information processing method and electronic device
CN105120076A (en) Mobile phone information display method
CN104917649B (en) Method for reverse security audit of communication data
CN117640162A (en) List construction method and device, storage medium and electronic equipment
CN111162924B (en) Verification information protection system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200604

Address after: 030021 No. 799, Northwest Fang Section of Qingdong Road, Xugou Town, Qingxu County, Taiyuan City, Shanxi Province

Applicant after: SHANXI POLICE College

Address before: 030021 Shanxi city of Taiyuan province Jinci road two No. 27

Applicant before: Liu Sanman

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180119