CN120751347A - A 5G message interception method, device, equipment and storage medium thereof - Google Patents

A 5G message interception method, device, equipment and storage medium thereof

Info

Publication number
CN120751347A
CN120751347A CN202510865179.5A CN202510865179A CN120751347A CN 120751347 A CN120751347 A CN 120751347A CN 202510865179 A CN202510865179 A CN 202510865179A CN 120751347 A CN120751347 A CN 120751347A
Authority
CN
China
Prior art keywords
message
interception
target
field
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510865179.5A
Other languages
Chinese (zh)
Inventor
范富宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202510865179.5A priority Critical patent/CN120751347A/en
Publication of CN120751347A publication Critical patent/CN120751347A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

本申请属于研发优化技术领域,涉及一种5G消息拦截方法、装置、设备及其存储介质,通过获取待发送5G消息;识别并判断所述5G消息所包含的关键词是否命中了目标拦截字段库中至少任一拦截字段;若未命中,则向目标用户端发送所述5G消息;若命中,则将目标用户端对应的手机号码或者消息发送接口添加到临时发送黑名单中。该消息拦截方式是在消息发送前所进行,从根源出发,进行拦截,较先发送后拦截的处理方式,无需消耗较大的发送和拦截资源。在金融业务、医疗健康养老等业务中,用户群体庞大,用户业务偏好不同,采用该5G消息拦截方法,即保证业务偏好用户能够顺利获取到5G的业务推送消息,也保证业务非偏好用户对相关5G消息的拦截全程无感知。

The present application belongs to the field of research and development optimization technology, and relates to a 5G message interception method, device, equipment and storage medium thereof, which obtains the 5G message to be sent; identifies and determines whether the keywords contained in the 5G message hit at least any interception field in the target interception field library; if not, sends the 5G message to the target user terminal; if hit, adds the mobile phone number or message sending interface corresponding to the target user terminal to the temporary sending blacklist. This message interception method is carried out before the message is sent, and intercepts from the source. Compared with the processing method of sending first and then intercepting, it does not consume large sending and intercepting resources. In financial services, medical health care, elderly care and other businesses, the user group is huge and the user business preferences are different. The use of this 5G message interception method ensures that business preference users can smoothly obtain 5G business push messages, and also ensures that business non-preference users are unaware of the interception of related 5G messages.

Description

5G message interception method, device, equipment and storage medium thereof
Technical Field
The application relates to the technical field of research and development optimization, which is applied to a front-end interception scene before a 5G message is sent to a target user side, and relates to a 5G message interception method, a device, equipment and a storage medium thereof.
Background
The 5G message is used as a novel information transmission medium in recent years, and is different from the traditional 3G/4G short message interception mode. The current interception capability can only be used for a user terminal to contact a service terminal (5G message generation terminal) to pull the user terminal (target sending terminal) into a '5G blacklist' of the service terminal, and reject any 5G message sent by the service terminal.
When the user end needs to acquire the related service content, the user needs to be contacted with the service end to release the user from the 5G blacklist, and the different users have different preferences on different services, in the service scene of a large group of users, particularly in the service pushing scene of financial service, medical health care and the like, for example, in new insurance preferential pushing and new health care active pushing, the processing mode is pushed in a targeted manner, so that a 5G message interception method is needed to ensure that the service preferential user successfully acquires the 5G service pushing message and ensure that the service non-preferential user intercepts the related 5G message when the service pushing is carried out on a large group of users.
Disclosure of Invention
The embodiment of the application aims to provide a 5G message interception method, a device, equipment and a storage medium thereof, so as to ensure that a service preference user successfully acquires a 5G service push message and ensure that a service non-preference user intercepts a related 5G message when service push is carried out for a huge user group.
In a first aspect, an embodiment of the present application provides a 5G message interception method, which adopts the following technical scheme:
A 5G message interception method, comprising the steps of:
Acquiring a 5G message to be sent generated by a target service end;
performing content analysis on the 5G message by adopting a multi-mode processing analysis model, and identifying keywords contained in the 5G message;
Judging whether a keyword contained in the 5G message hits at least any interception field in a target interception field library or not through a retrieval mode;
If all keywords do not hit the interception field, sending the 5G message to a target user terminal;
If at least any keyword hits the interception field, adding the mobile phone number or the message sending interface corresponding to the target user terminal into the temporary sending blacklist of the 5G message.
In a second aspect, an embodiment of the present application further provides a 5G message interception apparatus, which adopts the following technical scheme:
a 5G message interception apparatus, comprising:
the 5G message acquisition module is used for acquiring a 5G message to be sent generated by the target service end;
The content analysis and identification module is used for carrying out content analysis on the 5G message by adopting a multi-mode processing and analysis model and identifying keywords contained in the 5G message;
the interception hit judging module is used for judging whether the keyword contained in the 5G message hits at least any interception field in the target interception field library or not in a search mode;
the first branch processing module is used for sending the 5G message to the target user terminal if all keywords do not hit the interception field;
and the second branch processing module is used for adding the mobile phone number or the message sending interface corresponding to the target user terminal to the temporary sending blacklist of the 5G message if at least any keyword hits the interception field.
In a third aspect, an embodiment of the present application further provides a computer device, which adopts the following technical scheme:
a computer device comprising a memory having stored therein computer readable instructions which when executed by the processor implement the steps of the 5G message interception method described above.
In a fourth aspect, an embodiment of the present application further provides a computer readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of a 5G message interception method as described above.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
The method for intercepting the 5G message comprises the steps of obtaining a 5G message to be transmitted, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, if all the keywords hit no interception field, transmitting the 5G message to a target user end, and if at least any keyword hit the interception field, adding a mobile phone number or a message transmitting interface corresponding to the target user end into a temporary transmission blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
Drawings
In order to more clearly illustrate the solution of the present application, a brief description will be given below of the drawings required for the description of the embodiments of the present application, it being apparent that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without the exercise of inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a 5G message interception method in accordance with the present application;
FIG. 3 is a flow chart of one embodiment of step 202 of FIG. 2;
FIG. 4 is a flow chart of one embodiment of step 302 shown in FIG. 3;
FIG. 5 is a flow chart of one embodiment of batch acquisition and summary analysis of indication messages in a 5G message interception method according to the present application;
Fig. 6 is a flowchart of a specific embodiment of updating a target interception field library for an indication message sent by a target user side in the 5G message interception method according to the present application;
FIG. 7 is a flow chart of one embodiment of step 605 shown in FIG. 6;
fig. 8 is a flowchart of another specific embodiment of updating a target interception field library for an indication message sent by a target ue in the 5G message interception method according to the present application;
FIG. 9 is a flow chart of one embodiment of step 802 shown in FIG. 8;
fig. 10 is a schematic structural view of an embodiment of a 5G message interception apparatus according to the present application;
FIG. 11 is a schematic structural view of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs, the terms used in the description herein are used for the purpose of describing particular embodiments only and are not intended to limit the application, and the terms "comprising" and "having" and any variations thereof in the description of the application and the claims and the above description of the drawings are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to make the person skilled in the art better understand the solution of the present application, the technical solution of the embodiment of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include a terminal device 101, a network 102, and a server 103, where the terminal device 101 may be a notebook 1011, a tablet 1012, or a cell phone 1013. Network 102 is the medium used to provide communication links between terminal device 101 and server 103. Network 102 may include various connection types such as wired, wireless communication links, or fiber optic cables.
A user may interact with the server 103 via the network 102 using the terminal device 101 to receive or send messages or the like. The terminal device 101 may have various communication client applications installed thereon, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal device 101 may be various electronic devices having a display screen and supporting web browsing, and the terminal device 101 may be an electronic book reader, an MP3 player (Moving Picture Experts Group Audio Layer III, moving picture experts compression standard audio layer III), an MP4 (Mov i ng Picture Experts Group Audio Layer IV, moving picture experts compression standard audio layer IV) player, a laptop portable computer, a desktop computer, or the like, in addition to the notebook 1011, the tablet 1012, or the mobile phone 1013.
The server 103 may be a server providing various services, such as a background server providing support for pages displayed on the terminal device 101.
It should be noted that, the method for intercepting a 5G message provided by the embodiment of the present application is generally executed by a server, and accordingly, a 5G message intercepting device is generally disposed in the server.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow chart of one embodiment of a 5G message interception method in accordance with the present application is shown. The 5G message interception method comprises the following steps:
step 201, obtaining a 5G message to be sent generated by a target service end.
In this embodiment, the target service end is, for example, a service message generating end in a financial service application scenario, specifically, an insurance application preference message pushing service scenario, where the target service end is configured to generate a 5G insurance application preference message according to an actual service preference plan, the 5G message refers to a static/dynamic message in an audio format, a picture format, a video format and a text format that can be directly sent in a short message form, and then, for example, the target service end may also be an on-line medical service message generating end in a health medical service scenario, specifically, in order to push a volunteer medical consultation G active message in an audio, picture and video format to a patient group user in a hospital aspect, the target service end is used to generate a 5G message, and, for example, the target service end may also be a health care active message generating end in a health care service scenario, specifically, a health care responsible party may also be configured to generate a 5G message for pushing a health care preference message in an audio, picture and video format to a target user.
In essence, the method for intercepting 5G messages is used in three-terminal interaction scenarios of a target service terminal, a target service terminal and a target user terminal, where the target service terminal is configured to generate a 5G message to be sent, and the target service terminal is configured to perform a series of pre-processing before sending the 5G message to the target user terminal, for example, performing operations such as compression, beautification, data format conversion, encryption processing, and logic condition judgment on the 5G message, and the target user terminal is configured to receive the 5G message, and generally includes a mobile phone terminal or a user message receiving interface terminal.
And 202, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, and identifying keywords contained in the 5G message.
Specifically, since the 5G message is different from the previous message content and may include still/dynamic messages in audio format, picture format, video format and text format, which are sent in the form of a short message, the multi-modal processing analysis model is used to analyze the content of the 5G message, so that content analysis can be performed on the still/dynamic messages in audio format, picture format, video format and text format, respectively, so as to determine keywords included in the 5G message to be sent, where the keywords include service keywords. For example, when the 5G message to be sent is a loan marketing advertisement message, keywords included in the 5G message include related business keywords such as "loan", "interest rate", "stage", and the like.
Step 203, judging whether the keyword contained in the 5G message hits at least any interception field in the target interception field library by a search mode.
In this embodiment, the target interception field library summarizes interception fields set by the target user, where the interception fields may be keywords of service content included in the 5G message, and determines, by a search manner, whether the keywords included in the 5G message hit at least any interception field in the target interception field library, so as to determine whether to send and intercept the 5G message.
Step 204, if all keywords miss the interception field, the 5G message is sent to the target ue.
Specifically, it is determined that the 5G message to be sent does not include all interception fields set by the target ue, so that the 5G message does not need to be intercepted and the 5G message is directly sent to the target ue.
Step 205, if at least any keyword hits the interception field, adding the mobile phone number or the message sending interface corresponding to the target user terminal to the temporary sending blacklist of the 5G message.
Specifically, if it is determined that the 5G message to be sent includes any interception field set by the target ue, adding a mobile phone number or a message sending interface corresponding to the target ue to a temporary blacklist of the 5G message, so as to block sending of the 5G message to be sent to the target ue.
In this embodiment, the method for intercepting 5G messages is applied to a pre-interception scenario before sending the 5G messages to the target ue, where the message interception mode is performed before sending the 5G messages, and does not involve actual sending of the 5G messages to the target ue, and from a root, the interception is performed, so that larger sending and intercepting resources are not required compared with a processing mode of first sending and then intercepting. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
In the embodiment, a 5G message to be sent is generated by a target service end, content analysis is carried out on the 5G message by adopting a multi-mode processing analysis model, keywords contained in the 5G message are identified, whether the keywords contained in the 5G message hit at least any interception field in a target interception field library is judged by a search mode, if all the keywords miss the interception field, the 5G message is sent to a target user end, and if at least any keyword hit the interception field, a mobile phone number or a message sending interface corresponding to the target user end is added to a temporary sending blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
With continued reference to FIG. 3, FIG. 3 is a flow chart of one embodiment of step 202 of FIG. 2, including the steps of:
Step 301, identifying a format type of the 5G message, wherein the format type includes an audio format, a picture format, a video format and a text format;
Specifically, the format type of the 5G message is identified according to the suffix of the data format of the 5G message, for example, the suffix of the data in the picture format is ". JPG", ". PNG", etc., the suffix of the data in the audio format is ". MP3", ". Wav", etc., the suffix of the data in the video format is ". MP4", ". AV I", etc., and the description thereof is not repeated here.
Step 302, selecting a target sub-processing model from the multi-mode processing analysis model according to the format type to perform keyword marking processing on the 5G message, so as to obtain a keyword marking processing result;
Specifically, the target sub-processing model in the multi-mode processing analysis model comprises a voiceprint processing sub-model, a picture processing sub-model, an image processing sub-model and a semantic recognition sub-model, and keyword marking processing is performed on the 5G message by selecting the target sub-processing model from the multi-mode processing analysis model to obtain a keyword marking processing result corresponding to the 5G message, so that a decision of whether to send the 5G message to a target user side in a subsequent message sending step is facilitated.
And step 303, determining keywords contained in the 5G message according to the keyword marking processing result.
With continued reference to FIG. 4, FIG. 4 is a flow chart of one embodiment of step 302 shown in FIG. 3, including the steps of:
step 401, if the format type is an audio format, identifying audio data content contained in the 5G message by using the voiceprint processing submodel;
Specifically, the voiceprint processing submodel comprises DEEP SPEAKER voiceprint recognition models, wherein the DEEP SPEAKER voiceprint recognition model is a deep neural network-based voiceprint recognition model, and adopts a Convolutional Neural Network (CNN) and long-short-term memory (LSTM) structure. Through reinforcement learning technology, DEEP SPEAKER voiceprint recognition model has very good adaptability when handling short-time speech fragments, especially on audio data content recognition task.
Step 402, if the format type is a picture format, identifying picture data content contained in the 5G message by using the picture processing sub-model;
step 403, if the format type is a video format, performing audio content analysis on the 5G message by using the image processing sub-model to obtain audio data content, extracting a key frame in the 5G message, and performing picture data content identification on the key frame;
Step 404, respectively performing text conversion processing on the audio data content and the picture data content, performing word segmentation processing on the text data content generated after conversion, and performing keyword marking processing on all the words by adopting the semantic recognition sub-model to obtain a keyword marking processing result;
in this embodiment, the word segmentation processing may be performed on the text data content generated after the conversion according to a preset word segmentation service dictionary.
And step 405, if the format type is a text format, directly performing word segmentation on text data content contained in the 5G message, and performing keyword marking processing on all the segmented words by adopting the semantic recognition sub-model to obtain a keyword marking processing result.
And selecting a target sub-processing model from the multi-mode processing analysis model to perform keyword marking processing on the 5G message to obtain a keyword marking processing result corresponding to the 5G message, so that a subsequent message sending step is facilitated to determine whether to send the 5G message to a target user side.
With continued reference to fig. 5, in some alternative implementations, before step 203, the method further includes a step of performing batch acquisition and summary analysis on the indication message, and fig. 5 is a flowchart of a specific embodiment of batch acquisition and summary analysis on the indication message in the 5G message interception method according to the present application, including the steps of:
Step 501, obtaining indication messages sent by batch user terminals according to a preset user terminal message receiving interface;
Specifically, for example, in a scenario that the user terminal is a mobile phone terminal, receiving an indication message sent by a user through a short message reply;
in this embodiment, the indication message may be composed of an indication keyword and a service content keyword, where the indication keyword includes at least two types, for example, "interception" and "release", and the service content keyword is set according to an actual service scenario, for example, "loan", "interest rate", "stage", and other related service keywords;
step 502, analyzing the indication message to obtain analysis results corresponding to each user terminal respectively;
Specifically, when the analysis result of the analyzed indication message is 'interception', 'loan', 'interest rate', 'stage', the indication type of the indication message is interception type, the 5G message intercepted or not to be received is loan service type 5G message, and correspondingly, when the analysis result of the analyzed indication message is 'release', 'loan', 'interest rate', 'stage', the indication type of the indication message is release interception type, and the 5G message to be intercepted or received comprises loan service type 5G message;
Step 503, identifying indication types of all indication messages according to the analysis result and a preset indication keyword, wherein the indication types comprise an interception type and a disarming type;
step 504, summarizing the analysis results corresponding to all the indication messages under the same indication type;
specifically, since the indication messages sent by the batch of user terminals are obtained, the indication types of the indication messages possibly sent by each user terminal are different, so that analysis results corresponding to all the indication messages under the same indication type are summarized.
Step 505, according to the summarized result, sorting out the public interception field contained in the interception type and sorting out the public interception field contained in the interception type.
Specifically, by summarizing the analysis results corresponding to all the indication messages under the same indication type, the public interception fields contained in the interception type and the public interception fields contained in the interception type can be sorted out, so that the public interception fields and the public interception fields can be conveniently utilized later;
In this embodiment, the public interception field and the public disaggregation field may be calculated by a percentage calculation, for example, when more than 60% of the batch of clients all set a certain field a as an interception field, the field a is set as a public interception field, and similarly, the public disaggregation field may also be set by this method, and the specific percentage in calculating may be set according to the actual service requirement.
With continued reference to fig. 6, in some optional implementations, before step 203, the method further includes a step of updating the target interception field library with respect to the indication message sent by the target ue, and fig. 6 is a flowchart of a specific embodiment of the method for 5G message interception according to the present application for updating the target interception field library with respect to the indication message sent by the target ue, where the method includes the following steps:
Step 601, acquiring an indication message sent by a target user side in real time according to a preset user side message receiving interface;
Step 602, analyzing the indication message in real time to obtain a real-time analysis result;
Step 603, identifying the indication type of the indication message according to the real-time analysis result and a preset indication keyword;
Step 604, if the indicated type is an interception type, identifying all interception matching fields sent by the target user end in real time according to the analysis result;
Step 605, updating the target interception field library maintained by the target server according to all interception matching fields sent by the target user in real time.
By acquiring the indication information sent by the target user side in real time and combining the analysis result, identifying all interception matching fields sent by the target user side in real time, and updating the target interception field library maintained by the target server side according to all interception matching fields sent by the target user side in real time, the target interception field library is updated in time when the real-time interception field sent by the target user side is acquired, and the non-preference 5G information is prevented from being sent to the target user.
With continued reference to fig. 7, fig. 7 is a flow chart of one embodiment of step 605 of fig. 6, including the steps of:
step 701, merging all interception matching fields sent by the target user side in real time with public interception fields contained in the interception type to obtain an interception field merging set;
Step 702, identifying all intersection elements of the union set of the target interception field library and the interception field through comparison and retrieval to obtain a first intersection;
step 703, obtaining all difference set elements of the first intersection and the interception field merger by difference set operation;
And step 704, adding all difference set elements into the target interception field library to update the target interception field library in real time.
And merging all interception matching fields sent by the target user side in real time with the public interception fields contained in the interception types to obtain an interception field merging set so as to introduce the public interception fields on the basis of self-setting the interception fields by the target user side, thereby fully updating the target interception field library.
With continued reference to fig. 8, in some optional implementations, after step 603, the method further includes another embodiment step of performing a target interception field library update with respect to an indication message sent by the target ue, and fig. 8 is a flowchart of another embodiment of performing a target interception field library update with respect to an indication message sent by the target ue in the 5G message interception method according to the present application, including the following steps:
Step 801, if the indicated type is a disaggregation type, identifying all interception matching fields that are disaggregated in real time by the target user terminal according to the analysis result;
And step 802, updating the target interception field library maintained by the target server according to all interception matching fields released in real time by the target user.
By acquiring the indication information sent by the target user side in real time and combining the analysis result, identifying all interception matching fields released by the target user side in real time, and updating the target interception field library maintained by the target server side according to all interception matching fields released by the target user side in real time, the target interception field library is updated in time when the interception fields released by the target user side in real time are acquired, so that the unrestricted 5G information is sent to the target user in time.
With continued reference to fig. 9, fig. 9 is a flow chart of one embodiment of step 802 shown in fig. 8, including the steps of:
Step 901, merging all interception matching fields released in real time by the target user side and public interception releasing fields contained in the interception releasing type to obtain a fusion set of interception releasing fields;
Step 902, identifying all intersection elements of the target interception field library and the release field union set through comparison and retrieval to obtain a second intersection;
and step 903, deleting all elements in the second intersection from the target interception field library to update the target interception field library in real time.
And merging all interception matching fields released in real time by the target user side and the public interception releasing fields contained in the interception releasing type to obtain a merging set of the interception releasing fields, so that the public interception releasing fields are introduced on the basis of self-interception releasing fields of the target user side, and the target interception field library is fully updated.
In the embodiment, a 5G message to be sent is generated by a target service end, content analysis is carried out on the 5G message by adopting a multi-mode processing analysis model, keywords contained in the 5G message are identified, whether the keywords contained in the 5G message hit at least any interception field in a target interception field library is judged by a search mode, if all the keywords miss the interception field, the 5G message is sent to a target user end, and if at least any keyword hit the interception field, a mobile phone number or a message sending interface corresponding to the target user end is added to a temporary sending blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (ARTIFICIAL INTELLI GENCE, A I) is the theory, method, technique, and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend, and expand human intelligence, sense the environment, acquire knowledge, and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
In the embodiment, a 5G message to be sent is generated by a target service end, content analysis is carried out on the 5G message by adopting a multi-mode processing analysis model, keywords contained in the 5G message are identified, whether the keywords contained in the 5G message hit at least any interception field in a target interception field library is judged by a search mode, if all the keywords miss the interception field, the 5G message is sent to a target user end, and if at least any keyword hit the interception field, a mobile phone number or a message sending interface corresponding to the target user end is added to a temporary sending blacklist of the 5G message. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
With further reference to fig. 10, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a 5G message interception apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 10, the 5G message interception apparatus 10 according to the present embodiment includes a 5G message acquisition module 10a, a content analysis and identification module 10b, an interception hit judgment module 10c, a first branch processing module 10d, and a second branch processing module 10e. Wherein:
The 5G message obtaining module 10a is configured to obtain a 5G message to be sent, which is generated by the target service end;
the content analysis and identification module 10b is configured to perform content analysis on the 5G message by using a multi-mode processing and analysis model, and identify keywords included in the 5G message;
The interception hit judging module 10c is configured to judge whether a keyword included in the 5G message hits at least any interception field in the target interception field library in a search manner;
The first branch processing module 10d is configured to send the 5G message to the target user terminal if all the keywords do not hit the interception field;
and the second branch processing module 10e is configured to add the mobile phone number or the message sending interface corresponding to the target user terminal to the temporary sending blacklist of the 5G message if at least any keyword hits the interception field.
The method comprises the steps of obtaining a 5G message to be sent, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, sending the 5G message to a target user end if all the keywords miss the interception field, and adding a mobile phone number or a message sending interface corresponding to the target user end to a temporary sending blacklist of the 5G message if at least any keywords hit the interception field. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
In this embodiment, the content analysis and identification module 10b includes a message format type identification unit, a keyword marking processing unit, and a keyword determination unit. Wherein:
a message format type identifying unit, configured to identify a format type of the 5G message, where the format type includes an audio format, a picture format, a video format, and a text format;
the keyword marking processing unit is used for selecting a target sub-processing model from the multi-mode processing analysis model according to the format type to perform keyword marking processing on the 5G message, so as to obtain a keyword marking processing result;
And the keyword determining unit is used for determining keywords contained in the 5G message according to the keyword marking processing result.
In this embodiment, the content analysis and identification module 10b further includes an audio format message processing unit, a picture format message processing unit, a video format message processing unit, a keyword first marking processing unit, and a keyword second marking processing unit. Wherein:
An audio format message processing unit, configured to identify audio data content contained in the 5G message using the voiceprint processing submodel if the format type is an audio format;
a picture format message processing unit, configured to identify picture data content contained in the 5G message by using the picture processing sub-model if the format type is a picture format;
The video format message processing unit is used for carrying out audio content analysis on the 5G message by adopting the image processing submodel if the format type is a video format to obtain audio data content, extracting key frames in the 5G message and carrying out picture data content identification on the key frames;
The first keyword marking processing unit is used for respectively carrying out text conversion processing on the audio data content and the picture data content, carrying out word segmentation processing on the text data content generated after conversion, and carrying out keyword marking processing on all the words by adopting the semantic recognition submodel to obtain a keyword marking processing result;
And the keyword second marking processing unit is used for directly carrying out word segmentation processing on text data content contained in the 5G message if the format type is a text format, and carrying out keyword marking processing on all the segmented words by adopting the semantic recognition sub-model to obtain a keyword marking processing result.
In this embodiment, the 5G message interception device 10 further includes an indication message batch acquisition module, an indication message analysis module, an indication type identification module, an analysis result summarization module, and a public field arrangement module. Wherein:
The indication message batch acquisition module is used for acquiring indication messages sent by batch user terminals according to a preset user terminal message receiving interface;
The indication message analysis module is used for analyzing the indication message to obtain analysis results corresponding to each user terminal respectively;
The indication type identification module is used for identifying indication types of all indication messages according to the analysis result and a preset indication keyword, wherein the indication types comprise an interception type and a disarming type;
The analysis result summarizing module is used for summarizing analysis results corresponding to all the indication messages under the same indication type;
and the public field arrangement module is used for arranging public interception fields contained in the interception type and arranging public interception removal fields contained in the interception removal type according to the summarized result.
In this embodiment, the 5G message interception device 10 further includes an indication message real-time acquisition module, an indication message analysis module, an indication type identification module, an interception matching field identification module, a target interception field library first update module, an interception matching field identification module, and a target interception field library second update module. Wherein:
The indication message real-time acquisition module is used for acquiring the indication message sent by the target user side in real time according to a preset user side message receiving interface;
The indication message analysis module is also used for analyzing the indication message in real time to obtain a real-time analysis result;
The indication type identification module is also used for identifying the indication type of the indication message according to the real-time analysis result and a preset indication keyword;
the interception matching field identification module is used for identifying all interception matching fields sent by the target user side in real time according to the analysis result if the indication type is the interception type;
The first updating module of the target interception field library is used for updating the target interception field library maintained by the target server according to all interception matching fields sent by the target user in real time;
the interception removal matching field identification module is used for identifying all interception matching fields which are removed in real time by the target user side through the analysis result if the indication type is an interception removal type;
And the target interception field library second updating module is used for updating the target interception field library maintained by the target server according to all interception matching fields released in real time by the target user.
In this embodiment, the first update module of the target interception field library includes an interception field mergence generating unit, a first intersection obtaining unit, a difference set operating unit, and a first update unit of the target interception field library. Wherein:
The interception field merging set generating unit is used for merging all interception matching fields sent by the target user side in real time with public interception fields contained in the interception type to obtain an interception field merging set;
the first intersection obtaining unit is used for identifying all intersection elements of the union set of the target interception field library and the interception field through comparison and retrieval to obtain a first intersection;
The difference set operation unit is used for obtaining all difference set elements of the first intersection and the interception field union set through difference set operation;
and the target interception field library first updating unit is used for adding all the difference set elements into the target interception field library so as to update the target interception field library in real time.
In this embodiment, the second update module of the target interception field library includes a field merge cancellation set generating unit, a second intersection obtaining unit, and a second update unit of the target interception field library. Wherein:
the release field merging set generating unit is used for merging all interception matching fields released in real time by the target user side and the public release interception fields contained in the release interception type to obtain a release field merging set;
The second intersection obtaining unit is used for identifying all intersection elements of the target interception field library and the release field union set through comparison and retrieval to obtain a second intersection;
and the target interception field library second updating unit is used for deleting all elements in the second intersection from the target interception field library so as to update the target interception field library in real time.
Those skilled in the art will appreciate that implementing all or part of the above described embodiment methods may be accomplished by computer readable instructions, stored on a computer readable storage medium, that the program when executed may comprise the steps of embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-only memory (Read-Onl y Memory, ROM), or a random access memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 11, fig. 11 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 11 comprises a memory 11a, a processor 11b, a network interface 11c communicatively connected to each other via a system bus. It should be noted that only a computer device 11 having a component memory 11a, a processor 11b, a network interface 11c is shown in fig. 11, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and its hardware includes, but is not limited to, a microprocessor, an Application SPECIFIC INTEGRATED Circuit (ASIC), a Programmable gate array (Field-Programmable GATE ARRAY, FPGA), a digital Processor (DIGITAL SIGNAL Processor, DSP), an embedded device, and the like.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 11a includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 11a may be an internal storage unit of the computer device 11, such as a hard disk or a memory of the computer device 11. In other embodiments, the memory 11a may also be an external storage device of the computer device 11, such as a plug-in hard disk, a smart memory card (SMART MEDIA CARD, SMC), a Secure Digital (SD) card, a flash memory card (FLASH CARD) or the like, which are provided on the computer device 11. Of course, the memory 11a may also include both an internal memory unit of the computer device 11 and an external memory device. In this embodiment, the memory 11a is generally used to store an operating system and various application software installed on the computer device 11, such as computer readable instructions of a 5G message interception method. Further, the memory 11a may be used to temporarily store various types of data that have been output or are to be output.
The processor 11b may be a central processing unit (Central Processi ng Un i t, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 11b is typically used to control the overall operation of the computer device 11. In this embodiment, the processor 11b is configured to execute computer readable instructions stored in the memory 11a or process data, such as computer readable instructions for executing the 5G message interception method.
The network interface 11c may comprise a wireless network interface or a wired network interface, which network interface 11c is typically used to establish a communication connection between the computer device 11 and other electronic devices.
The computer equipment provided by the embodiment belongs to the technical field of research and development optimization, and is applied to a front interception scene before sending a 5G message to a target user side. The method comprises the steps of obtaining a 5G message to be sent, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, sending the 5G message to a target user end if all the keywords miss the interception field, and adding a mobile phone number or a message sending interface corresponding to the target user end to a temporary sending blacklist of the 5G message if at least any keywords hit the interception field. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
The present application also provides another embodiment, namely, a computer readable storage medium storing computer readable instructions executable by a processor to cause the processor to perform the steps of a 5G message interception method as described above.
The computer readable storage medium provided by the embodiment belongs to the technical field of research and development optimization, and is applied to a front interception scene before sending a 5G message to a target user side. The method comprises the steps of obtaining a 5G message to be sent, which is generated by a target service end, carrying out content analysis on the 5G message by adopting a multi-mode processing analysis model, identifying keywords contained in the 5G message, judging whether the keywords contained in the 5G message hit at least any interception field in a target interception field library in a search mode, sending the 5G message to a target user end if all the keywords miss the interception field, and adding a mobile phone number or a message sending interface corresponding to the target user end to a temporary sending blacklist of the 5G message if at least any keywords hit the interception field. The message interception mode is carried out before the 5G message is sent, the actual sending of the 5G message to the target user terminal is not involved, the interception is carried out from the root, and compared with the processing mode of sending before intercepting, the method does not need to consume larger sending and intercepting resources. Especially in the businesses such as financial business, medical health care, etc., the user population is huge, user business preference is different, so, the 5G message interception method ensures that business preference users can successfully acquire 5G business push messages, and ensures that business non-preference users have no perception on the whole process of interception of related 5G messages.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present application.
It is apparent that the above-described embodiments are only some embodiments of the present application, but not all embodiments, and the preferred embodiments of the present application are shown in the drawings, which do not limit the scope of the patent claims. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a thorough and complete understanding of the present disclosure. Although the application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing description, or equivalents may be substituted for elements thereof. All equivalent structures made by the content of the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the scope of the application. The non-native company software tools or components present in the embodiments of the present application are presented by way of example only and are not representative of actual use.

Claims (11)

1. A 5G message interception method, comprising the steps of:
Acquiring a 5G message to be sent generated by a target service end;
performing content analysis on the 5G message by adopting a multi-mode processing analysis model, and identifying keywords contained in the 5G message;
Judging whether a keyword contained in the 5G message hits at least any interception field in a target interception field library or not through a retrieval mode;
If all keywords do not hit the interception field, sending the 5G message to a target user terminal;
If at least any keyword hits the interception field, adding the mobile phone number or the message sending interface corresponding to the target user terminal into the temporary sending blacklist of the 5G message.
2. The method for intercepting a 5G message according to claim 1, wherein the step of identifying keywords included in the 5G message by performing content analysis on the 5G message using a multi-modal processing analysis model specifically comprises:
identifying a format type of the 5G message, wherein the format type comprises an audio format, a picture format, a video format and a text format;
selecting a target sub-processing model from the multi-mode processing analysis model according to the format type to perform keyword marking processing on the 5G message, so as to obtain a keyword marking processing result;
and determining the keywords contained in the 5G message according to the keyword marking processing result.
3. The method for intercepting a 5G message according to claim 2, wherein the multi-modal processing analysis model includes a voiceprint processing sub-model, a picture processing sub-model, an image processing sub-model and a semantic recognition sub-model, and the step of selecting a target sub-processing model from the multi-modal processing analysis model according to the format type to perform keyword marking processing on the 5G message to obtain a keyword marking processing result specifically includes:
if the format type is an audio format, identifying audio data content contained in the 5G message by adopting the voiceprint processing submodel;
If the format type is a picture format, adopting the picture processing sub-model to identify picture data content contained in the 5G message;
If the format type is a video format, adopting the image processing sub-model to analyze the audio content of the 5G message to obtain audio data content, extracting key frames in the 5G message, and identifying the picture data content of the key frames;
respectively carrying out text conversion processing on the audio data content and the picture data content, carrying out word segmentation processing on the text data content generated after conversion, and carrying out keyword marking processing on all the words by adopting the semantic recognition sub-model to obtain a keyword marking processing result;
if the format type is a text format, word segmentation processing is directly carried out on text data content contained in the 5G message, keyword marking processing is carried out on all the segmented words by adopting the semantic recognition sub-model, and a keyword marking processing result is obtained.
4. The method for intercepting a 5G message according to claim 1, wherein before the step of determining whether a keyword included in the 5G message hits at least any one interception field in a target interception field library by performing the search method, the method further comprises:
acquiring indication messages sent by batch user terminals according to a preset user terminal message receiving interface;
analyzing the indication message to obtain analysis results corresponding to each user terminal respectively;
identifying indication types of all indication messages according to the analysis result and a preset indication keyword, wherein the indication types comprise an interception type and an interception releasing type;
summarizing analysis results corresponding to all indication messages under the same indication type;
and according to the summarized result, sorting out the public interception field contained in the interception type and sorting out the public interception field contained in the interception type.
5. The method for intercepting a 5G message according to claim 4, wherein before the step of determining whether a keyword included in the 5G message hits at least any one interception field in a target interception field library by performing the search method, the method further comprises:
Acquiring an indication message sent by a target user side in real time according to a preset user side message receiving interface;
Analyzing the indication message in real time to obtain a real-time analysis result;
identifying the indication type of the indication message according to the real-time analysis result and a preset indication keyword;
If the indication type is the interception type, identifying all interception matching fields sent by the target user side in real time through the analysis result;
and updating the target interception field library maintained by the target server according to all interception matching fields sent by the target user side in real time.
6. The method for intercepting a 5G message according to claim 5, wherein said step of updating said target interception field library maintained by said target server according to all interception matching fields sent in real time by said target client specifically comprises:
Combining all interception matching fields sent by the target user side in real time with public interception fields contained in the interception type to obtain an interception field merging set;
Identifying all intersection elements of the target interception field library and the interception field mergence set through comparison and retrieval to obtain a first intersection;
obtaining all difference set elements of the first intersection and the interception field merger by difference set operation;
And adding all the difference set elements into the target interception field library to update the target interception field library in real time.
7. The 5G message interception method according to claim 5, wherein after performing the step of identifying an indication type of the indication message according to the parsing result and a preset indication keyword, the method further comprises:
If the indication type is the interception releasing type, identifying all interception matching fields which are released in real time by the target user side through the analysis result;
and updating the target interception field library maintained by the target server according to all interception matching fields released by the target user side in real time.
8. The method for intercepting a 5G message according to claim 7, wherein the step of updating the target interception field library maintained by the target server according to all interception matching fields released in real time by the target client specifically comprises:
Combining all interception matching fields released in real time by the target user side with public interception releasing fields contained in the interception releasing type to obtain a interception releasing field merging set;
Identifying all intersection elements of the target interception field library and the release field union set through comparison and retrieval to obtain a second intersection;
and deleting all elements in the second intersection from the target interception field library to update the target interception field library in real time.
9. A 5G message interception device, wherein the 5G message interception device is configured to implement the steps of the 5G message interception method according to any one of claims 1 to 8, the 5G message interception device comprising:
the 5G message acquisition module is used for acquiring a 5G message to be sent generated by the target service end;
The content analysis and identification module is used for carrying out content analysis on the 5G message by adopting a multi-mode processing and analysis model and identifying keywords contained in the 5G message;
the interception hit judging module is used for judging whether the keyword contained in the 5G message hits at least any interception field in the target interception field library or not in a search mode;
the first branch processing module is used for sending the 5G message to the target user terminal if all keywords do not hit the interception field;
and the second branch processing module is used for adding the mobile phone number or the message sending interface corresponding to the target user terminal to the temporary sending blacklist of the 5G message if at least any keyword hits the interception field.
10. A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions which when executed by the processor implement the steps of the 5G message interception method of any one of claims 1 to 8.
11. A computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the 5G message interception method of any one of claims 1 to 8.
CN202510865179.5A 2025-06-25 2025-06-25 A 5G message interception method, device, equipment and storage medium thereof Pending CN120751347A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510865179.5A CN120751347A (en) 2025-06-25 2025-06-25 A 5G message interception method, device, equipment and storage medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510865179.5A CN120751347A (en) 2025-06-25 2025-06-25 A 5G message interception method, device, equipment and storage medium thereof

Publications (1)

Publication Number Publication Date
CN120751347A true CN120751347A (en) 2025-10-03

Family

ID=97195628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510865179.5A Pending CN120751347A (en) 2025-06-25 2025-06-25 A 5G message interception method, device, equipment and storage medium thereof

Country Status (1)

Country Link
CN (1) CN120751347A (en)

Similar Documents

Publication Publication Date Title
CN110569377B (en) Media file processing method and device
CN110298906B (en) Method and apparatus for generating information
WO2022142014A1 (en) Multi-modal information fusion-based text classification method, and related device thereof
CN112653798A (en) Intelligent customer service voice response method and device, computer equipment and storage medium
CN113360660A (en) Text type identification method and device, electronic equipment and storage medium
CN118070072A (en) Problem processing method, device, equipment and storage medium based on artificial intelligence
CN112995414A (en) Behavior quality inspection method, device, equipment and storage medium based on voice call
CN108846098B (en) Information flow abstract generating and displaying method
CN117275466A (en) Business intention recognition method, device, equipment and storage medium thereof
CN111798118B (en) Enterprise operation risk monitoring method and device
CN116821298A (en) Keyword automatic identification method applied to application information and related equipment
US20190139432A1 (en) Methods and systems for animated walkthroughs in an online educational platform
US11714970B2 (en) Systems and methods for detecting deception in computer-mediated communications
CN116910199A (en) Intelligent question-answering processing method, device, equipment and medium based on artificial intelligence
CN120751347A (en) A 5G message interception method, device, equipment and storage medium thereof
CN113111181B (en) Text data processing method and device, electronic equipment and storage medium
CN107283429A (en) Control method, device, system and terminal based on artificial intelligence
CN119864015B (en) Audio generation method, device, equipment and storage medium thereof
CN118692693B (en) A method and system for mining health care service needs based on text analysis
CN119539929B (en) Material recommendation method, device, equipment and medium
CN119202014B (en) Data comparison method, device, computer equipment and storage medium
CN119538877B (en) A method, device, computer equipment and storage medium for generating copy content
CN114579740B (en) Text classification method, device, electronic device and storage medium
US20250005282A1 (en) Domain entity extraction for performing text analysis tasks
CN120746586A (en) User reply method, device, equipment and storage medium thereof

Legal Events

Date Code Title Description
PB01 Publication