WO2016037489A1 - Rcs垃圾消息的监控方法、装置及系统 - Google Patents

Rcs垃圾消息的监控方法、装置及系统 Download PDF

Info

Publication number
WO2016037489A1
WO2016037489A1 PCT/CN2015/078890 CN2015078890W WO2016037489A1 WO 2016037489 A1 WO2016037489 A1 WO 2016037489A1 CN 2015078890 W CN2015078890 W CN 2015078890W WO 2016037489 A1 WO2016037489 A1 WO 2016037489A1
Authority
WO
WIPO (PCT)
Prior art keywords
rcs
message
spam
rcs message
server
Prior art date
Application number
PCT/CN2015/078890
Other languages
English (en)
French (fr)
Inventor
宋杨
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016037489A1 publication Critical patent/WO2016037489A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, device, and system for monitoring RCS spam messages.
  • RCS ich Communication Suite
  • the RCS message system provides a combination of voice, message, video, content sharing and other communication methods and functions based on the local address book of the mobile phone. Converged communication services. It breaks through the framework of traditional language and message applications, and can provide more and more abundant business capabilities based on existing communication capabilities. It is regarded by operators as helping them to occupy the active position of the wireless market and provide users with integration. A new business with a rich communication experience. At present, the RCS message system can provide users with a complete set of online communication applications such as address book-based presentation, instant messaging, group chat, file transfer and the like. With the popularity of smart terminals and the development of 4G networks, more and more mainstream operators have begun to launch RCS-based messaging services.
  • spam messages may be commercials with illegal or unhealthy information content or distributed to users without user permission.
  • advertising information or other content may also be links and files carrying viruses or Trojans.
  • a large amount of spam messages not only consumes service platform resources, interferes with normal business processing, but also brings security problems to users and affects the normal life of users.
  • the current RCS message system does not monitor spam, so it cannot limit the spread of spam.
  • a method for monitoring RCS spam messages comprising the following steps:
  • the step of acquiring the RCS message is specifically:
  • the step of identifying the RCS message according to the related information of the spam message preset in the database includes:
  • the RCS message is identified as an RCS spam message
  • the RCS message is identified by using a corresponding spam identification method according to the type of the RCS message.
  • the step of identifying the RCS message by using a corresponding spam identification method according to the type of the RCS message is specifically:
  • the RCS message is a text message, extract an RCS message key according to the content of the RCS message, and compare the RCS message keyword with a preset spam keyword in the database, if the RCS message If the keyword matches the spam keyword, the RCS message is identified as an RCS spam message, and if the RCS message keyword does not match the spam keyword, the RCS message is identified as an RCS normal message;
  • the RCS message is a non-text message, generating an RCS feature identifier according to the type of the RCS message, and identifying the RCS feature identifier and the preset spam feature in the database The code is compared. If the RCS feature identifier matches the spam feature identifier, the RCS message is identified as an RCS spam message, if the RCS message feature identifier and the spam feature identifier are not If it matches, the RCS message is identified as an RCS normal message.
  • the method further includes:
  • the RCS message with the maximum number of acquisitions or the preset number of acquisitions is counted in the preset time period and displayed.
  • the present invention further provides an apparatus for monitoring RCS spam, the apparatus comprising:
  • An acquisition module configured to acquire an RCS message
  • the identification module is configured to identify the RCS message according to the related information of the preset spam message in the database, and send the identification result to the server, so that the server performs corresponding processing on the RCS message according to the recognition result.
  • the obtaining module is specifically configured to:
  • the identification module is used to:
  • the RCS message is identified as an RCS spam message
  • the RCS message is identified by using a corresponding spam identification method according to the type of the RCS message.
  • the identification module is further configured to:
  • the RCS message is a text message, extract an RCS message key according to the content of the RCS message, and compare the RCS message keyword with a preset spam keyword in the database, if the RCS message The keyword matches the spam keyword to identify the RCS The message is an RCS spam message, and if the RCS message keyword does not match the spam message keyword, identifying the RCS message as an RCS normal message;
  • the RCS message is a non-text message, generating an RCS feature identifier according to the type of the RCS message, and comparing the RCS feature identifier with a preset spam feature identifier in the database, if the RCS And identifying, by the signature identifier, the RCS message as an RCS spam message, and if the RCS message feature identifier does not match the spam feature identifier, identifying the RCS message as RCS normal message.
  • the monitoring device of the RCS spam message further includes:
  • the statistics module is used to count and display the RCS messages with the maximum number of acquisitions or more than the preset number of acquisitions.
  • the invention further provides a monitoring system for RCS spam, the system comprising: an RCS spam monitoring device and a server, wherein
  • the RCS spam monitoring device is configured to acquire an RCS message, identify the RCS message according to the related information of the preset spam message in the database, and send the identification result to the server, so that the server can perform the identification result according to the The RCS message is processed accordingly;
  • the server is configured to send an RCS message or an RCS message to save the path information to the RCS spam monitoring device, receive the identification result sent by the RCS spam monitoring device, and perform corresponding to the RCS message according to the identification result. Processing.
  • the server is further configured to:
  • the RCS message is not sent;
  • the RCS message is delivered to the client.
  • the method, device and system for monitoring RCS spam message proposed by the invention compare and retrieve the obtained RCS message with the related information of the spam message stored in the database in advance, so as to compare the RCS normal message with the RCS spam message. Performing a distinction, and sending the identification result to the server, so that the server performs corresponding processing on the RCS message according to the recognition result, thereby implementing
  • the monitoring of spam messages in RCS messages can limit the effect of spamming messages and ensure normal service processing and user security.
  • FIG. 1 is a schematic flowchart of an embodiment of a method for monitoring an RCS spam message according to the present invention
  • FIG. 2 is a schematic diagram of functional modules of an embodiment of an apparatus for monitoring RCS spam messages according to the present invention
  • FIG. 3 is a schematic diagram of functional modules of another embodiment of an apparatus for monitoring RCS spam messages according to the present invention.
  • FIG. 4 is a schematic structural diagram of an embodiment of a monitoring system for an RCS spam message according to the present invention.
  • FIG. 1 is a schematic flowchart of a method for monitoring an RCS spam message according to an embodiment of the present invention, which is applied to an RCS spam monitoring device, including:
  • Step S10 acquiring an RCS message
  • an RCS message there are two ways to obtain an RCS message.
  • the RCS message is small, the RCS message sent by the server can be directly received.
  • the RCS message is large, in order to avoid the server directly sending the RCS message, the resources of other services are occupied.
  • the performance loss is caused by receiving the RCS message save path information sent by the server, and then reading the RCS message according to the RCS message save path information.
  • Step S20 Identify the RCS message according to the related information of the preset spam message in the database, and send the identification result to the server, so that the server performs corresponding processing on the RCS message according to the recognition result.
  • the RCS message is compared with the preset spam message in the database.
  • the information is compared and identified.
  • the information related to the spam message preset in the database may be any feature information that is pre-configured by the user or the administrator and related to the spam message in the historical monitoring record, and may be a blacklist that reflects the list of RCS users that send the spam message.
  • the RCS message may be identified as RCS garbage.
  • the message is sent to the server for the server to perform corresponding processing on the RCS message according to the recognition result.
  • the RCS normal message is distinguished from the RCS spam message by comparing the acquired RCS message with the related information of the spam message stored in the database in advance, and the identification result is sent to the server for the server. Performing corresponding processing on the RCS message according to the identification result, thereby implementing monitoring of the spam message in the RCS message, achieving the effect of restricting the spread of the spam message, and ensuring normal service processing and user security.
  • the step of the monitoring device identifying the RCS message according to the related information of the preset spam message in the database may be specifically as follows:
  • the user number of the RCS message is obtained according to the RCS message, where the information of the sender and the receiver of the RCS message is usually carried in the RCS message.
  • the spam blacklist may be pre-configured in the database by the user or the administrator according to the monitoring record or the self-determination, of course, The user or administrator instructs to add or delete the spam blacklist in real time.
  • the RCS message is directly identified as an RCS spam message; if the user number is not found in the spam blacklist, the user is indicated
  • the history of the spam message is not sent before the number or is not set by the user in the blacklist, but it is still unclear whether the RCS message sent by the user number this time is an RCS spam message. Therefore, according to the type of the RCS message.
  • the RCS message is identified by a corresponding spam identification method.
  • the RCS message will usually be based on its message type. A different identifier is carried, and the message type is obtained according to different identifiers carried in the RCS message. If it is determined that the RCS message is a text message, the RCS message key is extracted according to the content of the RCS message, and the RCS message key is compared with a preset spam keyword in the database.
  • the spam keyword may be pre-configured in the database by the user or the administrator according to the monitoring record or the self-requirement.
  • the content and the pre-request of the RCS message are If the content of the spam message is the same, the RCS message is identified as an RCS spam message, and if the RCS message keyword does not match the spam message keyword, the RCS message is identified as an RCS normal message.
  • the RCS feature identifier is generated according to the type of the RCS message.
  • the method for generating the RCS feature identifier may be by calling a corresponding content recognition program, and based on the RCS.
  • the message type of the message is used to identify the generated. Comparing the RCS feature identifier with a preset spam feature identifier in the database, and if the RCS feature identifier matches the spam feature identifier, indicating the feature of the RCS message and the preset If the feature of the spam message is the same, the RCS message is identified as an RCS spam message. If the RCS message feature identifier does not match the spam feature identifier, the RCS message is identified as an RCS normal message.
  • the monitoring device may also collect and display an RCS message with the maximum number of acquisitions or the preset number of acquisitions in a preset time. Since the spam message has a feature of mass propagation in a short period of time, it is possible to count the RCS message that has the highest number of acquisitions per unit time or exceeds the preset number of acquisitions in a preset time period, and uses it as a suspected spam interface. The form is displayed and presented to the user or administrator. The user or administrator checks whether the RCS message is displayed as a spam message. If so, the related information can be added to the spam blacklist and garbage in the database. Message keyword, spam feature identifier, for reference in the next identification.
  • the monitoring device may determine that the RCS user is an illegal user and needs to limit the sending of the message, and then automatically The RCS user is added to the spam blacklist, so that when the RCS message of the RCS user is obtained, the RCS message sent by the spam blacklist is directly identified as an RCS spam message.
  • the embodiment of the invention further provides a monitoring device for the RCS spam message.
  • the RCS spam monitoring device may be separately deployed and configured separately from the server; the RCS spam monitoring device may also be directly deployed on the server as a function module, which is not limited herein.
  • FIG. 2 is a schematic diagram of functional modules of an apparatus for monitoring an RCS spam message according to an embodiment of the present invention.
  • the monitoring device of the RCS spam message includes:
  • Obtaining module 01 configured to acquire an RCS message
  • an RCS message there are two ways to obtain an RCS message.
  • the RCS message is small, the RCS message sent by the server can be directly received.
  • the RCS message is large, in order to avoid the server directly sending the RCS message, the resources of other services are occupied.
  • the performance loss is caused by receiving the RCS message save path information sent by the server, and then reading the RCS message according to the RCS message save path information.
  • the identification module 02 is configured to identify the RCS message according to related information of the preset spam message in the database, and send the identification result to the server, so that the server performs corresponding processing on the RCS message according to the recognition result. .
  • the RCS message is compared with the related information of the preset spam message in the database.
  • the information related to the spam message preset in the database may be any feature information that is pre-configured by the user or the administrator and related to the spam message in the historical monitoring record, and may be a blacklist that reflects the list of RCS users that send the spam message.
  • a keyword that reflects the content of the spam message an identifier that reflects the characteristics of the spam message, an identifier carried by the spam message, and a special type of spam message. Comparing and identifying the RCS message with related information of the preset spam message in the database, and if the RCS message matches various feature information of the preset spam message, the RCS message may be identified as RCS garbage. The message is sent to the server for the server to perform corresponding processing on the RCS message according to the recognition result.
  • the RCS normal message is distinguished from the RCS spam message by comparing the acquired RCS message with the related information of the spam message stored in the database in advance, and the identification result is sent to the server for the server. Performing corresponding processing on the RCS message according to the identification result, thereby implementing monitoring of the spam message in the RCS message, achieving the effect of restricting the spread of the spam message, and ensuring normal service processing and user security.
  • the identifying module 02 identifies the RCS message according to the related information of the preset spam message in the database, which may be the following manner:
  • the user number of the RCS message is obtained according to the RCS message, where the information of the sender and the receiver of the RCS message is usually carried in the RCS message.
  • the spam blacklist may be pre-configured in the database by the user or the administrator according to the monitoring record or the self-determination, of course, The user or administrator instructs to add or delete the spam blacklist in real time.
  • the RCS message is directly identified as an RCS spam message; if the user number is not found in the spam blacklist, the user is indicated
  • the history of the spam message is not sent before the number or is not set by the user in the blacklist, but it is still unclear whether the RCS message sent by the user number this time is an RCS spam message. Therefore, according to the type of the RCS message.
  • the RCS message is identified by a corresponding spam identification method.
  • the type of the RCS message is first determined.
  • the RCS message usually carries different identifiers according to different message types, and the message type is obtained according to different identifiers carried by the RCS message. If it is determined that the RCS message is a text message, the RCS message key is extracted according to the content of the RCS message, and the RCS message key is compared with a preset spam keyword in the database.
  • the spam keyword can be used by the user or administrator based on the monitoring record or their own needs. Pre-configured in the library, if the RCS message keyword matches the spam keyword, indicating that the content of the RCS message is the same as the content of the preset spam message, the RCS message is identified as an RCS spam message. And if the RCS message keyword does not match the spam keyword, the RCS message is identified as an RCS normal message.
  • the RCS feature identifier is generated according to the type of the RCS message.
  • the method for generating the RCS feature identifier may be by calling a corresponding content recognition program, and based on the RCS.
  • the message type of the message is used to identify the generated. Comparing the RCS feature identifier with a preset spam feature identifier in the database, and if the RCS feature identifier matches the spam feature identifier, indicating the feature of the RCS message and the preset If the feature of the spam message is the same, the RCS message is identified as an RCS spam message. If the RCS message feature identifier does not match the spam feature identifier, the RCS message is identified as an RCS normal message.
  • FIG. 3 is a schematic diagram of functional modules of another embodiment of an apparatus for monitoring RCS spam messages according to the present invention.
  • the monitoring device of the RCS spam message includes the obtaining module 01 and the identifying module 02 in the foregoing embodiment, and further includes:
  • the statistics module 03 is configured to count and display the RCS message with the maximum number of acquisitions or the preset number of acquisitions in the preset time.
  • the spam message Since the spam message has a feature of mass propagation in a short period of time, it is possible to count the RCS message that has the highest number of acquisitions per unit time or exceeds the preset number of acquisitions in a preset time period, and uses it as a suspected spam interface. Displayed in the form, presented to the user or administrator, the user or administrator to review the RCS message according to the display to determine whether it is spam, and if so, The relevant information can be added to the spam blacklist, spam keyword, and spam feature identifier in the database for reference in the next identification.
  • the statistics module 03 may also determine that the RCS user is an illegal user when the number of RCS spam messages sent by a certain RCS user exceeds a preset number, and the RCS user is automatically added to the spam message.
  • the RCS message sent by the spam blacklist is directly identified as an RCS spam message.
  • FIG. 4 is a schematic structural diagram of an embodiment of a monitoring system for an RCS spam message according to the present invention.
  • the monitoring system of the RCS spam message includes: an RCS spam monitoring device 04 and a server 05, wherein
  • the RCS spam monitoring device 04 is configured to acquire an RCS message, identify the RCS message according to related information of the preset spam message in the database, and send the identification result to the server 05 for the server 05 to The recognition result performs corresponding processing on the RCS message;
  • the server 05 is configured to send an RCS message or an RCS message save path information to the RCS spam monitoring device 04, receive the identification result sent by the RCS spam monitoring device 04, and compare the RCS according to the recognition result. The message is processed accordingly.
  • the RCS spam monitoring device 04 of the RCS spam monitoring system can be separately deployed and set separately from the server 05; the RCS spam monitoring device 04 can also be directly deployed as a function module.
  • the server 05 is not limited herein.
  • the RCS spam monitoring device 04 is configured to acquire an RCS message, compare and identify the RCS message with related information of a preset spam message in the database, and send the identification result to the server 05.
  • the server 05 For the server 05 to perform corresponding processing on the RCS message according to the identification result; specifically, the process of acquiring and identifying the RCS message by the RCS spam monitoring device 04 is as described above, and details are not described herein again.
  • the server 05 obtains the identification result sent by the RCS spam monitoring device 04, and determines whether to send the RCS message according to the recognition result.
  • the recognition result is as described
  • the RCS message is an RCS spam message
  • the RCS message needs to be restricted from being transmitted, and the RCS message is not sent to prevent the client from receiving the RCS spam message;
  • the recognition result is that the RCS message is an RCS normal message
  • the RCS message is delivered to the client to ensure normal business processes.
  • the RCS normal message is distinguished from the RCS spam message by comparing the acquired RCS message with the related information of the spam message stored in the database in advance, and the identification result is sent to the server 05, and the server is sent by the server. Performing corresponding processing on the RCS message according to the identification result, thereby implementing monitoring of spam messages in the RCS message, limiting the effect of spam message transmission, ensuring normal service processing and user security, and creating pure security for the user.
  • RCS communication environment is used to identify the identification result.
  • serial numbers of the embodiments of the present invention are merely for the description, and do not represent the advantages and disadvantages of the embodiments.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic).
  • the disc, the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • the foregoing solution obtains the RCS message, identifies the RCS message according to the related information of the preset spam message in the database, and sends the identification result to the server, so that the server performs corresponding to the RCS message according to the identification result. deal with.
  • the monitoring of spam messages in the RCS message is implemented, the effect of restricting the spread of spam messages is achieved, and normal business processing and user security are ensured. Has a strong industrial applicability.

Abstract

一种RCS垃圾消息的监控方法、装置及系统,所述方法包括:获取RCS消息;根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。本申请还公开了一种RCS垃圾消息的监控装置及系统。本申请实现了对RCS消息中垃圾消息的监控,达到限制垃圾消息传播的效果,保证正常的业务处理及用户的安全。

Description

RCS垃圾消息的监控方法、装置及系统 技术领域
本发明涉及通信技术领域,尤其涉及一种RCS垃圾消息的监控方法、装置及系统。
背景技术
RCS(Rich Communication Suite,富通信套件),是一种融合通信服务,RCS消息系统提供的是一种基于手机本地地址簿的集语音、消息、视频、内容共享等多种通信方式及功能为一体的融合通信服务。它突破了传统语言以及消息类应用的框架,可以在现有通信能力基础上,提供更多、更丰富的业务能力,被运营商视为能帮助其占据无线市场主动地位,为用户提供融合、丰富的通信体验的新业务。目前,RCS消息系统能够为用户提供整套基于通讯录的呈现、即时通信、群组聊天、文件传送等在线通信应用。随着现在智能终端的普及和4G网络的发展,越来越多的主流运营商都开始推出基于RCS的消息服务。
然而,随着RCS业务的推广和RCS用户的不断增加,RCS消息系统中难免会出现各种垃圾消息,该垃圾消息可能是带有非法或不健康信息内容或未经用户允许而向用户群发的商业、广告信息或其他内容,也可能是携带病毒或木马的链接和文件。大量的垃圾消息不仅消耗业务平台资源,干扰正常的业务处理,还给用户带来了安全方面的问题,影响用户的正常生活。但是,目前RCS消息系统中并没有对垃圾消息进行监控,从而无法限制垃圾消息的传播。
上述内容仅用于辅助理解本发明的技术方案,并不代表承认上述内容是现有技术。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求 的保护范围。
本发明实施例提供的技术方案如下:
一种RCS垃圾消息的监控方法,所述方法包括以下步骤:
获取RCS消息;
根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
优选地,所述获取RCS消息的步骤具体为:
接收服务器发送的RCS消息;或接收服务器发送的RCS消息保存路径信息,根据所述RCS消息保存路径信息读取所述RCS消息。
优选地,所述根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别的步骤包括:
根据所述RCS消息获取发送所述RCS消息的用户号码,并根据所述用户号码在数据库中预设的垃圾消息黑名单中进行查找;
若在所述垃圾消息黑名单中查找到所述用户号码,则将所述RCS消息识别为RCS垃圾消息;
若在所述垃圾消息黑名单中没有查找到所述用户号码,则根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别。
优选地,所述根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别的步骤具体为:
若所述RCS消息是文本消息,则根据所述RCS消息的内容提取RCS消息关键字,并将所述RCS消息关键字与数据库中预设的垃圾消息关键字进行比对,若所述RCS消息关键字与所述垃圾消息关键字匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息关键字与所述垃圾消息关键字不匹配,则识别所述RCS消息为RCS正常消息;
若所述RCS消息是非文本消息,则根据所述RCS消息的类型生成RCS特征识别码,并将所述RCS特征识别码与数据库中预设的垃圾消息特征识别 码进行比对,若所述RCS特征识别码与所述垃圾消息特征识别码匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息特征识别码与所述垃圾消息特征识别码不匹配,则识别所述RCS消息为RCS正常消息。
优选地,所述方法还包括:
统计预设时间内获取次数最多或超过预设获取次数的RCS消息,并进行显示。
此外,为实现上述目的,本发明还提供一种RCS垃圾消息的监控装置,所述装置包括:
获取模块,用于获取RCS消息;
识别模块,用于根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
优选地,所述获取模块具体用于:
接收服务器发送的RCS消息;或接收服务器发送的RCS消息保存路径信息,根据所述RCS消息保存路径信息读取所述RCS消息。
优选地,所述识别模块用于:
根据所述RCS消息获取发送所述RCS消息的用户号码,并根据所述用户号码在数据库中预设的垃圾消息黑名单中进行查找;
若在所述垃圾消息黑名单中查找到所述用户号码,则将所述RCS消息识别为RCS垃圾消息;
若在所述垃圾消息黑名单中没有查找到所述用户号码,则根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别。
优选地,所述识别模块还用于:
若所述RCS消息是文本消息,则根据所述RCS消息的内容提取RCS消息关键字,并将所述RCS消息关键字与数据库中预设的垃圾消息关键字进行比对,若所述RCS消息关键字与所述垃圾消息关键字匹配,则识别所述RCS 消息为RCS垃圾消息,若所述RCS消息关键字与所述垃圾消息关键字不匹配,则识别所述RCS消息为RCS正常消息;
若所述RCS消息是非文本消息,则根据所述RCS消息的类型生成RCS特征识别码,并将所述RCS特征识别码与数据库中预设的垃圾消息特征识别码进行比对,若所述RCS特征识别码与所述垃圾消息特征识别码匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息特征识别码与所述垃圾消息特征识别码不匹配,则识别所述RCS消息为RCS正常消息。
优选地,所述RCS垃圾消息的监控装置还包括:
统计模块,用于统计预设时间内获取次数最多或超过预设获取次数的RCS消息,并进行显示。
本发明又提出一种RCS垃圾消息的监控系统,所述系统包括:RCS垃圾消息监控装置及服务器,其中,
所述RCS垃圾消息监控装置,用于获取RCS消息;根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理;
所述服务器,用于发送RCS消息或RCS消息保存路径信息至所述RCS垃圾消息监控装置,接收所述RCS垃圾消息监控装置发送的识别结果,并根据所述识别结果对所述RCS消息进行相应的处理。
优选地,所述服务器还用于:
当识别所述RCS消息为RCS垃圾消息时,不下发所述RCS消息;
当识别所述RCS消息为RCS正常消息时,将所述RCS消息下发到客户端。
本发明提出的一种RCS垃圾消息的监控方法、装置及系统,通过将获取的RCS消息与预先在数据库中存储的垃圾消息的相关信息进行比对、识别,来将RCS正常消息与RCS垃圾消息进行区分,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理,从而实现对 RCS消息中垃圾消息的监控,达到限制垃圾消息传播的效果,保证正常的业务处理及用户的安全。
本发明的其它特征和优点将在随后的说明书中阐述,
附图概述
图1为本发明RCS垃圾消息的监控方法一实施例的流程示意图;
图2为本发明RCS垃圾消息的监控装置一实施例的功能模块示意图;
图3为本发明RCS垃圾消息的监控装置另一实施例的功能模块示意图;
图4为本发明RCS垃圾消息的监控系统一实施例的结构示意图。
本发明的较佳实施方式
为使本发明要解决的技术问题、技术方案和优点更加清楚,下面将结合附图及具体实施例进行详细描述。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
参照图1,图1为本发明RCS垃圾消息的监控方法一实施例的流程示意图,应用于RCS垃圾消息的监控装置,包括:
步骤S10,获取RCS消息;
本实施例中,获取RCS消息的方式有两种,当RCS消息较小时,可直接接收服务器发送的RCS消息;当RCS消息较大时,为了避免服务器直接发送RCS消息会占用其他业务的资源及造成性能的损耗,可先接收服务器发送的RCS消息保存路径信息,再根据所述RCS消息保存路径信息读取所述RCS消息。
步骤S20,根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
获取到RCS消息后,将所述RCS消息与数据库中预设的垃圾消息的相 关信息进行比对、识别。其中,数据库中预设的垃圾消息的相关信息可以是用户或管理员预先配置的与历史监控记录中垃圾消息相关的各种特征信息,如可以是反映发送垃圾消息的RCS用户名单的黑名单、反映垃圾消息内容的关键字、反映垃圾消息特征的识别码或垃圾消息携带的标识、垃圾消息的特殊类型等相关信息。将所述RCS消息与数据库中预设的垃圾消息的相关信息进行比对、识别,若所述RCS消息与预设的垃圾消息的各种特征信息相匹配,则可以识别该RCS消息为RCS垃圾消息,将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
本实施例通过将获取的RCS消息与预先在数据库中存储的垃圾消息的相关信息进行比对、识别,来将RCS正常消息与RCS垃圾消息进行区分,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理,从而实现对RCS消息中垃圾消息的监控,达到限制垃圾消息传播的效果,保证正常的业务处理及用户的安全。
进一步地,上述实施例中,监控装置根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别的步骤具体可以为以下方式:
首先根据所述RCS消息获取发送所述RCS消息的用户号码,所述RCS消息中通常都会携带有该RCS消息的发送方、接收方的信息。再根据所述用户号码在数据库中预设的垃圾消息黑名单中进行查找,该垃圾消息黑名单可以为用户或管理员根据监控记录或自身判断在数据库中进行预先配置的,当然,也可以根据用户或管理员指令实时的对该垃圾消息黑名单进行增加或删减。若在所述垃圾消息黑名单中查找到所述用户号码,则直接将所述RCS消息识别为RCS垃圾消息;若在所述垃圾消息黑名单中没有查找到所述用户号码,则说明该用户号码之前并没有发送垃圾消息的历史记录或并没有被用户设置在黑名单中,但仍不确定该用户号码本次发送的RCS消息是否为RCS垃圾消息,因此,需根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别。
先判断所述RCS消息的类型,RCS消息中通常都会根据其消息类型的不 同携带不同的标识,根据所述RCS消息携带的不同标识获知其消息类型。若判断所述RCS消息是文本消息,则根据所述RCS消息的内容提取RCS消息关键字,并将所述RCS消息关键字与数据库中预设的垃圾消息关键字进行比对。该垃圾消息关键字可以为用户或管理员根据监控记录或自身需求在数据库中进行预先配置的,若所述RCS消息关键字与所述垃圾消息关键字匹配,则说明该RCS消息的内容与预设的垃圾消息的内容相同,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息关键字与所述垃圾消息关键字不匹配,则识别所述RCS消息为RCS正常消息。
若判断所述RCS消息是非文本消息,则根据所述RCS消息的类型生成RCS特征识别码,本实施例中,生成RCS特征识别码的方法可以是通过调用对应的内容识别程序,并基于该RCS消息的消息类型来识别生成的。将所述RCS特征识别码与数据库中预设的垃圾消息特征识别码进行比对,若所述RCS特征识别码与所述垃圾消息特征识别码匹配,则说明该RCS消息的特征与预设的垃圾消息的特征相同,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息特征识别码与所述垃圾消息特征识别码不匹配,则识别所述RCS消息为RCS正常消息。
识别出获取的RCS消息为RCS垃圾消息或RCS正常消息后,将识别结果发送至服务器,以供服务器获知该RCS消息的实质信息,从而根据所述识别结果对所述RCS消息进行相应的处理,完成对每一RCS消息的监控,并为服务器提供有效信息,使其能根据该有效信息对RCS垃圾消息的传播进行限制。
在一种实施方式中,监控装置还可统计预设时间内获取次数最多或超过预设获取次数的RCS消息,并进行显示。由于一般情况下垃圾消息都有短时间内进行大量传播的特征,因此,可以统计预设时间内如单位时间内获取次数最多或超过预设获取次数的RCS消息,将其作为疑似垃圾消息以界面的形式进行显示,展现给用户或管理员,用户或管理员根据显示的该RCS消息进行审查判断其是否为垃圾消息,若是,则可在数据库中将其相关信息添加入垃圾消息黑名单、垃圾消息关键字、垃圾消息特征识别码中,以便下次识别时参照使用。
在另一种实施方式中,监控装置还可在检测到某一RCS用户发送的RCS垃圾消息数量超过预设次数时,认定该RCS用户为非法用户,需对其发送消息进行限制,则自动将该RCS用户添加入垃圾消息黑名单中,以使得后续在获取到该RCS用户的RCS消息时,直接根据垃圾消息黑名单识别其发送的RCS消息为RCS垃圾消息。
本发明实施例进一步提供一种RCS垃圾消息的监控装置。
需要说明的是,本实施例中,该RCS垃圾消息的监控装置可以单独部署,与服务器分开设置;该RCS垃圾消息监控装置也可以作为一功能模块直接部署在服务器上,在此不作限定。
参照图2,图2为本实施例RCS垃圾消息的监控装置一实施例的功能模块示意图。
在一实施例中,该RCS垃圾消息的监控装置包括:
获取模块01,用于获取RCS消息;
本实施例中,获取RCS消息的方式有两种,当RCS消息较小时,可直接接收服务器发送的RCS消息;当RCS消息较大时,为了避免服务器直接发送RCS消息会占用其他业务的资源及造成性能的损耗,可先接收服务器发送的RCS消息保存路径信息,再根据所述RCS消息保存路径信息读取所述RCS消息。
识别模块02,用于根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
获取到RCS消息后,将所述RCS消息与数据库中预设的垃圾消息的相关信息进行比对、识别。
其中,数据库中预设的垃圾消息的相关信息可以是用户或管理员预先配置的与历史监控记录中垃圾消息相关的各种特征信息,如可以是反映发送垃圾消息的RCS用户名单的黑名单、反映垃圾消息内容的关键字、反映垃圾消息特征的识别码或垃圾消息携带的标识、垃圾消息的特殊类型等相关信息。 将所述RCS消息与数据库中预设的垃圾消息的相关信息进行比对、识别,若所述RCS消息与预设的垃圾消息的各种特征信息相匹配,则可以识别该RCS消息为RCS垃圾消息,将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
本实施例通过将获取的RCS消息与预先在数据库中存储的垃圾消息的相关信息进行比对、识别,来将RCS正常消息与RCS垃圾消息进行区分,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理,从而实现对RCS消息中垃圾消息的监控,达到限制垃圾消息传播的效果,保证正常的业务处理及用户的安全。
进一步地,上述实施例中,识别模块02根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别具体可以为以下方式:
首先根据所述RCS消息获取发送所述RCS消息的用户号码,所述RCS消息中通常都会携带有该RCS消息的发送方、接收方的信息。再根据所述用户号码在数据库中预设的垃圾消息黑名单中进行查找,该垃圾消息黑名单可以为用户或管理员根据监控记录或自身判断在数据库中进行预先配置的,当然,也可以根据用户或管理员指令实时的对该垃圾消息黑名单进行增加或删减。若在所述垃圾消息黑名单中查找到所述用户号码,则直接将所述RCS消息识别为RCS垃圾消息;若在所述垃圾消息黑名单中没有查找到所述用户号码,则说明该用户号码之前并没有发送垃圾消息的历史记录或并没有被用户设置在黑名单中,但仍不确定该用户号码本次发送的RCS消息是否为RCS垃圾消息,因此,需根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别。
先判断所述RCS消息的类型,RCS消息中通常都会根据其消息类型的不同携带不同的标识,根据所述RCS消息携带的不同标识获知其消息类型。若判断所述RCS消息是文本消息,则根据所述RCS消息的内容提取RCS消息关键字,并将所述RCS消息关键字与数据库中预设的垃圾消息关键字进行比对。该垃圾消息关键字可以为用户或管理员根据监控记录或自身需求在数据 库中进行预先配置的,若所述RCS消息关键字与所述垃圾消息关键字匹配,则说明该RCS消息的内容与预设的垃圾消息的内容相同,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息关键字与所述垃圾消息关键字不匹配,则识别所述RCS消息为RCS正常消息。
若判断所述RCS消息是非文本消息,则根据所述RCS消息的类型生成RCS特征识别码,本实施例中,生成RCS特征识别码的方法可以是通过调用对应的内容识别程序,并基于该RCS消息的消息类型来识别生成的。将所述RCS特征识别码与数据库中预设的垃圾消息特征识别码进行比对,若所述RCS特征识别码与所述垃圾消息特征识别码匹配,则说明该RCS消息的特征与预设的垃圾消息的特征相同,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息特征识别码与所述垃圾消息特征识别码不匹配,则识别所述RCS消息为RCS正常消息。
识别出获取的RCS消息为RCS垃圾消息或RCS正常消息后,将识别结果发送至服务器,以供服务器获知该RCS消息的实质信息,从而根据所述识别结果对所述RCS消息进行相应的处理,完成对每一RCS消息的监控,并为服务器提供有效信息,使其能根据该有效信息对RCS垃圾消息的传播进行限制。
参照图3,图3为本发明RCS垃圾消息的监控装置另一实施例的功能模块示意图。
在另一实施例中,该RCS垃圾消息的监控装置包括上述实施例中的获取模块01和识别模块02,还包括:
统计模块03,用于统计预设时间内获取次数最多或超过预设获取次数的RCS消息,并进行显示。
由于一般情况下垃圾消息都有短时间内进行大量传播的特征,因此,可以统计预设时间内如单位时间内获取次数最多或超过预设获取次数的RCS消息,将其作为疑似垃圾消息以界面的形式进行显示,展现给用户或管理员,用户或管理员根据显示的该RCS消息进行审查判断其是否为垃圾消息,若是, 则可在数据库中将其相关信息添加入垃圾消息黑名单、垃圾消息关键字、垃圾消息特征识别码中,以便下次识别时参照使用。
统计模块03还可在检测到某一RCS用户发送的RCS垃圾消息数量超过预设次数时,认定该RCS用户为非法用户,需对其发送消息进行限制,则自动将该RCS用户添加入垃圾消息黑名单中,以使得后续在获取到该RCS用户的RCS消息时,直接根据垃圾消息黑名单识别其发送的RCS消息为RCS垃圾消息。
如图4所示,图4是本发明RCS垃圾消息的监控系统一实施例的结构示意图。
在该实施例中,该RCS垃圾消息的监控系统包括:RCS垃圾消息监控装置04及服务器05,其中,
所述RCS垃圾消息监控装置04,用于获取RCS消息;根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器05,以供服务器05根据所述识别结果对所述RCS消息进行相应的处理;
所述服务器05,用于发送RCS消息或RCS消息保存路径信息至所述RCS垃圾消息监控装置04,接收所述RCS垃圾消息监控装置04发送的识别结果,并根据所述识别结果对所述RCS消息进行相应的处理。
需要说明的是,本实施例中,该RCS垃圾消息的监控系统的RCS垃圾消息监控装置04可以单独部署,与服务器05分开设置;该RCS垃圾消息监控装置04也可以作为一功能模块直接部署在服务器05上,在此不作限定。
本实施例中,所述RCS垃圾消息监控装置04,用于获取RCS消息;将所述RCS消息与数据库中预设的垃圾消息的相关信息进行比对、识别,并将识别结果发送至服务器05,以供服务器05根据所述识别结果对所述RCS消息进行相应的处理;具体的,所述RCS垃圾消息监控装置04获取、识别所述RCS消息的过程如上所述,在此不再赘述。
其中,服务器05获取所述RCS垃圾消息监控装置04发送的识别结果后,根据该识别结果来判断是否将所述RCS消息进行下发。当识别结果为所述 RCS消息是RCS垃圾消息时,则需限制该RCS消息的传播,不对所述RCS消息进行下发,以避免客户端接收到RCS垃圾消息;当识别结果为所述RCS消息是RCS正常消息时,则将所述RCS消息下发到客户端,以保证正常业务流程的进行。
本实施例通过将获取的RCS消息与预先在数据库中存储的垃圾消息的相关信息进行比对、识别,来将RCS正常消息与RCS垃圾消息进行区分,并将识别结果发送至服务器05,由服务器05根据所述识别结果对所述RCS消息进行相应的处理,从而实现对RCS消息中垃圾消息的监控,达到限制垃圾消息传播的效果,保证正常的业务处理及用户的安全,为用户创造纯净安全的RCS通信环境。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
工业实用性
上述方案通过获取RCS消息;根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。实现了对RCS消息中垃圾消息的监控,达到限制垃圾消息传播的效果,保证正常的业务处理及用户的安全。具有很强的工业实用性。

Claims (13)

  1. 一种RCS垃圾消息的监控方法,包括:
    获取RCS消息;
    根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
  2. 如权利要求1所述的RCS垃圾消息的监控方法,其中:
    所述获取RCS消息,包括:
    接收服务器发送的RCS消息;或接收服务器发送的RCS消息保存路径信息,根据所述RCS消息保存路径信息读取所述RCS消息。
  3. 如权利要求1或2所述的RCS垃圾消息的监控方法,其中:
    所述根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,包括:
    根据所述RCS消息获取发送所述RCS消息的用户号码,并根据所述用户号码在数据库中预设的垃圾消息黑名单中进行查找;
    若在所述垃圾消息黑名单中查找到所述用户号码,则将所述RCS消息识别为RCS垃圾消息;
    若在所述垃圾消息黑名单中没有查找到所述用户号码,则根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别。
  4. 如权利要求3所述的RCS垃圾消息的监控方法,其中:
    所述根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别,包括:
    若所述RCS消息是文本消息,则根据所述RCS消息的内容提取RCS消息关键字,并将所述RCS消息关键字与数据库中预设的垃圾消息关键字进行比对,若所述RCS消息关键字与所述垃圾消息关键字匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息关键字与所述垃圾消息关键字不匹配,则识别所述RCS消息为RCS正常消息;
    若所述RCS消息是非文本消息,则根据所述RCS消息的类型生成RCS特征识别码,并将所述RCS特征识别码与数据库中预设的垃圾消息特征识别码进行比对,若所述RCS特征识别码与所述垃圾消息特征识别码匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息特征识别码与所述垃圾消息特征识别码不匹配,则识别所述RCS消息为RCS正常消息。
  5. 如权利要求3所述的RCS垃圾消息的监控方法,其中:
    所述方法还包括:统计预设时间内获取次数最多或超过预设获取次数的RCS消息,并进行显示。
  6. 一种RCS垃圾消息的监控装置,其特征在于,所述装置包括:
    获取模块,用于获取RCS消息;
    识别模块,用于根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理。
  7. 如权利要求6所述的RCS垃圾消息的监控装置,其中:
    所述获取模块获取RCS消息,包括:
    接收服务器发送的RCS消息;或接收服务器发送的RCS消息保存路径信息,根据所述RCS消息保存路径信息读取所述RCS消息。
  8. 如权利要求6或7所述的RCS垃圾消息的监控装置,其中:
    所述识别模块根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,包括:
    根据所述RCS消息获取发送所述RCS消息的用户号码,并根据所述用户号码在数据库中预设的垃圾消息黑名单中进行查找;
    若在所述垃圾消息黑名单中查找到所述用户号码,则将所述RCS消息识别为RCS垃圾消息;
    若在所述垃圾消息黑名单中没有查找到所述用户号码,则根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别。
  9. 如权利要求8所述的RCS垃圾消息的监控装置,其中:
    所述识别模块根据所述RCS消息的类型采用对应的垃圾消息识别方法对所述RCS消息进行识别,包括:
    若所述RCS消息是文本消息,则根据所述RCS消息的内容提取RCS消息关键字,并将所述RCS消息关键字与数据库中预设的垃圾消息关键字进行比对,若所述RCS消息关键字与所述垃圾消息关键字匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息关键字与所述垃圾消息关键字不匹配,则识别所述RCS消息为RCS正常消息;
    若所述RCS消息是非文本消息,则根据所述RCS消息的类型生成RCS特征识别码,并将所述RCS特征识别码与数据库中预设的垃圾消息特征识别码进行比对,若所述RCS特征识别码与所述垃圾消息特征识别码匹配,则识别所述RCS消息为RCS垃圾消息,若所述RCS消息特征识别码与所述垃圾消息特征识别码不匹配,则识别所述RCS消息为RCS正常消息。
  10. 如权利要求8所述的RCS垃圾消息的监控装置,其中:
    所述RCS垃圾消息的监控装置还包括:
    统计模块,用于统计预设时间内获取次数最多或超过预设获取次数的RCS消息,并进行显示。
  11. 一种RCS垃圾消息的监控系统,其特征在于,包括:RCS垃圾消息监控装置及服务器,其中,
    所述RCS垃圾消息监控装置,用于获取RCS消息;根据数据库中预设的垃圾消息的相关信息对所述RCS消息进行识别,并将识别结果发送至服务器,以供服务器根据所述识别结果对所述RCS消息进行相应的处理;
    所述服务器,用于发送RCS消息或RCS消息保存路径信息至所述RCS垃圾消息监控装置,接收所述RCS垃圾消息监控装置发送的识别结果,并根据所述识别结果对所述RCS消息进行相应的处理。
  12. 根据权利要求11所述的系统,其中:
    所述服务器还用于:当识别所述RCS消息为RCS垃圾消息时,不下发所述RCS消息;及,当识别所述RCS消息为RCS正常消息时,将所述RCS消息下发到客户端。
  13. 根据权利要求11或12所述的系统,其中:
    所述RCS垃圾消息监控装置采用如权利要求6-10中任一所述的RCS垃圾消息的监控装置。
PCT/CN2015/078890 2014-09-10 2015-05-13 Rcs垃圾消息的监控方法、装置及系统 WO2016037489A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410459686.0 2014-09-10
CN201410459686.0A CN105430623A (zh) 2014-09-10 2014-09-10 Rcs垃圾消息的监控方法、装置及系统

Publications (1)

Publication Number Publication Date
WO2016037489A1 true WO2016037489A1 (zh) 2016-03-17

Family

ID=55458324

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/078890 WO2016037489A1 (zh) 2014-09-10 2015-05-13 Rcs垃圾消息的监控方法、装置及系统

Country Status (2)

Country Link
CN (1) CN105430623A (zh)
WO (1) WO2016037489A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113300939A (zh) * 2021-04-26 2021-08-24 国家计算机网络与信息安全管理中心 即时通讯软件交互机器人的开发方法

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110677251B (zh) * 2018-07-03 2022-09-16 中移(杭州)信息技术有限公司 一种信息处理方法、装置、介质和设备
CN113067765B (zh) * 2020-01-02 2023-01-13 中国移动通信有限公司研究院 一种多媒体消息监控方法、装置及设备
CN114095882A (zh) * 2021-12-06 2022-02-25 联通在线信息科技有限公司 一种5g消息内容检测方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101534261A (zh) * 2009-04-10 2009-09-16 阿里巴巴集团控股有限公司 一种垃圾消息的识别方法、装置和系统
CN101668256A (zh) * 2008-09-01 2010-03-10 中兴通讯股份有限公司 垃圾彩信监控方法和装置
CN102075883A (zh) * 2011-03-10 2011-05-25 成都四方信息技术有限公司 基于模型组合的垃圾彩信消息监控方法
US8387141B1 (en) * 2011-09-27 2013-02-26 Green Head LLC Smartphone security system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101668256A (zh) * 2008-09-01 2010-03-10 中兴通讯股份有限公司 垃圾彩信监控方法和装置
CN101534261A (zh) * 2009-04-10 2009-09-16 阿里巴巴集团控股有限公司 一种垃圾消息的识别方法、装置和系统
CN102075883A (zh) * 2011-03-10 2011-05-25 成都四方信息技术有限公司 基于模型组合的垃圾彩信消息监控方法
US8387141B1 (en) * 2011-09-27 2013-02-26 Green Head LLC Smartphone security system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113300939A (zh) * 2021-04-26 2021-08-24 国家计算机网络与信息安全管理中心 即时通讯软件交互机器人的开发方法

Also Published As

Publication number Publication date
CN105430623A (zh) 2016-03-23

Similar Documents

Publication Publication Date Title
US10423958B2 (en) Method, apparatus and system for voice verification
US10607016B2 (en) Decrypting files for data leakage protection in an enterprise network
US9106603B2 (en) Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content
US8131278B2 (en) Method, apparatus, and computer program product for application-based communications
US11537751B2 (en) Using machine learning algorithm to ascertain network devices used with anonymous identifiers
CN106470150B (zh) 关系链存储方法及装置
WO2016037489A1 (zh) Rcs垃圾消息的监控方法、装置及系统
WO2016010921A1 (en) Creating a user group
US20140378104A1 (en) Method and device for processing short messages
CN112769636B (zh) 视频短信链路监测方法、装置、电子设备及存储介质
US8806002B2 (en) P2P activity detection and management
CA2911989A1 (en) Method, system and apparatus for dectecting instant message spam
WO2017066811A2 (en) Third-party documented trust linkages for email streams
WO2015154416A1 (zh) 一种上网行为管理方法及装置
Riadi et al. Examination of digital evidence on android-based line messenger
CN109495350B (zh) 局数据的核查方法、装置和存储介质
US11599673B2 (en) Ascertaining network devices used with anonymous identifiers
CN114390452B (zh) 消息发送方法及相关设备
CN108737350B (zh) 一种信息处理方法及客户端
US11363020B2 (en) Method, device and storage medium for forwarding messages
CN106649343B (zh) 一种网络数据信息处理方法及设备
WO2015054993A1 (zh) 垃圾信息处理方法及装置
CN101686223A (zh) 一种内容过滤的反馈方法和装置
CN108075932B (zh) 一种数据监控方法和装置
CN106572462B (zh) 一种告警信息发送方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15840341

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15840341

Country of ref document: EP

Kind code of ref document: A1