CN108733730A - Rubbish message hold-up interception method and device - Google Patents

Rubbish message hold-up interception method and device Download PDF

Info

Publication number
CN108733730A
CN108733730A CN201710276058.2A CN201710276058A CN108733730A CN 108733730 A CN108733730 A CN 108733730A CN 201710276058 A CN201710276058 A CN 201710276058A CN 108733730 A CN108733730 A CN 108733730A
Authority
CN
China
Prior art keywords
message
rubbish
word
user
rubbish message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710276058.2A
Other languages
Chinese (zh)
Inventor
王卫姣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201710276058.2A priority Critical patent/CN108733730A/en
Publication of CN108733730A publication Critical patent/CN108733730A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Abstract

A kind of rubbish message hold-up interception method and device.The method includes executing successively as follows:A) message for meeting length condition is extracted from history chat record;B) deduplication is carried out to the message extracted;C) it segments and removes stop words, the stop words refers to the word of no specific meaning;D) weight of each word of every message is calculated;E) by the processed user message of cosine formula calculating and by the maximum similarity between every language material in step a) to rubbish message corpus d) formed, wherein, processed user message is the user message for the weight for removing stop words again after participle and finally calculating each word;F) according to maximum similarity determination and adjustment similarity threshold, and by the similarity threshold catching rubbish message.

Description

Rubbish message hold-up interception method and device
Technical field
The present invention relates to field of computer technology more particularly to a kind of rubbish message hold-up interception methods and device.
Background technology
With the development of e-commerce, shopping mall website can all provide online customer service service, however it is incident just It is the push of various rubbish messages.Therefore effectively shielding rubbish information is very urgent.
In realizing process of the present invention, inventor has found that at least there are the following problems in the prior art:Rubbish message intercepts Can only be by keyword prompt, filtering sensitive words and addition blacklist mode, keyword prompt and filtering sensitive words are all bases On the basis of keyword and sensitive word dictionary, the effect that both modes shield rubbish message is very little, and adds Although the mode of blacklist can be shielded to specific user and send message, the new user to having registered vest number but has no to do Method.
Invention content
In view of this, a kind of rubbish message hold-up interception method of offer of the embodiment of the present invention and device, can not influence non-rubbish Rubbish message send in the case of in a manner of effective and be simple catching rubbish message, and improve the experience of user.
To achieve the above object, one side according to the ... of the embodiment of the present invention provides a kind of rubbish message hold-up interception method.
A kind of rubbish message hold-up interception method of the embodiment of the present invention includes the following steps:A) it is extracted from history chat record Go out to meet the message of length condition;B) deduplication is carried out to the message extracted;C) message of deduplication is segmented and is gone Except stop words, the stop words refers to the word of no specific meaning;D) calculate that execute step a) successively every to obtaining after c) The weight of each word of message;E) it calculates processed user message by cosine formula and executes step a) successively to d) Maximum similarity in the rubbish message corpus formed afterwards between every language material, wherein the processed user message is Stop words is removed after participle again and finally calculates the user message of the weight of each word;F) according to the maximum similarity It determines and adjusts similarity threshold, and by the similarity threshold catching rubbish message.
Optionally, the length of the message extracted is more than 50 characters.
Optionally, the rubbish message corpus can constantly expand.
Optionally, the user message is user's deferred information or user's online message.
In order to further enhance accuracy rate, deduplication and participle can carried out to the message extracted in a manner of optional Between non-spam is eliminated by artificial mode.
In addition optionally, stop words be in for example deactivated table " ", " this ", " " as word and other do not have The word of body meaning.
In addition, determining and adjusting similarity threshold as follows:The initial value of similarity threshold is set, when the maximum is similar When degree is greater than or equal to the initial value of the similarity threshold, it is desirable that user inputs identifying code, if a part of non-spam Needed in the case of transmission user input identifying code, then similarity threshold is increased, and if a part of rubbish message not by It intercepts, then extend to a part of rubbish message in the rubbish message corpus and reduces similarity threshold, directly The maximum amount of rubbish message is intercepted to realization and accidentally intercepts minimum non-spam.
In addition, above-mentioned cosine formula can indicate as follows:
Wherein, M is any one language material in the rubbish message corpus;U is to remove stop words simultaneously again after participle The user message of the weight of each word is finally calculated, and wherein, s1, s2..., siIt is the word in M and U while occurred Language;t1, t2..., tjIt is all words occurred in M;r1, r2..., rkIt is all words occurred in U;i≤min (j, k), that is to say, that i is less than or equal to that smaller in both j and k.
To achieve the above object, other side according to the ... of the embodiment of the present invention provides a kind of rubbish message interception dress It sets.
A kind of rubbish message blocking apparatus of the embodiment of the present invention includes:At rubbish message language material preparation module and message Reason and rubbish message blocking module, wherein the rubbish message language material preparation module from history chat record for extracting Meet the message of length condition, deduplication, participle are carried out to the message extracted, stop words is removed and calculates and pass through successively The weight of each word of every message of above-mentioned processing, to form rubbish message corpus, wherein the stop words refers to There is no the word of specific meaning;The Message Processing and rubbish message blocking module are used to calculate by cosine formula processed Maximum similarity in user message and the rubbish message corpus between every language material is simultaneously true according to the maximum similarity Fixed and adjustment similarity threshold is so as to by the similarity threshold catching rubbish message, wherein the processed user disappears Breath is the user message for the weight for removing stop words again after participle and finally calculating each word.
Optionally, the length of the message extracted is more than 50 characters.
Optionally, the rubbish message corpus can constantly expand.
Optionally, the user message is user's deferred information or user's online message.
In order to further enhance accuracy rate, deduplication and participle can carried out to the message extracted in a manner of optional Between non-spam is eliminated by artificial mode.
In addition optionally, stop words be in for example deactivated table " ", " this ", " " as word and other do not have The word of body meaning.
In addition, determining and adjusting similarity threshold as follows:The initial value of similarity threshold is set, when the maximum is similar When degree is greater than or equal to the initial value of the similarity threshold, it is desirable that user inputs identifying code, if a part of non-spam Needed in the case of transmission user input identifying code, then similarity threshold is increased, and if a part of rubbish message not by It intercepts, then extend to a part of rubbish message in the rubbish message corpus and reduces similarity threshold, directly The maximum amount of rubbish message is intercepted to realization and accidentally intercepts minimum non-spam.
In addition, above-mentioned cosine formula can indicate as follows:
Wherein, M is any one language material in the rubbish message corpus;U is to remove stop words simultaneously again after participle The user message of the weight of each word is finally calculated, and wherein, s1, s2..., siIt is the word in M and U while occurred Language;t1, t2..., tjIt is all words occurred in M;r1, r2..., rkIt is all words occurred in U;i≤min (j, k), that is to say, that i is less than or equal to that smaller in both j and k.
To achieve the above object, according to the ... of the embodiment of the present invention in another aspect, providing a kind of electronic equipment.
The a kind of electronic equipment of the embodiment of the present invention includes:One or more processors;Storage device, for storing one Or multiple programs, when one or more of programs are executed by one or more of processors so that one or more of Processor realizes rubbish message hold-up interception method according to the ... of the embodiment of the present invention.
To achieve the above object, another aspect according to the ... of the embodiment of the present invention, provides a kind of computer-readable medium.
It is stored with computer program on a kind of computer-readable medium of the embodiment of the present invention, described program is by processor Rubbish message hold-up interception method according to the ... of the embodiment of the present invention is realized when execution.
The various embodiments described above have the following advantages that or advantageous effect:Without as being carried in the prior art by keyword Show, filtering sensitive words and add the mode of blacklist rubbish message is intercepted, but can with simple and highly efficient Mode intercepts rubbish message, disappears to realize to intercept the maximum amount of rubbish message and accidentally intercept minimal amount of non-junk Breath.
Further effect possessed by above-mentioned non-usual optional mode adds hereinafter in conjunction with specific implementation mode With explanation.
Description of the drawings
Attached drawing does not constitute inappropriate limitation of the present invention for more fully understanding the present invention.Wherein:
Fig. 1 is a kind of flow diagram of rubbish message hold-up interception method according to the ... of the embodiment of the present invention;
Fig. 2 is the schematic diagram of rubbish message blocking apparatus according to the ... of the embodiment of the present invention, the rubbish message blocking apparatus packet Include rubbish message language material preparation module and Message Processing and rubbish message blocking module;
Fig. 3 is suitable for come the structural representation of the computer system of the electronic equipment or server of realizing the embodiment of the present application Figure.
Specific implementation mode
It explains to the exemplary embodiment of the present invention below in conjunction with attached drawing, including the various of the embodiment of the present invention Details should think them only exemplary to help understanding.Therefore, those of ordinary skill in the art should recognize It arrives, various changes and modifications can be made to the embodiments described herein, without departing from scope and spirit of the present invention.Together The description to known function and structure is omitted for clarity and conciseness in sample in following description.
Fig. 1 is the flow chart of rubbish message hold-up interception method according to the ... of the embodiment of the present invention, as shown in Figure 1, the present invention is implemented A kind of rubbish message hold-up interception method of example mainly includes the following steps:
A) derived length is greater than the message of 50 characters from history chat record;
B) Message Record that removal repeats;(remaining non-spam in the Message Record optionally, repeated through removal Seldom, it in order to promote accuracy rate, can continue to eliminate non-spam by artificial mode)
C) every message that removal repeats segment using participle tool of for example increasing income and for example pass through stop words Word acquired after participle is removed stop words by table, such as " ", " ", the nonsensical word such as " this ";
D) each message after being handled successively through above-mentioned steps is all made of remaining word, for example, a piece of news Residue four words a, b, c, d so this message can be expressed as M (a, b, c, d), other message also so operate and table Show, according to the frequency that this four words occur in the message, the weight of each word can be calculated, that is, each word occurs Number divided by the sum of this message word obtain the weight of this word, such as a, the weight of b, c, tetra- words of d are respectively 0.2,0.3,0.1,0.4, then message can be expressed as M (a:0.2,b:0.3,c:0.1,d:0.4);So after processing just Final rubbish message corpus has been obtained, here, if there is new rubbish message, can also have been expanded through the above steps Into this corpus;
E) user's message or real-time transmission each message all c) and d) is handled through the above steps, such as herein Message after reason can for example be converted into U (t1 in an abstract way:w1,a:0.1;t2:w2,c:0.2;…;ti:Wi), wherein Ti indicates that word, wi indicate the weight of corresponding word, and in this example, t1 is word a, weight 0.1, in addition, t2 is Word c, weight 0.2, and so on.Next, the similarity of every language material in U and corpus is calculated, it is exemplary herein Ground calculates the similarity of U and M, and formula used is following cosine formula:
The similarity of U and every language material are calculated using the formula and obtain maximum similarity Max_sim;
F) similarity threshold is set and carrys out catching rubbish message, is initially for example set as 0.8, if institute is calculated Max_sim be greater than or equal to 0.8, then allow user input identifying code, the step for be intercept non-spam in order to prevent, and Rubbish message is avoided for example to harass contact staff again.If a part of non-spam needs user to input in the case of transmission Identifying code then increases similarity threshold, and if a part of rubbish message is not intercepted, a part of rubbish is disappeared Breath extends in the rubbish message corpus and reduces similarity threshold, until realize intercept the maximum amount of rubbish message and Accidentally intercept minimum non-spam.
In addition, the formula in above-mentioned example is abstracted, to obtain the more extensive cosine formula of applicability:
Wherein, M is any one language material in the rubbish message corpus;U is to remove stop words simultaneously again after participle The user message of the weight of each word is finally calculated, and wherein, s1, s2..., siIt is the word in M and U while occurred Language;t1, t2..., tjIt is all words occurred in M;r1, r2..., rkIt is all words occurred in U;i≤min (j, k).
Fig. 2 is the schematic diagram of rubbish message blocking apparatus according to the ... of the embodiment of the present invention, as shown in Figure 2, according to The rubbish message blocking apparatus of the embodiment of the present invention includes:Rubbish message language material preparation module and Message Processing and rubbish disappear Cease blocking module.Wherein, rubbish message language material preparation module is for example for executing above-mentioned step a) to d), and Message Processing and Rubbish message blocking module is for executing above-mentioned step e) to f).
The electronic equipment of the embodiment of the present invention includes:One or more processors;Storage device, for storing one or more A program, when one or more programs are executed by one or more processors so that one or more processors are realized according to this The method that the rubbish message of inventive embodiments intercepts.
Below with reference to Fig. 3, it illustrates the computer systems 300 suitable for the electronic equipment for realizing the embodiment of the present application Structural schematic diagram.Electronic equipment shown in Fig. 3 is only an example, to the function of the embodiment of the present application and should not use model Shroud carrys out any restrictions.
As shown in figure 3, computer system 300 includes central processing unit (CPU) 301, it can be read-only according to being stored in Program in memory (ROM) 302 or be loaded into the program in random access storage device (RAM) 303 from storage section 308 and Execute various actions appropriate and processing.In RAM 303, also it is stored with system 300 and operates required various programs and data. CPU 301, ROM 302 and RAM 303 are connected with each other by bus 304.Input/output (I/O) interface 305 is also connected to always Line 304.
It is connected to I/O interfaces 305 with lower component:Importation 306 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 307 of spool (CRT), liquid crystal display (LCD) etc. and loud speaker etc.;Storage section 308 including hard disk etc.; And the communications portion 309 of the network interface card including LAN card, modem etc..Communications portion 309 via such as because The network of spy's net executes communication process.Driver 310 is also according to needing to be connected to I/O interfaces 305.Detachable media 311, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on driver 310, as needed in order to be read from thereon Computer program be mounted into storage section 308 as needed.
Particularly, according to embodiment disclosed by the invention, method as described above may be implemented as computer software journey Sequence.For example, embodiment disclosed by the invention includes a kind of computer program product comprising carrying is on a computer-readable medium Computer program, which includes the program code for executing described method.In such embodiments, The computer program can be downloaded and installed by communications portion 309 from network, and/or be pacified from detachable media 311 Dress.When the computer program is executed by central processing unit (CPU) 301, the above-mentioned work(limited in the system of the application is executed Energy.
It should be noted that computer-readable medium shown in the application can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two arbitrarily combines.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or arbitrary above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to:Electrical connection with one or more conducting wires, just It takes formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type and may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In this application, can be any include computer readable storage medium or storage journey The tangible medium of sequence, the program can be commanded the either device use or in connection of execution system, device.And at this In application, computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to:Wirelessly, electric wire, optical cable, RF etc. or above-mentioned Any appropriate combination.
Flow chart in attached drawing and block diagram, it is illustrated that according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, program segment, or code of table, above-mentioned module, program segment, or code includes one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in module involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described module can also be arranged in the processor, for example, can be described as:A kind of processor packet Include rubbish message language material preparation module and Message Processing and rubbish message blocking module.Wherein, the title of these units is at certain In the case of do not constitute restriction to the unit itself.
As on the other hand, present invention also provides a kind of computer-readable medium, which can be Included in electronic equipment described in above-described embodiment;Can also be individualism, and without be incorporated the electronic equipment in. Above computer readable medium carries one or more program, when the electronics is set by one for said one or multiple programs It is standby when executing so that the electronic equipment includes:A) message for meeting length condition is extracted from history chat record;B) to taking out The message of taking-up carries out deduplication;C) stop words is segmented and removed to the message of deduplication, and the stop words refers to not having The word of specific meaning;D) it calculates and executes step a) successively to the weight of each word of the every message obtained after c);E) it borrows Cosine formula is helped to calculate processed user message and execute successively in step a) to rubbish message corpus d) formed afterwards often Maximum similarity between language material, wherein the processed user message is the removal stop words and last again after participle Calculate the user message of the weight of each word;F) it according to maximum similarity determination and adjustment similarity threshold, and borrows Help the similarity threshold catching rubbish message.
Technical solution according to the ... of the embodiment of the present invention has the following advantages that or advantageous effect:Without as in the prior art Rubbish message intercepted by way of keyword prompt, filtering sensitive words and addition blacklist, but can be with Simple and highly efficient mode intercepts rubbish message, to realize the maximum amount of rubbish message of interception and accidentally intercept minimum Non-spam.
Above-mentioned specific implementation mode, does not constitute limiting the scope of the invention.Those skilled in the art should be bright It is white, design requirement and other factors are depended on, various modifications, combination, sub-portfolio and replacement can occur.It is any Modifications, equivalent substitutions and improvements made by within the spirit and principles in the present invention etc., should be included in the scope of the present invention Within.

Claims (14)

1. a kind of rubbish message hold-up interception method, which is characterized in that include the steps that executing successively as follows:
A) message for meeting length condition is extracted from history chat record;
B) deduplication is carried out to the message extracted;
C) stop words is segmented and removed to the message of deduplication, and the stop words refers to the word of no specific meaning;
D) it calculates and executes step a) successively to the weight of each word of the every message obtained after c);
E) it calculates processed user message by cosine formula and executes step a) successively to rubbish message language d) formed afterwards Expect the maximum similarity between every language material in library, wherein the processed user message is to remove to deactivate again after participle Word and finally calculate each word weight user message;
F) according to maximum similarity determination and adjustment similarity threshold, and disappear by the similarity threshold catching rubbish Breath.
2. according to the method described in claim 1, it is characterized in that, the length of the message extracted is more than 50 characters.
3. according to the method described in claim 1, it is characterized in that, the user message is that user's deferred information or user are online Message.
4. according to the method described in claim 1, it is characterized in that, after carrying out deduplication to the message that extracts and Non-spam is removed by artificial mode before further being segmented.
5. according to the method described in claim 1, it is characterized in that, determining and adjusting as follows the phase for catching rubbish message Like degree threshold value:
The initial value of similarity threshold is set, when the maximum similarity is greater than or equal to the initial value of the similarity threshold When, it is desirable that user inputs identifying code, if a part of non-spam needs user to input identifying code in the case of transmission, Similarity threshold is increased, and if a part of rubbish message is not intercepted, a part of rubbish message is extended to Reduce in the rubbish message corpus and by similarity threshold, intercepts the maximum amount of rubbish message until realizing and accidentally intercept most Few non-spam.
6. according to the method described in claim 1, it is characterized in that, the cosine formula is
Wherein, M is any one language material in the rubbish message corpus;U is the removal stop words and last again after participle The user message of the weight of each word is calculated, and wherein, s1, s2..., siIt is the word in M and U while occurred; t1, t2..., tjIt is all words occurred in M;r1, r2..., rkIt is all words occurred in U;I≤min (j, k)。
7. a kind of rubbish message blocking apparatus, which is characterized in that the rubbish message blocking apparatus includes that rubbish message language material is accurate Standby module and Message Processing and rubbish message blocking module, wherein
The rubbish message language material preparation module is used to extract the message for meeting length condition from history chat record, to taking out The message of taking-up carries out deduplication, participle, removal stop words and calculates the every of every message Jing Guo above-mentioned processing successively The weight of a word, to form rubbish message corpus, wherein the stop words refers to the word of no specific meaning;
The Message Processing and rubbish message blocking module be used for by cosine formula calculate processed user message with it is described Maximum similarity in rubbish message corpus between every language material and according to the maximum similarity is determining and adjustment similarity Threshold value is so as to by the similarity threshold catching rubbish message, wherein the processed user message be after participle again It removes stop words and finally calculates the user message of the weight of each word.
8. device according to claim 7, which is characterized in that the length of the message extracted is more than 50 characters.
9. device according to claim 7, which is characterized in that the user message is that user's deferred information or user are online Message.
10. the method according to the description of claim 7 is characterized in that after carrying out deduplication to the message extracted And non-spam is removed by artificial mode before further being segmented.
11. the method according to the description of claim 7 is characterized in that determining and adjusting similarity threshold as follows:
The initial value of similarity threshold is set, when the maximum similarity is greater than or equal to the initial value of the similarity threshold When, it is desirable that user inputs identifying code, if a part of non-spam needs user to input identifying code in the case of transmission, Similarity threshold is increased, and if a part of rubbish message is not intercepted, a part of rubbish message is extended to Reduce in the rubbish message corpus and by similarity threshold, intercepts the maximum amount of rubbish message until realizing and accidentally intercept most Few non-spam.
12. the method according to the description of claim 7 is characterized in that the cosine formula is
Wherein, M is any one language material in the rubbish message corpus;U is the removal stop words and last again after participle The user message of the weight of each word is calculated, and wherein, s1, s2..., siIt is the word in M and U while occurred; t1, t2..., tjIt is all words occurred in M;r1, r2..., rkIt is all words occurred in U;I≤min (j, k)。
13. a kind of electronic equipment, which is characterized in that including:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method as described in any in claim 1-6.
14. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that
The method as described in any in claim 1-6 is realized when described program is executed by processor.
CN201710276058.2A 2017-04-25 2017-04-25 Rubbish message hold-up interception method and device Pending CN108733730A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710276058.2A CN108733730A (en) 2017-04-25 2017-04-25 Rubbish message hold-up interception method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710276058.2A CN108733730A (en) 2017-04-25 2017-04-25 Rubbish message hold-up interception method and device

Publications (1)

Publication Number Publication Date
CN108733730A true CN108733730A (en) 2018-11-02

Family

ID=63934372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710276058.2A Pending CN108733730A (en) 2017-04-25 2017-04-25 Rubbish message hold-up interception method and device

Country Status (1)

Country Link
CN (1) CN108733730A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112396504A (en) * 2021-01-21 2021-02-23 北京天通慧智科技有限公司 E-commerce order intercepting method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101600178A (en) * 2009-06-26 2009-12-09 成都市华为赛门铁克科技有限公司 Junk information confirmation method and device, terminal
CN102929872A (en) * 2011-08-08 2013-02-13 阿里巴巴集团控股有限公司 Computer-implemented message filtering method, message filtering device and system
CN104462115A (en) * 2013-09-17 2015-03-25 中兴通讯股份有限公司 Spam message identifying method and device
CN106503075A (en) * 2016-09-30 2017-03-15 北京奇虎科技有限公司 A kind of method and system of filtering spam message

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101600178A (en) * 2009-06-26 2009-12-09 成都市华为赛门铁克科技有限公司 Junk information confirmation method and device, terminal
CN102929872A (en) * 2011-08-08 2013-02-13 阿里巴巴集团控股有限公司 Computer-implemented message filtering method, message filtering device and system
CN104462115A (en) * 2013-09-17 2015-03-25 中兴通讯股份有限公司 Spam message identifying method and device
CN106503075A (en) * 2016-09-30 2017-03-15 北京奇虎科技有限公司 A kind of method and system of filtering spam message

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112396504A (en) * 2021-01-21 2021-02-23 北京天通慧智科技有限公司 E-commerce order intercepting method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN105786793B (en) Parse the semantic method and apparatus of spoken language text information
CN112527649A (en) Test case generation method and device
CN108768840A (en) A kind of method and apparatus of account management
CN111092999A (en) Data request processing method and device
CN113657113A (en) Text processing method and device and electronic equipment
CN111861596A (en) Text classification method and device
CN107819745B (en) Method and device for defending against abnormal traffic
CN109150790B (en) Web page crawler identification method and device
CN107247798B (en) Method and device for constructing search word bank
CN113568626B (en) Dynamic packaging and application package opening method and device and electronic equipment
CN108733730A (en) Rubbish message hold-up interception method and device
CN111626054A (en) New illegal behavior descriptor identification method and device, electronic equipment and storage medium
CN107679030B (en) Method and device for extracting synonyms based on user operation behavior data
CN115563942A (en) Contract generation method and device, electronic equipment and computer readable medium
CN115391343A (en) Bill data processing method and device, electronic equipment and storage medium
CN110019531A (en) A kind of method and apparatus obtaining analogical object set
CN113901316A (en) Information pushing method and device, electronic equipment and storage medium
CN113806522A (en) Abstract generation method, device, equipment and storage medium
CN112862554A (en) Order data processing method and device
CN110895564A (en) Potential customer data processing method and device
CN113590447B (en) Buried point processing method and device
WO2018214094A1 (en) Parser
CN117009961B (en) Method, device, equipment and medium for determining behavior detection rule
CN112667627B (en) Data processing method and device
CN115309785B (en) File rule engine library generation method, file information detection method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181102