WO2017215553A1 - 一种短消息监控方法、装置和监控中心 - Google Patents

一种短消息监控方法、装置和监控中心 Download PDF

Info

Publication number
WO2017215553A1
WO2017215553A1 PCT/CN2017/087903 CN2017087903W WO2017215553A1 WO 2017215553 A1 WO2017215553 A1 WO 2017215553A1 CN 2017087903 W CN2017087903 W CN 2017087903W WO 2017215553 A1 WO2017215553 A1 WO 2017215553A1
Authority
WO
WIPO (PCT)
Prior art keywords
short message
short
messages
same type
audited
Prior art date
Application number
PCT/CN2017/087903
Other languages
English (en)
French (fr)
Inventor
庞磊
李学领
叶兵
王飞
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017215553A1 publication Critical patent/WO2017215553A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a short message monitoring method, apparatus, and monitoring center.
  • the garbage short message monitoring system mainly detects the illegal users according to a large number of monitored short messages, thereby restricting or prohibiting them from sending short messages.
  • the garbage short message monitoring system used in the related art generally determines whether the amount of the message sent by the user in a certain period of time reaches a preset threshold based on the monitoring rule, and if so, the user is considered to be in violation, thereby limiting the illegal user to send the short message.
  • the behavior of the message In order to avoid false monitoring, the preset threshold is usually not set too low.
  • Many spammers use this feature of the monitoring system to use SMS modems or mass-sending software to control multiple terminals to send multiple SMS cards (Subscriber Identification Modules) to send spam messages, but the number of single cards sent in a certain period of time. Control is in a lower range to evade monitoring of the system. That is to say, the existing system monitors the behavior of single users, and does not consider the global content of the short message content and the calling behavior, and cannot effectively monitor the low frequency transmission behavior of the multi-card.
  • the short message monitoring system in the prior art only determines the violation short message according to the amount of messages sent by the user within a certain time, and the determination condition is single, and the determination of the violation short message is inaccurate, and the multi-card cannot be performed.
  • the problem of effective monitoring of low frequency transmission behavior is only determined.
  • the embodiment of the invention provides a short message monitoring method, device and monitoring center, which mainly solves the problem that the short message monitoring system in the prior art has an inaccurate determination of the violation short message and cannot effectively monitor the low frequency transmission behavior of the multi-card. problem.
  • an embodiment of the present invention provides a short message monitoring method, including:
  • the number of the same type of short messages received within the rule duration reaches the message flow threshold, and each of the same type of short messages is sent to the specific calling area, and the short message to be audited and the short message of the same type are determined to be the short message. .
  • An embodiment of the present invention further provides a short message monitoring apparatus, including a request receiving module, a similar short message matching module, and a violation message authentication module;
  • the request receiving module is configured to receive a monitoring request, where the monitoring request includes a short message content of the short message to be audited;
  • the short message matching module of the same type is configured to match the short message of the same type that is consistent with the content of the short message to be audited in all the received short messages;
  • the violation message authentication module is configured to determine that the number of the same type of short messages received within the rule duration reaches a message flow threshold, and each of the same type of short messages is sent to a specific call area to determine the short message to be reviewed and The same type of short message is a violation short message.
  • the embodiment of the invention further provides a monitoring center, including the short message monitoring device described above.
  • the embodiment of the invention further provides a computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the short message monitoring method.
  • a storage medium is also provided.
  • the storage medium Set to store the program code used to perform the following steps:
  • the monitoring request includes a short message content of the short message to be audited; matching all the short messages in the received short message that are consistent with the content of the short message to be audited; and receiving the similar short within the rule duration
  • the number of messages reaches a message flow threshold, and each of the similar short messages is concentrated in a specific calling area, and the short message to be audited and the short message of the same type are determined to be a violation short message.
  • the storage medium is further arranged to store program code for performing the following steps:
  • matching the short message of the same type that is consistent with the content of the short message to be audited in the received short message includes: acquiring the short message received within the duration of the rule; receiving the received time within the rule duration Comparing the short message content of the short message with the short message content of the short message to be audited; if the similarity of the two reaches the similarity threshold, determining the short message received within the rule duration and the pending review The content of the short message is consistent, and the short message received within the duration of the rule is a similar short message.
  • the storage medium is further arranged to store program code for performing the following steps:
  • a concentration threshold and a concentration base value N respectively, sending the same type of short message and the number of short messages to be audited in each calling area within the rule duration; sending the same type of short message and pending review within the calculation rule duration
  • the number of the same type of short message and the number of pending short messages is sent in the first N calling areas with the largest number of messages, and the number of messages in the area is obtained.
  • the same type of short message and pending review are sent in all the calling areas within the statistical rule duration.
  • the total number of short messages, the total number of messages is obtained; whether the proportion of the number of messages in the area in the total number of messages reaches the concentration threshold within the duration of the rule, and if so, the same type of short message is determined. Focus on sending in a specific calling area
  • the storage medium is further arranged to store program code for performing the following steps:
  • the method further includes: determining, within the duration of the rule, sending the short message to the calling user to send the short to be audited Whether the number of messages and/or similar short messages reaches the single-user traffic threshold, and if so, determining that the calling user is an illegal user; otherwise, determining that the calling party is The user is a legitimate user.
  • the storage medium is further arranged to store program code for performing the following steps:
  • the method further includes: intercepting the short message to be audited and the short message of the same type; and after determining that the calling user is a legitimate user, : releasing the to-be-reviewed short message and/or similar short message sent by the calling user.
  • the short message monitoring method, apparatus, and monitoring center and the computer storage medium provided by the embodiment of the present invention receive a monitoring request, perform short message monitoring according to the monitoring request, and carry the short message content of the short message to be audited in the monitoring request;
  • the content of the short message of the short message to be audited is based on the short message of the short message received in the rule duration, and the same type of short message consistent with the content of the short message to be audited is matched; when it is determined that the similar type of short message is sent in a specific calling area, It is considered that the short message to be audited and these similar short messages are all illegal short messages.
  • preliminary screening is performed according to the content of the short message to be audited, and the same type of short message sent in the rule duration is consistent with the content of the short message to be audited; only all received within the rule duration
  • the number of similar short messages is higher than the message traffic threshold, and it is determined that each of the similar short messages is concentrated in a specific calling area, it is determined that the short message to be audited and the short message of the same type are illegal short messages. That is to say, in the short message monitoring method in the embodiment of the present invention, it is determined whether the information is a violation short message, firstly according to the number of short messages within the rule duration, and secondly, according to the concentration of the calling area for sending these similar short messages.
  • FIG. 1 is a flowchart of a short message monitoring method according to Embodiment 1 of the present invention.
  • FIG. 2 is a flowchart of a short message monitoring method in the first embodiment of the present invention for matching a short message of the same type
  • FIG. 3 is a flowchart of determining, by a short message monitoring method in a first embodiment of the present invention, whether a short message of the same type is concentrated in a specific calling area;
  • FIG. 4 is a schematic structural diagram of a short message monitoring apparatus according to Embodiment 2 of the present invention.
  • FIG. 5 is a schematic structural diagram of a monitoring center according to Embodiment 2 of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the present embodiment provides a short message monitoring method.
  • the method mainly includes:
  • S101 Receive a monitoring request, where the monitoring request includes a short message content of the short message to be audited;
  • S102 Matching the same type of short message that is consistent with the content of the short message to be audited in all the short messages received within the rule duration;
  • S103 The number of the same type of short messages received in the rule duration is higher than the message flow threshold, and each type of short message is concentrated in a specific calling area, and the short message is determined to be And similar short messages are violations of short messages.
  • the short message monitoring method in this embodiment relies on the content of the short message, and needs to receive the monitoring request first, that is, step S101, in which the short message content is carried in the monitoring request, usually the entire monitoring process is due to receiving a short message.
  • the short message is a short message to be reviewed.
  • the rule duration is usually set first, and the rule duration is mainly used to specify the time level for statistically analyzing the content of the short message.
  • the rule duration is matched.
  • the similarity threshold it is generally necessary to set the similarity threshold before performing 201, and then sequentially perform the above steps S201 to S203. For example, set the similarity threshold to 80% in advance, and the content of the short message to be reviewed is “Congratulations on your number winning in the A lucky draw. The prize is a small car, worth 88,000 yuan. Please bring your ID card. And the 750 yuan fee to go to the B to receive the award"; assuming the rule duration is 1 minute, within 1 minute, another short message is received, 90% of the content of the short message is the same as the content of the short message to be reviewed. At this time, the content of these short messages is considered to be consistent with the short message content of the short message to be audited, and these short messages are considered to belong to the same type of short message.
  • the nature of the short message is monitored according to the same type of short message.
  • This can be a dynamic process of dynamically monitoring the reception status of short messages and identifying the content of the received short message to see if it belongs to the same type of short message, and if so, all the similar types that have been received within the duration of the dynamic statistical rule.
  • the number of short messages to determine whether they reach the message traffic threshold. When it reaches the traffic message threshold, it is considered that this type of short message may belong to the short-term violation. In order to ensure the accuracy of the judgment, it is necessary to make further judgments.
  • the message traffic threshold in this embodiment can be flexibly set according to user requirements.
  • the spammers In the actual use process, in order to avoid the monitoring of the system, the spammers often use SMS cats or mass-sending software to control multiple terminals to send multiple SIM card groups to send text messages, but control the number of messages sent by each card in a certain period of time. Smaller range. There are two obvious characteristics of this kind of sending behavior: (1) the total number of messages sent by a certain content is large; (2) the terminals participating in the group sending are concentrated in one or a certain specific area. For the first point, the above information can be identified by setting the message traffic threshold. Further, in order to ensure the accuracy of the judgment, for the second point, in this embodiment, it is also determined whether the calling area sent by each similar short message is concentrated in a specific area (may be a specific one or a specific number). See Figure 3 for the specific process, including:
  • S301 The number of sending the same type of short message in each calling area in the statistical rule duration
  • S302 The number of the same type of short message is sent in the first N calling areas where the number of the same type of short messages is the highest in the calculation rule duration, and the number of messages in the area is obtained;
  • S303 Send the total number of short messages of the same type and the short messages to be audited in all the calling areas in the statistical rule duration, and obtain the total number of messages;
  • S304 Calculate whether the proportion of the number of messages in the intra-area period in the total number of messages reaches the concentration threshold, and if so, determine that the same type of short message is concentrated in the specific calling area.
  • the concentration threshold and the concentration base value N are usually set first; the specific value can be flexibly set according to specific requirements.
  • the rule duration is separately calculated for different call-off areas, and the number of similar short messages is sent in each call-off area.
  • the calling areas A, B, C, D, and E all send the same message of the short message a to be audited, and then the calling areas A, B, C, D, and E respectively send the short message a and the same type of messages.
  • the calling area A sent a total of 200
  • the calling area B sent a total of 10
  • the calling area C sent a total of 18 calling areas D sent a total of 15, the starting area E Sent 8 articles.
  • step S302 the value of the number of messages in the area is counted according to the concentration base N.
  • Step S303 is executed to send the total number of short messages of the same type and the short messages to be audited in all the calling areas in the statistical rule duration to obtain the total number of messages.
  • the total number of messages sent by the calling areas A, B, C, D, and E is 251 for all the same type of short messages and pending short messages.
  • step S302 may be performed first in step S302, or step S302 may be performed first in step S303.
  • step S103 the number of similar short messages received within the rule duration is higher than the message flow threshold, and each short message is concentrated in a specific calling area, and the short message and the similar short message are considered to be violations. short message.
  • the short message to be audited and the short message of the same type in the above example belong to the violation short message.
  • Zhang San received a short message of fraud, and Zhang San reminded his relatives and friends that when receiving such short messages, don’t trust the short message content, so the fraud
  • the short message group was sent to their loved ones and friends.
  • the short message of Zhang Sanfa will also be intercepted.
  • another real-time mode is also provided. Specifically, a single user traffic threshold is set in advance.
  • the number of the short message to be audited and/or the short message of the same type is sent to the single user traffic threshold, and if so, the calling user is determined to be an illegal user; otherwise, the determined The calling user is a legitimate user.
  • the short message to be audited and/or the short message of the same type that the calling user is intercepted is released.
  • the monitoring request further carries a calling number and a calling area for sending the short message to be audited. Moreover, after receiving the monitoring request, the calling number, the calling area, and the short message content in the monitoring request are saved locally, so that subsequent statistical analysis is needed.
  • the short message monitoring method improves the accuracy of monitoring the illegal short message by determining the content of the short message and the calling area for sending the short message; in addition, based on the single user The number of transmissions is detected, and the monitoring process is more in line with the user's needs. Not only can the behavior of multi-card group spam short messages be discovered, but also the mis-monitoring of normal group text messages such as common messages, blessing messages, and forwarding segments can be effectively avoided.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • the apparatus includes: the request receiving module 41 is configured to receive a monitoring request.
  • the short message monitoring device in this embodiment may be integrated in the short message center or in a separate monitoring center. Therefore, in a specific embodiment, the monitoring request received by the short message monitoring device may come from the short message center.
  • the short message monitoring device further includes a similar short message matching module 42 and a violation message authentication module. 43.
  • the same type of short message matching module 42 is configured to match the same type of short message that is consistent with the content of the short message to be audited among all the short messages received within the rule duration.
  • the short message monitoring device further includes a first setting module 44 configured to set a similarity threshold. Specifically, the short message matching module 42 of the same type obtains the short message received within the rule duration; compares the short message content of the short message received within the rule duration with the content of the short message to be audited; and then compares the result with the similarity The threshold is compared. If the similarity reaches the similarity threshold, the short message received within the rule duration is consistent with the content of the short message to be audited.
  • the violation message authentication module 43 monitors the nature of the short message according to the same type of short message. First, it monitors whether the number of similar short messages received within the rule duration reaches the message traffic threshold. This can be a dynamic process of dynamically monitoring the reception status of short messages and identifying the content of the received short message to see if it belongs to the same type of short message, and if so, all the similar types that have been received within the duration of the dynamic statistical rule. The number of short messages to determine whether they reach the message traffic threshold. When it reaches the traffic message threshold, it is considered that the short message may belong to the illegal short message. In order to ensure the accuracy of the judgment, further judgment is needed.
  • the message traffic threshold in this embodiment can be flexibly set according to user requirements.
  • the short message monitoring apparatus further includes a second setting module 45 configured to set a preset concentration threshold and a concentration base value N.
  • the violation message authentication module 43 is also arranged to determine whether the same type of short message is concentrated in a particular call area. Specifically, the violation message authentication module 43 separately counts the number of sending the same type of short messages in each of the calling areas within the rule duration; and sends the same kind in the first N calling areas in which the number of the same type of short messages is sent within the calculation rule duration. The number of short messages, the number of messages in the area; the total number of short messages sent and the number of short messages to be audited in all the calling areas within the rule duration, and the total number of messages is obtained; and the number of messages in the area within the rule duration is calculated. Whether the proportion of the number of messages reaches the concentration threshold, and if so, it is determined that the same type of short message is concentrated in a specific calling area.
  • the violation message authentication module 43 determines that the short message to be audited and the short message of the same type belong to the violation short message, it is usually necessary to intercept the violation short message. Since the short message monitoring device in this embodiment can be integrated in the short message center, or can be set in a separate monitoring center, in a specific embodiment, the short message monitoring device sends a message intercepting instruction to the short message center.
  • the short message monitoring device further includes a third setting module 46 and a user legality determining module 47.
  • the third setting module 46 is configured to set a single user traffic threshold; the user legality determining module 47 is configured to determine the duration of the rule and send the short message to the main The user is asked to send the number of pending short messages and/or similar short messages to a single user traffic threshold. If yes, the calling user is determined to be an illegal user; otherwise, the calling user is determined to be a legitimate user.
  • the user legality judging module 47 judges that the calling user is a legitimate user, the short message to be audited and/or the short message of the same type that the calling user is intercepted is released.
  • the monitoring request further carries a calling number and a calling area for sending the short message to be audited.
  • the short message monitoring device saves the calling number, the calling area, and the short message content in the monitoring request locally, so as to be needed for subsequent statistical analysis.
  • the short message monitoring device can also record the monitoring log and provide functions such as log query and statistics.
  • the monitoring log may include a record of the detailed information of the completion process when the violation message authentication module 43 and the user legality determination module 47 complete each task.
  • the short message monitoring device in this embodiment can be used to implement the short message monitoring method in the first embodiment, that is, the steps in the first embodiment are implemented in the corresponding embodiments.
  • the present embodiment further protects a monitoring center, which may be a server; the monitoring center is deployed with the short message monitoring device in the embodiment, the short message matching module 42 of the short message monitoring device, and the information identifying module 43.
  • the function of the user legitimacy judging module 47 can be implemented by a processor of the monitoring center (server).
  • the function of the request receiving module 41 can be implemented by a communication unit of a monitoring center (server).
  • the functions of the first setting module 44, the second setting module 45, and the third setting module 46 can be implemented by a console having a human-computer interaction interface.
  • the monitoring center includes a console 51, an analyzing unit 52, a database management operating unit 53, and a database 54.
  • the console 51 integrates the functions of the first setting module, the second setting module and the third setting module, and is used for configuring each data (rule duration, similarity threshold, message flow threshold, concentration) The count value N, the concentration threshold, the single user flow threshold, etc.), and is responsible for synchronizing the configuration information to the analysis unit 52.
  • the analyzing unit 52 integrates the functions of the request receiving module 41, the similar short message matching module 42, the information authentication module 43, and the user legality determining module 47, and can be used to receive the monitoring request of the short message center, and according to the information pair configured by the console 51.
  • the user counts, analyzes, compares, and determines whether the short message is in violation and whether the calling user is legitimate according to the content, the calling area, and the calling user.
  • the decision result is returned to the SMS center, and the result may include a short message violation and a legitimate situation of the calling user.
  • the SMS center can perform corresponding control on the short message or the calling user according to the result returned by the monitoring center.
  • the database management operation unit 53 implements the database data management and maintenance function, and mainly includes the monitoring log sent by the analysis unit 52, and records it in the database 54; reads the configuration information saved in the database 54, and sends it to the console 51 for It displays; the monitoring log saved in the database 54 is read and statistically analyzed, and the result is sent to the console 51 for display.
  • the database 54 can implement physical data storage functions such as configuration data and monitoring logs.
  • the analyzing unit 52 receives the monitoring request sent by the short message center, and determines the short message to be audited in the monitoring request and the similar short message of the short message to be audited according to the configuration information previously configured by the console 51, to see if it is a violation.
  • the short message is determined to be a violation short message; further, the legitimacy of the calling user who sends the pending short message and the same short message of the pending short message is judged. And whether the short message to be audited and the similar short message of the pending short message belong to the judgment result of the violation short message, and the result of the legality of each calling user is notified to the short message center.
  • the analysis unit 52 transmits a monitoring log to the database management operation unit 53, which is recorded in the database 54 by the database management operation unit 53.
  • the configuration information and the monitoring log saved by the database 54 can be read by the database management operation unit 53 and displayed through the console 51 for the user to view.
  • modules or steps of the above embodiments of the present invention can be implemented by a general computing device, which can be concentrated on a single computing device or distributed among multiple computing devices.
  • they may be implemented by program code executable by the computing device, such that they may be stored in a computer storage medium (ROM/RAM, disk, optical disk) by a computing device, and at some
  • the steps shown or described may be performed in an order different than that herein, or they may be separately fabricated into individual integrated circuit modules, or a plurality of modules or steps may be fabricated into a single integrated circuit module. . Therefore, the invention is not limited to any particular combination of hardware and software.
  • preliminary screening is performed according to the content of the short message to be audited, and the same type of short message that is consistent with the content of the short message to be audited is sent within the rule duration; only received within the duration of the rule.
  • the number of all the same type of short messages is higher than the message traffic threshold, and it is determined that each of the similar short messages is concentrated in a specific calling area, it is determined that the short message to be audited and the short message of the same type are the short message.
  • the short message monitoring method in the embodiment of the present invention it is determined whether the information is a violation short message, firstly according to the number of short messages within the rule duration, and secondly, according to the concentration of the calling area for sending these similar short messages.
  • the information is a violation short message, firstly according to the number of short messages within the rule duration, and secondly, according to the concentration of the calling area for sending these similar short messages.
  • the short message is determined to be a violation short message; in the above manner, the number of short message transmissions with the same content and the characteristics of the calling area are globally analyzed, and if a certain content message is sent in a large amount, and the calling behavior is Focus on a specific call-off area, determine These short messages are illegal short messages, instead of merely identifying the illegal short messages based on simple and simple judgment conditions, which can effectively solve the inaccurate determination of the illegal short messages existing in the prior art, and cannot perform the multi-card low frequency transmission behavior. Effective monitoring of the problem; thus achieving effective monitoring of multi-card group distribution to improve the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供一种短消息监控方法、装置和监控中心。接收监控请求,根据监控请求,执行短消息监控,在监控请求中携带有待审核短消息的短消息内容;以该待审核短消息的短消息内容为依据,匹配出规则时长内接收到的所有短消息中与该待审核短消息内容一致的同类短消息;在判断出同类短信集中在特定起呼区域发送时,就认为待审核短消息和这些同类短消息都属于违规短消息。采用本发明实施例中的方案,可以有效解决现有技术中存在的对违规短消息判定不准确,不能对多卡低频发送行为进行有效的监控的问题;从而达到有效的监控多卡群发行为,提高用户体验的效果。

Description

一种短消息监控方法、装置和监控中心 技术领域
本发明涉及通信技术领域,尤其涉及一种短消息监控方法、装置和监控中心。
背景技术
短消息服务作为移动通讯网络的一种基本业务,在为运营商赚取可观的利润,为用户提供便捷的消息通讯服务的同时,也为垃圾短信的传播提供了渠道。近几年来,垃圾短信已成为社会一大公害。大量的恶意消息、广告消息和诈骗短信给用户带来了极大的困扰。
为了防止恶意短消息、广告短消息等的传播,垃圾短消息监控系统应运而生。垃圾短消息监控系统主要是根据大量的受监控短消息来自动地发现违规用户,从而限制或禁止其发送短消息。
相关技术中使用的垃圾短消息监控系统,通常基于监控规则来判断用户在一定时间内发送的消息量是否达到了预设的门限,如果是,则认为该用户违规,进而限制该违规用户发送短消息的行为。为了避免误监控,该预设门限值通常不会设置太低。许多垃圾短信发送者利用监控系统的这个特性,使用短信猫或者群发软件控制多部终端进行多SIM卡(Subscriber Identification Module,客户识别模块)群发垃圾短信,却将一定时间内单张卡的发送数量控制在一个较低的范围内,从而逃避系统的监控。也就是说,现有的系统是针对单用户行为进行监控的,而未考虑短消息内容及起呼行为的全局性,不能对多卡低频发送行为进行有效的监控。
综上所述,现有技术中的短消息监控系统仅根据用户在一定时间内发送的消息量来进行违规短消息的判定,判定条件单一,存在对违规短消息判定不准确,不能对多卡低频发送行为进行有效的监控的问题。
发明内容
本发明实施例提供一种短消息监控方法、装置和监控中心,主要解决现有技术中的短消息监控系统存在的对违规短消息判定不准确,不能对多卡低频发送行为进行有效的监控的问题。
为解决上述技术问题,本发明实施例提供一种短消息监控方法,包括:
接收监控请求,所述监控请求包括待审核短消息的短消息内容;
匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息;
在规则时长内接收到的同类短消息的数量达到消息流量门限,并且各所述同类短消息集中在特定起呼区域发送时,判定所述待审核短消息以及所述同类短消息为违规短消息。
本发明实施例还提供一种短消息监控装置,包括请求接收模块,同类短消息匹配模块和违规消息鉴定模块;
所请求接收模块,设置为接收监控请求,所述监控请求包括待审核短消息的短消息内容;
所述同类短消息匹配模块,设置为匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息;
所述违规消息鉴定模块,设置为在规则时长内接收到的同类短消息的数量达到消息流量门限,并且各所述同类短消息集中在特定起呼区域发送时,判定所述待审核短消息以及所述同类短消息为违规短消息。
本发明实施例还提供一种监控中心,包括上述的短消息监控装置。
本发明实施例还提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于执行前述的短消息监控方法。
根据本发明的又一个实施例,还提供了一种存储介质。该存储介质设 置为存储用于执行以下步骤的程序代码:
接收监控请求,所述监控请求包括待审核短消息的短消息内容;匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息;在规则时长内接收到的同类短消息的数量达到消息流量门限,并且各所述同类短消息集中在特定起呼区域发送时,判定所述待审核短消息以及所述同类短消息为违规短消息。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:
设置相似度阈值;匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息包括:获取所述规则时长内接收到的短消息;将所述规则时长内接收到的短消息的短消息内容与所述待审核短消息的短消息内容进行比对;若二者相似度达到所述相似度阈值,则判定所述规则时长内接收到的短消息与所述待审核短消息的内容一致,所述规则时长内接收到的短消息为同类短消息。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:
设置集中度门限,以及集中度基数值N;分别统计规则时长内各起呼区域内发送所述同类短消息和待审核短消息的数量;计算规则时长内发送所述同类短消息和待审核短消息数量最多的前N个起呼区域内共发送所述同类短消息和待审核短消息的数量,得到区域内消息数;统计规则时长内所有起呼区域内发送所述同类短消息和待审核短消息的总数量,得到总消息数;计算规则时长内所述区域内消息数在所述总消息数内的占比是否达到所述集中度门限值,若是,则判定所述同类短消息集中在特定起呼区域发送
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:
在设置单用户流量门限值;判定所述待审核短消息以及所述同类短消息为违规短消息之后还包括:判断所述规则时长内,发送短信息的主叫用户发送所述待审核短消息和/或同类短消息的数量是否达到所述单用户流量门限,若是,则判定所述主叫用户为非法用户;否则,判定所述主叫用 户为合法用户。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:
在判定所述待审核短消息以及所述同类短消息为违规短消息之后还包括:将所述待审核短消息以及所述同类短消息拦截;在判定所述主叫用户为合法用户后还包括:放行所述主叫用户发送的所述待审核短消息和/或同类短信息。
本发明的有益效果是:
根据本发明实施例提供的短消息监控方法、装置和监控中心以及计算机存储介质,接收监控请求,根据监控请求,执行短消息监控,在监控请求中携带有待审核短消息的短消息内容;以该待审核短消息的短消息内容为依据,匹配出规则时长内接收到的所有短消息中与该待审核短消息内容一致的同类短消息;在判断出同类短信集中在特定起呼区域发送时,就认为待审核短消息和这些同类短消息都属于违规短消息。采用本发明实施例中的方案,根据待审核短消息的内容进行初步筛选,匹配出规则时长内发送的与待审核短消息内容一致的同类短消息;只有在所述规则时长内接收到的所有同类短消息的数量高于消息流量门限,并且判断出各所述同类短消息集中在特定起呼区域发送时,才判定待审核短消息以及同类短消息为违规短消息。也就是说在本发明实施例中的短消息监控方法,要判信息是否为违规短消息,首先会依据规则时长内短消息的数量,其次还会依据发送这些同类短消息的起呼区域的集中程度;这样一来,首先根据待审核短消息的内容在同类短消息的总量超过消息流量门限值时,将这些短消息作为可疑对象;进一步地,判断出这些短消息集中在特定起呼区域发送时,判定这些短消息为违规短消息;采用上述方式,对内容一致的短消息发送数量及起呼区域特征进行全局的分析,若某种内容的消息被大量发送,且其起呼行为集中在特定的起呼区域内,判定这些短消息为违规短消息,而不是仅仅只依据简单单一的判定条件来对违规短信进行识别,可以有效解决现有技术中存在的对违规短消息判定不准确,不能对多卡低频发送行为 进行有效的监控的问题;从而达到有效的监控多卡群发行为,提高用户体验的效果。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1为本发明实施例一中的短消息监控方法的流程图;
图2为本发明实施例一中的短消息监控方法实现匹配出同类短消息的流程图;
图3为本发明实施例一中的短消息监控方法判定同类短消息是否集中在特定起呼区域发送的流程图;
图4为本发明实施例二中的短消息监控装置的结构示意图;
图5为本发明实施例二中的监控中心的结构示意图。
具体实施方式
下面通过具体实施方式结合附图对本发明实施例作进一步详细说明。
实施例一:
为了解决现有技术中存在的对违规短消息判定不准确,不能对多卡低频发送行为进行有效的监控的问题本实施例提供一种短消息监控方法,请参考图1,该方法主要包括:
S101:接收监控请求,监控请求包括待审核短消息的短消息内容;
S102:匹配出规则时长内接收到的所有短消息中与待审核短消息内容一致的同类短消息;
S103:在规则时长内接收到的同类短消息的数量高于消息流量门限,并且各同类短消息集中在特定起呼区域发送时,判定所述待审核短消息以 及同类短消息为违规短消息。
本实施例中短消息监控方法依赖于短消息的内容,需要先接收监控请求,即步骤S101,在该监控请求中携带有短消息内容,通常整个监控流程是由于接收到针对某条短消息而出发的,在本实施例中该短消息为待审核短消息。
在执行步骤S102之前,通常会先设置规则时长,该规则时长主要用于规定统计分析短消息内容的时间程度;在步骤S102中,以待审核短消息的短消息内容为依据,匹配出规则时长内接收到的所有短消息中与待审核短消息内容一致的同类短消息。对于具体的匹配过程请参考图2,包括:
S201:获取规则时长内接收到的短消息;
S202:将规则时长内接收到的短消息的短消息内容与待审核短消息内容进行比对;
S203:将比对结果与相似度阈值进行比较,若二者相似度达到该相似度阈值,则判定规则时长内接收到的该短消息与待审核短消息的内容一致。
在执行201之前通常需要先设置相似度阈值,然后顺序执行上述步骤S201至S203。例如,事先设置相似度阈值为80%,待审核短消息的内容为“恭喜您的号码在A抽奖活动中中奖了,奖品是小轿车一部,价值8.8万元,请您带着本人身份证和750元手续费去B处领奖”;假设规则时长为1分钟,在1分钟内,又接收到其他短消息,这些短消息90%的内容与上述待审核短消息的内容相同。此时,则认为这些短消息的内容与待审核短消息的短信内容一致,认为这些短消息属于同类短消息。
在识别出同类短消息之后,会根据同类短消息对短消息性质进行监控。首先会监控规则时长内接收到的同类短消息的数量是否有达到消息流量门限。这可以是一个动态的过程,动态地监控短消息的接收状况,并识别接收到的短消息的内容,看其是否属于同类短消息,如果是的话,动态统计规则时长内已接收到的所有同类短消息的数量,判断其是否达到消息流量门限。在其达到流量消息门限时,则认为该类短消息可能属于违规短消 息,为了保证判断的准确性,需要对其做进一步的判断。本实施例中的消息流量门限,可以根据用户需求,灵活设置。
在实际使用过程中,垃圾短信发送者为了逃避系统的监控,常使用短信猫或群发软件控制多台终端进行多SIM卡群发短信,却将每张卡在一定的时间内的发送数量控制在一个较小的范围内。此类发送行为有两个较为明显的特点:(1)某一种内容的消息的群发总量较大;(2)参与群发的终端集中在某一个或某几个特定区域内。针对其中第一点,可以采用上述设置消息流量门限的方式进行识别。进一步地,为了保证判断的准确性,针对其中第二点,在本实施例中还会判断各同类短消息发送的起呼区域是否集中在特定区域(可能是特定一个或特定几个)。其具体过程请参见图3,包括:
S301:分别统计规则时长内各起呼区域内发送同类短消息的数量;
S302:计算规则时长内发送所述同类短信数量最多的前N个起呼区域内共发送所述同类短信的数量,得到区域内消息数;
S303:统计规则时长内所有起呼区域内发送同类短消息和待审核短消息的总数量,得到总消息数;
S304:计算规则时长内区域内消息数在总消息数内的占比是否达到集中度门限值,若是,则判定同类短消息集中在特定起呼区域发送。
在执行步骤S301之前,通常先设置集中度门限和集中度基数值N;其具体值的大小都可以根据具体需求灵活设置。在步骤S301中,针对不同的起呼区域分别统计规则时长每个起呼区域内,发送同类短消息的数量。例如,起呼区域A、B、C、D、E都发送了待审核短消息a的同类消息,于是分别统计起呼区域A、B、C、D、E发送短消息a以及其同类消息的数量;本例中,起呼区域A共发送了200条,起呼区域B共发送了10条,起呼区域C共发送了18条起呼区域D共发送了15条,起呼区域E共发送了8条。
在步骤S302中,统计区域内消息数的值,具体的要根据集中度基数N 的取值来进行计算,计算规则时长内发送同类短消息和待审核短消息数量最多的前N个起呼区域内共发送同类短消息和待审核短消息的数量。例如,N=2,于是区域内消息数的值就是规则时长内发送同类短消息和待审核短消息数量最多的前2个起呼区域内共发送同类短消息和待审核短消息的数量,在上述示例中,发送最多的前两个起呼区域分别是起呼区域A(200条)和起呼区域C(18条);于是,针对该示例而言,区域消息数就为218条。
执行步骤S303,统计规则时长内所有起呼区域内发送同类短消息和待审核短消息的总数量,得到总消息数。例如,在上述实例中,总消息数为起呼区域A、B、C、D、E发送的所有同类短消息和待审核短消息的数量为251条。
最终,计算计算规则时长内区域内消息数在总消息数内的占比,执行步骤S304,并判断该占比是否达到集中度门限值,如果达到的话就认为同类短消息集中在特定起呼区域发送。在上述示例中,区域消息数为218条,总消息数为251条,所以,区域内消息数在总消息数内的占比就是218/251约为86.7%;若事先设置的集中度门限为50%,那么,此时区域内消息数在总消息数内的占比就超过了集中度门限,于是,判定同类短消息集中在特定起呼区域发送。
在本发明一种实施例中,不限定各个步骤的执行顺序,例如,可以先步骤S302再执行步骤S303,也可以先执行步骤S303再执行步骤S302。另外,也可以采用分别计算各统起呼区域的区域内消息数量在总消息量中的占比,从而判定同类短消息是否集中在特定起呼区域发送。
在步骤S103中,在规则时长内接收到的同类短消息的数量高于消息流量门限,并且各同类短消息集中在特定起呼区域发送时,就认为待审核短消息和同类短消息都属于违规短消息。上述实例中的待审核短消息和同类短消息都属于违规短消息。
在判断出待审核短消息和同类短消息属于违规短消息之后,通常需要 对这些违规短消息进行拦截。
考虑到实际使用时,往往存在这种状况,例如,用户张三收到了诈骗短消息,张三为了提醒自己的亲戚朋友,收到这类短消息时,不要轻信短消息内容,于是将该诈骗短消息群发给了自己的亲人,朋友。这时,如果将所有与该诈骗短消息内容相似的短拦截的话,张三发的短消息也会被拦截。为了防止上述情况的发生,在本实施例中,还提供另一种实时方式。具体地,事先设置单用户流量门限。判断规则时长内,发送短消息的主叫用户发送待审核短消息和/或同类短消息的数量是否达到单用户流量门限,若是,则判定所述主叫用户为非法用户;否则,判定所述主叫用户为合法用户。
当判断出主叫用户为合法用户后,会放行该主叫用户被拦截的待审核短消息和/或同类短消息。
在本实施例的一种实施方式中,监控请求中还会携带发送该待审核短消息的主叫号码和起呼区域。并且,在收到该监控请求后,会将监控请求中的主叫号码,起呼区域,短消息内容保存在本地,以便后续统计分析需要。
本发明实施例提供的短消息监控方法,通过判定短消息内容以及发送短消息的起呼区域两方面入手,来提高对违规短消息监控的准确性;另外,在此基础上,还针对单用户发送数量进行检测,监控过程更符合用户的使用需求。不仅可以发掘多卡群发垃圾短消息的行为,还能有效的避免对常用消息、祝福短信、转发段子等正常群发短信的误监控。
实施例二:
本实施例提供一种短消息监控装置,请参考图4,该装置包括:请求接收模块41设置为接收监控请求。本实施例中的短消息监控装置可以集成在短信中心,也可设置在单独的监控中心,所以在一种具体实施例中,短消息监控装置接收的监控请求可能来自于短信中心。
短消息监控装置还包括同类短消息匹配模块42和违规消息鉴定模块 43。同类短消息匹配模块42设置为匹配出规则时长内接收到的所有短消息中与待审核短消息内容一致的同类短消息。短消息监控装置还包括第一设置模块44设置为设置相似度阈值。具体地,同类短消息匹配模块42获取规则时长内接收到的短消息;并将规则时长内接收到的短消息的短消息内容与待审核短消息内容进行比对;然后将比对结果与相似度阈值进行比较,若二者相似度达到该相似度阈值,则判定规则时长内接收到的该短消息与待审核短消息的内容一致。
在识别出同类短消息之后,违规消息鉴定模块43会根据同类短消息对短消息性质进行监控。首先会监控规则时长内接收到的同类短消息的数量是否有达到消息流量门限。这可以是一个动态的过程,动态地监控短消息的接收状况,并识别接收到的短消息的内容,看其是否属于同类短消息,如果是的话,动态统计规则时长内已接收到的所有同类短消息的数量,判断其是否达到消息流量门限。在其达到流量消息门限时,则认为该类短消息可能属于违规短消息,为了保证判断的准确性,需要对其做进一步的判断。本实施例中的消息流量门限,可以根据用户需求,灵活设置。
短消息监控装置还包括第二设置模块45设置为设置预设集中度门限,以及集中度基数值N。违规消息鉴定模块43还设置为来判定同类短消息是否集中在特定起呼区域发送。具体地,违规消息鉴定模块43分别统计规则时长内各起呼区域内发送同类短消息的数量;以及计算规则时长内发送所述同类短信数量最多的前N个起呼区域内共发送所述同类短信的数量,得到区域内消息数;还会统计规则时长内所有起呼区域内发送同类短消息和待审核短消息的总数量,得到总消息数;并计算规则时长内区域内消息数在总消息数内的占比是否达到集中度门限值,若是,则判定同类短消息集中在特定起呼区域发送。
在违规消息鉴定模块43判断出待审核短消息和同类短消息属于违规短消息之后,通常需要对这些违规短消息进行拦截。由于本实施例中的短消息监控装置可以集成在短信中心,也可设置在单独的监控中心,所以在一种具体实施例中,短消息监控装置会向短信中心发送消息拦截指令。
短消息监控装置还包括第三设置模块46和用户合法性判断模块47,第三设置模块46设置为设置单用户流量门限;用户合法性判断模块47设置为判断规则时长内,发送短消息的主叫用户发送待审核短消息和/或同类短消息的数量是否达到单用户流量门限,若是,则判定所述主叫用户为非法用户;否则,判定所述主叫用户为合法用户。
当用户合法性判断模块47判断出主叫用户为合法用户后,会放行该主叫用户被拦截的待审核短消息和/或同类短消息。
在本实施例的一种实施方式中,监控请求中还会携带发送该待审核短消息的主叫号码和起呼区域。并且,在收到该监控请求后,短消息监控装置会将监控请求中的主叫号码,起呼区域,短消息内容保存在本地,以便后续统计分析需要。短消息监控装置还可以记录监控日志,并提供日志查询、统计等功能。监控日志可包括违规消息鉴定模块43和用户合法性判断模块47完成各个任务时,对于完成过程详细信息的记录。
本实施例中的短消息监控装置可用于实现上述实施例一中的短消息监控方法,也就是说上述实施例一中的各步骤,在本实施例中均有对应的模块来实现。
另外,本实施例还保护一种监控中心,该监控中心可以是服务器;该监控中心部署有本实施例中的短消息监控装置,短消息监控装置的同类短消息匹配模块42、息鉴定模块43和用户合法性判断模块47的功能可由监控中心(服务器)的处理器来实现。请求接收模块41的功能可由监控中心(服务器)的通信单元来实现。第一设置模块44、第二设置模块45和第三设置模块46的功能可由具有人机交互界面的控制台来实现。
为了更好的理解本实施例的方案,本实施例还提供监控中心的一种具体示例,请参考图5,该监控中心包括控制台51,分析单元52,数据库管理操作单元53和数据库54。
该控制台51集成了第一设置模块,第二设置模块和第三设置模块的功能,用于配置各数据(规则时长、相似度阈值、消息流量门限、集中度 计数值N、集中度门限单用户流量门限等),并负责将配置信息同步给分析单元52。
分析单元52集成了请求接收模块41、同类短消息匹配模块42、息鉴定模块43和用户合法性判断模块47的功能,可用于接收短消息中心的监控请求,并根据控制台51配置的信息对用户按照内容、起呼区域、主叫用户进行计数、分析、比较,并判定短消息是否违规以及主叫用户是否合法。并将判定结果返回给短信中心,该结果可能包括短消息违规情况和主叫用户合法情况。短信中心可以根据该监控中心返回的结果对短消息或主叫用户执行相应的控制。
数据库管理操作单元53实现数据库数据管理维护功能,主要包括接收分析单元52所发送的监控日志,并将其记入数据库54;读取数据库54中保存的配置信息,将其发送至控制台51供其显示;读取数据库54中保存的监控日志,并可对其进行统计分析,将结果发送给控制台51供其展示。
数据库54,可以实现配置数据、监控日志等的数据物理存储功能。
分析单元52接收短信中心发送的监控请求,并根据控制台51事先配置好的配置信息,对监控请求中的待审核短消息以及该待审核短消息的同类短消息进行判定,看其是否属于违规短消息,若判断出其属于违规短消息;进一步地,判断发送该待审核短消息以及该待审核短消息的同类短消息的主叫用户的合法性。并将待审核短消息以及该待审核短消息的同类短消息是否属于违规短消息的判定结果,以及各主叫用户的合法性结果通知给短信中心。在执行上述过程时,分析单元52向数据库管理操作单元53发送监控日志,数据库管理操作单元53将其记入数据库54。在这过程中,如果用户需要对配置数据和监控日志进行查看,可以通过数据库管理操作单元53读取数据库54保存的配置信息和监控日志,并通过控制台51进行展示,以便用户查看。
采用本实施例中的短消息监控装置及监控中心,不仅可以发掘多卡群 发垃圾短消息的行为,还能有效的避免对常用消息、祝福短信等正常群发短信的误监控。
显然,本领域的技术人员应该明白,上述本发明实施例的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在计算机存储介质(ROM/RAM、磁碟、光盘)中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。所以,本发明不限制于任何特定的硬件和软件结合。
以上内容是结合具体的实施方式对本发明实施例所作的进一步详细说明,不能认定本发明的具体实施只局限于这些说明。对于本发明所属技术领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干简单推演或替换,都应当视为属于本发明的保护范围。
工业实用性
在本发明实施例的短消息监控过程中,根据待审核短消息的内容进行初步筛选,匹配出规则时长内发送的与待审核短消息内容一致的同类短消息;只有在所述规则时长内接收到的所有同类短消息的数量高于消息流量门限,并且判断出各所述同类短消息集中在特定起呼区域发送时,才判定待审核短消息以及同类短消息为违规短消息。也就是说在本发明实施例中的短消息监控方法,要判信息是否为违规短消息,首先会依据规则时长内短消息的数量,其次还会依据发送这些同类短消息的起呼区域的集中程度;这样一来,首先根据待审核短消息的内容在同类短消息的总量超过消息流量门限值时,将这些短消息作为可疑对象;进一步地,判断出这些短消息集中在特定起呼区域发送时,判定这些短消息为违规短消息;采用上述方式,对内容一致的短消息发送数量及起呼区域特征进行全局的分析,若某种内容的消息被大量发送,且其起呼行为集中在特定的起呼区域内,判定 这些短消息为违规短消息,而不是仅仅只依据简单单一的判定条件来对违规短信进行识别,可以有效解决现有技术中存在的对违规短消息判定不准确,不能对多卡低频发送行为进行有效的监控的问题;从而达到有效的监控多卡群发行为,提高用户体验的效果。

Claims (10)

  1. 一种短消息监控方法,包括:
    接收监控请求,所述监控请求包括待审核短消息的短消息内容;
    匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息;
    在规则时长内接收到的同类短消息的数量达到消息流量门限,并且各所述同类短消息集中在特定起呼区域发送时,判定所述待审核短消息以及所述同类短消息为违规短消息。
  2. 如权利要求1所述的短消息监控方法,其中,还包括:设置相似度阈值;匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息包括:
    获取所述规则时长内接收到的短消息;
    将所述规则时长内接收到的短消息的短消息内容与所述待审核短消息的短消息内容进行比对;
    若二者相似度达到所述相似度阈值,则判定所述规则时长内接收到的短消息与所述待审核短消息的内容一致,所述规则时长内接收到的短消息为同类短消息。
  3. 如权利要求1所述的短消息监控方法,其中,还包括:设置集中度门限,以及集中度基数值N;
    分别统计规则时长内各起呼区域内发送所述同类短消息和待审核短消息的数量;
    计算规则时长内发送所述同类短消息和待审核短消息数量最多的前N个起呼区域内共发送所述同类短消息和待审核短消息的数量,得到区域内消息数;
    统计规则时长内所有起呼区域内发送所述同类短消息和待审核短消息的总数量,得到总消息数;
    计算规则时长内所述区域内消息数在所述总消息数内的占比是否达到所述集中度门限值,若是,则判定所述同类短消息集中在特定起呼区域 发送。
  4. 如权利要求1-3任一项所述的短消息监控方法,其中,还包括:设置单用户流量门限值;判定所述待审核短消息以及所述同类短消息为违规短消息之后还包括:
    判断所述规则时长内,发送短信息的主叫用户发送所述待审核短消息和/或同类短消息的数量是否达到所述单用户流量门限,若是,则判定所述主叫用户为非法用户;否则,判定所述主叫用户为合法用户。
  5. 如权利要求4所述的短消息监控方法,其中,在判定所述待审核短消息以及所述同类短消息为违规短消息之后还包括:将所述待审核短消息以及所述同类短消息拦截;
    在判定所述主叫用户为合法用户后还包括:放行所述主叫用户发送的所述待审核短消息和/或同类短信息。
  6. 一种短消息监控装置,包括请求接收模块,同类短消息匹配模块和违规消息鉴定模块;
    所请求接收模块,设置为接收监控请求,所述监控请求包括待审核短消息的短消息内容;
    所述同类短消息匹配模块,设置为匹配出接收到的所有短消息中与所述待审核短消息内容一致的同类短消息;
    所述违规消息鉴定模块,设置为在规则时长内接收到的同类短消息的数量达到消息流量门限,并且各所述同类短消息集中在特定起呼区域发送时,判定所述待审核短消息以及所述同类短消息为违规短消息。
  7. 如权利要求6所述的短消息监控装置,其中,还包括第一设置模块,设置为设置相似度阈值;
    所述同类短消息匹配模块,设置为获取所述规则时长内接收到的所有短消息;将所述规则时长内接收到的短消息的短消息内容与所述待审核短消息的短消息内容进行比对;若二者相似度达到所述相似度阈值,则判定所述规则时长内接收到的短消息与所述待审核短消息的内容一致,所述规 则时长内接收到的短消息为同类短消息。
  8. 如权利要求6所述的短消息监控装置,其中,还包括第二设置模块;
    所述第二设置模块,设置为设置预设集中度门限,以及集中度基数值N;
    所述违规消息鉴定模块,设置为分别统计规则时长内各起呼区域内发送所述同类短消息和待审核短消息的数量;计算规则时长内发送所述同类短消息和待审核短消息数量最多的前N个起呼区域内共发送所述同类短消息和待审核短消息的数量,得到区域内消息数;统计规则时长内所有起呼区域内发送所述同类短消息和待审核短消息的总数量,得到总消息数;计算规则时长内所述区域内消息数在所述总消息数内的占比是否达到所述集中度门限值,若是,则判定所述同类短消息集中在特定起呼区域发送。
  9. 如权利要求6-8任一项所述的短消息监控装置,其中,还包括第三设置模块和用户合法性判断模块;
    所述第三设置模块,设置为设置单用户流量门限;
    所述用户合法性判断模块,设置为在判定所述待审核短消息以及所述同类短消息为违规短消息之后,判断所述规则时长内,发送短信息的主叫用户发送所述待审核短消息和/或同类短消息的数量是否达到所述单用户流量门限,若是,则判定所述主叫用户为非法用户;否则,判定所述主叫用户为合法用户。
  10. 一种监控中心,包括如权利要求6-9任意一项所述的短消息监控装置。
PCT/CN2017/087903 2016-06-14 2017-06-12 一种短消息监控方法、装置和监控中心 WO2017215553A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610416536.0A CN107509190A (zh) 2016-06-14 2016-06-14 一种短消息监控方法、装置和监控中心
CN201610416536.0 2016-06-14

Publications (1)

Publication Number Publication Date
WO2017215553A1 true WO2017215553A1 (zh) 2017-12-21

Family

ID=60663372

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/087903 WO2017215553A1 (zh) 2016-06-14 2017-06-12 一种短消息监控方法、装置和监控中心

Country Status (2)

Country Link
CN (1) CN107509190A (zh)
WO (1) WO2017215553A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111126928A (zh) * 2018-10-29 2020-05-08 阿里巴巴集团控股有限公司 对发布内容审核的方法和装置
CN116996840A (zh) * 2023-09-26 2023-11-03 北京百悟科技有限公司 短信审核方法、装置、设备和存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347890B (zh) * 2018-12-25 2021-06-29 中国移动通信集团江苏有限公司 伪终端检测的方法、装置、设备和介质
CN115238175B (zh) * 2022-07-18 2023-08-15 中移互联网有限公司 消息审核方法、装置和电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104847A (zh) * 2011-02-24 2011-06-22 中兴通讯股份有限公司 基于流量和起呼区域的短消息监控方法
WO2012151929A1 (zh) * 2011-07-26 2012-11-15 中兴通讯股份有限公司 一种短消息监控方法及装置
CN103888919A (zh) * 2012-12-19 2014-06-25 中兴通讯股份有限公司 短消息监控方法及装置
CN105592430A (zh) * 2014-10-20 2016-05-18 中兴通讯股份有限公司 一种基于同源信息的短消息监控方法及系统

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335920B (zh) * 2008-07-15 2011-04-13 中国联合网络通信集团有限公司 基于主叫号码位置和发送内容的垃圾短消息识别系统及方法
CN101702801A (zh) * 2009-10-30 2010-05-05 中兴通讯股份有限公司 短消息监控方法和系统
CN101860844B (zh) * 2010-05-26 2014-03-12 中兴通讯股份有限公司 Sim卡的监控方法、装置及系统
CN103260140B (zh) * 2012-02-17 2018-03-16 中兴通讯股份有限公司 一种消息过滤方法及系统
CN105022815A (zh) * 2015-07-13 2015-11-04 腾讯科技(深圳)有限公司 信息拦截方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102104847A (zh) * 2011-02-24 2011-06-22 中兴通讯股份有限公司 基于流量和起呼区域的短消息监控方法
WO2012151929A1 (zh) * 2011-07-26 2012-11-15 中兴通讯股份有限公司 一种短消息监控方法及装置
CN103888919A (zh) * 2012-12-19 2014-06-25 中兴通讯股份有限公司 短消息监控方法及装置
CN105592430A (zh) * 2014-10-20 2016-05-18 中兴通讯股份有限公司 一种基于同源信息的短消息监控方法及系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111126928A (zh) * 2018-10-29 2020-05-08 阿里巴巴集团控股有限公司 对发布内容审核的方法和装置
CN111126928B (zh) * 2018-10-29 2024-03-22 阿里巴巴集团控股有限公司 对发布内容审核的方法和装置
CN116996840A (zh) * 2023-09-26 2023-11-03 北京百悟科技有限公司 短信审核方法、装置、设备和存储介质
CN116996840B (zh) * 2023-09-26 2023-12-29 北京百悟科技有限公司 短信审核方法、装置、设备和存储介质

Also Published As

Publication number Publication date
CN107509190A (zh) 2017-12-22

Similar Documents

Publication Publication Date Title
US11856132B2 (en) Validating automatic number identification data
US9306889B2 (en) Method and device for processing messages
WO2017215553A1 (zh) 一种短消息监控方法、装置和监控中心
DK2779572T3 (en) System and method for monitoring authentication attempts
US20140004829A1 (en) Mobile device and method to monitor a baseband processor in relation to the actions on an applicaton processor
CN108513301B (zh) 一种非法用户识别方法及装置
WO2016197646A1 (zh) 骚扰电话监控方法及装置
CN109857484A (zh) 针对接口调用请求的处理方法及系统
CN112866192B (zh) 一种识别异常聚集行为的方法及装置
CN109815702B (zh) 软件行为的安全检测方法、装置及设备
CN106899948A (zh) 伪基站发现方法、系统、终端及服务器
KR102200253B1 (ko) 문자 메시지 부정 사용 탐지 방법 및 시스템
CN109150864B (zh) 基于二次认证的防作弊方法及装置
KR20160031590A (ko) 악성 앱 분류 장치 및 악성 앱 분류 방법
KR101022167B1 (ko) 네트워크 자산의 취약성을 고려한 침입탐지시스템의로그최적화 장치
CN110378120A (zh) 应用程序接口攻击检测方法、装置以及可读存储介质
CN102231874A (zh) 一种短信处理方法、装置及系统
CN114095936A (zh) 短信验证码请求方法、攻击防御方法、装置、介质及设备
CN111294311B (zh) 一种防止流量欺诈的流量计费方法及系统
CN114168423A (zh) 异常号码的呼叫监控方法、装置、设备及存储介质
CN107809758B (zh) 一种sim卡信息保护方法及装置
CN111932290A (zh) 请求处理方法、装置、设备和存储介质
CN110535886A (zh) 用于检测中间人攻击的方法、装置、系统、设备及介质
CN114401126B (zh) 一种接口安全监控方法及装置
RU2818860C1 (ru) Способ предотвращения утечки конфиденциальных данных при использовании телекоммуникационных сетей связи

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17812664

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17812664

Country of ref document: EP

Kind code of ref document: A1