CN105704691A - Scam short message recognition method and device - Google Patents

Scam short message recognition method and device Download PDF

Info

Publication number
CN105704691A
CN105704691A CN201610270540.0A CN201610270540A CN105704691A CN 105704691 A CN105704691 A CN 105704691A CN 201610270540 A CN201610270540 A CN 201610270540A CN 105704691 A CN105704691 A CN 105704691A
Authority
CN
China
Prior art keywords
information
result
target information
module
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610270540.0A
Other languages
Chinese (zh)
Inventor
梁文栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610270540.0A priority Critical patent/CN105704691A/en
Publication of CN105704691A publication Critical patent/CN105704691A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a scam information recognition method and device. The method comprises the steps that a target information recognition request sent by a terminal and the sending number of target information are received; feature information corresponding to the sending number is acquired; the feature information corresponding to the sending number is analyzed, and an analysis result used for indicating whether the target information is scam information or the possibility of the scam information is acquired; and the analysis result is sent to the terminal. According to the scam short message recognition method and device, information recognition can be performed from the source, and recognition can be performed by utilizing the feature information of the sending number when the terminal receives the information so that a user is enabled to acquire the possibility of the scam information of the target information, and thus user experience is great.

Description

A kind of recognition methods swindling note and device
Technical field
The present invention relates to software technology field, particularly relate to a kind of recognition methods swindling note and device。
Background technology
When some, user may receive swindle note, if the user find that the note received is swindle note, it is possible to can report。User, after receiving the report information of user, can point out in cloud data center, for instance, the mobile phone of user can show " this information is reported by 20345 people "。
Prior art identifying, the mode of swindle note is mainly user's report。Owing to swindle note depends on the report of user, namely user discovers the information received for after swindle note, and good will labelling swindles information, but, this settling mode is the settling mode of rear hairdo, it is impossible to identify swindle information from source。
Summary of the invention
In view of this, the invention provides a kind of recognition methods swindling note and device, the recognition methods in order to solve to swindle in prior art note can not from the problem of identification swindle information source, and its technical scheme is as follows:
A kind of recognition methods swindling information, described method includes:
Receive the target information identification request of terminal transmission and the transmission number of described target information;
Obtain and described transmission number characteristic of correspondence information;
Analyze described and described transmission number characteristic of correspondence information, it is thus achieved that for indicating whether described target information is swindle information or the analysis result for swindle information probability size;
Described analysis result is sent to described terminal。
Wherein, described in described analysis with described transmission number characteristic of correspondence information, it is thus achieved that for indicating described target information to be whether swindle information or the analysis result for swindle information probability size, including:
Analyze whether described transmission number is the number pretending to be positive gauge mechanism, it is thus achieved that first analyzes result;
When described first analysis result shows the number that described transmission number not pretends to be positive gauge mechanism, whether analyze the quantity of described receiving number more than predetermined number, it is thus achieved that second analyzes result, and/or, analyze whether described receiving number is consecutive number, obtain the 3rd analysis result, and/or, analyze and whether described target information comprises account and/or bank information, obtain the 4th analysis result, and/or, analyze the incidence relation of described receiving number and described transmission number, it is thus achieved that the 5th analyzes result;
Analyze result by described second and/or the 3rd analysis result and/or the 4th analyzes result and/or the 5th analysis result determines the probability size that described target information is swindle information。
Wherein, described in described analysis with described transmission number characteristic of correspondence information, it is thus achieved that for indicating described target information to be whether swindle information or the analysis result for swindle information probability size, also include:
When described first analysis result shows that described transmission number is the number pretending to be positive gauge mechanism, it is determined that described target information is swindle information。
Wherein, the incidence relation of the described receiving number of described analysis and described transmission number, including:
Determine that the quantity with the described associated receiving number of transmission number is as the first quantity, it is judged that whether the ratio of described first quantity and described receiving number total quantity is less than the first preset value;
And/or, it is determined that with the quantity of the receiving number that described transmission number has second degree contacts as the second quantity, it is judged that whether the ratio of described second quantity and described receiving number total quantity is less than the second preset value;
And/or, it is determined that with the quantity of the receiving number that described transmission number is vertical linkage as the 3rd quantity, it is judged that whether the ratio of described 3rd quantity and described receiving number total quantity is more than the 3rd preset value。
Wherein, benchmark mark is pre-set;
Then, described by described second analyze result and/or the 3rd analyze result and/or the 4th analyze result and/or the 5th analyze result determine the probability size that described target information is swindle information, including:
Analyze result by described second and/or described 3rd analysis result and/or the described 4th analyzes result and/or described 5th analysis result determines the mark that need to deduct;
Deducted from described benchmark mark by the described mark that need to deduct, it is thus achieved that for the target fractional of the probability size that indicates described target information to be swindle information, described target fractional is more little, then described target information is that the probability of swindle information is more big。
Wherein, described by described second analyze result and/or the 3rd analyze result and/or the 4th analyze result and/or the 5th analyze result determine the probability size that described target information is swindle information, also include:
Determined the level of security of described target information by described target fractional and level of security set in advance, described level of security set in advance utilizes the score threshold preset to divide;
Then described by described analysis result transmission extremely described terminal, particularly as follows:
The level of security of described target fractional and/or described target information is sent to described terminal。
A kind of identification device swindling information, described device includes: receiver module, acquisition module, analysis module and sending module;
Described receiver module, the transmission number of target information identification request and described target information for receiving terminal transmission;
Described acquisition module, for obtaining the described transmission number characteristic of correspondence information received with described receiver module;
Described analysis module, is used for analyzing described and described transmission number characteristic of correspondence information, it is thus achieved that the analysis result of the probability size for indicating described target information to be swindle information;
Described sending module, for sending the described analysis result of described analysis module to described terminal。
Wherein, described analysis module includes: the first analysis module, the second analysis module and/or the 3rd analysis module and/or the 4th analysis module and the 5th analysis module, and first determines module;
Described first analysis module, for analyzing whether described transmission number is the number pretending to be positive gauge mechanism, it is thus achieved that first analyzes result;
Whether described second analysis module, for when described first analysis result shows the number that described transmission number not pretends to be positive gauge mechanism, analyzing the quantity of described receiving number more than predetermined number, it is thus achieved that second analyzes result;
Described 3rd analysis module, is used for analyzing whether described receiving number is consecutive number, it is thus achieved that the 3rd analyzes result;
Described 4th analysis module, is used for analyzing in described target information whether comprise account and/or bank information, it is thus achieved that the 4th analyzes result;
Described 5th analysis module, for analyzing the incidence relation of described receiving number and described transmission number, it is thus achieved that the 5th analyzes result;
Described first determines module, for when described first analysis result shows that described transmission number is not the number pretending to be positive gauge mechanism, analyzing result by described second and/or the 3rd analysis result and/or the 4th analyze result and/or the 5th analysis result determines the probability size that described target information is swindle information。
Wherein, described analysis module also includes: second determines module;
Described second determines module, for when described first analysis result shows that described transmission number is the number pretending to be positive gauge mechanism, it is determined that described target information is swindle information。
Wherein, described 5th analysis module, including: first determines that submodule and/or second determines that submodule and/or the 3rd determines submodule;
Described first determines submodule, for determining that quantity with the described associated receiving number of transmission number is as the first quantity, it is judged that whether the ratio of described first quantity and described receiving number total quantity is less than the first preset value;
Described second determines submodule, for determining there is the quantity of receiving number of second degree contacts as the second quantity with described transmission number, it is judged that whether the ratio of described second quantity and described receiving number total quantity is less than the second preset value;
Described 3rd determines submodule, for determining that quantity with the receiving number that described transmission number is vertical linkage is as the 3rd quantity, it is judged that whether the ratio of described 3rd quantity and described receiving number total quantity is more than the 3rd preset value。
Wherein, benchmark mark is pre-set;
Then, described first determines that module includes: mark deduction submodule and target fractional determine submodule;
Described mark deduction submodule, for being analyzed result and determined, by described second analysis result and/or the 3rd analysis result and/or the 4th analysis result and/or the 5th, the mark that need to deduct;
Described target fractional determines submodule, for the described mark that need to deduct is deducted from described benchmark mark, obtaining the target fractional for the probability size that indicates described target information to be swindle information, described target fractional is more little, then described target information is that the probability of swindle information is more big。
Wherein, described first determines that module also includes: level of security determines module;
Described level of security determines module, for being determined the targeted security rank of described target information by described target fractional and level of security set in advance, described in preset level of security and utilize the score threshold preset to divide;
Then described sending module, specifically for sending the level of security of described target fractional and/or described target information to described terminal。
Technique scheme has the advantages that
The recognition methods of swindle note provided by the invention and device, transmission number in the target information identification request and target information that receive terminal transmission, can obtain and send number characteristic of correspondence information, and then be analyzed based on this characteristic information, whether obtain for indicating target information is swindle information or the analysis result of the probability size for swindle information, and the transmission of analysis result displayed to terminal。The recognition methods of swindle note provided by the invention and device can carry out information identification from source, when terminal receives information, it is possible to utilize and be identified with transmission number characteristic of correspondence information, so, user just can obtain the probability that target information is swindle information, better user experience。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to the accompanying drawing provided。
The schematic flow sheet of the recognition methods of the swindle information that Fig. 1 provides for the embodiment of the present invention;
In the recognition methods of the swindle information that Fig. 2 provides for the embodiment of the present invention, analyze and the transmission number characteristic of correspondence information of target information, it is thus achieved that for the schematic flow sheet of implementation of the analysis result of the probability size that indicates target information to be swindle information;
In the recognition methods of the swindle information that Fig. 3 provides for the embodiment of the present invention, by the schematic flow sheet of the second a kind of implementation analyzing the probability size that result, the 3rd analysis result, the 4th analysis result and the 5th analysis result determine that target information is swindle information;
In the recognition methods of the swindle information that Fig. 4 provides for the embodiment of the present invention, by the schematic flow sheet of the second another kind of implementation analyzing the probability size that result, the 3rd analysis result, the 4th analysis result and the 5th analysis result determine that target information is swindle information;
The structural representation identifying device of the swindle information that Fig. 5 provides for the embodiment of the present invention。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
Embodiments provide a kind of recognition methods swindling information, be applied to Cloud Server, refer to Fig. 1, it is shown that the schematic flow sheet of the method, the method may include that
Step S101: receive the target information identification request of terminal transmission and the transmission number of target information。
Terminal, after receiving target information, sends target information identification request to Cloud Server, and wherein, target recognition request is used for asking Cloud Server that target information is identified。
Step S102: obtain the transmission number characteristic of correspondence information with target information。
The contacting of the quantity of receiving number of target information, the seriality of receiving number, receiving number and transmission number can be included with sending number characteristic of correspondence information, send whether number pretends to be positive gauge mechanism etc.。
Concrete, the process sending number characteristic of correspondence information of acquisition and target information may include that and sends characteristic information request to cloud data center, and this request carries the instruction information of the characteristic information wanting acquisition;Receive the cloud data center characteristic information according to instruction information feedback。Such as, characteristic information request includes " quantity of receiving number ", it is assumed that the quantity of receiving number is 1000, then " quantity of receiving number is 1000 " can be fed back to Cloud Server by cloud data center。
Step S103: analyze and send number characteristic of correspondence information, it is thus achieved that for indicating whether target information is swindle information or the analysis result of the probability size for swindle information。
Step S104: result will be analyzed and send to terminal。
Terminal use can learn, by analyzing result, the probability size that target information is swindle information。
The recognition methods of swindle note provided by the invention, transmission number in the target information identification request and target information that receive terminal transmission, can obtain and send number characteristic of correspondence information, and then be analyzed based on this characteristic information, whether obtain for indicating target information is swindle information or the analysis result of the probability size for swindle information, and the transmission of analysis result displayed to terminal。The recognition methods of swindle note provided by the invention is when terminal receives information, it is possible to utilizing and be identified with transmission number characteristic of correspondence information, so, user just can obtain the probability that target information is swindle information, better user experience。
In the recognition methods of the swindle information of above-described embodiment offer, analyze the transmission number characteristic of correspondence information with target information, it is thus achieved that for indicating whether target information is swindle information or the analysis result of the probability size for swindle information, including:
Step S201: analyze and send whether number is the number pretending to be positive gauge mechanism, it is thus achieved that first analyzes result。
In a kind of possible implementation, whether the number that sends analyzing target information is the process of the number pretending to be positive gauge mechanism particularly as follows: from whether the server objects of verification information of positive gauge mechanism is sent by positive gauge mechanism, if target information is not sent by positive gauge mechanism, then show that sending number is the number pretending to be positive gauge mechanism。
Step S202a: when the first analysis result shows that sending number is not the number pretending to be positive gauge mechanism, whether analyze the quantity of receiving number more than predetermined number, obtain the second analysis result, analyze whether receiving number is consecutive number, it is thus achieved that the 3rd analyzes result, analyzes in target information whether comprise account and/or bank information, obtain the 4th analysis result, analyze receiving number and the incidence relation sending number, it is thus achieved that the 5th analyzes result, then proceeds to step S203。
Said process pair has been analyzed with the characteristic information sending four aspects corresponding to number of target information, and respectively whether the quantity of receiving number, the seriality of receiving number, receiving number and the incidence relation of transmission number, target information comprise account and/or bank information。It should be noted that, comprehensively analyzed by aforementioned four aspect is one more preferably embodiment, because consider that the factor of this four aspect can improve the accuracy analyzing result simultaneously, but the present embodiment is not limited to this, it is possible to the characteristic information choosing any one aspect, any two aspect or any three aspects is analyzed。It addition, in time choosing multiple characteristic information and be analyzed, the present embodiment does not limit the analysis sequence of each characteristic information, these characteristic informations can be analyzed simultaneously, it is possible to is analyzed by certain sequencing。
Below above-mentioned analysis process is described in detail:
If second analyzes result shows that the quantity of receiving number is more than predetermined number, then show that target information is likely swindle information。User, when sending bulk message, generally rarely exceeds 100, if mass-sending quantity is too big, for instance, mass-send 1000 information, then this phenomenon is obviously abnormal, this target information ratio is relatively hazardous, it is likely that for swindle information。
If the 3rd analyzes result it is: the receiving number of target information is consecutive number, then show that target information is likely swindle information。User is when sending bulk message, and the number of information receiver is usually discontinuous, if all receiving numbers are continuous print, or most number is continuous print, then this situation is relatively more abnormal, and descriptive information ratio is relatively hazardous, it is likely that for swindle information
If the 4th analyzes result it is: whether comprise account and/or bank information in target information, then this target information is relatively hazardous, it is likely that for swindle information。Sender's pushed information only has two purposes, or advertises, or swindle, and if because advertising and sending bulk message, then general without account, bank information in advertisement。Further, analyzing the implementation whether comprising account and/or bank information in target information is: pre-set the key word corresponding with account and/or bank information, then analyze in target information whether comprise account and/or bank information, particularly as follows: search whether there is the key word corresponding with account and/or bank information from target information, if target information exists this key word, it is determined that target information comprises account and/or bank information。Such as, pre-setting the key words such as " account ", " agricultural bank ", " Bank of China ", from target information, searching for these key words, if searched, it is determined that target information comprises account and/or bank information。
Analyze receiving number and the incidence relation sending number, particularly as follows: determine that the quantity with the transmission associated receiving number of number is as the first quantity, it is judged that whether state first quantity ratio with receiving number total quantity less than the first preset value;And/or, it is determined that with the quantity of the receiving number that transmission number has second degree contacts as the second quantity, it is judged that whether the ratio of the second quantity and receiving number total quantity is less than the second preset value;And/or, it is determined that with the quantity of the receiving number that transmission number is vertical linkage as the 3rd quantity, it is judged that whether the ratio of the 3rd quantity and receiving number total quantity is more than the 3rd preset value。
Normal people's sending bulk message, the recipient of information is typically all the sender with information inter personal contact, or is at least related (second degree contacts) with friends of friends。If the ratio of the first quantity and receiving number total quantity less than the first preset value, then shows the sender of most of recipients of information and information, it doesn't matter;If the ratio of the second quantity and receiving number total quantity is less than the second preset value, then show that the sender with information has the recipient of second degree contacts less;If the ratio of the 3rd quantity and receiving number total quantity is more than the 3rd preset value, then show that the recipient of most of information is with the sender of information for vertical linkage (such as, A makes a phone call to B or photos and sending messages, but B never replied), three cases above is more abnormal situation, it was shown that target information is likely swindle information。Wherein, the first preset value, the second preset value and the 3rd preset value can be set according to real needs。
Foregoing description gives the incidence relation analyzed receiving number with send number from three aspects, in the preferred implementation of one, in order to improve the accuracy of target information recognition result, can be analyzed from above three aspect simultaneously, but the present embodiment is not limited to this, it is possible to choose one of them aspect or any two aspect therein is analyzed。
Step S202b: when the first analysis result shows that sending number is the number pretending to be positive gauge mechanism, it is determined that target information is swindle information。
Step S203: analyze result, the 3rd analysis result, the 4th analysis result and the 5th analysis result by second and obtain the analysis result for the probability size indicating target information to be swindle information。
In the above-described embodiments, analyze result, the 3rd analysis result, the 4th analysis result and the 5th implementation analyzing the probability size that result determines that target information is swindle information by second and have multiple, refer to Fig. 3, the schematic flow sheet of a kind of possible implementation is shown, preset benchmark mark, then the process that realizes may include that
Step S301: determine the mark that need to deduct by the second analysis result, the 3rd analysis result, the 4th analysis result, the 5th analysis result。
Step S302: the mark that need to deduct is deducted from benchmark mark, it is thus achieved that the target fractional of the probability size for indicating target information to be swindle information。
Wherein, target fractional is more little, then target information is that the probability of swindle information is more big。
Then, result will be analyzed to send to terminal particularly as follows: send target fractional to terminal。Terminal use just can learn, by mark, the probability size that target information is swindle information。
Refer to Fig. 4, illustrate by second analyzing result, the 3rd analyze result, the 4th analyze result, the 5th analyzing the schematic flow sheet that result determines another implementation of probability size that target information is swindle information, preset benchmark mark, then the process that realizes may include that
Step S401: analyze result, the 3rd analysis result, the 4th analysis result and the 5th analysis result by second and determine the mark that need to deduct。
Step S402: the mark that need to deduct is deducted from benchmark mark, it is thus achieved that the target fractional of the probability size for indicating target information to be swindle information。
Wherein, target fractional is more little, then target information is that the probability of swindle information is more big。
Step S402: determined the targeted security rank of target information by target fractional and level of security set in advance。
Wherein, safe level set in advance utilizes the score threshold preset to divide。
Exemplary, level of security advances with the first default score threshold and the second score threshold is divided into three ranks, respectively high, medium and low, if then determining the process of the level of security of target information particularly as follows: target fractional is be more than or equal to the first score threshold, then determine that the level of security of target information is for high, if target fractional is be more than or equal to the second score threshold and less than the first score threshold, it is determined that during the level of security of target information is;If target fractional is less than the first score threshold, it is determined that the level of security of target information is low。
Then, send analyzing result to terminal particularly as follows: the level of security of target information is sent to terminal。Terminal use just can learn, by the safe level of target information, the probability size that target information is swindle information。
Certainly, the level of security of target information and corresponding target fractional also can be sent to terminal by the present embodiment simultaneously。
On the basis of the invention described above embodiment, an instantiation is now provided to illustrate:
Preset a benchmark mark, such as 100 points, when receiving target information identification request and the transmission number of target information that terminal sends, obtain from cloud data center and send number characteristic of correspondence information, analyze these characteristic informations, if particularly as follows: send number for falsely using positive gauge mechanism such as bank number, then directly determine that target information is swindle information, if sending number not for falsely using the characteristic informations such as the number of positive gauge mechanism, the further seriality analyzing the quantity of receiving number, receiving number。If the quantity of the receiving number of target information is more than 1000, then subtract 10 point, if with the ratio of the quantity with receiving number total quantity that send the associated receiving number of number less than 1%, then subtract 10 point, if with the ratio of the quantity of the receiving number that transmission number has second degree contacts and receiving number total quantity less than 5%, then subtract 10 point, with the ratio of the quantity with receiving number total quantity that send the receiving number that number is vertical linkage more than 80%, then subtract 10 point, if receiving number is continuous, then subtract 10 point。Assume that by analyzing the mark determining needs deduction be 60 points, then from benchmark mark 100 points, deduct 60 points, obtain 40 points。
Level of security is divided in advance by the score threshold set, such as, divide four level of securitys, respectively high, in, low, extremely low, if target fractional is be more than or equal to 90 points, then determine that the level of security of target information is high (probability that target information is swindle information is less), if target fractional is be more than or equal to 60 points and less than 90 points, then determine the level of security of target information be in (probability that target information is swindle information is general), if target fractional is be more than or equal to 10 points and less than 60 points, the level of security then determining target information is low (probability that target information is swindle information is bigger), if target fractional is less than 10 points, the level of security then determining target information is extremely low (this situation can determine that target information is swindle information)。
40 points be more than or equal to 10 points and less than 60 points, then corresponding level of security is low, the probability that target information is swindle information is bigger, after determining that level of security is low, this level of security is sent to terminal, after terminal receives this level of security, user just can learn that the information security rank received is relatively low, and the probability that this information is swindle information is bigger。
It should be noted that choosing etc. of the division rule of the quantity of above-mentioned level of security, level of security, benchmark mark is all the example that provides in order to the recognition methods of swindle information is described of the present invention。
Corresponding with said method, the embodiment of the present invention additionally provides a kind of identification device swindling information, refers to Fig. 5, it is shown that the structural representation of this device, and this device includes: receiver module 501, acquisition module 502, analysis module 503 and sending module 504。Wherein:
Receiver module 501, the transmission number of target information identification request and target information for receiving terminal transmission。
Acquisition module 502, for obtaining the transmission number characteristic of correspondence information received with receiver module 501。
Analysis module 503, for analyze that acquisition module 502 obtains with send number characteristic of correspondence information, it is thus achieved that for indicating target information to be whether swindle information or the analysis result of the probability size for swindle information。
Sending module 504, for sending the analysis result of analysis module 503 to terminal。
The identification device of swindle note provided by the invention, transmission number in the target information identification request and target information that receive terminal transmission, can obtain and send number characteristic of correspondence information, and then be analyzed based on this characteristic information, whether obtain for indicating target information is swindle information or the analysis result of the probability size for swindle information, and the transmission of analysis result displayed to terminal。The identification device of swindle note provided by the invention is when terminal receives information, it is possible to utilizing and be identified with transmission number characteristic of correspondence information, so, user just can obtain the probability that target information is swindle information, better user experience。
In the identification device of the swindle information of above-described embodiment offer, analysis module may include that the first analysis module, the second analysis module and/or the 3rd analysis module and/or the 4th analysis module and/or the 5th analysis module, and first determines module。
Whether the first analysis module, be the number pretending to be positive gauge mechanism for analyzing transmission number, it is thus achieved that first analyzes result。
Whether second analysis module, be used for the quantity analyzing receiving number more than predetermined number, it is thus achieved that second analyzes result。
3rd analysis module, is used for analyzing whether receiving number is consecutive number, it is thus achieved that the 3rd analyzes result。
4th analysis module, is used for analyzing in target information and whether comprises account and/or bank information, it is thus achieved that the 4th analyzes result。
5th analysis module, for analyzing receiving number and the incidence relation sending number, it is thus achieved that the 5th analyzes result。
First determines module, for when the first analysis result shows that sending number is the number pretending to be positive gauge mechanism, analyzing result by second and/or the 3rd analysis result and/or the 4th analyze result and/or the 5th analysis result determines the probability size that target information is swindle information。
Analysis module may include that second determines module。
Second determines module, for when the first analysis result shows that sending number is not the number pretending to be positive gauge mechanism, it is determined that target information is swindle information。
In above-mentioned enforcement, the key word corresponding with account and/or bank information can be pre-set。Then the 4th analysis module, specifically for searching whether to there is the key word corresponding with account and/or bank information from target information, if target information existing the key word corresponding with account and/or bank information, it is determined that target information comprises account and/or bank information。
In above-mentioned enforcement, the first analysis module, specifically for from whether the server objects of verification information of positive gauge mechanism is sent by positive gauge mechanism, if target information is not sent by positive gauge mechanism, it is determined that send the number that number is not positive gauge mechanism。
In above-mentioned enforcement, the 5th analysis module, including: first determines that submodule and/or second determines that submodule and/or the 3rd determines submodule。
First determines submodule, for determining and sending the quantity of the associated receiving number of number as the first quantity, it is judged that whether the ratio of the first quantity and receiving number total quantity is less than the first preset value。
Second determines submodule, for determining and sending number and have the quantity of receiving number of second degree contacts as the second quantity, it is judged that whether the ratio of the second quantity and receiving number total quantity is less than the second preset value。
3rd determines submodule, for determining and sending the quantity of receiving number that number is vertical linkage as the 3rd quantity, it is judged that whether the ratio of the 3rd quantity and receiving number total quantity is less than the 3rd preset value。
In above-mentioned enforcement, benchmark mark can be pre-set。Then first determines that module may include that mark deduction submodule and target fractional determine submodule。
Mark deduction submodule, determines, for analyzing result by the second analysis result and/or the 3rd analysis result and/or the 4th analysis result and/or the 5th, the mark that need to deduct。
Target fractional determines submodule, for deduct from benchmark mark by the mark that need to deduct, it is thus achieved that being used for the target fractional of the probability size indicating target information to be swindle information, target fractional is more little, then target information is that the probability of swindle information is more big。
In above-mentioned enforcement, first determines that module can also include: level of security determines submodule。Level of security determines submodule, and for being determined the targeted security rank of target information by target fractional and level of security set in advance, wherein, level of security advances with the score threshold of setting and divides。
Then sending module, specifically for sending target fractional and/or described targeted security rank to terminal。
In this specification, each embodiment adopts the mode gone forward one by one to describe, and what each embodiment stressed is the difference with other embodiments, between each embodiment identical similar portion mutually referring to。
In several embodiments provided herein, it should be understood that disclosed method, device and equipment, it is possible to realize by another way。Such as, device embodiment described above is merely schematic, such as, the division of described unit, being only a kind of logic function to divide, actual can have other dividing mode when realizing, for instance multiple unit or assembly can in conjunction with or be desirably integrated into another system, or some features can ignore, or do not perform。Another point, shown or discussed coupling each other or direct-coupling or communication connection can be through INDIRECT COUPLING or the communication connection of some communication interfaces, device or unit, it is possible to be electrical, machinery or other form。
The described unit illustrated as separating component can be or may not be physically separate, and the parts shown as unit can be or may not be physical location, namely may be located at a place, or can also be distributed on multiple NE。Some or all of unit therein can be selected according to the actual needs to realize the purpose of the present embodiment scheme。It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a unit。
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, it is possible to be stored in a computer read/write memory medium。Based on such understanding, part or the part of this technical scheme that prior art is contributed by technical scheme substantially in other words can embody with the form of software product, this computer software product is stored in a storage medium, including some instructions with so that a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention。And aforesaid storage medium includes: USB flash disk, portable hard drive, read only memory (ROM, Read-OnlyMemory), the various media that can store program code such as random access memory (RAM, RandomAccessMemory), magnetic disc or CD。
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention。The multiple amendment of these embodiments be will be apparent from for those skilled in the art, and generic principles defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments。Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to the widest scope consistent with principles disclosed herein and features of novelty。

Claims (12)

1. the recognition methods swindling information, it is characterised in that described method includes:
Receive the target information identification request of terminal transmission and the transmission number of described target information;
Obtain and described transmission number characteristic of correspondence information;
Analyze described and described transmission number characteristic of correspondence information, it is thus achieved that for indicating whether described target information is swindle information or the analysis result for swindle information probability size;
Described analysis result is sent to described terminal。
2. method according to claim 1, with described transmission number characteristic of correspondence information described in described analysis, it is thus achieved that for indicating whether described target information is swindle information or the analysis result for swindle information probability size, including:
Analyze whether described transmission number is the number pretending to be positive gauge mechanism, it is thus achieved that first analyzes result;
When described first analysis result shows that described transmission number is not the number pretending to be positive gauge mechanism, whether analyze the quantity of described receiving number more than predetermined number, it is thus achieved that second analyzes result, and/or, analyze whether described receiving number is consecutive number, obtain the 3rd analysis result, and/or, analyze and whether described target information comprises account and/or bank information, obtain the 4th analysis result, and/or, analyze the incidence relation of described receiving number and described transmission number, it is thus achieved that the 5th analyzes result;
Analyze result by described second and/or the 3rd analysis result and/or the 4th analyzes result and/or the 5th analysis result determines the probability size that described target information is swindle information。
3. method according to claim 2, it is characterised in that with described transmission number characteristic of correspondence information described in described analysis, it is thus achieved that for indicating whether described target information is swindle information or the analysis result for swindle information probability size, also include:
When described first analysis result shows that described transmission number is the number pretending to be positive gauge mechanism, it is determined that described target information is swindle information。
4. method according to claim 2, it is characterised in that the incidence relation of the described receiving number of described analysis and described transmission number, including:
Determine that the quantity with the described associated receiving number of transmission number is as the first quantity, it is judged that whether the ratio of described first quantity and described receiving number total quantity is less than the first preset value;
And/or, it is determined that with the quantity of the receiving number that described transmission number has second degree contacts as the second quantity, it is judged that whether the ratio of described second quantity and described receiving number total quantity is less than the second preset value;
And/or, it is determined that with the quantity of the receiving number that described transmission number is vertical linkage as the 3rd quantity, it is judged that whether the ratio of described 3rd quantity and described receiving number total quantity is more than the 3rd preset value。
5. method as claimed in any of claims 2 to 4, it is characterised in that pre-set benchmark mark;
Then, described by described second analyze result and/or the 3rd analyze result and/or the 4th analyze result and/or the 5th analyze result determine the probability size that described target information is swindle information, including:
Analyze result by described second and/or described 3rd analysis result and/or the described 4th analyzes result and/or described 5th analysis result determines the mark that need to deduct;
Deducted from described benchmark mark by the described mark that need to deduct, it is thus achieved that for the target fractional of the probability size that indicates described target information to be swindle information, described target fractional is more little, then described target information is that the probability of swindle information is more big。
6. method according to claim 5, it is characterised in that described by described second analyze result and/or the 3rd analyze result and/or the 4th analyze result and/or the 5th analyze result determine the probability size that described target information is swindle information, also include:
Determined the level of security of described target information by described target fractional and level of security set in advance, described level of security set in advance utilizes the score threshold preset to divide;
Then described by described analysis result transmission extremely described terminal, particularly as follows:
The level of security of described target fractional and/or described target information is sent to described terminal。
7. the identification device swindling information, it is characterised in that described device includes: receiver module, acquisition module, analysis module and sending module;
Described receiver module, the transmission number of target information identification request and described target information for receiving terminal transmission;
Described acquisition module, for obtaining the described transmission number characteristic of correspondence information received with described receiver module;
Described analysis module, is used for analyzing described and described transmission number characteristic of correspondence information, it is thus achieved that the analysis result of the probability size for indicating described target information to be swindle information;
Described sending module, for sending the described analysis result of described analysis module to described terminal。
8. device according to claim 7, described analysis module includes: the first analysis module, the second analysis module and/or the 3rd analysis module and/or the 4th analysis module and the 5th analysis module, and first determines module;
Described first analysis module, for analyzing whether described transmission number is the number pretending to be positive gauge mechanism, it is thus achieved that first analyzes result;
Whether described second analysis module, for when described first analysis result shows the number that described transmission number not pretends to be positive gauge mechanism, analyzing the quantity of described receiving number more than predetermined number, it is thus achieved that second analyzes result;
Described 3rd analysis module, is used for analyzing whether described receiving number is consecutive number, it is thus achieved that the 3rd analyzes result;
Described 4th analysis module, is used for analyzing in described target information whether comprise account and/or bank information, it is thus achieved that the 4th analyzes result;
Described 5th analysis module, for analyzing the incidence relation of described receiving number and described transmission number, it is thus achieved that the 5th analyzes result;
Described first determines module, for when described first analysis result shows that described transmission number is not the number pretending to be positive gauge mechanism, analyzing result by described second and/or the 3rd analysis result and/or the 4th analyze result and/or the 5th analysis result determines the probability size that described target information is swindle information。
9. device according to claim 8, described analysis module also includes: second determines module;
Described second determines module, for when described first analysis result shows that described transmission number is the number pretending to be positive gauge mechanism, it is determined that described target information is swindle information。
10. device according to claim 8, it is characterised in that described 5th analysis module, including: first determines that submodule and/or second determines that submodule and/or the 3rd determines submodule;
Described first determines submodule, for determining that quantity with the described associated receiving number of transmission number is as the first quantity, it is judged that whether the ratio of described first quantity and described receiving number total quantity is less than the first preset value;
Described second determines submodule, for determining there is the quantity of receiving number of second degree contacts as the second quantity with described transmission number, it is judged that whether the ratio of described second quantity and described receiving number total quantity is less than the second preset value;
Described 3rd determines submodule, for determining that quantity with the receiving number that described transmission number is vertical linkage is as the 3rd quantity, it is judged that whether the ratio of described 3rd quantity and described receiving number total quantity is more than the 3rd preset value。
11. according to Claim 8 to the device described in any one in 10, it is characterised in that pre-set benchmark mark;
Then, described first determines that module includes: mark deduction submodule and target fractional determine submodule;
Described mark deduction submodule, for being analyzed result and determined, by described second analysis result and/or the 3rd analysis result and/or the 4th analysis result and/or the 5th, the mark that need to deduct;
Described target fractional determines submodule, for the described mark that need to deduct is deducted from described benchmark mark, obtaining the target fractional for the probability size that indicates described target information to be swindle information, described target fractional is more little, then described target information is that the probability of swindle information is more big。
12. device according to claim 11, it is characterised in that described first determines that module also includes: level of security determines module;
Described level of security determines module, for being determined the targeted security rank of described target information by described target fractional and level of security set in advance, described in preset level of security and utilize the score threshold preset to divide;
Then described sending module, specifically for sending the level of security of described target fractional and/or described target information to described terminal。
CN201610270540.0A 2016-04-27 2016-04-27 Scam short message recognition method and device Pending CN105704691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610270540.0A CN105704691A (en) 2016-04-27 2016-04-27 Scam short message recognition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610270540.0A CN105704691A (en) 2016-04-27 2016-04-27 Scam short message recognition method and device

Publications (1)

Publication Number Publication Date
CN105704691A true CN105704691A (en) 2016-06-22

Family

ID=56217646

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610270540.0A Pending CN105704691A (en) 2016-04-27 2016-04-27 Scam short message recognition method and device

Country Status (1)

Country Link
CN (1) CN105704691A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412333A (en) * 2016-11-18 2017-02-15 北京奇虎科技有限公司 Method and system for processing message content, and mobile communication terminal
CN106412863A (en) * 2016-11-18 2017-02-15 北京奇虎科技有限公司 Method and system for processing short message content and mobile communication terminal
CN109600750A (en) * 2017-09-30 2019-04-09 中移(杭州)信息技术有限公司 A kind of anti-spam behavioral value method and device
CN110048931A (en) * 2019-03-26 2019-07-23 深圳市腾讯信息技术有限公司 A kind of message treatment method, device and equipment
CN110602326A (en) * 2019-09-19 2019-12-20 中国联合网络通信集团有限公司 Suspicious incoming call identification method and suspicious incoming call identification system
CN116546448A (en) * 2023-05-04 2023-08-04 上海创蓝云智信息科技股份有限公司 Short message pushing system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945358A (en) * 2010-09-07 2011-01-12 成都市华为赛门铁克科技有限公司 Method and system for filtering junk short messages as well as terminal and server
CN102802133A (en) * 2012-07-23 2012-11-28 中国联合网络通信集团有限公司 Junk information identification method, device and system
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101945358A (en) * 2010-09-07 2011-01-12 成都市华为赛门铁克科技有限公司 Method and system for filtering junk short messages as well as terminal and server
CN102802133A (en) * 2012-07-23 2012-11-28 中国联合网络通信集团有限公司 Junk information identification method, device and system
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412333A (en) * 2016-11-18 2017-02-15 北京奇虎科技有限公司 Method and system for processing message content, and mobile communication terminal
CN106412863A (en) * 2016-11-18 2017-02-15 北京奇虎科技有限公司 Method and system for processing short message content and mobile communication terminal
CN109600750A (en) * 2017-09-30 2019-04-09 中移(杭州)信息技术有限公司 A kind of anti-spam behavioral value method and device
CN110048931A (en) * 2019-03-26 2019-07-23 深圳市腾讯信息技术有限公司 A kind of message treatment method, device and equipment
CN110602326A (en) * 2019-09-19 2019-12-20 中国联合网络通信集团有限公司 Suspicious incoming call identification method and suspicious incoming call identification system
CN116546448A (en) * 2023-05-04 2023-08-04 上海创蓝云智信息科技股份有限公司 Short message pushing system
CN116546448B (en) * 2023-05-04 2024-04-12 上海创蓝云智信息科技股份有限公司 Short message pushing system

Similar Documents

Publication Publication Date Title
CN105704691A (en) Scam short message recognition method and device
CN104866542A (en) POI data verification method and device
CN103472974A (en) Method and device for sharing application
CN104123324A (en) Positioning and obtaining method and device for unread messages
CN106155596B (en) Data writing method and device
CN103368992A (en) Message push method and device
CN103020807A (en) Information display method and system
CN105760522A (en) Information search method and device based on application program
CN104216998A (en) Method and device for recommending application program and terminal equipment
US11221894B2 (en) Event execution method, device, and system
CN103888597A (en) Communication method, device and electronic equipment
CN104317473A (en) Interface display method and client
CN114527721A (en) Method and system for monitoring online production of poly-PVC (polyvinyl chloride) modified cable granules and cloud platform
CN104144107A (en) Method, device and system for achieving account noting
CN111126071A (en) Method and device for determining questioning text data and data processing method of customer service group
CN104331229A (en) Information processing method and electronic equipment
CN104778389A (en) Numerical value transferring method, terminal, server and system
CN105260034A (en) Character outputting method and apparatus
CN103941953A (en) Information processing method and device
CN104102411A (en) Text editing method and text editing device
CN108287909B (en) Paper pushing method and device
CN106020605A (en) Application icon display method, user terminal and system
CN105243138A (en) Information pushing method and apparatus
CN105472089A (en) Contact person information transmission method and apparatus
CN103746870A (en) CDN delivery network analysis method, file delivery control center and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160622