CN106685796A - Information identification method, device and system - Google Patents

Information identification method, device and system Download PDF

Info

Publication number
CN106685796A
CN106685796A CN201610494211.4A CN201610494211A CN106685796A CN 106685796 A CN106685796 A CN 106685796A CN 201610494211 A CN201610494211 A CN 201610494211A CN 106685796 A CN106685796 A CN 106685796A
Authority
CN
China
Prior art keywords
information
instant communication
communication information
user
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610494211.4A
Other languages
Chinese (zh)
Other versions
CN106685796B (en
Inventor
袁灿材
杨田从雨
许振声
王亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610494211.4A priority Critical patent/CN106685796B/en
Publication of CN106685796A publication Critical patent/CN106685796A/en
Application granted granted Critical
Publication of CN106685796B publication Critical patent/CN106685796B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Interoperability with other network applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an information identification method, device and system. Instant messaging (IM) information is received; whether a sending subscriber belongs to a preset contact set is determined according to a subscriber identity carried in the IM information; if YES, content of the IM information is extracted, and the IM information is identified according to the content; and otherwise, the sending subscriber does not belong to the preset contact set, and the IM information is identified according to the subscriber identity. Thus, the interception effect can be improved greatly, and the information safety is improved.

Description

A kind of information identifying method, device and system
Technical field
The present invention relates to communication technical field, and in particular to a kind of information identifying method, device and system.
Background technology
In recent years, communication technology has obtained development at full speed, at the same time, various harassing and wrecking notes, And fraud information is also increasingly to spread unchecked, for this purpose, how these information are identified and be intercepted, also into Concerned problem.
In the prior art, typically information can be identified and is blocked by the way of white and black list Cut, such as, when terminal receives a note, it can be determined that whether the number belonging to the note is in white list In, if in white list, not intercepted, otherwise, if not in white list, judging the note institute Whether the number of category is located in blacklist, if in blacklist, being intercepted, if not in blacklist, Then do not carry out intercepting, etc..This mode, to a certain extent can to a part junk information, than Such as harass note and fraud information is intercepted, but, because existing many junk information are when sending, All checked numbers by pseudo-base station and pretended, such as, and the number of the operator that disguises oneself as or user contact's Number, etc., therefore, for such information, can not by the way of white and black list The effect of interception is reached, it is the disguise oneself as number of operator or the number of user contact to be additionally, since, because This, the cheated probability of user is also larger, easily causes user's property loss, or user terminal is subjected to The invasion of viral wooden horse, that is to say, that currently existing scheme interception result is not good, leverages information Safety.
The content of the invention
The embodiment of the present invention provides a kind of information identifying method, device and system, can improve interception result, The safety of raising information.
The embodiment of the present invention provides a kind of information identifying method, including:
Instant communication information is received, the instant communication information carries the ID for sending user;
Determine whether the transmission user belongs to default linkman set according to the ID;
If belonging to default linkman set, the content of the instant communication information is extracted, determine the content Whether meet pre-conditioned, if meeting condition, the instant communication information is intercepted, if being unsatisfactory for Condition, then be identified according to the ID to the instant communication information;
If being not belonging to default linkman set, the instant communication information is carried out according to the ID Identification.
Accordingly, the embodiment of the present invention also provides a kind of information recognition device, including:
Receiving unit, for receiving instant communication information, the instant communication information carries the use for sending user Family identifies;
Determining unit, for determining whether the transmission user belongs to default contact person according to the ID Set;
First recognition unit, for determining that the transmission user belongs to default linkman set in determining unit When, the content of the instant communication information is extracted, determine whether the content meets pre-conditioned, if meeting, Then the instant communication information is intercepted;If being unsatisfactory for, trigger the second recognition unit and perform according to institute State the operation that ID is identified to the instant communication information;
Second recognition unit, for determining that the transmission user is not belonging to default linkman set in determining unit When, or, when the first recognition unit determines that the content is unsatisfactory for pre-conditioned, marked according to the user Knowledge is identified to the instant communication information.
Additionally, the embodiment of the present invention also provides a kind of information identification system, including the embodiment of the present invention is provided Any one information recognition device.
The embodiment of the present invention is adopted and receives instant communication information, according to the user carried in the instant communication information Mark determines whether transmission user belongs to default linkman set, if so, then extracts the instant communication information Content, the instant communication information is identified according to the content;Otherwise, if being not belonging to default contact person Set, then be identified according to the ID to the instant communication information;Because the program is for default It is the instant communication information that sent of user in people's set, can makees further to know by extracting content Not, it can thus be avoided due to sending user to user mark, such as phone number carries out camouflage to be caused Identification mistake the occurrence of, can substantially improve interception result, improve the safety of information.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to institute in embodiment description The accompanying drawing that needs are used is briefly described, it should be apparent that, drawings in the following description are only the present invention Some embodiments, for those skilled in the art, on the premise of not paying creative work, also Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 a are the schematic diagram of a scenario of information identifying method provided in an embodiment of the present invention;
Fig. 1 b are the schematic flow sheets of information identifying method provided in an embodiment of the present invention;
Fig. 2 is another schematic flow sheet of information identifying method provided in an embodiment of the present invention;
Fig. 3 a are the structural representations of information recognition device provided in an embodiment of the present invention;
Fig. 3 b are another structural representations of information recognition device provided in an embodiment of the present invention;
Fig. 4 is the structural representation of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, it is fully described by, it is clear that described embodiment is only a part of embodiment of the invention, rather than Whole embodiments.Based on the embodiment in the present invention, those skilled in the art are not making creative labor The every other embodiment obtained under the premise of dynamic, belongs to the scope of protection of the invention.
The embodiment of the present invention provides a kind of information identifying method, device and system.
Wherein, the information identification system can include information recognition device, and the information recognition device specifically can be with It is integrated in the terminal, additionally, the information identification system can also include other equipment, such as server (such as Cloud device), for when the key message of terminal transmission is received, verifying to the key message, Such as, the key message can be matched with default high in the clouds checking information, and return matching result to Terminal, etc..
For example, as shown in Figure 1a, the terminal can receive instant communication information, then, according to the IMU The ID carried in news information determines whether transmission user belongs to default linkman set, if so, then Extract the content of the instant communication information, instant communication information is identified according to the content, such as, and can To pass through to extract the key message in the content, the key message is supplied to into server, and the reception server The matching result of return, determines the need for intercepting the instant communication information according to matching result, Etc.;Otherwise, if the ID is not belonging to default linkman set, such as, the user is not in communication In record, then instant communication information is identified according to the ID, such as using blacklist and/or in vain The mode of list is filtered and intercepted, etc., so as to realize not affecting existing instant messaging to believe as far as possible On the premise of breath processes framework, improve interception result, there is provided the purpose of Information Security.
It is described in detail individually below, it should be noted that, the sequence number of following examples is excellent not as embodiment The restriction of first order.
Embodiment one,
The present embodiment will be described from the angle of information recognition device, and the information recognition device specifically can collect Into in terminal, such as receiving terminal, the terminal can include mobile phone, panel computer, notebook computer, Or the equipment such as personal computer (PC, Personal Computer).
A kind of information identifying method, including:Instant communication information is received, the instant communication information is carried and sent The ID of user;Determine whether transmission user belongs to default linkman set according to the ID; If so, the content of the instant communication information is then extracted, the instant communication information is identified according to the content; If it is not, being then identified to the instant communication information according to the ID.
As shown in Figure 1 b, the idiographic flow of the information identifying method can be as follows:
101st, instant communication information is received.
For example, can specifically receive and send the instant communication information that terminal sends, wherein, the instant messaging letter Breath can carry the information such as the ID of transmission user.
Wherein, the instant communication information can be included in short message, multimedia message and each instant messaging application The information such as communication information;The ID can include terminal iidentification, such as user identity identification code (SIM, Subscriber Identity Module) or terminal International Mobile Station Equipment Identification (IMEI, International Mobile Equipment Identity) etc., or, the ID can also include user's name, user The information such as the IMU signal of mailbox, and/or user.
102nd, determine whether transmission user belongs to default linkman set according to the ID, if so, Then execution step 103, if it is not, then execution step 104.
Wherein, the linkman set can in advance be set up according to the demand of practical application, contact person's collection Conjunction includes at least one contact person, such as, the linkman set is specifically as follows the receiving terminal locally or cloud Address list, contact book, and/or buddy list that end preserves etc..
For example, address list is specially with the default linkman set, and transmission user is as a example by Zhang San, then At this point it is possible to determine whether the Zhang San belongs in address list according to the ID, if being located at address list In, then execution step 103, otherwise, if Zhang San is not in address list, execution step 104.
103rd, the content of the instant communication information is extracted, the instant communication information is known according to the content Not;For example, can be as follows:
Determine whether the content meets pre-conditioned, if so, the instant communication information is intercepted;If it is not, Then the instant communication information is identified according to the ID, i.e. execution step 104.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content Meeting pre-conditioned mode can also have various, such as, and can be local (local i.e. in the receiving terminal) It is identified, or, it is also possible to it is identified beyond the clouds, or, can be combined with local and high in the clouds together Identification, etc., i.e., step " determining whether the content meets pre-conditioned " specifically can include:
Key message is extracted from the content, the key message and default local authentication information are carried out Match somebody with somebody, if matching, it is determined that the content meets pre-conditioned;If mismatching, it is determined that the content is unsatisfactory for pre- If condition.
Wherein, the key message can be extracted according to preset rules, such as, can be pre-set multiple Key word, such as " get the winning number in a bond ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to set Put the type of some contents for needing to extract, such as network address, telephone number and/or account etc..
After key message is extracted, just the key message for extracting can be believed with default local verification Breath, such as default keyword, network address, telephone number and/or account etc. are matched, for example, if carrying Network address " 123456789.com " is included in the key message for taking, and in default local authentication information Exist " 123456789.com ", than the website corresponding to network address as already indicated " 123456789.com " To swindle network address, then now, just can determine that the instant communication information is fraud information, so, it is to this When communication information intercepted, otherwise, if not existing in default local authentication information The relative recording of " 123456789.com ", then at this point it is possible to according to the ID to the instant messaging Information is identified, i.e. execution step 104.
Wherein, local authentication information can be pre-stored in locally (i.e. reception according to the demand of practical application In terminal), optionally, in order to improve the accuracy of identification, this locally can also be tested regularly or in real time Card information is updated.
Optionally, in order to improve the accuracy of identification, if there is currently network, such as, the receiving terminal is Networking, then can also be sent to the key message cloud device and be identified, i.e., in step " by the key Information is matched with the checking information in default template " before, the information identifying method can also include:
Determine whether to network;If failed cluster, perform the key message and default local verification The step of information is matched;If networking, the key message is sent to cloud device, receive high in the clouds and set For the matching result returned after the key message is matched with default high in the clouds checking information, if the matching As a result matching is indicated, it is determined that the content meets pre-conditioned, if the matching result indicates to mismatch, really The fixed content is unsatisfactory for pre-conditioned.
Wherein, high in the clouds checking information can be pre-stored in cloud device according to the demand of practical application, can Choosing, in order to improve the accuracy of identification, the end checking information can also be updated regularly or in real time, Such as, according to each reporting of user in network or the information of report the high in the clouds checking information can be carried out in real time Update, etc..
Optionally, it is also possible to directly the key message is sent to into cloud device to be identified, i.e., step is " true Whether the fixed content meets pre-conditioned " can also include:
Key message is extracted from the content;The key message is sent to cloud device, so that cloud device will The key message is matched with default high in the clouds checking information;Receive the matching result that cloud device is returned; If the matching result indicates matching, it is determined that the content meets pre-conditioned;If the matching result is not indicated not Match somebody with somebody, it is determined that the content is unsatisfactory for pre-conditioned.
104th, the instant communication information is identified according to the ID, for example, specifically can be as follows:
Determine whether transmission user is to preset the user in blacklist according to the ID, it is if so, then right The instant communication information is intercepted;If it is not, the instant communication information is then shown, or, using default rule After then filtering to the instant communication information, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding White list, i.e., in step " in determining that whether transmission user be default blacklist according to the ID Before user ", the information identifying method can also include:
Determine whether transmission user is to preset the user in white list according to the ID, if so, then show Show the instant communication information;If it is not, just perform determining whether transmission user is default according to the ID The step of user in blacklist.
Wherein, blacklist refers to arrange intransitable user, and white list is then with blacklist conversely, refer to Be that the user that can pass through is set.
Optionally, for convenience user is operated, after intercepting to the instant communication information, also Prompting message can be generated according to the instant communication information, and show the prompting message.
Wherein, the interface for asking to verify information can also be included in the prompting message, i.e., this connects Mouth is mainly used in the checking request instruction of receive user triggering, to verify to the instant communication information, than Such as, make further deep checking, or even carry out manual verification, etc., i.e., " show the prompting in step After information ", the information identifying method can also include:
The checking request instruction triggered by interface user, by the checking request instruction high in the clouds is sent to Equipment, receives the result that cloud device is returned according to the checking request instruction.
So, user just can determine whether the instant communication information safe according to the result, such as, Whether it is fraud text message or distribution note, etc., so as to facilitate user to make further operation, such as, Transmission user corresponding to the instant communication information is drawn in into blacklist, be added to contact person or to this i.e. When communication information carry out reporting, etc., will not be described here.
From the foregoing, it will be observed that the present embodiment is carried using instant communication information is received according in the instant communication information ID determine whether transmission user belongs to default linkman set, if so, then extract the IMU The content of news information, is identified according to the content to the instant communication information;Otherwise, if being not belonging to preset Linkman set, then be identified according to the ID to the instant communication information;Due to the program for The instant communication information that user in default linkman set is sent, can be made into one by extracting content Step identification, it can thus be avoided due to sending user to user mark, such as phone number carries out camouflage institute Caused identification mistake the occurrence of, can substantially improve interception result, improve the safety of information.
Embodiment two,
Method according to described by embodiment one, is below described in further detail citing.
In the present embodiment, specifically will be integrated in terminal A with the information recognition device, and the instant messaging Information is specially as a example by short message and illustrates.
As shown in Fig. 2 a kind of information identifying method, idiographic flow can be as follows:
201st, the short message that terminal A receive user first is sent by terminal B, wherein, the short message can be taken The information such as the ID with user's first.
The ID can include terminal iidentification, such as SIM number (such as phone number) or IMEI Code etc., or, the ID can also include that user's name, subscriber mailbox, and/or user's is instant The information such as communication number.
202nd, terminal A determines whether user's first belongs to default linkman set according to the ID, if so, Then execution step 203, if it is not, then execution step 205.
Wherein, the linkman set can in advance be set up according to the demand of practical application, contact person's collection Conjunction includes at least one contact person, such as, the linkman set is specifically as follows the receiving terminal locally or cloud Address list, contact book, and/or buddy list that end preserves etc..
For example, address list is specially with the default linkman set, and the ID is as a example by cell-phone number, Then now, whether the cell-phone number that specifically can determine user's first is located in the address list of terminal A, if being located at logical Believe in recording, then execution step 203, otherwise, if not being located in address list, execution step 204.
203rd, terminal A extracts the content of the short message, determines whether the content meets pre-conditioned, if so, Then execution step 204, if it is not, then execution step 205.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content Meeting pre-conditioned mode can also have various, it is for instance possible to use following any one mode:
(1) first kind of way;
Terminal A extracts key message from the content, locally tests what is preserved in the key message and terminal A Card information is matched, if matching, it is determined that the content meets pre-conditioned, execution step 204;If no Matching, it is determined that the content is unsatisfactory for pre-conditioned, execution step 205.
(2) second way;
Terminal A extracts key message from the content, and to cloud device the key message, cloud device are sent After the key message is received, the key message is matched with default high in the clouds checking information, obtained Matching result, and the matching result is returned to into terminal A, if the matching result indicates matching, terminal A Determine that the content meets pre-conditioned, execution step 204;If the matching result indicates to mismatch, terminal It is pre-conditioned that A determines that the content is unsatisfactory for, execution step 205.
(3) the third mode;
Terminal A extracts key message from the content, and determines whether to network;If failed cluster, The key message is matched with the local authentication information preserved in terminal A, if matching, it is determined that this is interior Appearance meets pre-conditioned, execution step 204;If mismatch, it is determined that the content be unsatisfactory for it is pre-conditioned, Execution step 205;Otherwise, if currently networking, the key message is sent to cloud device, high in the clouds sets It is standby to be matched the key message with default high in the clouds checking information after the key message is received, obtain To matching result, and the matching result is returned to into terminal A, if the matching result indicates matching, terminal A determines that the content meets pre-conditioned, execution step 204;If the matching result indicates to mismatch, eventually Pre-conditioned, execution step 205 that end A determines that the content is unsatisfactory for.
Wherein, the key message can be extracted according to preset rules, such as, can be pre-set multiple Key word, such as " get the winning number in a bond ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to set Put some need extract contents type, such as network address, telephone number and/or Bank Account Number etc., then When needing to extract key message, the method for canonical matching just can be adopted to extract net from the short message Location, such as URL (URL, Uniform Resource Locator), and/or extract silver Row account and telephone number etc., so as to obtain key message.
After key message is extracted, just can be by the key message for extracting and default local authentication information Or high in the clouds checking information, such as default keyword, network address, telephone number and/or Bank Account Number etc. are carried out Matching, for example, if including Bank Account Number " 123456789 " and telephone number in the key message for extracting " 19000000000 ", and indicated silver in default high in the clouds checking information (or local authentication information) Short message corresponding to row account " 123456789 " and telephone number " 19000000000 " is swindle network address, Then now, just can determine that the short message is fraud information, so, the short message is intercepted, that is, hold Row step 204;Otherwise, if there is no silver in default high in the clouds checking information (or local authentication information) The relative recording of row account " 123456789 " and telephone number " 19000000000 ", then at this point it is possible to The short message is identified according to the ID of user's first, i.e. execution step 205.
It should be noted that, in order to improve the accuracy of identification, can be regularly or in real time to local verification letter Breath and high in the clouds checking information are updated, such as, can receive each terminal to report on network by cloud device Or the information of report, then it is identified and counts according to these information, and high in the clouds is tested based on statistical result Card information is updated.Further, it is also possible to by cloud device timing or in real time to the local verification in terminal Information is updated, or, it is also possible to from terminal according to the demand timing of itself or in real time to cloud device Download it is corresponding update bag, to be updated to the local authentication information in terminal, etc., here is no longer gone to live in the household of one's in-laws on getting married State.
204th, terminal A is intercepted to the short message.
For example, terminal A can add the short message into default interception file, and not corresponding Show in the inbox (normal short message can show in inbox) of short message, or, it is also possible to it is straight Connect and delete the short message.
Optionally, for convenience user is operated, after intercepting to the short message, can be with root Generate prompting message according to the short message, and show the prompting message, such as, can with pop-up, wicket or The form of short message, shows the prompting message on the screen of terminal A.
Wherein, can be including the phone and report reported to the police or the network address for reporting etc. in the prompting message.
Optionally, the interface for asking to verify information can also be included in the prompting message, so, After user's second receives the prompting message by terminal A, just can be by the corresponding checking of interface triggering Request instruction so that the checking request instruction is sent to cloud device by terminal A, further to be tested Card, such as make further deep checking or carry out manual verification, etc., then, receives cloud device and returns The result for returning, so, user's second just can determine whether the short message is safe according to the result, Such as, if for fraud text message or distribution note, etc., further operate so as to facilitate user's second to make, Such as, the transmission user's first corresponding to the short message is drawn in blacklist, is added to contact person or to this Short message is carried out reporting, etc., will not be described here.
205th, terminal A determines whether user's first is to preset the user in white list according to the ID, If so, then execution step 207;If it is not, then execution step 206.
For example, if saving 3 telephone numbers in white list:“19000000001”、“19000000002” " 19000000003 ", and the telephone number of user's first is " 19000000000 ", then now, just can be with Determine that user's first is not belonging to the user in the white list, then execution step 206;If conversely, user's first Telephone number be " 19000000001 ", " 19000000002 " and " 19000000003 " in it is any One, such as be " 19000000001 ", then now, just can determine that user's first belongs in the white list User, then execution step 207.
206th, terminal A determines whether transmission user is to preset the user in blacklist according to the ID, If so, execution step 204 is then returned, if it is not, then execution step 207.
For example, if saving 2 telephone numbers in blacklist:" 19000000000 " and " 19000000004 ", And the telephone number of user's first is " 19000000000 ", then now, just can determine that user's first belongs to this User in blacklist, then intercepts to the short message, that is, return execution step 204;If conversely, The telephone number of user's first is other numbers in addition to " 19000000000 " and " 19000000004 ", It is such as " 19000000005 " or " 19000000006 ", then now, just can determine user's first not Belong to the user in the blacklist, then execution step 207.
207th, terminal A is not intercepted to the short message, for example, can show the short message, such as existed The short message, etc. is shown in the inbox of short message.
From the foregoing, it will be observed that the terminal of the present embodiment is after short message is received, can carry according in the short message ID determine send user whether belong to default linkman set, if so, then extract the short message Content, is identified according to the content to the short message;Otherwise, if being not belonging to default linkman set, The short message is identified according to the ID;Because the program is for the use in default linkman set The short message that family is sent, can make further identification by extracting content, it can thus be avoided due to Send user to user mark, such as phone number carry out pretend institute caused by identification mistake situation It is raw, interception result can be substantially improved, the safety of information is improved, lower user terminal and invaded and property The probability of loss;Further, since after short message has been intercepted, corresponding prompting message can also be generated, and Corresponding checking interface is provided, so, the convenience and friendly of operation can also be improved.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of information recognition device, such as schemes Shown in 3a, the information recognition device includes receiving unit 301, determining unit 302, the first recognition unit 303 With the second recognition unit 304, it is as follows:
(1) receiving unit 301;
Receiving unit 301, for receiving instant communication information.
For example, receiving unit 301, specifically can be used for receiving the instant communication information for sending terminal transmission, Wherein, the instant communication information can carry the information such as the ID of transmission user.
Wherein, the instant communication information can be included in short message, multimedia message and each instant messaging application The information such as communication information;The ID can include terminal iidentification, such as IMEI of SIM or terminal etc., Or, the ID can also include the IMU signal of user's name, subscriber mailbox, and/or user Etc. information.
(2) determining unit 302;
Determining unit 302, for determining whether transmission user belongs to default contact person according to the ID Set.
Wherein, the linkman set can in advance be set up according to the demand of practical application, contact person's collection Conjunction includes at least one contact person, such as, the linkman set is specifically as follows the receiving terminal locally or cloud Address list, contact book, and/or buddy list that end preserves etc..
(3) first recognition units 303;
First recognition unit 303, for determining that transmission user belongs to default contact person's collection in determining unit 302 During conjunction, the content of the instant communication information is extracted, the instant communication information is identified according to the content.
For example, first recognition unit 303, is specifically determined for whether the content meets pre-conditioned; If so, the instant communication information is intercepted;If it is not, then triggering the second recognition unit 304 performs basis The operation that the ID is identified to the instant communication information.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content Meeting pre-conditioned mode can also have various, such as, and can be local (local i.e. in the receiving terminal) It is identified, or, it is also possible to it is identified beyond the clouds, or, can be combined with local and high in the clouds together Identification, etc., i.e.,:
First recognition unit 303, specifically for extracting key message from the content, by the key message Matched with default local authentication information, if matching, it is determined that the content meets pre-conditioned, if not Matching, it is determined that the content is unsatisfactory for pre-conditioned.
Wherein, the key message can be extracted according to preset rules, such as, can be pre-set multiple Key word, such as " get the winning number in a bond ", " account ", " remittance " and/or " transferring accounts " etc., further, it is also possible to set Put the type of some contents for needing to extract, such as network address, telephone number and/or account etc..
Wherein, local authentication information can be pre-stored in locally (i.e. reception according to the demand of practical application In terminal), optionally, in order to improve the accuracy of identification, this locally can also be tested regularly or in real time Card information is updated.
Optionally, in order to improve the accuracy of identification, if there is currently network, such as, the receiving terminal is Networking, then can also be sent to the key message cloud device and be identified, i.e.,:
First recognition unit 303, can be also used for determining whether to network;If failed cluster, hold It is about to the operation that the key message is matched with default local authentication information;If networking, to high in the clouds Equipment sends the key message, and receiving cloud device carries out the key message with default high in the clouds checking information The matching result returned after matching, if the matching result indicates matching, it is determined that the content meets pre-conditioned, If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
Wherein, high in the clouds checking information can be pre-stored in cloud device according to the demand of practical application, can Choosing, in order to improve the accuracy of identification, the end checking information can also be updated regularly or in real time, Such as, according to each reporting of user in network or the information of report the high in the clouds checking information can be carried out in real time Update, etc..
Optionally, it is also possible to directly the key message is sent to into cloud device to be identified, i.e.,:
First recognition unit 303, specifically can be used for extracting key message from the content;Set to high in the clouds Preparation gives the key message, so that cloud device carries out the key message and default high in the clouds checking information Match somebody with somebody;Receive the matching result that cloud device is returned;If the matching result indicates matching, it is determined that the content expires Foot is pre-conditioned;If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
(4) second recognition units 304;
Second recognition unit 304, for determining that transmission user is not belonging to default contact person in determining unit 302 During set, or, when the first recognition unit determines that the content of the instant communication information is unsatisfactory for pre-conditioned, The instant communication information is identified according to the ID.
For example, second recognition unit 304, specifically can be used for determining that the transmission is used according to the ID Whether family is to preset the user in blacklist;If so, then the instant communication information intercepted;If it is not, The instant communication information is then shown, or, after being filtered to the instant communication information using preset rules, Show the instant communication information.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding White list, i.e.,:
Second recognition unit 304, can be also used for determining that whether transmission user is according to the ID User in default white list;If so, the instant communication information is then shown;If it is not, then performing according to the use Family mark determines whether transmission user is the operation for presetting the user in blacklist.
Wherein, blacklist refers to arrange intransitable user, and white list is then with blacklist conversely, refer to Be that the user that can pass through is set.
Optionally, for convenience user is operated, after intercepting to the instant communication information, also Prompting message can be generated according to the instant communication information, and show the prompting message, i.e., as shown in Figure 3 b, The information recognition device can also include reminding unit 305, as follows:
The reminding unit 305, can be used for after intercepting to the instant communication information, be according to this When communication information generate prompting message, show the prompting message.
Wherein, the interface for asking to verify information can also be included in the prompting message, i.e.,:
The reminding unit 305, can be also used for the checking request instruction triggered by interface user, The checking request instruction is sent to into cloud device, receives what cloud device was returned according to the checking request instruction The result.
So, user just can determine whether the instant communication information safe according to the result, such as, Whether it is fraud text message or distribution note, etc., so as to facilitate user to make further operation, such as, Transmission user corresponding to the instant communication information is drawn in into blacklist, be added to contact person or to this i.e. When communication information carry out reporting, etc., will not be described here.
When being embodied as, above unit can be realized as independent entity, it is also possible to be carried out arbitrarily Combination, realizes as same or several entities, and being embodied as of above unit can be found in above Embodiment of the method, will not be described here.
The information recognition device can specifically be integrated in terminal, such as in receiving terminal, the terminal can include The equipment such as mobile phone, panel computer, notebook computer or PC.
From the foregoing, it will be observed that the receiving unit 301 of the information recognition device of the present embodiment can receive instant messaging letter Breath, then, the transmission is determined by determining unit 302 according to the ID carried in the instant communication information Whether user belongs to default linkman set, if so, then by the first recognition unit 303 extracts the instant messaging The content of information, is identified according to the content to the instant communication information;Otherwise, if being not belonging to default connection It is people's set, then by the second recognition unit 304 instant communication information is identified according to the ID; Because the program is for the instant communication information that the user in default linkman set is sent, can pass through Extract content and make further identification, it can thus be avoided due to sending user to user mark, such as mobile phone Number carry out pretend institute caused by identification mistake the occurrence of, interception result can be substantially improved, raising The safety of information.
Example IV,
Accordingly, the embodiment of the present invention provides a kind of information identification system, including the embodiment of the present invention is provided Any one information recognition device, specifically can be found in embodiment three.Wherein, the information recognition device specifically may be used With it is integrated in the terminal, for example, can be as follows:
Terminal, for receiving instant communication information, the instant communication information carries the ID for sending user; Determine whether transmission user belongs to default linkman set according to the ID;If so, then extracting should be i.e. When communication information content, the instant communication information is identified according to the content;If it is not, then basis should ID is identified to the instant communication information.
For example, the terminal, specifically can be used for when it is determined that transmission user belongs to default linkman set, The content of the instant communication information is extracted, determines whether the content meets pre-conditioned, it is if so, instant to this Communication information is intercepted;If it is not, being then identified to the instant communication information according to the ID.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content Meeting pre-conditioned mode can also have various, specifically can be found in embodiment above, will not be described here.
Wherein, can also have various to the mode that the instant communication information is identified according to the ID, For example, can be as follows:
Terminal, specifically can be used for determining whether transmission user is in default blacklist according to the ID User, if so, then the instant communication information intercepted;If it is not, the instant communication information is then shown, Or, after filtering to the instant communication information using preset rules, show the instant communication information.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding White list, i.e.,:
Terminal, specifically can be used for determining whether transmission user is in default white list according to the ID User, if so, then show the instant communication information;It is somebody's turn to do if it is not, just performing and being determined according to the ID Send whether user is the operation for presetting the user in blacklist.
Wherein, blacklist refers to arrange intransitable user, and white list is then with blacklist conversely, refer to Be that the user that can pass through is set.
Optionally, for convenience user is operated, after intercepting to the instant communication information, should Terminal to generate prompting message according to the instant communication information, and can show the prompting message, refer to before Embodiment, will not be described here.
Additionally, the information identification system can also include other equipment, such as cloud device is as follows:
Cloud device, for when the key message of terminal transmission is received, verifying to the key message, Such as, the key message can be matched with default high in the clouds checking information, and return matching result to Terminal, etc..
More than each equipment be embodied as can be found in embodiment above, will not be described here.
Because the information identification system can include any one information identification dress that the embodiment of the present invention is provided Put, it is thereby achieved that having achieved by any one information recognition device for being provided of the embodiment of the present invention Beneficial effect, refers to embodiment above, will not be described here.
Embodiment five,
Accordingly, the embodiment of the present invention also provides a kind of terminal, can be provided with the integrated embodiment of the present invention Any one information recognition device.As shown in figure 4, the terminal can include radio frequency (RF, Radio Frequency) Circuit 401, the memorizer 402 for including one or more computer-readable recording mediums, input are single Unit 403, display unit 404, sensor 405, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407, include one or the processor 408 and power supply of more than one processing core 409 grade parts.It will be understood by those skilled in the art that the terminal structure illustrated in Fig. 4 was not constituted to end The restriction at end, can include part more more or less of than diagram, or combine some parts, or different Part arrangement.Wherein:
RF circuits 401 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, After the downlink information of base station is received, transfer to one or more than one processor 408 is processed;In addition, will It is related to up data is activation to base station.Generally, RF circuits 401 include but is not limited to antenna, at least one Individual amplifier, tuner, one or more agitators, subscriber identity module (SIM, Subscriber Identity Module) card, transceiver, bonder, low-noise amplifier (LNA, Low Noise Amplifier), Duplexer etc..Additionally, RF circuits 401 can also be communicated by radio communication with network and other equipment. The radio communication can be using arbitrary communication standard or agreement, including but not limited to global system for mobile communications (GSM, Global System of Mobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), WCDMA (WCDMA, Wideband Code Division Multiple Access), Long Term Evolution (LTE, Long Term Evolution), Email, Short Message Service (SMS, Short Messaging Service) etc..
Memorizer 402 can be used to store software program and module, and processor 408 is stored in by operation The software program and module of reservoir 402, so as to perform various function application and data processing.Memorizer 402 can mainly include storing program area and storage data field, wherein, storing program area can storage program area, Application program (such as sound-playing function, image player function etc.) needed at least one function etc.;Deposit Storage data field can store and use created data (such as voice data, phone directory etc.) etc. according to terminal. Additionally, memorizer 402 can include high-speed random access memory, nonvolatile memory can also be included, For example, at least one disk memory, flush memory device or other volatile solid-state parts.Correspondingly, Memorizer 402 can also include Memory Controller, be deposited with providing processor 408 and input block 403 pairs The access of reservoir 402.
Input block 403 can be used for receives input numeral or character information, and produce with user arrange with And the relevant keyboard of function control, mouse, action bars, optics or trace ball signal input.Specifically, In a specific embodiment, input block 403 may include Touch sensitive surface and other input equipments.Touch Sensitive surfaces, also referred to as touch display screen or Trackpad, can collect user thereon or neighbouring touch operation (such as user is using any suitable objects such as finger, stylus or adnexa on Touch sensitive surface or in touch-sensitive table Operation near face), and corresponding attachment means are driven according to formula set in advance.Optionally, it is touch-sensitive Surface may include two parts of touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and the signal that touch operation brings is detected, transmit a signal to touch controller;Touch Controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives process Device 408, and the order sent of receiving processor 408 and can be performed.Furthermore, it is possible to using resistance-type, The polytypes such as condenser type, infrared ray and surface acoustic wave realize Touch sensitive surface.Except Touch sensitive surface, input Unit 403 can also include other input equipments.Specifically, other input equipments can be including but not limited to Physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operation One or more in bar etc..
Display unit 404 can be used for display by the information of user input or be supplied to information and the end of user End various graphical user interface, these graphical user interface can by figure, text, icon, video and Its combination in any is constituting.Display unit 404 may include display floater, optionally, can adopt liquid crystal Show device (LCD, Liquid Crystal Display), Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) etc. form configuring display floater.Further, Touch sensitive surface can cover aobvious Show panel, when Touch sensitive surface is detected thereon or after neighbouring touch operation, send processor 408 to To determine the type of touch event, carried on a display panel according to the type of touch event with preprocessor 408 For corresponding visual output.Although in the diagram, Touch sensitive surface and display floater are as two independent portions Part realizing input and input function, but in some embodiments it is possible to by Touch sensitive surface and display floater It is integrated and realize input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other Sensor.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light Sensor can adjust the brightness of display floater according to the light and shade of ambient light, and proximity transducer can be moved in terminal When moving in one's ear, display floater and/or backlight are closed.As one kind of motion sensor, acceleration of gravity The size of (generally three axles) acceleration, can detect that gravity in the detectable all directions of sensor when static Size and direction, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen switching, dependent game, magnetic Power meter pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as terminal The other sensors such as gyroscope, barometer, drimeter, thermometer, the infrared ray sensor of configuration, here Repeat no more.
Voicefrequency circuit 406, speaker, microphone can provide the audio interface between user and terminal.Audio frequency The signal of telecommunication after the voice data for receiving conversion can be transferred to speaker by circuit 406, be turned by speaker It is changed to acoustical signal output;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone, by sound Frequency circuit 406 is converted to voice data after receiving, then after voice data output processor 408 is processed, Jing RF circuits 401 being sent to such as another terminal, or by voice data export to memorizer 402 so as to Further process.Voicefrequency circuit 406 is also possible that earphone jack, logical with terminal to provide peripheral hardware earphone Letter.
WiFi belongs to short range wireless transmission technology, and terminal can help user to receive by WiFi module 407 Send e-mails, browse webpage and access streaming video etc., it has provided the user wireless broadband internet Access.Although Fig. 4 shows WiFi module 407, but it is understood that, it is simultaneously not belonging to terminal Must be configured into, can omit in the essential scope for do not change invention as needed completely.
Processor 408 is the control centre of terminal, using various interfaces and connection whole mobile phone each Part, the software program and/or module being stored in by operation or execution in memorizer 402, and call The data being stored in memorizer 402, perform the various functions and processing data of terminal, so as to enter to mobile phone Row integral monitoring.Optionally, processor 408 may include one or more processing cores;Preferably, process Device 408 can integrated application processor and modem processor, wherein, application processor mainly processes operation System, user interface and application program etc., modem processor mainly processes radio communication.It is appreciated that , above-mentioned modem processor can not also be integrated in processor 408.
Terminal also includes the power supply 409 (such as battery) powered to all parts, it is preferred that power supply can be with It is logically contiguous with processor 408 by power-supply management system, realize that management is filled so as to pass through power-supply management system The functions such as electricity, electric discharge and power managed.Power supply 409 can also include one or more direct current Or alternating current power supply, recharging system, power failure detection circuit, power supply changeover device or inverter, power supply The random components such as positioning indicator.
Although not shown, terminal can also include photographic head, bluetooth module etc., will not be described here.Specifically In the present embodiment, the processor 408 in terminal can be according to following instruction, will be one or more The corresponding executable file of process of application program is loaded in memorizer 402, and is run by processor 408 The application program being stored in memorizer 402, so as to realize various functions:
Instant communication information is received, the instant communication information carries the ID for sending user;According to the use Family mark determines whether transmission user belongs to default linkman set;If so, the instant messaging letter is then extracted The content of breath, is identified according to the content to the instant communication information;If it is not, then according to the ID The instant communication information is identified.
For example, the processor 408, can perform the application program for implementing function such as:
When it is determined that transmission user belongs to default linkman set, the content of the instant communication information is extracted, Determine whether the content meets pre-conditioned, if so, the instant communication information is intercepted;If it is not, then The instant communication information is identified according to the ID.
Wherein, this it is pre-conditioned can be configured according to the demand of practical application, and whether determine the content Meeting pre-conditioned mode can also have various, specifically can be found in embodiment above, will not be described here.
Wherein, can also have various to the mode that the instant communication information is identified according to the ID, I.e. the processor 408, can perform the application program for implementing function such as:
Determine whether transmission user is to preset the user in blacklist according to the ID, it is if so, then right The instant communication information is intercepted;If it is not, the instant communication information is then shown, or, using default rule After then filtering to the instant communication information, the instant communication information is shown.
Optionally, in order to improve the accuracy of identification, in addition to blacklist is set, can also arrange corresponding White list, i.e. the processor 408 can also carry out the application program for implementing function such as:
Determine whether transmission user is to preset the user in white list according to the ID, if so, then show Show the instant communication information;If it is not, just perform determining whether transmission user is default according to the ID The operation of the user in blacklist.
Optionally, for convenience user is operated, after intercepting to the instant communication information, also Prompting message can be generated according to the instant communication information, and show the prompting message.
What above each was operated is embodied as can be found in embodiment above, will not be described here.
From the foregoing, it will be observed that the terminal of the present embodiment is after instant communication information is received, can be according to the IMU The ID carried in news information determines whether transmission user belongs to default linkman set, if so, then The content of the instant communication information is extracted, the instant communication information is identified according to the content;Otherwise, If being not belonging to default linkman set, the instant communication information is identified according to the ID;By In the program for the instant communication information that the user in default linkman set is sent, can be by carrying Take content and make further identification, it can thus be avoided due to sending user to user mark, such as cell-phone number Code carry out pretending identification mistake caused by institute the occurrence of, can substantially improve interception result, improve and believe The safety of breath.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment Suddenly can be by program to instruct the hardware of correlation to complete, the program can be stored in a computer-readable In storage medium, storage medium can include:Read only memory (ROM, Read Only Memory), Random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of information identifying method, device and the system for being provided the embodiment of the present invention above has been carried out in detail Introduce, specific case used herein is set forth to the principle and embodiment of the present invention, above reality The explanation for applying example is only intended to help and understands the method for the present invention and its core concept;Simultaneously for this area Technical staff, according to the present invention thought, change is had in specific embodiments and applications Place, in sum, this specification content should not be construed as limiting the invention.

Claims (17)

1. a kind of information identifying method, it is characterised in that include:
Instant communication information is received, the instant communication information carries the ID for sending user;
Determine whether the transmission user belongs to default linkman set according to the ID;
If belonging to default linkman set, the content of the instant communication information is extracted, determine the content Whether meet pre-conditioned, if meeting condition, the instant communication information is intercepted, if being unsatisfactory for Condition, then be identified according to the ID to the instant communication information;
If being not belonging to default linkman set, the instant communication information is carried out according to the ID Identification.
2. method according to claim 1, it is characterised in that whether the determination content meets It is pre-conditioned, including:
Key message is extracted from the content;
The key message is matched with default local authentication information;
If matching, it is determined that the content meets pre-conditioned;
If mismatching, it is determined that the content is unsatisfactory for pre-conditioned.
3. method according to claim 2, it is characterised in that it is described by the key message with it is default Before checking information in template is matched, also include:
Determine whether to network;
If failed cluster, the step for being matched the key message with default local authentication information is performed Suddenly;
If networking, the key message is sent to cloud device, receive cloud device by the crucial letter The matching result that breath is returned after being matched with default high in the clouds checking information, if matching result instruction Match somebody with somebody, it is determined that the content meets pre-conditioned, if the matching result indicates to mismatch, it is determined that described Content is unsatisfactory for pre-conditioned.
4. method according to claim 1, it is characterised in that whether the determination content meets It is pre-conditioned, including:
Key message is extracted from the content;
The key message is sent to cloud device, so that cloud device is by the key message and default cloud End checking information is matched;
Receive the matching result that cloud device is returned;
If the matching result indicates matching, it is determined that the content meets pre-conditioned;
If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
5. the method according to any one of Claims 1-4, it is characterised in that described according to the use Family mark is identified to the instant communication information, including:
Determine whether the transmission user is to preset the user in blacklist according to the ID;
If so, then the instant communication information intercepted;
If it is not, the instant communication information is then shown, or, the instant messaging is believed using preset rules After breath is filtered, the instant communication information is shown.
6. method according to claim 5, it is characterised in that described to be determined according to the ID It is described to send whether user is to preset before the user in blacklist, also include:
Determine whether the transmission user is to preset the user in white list according to the ID;
If so, the instant communication information is then shown;
If it is not, then perform determining whether the transmission user is in default blacklist according to the ID The step of user.
7. the method according to any one of Claims 1-4, it is characterised in that it is described to it is described immediately After communication information is intercepted, also include:
Prompting message is generated according to the instant communication information;
Show the prompting message.
8. method according to claim 7, it is characterised in that the prompting message is included for please Seek the interface verified to information, then it is described to show after the prompting message, also include
The checking request instruction triggered by the interface user;
The checking request instruction is sent to into cloud device;
Receive the result that cloud device is returned according to the checking request instruction.
9. a kind of information recognition device, it is characterised in that include:
Receiving unit, for receiving instant communication information, the instant communication information carries the use for sending user Family identifies;
Determining unit, for determining whether the transmission user belongs to default contact person according to the ID Set;
First recognition unit, for determining that the transmission user belongs to default linkman set in determining unit When, the content of the instant communication information is extracted, determine whether the content meets pre-conditioned, if meeting, Then the instant communication information is intercepted;If being unsatisfactory for, trigger the second recognition unit and perform according to institute State the operation that ID is identified to the instant communication information;
Second recognition unit, for determining that the transmission user is not belonging to default linkman set in determining unit When, or, when the first recognition unit determines that the content is unsatisfactory for pre-conditioned, marked according to the user Knowledge is identified to the instant communication information.
10. device according to claim 9, it is characterised in that
First recognition unit, specifically for extracting key message from the content, by the crucial letter Breath is matched with default local authentication information, if matching, it is determined that the content meets pre-conditioned, If mismatching, it is determined that the content is unsatisfactory for pre-conditioned.
11. devices according to claim 10, it is characterised in that
First recognition unit, is additionally operable to determine whether to network;If failed cluster, perform institute State the operation that key message is matched with default local authentication information;If networking, to cloud device The key message is sent, receiving cloud device carries out the key message with default high in the clouds checking information The matching result returned after matching, if the matching result indicates matching, it is determined that the content meets default Condition, if the matching result indicates to mismatch, it is determined that the content is unsatisfactory for pre-conditioned.
12. devices according to claim 9, it is characterised in that
First recognition unit, specifically for extracting key message from the content;Send out to cloud device The key message is sent, so that cloud device carries out the key message and default high in the clouds checking information Match somebody with somebody;Receive the matching result that cloud device is returned;If the matching result indicates matching, it is determined that in described Appearance meets pre-conditioned;If the matching result indicates to mismatch, it is determined that the content is unsatisfactory for default bar Part.
13. devices according to any one of claim 9 to 12, it is characterised in that
Second recognition unit, specifically for determining that whether the transmission user is according to the ID User in default blacklist;If so, then the instant communication information intercepted;If it is not, then showing The instant communication information, or, after being filtered to the instant communication information using preset rules, show Show the instant communication information.
14. devices according to claim 13, it is characterised in that
Second recognition unit, is additionally operable to determine whether the transmission user is pre- according to the ID If the user in white list;If so, the instant communication information is then shown;If it is not, then performing according to described ID determines whether the transmission user is the operation for presetting the user in blacklist.
15. devices according to any one of claim 9 to 12, it is characterised in that also single including reminding Unit;
The reminding unit, for after intercepting to the instant communication information, according to described instant Communication information generates prompting message, shows the prompting message.
16. devices according to claim 15, it is characterised in that the prompting message include for The interface that request is verified to information, then:
The reminding unit, is additionally operable to the checking request instruction triggered by the interface user, by institute State checking request instruction and be sent to cloud device, receive what cloud device was returned according to the checking request instruction The result.
17. a kind of information identification systems, it is characterised in that including described in any one of claim 9 to 16 Information recognition device.
CN201610494211.4A 2016-06-29 2016-06-29 A kind of information identifying method, device and system Active CN106685796B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610494211.4A CN106685796B (en) 2016-06-29 2016-06-29 A kind of information identifying method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610494211.4A CN106685796B (en) 2016-06-29 2016-06-29 A kind of information identifying method, device and system

Publications (2)

Publication Number Publication Date
CN106685796A true CN106685796A (en) 2017-05-17
CN106685796B CN106685796B (en) 2018-09-04

Family

ID=58839756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610494211.4A Active CN106685796B (en) 2016-06-29 2016-06-29 A kind of information identifying method, device and system

Country Status (1)

Country Link
CN (1) CN106685796B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300049A (en) * 2018-03-23 2019-10-01 阿里巴巴集团控股有限公司 A kind of message screening method, equipment and system based on instant messaging
CN110391970A (en) * 2019-07-17 2019-10-29 广州市百果园信息技术有限公司 For the message management system of communication applications, method, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653606B2 (en) * 2003-10-03 2010-01-26 Axway Inc. Dynamic message filtering
CN101888445A (en) * 2010-04-30 2010-11-17 南京邮电大学 Integrated method for filtering short message by introducing query software
CN103634473A (en) * 2013-12-05 2014-03-12 南京理工大学连云港研究院 Naive Bayesian classification based mobile phone spam short message filtering method and system
CN103812826A (en) * 2012-11-08 2014-05-21 中国电信股份有限公司 Identification method, identification system, and filter system of spam mail
US20140229557A1 (en) * 2013-02-12 2014-08-14 Infinite Convergence Solutions, Inc Method and Apparatus for Intercarrier Chat Message Blacklist and Whitelist
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7653606B2 (en) * 2003-10-03 2010-01-26 Axway Inc. Dynamic message filtering
CN101888445A (en) * 2010-04-30 2010-11-17 南京邮电大学 Integrated method for filtering short message by introducing query software
CN103812826A (en) * 2012-11-08 2014-05-21 中国电信股份有限公司 Identification method, identification system, and filter system of spam mail
US20140229557A1 (en) * 2013-02-12 2014-08-14 Infinite Convergence Solutions, Inc Method and Apparatus for Intercarrier Chat Message Blacklist and Whitelist
CN103634473A (en) * 2013-12-05 2014-03-12 南京理工大学连云港研究院 Naive Bayesian classification based mobile phone spam short message filtering method and system
CN104883671A (en) * 2014-02-27 2015-09-02 珠海市君天电子科技有限公司 Junk message determining method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110300049A (en) * 2018-03-23 2019-10-01 阿里巴巴集团控股有限公司 A kind of message screening method, equipment and system based on instant messaging
CN110300049B (en) * 2018-03-23 2022-05-27 阿里巴巴集团控股有限公司 Message shielding method, device and system based on instant messaging
CN110391970A (en) * 2019-07-17 2019-10-29 广州市百果园信息技术有限公司 For the message management system of communication applications, method, equipment and storage medium
CN110391970B (en) * 2019-07-17 2021-09-10 广州市百果园信息技术有限公司 Message management system, method, device and storage medium for communication application

Also Published As

Publication number Publication date
CN106685796B (en) 2018-09-04

Similar Documents

Publication Publication Date Title
EP3200487B1 (en) Message processing method and apparatus
CN106126562A (en) A kind of pop-up hold-up interception method and terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104243155A (en) Safety verification method and device
CN104135501A (en) Page sharing method, device and system
CN104427074A (en) Method, device and system for displaying incoming information
CN103763112B (en) A kind of user identity protection method and apparatus
CN104683301B (en) Password storage method and device
CN104468463A (en) Verification method, verification device and verification system
CN104580177B (en) Resource provider method, device and system
CN106506321A (en) One population message treatment method and terminal device
CN104301315A (en) Method and device for limiting information access
CN106603740B (en) It is connected to the network abnormal processing method and terminal device
CN106550046A (en) Push the method and device of member card
CN106611152A (en) User identity determination method and apparatus
WO2015043163A1 (en) Method and apparatus for inputting account information
CN104899488B (en) Numeric value transfer and device
CN107046595A (en) Announcement information processing method, device and mobile terminal
CN104702674B (en) Geographical position exchange method and device
CN104660769A (en) Method, device and system for adding contact person information
CN104917905A (en) Strange incoming call processing method, terminal and server
CN105553718B (en) Guidance information display methods and device
CN107872791A (en) Access point connection method and device
CN107784575A (en) Risk class determines method, transfer operation reminding method, apparatus and system
CN104731782A (en) Information handling method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant