CN108347374A - A kind of information push method, system and device preventing invalid message - Google Patents
A kind of information push method, system and device preventing invalid message Download PDFInfo
- Publication number
- CN108347374A CN108347374A CN201810057348.2A CN201810057348A CN108347374A CN 108347374 A CN108347374 A CN 108347374A CN 201810057348 A CN201810057348 A CN 201810057348A CN 108347374 A CN108347374 A CN 108347374A
- Authority
- CN
- China
- Prior art keywords
- message
- push
- security audit
- person
- queue
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/56—Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/566—Grouping or aggregating service requests, e.g. for unified processing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of information push methods preventing invalid message, system and device, the push request sent out the method includes obtaining push person, push is asked to carry out security audit, according to security audit result, stopping push is corresponding to wait for PUSH message, push request is encapsulated as read-only file and stores the read-only file or waits for PUSH message using the reception of corresponding channel reception device, and it will wait for that PUSH message is sequentially put into corresponding message queue, then each multiple wait for that PUSH message is sent to corresponding target channel according to the storage of message queue sequence by what is stored in the message queue;The system comprises message capturing module, security audit module, message queue module and message transmission modules;Described device includes memory and processor.The present invention can solve the problems, such as that message sends chaotic and safety, conveniently treat PUSH message and be further processed to be supervised to information receiving and transmitting system.The present invention is applied to Internet technical field.
Description
Technical field
The present invention relates to Internet technical field, especially a kind of information push method preventing invalid message, system and
Device.
Background technology
In internet and the communications field, need continually to transmit a large amount of message.The traditional communications sides such as mobile phone short message, e-mail
The social activity APP such as formula and wechat, microblogging and nail nail can easily send and receive message.Everyone use habit is not
Together, the communication software used in also differs, such as in today of popular social activity APP, still has many people to get used to mobile phone and receive
Short-message sending.Therefore, it is inevitably present the message largely from separate sources channel, these message needs are sent to not
Same target channel.
In order to realize the message push across channel, need to develop different interfaces.Such as the message in order to send out wechat
It is pushed to e-mail, needs to dock with wechat by an interface, the message that wechat is sent out is received, passes through another interface and e-mail pair
It connects, sends a message to e-mail.But since there are many message channel, the quantity of combination of two is also very big, in order to realize message
It freely transmits, needs respective development interface, workload is extremely huge, causes software development efficiency and message transmission efficiency low
Under.
In view of the above-mentioned problems, occurring some message push platform on the market, exploitation in advance is followed closely with wechat enterprise, enterprise
Then these interface encapsulations are a system by the interface of the mainstream applications programs such as nail, Short Message Service Gateway, e-mail and third party IM docking
One message pushes API, and full terminal message channel service is provided for third party, realizes that application access is configurable.But these are produced
Product are the simple integrated of interface, and the effect of only simple message transfer, each message for coming from different channels lacks contact,
Lead to that these message cannot be done any processing, information receiving and transmitting system lacks supervision, in face of spread unchecked spoofing, swindle message
It is helpless with other invalid messages comprising illegal contents.
Invention content
In order to solve the above-mentioned technical problem, the first object of the present invention is to provide a kind of message preventing invalid message and pushes away
Delivery method, second is designed to provide a kind of message push system preventing invalid message, and third is designed to provide a kind of resistance
The only message pusher of invalid message.
The first technical solution for being taken of the present invention is:
A kind of information push method preventing invalid message, including:
The push request that push person sends out is obtained, the push request includes waiting for PUSH message, push person's identity information, coming
Source channel and target channel;
Push is asked to carry out security audit, if security audit result is qualification, executes next step, if conversely, peace
Full auditing result is unqualified, then stop pushing it is corresponding wait for PUSH message, push request is encapsulated as read-only file and is deposited
Store up the read-only file;
According to sources, PUSH message is waited for using the reception of corresponding channel reception device, and will wait for that PUSH message is sequentially put
Enter corresponding message queue;
Each multiple wait for that PUSH message is sent to pair according to the storage of message queue sequence by what is stored in the message queue
The target channel answered;
Wherein, this is stored in the message queue in an orderly manner and what is be previously put into multiple waits for PUSH message.
Further, the step of described pair of push request carries out security audit, specifically includes:
Corresponding push person's identity information is checked whether in permanent blacklist, if so, security audit result is not conform to
Lattice, termination of security audit steps, conversely, executing next step;
For PUSH message is waited for, retrieved in preset invalid information database, so that it is determined that waiting in PUSH message
Whether include illegal contents;
If it includes illegal contents in PUSH message to wait for, security audit result is unqualified, then by corresponding push person
Identity information and corresponding security audit result are included in permanent blacklist, and on the contrary then security audit result is qualification.
Further, further include the steps that following checking message queue:
The corresponding push person's identity information of needed PUSH message in message queue is detected, the identical push of all correspondences is extracted
Person's waits for PUSH message;
Using corresponding push person as classification foundation, the needed PUSH message extracted is classified, then will be divided
Wait for that PUSH message is spliced into combined message to be of a sort;
Security audit is carried out respectively to each combined message, if security audit result is qualification, is protected in message queue
Corresponding combined message is stayed, conversely, each push request corresponding to corresponding combined message is encapsulated as read-only file and stores institute
Read-only file is stated, corresponding combined message is then deleted from message queue.
Further, further include waiting for corresponding this step of push request deposit historical record of PUSH message by what is sent
Suddenly.
Further, further include the steps that following checking message queue and historical record:
The corresponding push person's identity information of needed PUSH message in message queue and historical record is detected, it is all right to extract
Answer identical push person's to wait for PUSH message;
Using corresponding push person as classification foundation, the needed PUSH message extracted is classified, then will be divided
Wait for that PUSH message is spliced into combined message to be of a sort;
Security audit is carried out respectively to each combined message, if security audit result is qualification, is protected in message queue
Corresponding combined message is stayed, conversely, each push request corresponding to corresponding combined message is encapsulated as read-only file and stores institute
Read-only file is stated, corresponding combined message is then deleted from message queue.
Further, after described the step for carrying out security audit respectively to each combined message, if security audit
As a result it is unqualified, also executes to corresponding target channel and send out the step for recalling instruction;It is described to recall instruction for notifying
The PUSH message that paid-in corresponding push person sends out is retracted or deleted to corresponding target channel.
Further, after described the step for carrying out security audit respectively to each combined message, if security audit
As a result it is unqualified, also executes to corresponding target channel and send out the step for advising message;The advice message is for reminding
The person of being pushed denies the illegal contents received.
Further, after described the step for carrying out security audit respectively to each combined message, if security audit
As a result it is unqualified, also executes the step for being sent a warning message to corresponding push person;The warning message is pushed away for informing
The technology consequence and legal consequence of its push behavior of the person of sending.
The second technical solution for being taken of the present invention is:
A kind of message push system preventing invalid message, including:
Message capturing module, for obtaining the push request that push person sends out, the push request including wait for PUSH message,
Push person's identity information, sources and target channel;
Security audit module carries out security audit, if security audit result is qualification, under executing for asking push
One step, if conversely, security audit result is unqualified, stop pushing it is corresponding wait for PUSH message, which is asked to seal
Dress is read-only file and stores the read-only file;
Message queue module, for according to sources, waiting for PUSH message using the reception of corresponding channel reception device, and will
Wait for that PUSH message is sequentially put into corresponding message queue;
Message transmission module, for each multiple waiting for PUSH message according to message queue by what is stored in the message queue
Storage sequence is sent to corresponding target channel;
Wherein, this is stored in the message queue in an orderly manner and what is be previously put into multiple waits for PUSH message.
The third technical solution taken of the present invention is:
A kind of message pusher preventing invalid message, including:
Memory, for storing at least one program;
Processor, for loading at least one program to execute a kind of message push side preventing invalid message
Method.
The beneficial effects of the invention are as follows:Pass through integrated message interface and unified message centralized processing, it is only necessary to call
Message interface, so that it may to have timely completed the push of message, subtract the workload of application system development message pushing module, keep away
Exempt from the interface docked between overlapping development difference channel, it is chaotic to solve the problems, such as that message is sent.By security audit to push
Request is checked, the propagation of invalid message can be prevented, and is safeguarded network environment cleaning, once detecting invalid message, may be used also
With timely tracking push person and retain electronic evidence, to investigate its legal liabilities, solves the safety problem of message transmission.Make
PUSH message is waited for buffer with message queue, can enhance the robustness of system, conveniently treat PUSH message and be further processed
To be supervised to information receiving and transmitting system.
Description of the drawings
Fig. 1 is a kind of flow chart of the information push method of prevention invalid message of the present invention;
Fig. 2 is a kind of structure diagram of the message pusher of prevention invalid message of the present invention.
Specific implementation mode
Embodiment 1
The present invention provides a kind of information push methods preventing invalid message, as shown in Figure 1, including:
The push request that push person sends out is obtained, the push request includes waiting for PUSH message, push person's identity information, coming
Source channel and target channel;
Push is asked to carry out security audit, if security audit result is qualification, executes next step, if conversely, peace
Full auditing result is unqualified, then stop pushing it is corresponding wait for PUSH message, push request is encapsulated as read-only file and is deposited
Store up the read-only file;
According to sources, PUSH message is waited for using the reception of corresponding channel reception device, and will wait for that PUSH message is sequentially put
Enter corresponding message queue;
Each multiple wait for that PUSH message is sent to pair according to the storage of message queue sequence by what is stored in the message queue
The target channel answered;
Wherein, this is stored in the message queue in an orderly manner and what is be previously put into multiple waits for PUSH message.
The push person can be mobile phone short message, e-mail and wechat, microblogging and the user for following closely the communication softwares such as nail.
In order to realize the message push across channel, push that accessed push person sends out request, in addition to include wait for PUSH message it
Outside, at least further include corresponding push person's identity information, sources and target channel, when can also include that push request receives
Between, the message push information such as time.Sources label wait for PUSH message from channel, such as wechat or e-mail.Target
Channel label waits for the channel that PUSH message will be sent to, so that the system using information push method of the present invention can be called
Corresponding interface will wait for that PUSH message is sent to corresponding channel.
Using information push method of the present invention, focused on by integrated message interface and unified message, it is only necessary to
Call message interface, so that it may to have timely completed the push of message, subtract the work of application system development message pushing module
Amount, avoids the interface docked between overlapping development difference channel, and it is chaotic to solve the problems, such as that message is sent.
In order to solve the safety problem of message transmission, information push method of the present invention decides whether to connect by security audit
By the push request sent out with response push person.To the security audit of push request, mainly to push person's identity information and right
Wait for the examination of PUSH message content.
Push person's identity information indicates that the true identity of push person, the examination to push person's identity information are to check push person
Itself whether meet access conditions, can be realized by Registration Authentication mechanism, that is, only to by prior Registration Authentication
The push request that push person sends out is responded, the push request that the unauthenticated push person of refusal respond sends out.Registration Authentication
Mechanism can be presented as blacklist and white list, and for push person in blacklist, then corresponding security audit result is unqualified, is pushed away
The person of sending is not in blacklist or in white list, then corresponding security audit result is qualification.
With the examination for treating PUSH message content, mainly check wait for PUSH message whether comprising swindle, violence, pornographic,
The illegal contents such as terrified and reaction, if wait for be without these illegal contents, corresponding security audit result in PUSH message
Unqualified, otherwise corresponding security audit result is qualification.The result of security audit is related to whether push request is received,
Exactly wait for whether PUSH message can be pushed away.
Wait for that PUSH message often relates to illegal or even crime comprising invalid message, corresponding push person needs by law
It investigates.If security audit result is unqualified, PUSH message is waited in addition to stopping push is corresponding, also asks to encapsulate by the push
For read-only file and store the read-only file.Read-only file can ensure the integrality of institute's storage content, and read-only file records
It the true identity information of related push person and completely waits for PUSH message, can be carried as strong Computer forensics
Further investigation is done by supply relevant departments, and behavior is pushed to hit invalid message.
Message queue is a kind of middleware, as a kind of container can certain sequential storage wait for PUSH message, both may be used
To generate the effect of buffering, it is also convenient for treating PUSH message and is further processed.A total message queue can be only set, also may be used
To be directed to separate sources channel respectively or multiple points of message queues are arranged for different target channel, each message queue is only deposited
It puts and a kind of waiting for PUSH message with identical source channel or target channel.Channel reception device may include disappearing for treating push
Cease the program for being identified and classifying.What channel reception device received waits for PUSH message, sequentially in time or sets suitable
Sequence is stored in total message queue or multiple points of message queues.That is stored in message queue waits for PUSH message, can be according to
First in first out, first-in last-out or setting sequence be pushed to target channel.
Using the manager of the system of the method for the present invention, the message pushed can be counted according to historical record
Analysis.Such as can by the form of report or statistical chart, export total quantity that message in the variant period pushes and
It is total from separate sources channel, the message for being pushed to different target channel in its variation tendency, or output variant period
Quantity, or further export the information such as message number accounting from separate sources channel.Manager can be according to these
Statistical information, it is thus understood that the account of the history of message push, to make adjustment to parameters such as interfaces.
It is further used as preferred embodiment, described pair pushes the step of request carries out security audit, specifically includes:
Corresponding push person's identity information is checked whether in permanent blacklist or interim blacklist, if so, safety is examined
Meter result is unqualified, termination of security audit steps, conversely, executing next step;
For PUSH message is waited for, retrieved in preset invalid information database, so that it is determined that waiting in PUSH message
Whether include illegal contents;
If it includes illegal contents in PUSH message to wait for, security audit result is unqualified, then by corresponding push person
Identity information and corresponding security audit result are included in permanent blacklist, and on the contrary then security audit result is qualification.
If push person in permanent blacklist or interim blacklist, can directly judge that security audit result is
It is unqualified, otherwise, wait for that it, content of PUSH message checks.For PUSH message is waited for, keyword can be therefrom extracted simultaneously
It is searched and is compared in invalid information database, judge to wait for PUSH message whether comprising the keyword with illegal contents;
The method that full-text search can also be used is retrieved for waiting for that PUSH message is whole in corresponding invalid information database,
Preferably judge to wait in PUSH message whether to include illegal contents.
If waiting for including illegal contents in PUSH message, security audit result is unqualified.Since push person's push is non-
The suspected illegal even crime of method content, therefore also arrange corresponding push person's identity information and corresponding security audit result
Enter permanent blacklist.Content in permanent blacklist, otherwise by persistence, can be used for preventing unless for administrative staff's change
Pushed the push persons of illegal contents PUSH message again.
It is further used as preferred embodiment, further includes the steps that following checking message queue:
The corresponding push person's identity information of needed PUSH message in message queue is detected, the identical push of all correspondences is extracted
Person's waits for PUSH message;
Using corresponding push person as classification foundation, the needed PUSH message extracted is classified, then will be divided
Wait for that PUSH message is spliced into combined message to be of a sort;
Security audit is carried out respectively to each combined message, if security audit result is qualification, is protected in message queue
Corresponding combined message is stayed, conversely, each push request corresponding to corresponding combined message is encapsulated as read-only file and stores institute
Read-only file is stated, corresponding combined message is then deleted from message queue.
With being increasingly enhanced to invalid message hitting dynamics, the means of related push person also become various and complicated,
Multiple means may be used to escape the inspection to message content, such as split into a complete message comprising illegal contents more
No matter a part, corresponding multiple messages, every message individually by keyword retrieval or full-text search can obtain qualification
Security audit as a result, this multiple messages is simultaneously pushed to target channel and is sent to recipient after, at recipient synthesize
The message of completion just can rendering illegal contents.
For above-mentioned this illegal means, message queue can be checked to solve.It is stored all in message queue
Be pass through that security audit step obtains pass result respectively wait for PUSH message, due to the cushioning effect of message queue, disappearing
Breath queue, which will wait for a period of time, to be retransmited, and therefore, can be checked at any time the message in message queue.Effect
The highest method of rate, that is, wait for that PUSH message is classified according to push person by all in current message queue, such as push away
All information to be pushed of the person's of sending first are classified as one group, and all information to be pushed of push person's second are classified as another group, then respectively will
Each group message is spliced into the higher combined message of integrity degree, then carries out security audit to these combined messages, in this way, can be most
There are fish that has escape the net for the security audit for avoiding to big degree to single message.It can also wait for that push disappears by all in message queue
Breath one combined message of synthesis, or therefrom randomly select several and wait for that PUSH message synthesizes a combined message.To message
The security audit step executed in the check step of queue, process object is combined message, only need to be by peace described above
Full audit steps, which carry out simple object replacement, to be understood.
It is further used as preferred embodiment, further includes waiting for the corresponding push request deposit of PUSH message by what is sent
The step for historical record.
It is further used as preferred embodiment, further includes the steps that checking message queue and historical record.It is right
Message queue and historical record are checked, and can be carried out according to the step of check message queue, and difference lies in its spellings
The combined message connect may include the PUSH message that waits in message queue and historical record, that is, both include same push
The message that person will push, and include the message pushed, the range of check can be expanded in this way, improve the tight of security audit
Property.
Be further used as preferred embodiment, described the step for security audit is carried out respectively to each combined message it
Afterwards, it if security audit result is unqualified, also executes to corresponding target channel and sends out the step for recalling instruction;It is described to remove
Refer to enable that paid-in corresponding push person sends out waits for PUSH message for notifying corresponding target channel to retract or delete.
Be further used as preferred embodiment, described the step for security audit is carried out respectively to each combined message it
Afterwards, it if security audit result is unqualified, also executes to corresponding target channel and sends out the step for advising message;It is described to advise
Message is accused for reminding the person of being pushed to deny the illegal contents received.
Be further used as preferred embodiment, described the step for security audit is carried out respectively to each combined message it
Afterwards, if security audit result is unqualified, the step for being sent a warning message to corresponding push person is also executed;The warning
Information is used to inform push person that it to push the technology consequence and legal consequence of behavior.
If the security audit result for carrying out gained after security audit is unqualified, in addition to can be passive according to the method described above
Reply can also take a proactive approach to mitigate the consequence of invalid message propagation.
The mode of the active includes sending out to recall instruction to corresponding target channel.Due to invalid message push often
The message for including illegal contents was once pushed with continuity, that is, a push person, then being pushed before this push person
Other message be also likely to include illegal contents, and this push person before push message may also be not by security audit
Step detected, and be received.For the sake of security, it can be sent out to target channel and recall instruction, target channel receives
It is that the person of being pushed is had been received, disappeared by what the push person that security audit step pipes off was sent out after recalling instruction
Breath is deleted or is retracted, in case it is read and is propagated.
The mode of the active further includes sending out advice message to corresponding target channel, advise message can be word or
Person's multimedia form is failed with reducing recalling instruction for reminding and advising that the person of being pushed is sure not to believe related message
The harmful effect of invalid message in the case of coming into force.
The mode of the active further includes being sent a warning message to corresponding push person, alert message can be word or
Multimedia form.Warning message informs push person, push behavior generated be put into permanent blacklist, can not PUSH message again
Technology consequence, and the legal consequence that may face, for preventing the further push behavior of push person.
Embodiment 2
A kind of message push system preventing invalid message of the present invention, including:
Message capturing module, for obtaining the push request that push person sends out, the push request including wait for PUSH message,
Push person's identity information, sources and target channel;
Security audit module carries out security audit, if security audit result is qualification, under executing for asking push
One step, if conversely, security audit result is unqualified, stop pushing it is corresponding wait for PUSH message, which is asked to seal
Dress is read-only file and stores the read-only file;
Message queue module, for according to sources, waiting for PUSH message using the reception of corresponding channel reception device, and will
Wait for that PUSH message is sequentially put into corresponding message queue;
Message transmission module, for each multiple waiting for PUSH message according to message queue by what is stored in the message queue
Storage sequence is sent to corresponding target channel;
Wherein, this is stored in the message queue in an orderly manner and what is be previously put into multiple waits for PUSH message.
Each function module can be realized with corresponding program module in the present embodiment.The executable present invention of present system is real
A kind of information push method for prevention invalid message that example 1 is provided is applied, step is implemented in the arbitrary combination of executing method embodiment
Suddenly, have the corresponding function of this method and advantageous effect.
Embodiment 3
A kind of message pusher preventing invalid message of the present invention, as shown in Fig. 2, including:
Memory, for storing at least one program;
Processor, for loading at least one program to execute a kind of disappearing for prevention invalid message described in embodiment 1
Cease method for pushing.
Apparatus of the present invention can perform a kind of information push method for prevention invalid message that the embodiment of the present invention 1 is provided,
The arbitrary combination implementation steps of executing method embodiment, have the corresponding function of this method and advantageous effect.
It is to be illustrated to the preferable implementation of the present invention, but the implementation is not limited to the invention above
Example, those skilled in the art can also make various equivalent variations or be replaced under the premise of without prejudice to spirit of that invention
It changes, these equivalent deformations or replacement are all contained in the application claim limited range.
Claims (10)
1. a kind of information push method preventing invalid message, which is characterized in that including:
The push request that push person sends out is obtained, the push request includes waiting for PUSH message, push person's identity information, source canal
Road and target channel;
Push is asked to carry out security audit, if security audit result is qualification, executes next step, if conversely, safety is examined
It is unqualified to count result, then stop pushing it is corresponding wait for PUSH message, push request is encapsulated as read-only file and store should
Read-only file;
According to sources, PUSH message is waited for using the reception of corresponding channel reception device, and will wait for that PUSH message is sequentially put into pair
The message queue answered;
By stored in the message queue each multiple to wait for that PUSH message is sent to according to the storage of message queue sequence corresponding
Target channel;
Wherein, this is stored in the message queue in an orderly manner and what is be previously put into multiple waits for PUSH message.
2. a kind of information push method preventing invalid message according to claim 1, which is characterized in that described pair of push
Request carries out the step of security audit, specifically includes:
Corresponding push person's identity information is checked whether in permanent blacklist, if so, security audit result is unqualified, knot
Beam security audit step, conversely, executing next step;
For PUSH message is waited for, retrieved in preset invalid information database, so that it is determined that wait in PUSH message whether
Including illegal contents;
If it includes illegal contents in PUSH message to wait for, security audit result is unqualified, then by corresponding push person's identity
Information and corresponding security audit result are included in permanent blacklist, and on the contrary then security audit result is qualification.
3. a kind of information push method preventing invalid message according to claim 2, which is characterized in that further include as follows
The step of check message queue:
The corresponding push person's identity information of needed PUSH message in message queue is detected, extracts the identical push person's of all correspondences
Wait for PUSH message;
Using corresponding push person as classification foundation, the needed PUSH message extracted is classified, then will be divided into same
A kind of waits for that PUSH message is spliced into combined message;
Security audit is carried out respectively to each combined message, if security audit result is qualification, the reservation pair in message queue
The combined message answered, conversely, each push request corresponding to corresponding combined message is encapsulated as read-only file and stores described
File is read, corresponding combined message is then deleted from message queue.
4. a kind of information push method preventing invalid message according to claim 3, which is characterized in that further including will
What is sent waits for the step for corresponding push request of PUSH message is stored in historical record.
5. a kind of information push method preventing invalid message according to claim 4, which is characterized in that further include as follows
The step of check message queue and historical record:
Detect the corresponding push person's identity information of needed PUSH message in message queue and historical record, all corresponding phases of extraction
PUSH message is waited for push person;
Using corresponding push person as classification foundation, the needed PUSH message extracted is classified, then will be divided into same
A kind of waits for that PUSH message is spliced into combined message;
Security audit is carried out respectively to each combined message, if security audit result is qualification, the reservation pair in message queue
The combined message answered, conversely, each push request corresponding to corresponding combined message is encapsulated as read-only file and stores described
File is read, corresponding combined message is then deleted from message queue.
6. according to a kind of information push method preventing invalid message of claim 3-5 any one of them, which is characterized in that
After described the step for carrying out security audit respectively to each combined message, if security audit result is unqualified, also execute
The step for recalling instruction is sent out to corresponding target channel;It is described recall instruction for notify corresponding target channel retract or
Delete the PUSH message that paid-in corresponding push person sends out.
7. according to a kind of information push method preventing invalid message of claim 3-5 any one of them, which is characterized in that
After described the step for carrying out security audit respectively to each combined message, if security audit result is unqualified, also execute
The step for advising message is sent out to corresponding target channel;The advice message is for reminding the person of being pushed to deny reception
The illegal contents arrived.
8. according to a kind of information push method preventing invalid message of claim 3-5 any one of them, which is characterized in that
After described the step for carrying out security audit respectively to each combined message, if security audit result is unqualified, also execute
The step for being sent a warning message to corresponding push person;The warning message is used to inform push person that it to push the technology of behavior
Consequence and legal consequence.
9. a kind of message push system preventing invalid message, which is characterized in that including:
Message capturing module, the push request sent out for obtaining push person, the push request includes waiting for PUSH message, push
Person's identity information, sources and target channel;
Security audit module carries out security audit for asking push, if security audit result is qualification, executes next step
Suddenly, if conversely, security audit result is unqualified, stop pushing it is corresponding wait for PUSH message, push request is encapsulated as
Read-only file simultaneously stores the read-only file;
Message queue module, for according to sources, waiting for PUSH message using the reception of corresponding channel reception device, and will wait pushing away
Message is sent sequentially to be put into corresponding message queue;
Message transmission module, each multiple storages for waiting for PUSH message according to message queue for will be stored in the message queue
Sequence is sent to corresponding target channel;
Wherein, this is stored in the message queue in an orderly manner and what is be previously put into multiple waits for PUSH message.
10. a kind of message pusher preventing invalid message, which is characterized in that including:
Memory, for storing at least one program;
Processor requires a kind of any one of 1-8 prevention illegally to disappear for loading at least one program with perform claim
The information push method of breath.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810057348.2A CN108347374B (en) | 2018-01-22 | 2018-01-22 | Message pushing method and device for preventing illegal messages |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810057348.2A CN108347374B (en) | 2018-01-22 | 2018-01-22 | Message pushing method and device for preventing illegal messages |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108347374A true CN108347374A (en) | 2018-07-31 |
CN108347374B CN108347374B (en) | 2021-06-29 |
Family
ID=62960841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810057348.2A Active CN108347374B (en) | 2018-01-22 | 2018-01-22 | Message pushing method and device for preventing illegal messages |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108347374B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110838970A (en) * | 2019-11-04 | 2020-02-25 | 宜人恒业科技发展(北京)有限公司 | Message distribution method, device and system |
CN111131392A (en) * | 2019-11-27 | 2020-05-08 | 北京文渊佳科技有限公司 | Method, device, electronic equipment and medium for processing message |
CN111614548A (en) * | 2020-05-20 | 2020-09-01 | 广州平云小匠科技有限公司 | Message pushing method and device, computer equipment and storage medium |
CN112637282A (en) * | 2020-12-08 | 2021-04-09 | 平安普惠企业管理有限公司 | Information pushing method and device, computer equipment and storage medium |
WO2021136125A1 (en) * | 2019-12-31 | 2021-07-08 | 中兴通讯股份有限公司 | Method and system for taking down content, and storage medium |
CN114466075A (en) * | 2022-01-14 | 2022-05-10 | 北京快乐茄信息技术有限公司 | Request processing method and device, electronic equipment and storage medium |
CN114827254A (en) * | 2022-04-22 | 2022-07-29 | 深圳微言科技有限责任公司 | Message pushing method, system and storage medium |
CN114979250A (en) * | 2022-04-18 | 2022-08-30 | 北京嗨学网教育科技股份有限公司 | Message pushing method, device and equipment |
CN116132392A (en) * | 2023-01-06 | 2023-05-16 | 北京达佳互联信息技术有限公司 | Message processing method, device, electronic equipment and storage medium |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130084896A1 (en) * | 2011-09-29 | 2013-04-04 | International Business Machines Corporation | Pushing Secure Notifications to Mobile Computing Devices |
CN103118138A (en) * | 2013-03-04 | 2013-05-22 | 中国信息安全测评中心 | Cloud service based message queue stream processing method |
KR101379711B1 (en) * | 2013-11-14 | 2014-04-01 | (주)지란지교소프트 | Method for file encryption and decryption using telephone number |
CN104539624A (en) * | 2015-01-08 | 2015-04-22 | 北京奇虎科技有限公司 | Safety monitoring method and device for number information in text |
EP2890074A1 (en) * | 2013-12-31 | 2015-07-01 | Gemalto SA | Method for transmitting push messages |
CN105743939A (en) * | 2014-12-09 | 2016-07-06 | 中国移动通信集团江苏有限公司 | Message push method and device |
CN105808288A (en) * | 2016-02-26 | 2016-07-27 | 深圳天珑无线科技有限公司 | Message push control method and device of operating system |
CN106603422A (en) * | 2016-12-09 | 2017-04-26 | 上海斐讯数据通信技术有限公司 | Network steal prevention method of wireless router, and wireless router |
CN106789582A (en) * | 2016-12-26 | 2017-05-31 | 安徽尚果信息科技有限公司 | A kind of app information push methods |
CN107171834A (en) * | 2017-05-05 | 2017-09-15 | 四川长虹电器股份有限公司 | Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond |
-
2018
- 2018-01-22 CN CN201810057348.2A patent/CN108347374B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130084896A1 (en) * | 2011-09-29 | 2013-04-04 | International Business Machines Corporation | Pushing Secure Notifications to Mobile Computing Devices |
CN103118138A (en) * | 2013-03-04 | 2013-05-22 | 中国信息安全测评中心 | Cloud service based message queue stream processing method |
KR101379711B1 (en) * | 2013-11-14 | 2014-04-01 | (주)지란지교소프트 | Method for file encryption and decryption using telephone number |
EP2890074A1 (en) * | 2013-12-31 | 2015-07-01 | Gemalto SA | Method for transmitting push messages |
CN105743939A (en) * | 2014-12-09 | 2016-07-06 | 中国移动通信集团江苏有限公司 | Message push method and device |
CN104539624A (en) * | 2015-01-08 | 2015-04-22 | 北京奇虎科技有限公司 | Safety monitoring method and device for number information in text |
CN105808288A (en) * | 2016-02-26 | 2016-07-27 | 深圳天珑无线科技有限公司 | Message push control method and device of operating system |
CN106603422A (en) * | 2016-12-09 | 2017-04-26 | 上海斐讯数据通信技术有限公司 | Network steal prevention method of wireless router, and wireless router |
CN106789582A (en) * | 2016-12-26 | 2017-05-31 | 安徽尚果信息科技有限公司 | A kind of app information push methods |
CN107171834A (en) * | 2017-05-05 | 2017-09-15 | 四川长虹电器股份有限公司 | Short Message Service Gateway service platform monitoring early-warning system and method based on gateway early warning pond |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110838970B (en) * | 2019-11-04 | 2022-03-01 | 宜人恒业科技发展(北京)有限公司 | Message distribution method, device and system |
CN110838970A (en) * | 2019-11-04 | 2020-02-25 | 宜人恒业科技发展(北京)有限公司 | Message distribution method, device and system |
CN111131392A (en) * | 2019-11-27 | 2020-05-08 | 北京文渊佳科技有限公司 | Method, device, electronic equipment and medium for processing message |
WO2021136125A1 (en) * | 2019-12-31 | 2021-07-08 | 中兴通讯股份有限公司 | Method and system for taking down content, and storage medium |
CN111614548A (en) * | 2020-05-20 | 2020-09-01 | 广州平云小匠科技有限公司 | Message pushing method and device, computer equipment and storage medium |
CN112637282B (en) * | 2020-12-08 | 2023-02-03 | 平安普惠企业管理有限公司 | Information pushing method and device, computer equipment and storage medium |
CN112637282A (en) * | 2020-12-08 | 2021-04-09 | 平安普惠企业管理有限公司 | Information pushing method and device, computer equipment and storage medium |
CN114466075A (en) * | 2022-01-14 | 2022-05-10 | 北京快乐茄信息技术有限公司 | Request processing method and device, electronic equipment and storage medium |
CN114466075B (en) * | 2022-01-14 | 2024-04-16 | 北京快乐茄信息技术有限公司 | Request processing method and device, electronic equipment and storage medium |
CN114979250A (en) * | 2022-04-18 | 2022-08-30 | 北京嗨学网教育科技股份有限公司 | Message pushing method, device and equipment |
CN114979250B (en) * | 2022-04-18 | 2024-06-04 | 北京嗨学网教育科技股份有限公司 | Message pushing method, device and equipment |
CN114827254A (en) * | 2022-04-22 | 2022-07-29 | 深圳微言科技有限责任公司 | Message pushing method, system and storage medium |
CN116132392A (en) * | 2023-01-06 | 2023-05-16 | 北京达佳互联信息技术有限公司 | Message processing method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108347374B (en) | 2021-06-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108347374A (en) | A kind of information push method, system and device preventing invalid message | |
CN112567710B (en) | System and method for contaminating phishing campaign responses | |
US10936733B2 (en) | Reducing inappropriate online behavior using analysis of email account usage data to select a level of network service | |
US8549642B2 (en) | Method and system for using spam e-mail honeypots to identify potential malware containing e-mails | |
US10243989B1 (en) | Systems and methods for inspecting emails for malicious content | |
US8805995B1 (en) | Capturing data relating to a threat | |
US20240007498A1 (en) | Apparatus for providing mail security service using hierarchical architecture based on security level and operation method therefor | |
US11637870B2 (en) | User responses to cyber security threats | |
CN108400927A (en) | A kind of information push method and device for high concurrent message | |
CN106295328A (en) | File test method, Apparatus and system | |
CN106713049A (en) | Alarm method and device of monitor | |
CN103825888A (en) | Network threat processing method and apparatus | |
Hamandi et al. | Android SMS malware: Vulnerability and mitigation | |
US9251367B2 (en) | Device, method and program for preventing information leakage | |
US20110154181A1 (en) | Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content | |
Wijnberg et al. | Identifying interception possibilities for WhatsApp communication | |
CN109672607A (en) | A kind of email processing method, device and storage equipment, program product | |
US10789354B1 (en) | Computer-based systems configured for detecting and sandboxing external resources and methods of use thereof | |
CN107770125A (en) | A kind of network security emergency response method and emergency response platform | |
CN110474837A (en) | A kind of Junk mail processing method, device, electronic equipment and storage medium | |
US7587760B1 (en) | System and methods for preventing denial of service attacks | |
CN105812405B (en) | A kind of method, apparatus and system handling message | |
JP2023551858A (en) | Zero-day URL attack prevention service provision device based on email security and its operating method | |
US20220150276A1 (en) | Executing real-time message monitoring to identify potentially malicious messages and generate instream alerts | |
EP4152729B1 (en) | Interactive email warning tags |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |