CN112311933A - Sensitive information shielding method and system - Google Patents
Sensitive information shielding method and system Download PDFInfo
- Publication number
- CN112311933A CN112311933A CN202011165251.7A CN202011165251A CN112311933A CN 112311933 A CN112311933 A CN 112311933A CN 202011165251 A CN202011165251 A CN 202011165251A CN 112311933 A CN112311933 A CN 112311933A
- Authority
- CN
- China
- Prior art keywords
- sensitive
- information
- short message
- message content
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/279—Recognition of textual entities
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a sensitive information shielding method and a system, wherein the method comprises the following steps: setting configuration information through a cloud server and sending the set configuration information to each of a plurality of user terminals, wherein the configuration information comprises a plurality of sensitive keywords; the user terminal saves the configuration information sent from the cloud server; acquiring a short message which is intended to be sent or received by a user terminal; and judging whether the acquired short message contains sensitive keywords or not according to the short message acquired by the configuration information identification information acquisition unit. The sensitive information shielding method and the sensitive information shielding system provided by the invention can identify the short message sent and received by the user according to the preset sensitive keyword, and find the short message containing the sensitive keyword.
Description
Technical Field
The invention relates to a sensitive information shielding method and system.
Background
At present, short messages in mobile phones come and go frequently, and sensitive information affecting national and social stability or sensitive information related to user services and industries is mixed in the short messages. The intelligent short message reminding carried by the existing system can only filter a part of spam short messages, the filtering condition is not clear, and the sensitive information can not be determined according to the service scene and industry of a user, and the sensitive information can not be filtered, so that the system has no applicability and safety.
Disclosure of Invention
The invention provides a sensitive information shielding method and a sensitive information shielding system, which adopt the following technical scheme:
a sensitive information shielding method, comprising the steps of:
setting configuration information through a cloud server and sending the set configuration information to each of a plurality of user terminals, wherein the configuration information comprises a plurality of sensitive keywords;
the user terminal saves the configuration information sent from the cloud server;
acquiring a short message which is intended to be sent or received by a user terminal;
and judging whether the acquired short message contains sensitive keywords or not according to the short message acquired by the configuration information identification information acquisition unit.
Furthermore, the configuration information comprises a plurality of user groups with different levels, each user group comprises a plurality of user information and a plurality of sensitive keywords, and the sensitive keywords corresponding to different user groups are not completely the same;
the specific method for judging whether the acquired short message contains the sensitive keyword or not according to the short message acquired by the configuration information identification information acquisition unit comprises the following steps:
respectively acquiring sender information, recipient information and short message content from the acquired short messages which are intended to be sent or received by the user terminal;
matching a corresponding user group from the configuration information according to the sender information, acquiring a plurality of sensitive keywords corresponding to the user group as a first sensitive keyword group, matching a corresponding user group from the configuration information according to the receiver information, and acquiring a plurality of sensitive keywords corresponding to the user group as a second sensitive keyword group;
and identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains sensitive keywords.
Further, before the short message content is identified according to the first sensitive keyword group and the short message content is identified according to the second sensitive keyword group to judge whether the short message content contains sensitive keywords, comparing the first sensitive keyword group with the second sensitive keyword group to judge whether the first sensitive keyword group and the second sensitive keyword group are the same;
under the condition that the first sensitive keyword group and the second sensitive keyword group are different, identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains sensitive keywords;
under the condition that the first sensitive key phrase and the second sensitive key phrase are the same, identifying the short message content according to any one of the first sensitive key phrase and the second sensitive key phrase so as to judge whether the short message content contains sensitive key words.
Further, the sensitive information shielding method further comprises the following steps:
and intercepting the short messages containing the sensitive keywords and storing the intercepted short messages.
Further, the sensitive information shielding method further comprises the following steps:
and when the information interception unit intercepts the short message containing the sensitive keyword, the report information is sent to the cloud server.
A sensitive information masking system, comprising: the system comprises a cloud server and a plurality of user terminals for users to send or receive short messages;
the plurality of user terminals are in wireless connection with the cloud server through a wireless network;
the cloud server includes:
the configuration setting unit is used for setting configuration information, the configuration information comprises a plurality of sensitive keywords, and the cloud server sends the set configuration information to each user terminal;
the user terminal includes:
the configuration storage unit is used for storing the configuration information sent from the cloud server;
the information processing unit is used for a user to edit or receive the short message;
the information acquisition unit is used for acquiring short messages which are intended to be sent or received by the user terminal;
and the information matching unit is used for identifying the short message acquired by the information acquisition unit according to the configuration information stored in the configuration storage unit so as to judge whether the acquired short message contains the sensitive keyword.
Furthermore, the configuration information comprises a plurality of user groups with different levels, each user group comprises a plurality of user information and a plurality of sensitive keywords, and the sensitive keywords corresponding to different user groups are not completely the same;
the information matching unit includes:
the extraction module is used for respectively acquiring sender information, receiver information and short message content from the short message acquired by the information acquisition unit;
the matching module is used for matching a corresponding user group from the configuration information stored in the configuration storage unit according to the sender information, acquiring a plurality of sensitive keywords corresponding to the user group as a first sensitive keyword group, matching a corresponding user group from the configuration information stored in the configuration storage unit according to the recipient information, and acquiring a plurality of sensitive keywords corresponding to the user group as a second sensitive keyword group;
and the identification module is used for identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group so as to judge whether the short message content contains sensitive keywords.
Further, the information matching unit further includes:
the comparison module is used for comparing the first sensitive key phrase with the second sensitive key phrase to judge whether the first sensitive key phrase and the second sensitive key phrase are the same;
under the condition that the first sensitive keyword group and the second sensitive keyword group are different, the identification module identifies the short message content according to the first sensitive keyword group and identifies the short message content according to the second sensitive keyword group so as to judge whether the short message content contains sensitive keywords;
under the condition that the first sensitive key phrase and the second sensitive key phrase are the same, the identification module identifies the short message content according to any one of the first sensitive key phrase and the second sensitive key phrase so as to judge whether the short message content contains sensitive key words.
Further, the sensitive information shielding system further comprises:
and the information interception unit is used for intercepting the short messages containing the sensitive keywords and storing the intercepted short messages.
Further, the sensitive information shielding system further comprises:
and the information reporting unit is used for sending the reporting information to the cloud server when the information interception unit intercepts the short message containing the sensitive keyword.
The method and the system for shielding the sensitive information have the beneficial effects that the short messages sent and received by the user can be identified according to the preset sensitive keywords, and the short messages containing the sensitive keywords can be found.
The method and the system for shielding the sensitive information have the advantages that the method and the system for shielding the sensitive information can set the users to different levels when the sensitive keywords are configured, and the sensitive keywords corresponding to the users at different levels are different, so that different shielding schemes can be configured for different crowds.
Drawings
FIG. 1 is a schematic diagram of the sensitive information masking method of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
Fig. 1 shows a sensitive information shielding method of the present invention, which includes the following steps: s1: the method comprises the steps of setting configuration information through a cloud server and sending the set configuration information to each of a plurality of user terminals, wherein the configuration information comprises a plurality of sensitive keywords. S2: the user terminal stores the configuration information sent from the cloud server. S3: and acquiring the short message which is about to be sent or received by the user terminal. S4: and judging whether the acquired short message contains sensitive keywords or not according to the short message acquired by the configuration information identification information acquisition unit. Through the steps, the short messages sent and received by the user are identified according to the preset sensitive keywords, and the short messages containing the sensitive keywords are found. The above steps are specifically described below.
For step S1: the method comprises the steps of setting configuration information through a cloud server and sending the set configuration information to each of a plurality of user terminals, wherein the configuration information comprises a plurality of sensitive keywords.
The users send short messages to each other through the user terminal. Generally, the user terminal is a mobile phone. And setting configuration information through the cloud server and sending the set configuration information to each of the plurality of user terminals. The configuration information contains a plurality of sensitive keywords to be shielded.
For step S2: the user terminal stores the configuration information sent from the cloud server.
For step S3: and acquiring the short message which is about to be sent or received by the user terminal.
When a user sends or receives short messages through a user terminal, the short messages are acquired before being sent or received and checked by the user.
For step S4: and judging whether the acquired short message contains sensitive keywords or not according to the short message acquired by the configuration information identification information acquisition unit.
After the short messages are acquired in step S3, the acquired short messages are identified according to the configuration information, and whether the short messages include sensitive keywords in the configuration information is determined.
As a preferred embodiment, the configuration information includes a plurality of user groups of different levels, each user group includes a plurality of user information and a plurality of sensitive keywords, and the sensitive keywords corresponding to different user groups are not identical.
It will be appreciated that in some use cases, the level of information that can be accessed varies from one level of people to another. Therefore, when information monitoring and shielding are performed, different sensitive keywords need to be set according to different user levels and permissions. Specifically, when setting the configuration information, the configuration information is divided into user groups with different levels of permissions, each user group includes user information of users at corresponding levels and a plurality of sensitive keywords, and different sensitive keywords are set for the user groups at different levels.
The specific method for judging whether the acquired short message contains the sensitive keyword or not according to the short message acquired by the configuration information identification information acquisition unit comprises the following steps: and respectively acquiring sender information, recipient information and short message content from the acquired short messages which the user terminal intends to send or receive. And matching a corresponding user group from the configuration information according to the sender information, acquiring a plurality of sensitive keywords corresponding to the user group as a first sensitive keyword group, matching a corresponding user group from the configuration information according to the recipient information, and acquiring a plurality of sensitive keywords corresponding to the user group as a second sensitive keyword group. And identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains sensitive keywords.
As a preferred implementation manner, before the short message content is identified according to the first sensitive keyword group and the short message content is identified according to the second sensitive keyword group to determine whether the short message content contains the sensitive keyword, the first sensitive keyword group and the second sensitive keyword group are compared to determine whether the two groups are the same. And under the condition that the first sensitive keyword group and the second sensitive keyword group are different, identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains sensitive keywords. Under the condition that the first sensitive key phrase and the second sensitive key phrase are the same, identifying the short message content according to any one of the first sensitive key phrase and the second sensitive key phrase so as to judge whether the short message content contains sensitive key words.
As a preferred embodiment, the sensitive information shielding method further includes: and intercepting the short messages containing the sensitive keywords and storing the intercepted short messages. Specifically, after a short message containing a sensitive keyword is detected, the short message is prevented from being received and sent, and the received short message is stored for being called by a subsequent process.
As a preferred embodiment, the sensitive information shielding method further includes: and when the information interception unit intercepts the short message containing the sensitive keyword, the report information is sent to the cloud server. Specifically, after a short message containing the sensitive keyword is detected, reporting information is sent to the cloud server, wherein the reporting information contains a sender, a receiver, the content of the short message and the like, and optionally, the reporting information also contains the identified sensitive keyword, the IMEI number of the mobile phone, the sending and receiving time and the like.
The invention also discloses a sensitive information shielding system which is used for carrying out the sensitive information shielding. The sensitive information shielding system comprises: the system comprises a cloud server and a plurality of user terminals for users to send or receive short messages. And the user terminals are in wireless connection with the cloud server through a wireless network. Specifically, the cloud server includes: a setting unit is configured. The configuration setting unit is used for setting configuration information, the configuration information comprises a plurality of sensitive keywords, and the cloud server sends the set configuration information to each user terminal. The user terminal includes: the device comprises a configuration storage unit, an information processing unit, an information acquisition unit and an information matching unit. The configuration storage unit is used for storing the configuration information sent from the cloud server. The information processing unit is used for a user to edit or receive the short message. The information acquisition unit is used for acquiring short messages which are intended to be sent or received by the user terminal. The information matching unit is used for identifying the short message acquired by the information acquisition unit according to the configuration information stored in the configuration storage unit so as to judge whether the acquired short message contains the sensitive keyword.
As a preferred embodiment, the configuration information includes a plurality of user groups of different levels, each user group includes a plurality of user information and a plurality of sensitive keywords, and the sensitive keywords corresponding to different user groups are not identical. The information matching unit includes: the device comprises an extraction module, a matching module and an identification module. The extraction module is used for respectively acquiring the sender information, the receiver information and the short message content from the short message acquired by the information acquisition unit. The matching module is used for matching a corresponding user group from the configuration information stored in the configuration storage unit according to the sender information, acquiring a plurality of sensitive keywords corresponding to the user group as first sensitive keyword groups, matching a corresponding user group from the configuration information stored in the configuration storage unit according to the recipient information, and acquiring a plurality of sensitive keywords corresponding to the user group as second sensitive keyword groups. The identification module is used for identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group so as to judge whether the short message content contains sensitive keywords.
As a preferred embodiment, the information matching unit further includes: and a comparison module.
The comparison module is used for comparing the first sensitive key phrase with the second sensitive key phrase to judge whether the first sensitive key phrase and the second sensitive key phrase are the same. Under the condition that the first sensitive keyword group and the second sensitive keyword group are different, the identification module identifies the short message content according to the first sensitive keyword group and identifies the short message content according to the second sensitive keyword group so as to judge whether the short message content contains sensitive keywords. Under the condition that the first sensitive key phrase and the second sensitive key phrase are the same, the identification module identifies the short message content according to any one of the first sensitive key phrase and the second sensitive key phrase so as to judge whether the short message content contains sensitive key words.
In a preferred embodiment, the sensitive information shielding system further comprises an information interception unit. The information interception unit is used for intercepting the short messages containing the sensitive keywords and storing the intercepted short messages.
As a preferred embodiment, the sensitive information shielding system further includes an information reporting unit, and the information reporting unit is configured to send the report information to the cloud server when the information interception unit intercepts the short message containing the sensitive keyword.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.
Claims (10)
1. A method for masking sensitive information, comprising the steps of:
setting configuration information through a cloud server and sending the set configuration information to each user terminal in a plurality of user terminals, wherein the configuration information comprises a plurality of sensitive keywords;
the user terminal saves the configuration information sent from the cloud server;
acquiring a short message which is intended to be sent or received by the user terminal;
and identifying the short message acquired by the information acquisition unit according to the configuration information to judge whether the acquired short message contains the sensitive keyword.
2. The sensitive information shielding method according to claim 1,
the configuration information comprises a plurality of user groups with different levels, each user group comprises a plurality of user information and a plurality of sensitive keywords, and the sensitive keywords corresponding to different user groups are not completely the same;
the specific method for identifying the short message acquired by the information acquisition unit according to the configuration information to judge whether the acquired short message contains the sensitive keyword comprises the following steps:
respectively acquiring sender information, recipient information and short message content from the acquired short messages which the user terminal intends to send or receive;
matching the corresponding user group from the configuration information according to the sender information, acquiring a plurality of sensitive keywords corresponding to the user group as a first sensitive keyword group, matching the corresponding user group from the configuration information according to the receiver information, and acquiring a plurality of sensitive keywords corresponding to the user group as a second sensitive keyword group;
and identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains the sensitive keywords.
3. The sensitive information shielding method according to claim 2,
comparing the first sensitive keyword group with the second sensitive keyword group to judge whether the short message content contains the sensitive keywords or not before identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains the sensitive keywords or not;
under the condition that the first sensitive keyword group and the second sensitive keyword group are different, identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group to judge whether the short message content contains the sensitive keywords;
under the condition that the first sensitive keyword group and the second sensitive keyword group are the same, identifying the short message content according to any one of the first sensitive keyword group and the second sensitive keyword group to judge whether the short message content contains the sensitive keywords.
4. The sensitive information shielding method according to claim 3,
the sensitive information shielding method further comprises the following steps:
and intercepting the short messages containing the sensitive keywords and storing the intercepted short messages.
5. The sensitive information shielding method according to claim 4,
the sensitive information shielding method further comprises the following steps:
and when the information interception unit intercepts the short message containing the sensitive keyword, sending report information to a cloud server.
6. A sensitive information masking system, comprising: the system comprises a cloud server and a plurality of user terminals for users to send or receive short messages;
the plurality of user terminals are in wireless connection with the cloud server through a wireless network;
the cloud server comprises:
the configuration setting unit is used for setting configuration information, the configuration information comprises a plurality of sensitive keywords, and the cloud server sends the set configuration information to each user terminal;
the user terminal includes:
the configuration storage unit is used for storing the configuration information sent from the cloud server;
the information processing unit is used for a user to edit or receive the short message;
the information acquisition unit is used for acquiring the short message which is intended to be sent or received by the user terminal;
and the information matching unit is used for identifying the short message acquired by the information acquisition unit according to the configuration information stored by the configuration storage unit so as to judge whether the acquired short message contains the sensitive keyword.
7. The sensitive information masking system of claim 6,
the configuration information comprises a plurality of user groups with different levels, each user group comprises a plurality of user information and a plurality of sensitive keywords, and the sensitive keywords corresponding to different user groups are not completely the same;
the information matching unit includes:
the extraction module is used for respectively acquiring sender information, receiver information and short message content from the short message acquired by the information acquisition unit;
the matching module is used for matching the corresponding user group from the configuration information stored in the configuration storage unit according to the sender information, acquiring a plurality of sensitive keywords corresponding to the user group as a first sensitive keyword group, matching the corresponding user group from the configuration information stored in the configuration storage unit according to the recipient information, and acquiring a plurality of sensitive keywords corresponding to the user group as a second sensitive keyword group;
and the identification module is used for identifying the short message content according to the first sensitive keyword group and identifying the short message content according to the second sensitive keyword group so as to judge whether the short message content contains the sensitive keywords.
8. The sensitive information masking system of claim 7,
the information matching unit further includes:
the comparison module is used for comparing the first sensitive key phrase with the second sensitive key phrase to judge whether the first sensitive key phrase and the second sensitive key phrase are the same;
under the condition that the first sensitive keyword group and the second sensitive keyword group are different, the identification module identifies the short message content according to the first sensitive keyword group and identifies the short message content according to the second sensitive keyword group so as to judge whether the short message content contains the sensitive keywords;
under the condition that the first sensitive keyword group and the second sensitive keyword group are the same, the identification module identifies the short message content according to any one of the first sensitive keyword group and the second sensitive keyword group so as to judge whether the short message content contains the sensitive keyword.
9. The sensitive information masking system as recited in claim 8,
the sensitive information shielding system further comprises:
and the information interception unit is used for intercepting the short messages containing the sensitive keywords and storing the intercepted short messages.
10. The sensitive information masking system as recited in claim 9,
the sensitive information shielding system further comprises:
and the information reporting unit is used for sending reporting information to the cloud server when the information interception unit intercepts the short message containing the sensitive keyword.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011165251.7A CN112311933B (en) | 2020-10-27 | 2020-10-27 | Sensitive information shielding method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011165251.7A CN112311933B (en) | 2020-10-27 | 2020-10-27 | Sensitive information shielding method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112311933A true CN112311933A (en) | 2021-02-02 |
CN112311933B CN112311933B (en) | 2021-10-15 |
Family
ID=74331075
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011165251.7A Active CN112311933B (en) | 2020-10-27 | 2020-10-27 | Sensitive information shielding method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112311933B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113505277A (en) * | 2021-06-23 | 2021-10-15 | 杭州天宽科技有限公司 | Android platform-based spam message detection device |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1288202A (en) * | 2000-06-23 | 2001-03-21 | 林海 | Method of preventing refuse E-mail |
CN101018215A (en) * | 2007-03-13 | 2007-08-15 | 杭州华为三康技术有限公司 | Mail filtering system and mail filtering method |
CN101150535A (en) * | 2007-06-15 | 2008-03-26 | 腾讯科技(深圳)有限公司 | Email filtering method, device and device |
CN101616101A (en) * | 2008-06-26 | 2009-12-30 | 阿里巴巴集团控股有限公司 | A kind of method for filtering user information and device |
CN102523345A (en) * | 2011-12-14 | 2012-06-27 | 汉王科技股份有限公司 | Time-based management method and system for contact person in mobile equipment |
US20120265831A1 (en) * | 2011-01-17 | 2012-10-18 | Alibaba Group Holding Limited | System and Method for Transmitting and Filtering Instant Messaging Information |
CN103220213A (en) * | 2013-04-23 | 2013-07-24 | 国网信息通信有限公司 | E-mail filtering method and device thereof |
CN105516947A (en) * | 2016-01-28 | 2016-04-20 | 宇龙计算机通信科技(深圳)有限公司 | Message receiving method and system for mobile terminal |
US20160189272A1 (en) * | 2009-10-15 | 2016-06-30 | Binja, Inc. | Mobile local search platform |
CN106250446A (en) * | 2016-07-27 | 2016-12-21 | 深圳市金立通信设备有限公司 | A kind of applicative notifications management method and terminal |
US20180054447A1 (en) * | 2016-08-22 | 2018-02-22 | Paubox, Inc. | Method for securely communicating email content between a sender and a recipient |
US10009301B1 (en) * | 2018-01-02 | 2018-06-26 | Spearhead Inc. | Peer-to-peer location-based messaging |
US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
US10268769B2 (en) * | 2016-08-29 | 2019-04-23 | International Business Machines Corporation | Sentiment analysis |
-
2020
- 2020-10-27 CN CN202011165251.7A patent/CN112311933B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1288202A (en) * | 2000-06-23 | 2001-03-21 | 林海 | Method of preventing refuse E-mail |
CN101018215A (en) * | 2007-03-13 | 2007-08-15 | 杭州华为三康技术有限公司 | Mail filtering system and mail filtering method |
CN101150535A (en) * | 2007-06-15 | 2008-03-26 | 腾讯科技(深圳)有限公司 | Email filtering method, device and device |
CN101616101A (en) * | 2008-06-26 | 2009-12-30 | 阿里巴巴集团控股有限公司 | A kind of method for filtering user information and device |
US20160189272A1 (en) * | 2009-10-15 | 2016-06-30 | Binja, Inc. | Mobile local search platform |
US20120265831A1 (en) * | 2011-01-17 | 2012-10-18 | Alibaba Group Holding Limited | System and Method for Transmitting and Filtering Instant Messaging Information |
CN102523345A (en) * | 2011-12-14 | 2012-06-27 | 汉王科技股份有限公司 | Time-based management method and system for contact person in mobile equipment |
CN103220213A (en) * | 2013-04-23 | 2013-07-24 | 国网信息通信有限公司 | E-mail filtering method and device thereof |
CN105516947A (en) * | 2016-01-28 | 2016-04-20 | 宇龙计算机通信科技(深圳)有限公司 | Message receiving method and system for mobile terminal |
CN106250446A (en) * | 2016-07-27 | 2016-12-21 | 深圳市金立通信设备有限公司 | A kind of applicative notifications management method and terminal |
US20180054447A1 (en) * | 2016-08-22 | 2018-02-22 | Paubox, Inc. | Method for securely communicating email content between a sender and a recipient |
US10268769B2 (en) * | 2016-08-29 | 2019-04-23 | International Business Machines Corporation | Sentiment analysis |
US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
US10009301B1 (en) * | 2018-01-02 | 2018-06-26 | Spearhead Inc. | Peer-to-peer location-based messaging |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113505277A (en) * | 2021-06-23 | 2021-10-15 | 杭州天宽科技有限公司 | Android platform-based spam message detection device |
Also Published As
Publication number | Publication date |
---|---|
CN112311933B (en) | 2021-10-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105898001B (en) | Communication information processing method and device and server | |
CN103763690A (en) | Method and device for sending short messages to mobile terminal from detection fake base station | |
CN103037062A (en) | Method and terminal and server used for intercepting crank calls | |
CN109769244B (en) | Abnormal telephone card identification method, device, equipment and readable storage medium | |
CN105335354A (en) | Cheat information recognition method and device | |
CN106899948B (en) | Pseudo base station discovery method, system, terminal and server | |
CN108271130B (en) | Communication system and method for identifying pseudo base station short message | |
CN103369486A (en) | System and method for preventing fraud SMS (Short message Service) message | |
CN107734469A (en) | A kind of fraudulent call based reminding method, device and computer-readable recording medium | |
CN112311933B (en) | Sensitive information shielding method and system | |
KR101246624B1 (en) | Method and appratus for detecting malicious communications | |
CN102098640B (en) | Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam | |
CN102421073B (en) | Method and device for processing short message | |
WO2016037489A1 (en) | Method, device and system for monitoring rcs spam messages | |
CN105516988A (en) | Telephone filtering method and device, electronic equipment and server | |
CN109067874B (en) | Method for processing push information based on port occupation | |
CN108924840B (en) | Blacklist management method and device and terminal | |
CN115396900A (en) | Telecommunication early warning monitoring system based on big data | |
CN113055921B (en) | Fault processing method and terminal | |
CN106912032B (en) | Information processing method, system, client and server | |
CN110493735B (en) | Short message processing method and device | |
CN113596260B (en) | Abnormal telephone number detection method and electronic equipment | |
CN103686642A (en) | Short message sending method and device | |
CN105188064B (en) | Method and device for shielding crank calls and short messages | |
US10602351B1 (en) | Communication information hiding realization method and realization system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |