WO2011022969A1 - 一种垃圾信息监控系统和方法 - Google Patents

一种垃圾信息监控系统和方法 Download PDF

Info

Publication number
WO2011022969A1
WO2011022969A1 PCT/CN2010/071383 CN2010071383W WO2011022969A1 WO 2011022969 A1 WO2011022969 A1 WO 2011022969A1 CN 2010071383 W CN2010071383 W CN 2010071383W WO 2011022969 A1 WO2011022969 A1 WO 2011022969A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
type
blacklist
module
Prior art date
Application number
PCT/CN2010/071383
Other languages
English (en)
French (fr)
Inventor
张玲东
陈子晔
王巍
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011022969A1 publication Critical patent/WO2011022969A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Definitions

  • the present invention relates to the field of information security management of communication operators, and in particular, to a spam monitoring system and method. Background technique
  • spam message color envelope blocking method proposes a spam message color envelope blocking method, including the following steps:
  • the spam message MMS server monitors the number and content of the excess amount in the unit time; secondly, the BOSS obtains the excess number file and content; again, compares the exceeded number with the white list to determine whether the number is in the white list, and if so, If the process ends, if not, the manual determination is made, that is, the excess number and content are presented to the customer service operator interface, and the content is manually determined whether the content is a spam message, and if not, the process ends; if yes, the process proceeds to the next step;
  • the number is sent to the HLR to stop the SMS MMS function command, and at the same time join the customer service knowledge base, for the customer service personnel to explain when the stop number initiates the complaint.
  • the above method is based on the monitoring of information transmission traffic, and has the following drawbacks:
  • the spam sender group can bypass the carrier's blocking by setting the sending speed to be slightly lower than the limited traffic threshold.
  • the object of the present invention is to provide a spam monitoring system and method, which solves the problem that the existing spam monitoring method is not perfect, and the spammers reduce the sending speed to avoid monitoring, and the processing method for the user is unreasonable. problem.
  • the present invention provides a garbage information monitoring system, comprising: a saving module, a receiving module, a first determining module, an obtaining module, a suspicious user determining module and a second modifying module;
  • the saving module is configured to save a blacklist for recording a first type of user and a whitelist for recording a second type of user;
  • the receiving module is configured to receive information forwarded by the information center and convert the information into internal information
  • the first determining module is configured to determine, according to a preset rule and a feature of the internal information The type of the user to which the sender of the message belongs, and the first judgment result is obtained;
  • the obtaining module is configured to: when the first determination result indicates that the sender of the information is a suspicious user, obtain a second determination result indicating that the suspicious user is a first type user or a second type user;
  • the suspicious user judging module is configured to determine that the suspicious user is a first type user or a second type user, obtain the second judgment result, and provide the result to the acquiring module.
  • the second modification module is configured to add the suspicious user to the blacklist when the suspicious user is a first type of user according to the second determination result obtained by the acquiring module; when the suspicious user When the user is a second type, the suspicious user is added to the whitelist.
  • the suspicious user judging module includes: an input device and/or a second judging submodule, where:
  • the input device is configured to: when the first determination result indicates that the sender of the information is a suspicious user, obtain the second determination result according to the result of the input user judgment, and provide the second determination result to the acquiring module;
  • the second determining sub-module is configured to: when the first determining result indicates that the sender of the information is a suspicious user, determine, according to a predetermined condition, that the suspicious user is a first type user or a second type user, The second judgment result is described and provided to the acquisition module.
  • the system further includes: a first modifying module, configured to add a sender of the information to the blacklist when the sender of the first determination result indication information belongs to the first type of user.
  • the system further includes:
  • a blacklist update module configured to update the blacklist according to a preset validity period
  • a whitelist update module configured to update the whitelist according to a preset validity period
  • the system further includes: a synchronization module for synchronizing the blacklist and/or the whitelist to the information center.
  • the invention also provides a spam monitoring method, comprising the following steps:
  • the spam monitoring system receives the information forwarded by the information center and converts the information into internal information.
  • the spam monitoring system determines that the sender of the information is a suspicious user according to the preset rule and the characteristics of the internal information, and then determines again.
  • the suspicious user is a first type user or a second type user;
  • the spam monitoring system adds the suspicious user to its own blacklist; and when the suspicious user has a second type of user, adds the suspicious user to its own whitelist. .
  • the spam monitoring system determines that the suspicious user is a first type user or a second type user, and specifically: determining, according to the result of the input user judgment, that the suspicious user is a first type user or a second Type user.
  • the spam monitoring system determines that the suspicious user is a first type user or a second type user, and specifically: determining that the suspicious user is a first type user or a second type user according to a predetermined condition.
  • the method further includes: adding a sender of the information to the blacklist.
  • the method further includes: updating the blacklist and/or whitelist according to a preset validity period.
  • the method further includes: synchronizing the blacklist and/or whitelist to the information center. Further, the information center forwards the information to the spam monitoring system, specifically: the information center receives the sending request of the information;
  • the information center determines, according to the stored blacklist and whitelist, and the user number corresponding to the sending request, that the sender of the information belongs to a blacklist or a whitelist;
  • the information center When the sender of the information does not belong to the blacklist or the whitelist, the information center sends the information according to the normal process, and forwards a copy to the spam monitoring system.
  • the method further includes: The information center directly ends the issuance of the information;
  • the method further includes: the information center sending the information according to a normal process.
  • the present invention has the following beneficial effects:
  • the monitoring method of the present invention has a suspicious threshold, and effectively overcomes the vulnerability of the spammer to avoid monitoring when the sending speed is set to be slightly lower than the highest threshold by monitoring the user who reaches the suspicious threshold. Moreover, by setting a suspicious threshold, the suspicious number can be further flexibly monitored manually or automatically, so that some users who are not sent or sent by the real spam are prevented from being stopped from sending information, thus avoiding Directly stop the user from sending information to the user.
  • the information transmitting method of the present invention can directly stop the user in the blacklist according to the black and white list, while the suspicious user uses the monitoring method to determine whether it needs to be blacklisted. Moreover, while the suspicious user is being monitored, the corresponding information is still delivered, and therefore, the normal sending and receiving process of the current information is not affected.
  • the implementation method of the invention has fewer external network elements, and only needs to connect the garbage information monitoring system with the information center, and the interface is simple, which is applicable to different networks of all operators; not only monitoring and sealing the point-to-point spam information Blocking, the information of the extended short message entity (ESME, External Short Message Entity) sent by the service provider (SP) and other information bursting devices can also be monitored and blocked, and the other functions of the user will not be caused. Affect, maintain the order.
  • DRAWINGS the extended short message entity sent by the service provider
  • FIG. 1 is a schematic structural diagram of a garbage information monitoring system according to the present invention.
  • FIG. 2 is a schematic diagram of a connection structure of a garbage information monitoring system and an information center according to the present invention
  • FIG. 3 is a flowchart of a garbage information monitoring method according to the present invention
  • FIG. 4 is a flow chart of a method for transmitting information in an information center according to the present invention. detailed description
  • the spam monitoring system and method of the invention can be monitored based on the information sending traffic and the content of the information element, and the monitoring result is directly synchronized to the black and white list database of each information center, thereby realizing the quick blocking of the spam information.
  • FIG. 1 is a schematic structural diagram of a spam monitoring system according to the present invention, including: a saving module 01, configured to save and record a blacklist of a first type of user and record a whitelist of a second type of user.
  • a saving module 01 configured to save and record a blacklist of a first type of user and record a whitelist of a second type of user.
  • the receiving module 02 is configured to receive information forwarded by the information center and convert the information into internal information; the information may be a short message or a multimedia message.
  • the first judging module 03 is configured to obtain the first judging result according to the type of the user to which the sender of the feature judgment information and the information of the internal information belongs.
  • two thresholds need to be set in the preset rule: a blacklist threshold and a suspicious threshold, and the suspect threshold is lower than or equal to the blacklist threshold.
  • the purpose of setting the suspicious threshold is to prevent the transmission of inter-information traffic below the blacklist threshold to avoid monitoring problems.
  • the above two thresholds can be set based on the transmission traffic of the information or based on the content of the information element.
  • the specific threshold settings and the way to determine the user type are as follows:
  • the sender of the information is the first type of user.
  • the traffic is calculated by the amount of information, for example, the blacklist threshold of the information sent in the predetermined time is 1M, and the information sent by the sender in the predetermined time is 2M, and the sender of the information is The first type of user.
  • the traffic is calculated by the quantity of information, for example, the blacklist threshold of the number of information sent in the predetermined time is 1000, and the number of information sent by the information sender in the predetermined time is 2000, then it is determined.
  • the sender of this information is the first type of user.
  • the sender of the information is a suspicious user.
  • the suspicious threshold of the transmission traffic of the information within the predetermined time is set to 0.8M, and the blacklist threshold is 1M. If the information flow sent by the information sender within the predetermined time is greater than or equal to 0.8M and less than 1M, then it is determined. This user is a suspicious user.
  • the sender of the information is the first type of user. For example, if the blacklist threshold for sending the number of messages with the keyword "Falun Gong" is set to 1, then at least one of the messages sent by the user has the word "Falungong", then the user is determined to be the first. Type user.
  • the sender of the information is a suspicious user.
  • the suspicious threshold value of the number of messages with the keyword sent in the predetermined time may be set to 500, and the blacklist threshold is 700, if a user is in the If the number of messages with the word "false invoice" sent within the predetermined time is 560, the user is determined to be a suspicious user.
  • the rule may be set according to requirements, and may be set based on the sending traffic, or based on the content of the information element, or may be based on the sending traffic or the sender of the first judgment result based on the information element.
  • the spam monitoring system of the present invention further includes: a first modifying module 04, configured to add the sender of the information to the save when the sender of the first determination result indication information belongs to the first type of user Blacklist in module 01.
  • the monitoring system further includes: an obtaining module 05, configured to: when the sender of the first determination result indication information belongs to the suspicious user, obtain a second determination result for indicating that the suspicious user is the first type user or the second type user.
  • the suspicious user judging module 12 is configured to determine that the suspicious user is the first type user or the second type user, and obtain the second judgment result, and provide the result to the obtaining module 05.
  • the second judgment result may be obtained according to the result of the input user judgment, or may be automatically determined by the junk information monitoring system according to the preset condition; of course, the second judgment result may be obtained by using the two methods at the same time.
  • the function of the suspicious user judgment module 12 can be realized by the input means 06.
  • the input device 06 is configured to obtain a second determination result according to the result of the input user judgment when the sender of the first determination result indication information is a suspicious user, and provide the result to the acquisition module 05.
  • Relevant information of the suspicious user such as the content of the information sent by the suspicious user, the sending time of the information, the illegal rules, etc., can be displayed on the screen of the input device 06, and the user can judge according to the related information to obtain the suspicious user.
  • the second judgment result of the first type user or the second type user can be displayed on the screen of the input device 06, and the user can judge according to the related information to obtain the suspicious user.
  • the operation may be performed on the screen of the input device 06, adding the suspicious user to the blacklist (indicating that the result of the user judgment is the first type of user;), or adding the whitelist (indicating that the result of the user judgment is the second type) User;), or no processing (indicating that the result of the user's judgment is a suspicious user;).
  • the result of the operation is obtained by the acquisition module 05 via the input device 06.
  • the suspicious user judgment module 12 is a second judging sub-module 07, and is configured to judge according to a predetermined condition when the sender of the first judgment result indication information belongs to the suspicious user.
  • the suspicious user is a first type user or a second type user.
  • the obtaining module 05 obtains a second determination result indicating that the suspicious user is the first type user or the second type user according to the judgment result of the second judgment submodule 07.
  • the second modification module 08 is configured to add, according to the second determination result obtained by the obtaining module 05, the suspicious user to the blacklist or whitelist in the saving module 01 when the suspicious user is the first type user or the second type user. .
  • FIG. 2 is a schematic diagram showing the connection structure of the garbage information monitoring system and the information center of the present invention.
  • the figure includes: Garbage Information Monitoring System and Information Center 1, 2... n.
  • Each of the information centers 1, 2, ... n establishes a connection with the spam monitoring system.
  • the blacklist and the whitelist are not stored in the local database of the information center.
  • the information center sends all the information to the spam monitoring system.
  • the spam monitoring system monitors the blacklist users and whitelist users.
  • the sender is neither a blacklist nor a whitelist (ie, a suspicious user;), and the spam monitoring system further determines whether it belongs to a blacklisted user or a whitelisted user or a suspicious user (ie, the function of the obtaining module 50). If it is determined to be a blacklisted user, it will be added to the blacklist. If it is determined to be a whitelisted user, it will be added to the whitelist. If it is determined to be a suspicious user, it may not be processed.
  • the blacklist and whitelist of the spam monitoring system are synchronized to the blacklist and whitelist in the local database of the information center.
  • the information center After the blacklist and whitelist are stored in the local database of the information center, after receiving the information sent by the sender, the information center first compares the sender of the information with the blacklist and whitelist in the local database, and filters the blacklisted users. It is forbidden to send information, and the information sent by whitelist users is sent according to the normal process. For senders who are neither blacklisted nor whitelisted, their information will be sent normally, and a copy will be sent to the spam monitoring system, which is monitored by spam. The system monitors it to further determine whether it is a blacklisted user or a whitelisted user or a suspicious user. If it is determined to be a blacklisted user, it will be added to the blacklist. If it is determined to be a whitelisted user, it will be added to the whitelist.
  • the suspicious user is a blacklist user or a whitelist user, if it is determined to be a blacklist user, add it to the blacklist. If it is determined to be a whitelist user, add it to the whitelist if it is determined that it is neither black. If the list user is not a whitelist user, it is still a suspicious user and can be left untreated.
  • the blacklist and whitelist of the spam monitoring system are synchronized with the blacklist and whitelist in the local database of the information center.
  • the blacklist and whitelist of the spam monitoring system and the blacklist and whitelist of the local database of the information center can be synchronized by setting the synchronization module 09 in the spam monitoring system.
  • the synchronization module 09 is configured to synchronize the blacklist and the whitelist of the save module 10 modified by the first modification module 07 and the second modification module 08 to the information center, so that the information center sends the information sender according to the blacklist and the whitelist. Block it.
  • synchronization can include the following:
  • the synchronization module synchronizes the blacklist and whitelist of the spam monitoring system with the blacklist and whitelist of the local database of the information center in real time.
  • the synchronization module synchronizes the blacklist and whitelist of the spam monitoring system with the blacklist and whitelist of the local database of the information center according to the synchronization request from the information center.
  • the synchronization module is separated by a predetermined time, and the blacklist and whitelist of the spam monitoring system are synchronized with the blacklist and whitelist of the local database of the information center.
  • the spam monitoring system further includes: a blacklist updating module 10, configured to update the blacklist in the saving module 01 according to a preset validity period.
  • a blacklist updating module 10 configured to update the blacklist in the saving module 01 according to a preset validity period.
  • Each blacklist user corresponds to a preset validity period, which can be permanent, self-setting, or the end of the monitoring granularity.
  • the blacklist update module 10 automatically deletes the blacklist user from the blacklist of the save module 01.
  • the spam monitoring system uses simultaneous synchronization
  • the module 09 and the blacklist update module 10 the synchronization module 09 uses the above three synchronization methods to synchronize the blacklist in the update module 01 updated by the blacklist update module 10 to the blacklist of the local database in the information center.
  • the spam monitoring system further includes: a whitelist updating module 11 configured to update the whitelist in the saving module 01 according to a preset validity period. As with the blacklist update module 10, the whitelisted user who has passed the validity period is deleted from the whitelist of the save module 01. If the spam monitoring system simultaneously uses the synchronization module 09 and the whitelist update module 11, the synchronization module 09 synchronizes the whitelist in the saved module 01 updated by the whitelist update module 11 with the whitelist of the local database of the information center.
  • a whitelist updating module 11 configured to update the whitelist in the saving module 01 according to a preset validity period. As with the blacklist update module 10, the whitelisted user who has passed the validity period is deleted from the whitelist of the save module 01. If the spam monitoring system simultaneously uses the synchronization module 09 and the whitelist update module 11, the synchronization module 09 synchronizes the whitelist in the saved module 01 updated by the whitelist update module 11 with the whitelist of the local database of the information center.
  • the spam monitoring system can also use the blacklist update module 10, the whitelist update module 11 and the synchronization module 09 at the same time.
  • the synchronization module 09 synchronizes the blacklist and whitelist in the update module 01 to the local database of the information center.
  • FIG. 3 is a flow chart of the garbage information monitoring method according to the present invention, including the steps:
  • Step 301 The spam monitoring system receives the information forwarded by the information center, and converts the information into internal information; the information may be a short message or a multimedia message.
  • Step 302 The spam monitoring system determines, according to the preset rule and the feature of the internal information, that the sender of the information is a suspicious user, and determines that the suspicious user is the first type user or the second type user.
  • the spam monitoring system adds the sender of the information to its own blacklist when determining that the sender of the information is the first type of user according to the characteristics of the preset rule and the internal information.
  • the suspicious user is determined to be the first type user or the second type user
  • the following two methods may be used: According to the result of the input user judgment, the function of the input device 06 in FIG. 1 is not described herein. And/or judged according to predetermined conditions, corresponding to the second judgment in FIG. The function of module 07 will not be described here.
  • the method for determining that the sender of the information is a suspicious user or a user of the first type is the same as the method of determining the type of the user to which the sender of the information belongs according to the preset rule and the feature of the internal information in FIG. I won't go into details here.
  • Step 303 The spam monitoring system adds the suspicious user to the blacklist when the suspicious user is the first type user, and adds the suspicious user to the whitelist when determining that the suspicious user is the second type user.
  • the spam monitoring method of the present invention also updates the blacklist and whitelist in the spam monitoring system, and according to the preset expiration date, the expired blacklist user or whitelist user, correspondingly It can be deleted from the blacklist or whitelist. This can make the users who have been misjudged as blacklists use the service after a period of time. It can also re-monitor users who have been misjudged as whitelists to avoid long-term spam. send.
  • the spam monitoring method of the present invention may further include: the spam monitoring system synchronizes the blacklist and the whitelist to the information center, so that the information center The sender of the spam is blocked according to the blacklist and the whitelist.
  • synchronization can include the following:
  • FIG. 4 is a flowchart of a method for transmitting information in an information center according to the present invention, including the following steps: Step 401: The information center receives a request for sending the information.
  • Step 402 The information center determines whether the sender of the information belongs to a blacklist or a whitelist according to the stored blacklist and whitelist and the user number corresponding to the sending request.
  • Step 403 When the sender of the information belongs to the blacklist, the information center directly ends the sending of the information; when the sender of the information belongs to the whitelist, the information is sent according to the normal process; the sender of the information is neither blacklisted nor When the information is not in the white list, the information center sends a copy to the spam monitoring system for monitoring, that is, according to the steps shown in Figure 3.
  • the garbage information monitoring system and method of the present invention sets the suspicious threshold and the blacklist threshold to make the monitoring scheme more perfect, and the spam sender sends the transmission obtained by reducing the sending speed within a predetermined time. Even if the traffic is below the blacklist threshold, it can still be monitored by setting a suspicious threshold.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Description

一种垃圾信息监控系统和方法 技术领域
本发明涉及通讯运营商的信息安全管理领域, 尤其涉及一种垃圾信息 监控系统和方法。 背景技术
由于短信、 彩信业务的数据量丰富、 内容多样等特点, 使得目前现网 中的信息业务量逐步攀升。 随着信息业务的不断发展, 目前一些带有非法 或不健康信息、 或未经客户允许而向客户群发的商业、 广告信息、 或其他 内容的垃圾信息也越来越多。 大量的垃圾信息不仅消耗通讯网络资源, 同 时也干扰了正常的业务处理。
对垃圾信息, 尤其是垃圾彩信的监控和封堵, 公开号为 CN101137085、 发明名称为 "垃圾短信彩信封堵方法" 的中国专利申请提出了一种垃圾短 信彩信封堵方法, 包括以下步骤: 首先, 垃圾短信彩信服务器监控出单位 时间内发送量超标的号码及内容; 其次, BOSS获得超标号码文件及内容; 再次, 将超标号码与白名单对照, 判断该号码是否在白名单内, 若是, 则 流程结束; 若否, 则进行人工判定, 即将该超标号码和内容呈现到客服操 作员界面, 由人工判别内容是否是垃圾短信彩信, 若否, 则流程结束; 若 是, 则进入下一步; 最后, 对该号码向 HLR发送停短信彩信功能指令, 同 时加入客服知识库, 以供被停号码发起投诉时客服人员解释。
上述方法是基于信息发送流量的监控, 存在以下缺陷:
一、 垃圾短信群发商可通过将发送速度设定为稍低于限定流量门限的 方式躱过运营商的封堵;
二、 对违规用户的封堵采用直接停彩信功能的方法, 会使用户永远不 能使用彩信功能, 除非用户主动投诉要求重新开启彩信功能, 这种处理方 法大大增加了运维人工操作, 对那些无意群发垃圾彩信的用户造成很差的 用户体验, 实际可应用性不大;
三、 针对漫游在本身的外辖区垃圾彩信短信的发送, 需要在移动交换 中心( MSC, Mobile Switching Center )与低级信令转接点 ( LSTP, Low Signal Transfer Point )之间接入 MPM, MPM为专门定制的信令处理机硬件, 对所 有经过 MPM的信令进行计数统计。可见,这种处理方式需要增加信令硬件, 复杂度急剧上升, 成本也相应上升。
由此可见, 上述的监控垃圾信息的方法是基于发送流量, 而不能够监 控到垃圾短信群发商将发送速度设定为稍低于限定流量门限时发送的垃圾 信息。 并且, 在垃圾信息封堵的方式上, 对用户采用了停止发送信息这种 比较极端的方式, 总之对垃圾信息的封堵方式也不太合理。 发明内容
本发明的目的是提供一种垃圾信息监控系统和方法, 以解决现有的垃 圾信息监控方法的不完善而导致的垃圾信息群发商降低发送速度而逃避监 控, 以及对用户的处理方式不合理的问题。
为达到上述目的, 本发明的技术方案是这样实现的:
本发明提供了一种垃圾信息监控系统, 该系统包括: 保存模块、 接收 模块、 第一判断模块、 获取模块、 可疑用户判断模块和第二修改模块; 其 中,
所述保存模块, 用于保存记录第一类型用户的黑名单和记录第二类型 用户的白名单;
所述接收模块, 用于接收信息中心转发的信息, 并将其转化为内部信 息;
所述第一判断模块, 用于根据预设规则和所述内部信息的特征判断所 述信息的发送方所属的用户类型, 得到第一判断结果;
所述获取模块, 用于在所述第一判断结果指示所述信息的发送方为可 疑用户时, 获取指示所述可疑用户为第一类型用户或第二类型用户的第二 判断结果;
所述可疑用户判断模块, 用于判断所述可疑用户为第一类型用户或第 二类型用户, 得到所述第二判断结果, 并提供给所述获取模块。
所述第二修改模块, 用于根据所述获取模块获取的第二判断结果, 当 所述可疑用户为第一类型用户时, 将所述可疑用户添加到所述黑名单; 当 所述可疑用户为第二类型用户时, 将所述可疑用户添加到所述白名单。
其中, 所述可疑用户判断模块包括: 输入装置和 /或第二判断子模块, 其中:
所述输入装置, 用于在所述第一判断结果指示所述信息的发送方为可 疑用户时, 根据输入的用户判断的结果得到所述第二判断结果, 并提供给 所述获取模块;
所述第二判断子模块, 用于在所述第一判断结果指示所述信息的发送 方为可疑用户时, 根据预定条件判断所述可疑用户为第一类型用户或第二 类型用户, 得到所述第二判断结果, 并提供给所述获取模块。
该系统进一步包括: 第一修改模块, 用于在所述第一判断结果指示信 息的发送方属于第一类型用户时, 将所述信息的发送方添加到所述黑名单。
该系统进一步包括:
黑名单更新模块, 用于根据预先设定的有效期更新所述黑名单; 白名单更新模块, 用于根据预先设定的有效期更新所述白名单。
该系统进一步包括: 同步模块, 用于将所述黑名单和 /或所述白名单同 步到所述信息中心。
本发明还提供了一种垃圾信息监控方法, 包括以下步骤: 垃圾信息监控系统接收信息中心转发的信息, 并将其转化为内部信息; 所述垃圾信息监控系统根据预设规则和所述内部信息的特征判定所述 信息的发送方为可疑用户时, 再次判定所述可疑用户为第一类型用户或第 二类型用户;
所述可疑用户为第一类型用户时, 所述垃圾信息监控系统将所述可疑 用户添加到自身的黑名单; 所述可疑用户第二类型用户时, 将所述可疑用 户添加到自身的白名单。
进一步地, 所述垃圾信息监控系统再次判定所述可疑用户为第一类型 用户或第二类型用户, 具体为: 根据输入的用户判断的结果, 判定所述可 疑用户为第一类型用户或第二类型用户。
进一步地, 所述垃圾信息监控系统再次判定所述可疑用户为第一类型 用户或第二类型用户, 具体为: 根据预定条件判定所述可疑用户为第一类 型用户或第二类型用户。
进一步地, 所述垃圾信息监控系统判定所述信息的发送方为第一类型 用户时, 该方法进一步包括: 将所述信息的发送方添加到所述黑名单。
该方法进一步包括: 根据预先设定的有效期对所述黑名单和 /或白名单 进行更新。
该方法进一步包括: 将所述黑名单和 /或白名单同步到所述信息中心。 进一步地, 所述信息中心转发信息给所述垃圾信息监控系统, 具体为: 所述信息中心接收到信息的发送请求;
所述信息中心根据存储的黑名单和白名单、 以及所述发送请求对应的 用户号码, 判断所述信息的发送方属于黑名单或白名单;
所述信息的发送方既不属于黑名单也不属于白名单时, 所述信息中心 将所述信息按照正常流程下发, 并抄送一份转发给所述垃圾信息监控系统。
进一步地, 所述信息的发送方属于黑名单时, 该方法进一步包括: 所 述信息中心直接结束所述信息的下发;
所述信息的发送方属于白名单时, 该方法进一步包括: 所述信息中心 按照正常流程下发所述信息。
与现有技术相比, 本发明具有以下有益效果:
本发明的监控方法设置有可疑门限, 通过对达到可疑门限的用户的监 控, 有效解决了垃圾信息群发商将发送速度设定为稍低于最高门限流量时 逃避监控的漏洞。 并且, 通过设置可疑门限, 还可以通过人工或自动的方 式灵活的对可疑号码进行进一步的监控, 使得部分误发或发送的并不是真 正的垃圾信息的用户免于被停止发送信息, 这样就避免了直接停止用户发 送信息为用户带来的损害。
本发明的信息发送方法可以在发送信息的同时, 直接根据黑白名单列 表, 使处于黑名单内的用户停止发送, 而对于可疑用户则利用监控方法判 定其是否需要列入黑名单。 并且, 可疑用户在被监控的同时, 其对应的信 息仍然是下发的, 因此, 不会影响当前信息的正常收发流程。
本发明的实现方法筒单, 涉及的外部网元少, 仅需要将垃圾信息监控 系统与信息中心连接, 接口筒单, 适用于所有运营商的不同网络; 不仅对 点对点的垃圾信息实现监控和封堵, 对于通过服务提供商 (SP )及其他信 息群发装置发出的扩展短消息实体( ESME, External Short Message Entity ) 到点的信息同样能够实现监控和封堵, 同时对用户的其他功能不会造成影 响, 维护筒单。 附图说明
图 1为本发明的垃圾信息监控系统结构示意图;
图 2为本发明的垃圾信息监控系统与信息中心的连接结构示意图; 图 3为本发明的垃圾信息监控方法流程图;
图 4为本发明信息中心的信息发送方法流程图。 具体实施方式
本发明的垃圾信息监控系统及方法既可以基于信息的发送流量又可以 基于信息元素内容来进行监控, 监控结果直接同步到各信息中心的黑白名 单数据库, 从而实现垃圾信息的快速封堵。
下面结合附图对本发明的具体实施方式作进一步详细说明。
参考图 1 , 图 1为本发明的垃圾信息监控系统结构示意图, 包括: 保存模块 01 , 用于保存记录第一类型用户的黑名单和记录第二类型用 户的白名单。
接收模块 02, 用于接收信息中心转发的信息, 并将其转化为内部信息; 该信息可以是短信, 也可以是彩信。
第一判断模块 03 , 用于根据预设规则和内部信息的特征判断信息的发 送方所属的用户类型, 获取第一判断结果。
较佳地, 预设规则中需要设置两个门限值: 黑名单门限值和可疑门限 值, 可疑门限值低于或等于黑名单门限值。 设定可疑门限值的目的是防止 间内信息的发送流量低于黑名单门限值, 以逃避监控的问题。 上述两个门 限值的设定可以基于信息的发送流量, 也可以根据信息元素内容。
具体的门限值设定、 以及判断用户类型的方式如下:
一、 基于信息的发送流量。
1、 如果预定时间内信息的发送流量大于等于预设的黑名单门限值, 则 信息的发送方为第一类型用户。 例如, 以信息的数据量计算流量, 例如预 定时间内信息的发送流量的黑名单门限值为 1M, 而信息发送方在预定的时 间内发送的信息流量为 2M, 则该信息的发送方为第一类型用户。 或者, 以 信息数量计算流量, 例如预定时间内发送的信息数量的黑名单门限值为 1000条, 而信息发送方在预定的时间内发送的信息数量为 2000条, 则判定 该信息的发送方为第一类型用户。
2、 如果预定时间内信息的发送流量大于等于可疑门限值小于黑名单门 限值时, 信息的发送方为可疑用户。 例如, 预定时间内信息的发送流量的 可疑门限值设定为 0.8M、 黑名单门限值为 1M, 如果信息发送方在预定时 间内发送的信息流量大于等于 0.8M而小于 1M,则判定该用户为可疑用户。
二、 基于信息元素内容。
1、 如果预定时间内发送的具有与预设的关键字相吻合内容的信息数量 大于等于预设的黑名单门限值, 则信息的发送方为第一类型用户。 例如, 将发送具有关键字为 "法轮功" 的信息数量的黑名单门限值设定为 1 条, 则用户发送的信息中至少有 1 条具有 "法轮功" 字样时, 则判定该用户为 第一类型用户。
2、 如果预定时间内发送的具有与预设的关键字相吻合内容的信息数 量, 大于等于可疑门限值小于黑名单门限值时, 信息的发送方为可疑用户。 例如, 假设关键字为 "假发票", 则可以设定在预定时间内发送的具有该关 键字的信息数量的可疑门限值为 500条、 黑名单门限值为 700条, 如果某 用户在预定时间内发送的具有 "假发票" 字样的信息数量为 560条, 则判 定该用户为可疑用户。
在具体实施时, 可以根据需要来设定规则, 既可以基于发送流量设定, 也可以基于信息元素内容设定, 也可以单独基于发送流量或基于信息元素 当第一判断结果指示信息的发送方为第一类型用户时, 本发明的垃圾 信息监控系统进一步包括: 第一修改模块 04, 用于在第一判断结果指示信 息的发送方属于第一类型用户时, 将信息的发送方添加到保存模块 01中的 黑名单。
当第一判断结果指示信息的发送方为可疑用户时, 本发明的垃圾信息 监控系统进一步包括: 获取模块 05 , 用于在第一判断结果指示信息的发送 方属于可疑用户时, 获取用于指示可疑用户为第一类型用户或第二类型用 户的第二判断结果。
可疑用户判断模块 12, 用于判断可疑用户为第一类型用户或第二类型 用户, 得到第二判断结果, 并提供给获取模块 05。
第二判断结果可以根据输入的用户判断的结果得到, 也可以由垃圾信 息监控系统根据预设条件, 自动判断得到; 当然也可以同时采用这两种方 式得到第二判断结果。
如果第二判断结果是基于用户判断的结果得到, 可疑用户判断模块 12 的功能可以通过输入装置 06来实现。输入装置 06, 用于在第一判断结果指 示信息的发送方为可疑用户时, 根据输入的用户判断的结果得到第二判断 结果, 并提供给获取模块 05。 可疑用户的相关信息、 如可疑用户发送的信 息内容、 信息的发送时间、 违法的规则等, 都可以在输入装置 06的屏幕上 显示出来, 而用户可以根据这些相关信息来进行判断, 得到可疑用户为第 一类型用户或第二类型用户的第二判断结果。 用户判断完后, 可以在输入 装置 06的屏幕上进行操作, 将可疑用户加入黑名单(表示用户判断的结果 为第一类型用户;)、 或者加入白名单 (表示用户判断的结果为第二类型用 户;)、 或者不作处理(表示用户判断的结果为可疑用户;)。 操作的结果通过 输入装置 06由获取模块 05获取。
当第二判断结果是由垃圾信息监控系统自动判断得到时, 可疑用户判 断模块 12为第二判断子模块 07 ,用于在第一判断结果指示信息的发送方属 于可疑用户时, 根据预定条件判断可疑用户为第一类型用户或第二类型用 户。 相应的, 获取模块 05根据第二判断子模块 07的判断结果获取指示可 疑用户为第一类型用户或第二类型用户的第二判断结果。
需要指出的是, 用户判断的方式有时比系统的自动判断更为准确, 用 户可以根据信息的具体内容, 将真正的发送垃圾信息的用户过滤出来, 而 避免将那些误发了与垃圾信息内容相关的用户列入第一类型用户。
第二修改模块 08, 用于根据获取模块 05获取的第二判断结果, 当可疑 用户为第一类型用户或第二类型用户时, 将可疑用户对应添加到保存模块 01中的黑名单或白名单。
利用本发明的监控系统设定的可疑门限值和黑名单门限值, 就可以对 信息发送方进行更完善的分类, 从而更有效的监控垃圾信息。 对监控出的 黑名单用户进行封堵, 可以通过信息中心来实现。 参考图 2所示, 图 2为 本发明的垃圾信息监控系统与信息中心的连接结构示意图。 图中包括: 垃 圾信息监控系统和信息中心 1、 2...... n。 信息中心 1、 2...... n中的每一个分 别与垃圾信息监控系统建立连接。
在最初开始监控时, 信息中心的本地数据库中可以不存储黑名单和白 名单, 信息中心将所有的信息发送到垃圾信息监控系统, 由垃圾信息监控 系统监控出黑名单用户、 白名单用户, 对于既不属于黑名单, 也不属于白 名单的发送方(即可疑用户;), 由垃圾信息监控系统进一步决定其属于黑名 单用户还是白名单用户还是可疑用户 (即获取模块 50 的功能)。 如果决定 其是黑名单用户, 则将其添加到黑名单中, 如果决定其是白名单用户, 则 将其添加到白名单中, 如果决定其是可疑用户, 则可以不对其做任何处理。 垃圾信息监控系统的黑名单和白名单同步到信息中心的本地数据库中的黑 名单和白名单。
当信息中心的本地数据库中存储有黑名单和白名单之后, 信息中心在 接收到发送方发过来的信息后, 首先将信息发送方与本地数据库中的黑、 白名单对照, 将黑名单用户过滤, 禁止其发送信息, 而白名单用户发送的 信息按照正常流程下发。 对于既不属于黑名单, 也不属于白名单的发送方, 将其信息正常下发, 同时抄送一份给垃圾信息监控系统, 由垃圾信息监控 系统对其监控, 以进一步决定其属于黑名单用户还是白名单用户还是可疑 用户。 如果决定其属于黑名单用户, 则将其添加到黑名单中, 如果决定其 属于白名单用户, 则将其添加到白名单中, 如果决定其是可疑用户, 则利 用获取模块的功能, 进一步决定该可疑用户是黑名单用户还是白名单用户, 如果决定其是黑名单用户, 则将其添加到黑名单, 如果决定其是白名单用 户, 则将其添加到白名单, 如果决定其既不是黑名单用户也不是白名单用 户, 则仍然为可疑用户, 可以不作任何处理。 垃圾信息监控系统的黑名单 和白名单同步于信息中心的本地数据库中的黑名单和白名单。
垃圾信息监控系统的黑名单和白名单与信息中心的本地数据库的黑名 单和白名单的同步, 可以通过在垃圾信息监控系统中设置同步模块 09来实 现。 同步模块 09, 用于将第一修改模块 07和第二修改模块 08修改后的保 存模块 10的黑名单和白名单同步于信息中心, 以使信息中心根据该黑名单 和白名单对信息发送方进行封堵。
同步的具体实现方式可以包括以下几种:
1、 同步模块将垃圾信息监控系统的黑名单和白名单实时的与信息中心 本地数据库的黑名单和白名单同步。
2、 同步模块根据来自信息中心的同步请求, 将垃圾信息监控系统的黑 名单和白名单与信息中心本地数据库的黑名单和白名单同步。
3、 同步模块间隔一预定时间, 将垃圾信息监控系统的黑名单和白名单 与信息中心本地数据库的黑名单和白名单同步。
进一步, 垃圾信息监控系统还包括: 黑名单更新模块 10, 用于根据预 先设定的有效期对保存模块 01中的黑名单进行更新。 每个黑名单用户都对 应一个预先设定的有效期, 该有效期可以是永久、 自设定或本监控粒度结 束。 当一个黑名单用户的有效期到后, 黑名单更新模块 10自动将该黑名单 用户从保存模块 01的黑名单中删除。 如果垃圾信息监控系统同时采用同步 模块 09和黑名单更新模块 10, 则同步模块 09采用以上三种同步方式, 将 黑名单更新模块 10更新后的保存模块 01 中的黑名单同步于信息中心本地 数据库的黑名单。
进一步地, 垃圾信息监控系统还包括: 白名单更新模块 11 , 用于根据 预先设定的有效期对保存模块 01中的白名单进行更新。 同黑名单更新模块 10—样, 将过了有效期的白名单用户从保存模块 01的白名单中删除。如果 垃圾信息监控系统同时采用同步模块 09和白名单更新模块 11 ,则同步模块 09将白名单更新模块 11更新后的保存模块 01中的白名单同步于信息中心 本地数据库的白名单。
垃圾信息监控系统也可以同时采用黑名单更新模块 10、 白名单更新模 块 11和同步模块 09。同步模块 09将更新后保存模块 01中的的黑名单和白 名单同步给信息中心本地数据库。
本发明还提供了一种垃圾信息监控方法, 应用于垃圾信息监控系统, 参考图 3, 图 3为本发明的垃圾信息监控方法流程图, 包括步骤:
步骤 301 , 垃圾信息监控系统接收信息中心转发的信息, 并将其转化为 内部信息; 该信息可以是短信, 也可以是彩信。
步骤 302 , 垃圾信息监控系统根据预设规则和内部信息的特征, 判定信 息的发送方为可疑用户时, 再次判定该可疑用户为第一类型用户或第二类 型用户。
另外, 该步骤中垃圾信息监控系统根据预设规则和内部信息的特征, 判定信息的发送方为第一类型用户时, 将信息的发送方添加到自身的黑名 单。
判断可疑用户为为第一类型用户或第二类型用户时, 可以采用以下两 种方式: 才艮据输入的用户判断的结果来判断, 对应图 1中输入装置 06的功 能, 此处不再赘述; 和 /或根据预定条件来判断, 对应图 1中的第二判断子 模块 07的功能, 此处不再赘述。
该步骤中判定信息发送方为可疑用户或第一类型用户的方法, 与图 1 中第一判断模块 03根据预设规则和内部信息的特征判断信息的发送方所属 的用户类型的方法相同, 此处不再赘述。
步骤 303 , 垃圾信息监控系统判定可疑用户为第一类型用户时, 将可疑 用户添加到自身的黑名单; 判定可疑用户为第二类型用户时, 将可疑用户 添加到自身的白名单。
为了提高用户的体验度, 本发明的垃圾信息监控方法还会对垃圾信息 监控系统中的黑名单和白名单进行更新, 根据预设的有效期, 将过期的黑 名单用户或白名单用户, 相应地从黑名单或白名单中删除, 如此可以使被 误判为黑名单的用户在一段时间后可以正常使用业务, 也可以对误判为白 名单的用户重新进行监控, 避免其长期进行垃圾信息的发送。
为了使信息中心能够及时获得垃圾信息监控系统监控到的黑名单和白 名单, 本发明的垃圾信息监控方法还可以包括: 垃圾信息监控系统将黑名 单和白名单同步于信息中心, 以使信息中心根据该黑名单和白名单对垃圾 信息的发送方进行封堵。
同步的具体实现方式可以包括以下几种:
1、 将垃圾信息监控系统的黑名单和白名单实时的与信息中心本地数据 库的黑名单和白名单同步。
2、 根据来自信息中心的同步请求, 将垃圾信息监控系统的黑名单和白 名单与信息中心本地数据库的黑名单和白名单同步。
3、 间隔一预定时间, 将垃圾信息监控系统的黑名单和白名单与信息中 心本地数据库的黑名单和白名单同步。
对监控到的黑名单用户进行封堵的方法, 可以通过信息中心实现。 如 图 4所示为本发明信息中心的信息发送方法流程图, 包括以下步骤: 步骤 401 , 信息中心接收到信息的发送请求;
步骤 402,信息中心根据存储的黑名单和白名单、 以及发送请求对应的 用户号码, 判断信息的发送方属于黑名单或白名单。
步骤 403 ,信息的发送方属于黑名单时, 信息中心直接结束该信息的下 发; 信息的发送方属于白名单时, 按照正常的流程下发该信息; 信息的发 送方既不属于黑名单也不属于白名单时, 将该信息按正常流程下发的同时, 信息中心抄送一份至垃圾信息监控系统进行监控、 即按照图 3 所示的步骤 执行。
综上所述, 本发明的垃圾信息监控系统及方法通过设定可疑门限值和 黑名单门限值, 使得监控方案更加完善, 垃圾信息群发商在预定时间内通 过降低发送速度所获得的发送流量即使低于黑名单门限值, 仍然可以通过 设定可疑门限值来监控。
以上所述仅是本发明的优选实施方式, 应当指出, 对于本技术领域的 普通技术人员来说, 在不脱离本发明原理的前提下, 还可以做出若干改进 和润饰, 这些改进和润饰也应视为本发明的保护范围。

Claims

权利要求书
1、 一种垃圾信息监控系统, 其特征在于, 该系统包括: 保存模块、 接 收模块、 第一判断模块、 获取模块、 可疑用户判断模块和第二修改模块; 其中,
所述保存模块, 用于保存记录第一类型用户的黑名单和记录第二类型 用户的白名单;
所述接收模块, 用于接收信息中心转发的信息, 并将其转化为内部信 息;
所述第一判断模块, 用于根据预设规则和所述内部信息的特征判断所 述信息的发送方所属的用户类型, 得到第一判断结果;
所述获取模块, 用于在所述第一判断结果指示所述信息的发送方为可 疑用户时, 获取指示所述可疑用户为第一类型用户或第二类型用户的第二 判断结果;
所述可疑用户判断模块, 用于判断所述可疑用户为第一类型用户或第 二类型用户, 得到所述第二判断结果, 并提供给所述获取模块。
所述第二修改模块, 用于根据所述获取模块获取的第二判断结果, 当 所述可疑用户为第一类型用户时, 将所述可疑用户添加到所述黑名单; 当 所述可疑用户为第二类型用户时, 将所述可疑用户添加到所述白名单。
2、 如权利要求 1所述的垃圾信息监控系统, 其特征在于, 所述可疑用 户判断模块包括: 输入装置和 /或第二判断子模块, 其中:
所述输入装置, 用于在所述第一判断结果指示所述信息的发送方为可 疑用户时, 根据输入的用户判断的结果得到所述第二判断结果, 并提供给 所述获取模块;
所述第二判断子模块, 用于在所述第一判断结果指示所述信息的发送 方为可疑用户时, 根据预定条件判断所述可疑用户为第一类型用户或第二 类型用户, 得到所述第二判断结果, 并提供给所述获取模块。
3、 如权利要求 1所述的垃圾信息监控系统, 其特征在于, 该系统进一 步包括: 第一修改模块, 用于在所述第一判断结果指示信息的发送方属于 第一类型用户时, 将所述信息的发送方添加到所述黑名单。
4、 如权利要求 1所述的垃圾信息监控系统, 其特征在于, 该系统进一 步包括:
黑名单更新模块, 用于根据预先设定的有效期更新所述黑名单; 白名单更新模块, 用于根据预先设定的有效期更新所述白名单。
5、 如权利要求 3或 4所述的垃圾信息监控系统, 其特征在于, 该系统 进一步包括: 同步模块, 用于将所述黑名单和 /或所述白名单同步到所述信 息中心。
6、 一种垃圾信息监控方法, 其特征在于, 包括以下步骤:
垃圾信息监控系统接收信息中心转发的信息, 并将其转化为内部信息; 所述垃圾信息监控系统根据预设规则和所述内部信息的特征判定所述 信息的发送方为可疑用户时, 再次判定所述可疑用户为第一类型用户或第 二类型用户;
所述可疑用户为第一类型用户时, 所述垃圾信息监控系统将所述可疑 用户添加到自身的黑名单; 所述可疑用户第二类型用户时, 将所述可疑用 户添加到自身的白名单。
7、 如权利要求 6所述的垃圾信息监控方法, 其特征在于, 所述垃圾信 息监控系统再次判定所述可疑用户为第一类型用户或第二类型用户, 具体 为: 根据输入的用户判断的结果, 判定所述可疑用户为第一类型用户或第 二类型用户。
8、 如权利要求 6所述的垃圾信息监控方法, 其特征在于, 所述垃圾信 息监控系统再次判定所述可疑用户为第一类型用户或第二类型用户, 具体 为: 根据预定条件判定所述可疑用户为第一类型用户或第二类型用户。
9、 如权利要求 6所述的垃圾信息监控方法, 其特征在于, 所述垃圾信 息监控系统判定所述信息的发送方为第一类型用户时, 该方法进一步包括: 将所述信息的发送方添加到所述黑名单。
10、 如权利要求 6所述的垃圾信息监控方法, 其特征在于, 该方法进 一步包括: 根据预先设定的有效期对所述黑名单和 /或白名单进行更新。
11、 如权利要求 9或 10所述的垃圾信息监控方法, 其特征在于, 该方 法进一步包括: 将所述黑名单和 /或白名单同步到所述信息中心。
12、 如权利要求 11所述的垃圾信息监控方法, 其特征在于, 所述信息 中心转发信息给所述垃圾信息监控系统, 具体为:
所述信息中心接收到信息的发送请求;
所述信息中心根据存储的黑名单和白名单、 以及所述发送请求对应的 用户号码, 判断所述信息的发送方属于黑名单或白名单;
所述信息的发送方既不属于黑名单也不属于白名单时, 所述信息中心 将所述信息按照正常流程下发, 并抄送一份转发给所述垃圾信息监控系统。
13、 如权利要求 12所述的垃圾信息监控方法, 其特征在于,
所述信息的发送方属于黑名单时, 该方法进一步包括: 所述信息中心 直接结束所述信息的下发;
所述信息的发送方属于白名单时, 该方法进一步包括: 所述信息中心 按照正常流程下发所述信息。
PCT/CN2010/071383 2009-08-28 2010-03-29 一种垃圾信息监控系统和方法 WO2011022969A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910091900A CN101635894A (zh) 2009-08-28 2009-08-28 一种垃圾信息监控系统、监控方法、信息发送方法
CN200910091900.0 2009-08-28

Publications (1)

Publication Number Publication Date
WO2011022969A1 true WO2011022969A1 (zh) 2011-03-03

Family

ID=41594913

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/071383 WO2011022969A1 (zh) 2009-08-28 2010-03-29 一种垃圾信息监控系统和方法

Country Status (2)

Country Link
CN (1) CN101635894A (zh)
WO (1) WO2011022969A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323145A (zh) * 2014-07-17 2016-02-10 腾讯科技(深圳)有限公司 恶意信息识别方法、恶意信息识别装置及系统
CN107305499A (zh) * 2016-04-22 2017-10-31 中兴通讯股份有限公司 清理移动终端通知消息的方法和装置

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635894A (zh) * 2009-08-28 2010-01-27 中兴通讯股份有限公司 一种垃圾信息监控系统、监控方法、信息发送方法
CN102404762B (zh) * 2010-09-19 2016-07-06 联想(北京)有限公司 一种访问管理的方法及装置
CN104581656B8 (zh) * 2013-10-21 2020-02-28 南京中兴新软件有限责任公司 一种垃圾信息的处理方法及装置
CN105228143B (zh) * 2014-06-13 2019-05-24 中国移动通信集团公司 一种垃圾短信鉴别方法、装置和终端
CN105635044B (zh) * 2014-10-28 2020-06-16 腾讯科技(深圳)有限公司 一种信息同步方法和设备
CN104539514B (zh) * 2014-12-17 2018-07-17 广州酷狗计算机科技有限公司 消息过滤方法和装置
CN106162619A (zh) * 2015-04-24 2016-11-23 中国移动通信集团公司 一种呼叫中心外呼的监控预警方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137085A (zh) * 2007-03-20 2008-03-05 中国移动通信集团江苏有限公司 垃圾短信彩信封堵方法
CN101335968A (zh) * 2008-08-04 2008-12-31 中兴通讯股份有限公司 一种垃圾短消息监控后续处理的方法及系统
CN101389074A (zh) * 2008-10-17 2009-03-18 浙江大学 基于社交网络机理确认发送者身份的短信息监控方法
CN101635894A (zh) * 2009-08-28 2010-01-27 中兴通讯股份有限公司 一种垃圾信息监控系统、监控方法、信息发送方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101137085A (zh) * 2007-03-20 2008-03-05 中国移动通信集团江苏有限公司 垃圾短信彩信封堵方法
CN101335968A (zh) * 2008-08-04 2008-12-31 中兴通讯股份有限公司 一种垃圾短消息监控后续处理的方法及系统
CN101389074A (zh) * 2008-10-17 2009-03-18 浙江大学 基于社交网络机理确认发送者身份的短信息监控方法
CN101635894A (zh) * 2009-08-28 2010-01-27 中兴通讯股份有限公司 一种垃圾信息监控系统、监控方法、信息发送方法

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323145A (zh) * 2014-07-17 2016-02-10 腾讯科技(深圳)有限公司 恶意信息识别方法、恶意信息识别装置及系统
CN105323145B (zh) * 2014-07-17 2020-09-04 腾讯科技(深圳)有限公司 恶意信息识别方法、恶意信息识别装置及系统
CN107305499A (zh) * 2016-04-22 2017-10-31 中兴通讯股份有限公司 清理移动终端通知消息的方法和装置
CN107305499B (zh) * 2016-04-22 2022-03-04 中兴通讯股份有限公司 清理移动终端通知消息的方法和装置

Also Published As

Publication number Publication date
CN101635894A (zh) 2010-01-27

Similar Documents

Publication Publication Date Title
WO2011022969A1 (zh) 一种垃圾信息监控系统和方法
US8924488B2 (en) Employing report ratios for intelligent mobile messaging classification and anti-spam defense
KR101769386B1 (ko) M2m 시스템에서 통지 메시지 전달 방법 및 이를 위한 장치
US8243716B2 (en) System and method for preventing spam over internet telephony
US8782283B2 (en) Lawful interception and data retention of messages
CN101854609B (zh) 一种短消息监控系统和方法
US20110231904A1 (en) Automatic Notification System and Process
US20120028606A1 (en) Identifying abusive mobile messages and associated mobile message senders
KR100692653B1 (ko) 무선 인터넷 데이터 중계 방법 및 이를 이용한 무선 인터넷데이터를 위한 액세스 게이트웨이 시스템
US9384471B2 (en) Spam reporting and management in a communication network
EP1956777B1 (en) Method and system for reducing the proliferation of electronic messages
JP2006178995A (ja) 迷惑メッセージの検出
US9461916B2 (en) Smart delivery of LI data in emergency conditions
CN113114651A (zh) 报告控制方法、装置、设备及介质
US9064242B2 (en) Method and apparatus for managing spam message in messaging service
US20100229236A1 (en) Method and system for spam reporting with a message portion
KR20180046894A (ko) Nfv 기반 메시징 서비스 보안 제공 방법 및 이를 위한 시스템
WO2011143849A1 (zh) 可疑短信暂缓发送方法、装置以及系统
WO2010088379A1 (en) Method and system for spam reporting by reference
KR100996709B1 (ko) 아이피 응용 스팸 차단 장치 및 방법
WO2012089061A1 (zh) 一种识别并阻止设备发送垃圾短信的方法、设备和系统
CN101453707A (zh) 一种在通信网络中监控垃圾信息的方法
KR20090052302A (ko) 동기 메시지 관리 시스템
US20160204904A1 (en) Service Message Transmitting Method and Device
US9027139B2 (en) Method for malicious attacks monitoring

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10811135

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10811135

Country of ref document: EP

Kind code of ref document: A1