Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs, the terms used in the description herein are used for the purpose of describing particular embodiments only and are not intended to limit the application, and the terms "comprising" and "having" and any variations thereof in the description of the application and the claims and the above description of the drawings are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to make the person skilled in the art better understand the solution of the present application, the technical solution of the embodiment of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include a terminal device 101, a network 102, and a server 103, where the terminal device 101 may be a notebook 1011, a tablet 1012, or a cell phone 1013. Network 102 is the medium used to provide communication links between terminal device 101 and server 103. Network 102 may include various connection types such as wired, wireless communication links, or fiber optic cables.
A user may interact with the server 103 via the network 102 using the terminal device 101 to receive or send messages or the like. The terminal device 101 may have various communication client applications installed thereon, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal device 101 may be various electronic devices having a display screen and supporting web browsing, and the terminal device 101 may be an electronic book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture experts compression standard audio layer III), an MP4 (Mov i ng Picture Experts Group Audio Layer IV, moving picture experts compression standard audio layer IV) player, a laptop portable computer, a desktop computer, or the like, in addition to the notebook 1011, the tablet 1012, or the mobile phone 1013.
The server 103 may be a server providing various services, such as a background server providing support for pages displayed on the terminal device 101.
It should be noted that, the method for intercepting a 5G message provided by the embodiment of the present application is generally executed by a server, and accordingly, a 5G message intercepting device is generally disposed in the server.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow chart of one embodiment of a 5G message interception method in accordance with the present application is shown. The 5G message interception method comprises the following steps:
step 201, obtaining a 5G message to be sent generated by a target service end.
In this embodiment, the target service end is, for example, a service message generating end in a financial service application scenario, specifically, an insurance application preference message pushing service scenario, where the target service end is configured to generate a 5G insurance application preference message according to an actual service preference plan, the 5G message refers to a static/dynamic message in an audio format, a picture format, a video format and a text format that can be directly sent in a short message form, and then, for example, the target service end may also be an on-line medical service message generating end in a health medical service scenario, specifically, in order to push a volunteer medical consultation G active message in an audio, picture and video format to a patient group user in a hospital aspect, the target service end is used to generate a 5G message, and, for example, the target service end may also be a health care active message generating end in a health care service scenario, specifically, a health care responsible party may also be configured to generate a 5G message for pushing a health care preference message in an audio, picture and video format to a target user.
In essence, the method for intercepting 5G messages is used in three-terminal interaction scenarios of a target service terminal, a target service terminal and a target user terminal, where the target service terminal is configured to generate a 5G message to be sent, and the target service terminal is configured to perform a series of pre-processing before sending the 5G message to the target user terminal, for example, performing operations such as compression, beautification, data format conversion, encryption processing, and logic condition judgment on the 5G message, and the target user terminal is configured to receive the 5G message, and generally includes a mobile phone terminal or a user message receiving interface terminal.
And 202, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, and identifying keywords contained in the 5G message.
Specifically, since the 5G message is different from the previous message content and may include still/dynamic messages in audio format, picture format, video format and text format, which are sent in the form of a short message, the multi-modal processing analysis model is used to analyze the content of the 5G message, so that content analysis can be performed on the still/dynamic messages in audio format, picture format, video format and text format, respectively, so as to determine keywords included in the 5G message to be sent, where the keywords include service keywords. For example, when the 5G message to be sent is a loan marketing advertisement message, keywords included in the 5G message include related business keywords such as "loan", "interest rate", "stage", and the like.
Step 203, judging whether the keyword contained in the 5G message hits at least any interception field in the target interception field library by a search mode.
In this embodiment, the target interception field library summarizes interception fields set by the target user, where the interception fields may be keywords of service content included in the 5G message, and determines, by a search manner, whether the keywords included in the 5G message hit at least any interception field in the target interception field library, so as to determine whether to send and intercept the 5G message.
Step 204, if all keywords miss the interception field, the 5G message is sent to the target ue.
Specifically, it is determined that the 5G message to be sent does not include all interception fields set by the target ue, so that the 5G message does not need to be intercepted and the 5G message is directly sent to the target ue.
Step 205, if at least any keyword hits the interception field, adding the mobile phone number or the message sending interface corresponding to the target user terminal to the temporary sending blacklist of the 5G message.
Specifically, if it is determined that the 5G message to be sent includes any interception field set by the target ue, adding a mobile phone number or a message sending interface corresponding to the target ue to a temporary blacklist of the 5G message, so as to block sending of the 5G message to be sent to the target ue.
In this embodiment, the method for intercepting 5G messages is applied to a pre-interception scenario before sending the 5G messages to the target ue, where the message interception mode is performed before sending the 5G messages, and does not involve actual sending of the 5G messages to the target ue, and from a root, the interception is performed, so that larger sending and intercepting resources are not required compared with a processing mode of first sending and then intercepting. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
In the embodiment, a 5G message to be sent is generated by a target service end, content analysis is carried out on the 5G message by adopting a multi-mode processing analysis model, keywords contained in the 5G message are identified, whether the keywords contained in the 5G message hit at least any interception field in a target interception field library is judged by a search mode, if all the keywords miss the interception field, the 5G message is sent to a target user end, and if at least any keyword hit the interception field, a mobile phone number or a message sending interface corresponding to the target user end is added to a temporary sending blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
With continued reference to FIG. 3, FIG. 3 is a flow chart of one embodiment of step 202 of FIG. 2, including the steps of:
Step 301, identifying a format type of the 5G message, wherein the format type includes an audio format, a picture format, a video format and a text format;
Specifically, the format type of the 5G message is identified according to the suffix of the data format of the 5G message, for example, the suffix of the data in the picture format is ". JPG", ". PNG", etc., the suffix of the data in the audio format is ". MP3", ". Wav", etc., the suffix of the data in the video format is ". MP4", ". AV I", etc., and the description thereof is not repeated here.
Step 302, selecting a target sub-processing model from the multi-mode processing analysis model according to the format type to perform keyword marking processing on the 5G message, so as to obtain a keyword marking processing result;
Specifically, the target sub-processing model in the multi-mode processing analysis model comprises a voiceprint processing sub-model, a picture processing sub-model, an image processing sub-model and a semantic recognition sub-model, and keyword marking processing is performed on the 5G message by selecting the target sub-processing model from the multi-mode processing analysis model to obtain a keyword marking processing result corresponding to the 5G message, so that a decision of whether to send the 5G message to a target user side in a subsequent message sending step is facilitated.
And step 303, determining keywords contained in the 5G message according to the keyword marking processing result.
With continued reference to FIG. 4, FIG. 4 is a flow chart of one embodiment of step 302 shown in FIG. 3, including the steps of:
step 401, if the format type is an audio format, identifying audio data content contained in the 5G message by using the voiceprint processing submodel;
Specifically, the voiceprint processing submodel comprises DEEP SPEAKER voiceprint recognition models, wherein the DEEP SPEAKER voiceprint recognition model is a deep neural network-based voiceprint recognition model, and adopts a Convolutional Neural Network (CNN) and long-short-term memory (LSTM) structure. Through reinforcement learning technology, DEEP SPEAKER voiceprint recognition model has very good adaptability when handling short-time speech fragments, especially on audio data content recognition task.
Step 402, if the format type is a picture format, identifying picture data content contained in the 5G message by using the picture processing sub-model;
step 403, if the format type is a video format, performing audio content analysis on the 5G message by using the image processing sub-model to obtain audio data content, extracting a key frame in the 5G message, and performing picture data content identification on the key frame;
Step 404, respectively performing text conversion processing on the audio data content and the picture data content, performing word segmentation processing on the text data content generated after conversion, and performing keyword marking processing on all the words by adopting the semantic recognition sub-model to obtain a keyword marking processing result;
in this embodiment, the word segmentation processing may be performed on the text data content generated after the conversion according to a preset word segmentation service dictionary.
And step 405, if the format type is a text format, directly performing word segmentation on text data content contained in the 5G message, and performing keyword marking processing on all the segmented words by adopting the semantic recognition sub-model to obtain a keyword marking processing result.
And selecting a target sub-processing model from the multi-mode processing analysis model to perform keyword marking processing on the 5G message to obtain a keyword marking processing result corresponding to the 5G message, so that a subsequent message sending step is facilitated to determine whether to send the 5G message to a target user side.
With continued reference to fig. 5, in some alternative implementations, before step 203, the method further includes a step of performing batch acquisition and summary analysis on the indication message, and fig. 5 is a flowchart of a specific embodiment of batch acquisition and summary analysis on the indication message in the 5G message interception method according to the present application, including the steps of:
Step 501, obtaining indication messages sent by batch user terminals according to a preset user terminal message receiving interface;
Specifically, for example, in a scenario that the user terminal is a mobile phone terminal, receiving an indication message sent by a user through a short message reply;
in this embodiment, the indication message may be composed of an indication keyword and a service content keyword, where the indication keyword includes at least two types, for example, "interception" and "release", and the service content keyword is set according to an actual service scenario, for example, "loan", "interest rate", "stage", and other related service keywords;
step 502, analyzing the indication message to obtain analysis results corresponding to each user terminal respectively;
Specifically, when the analysis result of the analyzed indication message is 'interception', 'loan', 'interest rate', 'stage', the indication type of the indication message is interception type, the 5G message intercepted or not to be received is loan service type 5G message, and correspondingly, when the analysis result of the analyzed indication message is 'release', 'loan', 'interest rate', 'stage', the indication type of the indication message is release interception type, and the 5G message to be intercepted or received comprises loan service type 5G message;
Step 503, identifying indication types of all indication messages according to the analysis result and a preset indication keyword, wherein the indication types comprise an interception type and a disarming type;
step 504, summarizing the analysis results corresponding to all the indication messages under the same indication type;
specifically, since the indication messages sent by the batch of user terminals are obtained, the indication types of the indication messages possibly sent by each user terminal are different, so that analysis results corresponding to all the indication messages under the same indication type are summarized.
Step 505, according to the summarized result, sorting out the public interception field contained in the interception type and sorting out the public interception field contained in the interception type.
Specifically, by summarizing the analysis results corresponding to all the indication messages under the same indication type, the public interception fields contained in the interception type and the public interception fields contained in the interception type can be sorted out, so that the public interception fields and the public interception fields can be conveniently utilized later;
In this embodiment, the public interception field and the public disaggregation field may be calculated by a percentage calculation, for example, when more than 60% of the batch of clients all set a certain field a as an interception field, the field a is set as a public interception field, and similarly, the public disaggregation field may also be set by this method, and the specific percentage in calculating may be set according to the actual service requirement.
With continued reference to fig. 6, in some optional implementations, before step 203, the method further includes a step of updating the target interception field library with respect to the indication message sent by the target ue, and fig. 6 is a flowchart of a specific embodiment of the method for 5G message interception according to the present application for updating the target interception field library with respect to the indication message sent by the target ue, where the method includes the following steps:
Step 601, acquiring an indication message sent by a target user side in real time according to a preset user side message receiving interface;
Step 602, analyzing the indication message in real time to obtain a real-time analysis result;
Step 603, identifying the indication type of the indication message according to the real-time analysis result and a preset indication keyword;
Step 604, if the indicated type is an interception type, identifying all interception matching fields sent by the target user end in real time according to the analysis result;
Step 605, updating the target interception field library maintained by the target server according to all interception matching fields sent by the target user in real time.
By acquiring the indication information sent by the target user side in real time and combining the analysis result, identifying all interception matching fields sent by the target user side in real time, and updating the target interception field library maintained by the target server side according to all interception matching fields sent by the target user side in real time, the target interception field library is updated in time when the real-time interception field sent by the target user side is acquired, and the non-preference 5G information is prevented from being sent to the target user.
With continued reference to fig. 7, fig. 7 is a flow chart of one embodiment of step 605 of fig. 6, including the steps of:
step 701, merging all interception matching fields sent by the target user side in real time with public interception fields contained in the interception type to obtain an interception field merging set;
Step 702, identifying all intersection elements of the union set of the target interception field library and the interception field through comparison and retrieval to obtain a first intersection;
step 703, obtaining all difference set elements of the first intersection and the interception field merger by difference set operation;
And step 704, adding all difference set elements into the target interception field library to update the target interception field library in real time.
And merging all interception matching fields sent by the target user side in real time with the public interception fields contained in the interception types to obtain an interception field merging set so as to introduce the public interception fields on the basis of self-setting the interception fields by the target user side, thereby fully updating the target interception field library.
With continued reference to fig. 8, in some optional implementations, after step 603, the method further includes another embodiment step of performing a target interception field library update with respect to an indication message sent by the target ue, and fig. 8 is a flowchart of another embodiment of performing a target interception field library update with respect to an indication message sent by the target ue in the 5G message interception method according to the present application, including the following steps:
Step 801, if the indicated type is a disaggregation type, identifying all interception matching fields that are disaggregated in real time by the target user terminal according to the analysis result;
And step 802, updating the target interception field library maintained by the target server according to all interception matching fields released in real time by the target user.
By acquiring the indication information sent by the target user side in real time and combining the analysis result, identifying all interception matching fields released by the target user side in real time, and updating the target interception field library maintained by the target server side according to all interception matching fields released by the target user side in real time, the target interception field library is updated in time when the interception fields released by the target user side in real time are acquired, so that the unrestricted 5G information is sent to the target user in time.
With continued reference to fig. 9, fig. 9 is a flow chart of one embodiment of step 802 shown in fig. 8, including the steps of:
Step 901, merging all interception matching fields released in real time by the target user side and public interception releasing fields contained in the interception releasing type to obtain a fusion set of interception releasing fields;
Step 902, identifying all intersection elements of the target interception field library and the release field union set through comparison and retrieval to obtain a second intersection;
and step 903, deleting all elements in the second intersection from the target interception field library to update the target interception field library in real time.
And merging all interception matching fields released in real time by the target user side and the public interception releasing fields contained in the interception releasing type to obtain a merging set of the interception releasing fields, so that the public interception releasing fields are introduced on the basis of self-interception releasing fields of the target user side, and the target interception field library is fully updated.
In the embodiment, a 5G message to be sent is generated by a target service end, content analysis is carried out on the 5G message by adopting a multi-mode processing analysis model, keywords contained in the 5G message are identified, whether the keywords contained in the 5G message hit at least any interception field in a target interception field library is judged by a search mode, if all the keywords miss the interception field, the 5G message is sent to a target user end, and if at least any keyword hit the interception field, a mobile phone number or a message sending interface corresponding to the target user end is added to a temporary sending blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (ARTIFICIAL INTELLI GENCE, A I) is the theory, method, technique, and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
In the embodiment, a 5G message to be sent is generated by a target service end, content analysis is carried out on the 5G message by adopting a multi-mode processing analysis model, keywords contained in the 5G message are identified, whether the keywords contained in the 5G message hit at least any interception field in a target interception field library is judged by a search mode, if all the keywords miss the interception field, the 5G message is sent to a target user end, and if at least any keyword hit the interception field, a mobile phone number or a message sending interface corresponding to the target user end is added to a temporary sending blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
With further reference to fig. 10, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a 5G message interception apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 10, the 5G message interception apparatus 10 according to the present embodiment includes a 5G message acquisition module 10a, a content analysis and identification module 10b, an interception hit judgment module 10c, a first branch processing module 10d, and a second branch processing module 10e. Wherein:
The 5G message obtaining module 10a is configured to obtain a 5G message to be sent, which is generated by the target service end;
the content analysis and identification module 10b is configured to perform content analysis on the 5G message by using a multi-mode processing and analysis model, and identify keywords included in the 5G message;
The interception hit judging module 10c is configured to judge whether a keyword included in the 5G message hits at least any interception field in the target interception field library in a search manner;
The first branch processing module 10d is configured to send the 5G message to the target user terminal if all the keywords do not hit the interception field;
and the second branch processing module 10e is configured to add the mobile phone number or the message sending interface corresponding to the target user terminal to the temporary sending blacklist of the 5G message if at least any keyword hits the interception field.
The method comprises the steps of obtaining a 5G message to be sent, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, sending the 5G message to a target user end if all the keywords miss the interception field, and adding a mobile phone number or a message sending interface corresponding to the target user end to a temporary sending blacklist of the 5G message if at least any keywords hit the interception field. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
In this embodiment, the content analysis and identification module 10b includes a message format type identification unit, a keyword marking processing unit, and a keyword determination unit. Wherein:
a message format type identifying unit, configured to identify a format type of the 5G message, where the format type includes an audio format, a picture format, a video format, and a text format;
the keyword marking processing unit is used for selecting a target sub-processing model from the multi-mode processing analysis model according to the format type to perform keyword marking processing on the 5G message, so as to obtain a keyword marking processing result;
And the keyword determining unit is used for determining keywords contained in the 5G message according to the keyword marking processing result.
In this embodiment, the content analysis and identification module 10b further includes an audio format message processing unit, a picture format message processing unit, a video format message processing unit, a keyword first marking processing unit, and a keyword second marking processing unit. Wherein:
An audio format message processing unit, configured to identify audio data content contained in the 5G message using the voiceprint processing submodel if the format type is an audio format;
a picture format message processing unit, configured to identify picture data content contained in the 5G message by using the picture processing sub-model if the format type is a picture format;
The video format message processing unit is used for carrying out audio content analysis on the 5G message by adopting the image processing submodel if the format type is a video format to obtain audio data content, extracting key frames in the 5G message and carrying out picture data content identification on the key frames;
The first keyword marking processing unit is used for respectively carrying out text conversion processing on the audio data content and the picture data content, carrying out word segmentation processing on the text data content generated after conversion, and carrying out keyword marking processing on all the words by adopting the semantic recognition submodel to obtain a keyword marking processing result;
And the keyword second marking processing unit is used for directly carrying out word segmentation processing on text data content contained in the 5G message if the format type is a text format, and carrying out keyword marking processing on all the segmented words by adopting the semantic recognition sub-model to obtain a keyword marking processing result.
In this embodiment, the 5G message interception device 10 further includes an indication message batch acquisition module, an indication message analysis module, an indication type identification module, an analysis result summarization module, and a public field arrangement module. Wherein:
The indication message batch acquisition module is used for acquiring indication messages sent by batch user terminals according to a preset user terminal message receiving interface;
The indication message analysis module is used for analyzing the indication message to obtain analysis results corresponding to each user terminal respectively;
The indication type identification module is used for identifying indication types of all indication messages according to the analysis result and a preset indication keyword, wherein the indication types comprise an interception type and a disarming type;
The analysis result summarizing module is used for summarizing analysis results corresponding to all the indication messages under the same indication type;
and the public field arrangement module is used for arranging public interception fields contained in the interception type and arranging public interception removal fields contained in the interception removal type according to the summarized result.
In this embodiment, the 5G message interception device 10 further includes an indication message real-time acquisition module, an indication message analysis module, an indication type identification module, an interception matching field identification module, a target interception field library first update module, an interception matching field identification module, and a target interception field library second update module. Wherein:
The indication message real-time acquisition module is used for acquiring the indication message sent by the target user side in real time according to a preset user side message receiving interface;
The indication message analysis module is also used for analyzing the indication message in real time to obtain a real-time analysis result;
The indication type identification module is also used for identifying the indication type of the indication message according to the real-time analysis result and a preset indication keyword;
the interception matching field identification module is used for identifying all interception matching fields sent by the target user side in real time according to the analysis result if the indication type is the interception type;
The first updating module of the target interception field library is used for updating the target interception field library maintained by the target server according to all interception matching fields sent by the target user in real time;
the interception removal matching field identification module is used for identifying all interception matching fields which are removed in real time by the target user side through the analysis result if the indication type is an interception removal type;
And the target interception field library second updating module is used for updating the target interception field library maintained by the target server according to all interception matching fields released in real time by the target user.
In this embodiment, the first update module of the target interception field library includes an interception field mergence generating unit, a first intersection obtaining unit, a difference set operating unit, and a first update unit of the target interception field library. Wherein:
The interception field merging set generating unit is used for merging all interception matching fields sent by the target user side in real time with public interception fields contained in the interception type to obtain an interception field merging set;
the first intersection obtaining unit is used for identifying all intersection elements of the union set of the target interception field library and the interception field through comparison and retrieval to obtain a first intersection;
The difference set operation unit is used for obtaining all difference set elements of the first intersection and the interception field union set through difference set operation;
and the target interception field library first updating unit is used for adding all the difference set elements into the target interception field library so as to update the target interception field library in real time.
In this embodiment, the second update module of the target interception field library includes a field merge cancellation set generating unit, a second intersection obtaining unit, and a second update unit of the target interception field library. Wherein:
the release field merging set generating unit is used for merging all interception matching fields released in real time by the target user side and the public release interception fields contained in the release interception type to obtain a release field merging set;
The second intersection obtaining unit is used for identifying all intersection elements of the target interception field library and the release field union set through comparison and retrieval to obtain a second intersection;
and the target interception field library second updating unit is used for deleting all elements in the second intersection from the target interception field library so as to update the target interception field library in real time.
Those skilled in the art will appreciate that implementing all or part of the above described embodiment methods may be accomplished by computer readable instructions, stored on a computer readable storage medium, that the program when executed may comprise the steps of embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-only memory (Read-Onl y Memory, ROM), or a random access memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 11, fig. 11 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 11 comprises a memory 11a, a processor 11b, a network interface 11c communicatively connected to each other via a system bus. It should be noted that only a computer device 11 having a component memory 11a, a processor 11b, a network interface 11c is shown in fig. 11, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application SPECIFIC INTEGRATED Circuit (ASIC), a Programmable gate array (Field-Programmable GATE ARRAY, FPGA), a digital Processor (DIGITAL SIGNAL Processor, DSP), an embedded device, and the like.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 11a includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 11a may be an internal storage unit of the computer device 11, such as a hard disk or a memory of the computer device 11. In other embodiments, the memory 11a may also be an external storage device of the computer device 11, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the computer device 11. Of course, the memory 11a may also include both an internal memory unit of the computer device 11 and an external memory device. In this embodiment, the memory 11a is generally used to store an operating system and various application software installed on the computer device 11, such as computer readable instructions of a 5G message interception method. Further, the memory 11a may be used to temporarily store various types of data that have been output or are to be output.
The processor 11b may be a central processing unit (Central Processi ng Un i t, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 11b is typically used to control the overall operation of the computer device 11. In this embodiment, the processor 11b is configured to execute computer readable instructions stored in the memory 11a or process data, such as computer readable instructions for executing the 5G message interception method.
The network interface 11c may comprise a wireless network interface or a wired network interface, which network interface 11c is typically used to establish a communication connection between the computer device 11 and other electronic devices.
The computer equipment provided by the embodiment belongs to the technical field of research and development optimization, and is applied to a front interception scene before sending a 5G message to a target user side. The method comprises the steps of obtaining a 5G message to be sent, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, sending the 5G message to a target user end if all the keywords miss the interception field, and adding a mobile phone number or a message sending interface corresponding to the target user end to a temporary sending blacklist of the 5G message if at least any keywords hit the interception field. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
The present application also provides another embodiment, namely, a computer readable storage medium storing computer readable instructions executable by a processor to cause the processor to perform the steps of a 5G message interception method as described above.
The computer readable storage medium provided by the embodiment belongs to the technical field of research and development optimization, and is applied to a front interception scene before sending a 5G message to a target user side. The method comprises the steps of obtaining a 5G message to be sent, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, sending the 5G message to a target user end if all the keywords miss the interception field, and adding a mobile phone number or a message sending interface corresponding to the target user end to a temporary sending blacklist of the 5G message if at least any keywords hit the interception field. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
It is apparent that the above-described embodiments are only some embodiments of the present application, but not all embodiments, and the preferred embodiments of the present application are shown in the drawings, which do not limit the scope of the patent claims. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a thorough and complete understanding of the present disclosure. Although the application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing description, or equivalents may be substituted for elements thereof. All equivalent structures made by the content of the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the scope of the application. The non-native company software tools or components present in the embodiments of the present application are presented by way of example only and are not representative of actual use.