WO2016095505A1 - Procédé et système de surveillance de message - Google Patents
Procédé et système de surveillance de message Download PDFInfo
- Publication number
- WO2016095505A1 WO2016095505A1 PCT/CN2015/083680 CN2015083680W WO2016095505A1 WO 2016095505 A1 WO2016095505 A1 WO 2016095505A1 CN 2015083680 W CN2015083680 W CN 2015083680W WO 2016095505 A1 WO2016095505 A1 WO 2016095505A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- user
- guardian
- mobile phone
- server
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/226—Delivery according to priorities
Definitions
- the present invention relates to the field of information management, and more particularly to a message monitoring method and system.
- the embodiment of the present invention provides a message monitoring method and system.
- an embodiment of the present invention provides a message monitoring method, where the method includes:
- the server performs text monitoring on the message received by the user
- the server sends a warning message to the user or the preset guardian according to the judgment result that the message meets the alarm condition, and the warning information includes a report entry that enables the user or the guardian to perform an alarm.
- an embodiment of the present invention further provides a message monitoring system, where the system includes:
- the monitoring module is configured to perform text monitoring on the message received by the user by the server;
- a determining module configured to determine whether the message meets an alarm condition
- a warning module configured to send, by the server, a warning message to the user or the preset guardian according to the judgment result that the message meets the alarm condition, where the warning information includes a report entry;
- a reporting module for the user or the guardian to be alerted via the reporting portal A reporting module for the user or the guardian to be alerted via the reporting portal.
- the message received by the user can be monitored, and the user can be notified in time and provide a quick report entry to the user, thereby achieving the purpose of preventing fraud, avoiding user property loss and quickly reporting. .
- FIG. 1 is a flow chart of a message monitoring method according to an embodiment of the present invention.
- FIG. 2 shows a specific flow chart of step S1 of the method shown in Figure 1;
- Figure 3 shows a specific flow chart of step S2 and step S3 of the method shown in Figure 1;
- FIG 4 shows another flow chart of step S3 of the method shown in Figure 1;
- FIG. 5 shows a specific flow chart of step S32 of the method shown in Figure 4;
- FIG. 6 is a block diagram of a message monitoring system in accordance with an embodiment of the present invention.
- FIG. 7 shows a block diagram of the monitoring module 100 shown in Figure 6;
- FIG. 8 is a block diagram showing the determination module 200 shown in FIG. 6;
- FIG. 9 is a block diagram showing the report module 400 shown in FIG. 6;
- FIG. 10 shows a block diagram of the forensic unit 420 shown in FIG. 6.
- FIG. 1 is a flowchart of a message monitoring method according to an embodiment of the present invention. referring to FIG. 1, the method include:
- S1 The server performs text monitoring on the message received by the user
- the server sends a warning message to the user or the preset guardian according to the judgment result that the message meets the alarm condition, and the warning information includes a report that enables the user or the guardian to perform an alarm. Entrance.
- the message received by the user can be monitored, and the user can be notified in time and provide a quick report entry to the user, thereby achieving the purpose of preventing fraud, avoiding user property loss and quickly reporting.
- FIG. 2 shows a specific flow chart of step S1 of the method shown in FIG. 1; referring to FIG. 2, the step S1 includes:
- the server identifies text information in a message received by the user.
- the above method can monitor the message text of the user instant messaging software (such as QQ, WeChat, Fetion, etc.) in real time. All messages in the communication are received or forwarded by the server.
- the server receives the relevant techniques in natural language processing, performs lexical analysis and syntax analysis, and matches the sensitive thesaurus in the server one by one to monitor whether there is “recharge”. Sensitive words such as “bank card”, “remittance”, and “buy” (including statements or vocabulary containing the semantics of money). Through the semantic analysis of the text, it is judged whether there are words related to common fraud reasons such as borrowing money.
- the server If the server identifies the scam-related vocabulary or semantics, it will also send instructions to the client (QQ, WeChat, etc.) by letting the client pop up the window or attach text. Send a reminder message to the user who receives the message, for example, "in case of money and other issues, it is recommended that the phone and the person confirm it to prevent fraud" to improve the user's awareness of prevention.
- FIG. 3 shows a specific flowchart of steps S2 and S3 of the method shown in FIG. 1; referring to FIG. 3, the steps S2 and S3 include:
- the step also counts that the same source (including the stolen number) sends the same or within a certain period of time (for example, one day) The number of similar messages, thereby determining whether the message belongs to a group message, and the criterion for determining the number of times can be set by the user.
- the traditional way of judging can prevent the fraudster from bypassing the behavior of the group sending category by means of striping, time division and text changing, and the present invention
- the way of judging can more comprehensively and accurately determine whether the message is a group.
- S22 Determine whether the location where the suspected fraud message is sent is consistent with the current location of the user. If not, the judgment result is that the message meets an alarm condition. If the server determines that the location where the message is sent is not a common location, the client will be prompted to receive the message, and the source of the message is not the usual location. Since the probability of currently sending SMS frauds from a different place is relatively high, the user can be alerted to messages from different places by judging the location of the transmitted message.
- the server sends a warning message to the user or the preset guardian of the user.
- the preset guardian of the user may be a contact preset by the user (for example, a relative and close relationship with the user), and the user and/or the guardian receives the warning when the user receives the message that meets the alarm condition. information.
- the user can also choose to turn off the guardian's setting function, and not send a warning message to the guardian to avoid disturbing the guardian at certain times.
- the warning information includes a report entry (ie, an alarm call and a web address, etc.), which enables the user to report the alarm more conveniently and promptly through the report entry.
- a report entry ie, an alarm call and a web address, etc.
- FIG 4 shows another flow chart of step S3 of the method shown in Figure 1; see Figure 4, the step S3 includes:
- the guardian obtains the suspect information link by receiving the warning message, and sends the suspect information to the server. request;
- the server After receiving the request, the server acquires and forwards information to the guardian with the location of the suspected person and the stolen mobile phone.
- the above steps are directed to the case where the user's mobile phone is stolen.
- a website for opening the mobile phone monitoring is provided. After clicking the website, the user will send a message to the server to open the monitoring, and the server will issue an instruction to the stolen mobile phone and be stolen.
- the mobile client will open the camera implicitly (the camera can't see the camera on), relying on face recognition technology, once the camera recognizes the face, it will take a screenshot or shoot. Photo and send the photo with the suspect's avatar and the phone's GPS coordinates to the server. It is then sent to the guardian number in the form of a multimedia message to facilitate the monitoring personnel to provide valid evidence.
- FIG. 5 shows a specific flowchart of step S32 of the method shown in FIG. 4; referring to FIG. 5, the step S32 includes:
- the server sends an instruction to the stolen mobile phone, so that the stolen mobile phone turns on the camera and GPS positioning;
- the opened camera acquires a photo with a suspected portrait by a face recognition technology, and acquires location information of the stolen mobile phone by using the GPS positioning;
- the information of the stolen mobile phone suspect can be concealed and accurately obtained, and valid evidence for the follow-up alarm of the user or guardian is provided.
- FIG. 6 is an architectural diagram of a message monitoring system 1 according to an embodiment of the present invention. referring to FIG. 6, the system 1 includes:
- the monitoring module 100 is configured to perform text monitoring on the message received by the user by the server;
- the determining module 200 is configured to determine whether the message meets an alarm condition
- the warning module 300 is configured to send, by the server, a warning message to the user or the preset guardian according to the judgment result that the message meets the alarm condition, where the warning information includes a report entry;
- the reporting module 400 is configured to enable the user or the guardian to make an alarm through the reporting portal.
- the message received by the user can be monitored, and the user can be notified in time and provide a quick report entry to the user, thereby achieving the purpose of preventing fraud, avoiding user property loss and quickly reporting.
- FIG. 7 shows a block diagram of the monitoring module 100 shown in FIG. 6; referring to FIG. 7, the monitoring module 100 includes:
- a text identification unit 110 configured to identify text information in a message received by the user
- the sensitive word determining unit 120 is configured to determine whether the message contains a sensitive word
- the reminder sending unit 130 is configured to send reminder information to the user and the guardian when determining that the sensitive word is included in the message.
- the monitoring module 100 can be used to monitor user instant messaging software (such as QQ, WeChat, and fly) in real time.
- the server receives the relevant techniques in natural language processing, performs lexical analysis and syntax analysis, and matches the sensitive thesaurus in the server one by one to monitor whether there is “recharge”. Sensitive words such as “bank card”, “remittance”, and “buy” (including statements or vocabulary containing the semantics of money). Through the semantic analysis of the text, it is judged whether there are words related to common fraud reasons such as borrowing money.
- the server If the server identifies the scam-related vocabulary or semantics, it will also send instructions to the client (QQ, WeChat, etc.) by letting the client pop up the window or attach text. Send a reminder message to the user who receives the message, for example, "in case of money and other issues, it is recommended that the phone and the person confirm it to prevent fraud" to improve the user's awareness of prevention.
- FIG. 8 is a block diagram of the determination module 200 shown in FIG. 6; referring to FIG. 8, the determination module 200 includes:
- the group sending determining unit 210 is configured to count the number of the suspected fraud messages sent in the same time period. If the number exceeds a predefined threshold, the determining result is that the message meets an alarm condition.
- the group sending determining unit 210 may count the number of times the same source (including the stolen number) sends the same or similar message within a certain period of time (for example, one day), thereby determining whether the message belongs to the group sending message, and the criterion for determining the number of times. Can be set by the user.
- the traditional way of judging can prevent the fraudster from bypassing the behavior of the group sending category by means of striping, time division and text changing, and the present invention
- the way of judging can more comprehensively and accurately determine whether the message is a group.
- the location determining unit 220 is configured to determine whether the location where the suspected fraud message is sent is consistent with the frequent location of the user. If not, the determination result is that the message meets an alarm condition. If the server determines that the location where the message is sent is not a common location, the client will be prompted to receive the message, and the source of the message is not the usual location. Since the probability of currently sending SMS frauds from a different place is relatively high, the user can be alerted to messages from different places by judging the location of the transmitted message.
- FIG. 9 is a block diagram of the report module 400 shown in FIG. 6; referring to FIG. 9, the report module 400 includes:
- the reporting unit 410 is configured to enable the user or the guardian to perform an alarm by using the report entry included in the warning information, wherein the report entry included in the warning message (ie, an alarm call, a website address, etc.) is used. It can make the user more convenient and timely alarm through the report entrance.
- the report entry included in the warning message ie, an alarm call, a website address, etc.
- the forensing unit 420 is configured to: when the user's mobile phone is stolen, and the suspect sends the message that meets the alarm condition by using the mobile phone, the guardian obtains the suspect information link by receiving the warning message, and sends the message to the server. Sending a request for obtaining a suspect information; after receiving the request, the server acquires and forwards information to the guardian with the location of the suspected person and the stolen mobile phone.
- a website for monitoring the mobile phone can be provided in the short message received by the guardian, and the user will send a message to the server to open the monitoring after the user clicks the website, and the server will send the message to the stolen mobile phone.
- the stolen mobile client will open the camera implicitly (the mobile phone screen can not see the camera open), rely on face recognition technology, once the camera recognizes the face success, it will take a screenshot or take a photo, and send the suspect with the server Photo of the avatar and GPS coordinates of the phone. It is then sent to the guardian number in the form of a multimedia message to facilitate the monitoring personnel to provide valid evidence.
- FIG. 10 shows a block diagram of the forensic unit 420 shown in FIG. 6.
- the forensic unit 420 includes:
- the instruction subunit 421 is configured to send, by the server, an instruction to the stolen mobile phone, so that the stolen mobile phone turns on the camera and GPS positioning;
- the forensic sub-unit 422 is configured to obtain a photo with a suspected portrait by the face recognition technology, and obtain the location information of the stolen mobile phone by using the GPS positioning;
- the forwarding subunit 423 forwards the photo with the suspect portrait and the location information of the stolen mobile phone to the guardian.
- the forensic unit 420 can conceal and accurately collect the information of the stolen mobile phone suspect, and provide valid evidence for the subsequent alarm of the user or the guardian.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
L'invention concerne un procédé et un système de surveillance de message. Le procédé comprend les étapes suivantes : un serveur effectue une surveillance de texte sur un message reçu par un utilisateur ; il détermine si le message satisfait à des conditions d'alarme ; puis le serveur envoie des informations d'alarme à l'utilisateur ou à un tuteur prédéfini par l'utilisateur en fonction d'un résultat de la détermination disant que le message satisfait aux conditions d'alarme, les informations d'alarme contenant une entrée de rapport permettant à l'utilisateur ou au tuteur de donner une alarme. Au moyen de la présente invention, un message reçu par un utilisateur peut être surveillé, l'utilisateur est averti en temps opportun, et une entrée de rapport rapide est fournie à l'utilisateur, de sorte que les objectifs de prévention des fraudes, de protection contre les pertes de propriété d'utilisateur et d'émission rapide des rapports sont atteints.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410787819.7A CN104506382A (zh) | 2014-12-17 | 2014-12-17 | 消息监控方法及系统 |
CN201410787819.7 | 2014-12-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016095505A1 true WO2016095505A1 (fr) | 2016-06-23 |
Family
ID=52948097
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/083680 WO2016095505A1 (fr) | 2014-12-17 | 2015-07-09 | Procédé et système de surveillance de message |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104506382A (fr) |
WO (1) | WO2016095505A1 (fr) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104506382A (zh) * | 2014-12-17 | 2015-04-08 | 百度在线网络技术(北京)有限公司 | 消息监控方法及系统 |
CN108123867B (zh) * | 2015-04-30 | 2021-02-19 | Oppo广东移动通信有限公司 | 消息交互方法和相关装置及通信系统 |
CN104967553B (zh) * | 2015-04-30 | 2018-03-02 | 广东欧珀移动通信有限公司 | 消息交互方法和相关装置及通信系统 |
CN106657867B (zh) * | 2015-08-12 | 2019-08-06 | 杭州海康威视数字技术股份有限公司 | 基于视频监控系统的移动终端报警方法及其装置 |
CN105282012A (zh) * | 2015-10-23 | 2016-01-27 | 广东小天才科技有限公司 | 一种在群聊天时强化信息提醒的方法及系统 |
CN106850391B (zh) * | 2015-12-07 | 2020-07-14 | 天维尔信息科技股份有限公司 | 基于互联网的报警处置方法和系统 |
WO2018023339A1 (fr) * | 2016-08-01 | 2018-02-08 | Motorola Solutions, Inc. | Systèmes et procédés de fourniture d'une aide à la décision à des premiers intervenants |
CN106934022A (zh) * | 2017-03-13 | 2017-07-07 | 深圳天珑无线科技有限公司 | 终端控制方法及装置 |
CN107135231A (zh) * | 2017-06-20 | 2017-09-05 | 上海传英信息技术有限公司 | 一种基于智能终端的预警方法及系统 |
CN108418809B (zh) * | 2018-02-07 | 2020-09-18 | 平安科技(深圳)有限公司 | 聊天数据处理方法、装置、计算机设备及存储介质 |
CN108737258A (zh) * | 2018-07-02 | 2018-11-02 | 清远网博信息技术有限公司 | 旅行社交在线互动系统及方法 |
CN109508435A (zh) * | 2018-10-26 | 2019-03-22 | 张派瑞 | 一种反网络欺凌方法 |
CN110247839A (zh) * | 2019-05-29 | 2019-09-17 | 中国联合网络通信集团有限公司 | 一种消息提醒方法及装置 |
CN111245799B (zh) * | 2020-01-02 | 2022-01-11 | 腾讯科技(深圳)有限公司 | 一种信息监控方法、装置及可读存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101534261A (zh) * | 2009-04-10 | 2009-09-16 | 阿里巴巴集团控股有限公司 | 一种垃圾消息的识别方法、装置和系统 |
US20090247122A1 (en) * | 2008-04-01 | 2009-10-01 | William Fitzgerald | System for monitoring the unauthorized use of a device |
CN102547709A (zh) * | 2010-12-23 | 2012-07-04 | 康佳集团股份有限公司 | 一种诈骗短信的确认方法及手机 |
CN103347131A (zh) * | 2013-07-05 | 2013-10-09 | 张�林 | 一种智能手机防盗方法及系统 |
CN103369486A (zh) * | 2013-08-01 | 2013-10-23 | 上海粱江通信系统股份有限公司 | 诈骗短信防范系统与防范方法 |
CN104506382A (zh) * | 2014-12-17 | 2015-04-08 | 百度在线网络技术(北京)有限公司 | 消息监控方法及系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101472247A (zh) * | 2007-12-28 | 2009-07-01 | 中国移动通信集团公司 | 一种控制垃圾短信的方法和系统 |
CN102006569A (zh) * | 2009-09-03 | 2011-04-06 | 北京中交兴路信息科技有限公司 | 基于无线数据传输的信息过滤装置及方法 |
CN103856944A (zh) * | 2012-12-03 | 2014-06-11 | 上海粱江通信系统股份有限公司 | 一种结合数字特征和发送频次识别诈骗短信的方法 |
-
2014
- 2014-12-17 CN CN201410787819.7A patent/CN104506382A/zh active Pending
-
2015
- 2015-07-09 WO PCT/CN2015/083680 patent/WO2016095505A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090247122A1 (en) * | 2008-04-01 | 2009-10-01 | William Fitzgerald | System for monitoring the unauthorized use of a device |
CN101534261A (zh) * | 2009-04-10 | 2009-09-16 | 阿里巴巴集团控股有限公司 | 一种垃圾消息的识别方法、装置和系统 |
CN102547709A (zh) * | 2010-12-23 | 2012-07-04 | 康佳集团股份有限公司 | 一种诈骗短信的确认方法及手机 |
CN103347131A (zh) * | 2013-07-05 | 2013-10-09 | 张�林 | 一种智能手机防盗方法及系统 |
CN103369486A (zh) * | 2013-08-01 | 2013-10-23 | 上海粱江通信系统股份有限公司 | 诈骗短信防范系统与防范方法 |
CN104506382A (zh) * | 2014-12-17 | 2015-04-08 | 百度在线网络技术(北京)有限公司 | 消息监控方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
CN104506382A (zh) | 2015-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016095505A1 (fr) | Procédé et système de surveillance de message | |
US10810510B2 (en) | Conversation and context aware fraud and abuse prevention agent | |
US10447838B2 (en) | Telephone fraud management system and method | |
US9763100B2 (en) | Instant messaging message processing method and device and storage medium | |
WO2015070823A1 (fr) | Procédé et système de protection intelligente de numéro de terminal mobile | |
WO2015188739A1 (fr) | Procédé et appareil de traitement de message | |
US20100138297A1 (en) | Api for auxiliary interface | |
WO2017148095A1 (fr) | Procédé et système d'affichage de messages courts pour terminal mobile | |
US10728185B2 (en) | Automatic communication failure recovery systems | |
US20100134275A1 (en) | Invocation of system services through auxiliary interface | |
US20100114750A1 (en) | Communication device and method for securing an internet bank account | |
CN106341313A (zh) | 获取账单信息的方法及装置 | |
US20140370838A1 (en) | System and method for preventing abuse of emergency calls placed using smartphone | |
CN111243224A (zh) | 一种实现报警的方法及装置 | |
US20160188904A1 (en) | Method and system of privacy protection in antagonistic social milieu/dark privacy spots | |
WO2017128545A1 (fr) | Procédé et appareil de notification de message | |
TWI711319B (zh) | 基於區塊鏈的智慧報警方法及裝置、電子設備 | |
US10430612B2 (en) | Electronic preemptive evidentiary escrow platform | |
US20240179241A1 (en) | System and method for fraud and abuse detection | |
US20200201489A1 (en) | Trusted device identification and event monitoring | |
KR102198333B1 (ko) | 보이스 피싱 방지 어플리케이션, 이를 포함하는 피싱 감시 시스템 및 방법 | |
US10750346B1 (en) | Emergency incident detection platform | |
US8195127B1 (en) | Systems and methods for protecting emails | |
US20220329763A1 (en) | Systems and Methods for Obtaining and Disseminating a Live Feed in an Emergency Situation | |
CA3053056A1 (fr) | Procedes et dispositifs de machines de transaction automatique de reconnaissance d`environnement |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15869016 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15869016 Country of ref document: EP Kind code of ref document: A1 |