CN111093188B - Method and device for monitoring harmful Bluetooth information - Google Patents

Method and device for monitoring harmful Bluetooth information Download PDF

Info

Publication number
CN111093188B
CN111093188B CN201911237298.7A CN201911237298A CN111093188B CN 111093188 B CN111093188 B CN 111093188B CN 201911237298 A CN201911237298 A CN 201911237298A CN 111093188 B CN111093188 B CN 111093188B
Authority
CN
China
Prior art keywords
bluetooth
information
face image
illegal
detecting whether
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911237298.7A
Other languages
Chinese (zh)
Other versions
CN111093188A (en
Inventor
陈晓涛
王琨
黄洪发
李斌辉
周勇林
沈智杰
景晓军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Surfilter Technology Development Co ltd
Surfilter Network Technology Co ltd
Original Assignee
Shenzhen Surfilter Technology Development Co ltd
Surfilter Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Surfilter Technology Development Co ltd, Surfilter Network Technology Co ltd filed Critical Shenzhen Surfilter Technology Development Co ltd
Priority to CN201911237298.7A priority Critical patent/CN111093188B/en
Publication of CN111093188A publication Critical patent/CN111093188A/en
Application granted granted Critical
Publication of CN111093188B publication Critical patent/CN111093188B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a device for monitoring harmful Bluetooth information, wherein the method comprises the following steps: receiving a Bluetooth file sent by Bluetooth equipment; detecting whether harmful information exists in the Bluetooth file or not; if harmful information exists in the Bluetooth file, acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment; detecting whether a network connection is established with a data processing platform at present; and if the network connection is established with the data processing platform at present, the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time are sent to the data processing platform based on the network connection. The invention can automatically receive the Bluetooth files sent by the peripheral Bluetooth equipment, discriminate the harmful information in the Bluetooth files, and report the Bluetooth files and the related information of the Bluetooth equipment to the data processing platform after discriminating the harmful information, thereby realizing the effective supervision of illegal Bluetooth equipment broadcasting the harmful information.

Description

Method and device for monitoring harmful Bluetooth information
Technical Field
The invention relates to the technical field of data processing, in particular to a method and a device for monitoring harmful information of Bluetooth.
Background
With the development of electronic technology and communication technology, we are already in a highly information-oriented society. In the current highly information-oriented society, various information and data are rapidly available and are huge in quantity. However, the information inevitably has some bad information, such as information full of violence and pornography.
Currently, some illegal parties use bluetooth advertisement machines or bluetooth mass-sending software to mass-send these bad information to devices around which bluetooth functions are enabled. If the user of the device receiving bad information is a minor, the physical and mental health of the minor will be seriously affected, and therefore, a method for monitoring harmful information of bluetooth is urgently needed.
Disclosure of Invention
To achieve the above object, the present invention provides a method of monitoring bluetooth harmful information, the method comprising:
receiving a Bluetooth file sent by Bluetooth equipment;
detecting whether harmful information exists in the Bluetooth file;
if harmful information exists in the Bluetooth file, acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment;
detecting whether a network connection is established with a data processing platform at present;
and if the network connection is established with the data processing platform at present, the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time are sent to the data processing platform based on the network connection.
Optionally, the detecting whether harmful information exists in the bluetooth file includes:
detecting whether the Bluetooth file contains text information and/or a face image;
when the Bluetooth file contains text information, detecting whether the text information is illegal text information;
and/or:
when the Bluetooth file contains a face image, detecting whether the face image is an illegal face image;
and if the text information is illegal text information and/or the face image is an illegal face image, determining that harmful information exists in the Bluetooth file.
Optionally, the detecting whether the text information is illegal text information includes:
detecting whether a preset sensitive vocabulary exists in the character information;
and if the preset sensitive words exist in the character information, determining that the character information is illegal character information.
Optionally, the detecting whether the face image is an illegal face image includes:
calculating the similarity between the face image and each preset face image to obtain each similarity calculation result;
and if the similarity calculation results which are greater than or equal to a preset threshold value exist in the similarity calculation results, determining that the face image is an illegal face image.
Optionally, after the detecting whether the network connection with the data processing platform is currently established, the method further includes:
and if the network connection with the data platform is not established currently, storing the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time into a local memory in an associated manner.
In addition, to achieve the above object, the present invention also provides an apparatus for monitoring harmful information of bluetooth, the apparatus comprising:
the receiving module is used for receiving the Bluetooth file sent by the Bluetooth equipment;
the information detection module is used for detecting whether harmful information exists in the Bluetooth file;
the acquisition module is used for acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment if harmful information exists in the Bluetooth file;
the link detection module is used for detecting whether network connection is established with the data processing platform at present;
and the sending module is used for sending the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time to the data processing platform based on the network connection if the network connection is established with the data processing platform at present.
Optionally, the information detecting module is configured to:
detecting whether the Bluetooth file contains text information and/or a face image;
when the Bluetooth file contains text information, detecting whether the text information is illegal text information;
and/or:
when the Bluetooth file contains a face image, detecting whether the face image is an illegal face image;
and if the text information is illegal text information and/or the face image is an illegal face image, determining that harmful information exists in the Bluetooth file.
Optionally, the information detecting module is configured to:
detecting whether a preset sensitive vocabulary exists in the character information;
and if the preset sensitive words exist in the character information, determining that the character information is illegal character information.
Optionally, the information detecting module is configured to:
calculating the similarity between the face image and each preset face image to obtain each similarity calculation result;
and if the similarity calculation results which are greater than or equal to a preset threshold exist in the similarity calculation results, determining that the face image is an illegal face image.
Optionally, the apparatus further comprises:
and the storage module is used for storing the Bluetooth file, the MAC address of the Bluetooth equipment, the signal strength and the current time into a local memory in a correlated manner if the network connection with the data platform is not established currently.
In the invention, a Bluetooth file sent by Bluetooth equipment is received; detecting whether harmful information exists in the Bluetooth file; if harmful information exists in the Bluetooth file, acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment; detecting whether a network connection is established with a data processing platform at present; and if the network connection is established with the data processing platform at present, the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time are sent to the data processing platform based on the network connection. The invention can automatically receive the Bluetooth files sent by the peripheral Bluetooth equipment, discriminate the harmful information in the Bluetooth files, and report the Bluetooth files and the related information of the Bluetooth equipment to the data processing platform after discriminating the harmful information, thereby realizing the effective supervision of illegal Bluetooth equipment broadcasting the harmful information.
Drawings
FIG. 1 is a flowchart illustrating an embodiment of a method for monitoring harmful Bluetooth messages according to the present invention;
fig. 2 is a schematic view of a scenario for harmful information monitoring in an embodiment of a method for monitoring harmful information in bluetooth according to the present invention;
fig. 3 is a schematic diagram illustrating functional modules of an apparatus for monitoring bluetooth harmful information according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
Referring to fig. 1, fig. 1 is a flowchart illustrating an embodiment of a method for monitoring bluetooth harmful information according to the present invention. In one embodiment, a method of monitoring bluetooth harmful information includes:
step S10, receiving a Bluetooth file sent by Bluetooth equipment;
in this embodiment, the method for monitoring harmful bluetooth information is applied to a device for monitoring harmful bluetooth information, and referring to fig. 2, fig. 2 is a scene schematic diagram illustrating harmful information monitoring performed in an embodiment of the method for monitoring harmful bluetooth information according to the present invention. As shown in fig. 2, the apparatus for monitoring harmful bluetooth information includes a main control chip AR9531, a dual-mode bluetooth CSR 8510, a 256M SPI data storage FLASH, and a 4G wireless transmission module. The main control chip software adopts a linux embedded system supported by an OpenWrt open source SDK, integrates a Bluetooth bluetooth drive and a 4G module USB drive. The main control chip AR9531 integrates and supports Bluetooth application layer software bluez, sets the Bluetooth module to be in a slave mode pairing-free open detection mode, and is used for automatically pairing with external Bluetooth equipment (Bluetooth file mass-sending machine) and receiving Bluetooth files sent by the external Bluetooth equipment. The device for monitoring the harmful information of the Bluetooth carries out strict information retrieval screening on the title and the content of the file received by the Bluetooth, locates illegal information and gives an alarm. The device for monitoring the harmful information of the Bluetooth supports data storage of illegal information such as files, illegal Bluetooth mac, alarm time, signal intensity and the like, and can automatically store the illegal information without a network. The device for monitoring the harmful information of the Bluetooth enables equipment to be connected with internet service in time through networking of the 4G wireless transmission module, reports detailed alarm triggering data to the central service platform in real time to perform more detailed data analysis, and performs data collision with other data platforms to mine more associated information and more effectively position illegal molecules.
Step S20, detecting whether harmful information exists in the Bluetooth file;
in one embodiment, step S20 includes:
detecting whether the Bluetooth file contains text information and/or a face image;
when the Bluetooth file contains text information, detecting whether the text information is illegal text information;
in this embodiment, the bluetooth file generally has a title, and the title of the bluetooth file can be used as text information to detect whether the title is illegal text information, and when the title is not illegal text information, further detect whether the content of the bluetooth file has text information, and when the content has text information, detect whether the text information is illegal text information.
In an embodiment, the detecting whether the text message is an illegal text message includes:
detecting whether a preset sensitive vocabulary exists in the text information or not;
and if the preset sensitive words exist in the character information, determining that the character information is illegal character information.
In this embodiment, whether a preset sensitive vocabulary exists in the text information is detected by screening the keywords, where the preset sensitive vocabulary is some preset vocabularies related to yellow storm. And if the preset sensitive words are detected to exist in the character information, determining the character information as illegal character information. In the embodiment, whether a preset sensitive vocabulary exists in the title of the Bluetooth file is detected, if so, the text information existing in the Bluetooth file is determined to be illegal text information, and harmful information exists in the Bluetooth file; or when detecting that the title of the Bluetooth file does not have the preset sensitive vocabulary, further detecting whether the content of the Bluetooth file has character information or not, if so, detecting whether the character information has the preset sensitive vocabulary or not, if so, determining that the content of the Bluetooth file has illegal character information, and determining that the Bluetooth file has harmful information.
And/or:
when the Bluetooth file contains a face image, detecting whether the face image is an illegal face image;
in an embodiment, the detecting whether the face image is an illegal face image includes:
calculating the similarity between the face image and each preset face image to obtain each similarity calculation result;
and if the similarity calculation results which are greater than or equal to a preset threshold exist in the similarity calculation results, determining that the face image is an illegal face image.
In this embodiment, if the bluetooth file includes a face image, the similarity between the face image and each preset face image is calculated to obtain each similarity calculation result. Wherein, each preset face image is a face image which is frequently appeared in some illegal pictures. If the similarity calculation results which are greater than or equal to the preset threshold exist in the similarity calculation results, it is indicated that the face image contained in the bluetooth file and the preset face image corresponding to the similarity calculation results which are greater than or equal to the preset threshold are the same person face image, and therefore the face image in the bluetooth file is considered to be an illegal face image, and therefore the fact that harmful information exists in the bluetooth file is determined.
In this embodiment, a plurality of face images that often appear in an illegal picture may also be obtained in advance, face feature values of the face images may be identified, hash values corresponding to the face feature values may be calculated, and the hash values may be stored. When a face image exists in the Bluetooth file, identifying a characteristic value of the face image, calculating a hash value corresponding to the characteristic value, comparing the hash value obtained by current calculation with each stored hash value, and if a target hash value consistent with the hash value obtained by current calculation exists in the stored hash values, indicating that the face image existing in the Bluetooth file and the face image corresponding to the target hash value are face images of the same person, considering that the face image existing in the Bluetooth file is an illegal face image, thereby determining that harmful information exists in the Bluetooth file.
And if the text information is illegal text information and/or the face image is an illegal face image, determining that harmful information exists in the Bluetooth file.
In this embodiment, when the text information in the bluetooth file is illegal text information and/or the face image is an illegal face image, it is determined that harmful information exists in the bluetooth file. Except that whether harmful information exists in the Bluetooth file is judged from two aspects of character information and a face image, whether malicious viruses exist in the Bluetooth file can be detected, and if so, the harmful information exists in the Bluetooth file. The malicious virus generally exists in a code form, so that whether malicious codes exist in the Bluetooth file or not can be detected, and if the malicious codes exist in the Bluetooth file, harmful information exists in the Bluetooth file.
Step S30, if harmful information exists in the Bluetooth file, obtaining the MAC address, the signal intensity and the current time of the Bluetooth equipment;
in this embodiment, if there is harmful information in the bluetooth file, the MAC address, the signal strength, and the current time of the bluetooth device are further obtained.
Step S40, detecting whether a network connection is established with the data processing platform at present;
in this embodiment, whether the device for monitoring harmful bluetooth information can perform data communication with the data processing platform is detected, and if the device for monitoring harmful bluetooth information can perform data communication with the data processing platform, it is indicated that network connection is currently established with the data processing platform.
And S50, if network connection is established with a data processing platform currently, the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time are sent to the data processing platform based on the network connection.
In this embodiment, if a network connection is currently established with the data processing platform, the bluetooth file, the MAC address of the bluetooth device, the signal strength, and the current time are sent to the data processing platform based on the network connection. The data processing platform can perform more detailed data analysis based on the received Bluetooth file, the MAC address of the Bluetooth device, the signal intensity and the current time, and can more effectively position the illegal Bluetooth device which transmits harmful information.
Further, in an embodiment, after step S40, the method further includes:
and if the network connection with the data platform is not established currently, storing the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time into a local memory in an associated manner.
In this embodiment, if the network connection with the data platform is not currently established, the bluetooth file, the MAC address of the bluetooth device, the signal strength, and the current time are stored in the local storage in an associated manner, so that after the network connection with the data processing platform is subsequently established (wired network connection or wireless network connection), the data are sent to the data processing platform, so that the data processing platform performs more detailed data analysis based on the received bluetooth file, the MAC address of the bluetooth device, the signal strength, and the current time, and can more effectively locate the illegal bluetooth device that propagates harmful information.
In this embodiment, a bluetooth file sent by a bluetooth device is received; detecting whether harmful information exists in the Bluetooth file; if harmful information exists in the Bluetooth file, acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment; detecting whether a network connection is established with a data processing platform at present; and if the network connection is established with the data processing platform currently, the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time are sent to the data processing platform based on the network connection. Through the embodiment, the Bluetooth files sent by the peripheral Bluetooth equipment can be automatically received, harmful information in the Bluetooth files can be discriminated, and the Bluetooth files and related information of the Bluetooth equipment are reported to the data processing platform after the harmful information is discriminated, so that the illegal Bluetooth equipment for broadcasting the harmful information can be effectively supervised.
Referring to fig. 3, fig. 3 is a functional block diagram of an embodiment of an apparatus for monitoring bluetooth harmful information according to the present invention. In one embodiment, an apparatus for monitoring bluetooth harmful information includes:
the receiving module 10 is used for receiving a bluetooth file sent by a bluetooth device;
an information detection module 20, configured to detect whether there is harmful information in the bluetooth file;
an obtaining module 30, configured to obtain an MAC address, a signal strength, and a current time of the bluetooth device if the bluetooth file contains harmful information;
a link detection module 40, configured to detect whether a network connection is currently established with the data processing platform;
a sending module 50, configured to send the bluetooth file, the MAC address of the bluetooth device, the signal strength, and the current time to the data processing platform based on the network connection if the network connection is currently established with the data processing platform.
Further, in an embodiment, the information detecting module 20 is configured to:
detecting whether the Bluetooth file contains text information and/or a face image;
when the Bluetooth file contains text information, detecting whether the text information is illegal text information;
and/or:
when the Bluetooth file contains a face image, detecting whether the face image is an illegal face image;
and if the text information is illegal text information and/or the face image is an illegal face image, determining that harmful information exists in the Bluetooth file.
Further, in an embodiment, the information detecting module 20 is configured to:
detecting whether a preset sensitive vocabulary exists in the character information;
and if the preset sensitive words exist in the character information, determining that the character information is illegal character information.
Further, in an embodiment, the information detecting module 20 is configured to:
calculating the similarity between the face image and each preset face image to obtain each similarity calculation result;
and if the similarity calculation results which are greater than or equal to a preset threshold exist in the similarity calculation results, determining that the face image is an illegal face image.
Further, in an embodiment, the apparatus further includes:
and the storage module is used for storing the Bluetooth file, the MAC address of the Bluetooth equipment, the signal strength and the current time into a local memory in a correlated manner if the network connection with the data platform is not established currently.
The specific embodiment of the apparatus for monitoring harmful bluetooth information according to the present invention is substantially the same as the embodiments of the method for monitoring harmful bluetooth information, and will not be described herein again.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed to reflect the intent: rather, the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (10)

1. A method of monitoring bluetooth harmful information, the method comprising:
receiving a Bluetooth file sent by Bluetooth equipment; the Bluetooth equipment is a Bluetooth file group sender;
detecting whether harmful information exists in the Bluetooth file;
if harmful information exists in the Bluetooth file, acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment;
detecting whether a network connection is established with a data processing platform at present;
and if the network connection is established with the data processing platform at present, the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time are sent to the data processing platform based on the network connection.
2. The method of claim 1, wherein said detecting whether harmful information is present in the bluetooth file comprises:
detecting whether the Bluetooth file contains text information and/or a face image;
when the Bluetooth file contains text information, detecting whether the text information is illegal text information;
and/or:
when the Bluetooth file contains a face image, detecting whether the face image is an illegal face image;
and if the text information is illegal text information and/or the face image is an illegal face image, determining that harmful information exists in the Bluetooth file.
3. The method of claim 2, wherein said detecting whether the text message is an illegal text message comprises:
detecting whether a preset sensitive vocabulary exists in the character information;
and if the preset sensitive words exist in the character information, determining that the character information is illegal character information.
4. The method of claim 2, wherein the detecting whether the face image is an illegal face image comprises:
calculating the similarity between the face image and each preset face image to obtain each similarity calculation result;
and if the similarity calculation results which are greater than or equal to a preset threshold exist in the similarity calculation results, determining that the face image is an illegal face image.
5. The method of any of claims 1 to 4, wherein after said detecting whether a network connection is currently established with the data processing platform, further comprising:
and if the network connection with the data platform is not established currently, storing the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time into a local memory in an associated manner.
6. An apparatus for monitoring bluetooth harmful information, the apparatus comprising:
the receiving module is used for receiving the Bluetooth file sent by the Bluetooth equipment; the Bluetooth equipment is a Bluetooth file group sender;
the information detection module is used for detecting whether harmful information exists in the Bluetooth file;
the acquisition module is used for acquiring the MAC address, the signal intensity and the current time of the Bluetooth equipment if harmful information exists in the Bluetooth file;
the link detection module is used for detecting whether the network connection with the data processing platform is established currently;
and the sending module is used for sending the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time to the data processing platform based on the network connection if the network connection is established with the data processing platform at present.
7. The apparatus of claim 6, wherein the information detection module is to:
detecting whether the Bluetooth file contains text information and/or a face image;
when the Bluetooth file contains text information, detecting whether the text information is illegal text information;
and/or:
when the Bluetooth file contains a face image, detecting whether the face image is an illegal face image;
and if the text information is illegal text information and/or the face image is an illegal face image, determining that harmful information exists in the Bluetooth file.
8. The apparatus of claim 7, wherein the information detection module is to:
detecting whether a preset sensitive vocabulary exists in the text information or not;
and if the preset sensitive words exist in the character information, determining that the character information is illegal character information.
9. The apparatus of claim 7, wherein the information detection module is to:
calculating the similarity between the face image and each preset face image to obtain each similarity calculation result;
and if the similarity calculation results which are greater than or equal to a preset threshold exist in the similarity calculation results, determining that the face image is an illegal face image.
10. The apparatus of any of claims 6 to 9, further comprising:
and the storage module is used for storing the Bluetooth file, the MAC address of the Bluetooth equipment, the signal intensity and the current time into a local storage in a correlated manner if the network connection with the data platform is not established currently.
CN201911237298.7A 2019-12-05 2019-12-05 Method and device for monitoring harmful Bluetooth information Active CN111093188B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911237298.7A CN111093188B (en) 2019-12-05 2019-12-05 Method and device for monitoring harmful Bluetooth information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911237298.7A CN111093188B (en) 2019-12-05 2019-12-05 Method and device for monitoring harmful Bluetooth information

Publications (2)

Publication Number Publication Date
CN111093188A CN111093188A (en) 2020-05-01
CN111093188B true CN111093188B (en) 2023-04-07

Family

ID=70394855

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911237298.7A Active CN111093188B (en) 2019-12-05 2019-12-05 Method and device for monitoring harmful Bluetooth information

Country Status (1)

Country Link
CN (1) CN111093188B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7712141B1 (en) * 2005-06-30 2010-05-04 Google Inc. Determining advertising activity
CN101764704A (en) * 2009-12-10 2010-06-30 陕西鼎泰科技发展有限责任公司 Method for auditing internet sensitive contents and device thereof
CN201523458U (en) * 2009-11-19 2010-07-07 重庆蓝媒科技有限公司 Bluetooth information intelligent group sending device
CN102158830A (en) * 2010-11-02 2011-08-17 成都四方信息技术有限公司 Real time monitoring system for mobile network spam
CN102480500A (en) * 2010-11-26 2012-05-30 黑龙江亿林网络技术服务有限公司 Distributed harmful information management system and method
CN103139657A (en) * 2013-02-04 2013-06-05 青岛海信传媒网络技术有限公司 Advertising machine management system, advertising machine and verification method of advertising content played by advertising machine
US9349134B1 (en) * 2007-05-31 2016-05-24 Google Inc. Detecting illegitimate network traffic
CN105682059A (en) * 2015-12-24 2016-06-15 努比亚技术有限公司 Information intercepting method and device
CN107506454A (en) * 2017-08-29 2017-12-22 央视国际网络无锡有限公司 A kind of computer version and multi-media information security automatic early-warning system
CN109039509A (en) * 2018-07-16 2018-12-18 广州辉群智能科技有限公司 A kind of method and broadcasting equipment of voice control broadcasting equipment
CN109246851A (en) * 2018-10-30 2019-01-18 歌尔科技有限公司 A kind of processing method of bluetooth connection, equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7712141B1 (en) * 2005-06-30 2010-05-04 Google Inc. Determining advertising activity
US9349134B1 (en) * 2007-05-31 2016-05-24 Google Inc. Detecting illegitimate network traffic
CN201523458U (en) * 2009-11-19 2010-07-07 重庆蓝媒科技有限公司 Bluetooth information intelligent group sending device
CN101764704A (en) * 2009-12-10 2010-06-30 陕西鼎泰科技发展有限责任公司 Method for auditing internet sensitive contents and device thereof
CN102158830A (en) * 2010-11-02 2011-08-17 成都四方信息技术有限公司 Real time monitoring system for mobile network spam
CN102480500A (en) * 2010-11-26 2012-05-30 黑龙江亿林网络技术服务有限公司 Distributed harmful information management system and method
CN103139657A (en) * 2013-02-04 2013-06-05 青岛海信传媒网络技术有限公司 Advertising machine management system, advertising machine and verification method of advertising content played by advertising machine
CN105682059A (en) * 2015-12-24 2016-06-15 努比亚技术有限公司 Information intercepting method and device
CN107506454A (en) * 2017-08-29 2017-12-22 央视国际网络无锡有限公司 A kind of computer version and multi-media information security automatic early-warning system
CN109039509A (en) * 2018-07-16 2018-12-18 广州辉群智能科技有限公司 A kind of method and broadcasting equipment of voice control broadcasting equipment
CN109246851A (en) * 2018-10-30 2019-01-18 歌尔科技有限公司 A kind of processing method of bluetooth connection, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
关琳 ; .基于垃圾邮件发送模型的僵尸网络监测.网络安全技术与应用.2010,(第02期),全文. *

Also Published As

Publication number Publication date
CN111093188A (en) 2020-05-01

Similar Documents

Publication Publication Date Title
AU2018222996B2 (en) Audio watermarking for people monitoring
US9544316B2 (en) Method, device and system for detecting security of download link
CN104935605B (en) The detection method of fishing website, apparatus and system
CN111935319B (en) Monitoring processing method and system based on vehicle terminal system and related equipment
KR101628837B1 (en) Malicious application or website detecting method and system
US20150026813A1 (en) Method and system for detecting network link
CN110782374A (en) Electronic evidence obtaining method and system based on block chain
CN103034808A (en) Scanning method, equipment and system and cloud management method and equipment
CN111540020A (en) Method and device for determining target behavior, storage medium and electronic device
CN105791250B (en) Application program detection method and device
CN110866290A (en) Chip malicious tampering detection method and device, electronic equipment and storage medium
CN111385272B (en) Weak password detection method and device
CN106293667A (en) A kind of application modification detection method and device
CN108256328A (en) Identify the method and device of counterfeit application
CN111093188B (en) Method and device for monitoring harmful Bluetooth information
CN106407815B (en) Vulnerability detection method and device
CN106650439A (en) Suspicious application program detection method and device
WO2014208937A1 (en) Phishing site detecting method using image comparison and apparatus therefor
CN111651658A (en) Method and computer equipment for automatically identifying website based on deep learning
CN108322912B (en) Method and device for distinguishing short messages
KR101869264B1 (en) Apparatus and method for detecting phishing sites
CN108268775B (en) Web vulnerability detection method and device, electronic equipment and storage medium
CN113515744A (en) Malicious document detection method, device and system, electronic device and storage medium
CN111125692B (en) Anti-crawler method and device
CN105516148A (en) Method and apparatus for accessing to server by terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant