CN106658437A - Information interception method and device - Google Patents

Information interception method and device Download PDF

Info

Publication number
CN106658437A
CN106658437A CN201611092144.XA CN201611092144A CN106658437A CN 106658437 A CN106658437 A CN 106658437A CN 201611092144 A CN201611092144 A CN 201611092144A CN 106658437 A CN106658437 A CN 106658437A
Authority
CN
China
Prior art keywords
multimedia message
note
rubbish
database
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611092144.XA
Other languages
Chinese (zh)
Inventor
王贤伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201611092144.XA priority Critical patent/CN106658437A/en
Publication of CN106658437A publication Critical patent/CN106658437A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides an information interception method and device. The method comprises: acquiring content of a short message or a multimedia message, wherein the content comprises a text, numbers and /or linkages; based on the acquired text, numbers and/or linkages of the short message or the multimedia message, judging whether the short message or the multimedia message is a junk message; and if the short message or the multimedia message is the junk message, intercepting the short message or the multimedia message. In the technical scheme provided by the invention, by utilizing a mode of judging whether the short message or the multimedia message is the junk message based on the content of the short message or the multimedia message, the junk message can be more effectively intercepted, so that the security of using a mobile terminal by the user is improved, and then the user experience is improved.

Description

A kind of information intercepting method and device
Technical field
The present invention relates to mobile communication technology field, more particularly to a kind of information intercepting method and device.
Background technology
With the fast development of mobile Internet, daily life increasingly be unable to do without mobile terminal, but mobile whole End is also subject to many security threats, some lawless persons that various swindles, junk information are sent to into user, and user often faces The harassing and wrecking of loss, individual privacy information leakage and daily life economically.
At present for the intercept process of junk information, typically when the information that receives is notified, according to the number of letter person Intercept process is carried out, by the number information of matching inquiry letter person, if the number of other side is the number of trust, it will connect The information content is received, otherwise information is abandoned or moved it in interception storehouse, later stage user can receive and check.
Although having certain effect according to interception of the number to junk information, for comprising many matchmakers such as word, pictures The information of body information, carrying out interception according to number cannot accomplish effective intercept process.And the number that other side sends, if just Just start the number for sending junk information, it is harassing and wrecking number to be difficult to match the number in interception storehouse, and information is concrete not obtaining In the case that content information amount is limited, comparatively intercept the degree of accuracy reduces much.
The content of the invention
The invention provides a kind of information intercepting method and device to overcome the problems referred to above or solve at least in part on State problem.
According to an aspect of the invention, there is provided a kind of information intercepting method, including:Obtain the interior of note or multimedia message Hold, wherein, the content includes:Text, number, and/or link;Based on the text that the note or multimedia message that get include Originally, number, and/or link, judge whether the note or multimedia message are junk information;If the note or multimedia message are rubbish letter Breath, then intercept the note or multimedia message.
Alternatively, text, number, and/or the link included based on the note for getting or multimedia message, judges institute State whether note or multimedia message are that junk information includes:Based on the rubbish keyword in rubbish keyword database, what is got Matched in the text that the note or multimedia message include, if the match is successful, judged the note or multimedia message for rubbish letter Breath;Based on the number that the note or multimedia message that get include, matched in rubbish number database, if matched into Work(, then judge the note or multimedia message for junk information;And/or the link included based on the note or multimedia message that get, Matched in rubbish linked database, if the match is successful, judge the note or multimedia message for junk information.
Alternatively, before the content of the acquisition multimedia message, also include:The multimedia message PUSH that reception MMS center is issued disappears Breath;The multimedia message PUSH message is parsed, sender number, subject text, the storage address of the multimedia message is obtained;Based on what is obtained The sender number and subject text of the multimedia message, judges whether the multimedia message is junk information;If the multimedia message is not rubbish Rubbish information, then the storage address based on the multimedia message, connects the MMS center, downloads the source data of the multimedia message;Parsing institute State the source data of multimedia message.
Alternatively, whether the sender number and subject text based on the multimedia message for obtaining, judge the multimedia message Include for junk information:Based on the rubbish keyword in rubbish keyword database, in the theme text of the multimedia message for getting Matched in this, if the match is successful, judge the multimedia message for junk information;Transmission based on the multimedia message for getting Square number, is matched in rubbish number database, if the match is successful, judges or multimedia message is as junk information.
Alternatively, the source data of the parsing multimedia message includes:Dissection process is carried out to the source data of the multimedia message, is solved Separate out text therein, annex, content of multimedia;The content for obtaining multimedia message includes:The text that acquisition is parsed, and Obtain the text that the annex is included;Based on the text that the text and the annex that parse are included, extract therein Number and/or link.
Alternatively, if the note or multimedia message are not junk information, the note or multimedia message are shown;Statistics will show The note or multimedia message be labeled as junk information user quantity, if the quantity exceed predetermined threshold value, basis The note or rubbish keyword database, rubbish number database, and/or rubbish link data described in the content update of multimedia message Storehouse.
Alternatively, rubbish keyword database, the rubbish number according to the note or the content update of multimedia message Database, and/or rubbish linked database include:When the note for showing or multimedia message being labeled as into junk information according to user Rubbish keyword database, rubbish number database, and/or rubbish linked database described in the content update filled in;And/or It is right according to the option institute that user chooses the note for showing or multimedia message in rubbish contents list when being labeled as junk information Rubbish keyword database, rubbish number database, and/or rubbish linked database described in the content update answered.
Alternatively, rubbish keyword database, the rubbish number according to the note or the content update of multimedia message Database, and/or rubbish linked database include:The note or multimedia message are analyzed in server side, acquisition causes user by institute State note or multimedia message be labeled as the content of junk information, and update the rubbish keyword database, rubbish number database, And/or rubbish linked database.
Alternatively, it is described to intercept after the note or multimedia message, also include:Delete the note or multimedia message.
Alternatively, it is described to intercept after the note or multimedia message, also include:By the note or multimedia message storage to interception storehouse In, and point out user;In response to the instruction of user, the note or multimedia message are shown.
According to another aspect of the present invention, a kind of information intercepting device is additionally provided, including:Acquisition module, is configured to The content of note or multimedia message is obtained, wherein, the content includes:Text, number, and/or link;First judge module, configuration It is text, number, and/or the link included based on the note or multimedia message that get, judges whether are the note or multimedia message For junk information;Blocking module, is configured to, when the note or multimedia message are junk information, intercept the note or multimedia message.
Alternatively, first judge module includes;First matching unit, in being configured to rubbish keyword database Rubbish keyword, matched in the text that the note or multimedia message for getting includes, if the match is successful, judge The note or multimedia message are junk information;Second matching unit, is configured to the note that gets or multimedia message includes Number, is matched in rubbish number database, if the match is successful, judges the note or multimedia message for junk information; And/or the 3rd matching unit, the link that the note that gets or multimedia message include is configured to, in rubbish linked database In matched, if the match is successful, judge the note or multimedia message for junk information.
Alternatively, said apparatus also include:Receiver module, is configured to receive the multimedia message PUSH message that MMS center is issued; First parsing module, is configured to parse the multimedia message PUSH message, obtains the sender number of the multimedia message, subject text, deposits Storage address;Second judge module, is configured to the sender number and subject text of the multimedia message of acquisition, judges the coloured silk Whether letter is junk information;Download module, is configured to when the multimedia message is not junk information, the storage based on the multimedia message Location, connects the MMS center, downloads the source data of the multimedia message;Second parsing module, is configured to parse the source of the multimedia message Data.
Alternatively, second judge module includes;4th matching unit, in being configured to rubbish keyword database Rubbish keyword, matched in the subject text of the multimedia message for getting, if the match is successful, judge the coloured silk Believe for junk information;5th matching unit, is configured to the sender number of the multimedia message for getting, in rubbish number number According to being matched in storehouse, if the match is successful, judge the multimedia message for junk information.
Alternatively, second parsing module includes:Resolution unit, is configured to parse the source data of the multimedia message Process, parse text therein, annex, content of multimedia;The acquisition module includes:Acquiring unit, is configured to obtain solution The text for separating out, and obtain the text that the annex is included;Extraction unit, be configured to the text that parses with And the text that the annex is included, extract number therein and/or link.
Alternatively, said apparatus also include:First display module, it is not junk information to be configured in the note or multimedia message When, show the note or multimedia message;Update module, is configured to statistics and the note for showing or multimedia message is labeled as into junk information User quantity, if the quantity exceed predetermined threshold value, the rubbish according to the note or the content update of multimedia message Rubbish keyword database, rubbish number database, and/or rubbish linked database.
Alternatively, the update module includes:First updating block, be configured to according to user by show the note or Multimedia message be labeled as rubbish keyword database described in the content update filled in during junk information, rubbish number database, and/or Rubbish linked database;And/or second updating block, it is configured to that the note for showing or multimedia message are labeled as into rubbish according to user Rubbish keyword database, rubbish number described in the content update corresponding to option chosen in rubbish contents list during rubbish information Code database, and/or rubbish linked database.
Alternatively, the update module includes:3rd updating block, is configured to analyze the note or coloured silk in server side Letter, acquisition causes user that the note or multimedia message are labeled as into the content of junk information, and updates the rubbish keyword data Storehouse, rubbish number database, and/or rubbish linked database.
Alternatively, said apparatus also include:Removing module, is configured to delete the note or multimedia message.
Alternatively, said apparatus also include:Memory module, is configured to by the note or multimedia message storage in interception storehouse, And point out user;Second display module, is configured to the instruction in response to user, shows the note or multimedia message.
Based on the technical scheme that the present invention is provided, when mobile terminal receives note or multimedia message, can be based on note or multimedia message bag The text that includes, number and/or link judge whether the note or multimedia message are junk information, if it is determined that junk information then can be with It is intercepted.The present invention provides technical scheme and employs and judges whether it is junk information based on the content of note or multimedia message Mode, can more effectively catching rubbish information, use the security of mobile terminal so as to improve user, and then improve Consumer's Experience.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
According to the detailed description below in conjunction with accompanying drawing to the specific embodiment of the invention, those skilled in the art will be brighter Above-mentioned and other purposes, the advantages and features of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred embodiment, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of information intercepting method according to an embodiment of the invention;
Fig. 2 is the schematic flow sheet of information intercepting method in accordance with a preferred embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the information intercepting method according to another preferred embodiment of the present invention;
Fig. 4 is the structural representation of information intercepting device according to an embodiment of the invention;
Fig. 5 is the structural representation of information intercepting device in accordance with a preferred embodiment of the present invention;
Fig. 6 is the structural representation of the information intercepting device according to another preferred embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure and should not be by embodiments set forth here Limited.On the contrary, there is provided these embodiments are able to be best understood from the disclosure, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
Fig. 1 is the schematic flow sheet of information intercepting method according to an embodiment of the invention.As shown in figure 1, according to this The information intercepting method of invention one embodiment includes:
Step S102, obtains the content of note or multimedia message, including text, number, and/or link;
Step S104, based on text, number, and/or link that the note or multimedia message that get include, judges note or coloured silk Whether letter is junk information;
Step S106, if the note or multimedia message are junk information, intercepts note or multimedia message.
It is mobile-terminated when receiving note or multimedia message based on the information intercepting method that this enforcement is provided, note can be obtained Or included text, number and/or linked contents in multimedia message, and then the text included according to accessed note or multimedia message Originally, number and/or chain are fetched and judge whether the note or multimedia message are junk information, if it is determined that the note or multimedia message are rubbish letter Breath, then can carry out intercept process to the note or multimedia message.Such scheme provides a kind of information intercepting scheme based on content, Can more efficiently catching rubbish information, the information for allowing user to receive is safer, so as to improve user using it is mobile eventually The security at end, and then improve Consumer's Experience.
In a preferred embodiment of the invention, in order to realize based on the note that gets or the text of multimedia message, number, And/or link judges whether the note or multimedia message are junk information, can respectively build for text, number, three kinds of information of link Vertical rubbish keyword data, rubbish number database, rubbish linked database, and then judge what is received based on these three databases Whether note or multimedia message are junk information.
Preferably, the above-mentioned text, number, and/or the link that are included based on the note or multimedia message that get, judge note Or whether multimedia message is that junk information can include:
Based on the rubbish keyword in rubbish keyword database, enter in the text that the note or multimedia message for getting includes Row matching, if the match is successful, judges the note or multimedia message for junk information;
Based on the number that the note or multimedia message that get include, matched in rubbish number database, if matching Success, then judge the note or multimedia message for junk information;And/or
Based on the link that the note or multimedia message that get include, matched in rubbish linked database, if matching Success, then judge the note or multimedia message for junk information.
The scheme that this preferred embodiment is provided establishes respectively corresponding rubbish for text, number, three kinds of information of link Keyword data, rubbish number database, rubbish linked database, are matched, Ke Yifang based on three above-mentioned databases Just, quickly identify with the presence or absence of rubbish contents in the note or multimedia message for receiving, and then judge whether it belongs to junk information.
Above-described embodiment is illustrated below by a specific example.
So that mobile terminal receives a note as an example, then the interception process of information is as follows:
1. the content of note is obtained, and the text for getting is for " generation draws a bill, and sells invoice, and details are wired back and seeked advice from 130xxxx1111 ", and then get number " 130xxxx1111 ";
2. matched in rubbish number database based on the number " 130xxxx1111 " for getting, matched unsuccessful;It is based on Rubbish keyword " generation draws a bill " in rubbish keyword database in the text for getting, " draw a bill, and sells invoice, and details are returned by generation Matched in electricity consulting ", the match is successful;Judge the note for junk information;
3. note is intercepted;
Examples detailed above gives a kind of typical application scenarios of the information intercepting method according to the embodiment of the present application.
Fig. 2 is the schematic flow sheet of information intercepting method in accordance with a preferred embodiment of the present invention.As shown in Fig. 2 root Include according to the information intercepting method of a preferred embodiment of the invention:
Step S202, obtains the content of note or multimedia message, including text, number, and/or link;
Step S204, judges that whether the note is based on the text of the note or multimedia message that get, number, and/or link Junk information, if it is goes to step S206, if not then going to step S212;
Step S206, intercepts note or multimedia message;
Step S208, by note or multimedia message storage in interception storehouse, and points out user;
Step S210, in response to the instruction of user, shows note or multimedia message;
Step S212, shows note or multimedia message;
Step S214, if the note of display or multimedia message are labeled as junk information by user, then starting statistics will show Note or multimedia message be labeled as the quantity of junk information user, if the quantity exceedes predetermined threshold value, according to note or coloured silk The content update rubbish keyword database of letter, rubbish number database, and/or rubbish linked database.
Alternatively, after step S206 intercepts note or multimedia message, it is also possible to select to delete note or multimedia message.
In the scheme that this preferred embodiment is provided, based on the text of the note or multimedia message for getting, number and/or link Judge that the note or multimedia message are not after junk information, then can to show note or multimedia message.And if shown by user's mark Short breath or multimedia message are junk information, then explanation has been likely to occur new junk information, now can start to count by the note or Multimedia message is labeled as the number of users of junk information, when the quantity exceedes predetermined threshold value, then it can be assumed that this note or coloured silk Letter is strictly junk information.In order to subsequently directly this junk information can be identified, can be according to the note or multimedia message Content update rubbish keyword database, rubbish number database, and/or rubbish linked database, so as to constantly improve phase The junk data storehouse answered, is more effectively intercepted to later information.
Preferably, it is above-mentioned according to note or the content update rubbish keyword database of multimedia message, rubbish number database, And/or rubbish linked database can include:
The content update rubbish keyword filled in when the note of display or multimedia message being labeled as into junk information according to user Database, rubbish number database, and/or rubbish linked database;And/or
The option chosen in rubbish contents list when the note of display or multimedia message being labeled as into junk information according to user Corresponding content update rubbish keyword database, rubbish number database, and/or rubbish linked database.
Wherein, the content update rubbish filled in when the note of display or multimedia message being labeled as into junk information according to user is closed Keyword database, rubbish number database, and/or rubbish linked database, i.e., require while user's mark junk information User fills in the content of the junk information that the packet contains, and user can select to fill in rubbish number, rubbish keyword and/or rubbish Rubbish is linked, can direct base when rubbish keyword database, rubbish number database, and/or rubbish linked database is updated Rubbish number, rubbish keyword and/or the rubbish link filled in user is updated.
If additionally, user does not have the time or is inconvenient to fill in, then user for convenience, can provide the user preset Rubbish contents list, which includes the option for representing different rubbish contents, user can be chosen one in rubbish contents list Item is multinomial, can basis when rubbish keyword database, rubbish number database, and/or rubbish linked database is updated Option obtains corresponding content update rubbish keyword database, rubbish number database, and/or rubbish linked database.
Preferably, it is above-mentioned according to note or the content update rubbish keyword database of multimedia message, rubbish number database, And/or rubbish linked database can also include:Note or multimedia message are analyzed in server side, acquisition causes user by note or coloured silk Beacon is designated as the content of junk information, and updates rubbish keyword database, rubbish number database, and/or rubbish link number According to storehouse.
As a kind of optional embodiment, obtain for update rubbish keyword database, rubbish number database, And/or the operation of the content of rubbish linked database can also completely disengage from the help of user, you can with directly in server side Note or multimedia message are analyzed, it is determined that cause user that note or multimedia message are labeled as the content of junk information, and according to these Content is updated.The analysis of server side can be by being manually analyzed, it is also possible to using targetedly automatic identification plan Slightly, the present embodiment is not specifically limited.
Above-described embodiment is illustrated below by a specific example.
So that mobile terminal receives a note as an example, then the interception process of note is as follows:
1. the content for obtaining note is " OK recentlySo long no contact does not very think yours, also remembers meIt is not at all easy Ask that a phone call for you, our memory has specially been fabricated to photograph album by me, has also write envelope letter, clickthrough http:// Photo.com/cn/HNQ/ ", including connection " http://photo.com/cn/HNQ/”;
2., based on the rubbish keyword in rubbish keyword database, the text included in the note for getting is " good recently So long no contact does not very think yours, also remembers meNot at all easy to ask that a phone call for you, I am specially by our memory system Be made photograph album, also write envelope letter, clickthrough " in matched, match it is unsuccessful;
3. link " the http for being included based on the note for getting://photo.com/cn/HNQ/ " links data in rubbish Matched in storehouse, matching is unsuccessful, judges that the note is not junk information;
4. note is shown;
Examples detailed above gives the typical application scenarios of another kind of information intercepting method according to the embodiment of the present application.
Further, if user checks note, after clickthrough, it is found that this is linked as false link, then by display Note is labeled as junk information, and above-mentioned false link " http is filled in rubbish contents://photo.com/cn/ HNQ/ ", that is, show for the note to be judged as that the foundation of junk information is that the rubbish that is linked as that note includes is linked.If user Without the time or be inconvenient to fill in rubbish contents, then " rubbish link " can be chosen in rubbish contents list.Receive use After the feedback at family, you can above-mentioned link is updated to into rubbish linked database.
If user has only carried out marking the content without filling in junk information to junk information, rubbish is not chosen yet Any option in rubbish contents list, then can complete relative refuse by server side manual analysis or according to automatic identification strategy The renewal of database.
Fig. 3 is the schematic flow sheet of the information intercepting method according to another preferred embodiment of the present invention.As shown in figure 3, The information intercepting method of this preferred embodiment includes:
Step S302, receives the multimedia message PUSH message that MMS center is issued;
Step S304, parses multimedia message PUSH message, obtains sender number, subject text, the storage address of multimedia message;
Step S306, the sender number and subject text based on the multimedia message for getting judges whether multimedia message is rubbish letter Breath, if it is goes to step S316, if not then going to step S308;
Step S308, if multimedia message is not junk information, based on the storage address of multimedia message, connects MMS center, downloads The source data of multimedia message;
Step S310, parses the source data of multimedia message, parses text therein, annex, content of multimedia;
Step S312, obtains the content of multimedia message, including obtains the text for parsing, and obtains the text that annex is included;Base In the text that the text and annex that parse are included, number therein and/or link are extracted;
Step S314, based on the text of the multimedia message for getting, number, and/or link, judges whether the multimedia message is rubbish letter Breath, if it is goes to step S316, if not then going to step S320;
Step S316, if the multimedia message is junk information, intercepting multimedia message;
Step S318, deletes multimedia message;
Step S320, if the multimedia message is not junk information, shows multimedia message.
For note, the reception process CIMS of multimedia message is special also increasingly complex.At present, the reception flow process of multimedia message It is to receive the multimedia message PUSH message that other side sends first, mobile terminal is opened when receiving, and can parse multimedia message according to multimedia message PUSH Address, multimedia message data is downloaded after dial-up connection MMS center according to the address of parsing, and parses multimedia message data for locally can be just The text often read and multimedia messages.
Based on above-mentioned reception flow process, for multimedia message, first intercept process can be carried out according to the number of originator, be passed through The number information of matching inquiry other side, if the number of other side is the number of trust, it will MMS content is received, otherwise by coloured silk Letter notifies to abandon or move it in interception storehouse;Further, can be parsing the master of multimedia message from multimedia message PUSH message Topic content, then once judged based on subject content.
Preferably, the number and subject text of the above-mentioned sender based on the multimedia message for getting judges whether multimedia message is rubbish Information can include:
Based on the rubbish keyword in rubbish keyword database, carry out in the subject text of the multimedia message for getting Match somebody with somebody, if the match is successful, judge the multimedia message for junk information;
Based on the sender number of the multimedia message for getting, matched in rubbish number database, if the match is successful Then judge that multimedia message is junk information.
Generally speaking, this preferred embodiment provides such a method, when multimedia message PUSH message is received, root first According to the number and subject content that receive PUSH message dissection process other side, for number and subject content carry out security inspection Survey, for example whether the number is drawn black, or is labeled as harassing classification by other users, if it is unsafe information to detect When, interception filtration treatment is carried out, do not carry out receiving the process of multimedia message.It is automatic on backstage after the pre-detection of previous step The download flow process of multimedia message is initiated, this processing procedure is for a user transparent processing procedure.After the completion of multimedia message data is downloaded, Because the data downloaded from MMS center are binary data, therefore firstly the need of solving according to the specification protocol of multimedia message to it Analysis is processed, and obtains the multimedia messages of text in multimedia message and correlation.For the text for parsing, extract in text number Code and website information (common garbage multimedia messages content is exactly the inside comprising unsafe number for connecting and there is risk), Detection identification is carried out to the number and website information in content, while to the text envelope in the overall text and annex of multimedia message Breath carries out resolved detection process.If detecting dangerous or rubbish contents, directly on backstage filtration intercept process will be carried out, User is not notified that, to realize to the glitch-free process of user.Only user is just notified by the MMS content of detection, and on boundary Specific MMS content presentation of information is provided on face.
The key point of such scheme is, for the multimedia message PUSH message for receiving, first according to number and subject content Pre- intercept process is carried out, after safety detection, just goes to multimedia message service center to download specific MMS content according to multimedia message PUSH, For the MMS content for downloading, safety detection process can be carried out to text, number and link, just can after verification User is notified, otherwise directly in backstage carries out intercepting deletion or immigration interception storehouse.
Scheme by more than, it is possible to achieve effective interception of garbage multimedia messages content, allows user to receive safe and reliable MMS content, improves the experience property that user uses.
Above-described embodiment is illustrated below by a specific example.
So that mobile terminal receives multimedia message as an example, then the interception process of information is as follows:
1. the multimedia message PUSH message that MMS center is issued is received;
2. parse after multimedia message PUSH message, the sender number of acquisition multimedia message is " 139xxxx1234 ", and subject text is " good news ", storage address is " http//mmsc.moternet.com ";
3. based on " 139xxxx1234 ", " good news " that get respectively with rubbish number database, rubbish keyword number Match according to storehouse, match unsuccessful;
4. according to address http//mmsc.moternet.com, connect MMS center, download the source data of multimedia message;
5. the source data of multimedia message is parsed, the MMS content for obtaining is parsed for " you are good!Your phone number is by ZTV 《The good sound of China》Program set backstage random selection is lucky gate spectator number outside the venue, and you will obtain pleasantly surprised cash and apple notebook electricity One, brain, asks computer login activity in time official website to be checked and accepted." an and annex, the content that annex is included for " it is more pleasantly surprised, please visit Ask www.zjhsyq.com ";
6. " you are good to obtain text!Your phone number is by ZTV《The good sound of China》Take out at random on program set backstage Elect lucky gate spectator number outside the venue as, you will obtain pleasantly surprised cash and apple notebook computer one, ask the computer official of login activity in time Net is checked and accepted " and " more pleasantly surprised, www.zjhsyq.com please be access ", and extract link " www.zjhsyq.com ";
7. carried out respectively at rubbish keyword database and rubbish linked database with linking based on the text that gets Match somebody with somebody, wherein " www.zjhsyq.com " is with rubbish linked database, and the match is successful, judge the multimedia message for junk information;
8. intercepting multimedia message;
9. multimedia message is deleted.
Examples detailed above gives a kind of typical application scenarios of the information intercepting according to the embodiment of the present application, certainly, in reality In the application of border, the content that packet contains is diversified, and the content based on the note or multimedia message that get is believed with corresponding rubbish Breath database matching amount can increase.
In addition, examples detailed above is based on, if based on the text and link and corresponding rubbish keyword database that get Match with rubbish linked database unsuccessful, then show multimedia message.
Corresponding to above-mentioned information intercepting method, the embodiment of the present invention additionally provides a kind of corresponding information intercepting device, During any type of terminal device can be set.Fig. 4 is that the structure of information intercepting device according to an embodiment of the invention is shown It is intended to.As shown in figure 4, information intercepting device according to embodiments of the present invention can include:
Acquisition module 10, is configured to obtain the content of note or multimedia message, wherein, the above includes:Text, number and/ Or link;
First judge module 20, is configured to text, number, and/or link that the note that gets or multimedia message include, Judge whether the note or multimedia message are junk information;
Blocking module 30, is configured to, when the note or multimedia message are junk information, intercept the note or multimedia message.
In a preferred embodiment of the invention, as shown in figure 5, above- mentioned information blocking apparatus can also include:
Memory module 40, is configured to by note or multimedia message storage in interception storehouse, and points out user;
Second display module 50, is configured to the instruction in response to user, shows note or multimedia message
First display module 60, is configured to when said short message or multimedia message are not junk information, then show said short message or Multimedia message;
Update module 70, is configured to count the quantity of the user that the note of display or multimedia message are labeled as junk information, such as Really the quantity exceedes predetermined threshold value, then according to note or the content update rubbish keyword database of multimedia message, rubbish number number According to storehouse, and/or rubbish linked database;
In a preferred embodiment of the invention, as shown in figure 5, the first judge module 20 can include:
First matching unit 21, the rubbish keyword being configured in rubbish keyword database is short what is got Matched in the text that letter or multimedia message include, if the match is successful, judge the note or multimedia message for junk information;
Second matching unit 22, is configured to the number that the note that gets or multimedia message include, in rubbish number data Matched in storehouse, if the match is successful, judge the note or multimedia message for junk information;And/or
3rd matching unit 23, is configured to the link that the note that gets or multimedia message include, in rubbish data are linked Matched in storehouse, if the match is successful, judge the note or multimedia message for junk information.
In a preferred embodiment of the invention, as shown in figure 5, update module 70 can include:
First updating block 71, the rubbish contents for being configured to be filled according to user update corresponding junk data storehouse;With/ Or
Second updating block 72, is configured in corresponding to the option chosen in rubbish contents attribute list according to user Hold and update corresponding junk data storehouse.
In a preferred embodiment of the invention, as shown in figure 5, update module 70 can also include:
3rd updating block 73, is configured to analyze note or multimedia message in server side, and acquisition causes user by note or coloured silk Beacon is designated as the content of junk information, and updates rubbish keyword database, rubbish number database, and/or rubbish link number According to storehouse.
In a preferred embodiment of the invention, as shown in fig. 6, above- mentioned information blocking apparatus also include:
Receiver module 80, is configured to receive the multimedia message PUSH message that MMS center is issued;
First parsing module 90, is configured to parse multimedia message PUSH message, obtain the sender number of multimedia message, subject text, Storage address;
Second judge module 100, is configured to the sender number and subject text of the multimedia message of acquisition, judges the multimedia message Whether it is junk information;
Download module 110, is configured to when the multimedia message is not junk information, and based on the storage address of the multimedia message, connection is color Letter center, downloads the source data of the multimedia message;
Second parsing module 120, is configured to parse the source data of multimedia message.
In a preferred embodiment of the invention, as shown in fig. 6, above- mentioned information blocking apparatus can also include:
Removing module 130, is configured to delete note or multimedia message.
In a preferred embodiment of the invention, as shown in fig. 6, the second judge module 100 can include:
4th matching unit 101, the rubbish keyword being configured in rubbish keyword database, in the coloured silk for getting Matched in the subject text of letter, if the match is successful, judge the multimedia message for junk information;
5th matching unit 102, is configured to the sender number of multimedia message for getting, in rubbish number database Matched, if the match is successful, judge the multimedia message for junk information.
In a preferred embodiment of the invention, as shown in fig. 6, the second parsing module 120 can include:
Resolution unit 121, being configured to the source data to multimedia message carries out dissection process, parses text therein, annex, many Media content;
Acquisition module 10 can also include:
Acquiring unit 11, is configured to obtain the text for parsing, and obtains the text that annex is included;
Extraction unit 12, is configured to the text that the text that parses and annex are included, extract number therein and/ Or link.
This application provides a kind of significantly more efficient information intercepting scheme, when it is mobile-terminated receive note or multimedia message when, can With the text, number and/or the link that include in first obtaining note or multimedia message, connect according to the text, number and/or short chain that get Matched with corresponding rubbish keyword database, rubbish number database and/or rubbish linked database respectively, so as to Judge whether the note or multimedia message are junk information, if it is determined that junk information is then intercepted, it is not that junk information then shows.Such as The really mobile-terminated information for receiving is multimedia message, then the multimedia message PUSH message that first can be issued to MMS center carries out pre-detection, only Having can just download the source data of the multimedia message by the multimedia message PUSH message of pre-detection.Again on the basis of such scheme, if user The note of display or multimedia message are labeled as into junk information, then count the user that the note of display or multimedia message are labeled as junk information Quantity, when this quantity exceedes predetermined threshold value, then according to the corresponding junk data storehouse of content update of note or multimedia message.User In mark, note or the specific rubbish contents of multimedia message are could fill out, also can be chosen in the rubbish contents list for providing the user Corresponding rubbish contents, if user is only marked without filling in rubbish contents to junk information, do not choose rubbish Contents list, then can complete rubbish keyword database, rubbish by server side manual analysis or using automatic identification strategy The renewal of number database and/or rubbish linked database.So as to while realizing that junk information is effectively intercepted, constantly improve Corresponding junk information database, allows user to receive more safe and reliable information, greatly improves Consumer's Experience.
In specification mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of without these details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand one or more in each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The more features of feature that the application claims ratio of shield is expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Unit or component are combined into a module or unit or component, and can be divided in addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit is excluded each other, can adopt any Combine to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification is (including adjoint power Profit is required, summary and accompanying drawing) disclosed in each feature can it is identical by offers, be equal to or the alternative features of similar purpose carry out generation Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment required for protection one of arbitrarily Can in any combination mode using.
The present invention all parts embodiment can be realized with hardware, or with one or more processor operation Software module realize, or with combinations thereof realization.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) to realize information intercepting device according to embodiments of the present invention in some or The some or all functions of person's whole part.The present invention is also implemented as perform method as described herein one Divide the equipment or program of device (for example, computer program and computer program) of either whole.It is such to realize this Bright program can be stored on a computer-readable medium, or can have the form of one or more signal.It is such Signal can be downloaded from internet website and obtained, or be provided on carrier signal, or be provided in any other form.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design without departing from the scope of the appended claims alternative embodiment.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and be run after fame Claim.
So far, although those skilled in the art will appreciate that detailed herein illustrate and describe multiple showing for the present invention Example property embodiment, but, without departing from the spirit and scope of the present invention, still can be direct according to present disclosure It is determined that or deriving many other variations or modifications for meeting the principle of the invention.Therefore, the scope of the present invention is understood that and recognizes It is set to and covers all these other variations or modifications.
According to an aspect of the invention, there is provided a kind of a kind of information intercepting method of A1., including:
The content of note or multimedia message is obtained, wherein, the content includes:Text, number, and/or link;
Based on text, number, and/or link that the note or multimedia message that get include, the note or coloured silk are judged Whether letter is junk information;
If the note or multimedia message are junk information, the note or multimedia message are intercepted.
A2. the method according to A1, wherein, the text included based on the note for getting or multimedia message, number Code, and/or link, judge whether the note or multimedia message are that junk information includes:
Based on the rubbish keyword in rubbish keyword database, in the text that the note or multimedia message for getting includes In matched, if the match is successful, judge the note or multimedia message for junk information;
Based on the number that the note or multimedia message that get include, matched in rubbish number database, if The match is successful, then judge the note or multimedia message for junk information;And/or
Based on the link that the note or multimedia message that get include, matched in rubbish linked database, if The match is successful, then judge the note or multimedia message for junk information.
A3. the method according to A1, wherein, before the content of the acquisition multimedia message, also include:
Receive the multimedia message PUSH message that MMS center is issued;
The multimedia message PUSH message is parsed, sender number, subject text, the storage address of the multimedia message is obtained;
Sender number and subject text based on the multimedia message for obtaining, judges whether the multimedia message is junk information;
If the multimedia message is not junk information, based on the storage address of the multimedia message, connect the MMS center, under Carry the source data of the multimedia message;
Parse the source data of the multimedia message.
A4. the method according to A3, wherein, the sender number and theme text based on the multimedia message for obtaining This, judges whether the multimedia message is that junk information includes:
Based on the rubbish keyword in rubbish keyword database, carry out in the subject text of the multimedia message for getting Matching, if the match is successful, judges the multimedia message for junk information;
Based on the sender number of the multimedia message for getting, matched in rubbish number database, if matching Success, then judge the multimedia message for junk information.
A5. the method according to A3, wherein,
The source data for parsing the multimedia message includes:
Dissection process is carried out to the source data of the multimedia message, text therein, annex, content of multimedia is parsed;
The content for obtaining multimedia message includes:
The text that acquisition is parsed, and obtain the text that the annex is included;
Based on the text that the text and the annex that parse are included, number therein and/or link are extracted.
A6. the method according to A2, wherein, also include:
If the note or multimedia message are not junk information, the note or multimedia message are shown;
The quantity of the user that the note for showing or multimedia message are labeled as junk information is counted, if the quantity exceedes Predetermined threshold value, then according to the note or the content update of multimedia message rubbish keyword database, rubbish number database, And/or rubbish linked database.
A7. the method according to A6, wherein, the rubbish according to the note or the content update of multimedia message is crucial Word database, rubbish number database, and/or rubbish linked database include:
The rubbish according to user is filled in the note for showing or multimedia message content update when being labeled as junk information Rubbish keyword database, rubbish number database, and/or rubbish linked database;And/or
The note for showing or multimedia message are chosen when being labeled as junk information in rubbish contents list according to user Rubbish keyword database, rubbish number database, and/or rubbish linked database described in content update corresponding to option.
A8. the method according to A6, wherein, the rubbish according to the note or the content update of multimedia message is crucial Word database, rubbish number database, and/or rubbish linked database include:
The note or multimedia message are analyzed in server side, acquisition causes user that the note or multimedia message are labeled as into rubbish letter The content of breath, and update the rubbish keyword database, rubbish number database, and/or rubbish linked database.
A9. the method according to any one of A1-A8, wherein, it is described to intercept after the note or multimedia message, also include:
Delete the note or multimedia message.
A10. the method according to any one of A1-A8, wherein, it is described to intercept after the note or multimedia message, also include:
By the note or multimedia message storage in interception storehouse, and point out user;
In response to the instruction of user, the note or multimedia message are shown.
According to another aspect of the present invention, a kind of information intercepting devices of B11. are additionally provided, including:
Acquisition module, is configured to obtain the content of note or multimedia message, wherein, the content includes:Text, number, and/or Link;
First judge module, is configured to text, number, and/or chain that the note that gets or multimedia message include Connect, judge whether the note or multimedia message are junk information;
Blocking module, is configured to, when the note or multimedia message are junk information, intercept the note or multimedia message.
B12. the device according to B11, wherein, first judge module includes;
First matching unit, the rubbish keyword being configured in rubbish keyword database, described in getting Matched in the text that note or multimedia message include, if the match is successful, judge the note or multimedia message for junk information;
Second matching unit, is configured to the number that the note that gets or multimedia message include, in rubbish number number According to being matched in storehouse, if the match is successful, judge the note or multimedia message for junk information;And/or
3rd matching unit, is configured to the link that the note that gets or multimedia message include, in rubbish number is linked According to being matched in storehouse, if the match is successful, judge the note or multimedia message for junk information.
B13. the device according to B11, wherein, also include:
Receiver module, is configured to receive the multimedia message PUSH message that MMS center is issued;
First parsing module, is configured to parse the multimedia message PUSH message, obtains sender number, the theme of the multimedia message Text, storage address;
Second judge module, is configured to the sender number and subject text of the multimedia message of acquisition, judges described Whether multimedia message is junk information;
Download module, is configured to when the multimedia message is not junk information, based on the storage address of the multimedia message, connects institute MMS center is stated, the source data of the multimedia message is downloaded;
Second parsing module, is configured to parse the source data of the multimedia message.
B14. the device according to B13, wherein, second judge module includes;
4th matching unit, the rubbish keyword being configured in rubbish keyword database, described in getting Matched in the subject text of multimedia message, if the match is successful, judge the multimedia message for junk information;
5th matching unit, is configured to the sender number of the multimedia message for getting, in rubbish number database In matched, if the match is successful, judge the multimedia message for junk information.
B15. the device according to B13, wherein,
Second parsing module includes:
Resolution unit, is configured to carry out dissection process to the source data of the multimedia message, parse text therein, annex, Content of multimedia;
The acquisition module includes:
Acquiring unit, is configured to obtain the text for parsing, and obtains the text that the annex is included;
Extraction unit, is configured to the text that the text that parses and the annex are included, and extracts therein Number and/or link.
B16. the device according to B12, wherein, also include:
First display module, is configured to, when the note or multimedia message are not junk information, show the note or multimedia message;
Update module, is configured to count the quantity of the user that the note for showing or multimedia message are labeled as junk information, If the quantity exceedes predetermined threshold value, the rubbish keyword data according to the note or the content update of multimedia message Storehouse, rubbish number database, and/or rubbish linked database.
B17. the device according to B16, wherein, the update module includes:
First updating block, is configured to the note for showing or multimedia message be filled out when being labeled as junk information according to user Rubbish keyword database, rubbish number database, and/or rubbish linked database described in the content update write;And/or
Second updating block, in rubbish when being configured to that the note for showing or multimedia message be labeled as into junk information according to user Rubbish keyword database described in the content update corresponding to option chosen in rubbish contents list, rubbish number database and/ Or rubbish linked database.
B18. the device according to B16, wherein, the update module includes:
3rd updating block, is configured to analyze the note or multimedia message in server side, and acquisition causes the user will be described short Letter or multimedia message are labeled as the content of junk information, and update the rubbish keyword database, rubbish number database, and/or Rubbish linked database.
B19. the device according to any one of B11-B18, wherein, also include:
Removing module, is configured to delete the note or multimedia message.
B20. the device according to any one of B11-B18, wherein, also include:
Memory module, is configured to by the note or multimedia message storage in interception storehouse, and points out user;Second shows mould Block, is configured to the instruction in response to user, shows the note or multimedia message.

Claims (10)

1. a kind of information intercepting method, including:
The content of note or multimedia message is obtained, wherein, the content includes:Text, number, and/or link;
Based on text, number, and/or link that the note or multimedia message that get include, judge that the note or multimedia message are It is no for junk information;
If the note or multimedia message are junk information, the note or multimedia message are intercepted.
2. method according to claim 1, wherein, the text included based on the note for getting or multimedia message, Number, and/or link, judge whether the note or multimedia message are that junk information includes:
Based on the rubbish keyword in rubbish keyword database, enter in the text that the note or multimedia message for getting includes Row matching, if the match is successful, judges the note or multimedia message for junk information;
Based on the number that the note or multimedia message that get include, matched in rubbish number database, if matching Success, then judge the note or multimedia message for junk information;And/or
Based on the link that the note or multimedia message that get include, matched in rubbish linked database, if matching Success, then judge the note or multimedia message for junk information.
3. method according to claim 1, wherein, before the content of the acquisition multimedia message, also include:
Receive the multimedia message PUSH message that MMS center is issued;
The multimedia message PUSH message is parsed, sender number, subject text, the storage address of the multimedia message is obtained;
Sender number and subject text based on the multimedia message for obtaining, judges whether the multimedia message is junk information;
If the multimedia message is not junk information, based on the storage address of the multimedia message, connect the MMS center, download institute State the source data of multimedia message;
Parse the source data of the multimedia message.
4. method according to claim 3, wherein, the sender number and theme text based on the multimedia message for obtaining This, judges whether the multimedia message is that junk information includes:
Based on the rubbish keyword in rubbish keyword database, carry out in the subject text of the multimedia message for getting Match somebody with somebody, if the match is successful, judge the multimedia message for junk information;
Based on the sender number of the multimedia message for getting, matched in rubbish number database, if the match is successful, Then judge the multimedia message for junk information.
5. method according to claim 3, wherein,
The source data for parsing the multimedia message includes:
Dissection process is carried out to the source data of the multimedia message, text therein, annex, content of multimedia is parsed;
The content for obtaining multimedia message includes:
The text that acquisition is parsed, and obtain the text that the annex is included;
Based on the text that the text and the annex that parse are included, number therein and/or link are extracted.
6. method according to claim 2, wherein, also include:
If the note or multimedia message are not junk information, the note or multimedia message are shown;
The quantity of the user that the note for showing or multimedia message are labeled as junk information is counted, if the quantity exceedes made a reservation for Threshold value, then according to the note or the content update of multimedia message rubbish keyword database, rubbish number database and/ Or rubbish linked database.
7. method according to claim 6, wherein, the rubbish according to the note or the content update of multimedia message is closed Keyword database, rubbish number database, and/or rubbish linked database include:
The rubbish according to user is filled in the note for showing or multimedia message content update when being labeled as junk information is closed Keyword database, rubbish number database, and/or rubbish linked database;And/or
According to the option that user chooses the note for showing or multimedia message in rubbish contents list when being labeled as junk information Rubbish keyword database, rubbish number database, and/or rubbish linked database described in corresponding content update.
8. method according to claim 6, wherein, the rubbish according to the note or the content update of multimedia message is closed Keyword database, rubbish number database, and/or rubbish linked database include:
The note or multimedia message are analyzed in server side, acquisition causes user that the note or multimedia message are labeled as into junk information Content, and update the rubbish keyword database, rubbish number database, and/or rubbish linked database.
9. the method according to any one of claim 1-8, wherein, it is described to intercept after the note or multimedia message, also include:
Delete the note or multimedia message.
10. a kind of information intercepting device, including:
Acquisition module, is configured to obtain the content of note or multimedia message, wherein, the content includes:Text, number, and/or chain Connect;
First judge module, is configured to text, number, and/or link that the note that gets or multimedia message include, sentences Whether the note of breaking or multimedia message are junk information;
Blocking module, is configured to, when the note or multimedia message are junk information, intercept the note or multimedia message.
CN201611092144.XA 2016-12-01 2016-12-01 Information interception method and device Pending CN106658437A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611092144.XA CN106658437A (en) 2016-12-01 2016-12-01 Information interception method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611092144.XA CN106658437A (en) 2016-12-01 2016-12-01 Information interception method and device

Publications (1)

Publication Number Publication Date
CN106658437A true CN106658437A (en) 2017-05-10

Family

ID=58814733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611092144.XA Pending CN106658437A (en) 2016-12-01 2016-12-01 Information interception method and device

Country Status (1)

Country Link
CN (1) CN106658437A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110475216A (en) * 2019-08-21 2019-11-19 何翠媚 A method of optimization information processing
CN110971619A (en) * 2020-01-02 2020-04-07 惠州学院 Network technology security system and method with bad information filtering processing
CN111782986A (en) * 2019-05-17 2020-10-16 北京京东尚科信息技术有限公司 Method and device for monitoring access based on short link

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100589609C (en) * 2007-09-30 2010-02-10 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
CN103391547A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Information processing method and terminal
CN103607705A (en) * 2013-12-04 2014-02-26 北京网秦天下科技有限公司 Junk message filtering method and engine

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100589609C (en) * 2007-09-30 2010-02-10 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
CN103391547A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Information processing method and terminal
CN103607705A (en) * 2013-12-04 2014-02-26 北京网秦天下科技有限公司 Junk message filtering method and engine

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111782986A (en) * 2019-05-17 2020-10-16 北京京东尚科信息技术有限公司 Method and device for monitoring access based on short link
CN110475216A (en) * 2019-08-21 2019-11-19 何翠媚 A method of optimization information processing
CN110971619A (en) * 2020-01-02 2020-04-07 惠州学院 Network technology security system and method with bad information filtering processing

Similar Documents

Publication Publication Date Title
CN106792579A (en) A kind of multimedia message hold-up interception method and device
CN104125547B (en) Handle the method and short message processing device of short message
CN104010085B (en) Message treatment method and device
CN104079475A (en) Message processing method and system
CN105589845B (en) Rubbish text recognition methods, apparatus and system
CN104021339A (en) Safety payment method and device for mobile terminal
CN103825888A (en) Network threat processing method and apparatus
CN103685307A (en) Method, system, client and server for detecting phishing fraud webpage based on feature library
Draper et al. Selecting the “best” regression equation
CN105335354A (en) Cheat information recognition method and device
RU2576495C2 (en) System and method for global directory service
CN105391674A (en) Information processing method and system, server, and client
CN104038613B (en) The method and apparatus of information security management
CN106658437A (en) Information interception method and device
CN104202345A (en) Verification code generating method, device and system
CN104010064A (en) Networking number search method and device
CN104010075A (en) Application service providing method and device
CN109040097A (en) A kind of defence method of cross-site scripting attack, device, equipment and storage medium
CN106844104B (en) A kind of terminal data processing method, device and mobile terminal
CN110084064A (en) Big data analysis processing method and system based on terminal
CN104766013A (en) Skip list based cross-site scripting attack defense method
CN105430009A (en) Network access method, terminal and gateway server
CN101389085A (en) Rubbish short message recognition system and method based on sending behavior
CN103618824B (en) Method and the mobile terminal of information transmission is carried out in address list program
CN102938785A (en) Malicious information reporting and treating method for search engine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170720

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication