CN106685796A - Information identification method, device and system - Google Patents
Information identification method, device and system Download PDFInfo
- Publication number
- CN106685796A CN106685796A CN201610494211.4A CN201610494211A CN106685796A CN 106685796 A CN106685796 A CN 106685796A CN 201610494211 A CN201610494211 A CN 201610494211A CN 106685796 A CN106685796 A CN 106685796A
- Authority
- CN
- China
- Prior art keywords
- information
- instant communication
- communication information
- user
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Interoperability with other network applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an information identification method, device and system. Instant messaging (IM) information is received; whether a sending subscriber belongs to a preset contact set is determined according to a subscriber identity carried in the IM information; if YES, content of the IM information is extracted, and the IM information is identified according to the content; and otherwise, the sending subscriber does not belong to the preset contact set, and the IM information is identified according to the subscriber identity. Thus, the interception effect can be improved greatly, and the information safety is improved.
Description
Technical field
The present invention relates to communication technical field, and in particular to a kind of information identifying method, device and system.
Background technology
In recent years, communication technology has obtained development at full speed, at the same time, various harassing and wrecking notes,
And fraud information is also increasingly to spread unchecked, for this purpose, how these information are identified and be intercepted, also into
Concerned problem.
In the prior art, typically information can be identified and is blocked by the way of white and black list
Cut, such as, when terminal receives a note, it can be determined that whether the number belonging to the note is in white list
In, if in white list, not intercepted, otherwise, if not in white list, judging the note institute
Whether the number of category is located in blacklist, if in blacklist, being intercepted, if not in blacklist,
Then do not carry out intercepting, etc..This mode, to a certain extent can to a part junk information, than
Such as harass note and fraud information is intercepted, but, because existing many junk information are when sending,
All checked numbers by pseudo-base station and pretended, such as, and the number of the operator that disguises oneself as or user contact's
Number, etc., therefore, for such information, can not by the way of white and black list
The effect of interception is reached, it is the disguise oneself as number of operator or the number of user contact to be additionally, since, because
This, the cheated probability of user is also larger, easily causes user's property loss, or user terminal is subjected to
The invasion of viral wooden horse, that is to say, that currently existing scheme interception result is not good, leverages information
Safety.
The content of the invention
The embodiment of the present invention provides a kind of information identifying method, device and system, can improve interception result,
The safety of raising information.
The embodiment of the present invention provides a kind of information identifying method, including:
Instant communication information is received, the instant communication information carries the ID for sending user;
Determine whether the transmission user belongs to default linkman set according to the ID;
If belonging to default linkman set, the content of the instant communication information is extracted, determine the content
Whether meet pre-conditioned, if meeting condition, the instant communication information is intercepted, if being unsatisfactory for
Condition, then be identified according to the ID to the instant communication information;
If being not belonging to default linkman set, the instant communication information is carried out according to the ID
Identification.
Accordingly, the embodiment of the present invention also provides a kind of information recognition device, including:
Receiving unit, for receiving instant communication information, the instant communication information carries the use for sending user
Family identifies;
Determining unit, for determining whether the transmission user belongs to default contact person according to the ID
Set;
First recognition unit, for determining that the transmission user belongs to default linkman set in determining unit
When, the content of the instant communication information is extracted, determine whether the content meets pre-conditioned, if meeting,
Then the instant communication information is intercepted;If being unsatisfactory for, trigger the second recognition unit and perform according to institute
State the operation that ID is identified to the instant communication information;
Second recognition unit, for determining that the transmission user is not belonging to default linkman set in determining unit
When, or, when the first recognition unit determines that the content is unsatisfactory for pre-conditioned, marked according to the user
Knowledge is identified to the instant communication information.
Additionally, the embodiment of the present invention also provides a kind of information identification system, including the embodiment of the present invention is provided
Any one information recognition device.
The embodiment of the present invention is adopted and receives instant communication information, according to the user carried in the instant communication information
Mark determines whether transmission user belongs to default linkman set, if so, then extracts the instant communication information
Content, the instant communication information is identified according to the content;Otherwise, if being not belonging to default contact person
Set, then be identified according to the ID to the instant communication information;Because the program is for default
It is the instant communication information that sent of user in people's set, can makees further to know by extracting content
Not, it can thus be avoided due to sending user to user mark, such as phone number carries out camouflage to be caused
Identification mistake the occurrence of, can substantially improve interception result, improve the safety of information.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to institute in embodiment description
The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only the present invention
Some embodiments, for those skilled in the art, on the premise of not paying creative work, also
Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 a are the schematic diagram of a scenario of information identifying method provided in an embodiment of the present invention;
Fig. 1 b are the schematic flow sheets of information identifying method provided in an embodiment of the present invention;
Fig. 2 is another schematic flow sheet of information identifying method provided in an embodiment of the present invention;
Fig. 3 a are the structural representations of information recognition device provided in an embodiment of the present invention;
Fig. 3 b are another structural representations of information recognition device provided in an embodiment of the present invention;
Fig. 4 is the structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not making creative labor
The every other embodiment obtained under the premise of dynamic, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of information identifying method, device and system.
Wherein, the information identification system can include information recognition device, and the information recognition device specifically can be with
It is integrated in the terminal, additionally, the information identification system can also include other equipment, such as server (such as
Cloud device), for when the key message of terminal transmission is received, verifying to the key message,
Such as, the key message can be matched with default high in the clouds checking information, and return matching result to
Terminal, etc..
For example, as shown in Figure 1a, the terminal can receive instant communication information, then, according to the IMU
The ID carried in news information determines whether transmission user belongs to default linkman set, if so, then
Extract the content of the instant communication information, instant communication information is identified according to the content, such as, and can
To pass through to extract the key message in the content, the key message is supplied to into server, and the reception server
The matching result of return, determines the need for intercepting the instant communication information according to matching result,
Etc.;Otherwise, if the ID is not belonging to default linkman set, such as, the user is not in communication
In record, then instant communication information is identified according to the ID, such as using blacklist and/or in vain
The mode of list is filtered and intercepted, etc., so as to realize not affecting existing instant messaging to believe as far as possible
On the premise of breath processes framework, improve interception result, there is provided the purpose of Information Security.
It is described in detail individually below, it should be noted that, the sequence number of following examples is excellent not as embodiment
The restriction of first order.
Embodiment one,
The present embodiment will be described from the angle of information recognition device, and the information recognition device specifically can collect
Into in terminal, such as receiving terminal, the terminal can include mobile phone, panel computer, notebook computer,
Or the equipment such as personal computer (PC, Personal Computer).
A kind of information identifying method, including:Instant communication information is received, the instant communication information is carried and sent
The ID of user;Determine whether transmission user belongs to default linkman set according to the ID;
If so, the content of the instant communication information is then extracted, the instant communication information is identified according to the content;
If it is not, being then identified to the instant communication information according to the ID.
As shown in Figure 1 b, the idiographic flow of the information identifying method can be as follows:
101st, instant communication information is received.
For example, can specifically receive and send the instant communication information that terminal sends, wherein, the instant messaging letter
Breath can carry the information such as the ID of transmission user.
Wherein, the instant communication information can be included in short message, multimedia message and each instant messaging application
The information such as communication information;The ID can include terminal iidentification, such as user identity identification code (SIM,
Subscriber Identity Module) or terminal International Mobile Station Equipment Identification (IMEI, International
Mobile Equipment Identity) etc., or, the ID can also include user's name, user
The information such as the IMU signal of mailbox, and/or user.
102nd, determine whether transmission user belongs to default linkman set according to the ID, if so,
Then execution step 103, if it is not, then execution step 104.
Wherein, the linkman set can in advance be set up according to the demand of practical application, contact person's collection
Conjunction includes at least one contact person, such as, the linkman set is specifically as follows the receiving terminal locally or cloud
Address list, contact book, and/or buddy list that end preserves etc..
For example, address list is specially with the default linkman set, and transmission user is as a example by Zhang San, then
At this point it is possible to determine whether the Zhang San belongs in address list according to the ID, if being located at address list
In, then execution step 103, otherwise, if Zhang San is not in address list, execution step 104.
103rd, the content of the instant communication information is extracted, the instant communication information is known according to the content
Not;For example, can be as follows:
Determine whether the content meets pre-conditioned, if so, the instant communication information is intercepted;If it is not,
Then the instant communication information is identified according to the ID, i.e. execution step 104.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content
Meeting pre-conditioned mode can also have various, such as, and can be local (local i.e. in the receiving terminal)
It is identified, or, it is also possible to it is identified beyond the clouds, or, can be combined with local and high in the clouds together
Identification, etc., i.e., step " determining whether the content meets pre-conditioned " specifically can include:
Key message is extracted from the content, the key message and default local authentication information are carried out
Match somebody with somebody, if matching, it is determined that the content meets pre-conditioned;If mismatching, it is determined that the content is unsatisfactory for pre-
If condition.
Wherein, the key message can be extracted according to preset rules, such as, can be pre-set multiple
Key word, such as " get the winning number in a bond ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to set
Put the type of some contents for needing to extract, such as network address, telephone number and/or account etc..
After key message is extracted, just the key message for extracting can be believed with default local verification
Breath, such as default keyword, network address, telephone number and/or account etc. are matched, for example, if carrying
Network address " 123456789.com " is included in the key message for taking, and in default local authentication information
Exist " 123456789.com ", than the website corresponding to network address as already indicated " 123456789.com "
To swindle network address, then now, just can determine that the instant communication information is fraud information, so, it is to this
When communication information intercepted, otherwise, if not existing in default local authentication information
The relative recording of " 123456789.com ", then at this point it is possible to according to the ID to the instant messaging
Information is identified, i.e. execution step 104.
Wherein, local authentication information can be pre-stored in locally (i.e. reception according to the demand of practical application
In terminal), optionally, in order to improve the accuracy of identification, this locally can also be tested regularly or in real time
Card information is updated.
Optionally, in order to improve the accuracy of identification, if there is currently network, such as, the receiving terminal is
Networking, then can also be sent to the key message cloud device and be identified, i.e., in step " by the key
Information is matched with the checking information in default template " before, the information identifying method can also include:
Determine whether to network;If failed cluster, perform the key message and default local verification
The step of information is matched;If networking, the key message is sent to cloud device, receive high in the clouds and set
For the matching result returned after the key message is matched with default high in the clouds checking information, if the matching
As a result matching is indicated, it is determined that the content meets pre-conditioned, if the matching result indicates to mismatch, really
The fixed content is unsatisfactory for pre-conditioned.
Wherein, high in the clouds checking information can be pre-stored in cloud device according to the demand of practical application, can
Choosing, in order to improve the accuracy of identification, the end checking information can also be updated regularly or in real time,
Such as, according to each reporting of user in network or the information of report the high in the clouds checking information can be carried out in real time
Update, etc..
Optionally, it is also possible to directly the key message is sent to into cloud device to be identified, i.e., step is " true
Whether the fixed content meets pre-conditioned " can also include:
Key message is extracted from the content;The key message is sent to cloud device, so that cloud device will
The key message is matched with default high in the clouds checking information;Receive the matching result that cloud device is returned;
If the matching result indicates matching, it is determined that the content meets pre-conditioned;If the matching result is not indicated not
Match somebody with somebody, it is determined that the content is unsatisfactory for pre-conditioned.
104th, the instant communication information is identified according to the ID, for example, specifically can be as follows:
Determine whether transmission user is to preset the user in blacklist according to the ID, it is if so, then right
The instant communication information is intercepted;If it is not, the instant communication information is then shown, or, using default rule
After then filtering to the instant communication information, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding
White list, i.e., in step " in determining that whether transmission user be default blacklist according to the ID
Before user ", the information identifying method can also include:
Determine whether transmission user is to preset the user in white list according to the ID, if so, then show
Show the instant communication information;If it is not, just perform determining whether transmission user is default according to the ID
The step of user in blacklist.
Wherein, blacklist refers to arrange intransitable user, and white list is then with blacklist conversely, refer to
Be that the user that can pass through is set.
Optionally, for convenience user is operated, after intercepting to the instant communication information, also
Prompting message can be generated according to the instant communication information, and show the prompting message.
Wherein, the interface for asking to verify information can also be included in the prompting message, i.e., this connects
Mouth is mainly used in the checking request instruction of receive user triggering, to verify to the instant communication information, than
Such as, make further deep checking, or even carry out manual verification, etc., i.e., " show the prompting in step
After information ", the information identifying method can also include:
The checking request instruction triggered by interface user, by the checking request instruction high in the clouds is sent to
Equipment, receives the result that cloud device is returned according to the checking request instruction.
So, user just can determine whether the instant communication information safe according to the result, such as,
Whether it is fraud text message or distribution note, etc., so as to facilitate user to make further operation, such as,
Transmission user corresponding to the instant communication information is drawn in into blacklist, be added to contact person or to this i.e.
When communication information carry out reporting, etc., will not be described here.
From the foregoing, it will be observed that the present embodiment is carried using instant communication information is received according in the instant communication information
ID determine whether transmission user belongs to default linkman set, if so, then extract the IMU
The content of news information, is identified according to the content to the instant communication information;Otherwise, if being not belonging to preset
Linkman set, then be identified according to the ID to the instant communication information;Due to the program for
The instant communication information that user in default linkman set is sent, can be made into one by extracting content
Step identification, it can thus be avoided due to sending user to user mark, such as phone number carries out camouflage institute
Caused identification mistake the occurrence of, can substantially improve interception result, improve the safety of information.
Embodiment two,
Method according to described by embodiment one, is below described in further detail citing.
In the present embodiment, specifically will be integrated in terminal A with the information recognition device, and the instant messaging
Information is specially as a example by short message and illustrates.
As shown in Fig. 2 a kind of information identifying method, idiographic flow can be as follows:
201st, the short message that terminal A receive user first is sent by terminal B, wherein, the short message can be taken
The information such as the ID with user's first.
The ID can include terminal iidentification, such as SIM number (such as phone number) or IMEI
Code etc., or, the ID can also include that user's name, subscriber mailbox, and/or user's is instant
The information such as communication number.
202nd, terminal A determines whether user's first belongs to default linkman set according to the ID, if so,
Then execution step 203, if it is not, then execution step 205.
Wherein, the linkman set can in advance be set up according to the demand of practical application, contact person's collection
Conjunction includes at least one contact person, such as, the linkman set is specifically as follows the receiving terminal locally or cloud
Address list, contact book, and/or buddy list that end preserves etc..
For example, address list is specially with the default linkman set, and the ID is as a example by cell-phone number,
Then now, whether the cell-phone number that specifically can determine user's first is located in the address list of terminal A, if being located at logical
Believe in recording, then execution step 203, otherwise, if not being located in address list, execution step 204.
203rd, terminal A extracts the content of the short message, determines whether the content meets pre-conditioned, if so,
Then execution step 204, if it is not, then execution step 205.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content
Meeting pre-conditioned mode can also have various, it is for instance possible to use following any one mode:
(1) first kind of way;
Terminal A extracts key message from the content, locally tests what is preserved in the key message and terminal A
Card information is matched, if matching, it is determined that the content meets pre-conditioned, execution step 204;If no
Matching, it is determined that the content is unsatisfactory for pre-conditioned, execution step 205.
(2) second way;
Terminal A extracts key message from the content, and to cloud device the key message, cloud device are sent
After the key message is received, the key message is matched with default high in the clouds checking information, obtained
Matching result, and the matching result is returned to into terminal A, if the matching result indicates matching, terminal A
Determine that the content meets pre-conditioned, execution step 204;If the matching result indicates to mismatch, terminal
It is pre-conditioned that A determines that the content is unsatisfactory for, execution step 205.
(3) the third mode;
Terminal A extracts key message from the content, and determines whether to network;If failed cluster,
The key message is matched with the local authentication information preserved in terminal A, if matching, it is determined that this is interior
Appearance meets pre-conditioned, execution step 204;If mismatch, it is determined that the content be unsatisfactory for it is pre-conditioned,
Execution step 205;Otherwise, if currently networking, the key message is sent to cloud device, high in the clouds sets
It is standby to be matched the key message with default high in the clouds checking information after the key message is received, obtain
To matching result, and the matching result is returned to into terminal A, if the matching result indicates matching, terminal
A determines that the content meets pre-conditioned, execution step 204;If the matching result indicates to mismatch, eventually
Pre-conditioned, execution step 205 that end A determines that the content is unsatisfactory for.
Wherein, the key message can be extracted according to preset rules, such as, can be pre-set multiple
Key word, such as " get the winning number in a bond ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to set
Put some need extract contents type, such as network address, telephone number and/or Bank Account Number etc., then
When needing to extract key message, the method for canonical matching just can be adopted to extract net from the short message
Location, such as URL (URL, Uniform Resource Locator), and/or extract silver
Row account and telephone number etc., so as to obtain key message.
After key message is extracted, just can be by the key message for extracting and default local authentication information
Or high in the clouds checking information, such as default keyword, network address, telephone number and/or Bank Account Number etc. are carried out
Matching, for example, if including Bank Account Number " 123456789 " and telephone number in the key message for extracting
" 19000000000 ", and indicated silver in default high in the clouds checking information (or local authentication information)
Short message corresponding to row account " 123456789 " and telephone number " 19000000000 " is swindle network address,
Then now, just can determine that the short message is fraud information, so, the short message is intercepted, that is, hold
Row step 204;Otherwise, if there is no silver in default high in the clouds checking information (or local authentication information)
The relative recording of row account " 123456789 " and telephone number " 19000000000 ", then at this point it is possible to
The short message is identified according to the ID of user's first, i.e. execution step 205.
It should be noted that, in order to improve the accuracy of identification, can be regularly or in real time to local verification letter
Breath and high in the clouds checking information are updated, such as, can receive each terminal to report on network by cloud device
Or the information of report, then it is identified and counts according to these information, and high in the clouds is tested based on statistical result
Card information is updated.Further, it is also possible to by cloud device timing or in real time to the local verification in terminal
Information is updated, or, it is also possible to from terminal according to the demand timing of itself or in real time to cloud device
Download it is corresponding update bag, to be updated to the local authentication information in terminal, etc., here is no longer gone to live in the household of one's in-laws on getting married
State.
204th, terminal A is intercepted to the short message.
For example, terminal A can add the short message into default interception file, and not corresponding
Show in the inbox (normal short message can show in inbox) of short message, or, it is also possible to it is straight
Connect and delete the short message.
Optionally, for convenience user is operated, after intercepting to the short message, can be with root
Generate prompting message according to the short message, and show the prompting message, such as, can with pop-up, wicket or
The form of short message, shows the prompting message on the screen of terminal A.
Wherein, can be including the phone and report reported to the police or the network address for reporting etc. in the prompting message.
Optionally, the interface for asking to verify information can also be included in the prompting message, so,
After user's second receives the prompting message by terminal A, just can be by the corresponding checking of interface triggering
Request instruction so that the checking request instruction is sent to cloud device by terminal A, further to be tested
Card, such as make further deep checking or carry out manual verification, etc., then, receives cloud device and returns
The result for returning, so, user's second just can determine whether the short message is safe according to the result,
Such as, if for fraud text message or distribution note, etc., further operate so as to facilitate user's second to make,
Such as, the transmission user's first corresponding to the short message is drawn in blacklist, is added to contact person or to this
Short message is carried out reporting, etc., will not be described here.
205th, terminal A determines whether user's first is to preset the user in white list according to the ID,
If so, then execution step 207;If it is not, then execution step 206.
For example, if saving 3 telephone numbers in white list:“19000000001”、“19000000002”
" 19000000003 ", and the telephone number of user's first is " 19000000000 ", then now, just can be with
Determine that user's first is not belonging to the user in the white list, then execution step 206;If conversely, user's first
Telephone number be " 19000000001 ", " 19000000002 " and " 19000000003 " in it is any
One, such as be " 19000000001 ", then now, just can determine that user's first belongs in the white list
User, then execution step 207.
206th, terminal A determines whether transmission user is to preset the user in blacklist according to the ID,
If so, execution step 204 is then returned, if it is not, then execution step 207.
For example, if saving 2 telephone numbers in blacklist:" 19000000000 " and " 19000000004 ",
And the telephone number of user's first is " 19000000000 ", then now, just can determine that user's first belongs to this
User in blacklist, then intercepts to the short message, that is, return execution step 204;If conversely,
The telephone number of user's first is other numbers in addition to " 19000000000 " and " 19000000004 ",
It is such as " 19000000005 " or " 19000000006 ", then now, just can determine user's first not
Belong to the user in the blacklist, then execution step 207.
207th, terminal A is not intercepted to the short message, for example, can show the short message, such as existed
The short message, etc. is shown in the inbox of short message.
From the foregoing, it will be observed that the terminal of the present embodiment is after short message is received, can carry according in the short message
ID determine send user whether belong to default linkman set, if so, then extract the short message
Content, is identified according to the content to the short message;Otherwise, if being not belonging to default linkman set,
The short message is identified according to the ID;Because the program is for the use in default linkman set
The short message that family is sent, can make further identification by extracting content, it can thus be avoided due to
Send user to user mark, such as phone number carry out pretend institute caused by identification mistake situation
It is raw, interception result can be substantially improved, the safety of information is improved, lower user terminal and invaded and property
The probability of loss;Further, since after short message has been intercepted, corresponding prompting message can also be generated, and
Corresponding checking interface is provided, so, the convenience and friendly of operation can also be improved.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of information recognition device, such as schemes
Shown in 3a, the information recognition device includes receiving unit 301, determining unit 302, the first recognition unit 303
With the second recognition unit 304, it is as follows:
(1) receiving unit 301;
Receiving unit 301, for receiving instant communication information.
For example, receiving unit 301, specifically can be used for receiving the instant communication information for sending terminal transmission,
Wherein, the instant communication information can carry the information such as the ID of transmission user.
Wherein, the instant communication information can be included in short message, multimedia message and each instant messaging application
The information such as communication information;The ID can include terminal iidentification, such as IMEI of SIM or terminal etc.,
Or, the ID can also include the IMU signal of user's name, subscriber mailbox, and/or user
Etc. information.
(2) determining unit 302;
Determining unit 302, for determining whether transmission user belongs to default contact person according to the ID
Set.
Wherein, the linkman set can in advance be set up according to the demand of practical application, contact person's collection
Conjunction includes at least one contact person, such as, the linkman set is specifically as follows the receiving terminal locally or cloud
Address list, contact book, and/or buddy list that end preserves etc..
(3) first recognition units 303;
First recognition unit 303, for determining that transmission user belongs to default contact person's collection in determining unit 302
During conjunction, the content of the instant communication information is extracted, the instant communication information is identified according to the content.
For example, first recognition unit 303, is specifically determined for whether the content meets pre-conditioned;
If so, the instant communication information is intercepted;If it is not, then triggering the second recognition unit 304 performs basis
The operation that the ID is identified to the instant communication information.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content
Meeting pre-conditioned mode can also have various, such as, and can be local (local i.e. in the receiving terminal)
It is identified, or, it is also possible to it is identified beyond the clouds, or, can be combined with local and high in the clouds together
Identification, etc., i.e.,:
First recognition unit 303, specifically for extracting key message from the content, by the key message
Matched with default local authentication information, if matching, it is determined that the content meets pre-conditioned, if not
Matching, it is determined that the content is unsatisfactory for pre-conditioned.
Wherein, the key message can be extracted according to preset rules, such as, can be pre-set multiple
Key word, such as " get the winning number in a bond ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to set
Put the type of some contents for needing to extract, such as network address, telephone number and/or account etc..
Wherein, local authentication information can be pre-stored in locally (i.e. reception according to the demand of practical application
In terminal), optionally, in order to improve the accuracy of identification, this locally can also be tested regularly or in real time
Card information is updated.
Optionally, in order to improve the accuracy of identification, if there is currently network, such as, the receiving terminal is
Networking, then can also be sent to the key message cloud device and be identified, i.e.,:
First recognition unit 303, can be also used for determining whether to network;If failed cluster, hold
It is about to the operation that the key message is matched with default local authentication information;If networking, to high in the clouds
Equipment sends the key message, and receiving cloud device carries out the key message with default high in the clouds checking information
The matching result returned after matching, if the matching result indicates matching, it is determined that the content meets pre-conditioned,
If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
Wherein, high in the clouds checking information can be pre-stored in cloud device according to the demand of practical application, can
Choosing, in order to improve the accuracy of identification, the end checking information can also be updated regularly or in real time,
Such as, according to each reporting of user in network or the information of report the high in the clouds checking information can be carried out in real time
Update, etc..
Optionally, it is also possible to directly the key message is sent to into cloud device to be identified, i.e.,:
First recognition unit 303, specifically can be used for extracting key message from the content;Set to high in the clouds
Preparation gives the key message, so that cloud device carries out the key message and default high in the clouds checking information
Match somebody with somebody;Receive the matching result that cloud device is returned;If the matching result indicates matching, it is determined that the content expires
Foot is pre-conditioned;If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
(4) second recognition units 304;
Second recognition unit 304, for determining that transmission user is not belonging to default contact person in determining unit 302
During set, or, when the first recognition unit determines that the content of the instant communication information is unsatisfactory for pre-conditioned,
The instant communication information is identified according to the ID.
For example, second recognition unit 304, specifically can be used for determining that the transmission is used according to the ID
Whether family is to preset the user in blacklist;If so, then the instant communication information intercepted;If it is not,
The instant communication information is then shown, or, after being filtered to the instant communication information using preset rules,
Show the instant communication information.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding
White list, i.e.,:
Second recognition unit 304, can be also used for determining that whether transmission user is according to the ID
User in default white list;If so, the instant communication information is then shown;If it is not, then performing according to the use
Family mark determines whether transmission user is the operation for presetting the user in blacklist.
Wherein, blacklist refers to arrange intransitable user, and white list is then with blacklist conversely, refer to
Be that the user that can pass through is set.
Optionally, for convenience user is operated, after intercepting to the instant communication information, also
Prompting message can be generated according to the instant communication information, and show the prompting message, i.e., as shown in Figure 3 b,
The information recognition device can also include reminding unit 305, as follows:
The reminding unit 305, can be used for after intercepting to the instant communication information, be according to this
When communication information generate prompting message, show the prompting message.
Wherein, the interface for asking to verify information can also be included in the prompting message, i.e.,:
The reminding unit 305, can be also used for the checking request instruction triggered by interface user,
The checking request instruction is sent to into cloud device, receives what cloud device was returned according to the checking request instruction
The result.
So, user just can determine whether the instant communication information safe according to the result, such as,
Whether it is fraud text message or distribution note, etc., so as to facilitate user to make further operation, such as,
Transmission user corresponding to the instant communication information is drawn in into blacklist, be added to contact person or to this i.e.
When communication information carry out reporting, etc., will not be described here.
When being embodied as, above unit can be realized as independent entity, it is also possible to be carried out arbitrarily
Combination, realizes as same or several entities, and being embodied as of above unit can be found in above
Embodiment of the method, will not be described here.
The information recognition device can specifically be integrated in terminal, such as in receiving terminal, the terminal can include
The equipment such as mobile phone, panel computer, notebook computer or PC.
From the foregoing, it will be observed that the receiving unit 301 of the information recognition device of the present embodiment can receive instant messaging letter
Breath, then, the transmission is determined by determining unit 302 according to the ID carried in the instant communication information
Whether user belongs to default linkman set, if so, then by the first recognition unit 303 extracts the instant messaging
The content of information, is identified according to the content to the instant communication information;Otherwise, if being not belonging to default connection
It is people's set, then by the second recognition unit 304 instant communication information is identified according to the ID;
Because the program is for the instant communication information that the user in default linkman set is sent, can pass through
Extract content and make further identification, it can thus be avoided due to sending user to user mark, such as mobile phone
Number carry out pretend institute caused by identification mistake the occurrence of, interception result can be substantially improved, raising
The safety of information.
Example IV,
Accordingly, the embodiment of the present invention provides a kind of information identification system, including the embodiment of the present invention is provided
Any one information recognition device, specifically can be found in embodiment three.Wherein, the information recognition device specifically may be used
With it is integrated in the terminal, for example, can be as follows:
Terminal, for receiving instant communication information, the instant communication information carries the ID for sending user;
Determine whether transmission user belongs to default linkman set according to the ID;If so, then extracting should be i.e.
When communication information content, the instant communication information is identified according to the content;If it is not, then basis should
ID is identified to the instant communication information.
For example, the terminal, specifically can be used for when it is determined that transmission user belongs to default linkman set,
The content of the instant communication information is extracted, determines whether the content meets pre-conditioned, it is if so, instant to this
Communication information is intercepted;If it is not, being then identified to the instant communication information according to the ID.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content
Meeting pre-conditioned mode can also have various, specifically can be found in embodiment above, will not be described here.
Wherein, can also have various to the mode that the instant communication information is identified according to the ID,
For example, can be as follows:
Terminal, specifically can be used for determining whether transmission user is in default blacklist according to the ID
User, if so, then the instant communication information intercepted;If it is not, the instant communication information is then shown,
Or, after filtering to the instant communication information using preset rules, show the instant communication information.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding
White list, i.e.,:
Terminal, specifically can be used for determining whether transmission user is in default white list according to the ID
User, if so, then show the instant communication information;It is somebody's turn to do if it is not, just performing and being determined according to the ID
Send whether user is the operation for presetting the user in blacklist.
Wherein, blacklist refers to arrange intransitable user, and white list is then with blacklist conversely, refer to
Be that the user that can pass through is set.
Optionally, for convenience user is operated, after intercepting to the instant communication information, should
Terminal to generate prompting message according to the instant communication information, and can show the prompting message, refer to before
Embodiment, will not be described here.
Additionally, the information identification system can also include other equipment, such as cloud device is as follows:
Cloud device, for when the key message of terminal transmission is received, verifying to the key message,
Such as, the key message can be matched with default high in the clouds checking information, and return matching result to
Terminal, etc..
More than each equipment be embodied as can be found in embodiment above, will not be described here.
Because the information identification system can include any one information identification dress that the embodiment of the present invention is provided
Put, it is thereby achieved that having achieved by any one information recognition device for being provided of the embodiment of the present invention
Beneficial effect, refers to embodiment above, will not be described here.
Embodiment five,
Accordingly, the embodiment of the present invention also provides a kind of terminal, can be provided with the integrated embodiment of the present invention
Any one information recognition device.As shown in figure 4, the terminal can include radio frequency (RF, Radio Frequency)
Circuit 401, the memorizer 402 for including one or more computer-readable recording mediums, input are single
Unit 403, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless
Fidelity) module 407, include one or the processor 408 and power supply of more than one processing core
409 grade parts.It will be understood by those skilled in the art that the terminal structure illustrated in Fig. 4 was not constituted to end
The restriction at end, can include part more more or less of than diagram, or combine some parts, or different
Part arrangement.Wherein:
RF circuits 401 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially,
After the downlink information of base station is received, transfer to one or more than one processor 408 is processed;In addition, will
It is related to up data is activation to base station.Generally, RF circuits 401 include but is not limited to antenna, at least one
Individual amplifier, tuner, one or more agitators, subscriber identity module (SIM, Subscriber Identity
Module) card, transceiver, bonder, low-noise amplifier (LNA, Low Noise Amplifier),
Duplexer etc..Additionally, RF circuits 401 can also be communicated by radio communication with network and other equipment.
The radio communication can be using arbitrary communication standard or agreement, including but not limited to global system for mobile communications
(GSM, Global System of Mobile communication), general packet radio service (GPRS,
General Packet Radio Service), CDMA (CDMA, Code Division Multiple
Access), WCDMA (WCDMA, Wideband Code Division Multiple Access),
Long Term Evolution (LTE, Long Term Evolution), Email, Short Message Service (SMS, Short
Messaging Service) etc..
Memorizer 402 can be used to store software program and module, and processor 408 is stored in by operation
The software program and module of reservoir 402, so as to perform various function application and data processing.Memorizer
402 can mainly include storing program area and storage data field, wherein, storing program area can storage program area,
Application program (such as sound-playing function, image player function etc.) needed at least one function etc.;Deposit
Storage data field can store and use created data (such as voice data, phone directory etc.) etc. according to terminal.
Additionally, memorizer 402 can include high-speed random access memory, nonvolatile memory can also be included,
For example, at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly,
Memorizer 402 can also include Memory Controller, be deposited with providing processor 408 and input block 403 pairs
The access of reservoir 402.
Input block 403 can be used for receives input numeral or character information, and produce with user arrange with
And the relevant keyboard of function control, mouse, action bars, optics or trace ball signal input.Specifically,
In a specific embodiment, input block 403 may include Touch sensitive surface and other input equipments.Touch
Sensitive surfaces, also referred to as touch display screen or Trackpad, can collect user thereon or neighbouring touch operation
(such as user is using any suitable objects such as finger, stylus or adnexa on Touch sensitive surface or in touch-sensitive table
Operation near face), and corresponding attachment means are driven according to formula set in advance.Optionally, it is touch-sensitive
Surface may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch
Controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives process
Device 408, and the order sent of receiving processor 408 and can be performed.Furthermore, it is possible to using resistance-type,
The polytypes such as condenser type, infrared ray and surface acoustic wave realize Touch sensitive surface.Except Touch sensitive surface, input
Unit 403 can also include other input equipments.Specifically, other input equipments can be including but not limited to
Physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operation
One or more in bar etc..
Display unit 404 can be used for display by the information of user input or be supplied to information and the end of user
End various graphical user interface, these graphical user interface can by figure, text, icon, video and
Its combination in any is constituting.Display unit 404 may include display floater, optionally, can adopt liquid crystal
Show device (LCD, Liquid Crystal Display), Organic Light Emitting Diode (OLED, Organic
Light-Emitting Diode) etc. form configuring display floater.Further, Touch sensitive surface can cover aobvious
Show panel, when Touch sensitive surface is detected thereon or after neighbouring touch operation, send processor 408 to
To determine the type of touch event, carried on a display panel according to the type of touch event with preprocessor 408
For corresponding visual output.Although in the diagram, Touch sensitive surface and display floater are as two independent portions
Part realizing input and input function, but in some embodiments it is possible to by Touch sensitive surface and display floater
It is integrated and realize input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other
Sensor.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light
Sensor can adjust the brightness of display floater according to the light and shade of ambient light, and proximity transducer can be moved in terminal
When moving in one's ear, display floater and/or backlight are closed.As one kind of motion sensor, acceleration of gravity
The size of (generally three axles) acceleration, can detect that gravity in the detectable all directions of sensor when static
Size and direction, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen switching, dependent game, magnetic
Power meter pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as terminal
The other sensors such as gyroscope, barometer, drimeter, thermometer, the infrared ray sensor of configuration, here
Repeat no more.
Voicefrequency circuit 406, speaker, microphone can provide the audio interface between user and terminal.Audio frequency
The signal of telecommunication after the voice data for receiving conversion can be transferred to speaker by circuit 406, be turned by speaker
It is changed to acoustical signal output;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone, by sound
Frequency circuit 406 is converted to voice data after receiving, then after voice data output processor 408 is processed, Jing
RF circuits 401 being sent to such as another terminal, or by voice data export to memorizer 402 so as to
Further process.Voicefrequency circuit 406 is also possible that earphone jack, logical with terminal to provide peripheral hardware earphone
Letter.
WiFi belongs to short range wireless transmission technology, and terminal can help user to receive by WiFi module 407
Send e-mails, browse webpage and access streaming video etc., it has provided the user wireless broadband internet
Access.Although Fig. 4 shows WiFi module 407, but it is understood that, it is simultaneously not belonging to terminal
Must be configured into, can omit in the essential scope for do not change invention as needed completely.
Processor 408 is the control centre of terminal, using various interfaces and connection whole mobile phone each
Part, the software program and/or module being stored in by operation or execution in memorizer 402, and call
The data being stored in memorizer 402, perform the various functions and processing data of terminal, so as to enter to mobile phone
Row integral monitoring.Optionally, processor 408 may include one or more processing cores;Preferably, process
Device 408 can integrated application processor and modem processor, wherein, application processor mainly processes operation
System, user interface and application program etc., modem processor mainly processes radio communication.It is appreciated that
, above-mentioned modem processor can not also be integrated in processor 408.
Terminal also includes the power supply 409 (such as battery) powered to all parts, it is preferred that power supply can be with
It is logically contiguous with processor 408 by power-supply management system, realize that management is filled so as to pass through power-supply management system
The functions such as electricity, electric discharge and power managed.Power supply 409 can also include one or more direct current
Or alternating current power supply, recharging system, power failure detection circuit, power supply changeover device or inverter, power supply
The random components such as positioning indicator.
Although not shown, terminal can also include photographic head, bluetooth module etc., will not be described here.Specifically
In the present embodiment, the processor 408 in terminal can be according to following instruction, will be one or more
The corresponding executable file of process of application program is loaded in memorizer 402, and is run by processor 408
The application program being stored in memorizer 402, so as to realize various functions:
Instant communication information is received, the instant communication information carries the ID for sending user;According to the use
Family mark determines whether transmission user belongs to default linkman set;If so, the instant messaging letter is then extracted
The content of breath, is identified according to the content to the instant communication information;If it is not, then according to the ID
The instant communication information is identified.
For example, the processor 408, can perform the application program for implementing function such as:
When it is determined that transmission user belongs to default linkman set, the content of the instant communication information is extracted,
Determine whether the content meets pre-conditioned, if so, the instant communication information is intercepted;If it is not, then
The instant communication information is identified according to the ID.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content
Meeting pre-conditioned mode can also have various, specifically can be found in embodiment above, will not be described here.
Wherein, can also have various to the mode that the instant communication information is identified according to the ID,
I.e. the processor 408, can perform the application program for implementing function such as:
Determine whether transmission user is to preset the user in blacklist according to the ID, it is if so, then right
The instant communication information is intercepted;If it is not, the instant communication information is then shown, or, using default rule
After then filtering to the instant communication information, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding
White list, i.e. the processor 408 can also carry out the application program for implementing function such as:
Determine whether transmission user is to preset the user in white list according to the ID, if so, then show
Show the instant communication information;If it is not, just perform determining whether transmission user is default according to the ID
The operation of the user in blacklist.
Optionally, for convenience user is operated, after intercepting to the instant communication information, also
Prompting message can be generated according to the instant communication information, and show the prompting message.
What above each was operated is embodied as can be found in embodiment above, will not be described here.
From the foregoing, it will be observed that the terminal of the present embodiment is after instant communication information is received, can be according to the IMU
The ID carried in news information determines whether transmission user belongs to default linkman set, if so, then
The content of the instant communication information is extracted, the instant communication information is identified according to the content;Otherwise,
If being not belonging to default linkman set, the instant communication information is identified according to the ID;By
In the program for the instant communication information that the user in default linkman set is sent, can be by carrying
Take content and make further identification, it can thus be avoided due to sending user to user mark, such as cell-phone number
Code carry out pretending identification mistake caused by institute the occurrence of, can substantially improve interception result, improve and believe
The safety of breath.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment
Suddenly can be by program to instruct the hardware of correlation to complete, the program can be stored in a computer-readable
In storage medium, storage medium can include:Read only memory (ROM, Read Only Memory),
Random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of information identifying method, device and the system for being provided the embodiment of the present invention above has been carried out in detail
Introduce, specific case used herein is set forth to the principle and embodiment of the present invention, above reality
The explanation for applying example is only intended to help and understands the method for the present invention and its core concept;Simultaneously for this area
Technical staff, according to the present invention thought, change is had in specific embodiments and applications
Place, in sum, this specification content should not be construed as limiting the invention.
Claims (17)
1. a kind of information identifying method, it is characterised in that include:
Instant communication information is received, the instant communication information carries the ID for sending user;
Determine whether the transmission user belongs to default linkman set according to the ID;
If belonging to default linkman set, the content of the instant communication information is extracted, determine the content
Whether meet pre-conditioned, if meeting condition, the instant communication information is intercepted, if being unsatisfactory for
Condition, then be identified according to the ID to the instant communication information;
If being not belonging to default linkman set, the instant communication information is carried out according to the ID
Identification.
2. method according to claim 1, it is characterised in that whether the determination content meets
It is pre-conditioned, including:
Key message is extracted from the content;
The key message is matched with default local authentication information;
If matching, it is determined that the content meets pre-conditioned;
If mismatching, it is determined that the content is unsatisfactory for pre-conditioned.
3. method according to claim 2, it is characterised in that it is described by the key message with it is default
Before checking information in template is matched, also include:
Determine whether to network;
If failed cluster, the step for being matched the key message with default local authentication information is performed
Suddenly;
If networking, the key message is sent to cloud device, receive cloud device by the crucial letter
The matching result that breath is returned after being matched with default high in the clouds checking information, if matching result instruction
Match somebody with somebody, it is determined that the content meets pre-conditioned, if the matching result indicates to mismatch, it is determined that described
Content is unsatisfactory for pre-conditioned.
4. method according to claim 1, it is characterised in that whether the determination content meets
It is pre-conditioned, including:
Key message is extracted from the content;
The key message is sent to cloud device, so that cloud device is by the key message and default cloud
End checking information is matched;
Receive the matching result that cloud device is returned;
If the matching result indicates matching, it is determined that the content meets pre-conditioned;
If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
5. the method according to any one of Claims 1-4, it is characterised in that described according to the use
Family mark is identified to the instant communication information, including:
Determine whether the transmission user is to preset the user in blacklist according to the ID;
If so, then the instant communication information intercepted;
If it is not, the instant communication information is then shown, or, the instant messaging is believed using preset rules
After breath is filtered, the instant communication information is shown.
6. method according to claim 5, it is characterised in that described to be determined according to the ID
It is described to send whether user is to preset before the user in blacklist, also include:
Determine whether the transmission user is to preset the user in white list according to the ID;
If so, the instant communication information is then shown;
If it is not, then perform determining whether the transmission user is in default blacklist according to the ID
The step of user.
7. the method according to any one of Claims 1-4, it is characterised in that it is described to it is described immediately
After communication information is intercepted, also include:
Prompting message is generated according to the instant communication information;
Show the prompting message.
8. method according to claim 7, it is characterised in that the prompting message is included for please
Seek the interface verified to information, then it is described to show after the prompting message, also include
The checking request instruction triggered by the interface user;
The checking request instruction is sent to into cloud device;
Receive the result that cloud device is returned according to the checking request instruction.
9. a kind of information recognition device, it is characterised in that include:
Receiving unit, for receiving instant communication information, the instant communication information carries the use for sending user
Family identifies;
Determining unit, for determining whether the transmission user belongs to default contact person according to the ID
Set;
First recognition unit, for determining that the transmission user belongs to default linkman set in determining unit
When, the content of the instant communication information is extracted, determine whether the content meets pre-conditioned, if meeting,
Then the instant communication information is intercepted;If being unsatisfactory for, trigger the second recognition unit and perform according to institute
State the operation that ID is identified to the instant communication information;
Second recognition unit, for determining that the transmission user is not belonging to default linkman set in determining unit
When, or, when the first recognition unit determines that the content is unsatisfactory for pre-conditioned, marked according to the user
Knowledge is identified to the instant communication information.
10. device according to claim 9, it is characterised in that
First recognition unit, specifically for extracting key message from the content, by the crucial letter
Breath is matched with default local authentication information, if matching, it is determined that the content meets pre-conditioned,
If mismatching, it is determined that the content is unsatisfactory for pre-conditioned.
11. devices according to claim 10, it is characterised in that
First recognition unit, is additionally operable to determine whether to network;If failed cluster, perform institute
State the operation that key message is matched with default local authentication information;If networking, to cloud device
The key message is sent, receiving cloud device carries out the key message with default high in the clouds checking information
The matching result returned after matching, if the matching result indicates matching, it is determined that the content meets default
Condition, if the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
12. devices according to claim 9, it is characterised in that
First recognition unit, specifically for extracting key message from the content;Send out to cloud device
The key message is sent, so that cloud device carries out the key message and default high in the clouds checking information
Match somebody with somebody;Receive the matching result that cloud device is returned;If the matching result indicates matching, it is determined that in described
Appearance meets pre-conditioned;If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for default bar
Part.
13. devices according to any one of claim 9 to 12, it is characterised in that
Second recognition unit, specifically for determining that whether the transmission user is according to the ID
User in default blacklist;If so, then the instant communication information intercepted;If it is not, then showing
The instant communication information, or, after being filtered to the instant communication information using preset rules, show
Show the instant communication information.
14. devices according to claim 13, it is characterised in that
Second recognition unit, is additionally operable to determine whether the transmission user is pre- according to the ID
If the user in white list;If so, the instant communication information is then shown;If it is not, then performing according to described
ID determines whether the transmission user is the operation for presetting the user in blacklist.
15. devices according to any one of claim 9 to 12, it is characterised in that also single including reminding
Unit;
The reminding unit, for after intercepting to the instant communication information, according to described instant
Communication information generates prompting message, shows the prompting message.
16. devices according to claim 15, it is characterised in that the prompting message include for
The interface that request is verified to information, then:
The reminding unit, is additionally operable to the checking request instruction triggered by the interface user, by institute
State checking request instruction and be sent to cloud device, receive what cloud device was returned according to the checking request instruction
The result.
17. a kind of information identification systems, it is characterised in that including described in any one of claim 9 to 16
Information recognition device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610494211.4A CN106685796B (en) | 2016-06-29 | 2016-06-29 | A kind of information identifying method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610494211.4A CN106685796B (en) | 2016-06-29 | 2016-06-29 | A kind of information identifying method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106685796A true CN106685796A (en) | 2017-05-17 |
CN106685796B CN106685796B (en) | 2018-09-04 |
Family
ID=58839756
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610494211.4A Active CN106685796B (en) | 2016-06-29 | 2016-06-29 | A kind of information identifying method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685796B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110300049A (en) * | 2018-03-23 | 2019-10-01 | 阿里巴巴集团控股有限公司 | A kind of message screening method, equipment and system based on instant messaging |
CN110391970A (en) * | 2019-07-17 | 2019-10-29 | 广州市百果园信息技术有限公司 | For the message management system of communication applications, method, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7653606B2 (en) * | 2003-10-03 | 2010-01-26 | Axway Inc. | Dynamic message filtering |
CN101888445A (en) * | 2010-04-30 | 2010-11-17 | 南京邮电大学 | Integrated method for filtering short message by introducing query software |
CN103634473A (en) * | 2013-12-05 | 2014-03-12 | 南京理工大学连云港研究院 | Naive Bayesian classification based mobile phone spam short message filtering method and system |
CN103812826A (en) * | 2012-11-08 | 2014-05-21 | 中国电信股份有限公司 | Identification method, identification system, and filter system of spam mail |
US20140229557A1 (en) * | 2013-02-12 | 2014-08-14 | Infinite Convergence Solutions, Inc | Method and Apparatus for Intercarrier Chat Message Blacklist and Whitelist |
CN104883671A (en) * | 2014-02-27 | 2015-09-02 | 珠海市君天电子科技有限公司 | Junk message determining method and system |
-
2016
- 2016-06-29 CN CN201610494211.4A patent/CN106685796B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7653606B2 (en) * | 2003-10-03 | 2010-01-26 | Axway Inc. | Dynamic message filtering |
CN101888445A (en) * | 2010-04-30 | 2010-11-17 | 南京邮电大学 | Integrated method for filtering short message by introducing query software |
CN103812826A (en) * | 2012-11-08 | 2014-05-21 | 中国电信股份有限公司 | Identification method, identification system, and filter system of spam mail |
US20140229557A1 (en) * | 2013-02-12 | 2014-08-14 | Infinite Convergence Solutions, Inc | Method and Apparatus for Intercarrier Chat Message Blacklist and Whitelist |
CN103634473A (en) * | 2013-12-05 | 2014-03-12 | 南京理工大学连云港研究院 | Naive Bayesian classification based mobile phone spam short message filtering method and system |
CN104883671A (en) * | 2014-02-27 | 2015-09-02 | 珠海市君天电子科技有限公司 | Junk message determining method and system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110300049A (en) * | 2018-03-23 | 2019-10-01 | 阿里巴巴集团控股有限公司 | A kind of message screening method, equipment and system based on instant messaging |
CN110300049B (en) * | 2018-03-23 | 2022-05-27 | 阿里巴巴集团控股有限公司 | Message shielding method, device and system based on instant messaging |
CN110391970A (en) * | 2019-07-17 | 2019-10-29 | 广州市百果园信息技术有限公司 | For the message management system of communication applications, method, equipment and storage medium |
CN110391970B (en) * | 2019-07-17 | 2021-09-10 | 广州市百果园信息技术有限公司 | Message management system, method, device and storage medium for communication application |
Also Published As
Publication number | Publication date |
---|---|
CN106685796B (en) | 2018-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3200487B1 (en) | Message processing method and apparatus | |
CN106126562A (en) | A kind of pop-up hold-up interception method and terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN104243155A (en) | Safety verification method and device | |
CN104135501A (en) | Page sharing method, device and system | |
CN104427074A (en) | Method, device and system for displaying incoming information | |
CN103763112B (en) | A kind of user identity protection method and apparatus | |
CN104683301B (en) | Password storage method and device | |
CN104468463A (en) | Verification method, verification device and verification system | |
CN104580177B (en) | Resource provider method, device and system | |
CN106506321A (en) | One population message treatment method and terminal device | |
CN104301315A (en) | Method and device for limiting information access | |
CN106603740B (en) | It is connected to the network abnormal processing method and terminal device | |
CN106550046A (en) | Push the method and device of member card | |
CN106611152A (en) | User identity determination method and apparatus | |
WO2015043163A1 (en) | Method and apparatus for inputting account information | |
CN104899488B (en) | Numeric value transfer and device | |
CN107046595A (en) | Announcement information processing method, device and mobile terminal | |
CN104702674B (en) | Geographical position exchange method and device | |
CN104660769A (en) | Method, device and system for adding contact person information | |
CN104917905A (en) | Strange incoming call processing method, terminal and server | |
CN105553718B (en) | Guidance information display methods and device | |
CN107872791A (en) | Access point connection method and device | |
CN107784575A (en) | Risk class determines method, transfer operation reminding method, apparatus and system | |
CN104731782A (en) | Information handling method and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |