CN113795002A - Method and device for intercepting junk short messages and computer readable storage medium - Google Patents

Method and device for intercepting junk short messages and computer readable storage medium Download PDF

Info

Publication number
CN113795002A
CN113795002A CN202111249137.7A CN202111249137A CN113795002A CN 113795002 A CN113795002 A CN 113795002A CN 202111249137 A CN202111249137 A CN 202111249137A CN 113795002 A CN113795002 A CN 113795002A
Authority
CN
China
Prior art keywords
short message
time period
short
blacklist
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111249137.7A
Other languages
Chinese (zh)
Other versions
CN113795002B (en
Inventor
秦保根
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202111249137.7A priority Critical patent/CN113795002B/en
Publication of CN113795002A publication Critical patent/CN113795002A/en
Application granted granted Critical
Publication of CN113795002B publication Critical patent/CN113795002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Abstract

The invention provides a method and a device for intercepting junk short messages and a computer readable storage medium, wherein the method comprises the following steps: acquiring a first number of short message codes for sending short messages in a target time period; when the first number is larger than a first threshold value, acquiring an International Mobile Equipment Identity (IMEI) and an equipment model of the terminal using the short message number; and when the obtained IMEI format is not matched with the preset format and/or the obtained equipment model is different from the equipment model permitted by the network access of the terminal, adding the short message number to the blacklist. In the invention, after the short message number is preliminarily determined according to the number of the short messages sent by the short message number in a time period to send the spam short messages, the IMEI and the equipment model of the terminal associated with the short message number are acquired, if the IMEI is different from the registered IMEI or the equipment model is different from the equipment model of the terminal permitted to access the network, the short message number is forbidden to send the spam short messages, and the spam short messages are effectively intercepted.

Description

Method and device for intercepting junk short messages and computer readable storage medium
Technical Field
The present invention relates to spam message interception technologies, and in particular, to a spam message interception method and apparatus, and a computer-readable storage medium.
Background
The spam short message is a short message which is sent to a user without the consent of the user and is not willing to be received by the user, or the user can not refuse to receive the short message according to the wish of the user.
At present, the interception of spam messages by operators is basically as follows: the method comprises the steps of overclocking of the short message sending quantity and search interception of short message content keywords.
The interception mode has limited dimension, and can not effectively intercept spam messages, for example, spam messages sent by terminals (such as a short message group sender) which do not conform to International Mobile Equipment Identity (IMEI) and do not have network access permission of the national ministry of industry and communications.
Disclosure of Invention
The invention provides a method and a device for intercepting junk short messages and a computer readable storage medium, which are used for solving the problem that the junk short messages cannot be effectively intercepted.
In one aspect, the present invention provides a method for intercepting spam messages, including:
acquiring a first number of short message codes for sending short messages in a target time period;
when the first number is larger than a first threshold value, acquiring an International Mobile Equipment Identity (IMEI) and an equipment model of the terminal using the short message number, wherein the first threshold value is a threshold value corresponding to the target time period;
and when the obtained IMEI is different from the registered IMEI and/or the obtained equipment model is different from the equipment model permitted by the network access of the terminal, adding the short message number to a blacklist, wherein the short message number added to the blacklist prohibits short message sending.
Optionally, before the step of obtaining the first number of short message codes in the target time period, the method further includes:
acquiring a second number of short messages received by a base station in each first time period of a day, wherein the short messages received by the base station are sent by each terminal accessed to the base station through a short message number;
and when the second quantity corresponding to the first time period is greater than a second threshold corresponding to the first time period, determining the first time period corresponding to the second quantity greater than the second threshold as the target time period.
Optionally, the first threshold is determined according to a ratio of the second number corresponding to the target time period to the total number of short message codes of the short message sent in the target time period.
Optionally, the second threshold corresponding to the first time period is determined according to a third number of short messages received by the base station in the first time period, and the second threshold and the third number are in a positive correlation.
Optionally, after the step of adding the short signal code to a blacklist, the method further includes:
determining a target short message number according to the short message numbers which are not added to the blacklist, wherein the target short message number is the short message number which is suspected of sending the spam short message and is not added to the blacklist, and the first number corresponding to the target short message number is larger than a first threshold value;
acquiring user information associated with the target short signal code;
and when the user information meets a preset condition, adding the target short message number to the blacklist.
Optionally, the step of determining a target short signal code according to a short signal code that is not added to the blacklist includes:
acquiring a second time period to which the authentication login time of the terminal associated with the first short message number belongs, wherein the first short message number is the short message number added to the blacklist;
acquiring a third time period to which the authentication login time of the terminal associated with a second short message number belongs, wherein the second short message number is a short message number which is not added to the blacklist;
and determining a second short signal code corresponding to a third time period which is the same as the second time period as the target short signal code.
Optionally, the user information includes a tariff package of the target sms code, a sales channel, a fourth time period to which a time point of network access and card opening belongs, and a fifth time period to which a time point of sending a short message belongs; the preset condition comprises at least one of the following conditions:
the price package is a preset price package;
the sales channel is a preset sales channel;
the fourth time period is the same as the time period to which the time point of the first short signal code of the network access and card opening belongs, and the first short signal code is the short signal code added to the blacklist;
and a second short signal code does not generate an internet traffic ticket in the fifth time period, wherein the second short signal code is a short signal code which is not added to the blacklist, and the first quantity corresponding to the second short signal code is greater than a first threshold value.
In another aspect, the present invention provides an apparatus for intercepting spam messages, including:
the acquisition module is used for acquiring a first number of short message codes for sending short messages in a target time period;
the obtaining module is further configured to obtain an international mobile equipment identity IMEI and an equipment model of the terminal using the short message number when the first number is greater than a first threshold, where the first threshold is a threshold corresponding to the target time period;
and the adding module is used for adding the short message number to a blacklist when the obtained IMEI format is not matched with a preset format and/or the obtained equipment model is different from the equipment model allowed by the terminal to access the network, wherein the short message number added to the blacklist is forbidden to send short messages.
In another aspect, the present invention provides an apparatus for intercepting spam messages, including: a memory and a processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored in the memory, so that the processor executes the spam message intercepting method.
In another aspect, the present invention provides a readable storage medium, in which computer executable instructions are stored, and when the computer executable instructions are executed by a processor, the computer executable instructions are used to implement the spam message intercepting method as described above.
The method, the device and the readable storage medium for intercepting the spam messages acquire a first number of short message sending messages of the short message codes in a target time period, acquire an International Mobile Equipment Identity (IMEI) of the terminal and a device model of the terminal, which are associated with the short message codes, when the first number is larger than a first threshold value corresponding to the target time period, and when the format of the acquired IMEI is not matched with a preset format and/or the acquired device model is different from the device model of the terminal allowed to access the network, add the short message codes to a blacklist to prohibit the short message sending by the short message codes, namely prohibit the short message sending by the short message codes. In the invention, after the number of short messages sent by a short message number in a time period is preliminarily determined according to the number of the short message sent by the short message number, the international mobile equipment identification and the equipment model of the terminal related to the short message number are acquired, if the international mobile equipment identification is different from the registered international mobile equipment identification or the equipment model is different from the equipment model of the terminal allowed to access the network, the short message number is forbidden from sending the spam short message, namely the spam short message sent by the terminal which does not accord with the international mobile equipment identification and does not have the network access permission of the national Ministry of industry and information is intercepted, and the spam short message is effectively intercepted.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a system architecture diagram of the method for intercepting spam messages according to the present invention;
FIG. 2 is a flowchart illustrating a spam message intercepting method according to a first embodiment of the present invention;
FIG. 3 is a flowchart illustrating a spam message intercepting method according to a second embodiment of the present invention;
FIG. 4 is a flowchart illustrating a spam message intercepting method according to a third embodiment of the present invention;
FIG. 5 is a schematic block diagram of an intercepting apparatus for spam messages according to the present invention;
fig. 6 is a schematic diagram of a hardware structure of the spam message intercepting apparatus according to the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The invention provides a method for intercepting spam messages, which can be realized by a system architecture diagram shown in figure 1. As shown in fig. 1, the system includes a spam intercepting device 100, a server 200 corresponding to a short message center, a communication core network 300, a communication base station 400, a communication terminal 500, and a billing system 600. The blocking device 100 for spam messages is in communication connection with the server 200, the charging and accounting system 600 and the communication core network 300; the server 200 is in communication connection with the spam message intercepting device 100, the communication core network 300 and the charging and accounting system 600; the communication core network 300 is in communication connection with the server 200, the spam message intercepting device 100 and the communication base station 400; communication base station 400 is communicatively connected to communication core network 300 and communication terminal 500.
The communication terminal 500 sends a short message to the server 200 corresponding to the short message center through the communication base station 400 and the communication core network 300 connected thereto, and the server 200 transmits a ticket generated by the short message to the billing and accounting system 600. The server 200 also sends the short message information sent by the communication terminal 500 to the spam message intercepting device. The billing and accounting system 600 stores user information of the short message number associated with the communication terminal, for example, the tariff package of the short message number, the sales channel, the time period to which the time point of network access and card opening belongs, and the time period to which the time point of sending the short message belongs.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a first embodiment of a method for intercepting spam messages according to the present invention, and the method for intercepting spam messages includes the following steps:
step S10, obtaining a first number of the short message codes for sending short messages in the target time period.
In this embodiment, the execution subject is a spam message intercepting apparatus, and for convenience of description, the apparatus is referred to as a spam message intercepting apparatus hereinafter.
The device is in communication connection with a server corresponding to the short message center, and can acquire the information of the short message sent by the short message number in the target time period from the server and count the first number. The target time period may be any time period of the day, for example, the target time period is 9:00am-10:00 am. In addition, the target time period may be a high-sending time period for sending spam messages. For example, 9:00am to 10:00am is a time period of the day in which the amount of transmitted short messages is the highest, and some short message codes are not easy to be found during the time period.
The server sends the short message information data to the device at regular time, and the device acquires and counts the first number of the short messages sent by each short message number in the target time period from the data. It should be noted that the data includes a short message number for sending a short message, a short message number for receiving a short message, sending time of the short message, authentication login time of a terminal for sending the short message, a sector identifier of a communication base station where the terminal is located, an IMEI of the terminal, an equipment model, and the like.
Step S20, when the first number is greater than a first threshold, obtaining an international mobile equipment identity IMEI and an equipment model of the terminal using the short message number, where the first threshold is a threshold corresponding to the target time period.
The device is provided with a first threshold value, and the first threshold value represents the maximum value of the number of the short messages sent by the normal short message number in a time period. For example, the number of messages sent by a normal short message code (the normal short message code refers to a short message code that is not a short message code for sending spam messages) in a time period is not more than 200, that is, the first threshold may be 200.
The device compares the first quantity with a first threshold. When the first number is larger than the first threshold value, the short message signal is suspected of sending the spam message. The device acquires the international equipment identity IMEI of the terminal using the short message number and the equipment model of the terminal. The device can regularly update the international mobile equipment identification IMEI and the equipment model of the terminal permitted by the national industry and communications department for network access.
After obtaining the IMEI of the short message number and the equipment model, the device compares the acquired IMEI format with a preset format. The IMEI has a fixed format, for example, the IMEI is composed of 15-17 digits, and includes a first part TAC (Type Allocation Code), a second part FAC (Final Assembly Code), a third part SNR (Serial Number), a fourth part CD (verification Code), and a fifth part SVN (Software Version Number). I.e. each part has a corresponding meaning. If the meanings of all parts of the obtained IMEI cannot be identified, the obtained IMEI format can be determined to be not matched with the preset format.
The device also compares the obtained equipment model with the equipment model permitted to access the network.
Step S30, when the obtained IMEI format is not matched with the preset format and/or the obtained equipment model is different from the equipment model permitted by the terminal to access the network, adding the short message number to a blacklist, wherein the short message number added to the blacklist prohibits sending short messages.
The device can determine that the short message number sends the junk short message when determining that the acquired IMEI format is not matched with the preset format, the acquired equipment model is different from the equipment model allowed to access the network of the terminal, or the acquired IMEI format is not matched with the preset format and the acquired equipment model is different from the equipment model allowed to access the network of the terminal, and the device sends the short message number to a blacklist and sends the blacklist to a server of a short message center, so that the short message center prohibits sending the short message for the short message number. It is understood that the sms code added to the blacklist prohibits sending the sms.
In the technical scheme provided by this embodiment, a first number of short message codes for sending short messages in a target time period is acquired, and when the first number is greater than a first threshold corresponding to the target time period, an international mobile equipment identity IMEI of a terminal and an equipment model of the terminal associated with the short message codes are acquired, and when the format of the acquired IMEI is not matched with a preset format and/or the acquired equipment model is different from the equipment model of the terminal permitted to access the network, the short message codes are added to a blacklist to prohibit the short message codes from sending short messages, that is, prohibit the short message codes from sending spam short messages. In the invention, after the number of short messages sent by a short message number in a time period is preliminarily determined according to the number of the short message sent by the short message number, the international mobile equipment identification and the equipment model of the terminal related to the short message number are acquired, if the international mobile equipment identification is different from the registered international mobile equipment identification or the equipment model is different from the equipment model of the terminal allowed to access the network, the short message number is forbidden from sending the spam short message, namely the spam short message sent by the terminal which does not accord with the international mobile equipment identification and does not have the network access permission of the national Ministry of industry and information is intercepted, and the spam short message is effectively intercepted.
Referring to fig. 3, fig. 3 is a second embodiment of a method for intercepting spam messages, and based on the first embodiment, before step S10, the method further includes:
step S40, obtaining a second number of the short messages received by the base station at each first time period of the day, where the short messages received by the base station are sent by each terminal accessing the base station through a short message number.
In this embodiment, the communication terminal sends the short message to be sent to the received short message code through the base station. And the data sent to the device by the server corresponding to the short message center comprises the sector identification of the communication base station where the terminal with the short message number is located. The apparatus may then obtain from the data a second number of messages received by the base station during each of the first time periods of the day. Each first time period constitutes a day. Note that the short message received by the base station is sent by each terminal accessing the base station through its own short message code.
In step S50, when the second number corresponding to the first time period is greater than the second threshold corresponding to the first time period, the first time period corresponding to the second number greater than the second threshold is determined as the target time period.
The different first time periods have corresponding second thresholds. The size of the second threshold is related to the number of the short messages which are sent in the first time period in the history, and the larger the number of the short messages which are sent in the first time period in the history is, the larger the second threshold corresponding to the first time period is. For example, the second threshold corresponding to the first time period during busy time (the first time period during busy time is the first time period during which the number of the sent messages is large historically) is 3500, and the second threshold corresponding to the first time period during idle time (the first time period during idle time is the first time period during which the number of the sent messages is small historically) is 1200. It can be understood that the second threshold corresponding to the first time period is determined according to the third number of the short messages received by the base station in the first time period, and the second threshold and the third number are in a positive correlation.
When the device determines that the second number corresponding to the first time period is greater than the second threshold corresponding to the first time period, the device determines the first time period corresponding to the second number greater than the second threshold as the target time period, and the first time period corresponding to the second number greater than the second threshold is likely to send spam messages.
It should be noted that the first threshold is determined according to a ratio of the second number corresponding to the target time period to the total number of the short message codes of the short message sent in the target time period. For example, the second threshold corresponding to the first time period is 3500, the second number of short messages sent by the base station in the first time period is 4080, and there are 42 short message codes in the first time period to send the short messages, then the first time period is the target time period, and the first threshold is 4080/40; and if the first quantity of short messages sent by a certain short message code in the target time period is 105, determining that the short message code is suspected to send the spam short message.
In the technical scheme provided by this embodiment, the device acquires the second number of the short messages received by the base station in each first time period of a day, and determines the first time period as the target time period when the second number corresponding to the first time period is greater than the second threshold corresponding to the first time period, that is, the time period for sending the spam short messages is screened out from the plurality of first time periods, and the device is not required to determine the spam short messages in each time period of the day, so that the computing resources of the device are saved.
Referring to fig. 4, fig. 4 is a third embodiment of the method for intercepting spam messages according to the present invention, and based on the first or second embodiment, after step S30, the method further includes:
step S60, determining a target short message code according to the short message codes that are not added to the blacklist, where the target short message code is a short message code that is suspected of sending spam messages and is not added to the blacklist, and a first number corresponding to the target short message code is greater than a first threshold.
In this embodiment, the data acquired by the device from the server includes a plurality of short message numbers, and after some short message numbers are added to the blacklist, another number of short message numbers may also have suspicion of sending spam messages. The apparatus may determine as the target short signal code from the short signal codes that are not added to the blacklist. It should be noted that the first number of the target sms codes is greater than the first threshold, so the target sms codes have the suspected sms sending spam and are not added to the blacklist. The apparatus may determine each of the short signal codes that are not added to the blacklist as a target short signal code.
Further, the apparatus may determine the target short code among the short codes not added to the blacklist based on an authentication login time of the terminal with which the short code is associated.
Specifically, the device acquires the authentication login time of the terminal associated with the first short message number (the first short message number is the short message number added to the blacklist) from the data sent by the server, and then determines the second time period to which the authentication login time belongs. The device acquires the authentication login time of the terminal associated with the second short message number (the second short message number is the short message number which is not added to the blacklist) from the data sent by the server, and then determines a third time period to which the authentication login time belongs. The device determines a second short message number corresponding to a third time period which is the same as the second time period as a target short message number, namely when the authentication login time corresponding to the short message number which is not added to the blacklist is in the same time period as the authentication login time corresponding to the short message number which is added to the blacklist, the short message number which is not added to the blacklist is suspected of sending the spam short message.
And step S70, acquiring the user information related to the target short message number.
After the device determines the target short message number, the device requests to acquire the user information associated with the target short message number from the charging and accounting system. The user information comprises a tariff package of the target short message number, a sales channel, a fourth time period to which a time point of network access and card opening belongs, and a fifth time period to which a time point of sending the short message belongs.
And step S80, when the user information meets the preset condition, adding the target short message number to the blacklist.
The device determines whether the user information meets a preset condition, and if the user information meets the preset condition, the device adds the target short message number to a blacklist.
The method comprises the steps that tariff packages for sending spam messages are concentrated in a plurality of specific tariff packages, sales channels are concentrated in a plurality of specific channels, short message numbers for sending spam messages are handled in a centralized manner in the same time period, and access to a network is opened, or no online flow bill is generated in the time period of statistics of sending times of the short message numbers for sending spam messages. Therefore, the preset condition includes at least one of the following: the price package is a preset price package; the sales channel is a preset sales channel; the fourth time period is the same as the time period of the time point of the network access and card opening of the first short signal code, and the first short signal code is the short signal code added to the blacklist; and the second short signal code does not generate an internet traffic ticket in a fifth time period, the second short signal code is not added to the blacklist, and the first quantity corresponding to the second short signal code is greater than the first threshold value.
In the technical scheme provided by this embodiment, the apparatus determines, as the target short message code, the short message code that has the suspicion of sending spam messages in the short message codes that are not added to the blacklist, and acquires the user information associated with the target short message code, and adds the target short message code to the blacklist if the user information satisfies the preset condition.
Referring to fig. 5, the apparatus 500 for intercepting spam messages includes:
an obtaining module 510, configured to obtain a first number of short message numbers for sending short messages in a target time period;
an obtaining module 510, configured to obtain an international mobile equipment identity IMEI and an equipment model of a terminal using a short message number when the first number is greater than a first threshold, where the first threshold is a threshold corresponding to a target time period;
the adding module 520 is configured to add the short message number to the blacklist when the obtained IMEI format is not matched with the preset format and/or the obtained device model is different from the device model permitted for network access of the terminal, where the short message number added to the blacklist prohibits sending of the short message.
In an embodiment, the apparatus 500 for intercepting spam messages includes:
an obtaining module 510, configured to obtain a second number of short messages received by the base station at each first time period of a day, where the short messages received by the base station are sent by each terminal accessing the base station through a short message number;
and the determining module is used for determining the first time period corresponding to the second quantity which is greater than the second threshold value as the target time period when the second quantity corresponding to the first time period is greater than the second threshold value corresponding to the first time period.
In an embodiment, the apparatus 500 for intercepting spam messages includes:
the determining module is used for determining a target short message code according to the short message codes which are not added to the blacklist, wherein the target short message code is the short message code which is suspected of sending the spam short message and is not added to the blacklist, and the first number corresponding to the target short message code is larger than a first threshold value;
an obtaining module 510, configured to obtain user information associated with a target short message number;
an adding module 520, configured to add the target short message number to the blacklist when the user information meets a preset condition.
In an embodiment, the apparatus 500 for intercepting spam messages includes:
an obtaining module 510, configured to obtain a second time period to which an authentication login time of a terminal associated with a first short message number belongs, where the first short message number is a short message number added to a blacklist;
an obtaining module 510, configured to obtain a third time period to which an authentication login time of a terminal associated with a second short message number belongs, where the second short message number is a short message number that is not added to the blacklist;
and the determining module is used for determining a second short signal code corresponding to a third time period which is the same as the second time period as the target short signal code.
Fig. 6 is a hardware structure diagram of an apparatus for intercepting spam messages according to an exemplary embodiment.
The spam message intercepting apparatus 600 may include: a process 601, such as a CPU, a memory 602, and a transceiver 603. Those skilled in the art will appreciate that the configuration shown in fig. 6 does not constitute a limitation of the spam message intercepting apparatus and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components. The memory 602 may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The processor 601 may call a computer program stored in the memory 602 to complete all or part of the steps of the above-mentioned spam message intercepting method.
The transceiver 603 is used for receiving and transmitting information from and to an external device.
A non-transitory computer readable storage medium, when instructions in the storage medium are executed by a processor of a spam message intercepting device, enables the spam message intercepting device to execute the spam message intercepting method.
A computer program product comprising a computer program which, when executed by a processor of a spam message intercepting device, enables the spam message intercepting device to perform the above spam message intercepting method.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (10)

1. A method for intercepting spam messages is characterized by comprising the following steps:
acquiring a first number of short message codes for sending short messages in a target time period;
when the first number is larger than a first threshold value, acquiring an International Mobile Equipment Identity (IMEI) and an equipment model of the terminal using the short message number, wherein the first threshold value is a threshold value corresponding to the target time period;
and when the obtained IMEI format is not matched with a preset format and/or the obtained equipment model is different from the equipment model allowed by the terminal to access the network, adding the short message number to a blacklist, wherein the short message number added to the blacklist prohibits sending short messages.
2. The method for intercepting spam messages according to claim 1, wherein before the step of obtaining the first number of messages sent by the sms code in the target time period, the method further comprises:
acquiring a second number of short messages received by a base station in each first time period of a day, wherein the short messages received by the base station are sent by each terminal accessed to the base station through a short message number;
and when the second quantity corresponding to the first time period is greater than a second threshold corresponding to the first time period, determining the first time period corresponding to the second quantity greater than the second threshold as the target time period.
3. The method as claimed in claim 2, wherein the first threshold is determined according to a ratio of the second number corresponding to the target time period to the total number of short message codes of the short message sent in the target time period.
4. The method of claim 2, wherein a second threshold corresponding to the first time period is determined according to a third quantity of the short messages received by the base station in the first time period, and the second threshold and the third quantity are positively correlated.
5. The method for intercepting spam messages according to any of claims 1-4, wherein after the step of adding the spam code to a blacklist, the method further comprises:
determining a target short message number according to the short message numbers which are not added to the blacklist, wherein the target short message number is the short message number which is suspected of sending the spam short message and is not added to the blacklist, and the first number corresponding to the target short message number is larger than a first threshold value;
acquiring user information associated with the target short signal code;
and when the user information meets a preset condition, adding the target short message number to the blacklist.
6. The method for intercepting spam messages according to claim 5, wherein the step of determining a target sms code according to the sms code not added to the blacklist comprises:
acquiring a second time period to which the authentication login time of the terminal associated with the first short message number belongs, wherein the first short message number is the short message number added to the blacklist;
acquiring a third time period to which the authentication login time of the terminal associated with a second short message number belongs, wherein the second short message number is a short message number which is not added to the blacklist;
and determining a second short signal code corresponding to a third time period which is the same as the second time period as the target short signal code.
7. The method according to claim 5, wherein the user information includes a tariff package of the target SMS code, a sales channel, a fourth time period to which a time point of network entry and card opening belongs, and a fifth time period to which a time point of SMS transmission belongs; the preset condition comprises at least one of the following conditions:
the price package is a preset price package;
the sales channel is a preset sales channel;
the fourth time period is the same as the time period to which the time point of the first short signal code of the network access and card opening belongs, and the first short signal code is the short signal code added to the blacklist;
and a second short signal code does not generate an internet traffic ticket in the fifth time period, wherein the second short signal code is a short signal code which is not added to the blacklist, and the first quantity corresponding to the second short signal code is greater than a first threshold value.
8. An interception device for spam messages, comprising:
the acquisition module is used for acquiring a first number of short message codes for sending short messages in a target time period;
the obtaining module is further configured to obtain an international mobile equipment identity IMEI and an equipment model of the terminal using the short message number when the first number is greater than a first threshold, where the first threshold is a threshold corresponding to the target time period;
and the adding module is used for adding the short message number to a blacklist when the obtained IMEI format is not matched with a preset format and/or the obtained equipment model is different from the equipment model allowed by the terminal to access the network, wherein the short message number added to the blacklist is forbidden to send short messages.
9. An interception device for spam messages, comprising: a memory and a processor;
the memory stores computer-executable instructions;
the processor executes the computer-executable instructions stored in the memory, so that the processor executes the spam message intercepting method according to any one of claims 1 to 7.
10. A computer-readable storage medium, wherein computer-executable instructions are stored in the computer-readable storage medium, and when executed by a processor, the computer-executable instructions are configured to implement the spam message intercepting method according to any one of claims 1 to 7.
CN202111249137.7A 2021-10-26 2021-10-26 Method and device for intercepting junk short messages and computer readable storage medium Active CN113795002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111249137.7A CN113795002B (en) 2021-10-26 2021-10-26 Method and device for intercepting junk short messages and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111249137.7A CN113795002B (en) 2021-10-26 2021-10-26 Method and device for intercepting junk short messages and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN113795002A true CN113795002A (en) 2021-12-14
CN113795002B CN113795002B (en) 2022-07-08

Family

ID=78878226

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111249137.7A Active CN113795002B (en) 2021-10-26 2021-10-26 Method and device for intercepting junk short messages and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113795002B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745211A (en) * 2022-04-26 2022-07-12 贵阳朗玛通信科技有限公司 Method and device based on ticket data fast matching strategy

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN103179530A (en) * 2011-12-26 2013-06-26 中国移动通信集团设计院有限公司 Method and device for intercepting short messages
CN103188635A (en) * 2011-12-29 2013-07-03 上海粱江通信系统股份有限公司 Method for recognizing junk short message source based on frequency and called distribution rules
CN103796183A (en) * 2012-10-26 2014-05-14 中国移动通信集团上海有限公司 Spam short message identification method and device
CN106255082A (en) * 2016-10-12 2016-12-21 中国联合网络通信集团有限公司 The recognition methods of a kind of refuse messages and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572747A (en) * 2010-12-28 2012-07-11 中国移动通信集团吉林有限公司 Method and system for monitoring junk short message
CN103179530A (en) * 2011-12-26 2013-06-26 中国移动通信集团设计院有限公司 Method and device for intercepting short messages
CN103188635A (en) * 2011-12-29 2013-07-03 上海粱江通信系统股份有限公司 Method for recognizing junk short message source based on frequency and called distribution rules
CN103796183A (en) * 2012-10-26 2014-05-14 中国移动通信集团上海有限公司 Spam short message identification method and device
CN106255082A (en) * 2016-10-12 2016-12-21 中国联合网络通信集团有限公司 The recognition methods of a kind of refuse messages and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745211A (en) * 2022-04-26 2022-07-12 贵阳朗玛通信科技有限公司 Method and device based on ticket data fast matching strategy

Also Published As

Publication number Publication date
CN113795002B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN110915247B (en) Subscription management service data feeds
US10599873B2 (en) Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved
US20160021532A1 (en) Method for preventing fraud or misuse based on a risk scoring approach when using a service of a service provider, system for preventing fraud or misuse, and mobile communication network for preventing fraud or misuse
CN112448894A (en) Method, device, equipment and storage medium for blocking signaling storm
CN114268957B (en) Abnormal business data processing method, device, server and storage medium
CN108933789B (en) Method for preventing personal information leakage and third-party application server
CN112672357A (en) Method and device for processing user account in business system and computer equipment
CN113795002B (en) Method and device for intercepting junk short messages and computer readable storage medium
CN110798453B (en) Data processing method and device for one-key login
WO2019242467A1 (en) Method and apparatus for preventing traffic fraud
CN109479007B (en) Data service control method, related equipment and system
CN108629582B (en) Service processing method and device
US11805553B2 (en) Control method, network device, and terminal
US11108914B2 (en) Method and system for revenue maximization in a communication network
CN114691734A (en) Cache control method and device, computer readable medium and electronic device
CN101867918B (en) Real-name system registration state acquiring method, device and terminal
CN111698683B (en) Network security control method and device, storage medium and computer equipment
CN110471966B (en) Information data verification method, device, computer equipment and storage medium
US20160072961A1 (en) Verification of network activity/usage data
CN113965899B (en) Short message deduction detection server and method
KR20090116401A (en) Method for identifying mobile station, and mobile station and core network apparauts for executing the method
CN114584978B (en) Value added service authentication method, device, equipment and readable medium
US11829508B2 (en) User consent service utilizing mobile device identifiers
CN114302349B (en) Method and system for extracting number by client
CN109660989B (en) Positioning method, terminal equipment, position service platform and positioning system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant