CN109104702B - Information interception method, device and storage medium - Google Patents

Information interception method, device and storage medium Download PDF

Info

Publication number
CN109104702B
CN109104702B CN201710474569.5A CN201710474569A CN109104702B CN 109104702 B CN109104702 B CN 109104702B CN 201710474569 A CN201710474569 A CN 201710474569A CN 109104702 B CN109104702 B CN 109104702B
Authority
CN
China
Prior art keywords
calling number
information
sending
calling
frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710474569.5A
Other languages
Chinese (zh)
Other versions
CN109104702A (en
Inventor
伏晓海
刘冲
叶兵
张斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201710474569.5A priority Critical patent/CN109104702B/en
Publication of CN109104702A publication Critical patent/CN109104702A/en
Application granted granted Critical
Publication of CN109104702B publication Critical patent/CN109104702B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an information interception method, an information interception device and a storage medium, wherein the method comprises the following steps: acquiring a history record of calling number sending information; obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number; calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number; and when the called number information entropy of the calling number is greater than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist. The method is simple and convenient to operate, greatly reduces the complexity of manually judging and adding the blacklist, greatly improves the accuracy of the blacklist, reduces the false interception rate of the spam messages and improves the processing efficiency of the message filtering system.

Description

Information interception method, device and storage medium
Technical Field
The invention relates to the technical field of mobile communication, in particular to an information interception method and device based on called number information entropy and a storage medium.
Background
With the development of domestic communication services, short message services are more and more widely applied. People are increasingly communicating with each other using short messages as a convenient communication method. However, as the short message application field expands, a large number of illegal merchants send advertisement and fraud information by means of the short message platform, and users have to receive short messages which are not willing to be received. Along with the flooding of spam messages, a plurality of spam message intercepting systems are born to filter the spam messages. The important part of spam message interception is the filtration of blacklist numbers, and as long as the calling number is judged to be the blacklist number, all messages sent by the user are filtered.
The existing blacklist number extraction methods mainly include the following two types:
1) manual addition, the method is complicated to operate and cannot always cover the blacklist number comprehensively;
2) based on the frequency of calling number sending, the method can easily pull some numbers which are notified in a group sending manner into a blacklist in an error way, and the error rate is high.
Disclosure of Invention
The invention mainly aims to provide an information interception method, an information interception device and a storage medium, which are simple and convenient to operate, can reduce the error rate and improve the processing efficiency of short message filtering.
In order to achieve the above object, an information intercepting method provided by the present invention includes:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
Preferably, the step of obtaining the history of the calling number transmission information includes:
acquiring a short message sending and receiving history record in a preset time period from a short message center, and acquiring a history record of calling number sending information from the short message sending and receiving history record; or
When monitoring that the calling number sends information, acquiring a history record of the calling number sending information.
Preferably, the step of determining that the calling number is a number for sending spam information and adding the calling number to a calling number blacklist further includes:
intercepting the information currently sent by the calling number; or intercepting the information sent by the calling number when monitoring that the calling number sends the information.
Preferably, the step of calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number includes:
comparing the frequency of the calling number sending information with a preset sending frequency threshold;
and when the frequency of the information sent by the calling number reaches the preset sending frequency threshold, calculating the called number information entropy of the calling number according to a preset information entropy mining algorithm.
Preferably, the frequency of sending information by the calling number is the total number of times of sending information by the calling number in a preset time period, and the step of calculating the called number information entropy of the calling number according to a preset information entropy mining algorithm includes:
calculating the occurrence frequency of each called number sent by the calling number in a preset time period according to the total number of information sending times of the calling number in the preset time period;
calculating the occurrence probability of each called number according to the total number of information sent by the calling number in a preset time period and the occurrence number of each sent called number;
and calculating the called number information entropy of the calling number according to the occurrence probability of each called number and a preset information entropy calculation formula.
Preferably, the step of obtaining the history of the calling number transmission information further comprises:
and setting a sending frequency threshold of the calling number and a called number information entropy preset threshold in the configuration file.
Preferably, the method further comprises:
and when the validity period of the preset blacklist is exceeded, the calling number is removed from the blacklist of the calling number.
Preferably, the method further comprises:
when receiving information sent by a calling number through a short message center, filtering the calling number according to the calling number blacklist, and if the calling number is in the calling number blacklist, intercepting the information sent by the calling number.
An embodiment of the present invention further provides an information intercepting apparatus, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor performing the operations of:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
An embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the following operations:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
The embodiment of the invention provides an information interception method, an information interception device and a storage medium, wherein whether a calling number is a number for sending junk information is screened based on called number information entropy, specifically, whether the calling number is the number for sending the junk information is judged according to the value of the information entropy by extracting the called number information entropy sent by a certain number within a period of time from a history record of short message sending and receiving, and the calling number for sending the junk information is added into a blacklist, so that the junk short message interception can be realized, and therefore, a user is helped to easily locate the calling number for sending the junk short message, and the calling number is set as a blacklist user so as to reject the short message sent by the calling number. Compared with the existing blacklist added manually and the blacklist based on the calling sending frequency analysis, the number blacklist of the short message can be added automatically, the operation is simpler and more convenient, the complexity of manually judging and adding the blacklist by a person is greatly reduced, meanwhile, the accuracy of the blacklist is greatly improved, the false interception rate of the spam short message is reduced, and the processing efficiency of a short message filtering system is improved.
Drawings
FIG. 1 is a flowchart illustrating a first embodiment of an information interception method according to the present invention;
FIG. 2 is a schematic diagram of a spam intercepting system according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of an information interception method according to the present invention;
FIG. 4 is a flowchart illustrating a third embodiment of an information interception method according to the present invention;
FIG. 5 is a flowchart illustrating information interception according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating a fourth embodiment of an information interception method according to the present invention;
fig. 7 is a schematic diagram of a terminal structure according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
In order to make the technical solution of the present invention clearer and clearer, the following detailed description is made with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: whether a calling number is a number for sending junk messages is screened based on called number information entropy, specifically, called number information entropy sent by a certain number within a period of time is extracted from a history record of short message sending and receiving, whether the calling number is a number for sending junk messages is judged according to the value of the information entropy, and a blacklist is added to the calling number for sending the junk messages, so that junk message interception can be realized, a user is helped to easily locate the calling number for sending the junk messages, and the calling number is set as a blacklist user according to the blacklist, so that the messages sent by the calling number are rejected. Compared with the existing blacklist added manually and the blacklist based on the calling sending frequency analysis, the method and the system have the advantages that the operation is simpler and more convenient, the error rate of the spam short message number is reduced, and the processing efficiency of the short message filtering system is improved.
In the prior art, the blacklist number extraction mode mainly adopts manual addition and the frequency of sending based on the calling number, wherein the manual addition method is complicated in operation and cannot always cover the blacklist number comprehensively; based on the frequency of calling number sending, the method can easily pull some numbers which are notified in a group sending manner into a blacklist in an error way, and the error rate is high.
The invention provides a solution which can reduce the error rate and improve the processing efficiency of short message filtering and is simple and convenient to operate.
Specifically, as shown in fig. 1, a first embodiment of the present invention provides an information intercepting method, including:
step S101, obtaining a history record of calling number sending information;
step S102, obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
the scheme of the invention belongs to short message service in the field of mobile communication, and particularly aims at intercepting junk short messages. Therefore, the method execution subject of the embodiment may be an information interception apparatus or an information interception system. The information interception device can be carried in a mobile phone or other communication equipment in a hardware or software mode.
Taking the information interception system as an example, as shown in fig. 2, the information interception system may include: short message center, short message intelligence excavation system, monitored control system and audit system, wherein:
the auditing system has the following functions:
checking the mining result of the intelligent short message mining system, and sending the mining result to the monitoring system;
the monitoring system has the following functions:
the short message sent by the short message center is transmitted to a short message intelligent mining system to be used as an information source for data mining; receiving an auditing result of an auditing system, and setting a user number blacklist according to the auditing result; receiving a short message sent by a short message center, and judging whether the short message is intercepted or released according to a user number blacklist;
the short message center has the following functions:
forwarding the received short message to a monitoring system, and intercepting or releasing the short message according to a judgment structure of the monitoring system;
the short message intelligent mining system has the functions that: the method mainly uses a called number information entropy mining algorithm, returns a mining result to an auditing system and audits the mining result.
In the following solution of this embodiment, the number and names of the above functional modules are not specifically limited, and the above functional modules may be implemented, or more or less functional modules may be implemented to implement the solution of the embodiment of the present invention.
The main scheme of the embodiment of the invention is that the called number information entropy is analyzed according to the sending history of the short message, and whether the calling number sending the message is a spam short message sending number or not is judged according to the called number information entropy, so that a blacklist number is extracted from the spam short message sending number and is used as a basis for judging the spam short message.
The present embodiment takes into account: there are two important features of general spam messages:
firstly, the sending frequency is high, and a large number of short messages can be sent in a certain specific time;
secondly, the dispersion of the called number distribution is high, namely the called number of the information sent by the calling number is not concentrated on a certain person but is an uncertain crowd.
Therefore, on the basis of determining the calling frequency, the dispersion of the called number distribution is determined by calculating the information entropy of the called number, and whether the calling number sends spam messages or not is judged according to the dispersion.
The entropy refers to the concept of thermodynamics, and the average information amount excluding redundancy in information is referred to as entropy. The method is used for measuring the expected value of the occurrence of a random variable, and the larger the information entropy of a variable is, the more various situations occur, namely, the larger the contained information is. For the short message sending, the short message of the calling number is sent to more people instead of being concentrated on one person, and the probability that the sent high-frequency information is the spam short message is higher.
The information entropy calculation method comprises the following steps:
if the information source symbol has n values: u1 … Un, the corresponding probability is: p1 … Pn, the occurrence of the various symbols is independent of each other, then the average uncertainty of the source should be the statistical average (E) of the single symbol uncertainties — logPi, i.e., the entropy, and the calculation formula is as follows:
Figure BDA0001327250830000061
wherein Pi represents the probability of occurrence of the called number, and the calculation method is as follows:
Figure BDA0001327250830000062
where Wi represents the number of occurrences of a certain called number.
The called number information entropy of the calling number can be calculated through the formula (1), so that the dispersion of the called number distribution is determined. If the called number information entropy is closer to 1, the more dispersion is represented, and the lower the concentration is; the closer the called number information entropy is to 0, the smaller the dispersion is, and the higher the concentration is. Examples are now as follows:
example 1: if a certain calling number sends 15 short messages to 5 called numbers in total, each called number receives 3 short messages, and the sending times are as follows:
{3,3,3,3,3}
the distribution probability of each called number is as follows:
{0.2,0.2,0.2,0.2,0.2}
therefore, the calculated called information entropy of the calling number is 1, which shows that the called number distribution dispersion of the calling number is high and the concentration is low.
Example 2: if a certain calling number sends 15 short messages, the short messages are sent to 5 called numbers in total, 1 short message is sent to each of 4 called numbers, 11 short messages are sent to 1 called number, and the sending times are as follows:
{1,1,1,1,11}
the distribution probability of each called number is as follows:
{0.067,0.067,0.067,0.067,0.733}
the called information entropy of the calling number calculated in this way is 0.59, which indicates that the called number distribution dispersion of the calling number is small and the concentration is high.
According to the calculation of the information entropy, the scheme of the invention carries out data mining on the short message history record in a certain time period, when the frequency of sending short messages by a certain calling number exceeds a certain threshold value, the called number information entropy of sending short messages by the calling number is calculated according to the formula (1), and when the information entropy is judged to be greater than the certain threshold value, the calling number is determined to be sending junk short messages, and the calling number is added into a blacklist.
Specifically, first, a history of the transmission information of the calling number is acquired, so that the total number of times of transmission information of the calling number in a predetermined time period, that is, the frequency of transmission information of the calling number is obtained according to the history of the transmission information.
The following scheme can be adopted for obtaining the history record of the calling number sending information:
as a scenario, a short message sending and receiving history record within a preset time period (for example, within 24 hours) is obtained from a short message center, and then a history record of calling number sending information is obtained from the short message sending and receiving history record; and for the history records with a plurality of calling numbers, sequentially acquiring the history record of each calling number, performing data mining on the history record of each calling number, and calculating the sending frequency of each calling number so as to judge whether each calling number is a junk short message number.
Or
As another scenario, when it is monitored that the calling number sends information, a history record of the calling number sending information is acquired, so as to perform data mining on the history record of the calling number, and calculate the sending frequency of the calling number.
Step S103, calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
in this embodiment, a sending frequency threshold of a calling number and a called number information entropy threshold are configured in advance.
After the frequency of sending information by the calling number is obtained, the called number information entropy of the calling number can be calculated according to the frequency of sending information by the calling number by adopting the following scheme:
firstly, comparing the frequency of the calling number for sending information with a preset sending frequency threshold;
and then, when the frequency of the information sent by the calling number does not reach the preset sending frequency threshold value, the calling number is considered not to send the spam short message and is not added into the blacklist.
And when the frequency of the information sent by the calling number reaches the preset sending frequency threshold, the calling number is considered to possibly send junk short messages, and at the moment, the next screening is carried out, namely the called number information entropy of the calling number is calculated according to a preset information entropy mining algorithm.
Specifically, according to the total number of times of sending information of the calling number within a preset time period (for example, within 24 hours), the number of occurrences of each called number sent by the calling number within the preset time period is calculated;
calculating the occurrence probability of each called number according to the total number of information sent by the calling number in a preset time period and the occurrence number of each sent called number, wherein the calculation method comprises the following steps: the number of occurrences of the called number is divided by the total number of times the message was sent.
And then, calculating the called number information entropy of the calling number according to the occurrence probability of each called number and a preset information entropy calculation formula, namely the formula (1).
When the called number information entropy of the calling number is calculated according to the formula (1), the logarithm function takes the logarithm with the base 2.
And step S104, when the called number information entropy of the calling number is greater than a preset threshold value, determining the calling number as a number for sending junk information, and adding the calling number into a calling number blacklist.
After the called number information entropy of the calling number is obtained through calculation, comparing the called number information entropy of the calling number with a called number information entropy threshold, and if the called number information entropy of the calling number is smaller than the configured threshold, determining that the calling number does not send spam short messages and does not add spam short messages into a blacklist; if the dispersion degree of the called number of the calling number is larger than or equal to the configured threshold value, the dispersion degree of the called number of the calling number is considered to be high, namely, the information is sent to more people, so that the calling number is considered to be sending spam short messages, and the calling number is added into a calling number blacklist.
According to the scheme, whether the calling number is a number for sending the junk messages is screened based on the called number information entropy, specifically, the called number information entropy sent by a certain number within a period of time is extracted from the history record of short message sending and receiving, whether the calling number is a number for sending the junk messages is judged according to the value of the information entropy, and the calling number for sending the junk messages is added into a blacklist, so that the interception of the junk messages can be realized, and therefore, a user is helped to easily locate the calling number for sending the junk messages, and the calling number is set as a blacklist user according to the blacklist, so that the messages sent by the calling number are rejected. Compared with the existing blacklist added manually and the blacklist based on the calling sending frequency analysis, the method and the system have the advantages that the operation is simpler and more convenient, the error rate of the spam short message number is reduced, and the processing efficiency of the short message filtering system is improved.
As shown in fig. 3, a second embodiment of the present invention provides an information intercepting method, based on the embodiment described in fig. 1, in the step S104: determining the calling number as a number for sending spam, and adding the calling number into a calling number blacklist further comprises:
step S105, intercepting the information currently sent by the calling number; or intercepting the information sent by the calling number when monitoring that the calling number sends the information.
Compared with the embodiment shown in fig. 1, after the calling number is added to the calling number blacklist, an operation of intercepting information sent by the calling number may also be performed.
Specifically, as an application scenario, when it is monitored by a monitoring system that a calling number is currently sending a short message, if it is detected that the calling number is a number for sending spam information by using the scheme of this embodiment, the information currently sent by the calling number is intercepted.
As another application scenario, if it is detected that a certain calling number is a number for sending spam information through the scheme of this embodiment, subsequently, when it is monitored that the calling number sends a short message through the monitoring system, the information sent by the calling number is intercepted.
The concrete implementation is as follows:
and after the calling number blacklist is obtained, subsequently filtering the calling number according to the calling number blacklist when the information sent by the calling number is received through the short message center, and if the calling number is in the calling number blacklist, intercepting the information sent by the calling number.
By the scheme, the interception of the spam short messages is realized, the calling number for sending the spam short messages is easily positioned by the user, and the spam short messages are set as blacklist users so as to reject the short messages sent by the calling number. Compared with the existing blacklist added manually and the blacklist based on the calling sending frequency analysis, the method and the system have the advantages that the operation is simpler and more convenient, the error rate of the spam short message number is reduced, and the processing efficiency of the short message filtering system is improved.
As shown in fig. 4, a third embodiment of the present invention proposes an information intercepting method, based on the embodiment described in fig. 3, in the step S101: before obtaining the history record of the calling number sending information, the method also comprises the following steps:
step S100, setting a sending frequency threshold of the calling number and a preset threshold of the called number information entropy in a configuration file.
Compared with the embodiment described in fig. 2, the embodiment further includes a scheme of configuring a sending frequency threshold of the calling number and a preset threshold of the called number information entropy, where both the sending frequency threshold and the preset threshold of the called number information entropy can be set according to actual situations, thereby improving flexibility and applicability of the information interception scheme.
The specific flow of information interception in this embodiment can be shown with reference to fig. 5.
Compared with the prior art, the scheme of the embodiment greatly reduces the complexity of manually judging and adding the blacklist, can automatically add the number blacklist of the short message, greatly improves the accuracy of the blacklist and reduces the false interception rate of the spam short message.
As shown in fig. 6, a fourth embodiment of the present invention provides an information intercepting method, based on the embodiment described in fig. 4, the method further includes:
and step S105, when the validity period of the preset blacklist is exceeded, the calling number is removed from the blacklist of the calling number.
Compared with the embodiment shown in fig. 3, in this embodiment, a validity period of a blacklist may also be set, and when the validity period of the blacklist exceeds a preset validity period of the blacklist, the calling number is removed from the blacklist of the calling number, that is, the blacklist of the calling number is automatically invalidated, and it is determined whether the calling number is added to the blacklist when the next mining is waited.
By the scheme, the interception of the spam short messages is realized, the calling number for sending the spam short messages is easily positioned by the user, and the spam short messages are set as blacklist users so as to reject the short messages sent by the calling number. Compared with the existing blacklist added manually and the blacklist based on the calling sending frequency analysis, the method and the system have the advantages that the operation is simpler and more convenient, the error rate of the spam short message number is reduced, and the processing efficiency of a short message filtering system is improved; in addition, the embodiment further sets a validity period of the blacklist, and when the validity period of the blacklist exceeds the preset validity period of the blacklist, the blacklist of the calling number automatically fails, and whether the calling number is added to the blacklist is determined when the next mining is waited. Therefore, the flexibility of setting the calling number blacklist is improved, the permanent blacklist judgment of the calling number is avoided, and the possibility of misjudgment is reduced.
In addition, an embodiment of the present invention further provides an information intercepting apparatus, including:
the history acquisition module is used for acquiring the history of the information sent by the calling number;
the frequency acquisition module is used for acquiring the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
the information entropy acquisition module is used for calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and the judging and processing module is used for determining the calling number as a number for sending junk information when the called number information entropy of the calling number is greater than a preset threshold value, and adding the calling number into a calling number blacklist.
Further, the history record obtaining module is further configured to obtain a short message sending and receiving history record within a preset time period from a short message center, and obtain a history record of calling number sending information from the short message sending and receiving history record; or when monitoring that the calling number sends information, acquiring the history record of the calling number sending information.
Further, the apparatus further comprises:
the intercepting module is used for intercepting the information currently sent by the calling number after the judging and processing module adds the calling number into a calling number blacklist; or intercepting the information sent by the calling number when monitoring that the calling number sends the information.
Further, the information entropy obtaining module is further configured to compare the frequency of sending information by the calling number with a preset sending frequency threshold; and when the frequency of the information sent by the calling number reaches the preset sending frequency threshold, calculating the called number information entropy of the calling number according to a preset information entropy mining algorithm.
Further, the information entropy obtaining module is further configured to calculate, according to the total number of times of sending information of the calling number in a preset time period, the number of occurrences of each called number sent by the calling number in the preset time period; calculating the occurrence probability of each called number according to the total number of information sent by the calling number in a preset time period and the occurrence number of each sent called number; and calculating the called number information entropy of the calling number according to the occurrence probability of each called number and a preset information entropy calculation formula.
Further, the apparatus further comprises:
and the configuration module is used for setting a sending frequency threshold of the calling number and a preset threshold of the called number information entropy in the configuration file.
Further, the apparatus further comprises:
and the clearing module is used for clearing the calling number from the calling number blacklist when the validity period of the preset blacklist is exceeded.
Further, the intercepting module is further configured to filter the information according to the calling number blacklist when the information is received through the short message center, and intercept the information if the calling number of the information is in the calling number blacklist.
For the specific process and principle of information interception in this embodiment, please refer to the above embodiments, which are not described herein again.
Compared with the prior art, the scheme of the embodiment greatly reduces the complexity of manually judging and adding the blacklist, can automatically add the number blacklist of the short message, greatly improves the accuracy of the blacklist and reduces the false interception rate of the spam short message.
In addition, an embodiment of the present invention further provides an information intercepting apparatus, including: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor performing the operations of:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
Specifically, as shown in fig. 7, the terminal where the information interception apparatus of this embodiment is located may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the terminal structure shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 7, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an information interception program.
In the mobile terminal shown in fig. 7, the network interface 1004 is mainly used for connecting to a network server and performing data communication with the network server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call the information interception program stored in the memory 1005 and perform the following operations:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
acquiring a short message sending and receiving history record in a preset time period from a short message center, and acquiring a history record of calling number sending information from the short message sending and receiving history record; or
When monitoring that the calling number sends information, acquiring a history record of the calling number sending information.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
after the calling number is added into a calling number blacklist, the method further comprises the following steps:
intercepting the information currently sent by the calling number; or intercepting the information sent by the calling number when monitoring that the calling number sends the information.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
comparing the frequency of the calling number sending information with a preset sending frequency threshold;
and when the frequency of the information sent by the calling number reaches the preset sending frequency threshold, calculating the called number information entropy of the calling number according to a preset information entropy mining algorithm.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
calculating the occurrence frequency of each called number sent by the calling number in a preset time period according to the total number of information sending times of the calling number in the preset time period;
calculating the occurrence probability of each called number according to the total number of information sent by the calling number in a preset time period and the occurrence number of each sent called number;
and calculating the called number information entropy of the calling number according to the occurrence probability of each called number and a preset information entropy calculation formula.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
and setting a sending frequency threshold of the calling number and a called number information entropy preset threshold in the configuration file.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
and when the validity period of the preset blacklist is exceeded, the calling number is removed from the blacklist of the calling number.
Further, the processor 1001 may be further configured to call an information interception program stored in the memory 1005, and perform the following operations:
and when receiving information through a short message center, filtering the information according to the calling number blacklist, and if the calling number of the information is in the calling number blacklist, intercepting the information.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the following operations:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
For the specific information interception process in this embodiment, reference may be made to the above embodiments, which are not described herein again.
The above description is only for the preferred embodiment of the present invention and is not intended to limit the scope of the present invention, and all equivalent structures or flow transformations made by the present specification and drawings, or applied directly or indirectly to other related arts, are included in the scope of the present invention.

Claims (10)

1. An information interception method, comprising:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the occurrence frequency of each called number sent by the calling number according to the frequency of information sending of the calling number, and calculating the called number information entropy of the calling number according to the frequency of information sending of the calling number and the occurrence frequency of each called number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
2. The information interception method according to claim 1, wherein said step of obtaining a history of calling number transmission information includes:
acquiring a short message sending and receiving history record in a preset time period from a short message center, and acquiring a history record of calling number sending information from the short message sending and receiving history record; or
When monitoring that the calling number sends information, acquiring a history record of the calling number sending information.
3. The information interception method according to claim 2, wherein said step of determining that said calling number is a number for sending spam information and adding said calling number to a calling number blacklist further comprises:
intercepting the information currently sent by the calling number; or intercepting the information sent by the calling number when monitoring that the calling number sends the information.
4. The information interception method according to claim 1, wherein the step of calculating the called number information entropy of the calling number according to the frequency of sending information by the calling number comprises:
comparing the frequency of the calling number sending information with a preset sending frequency threshold;
when the frequency of the information sent by the calling number reaches the preset sending frequency threshold value, calculating the occurrence frequency of each called number sent by the calling number, and calculating the called number information entropy of the calling number by adopting a preset information entropy mining algorithm according to the frequency of the information sent by the calling number and the occurrence frequency of each called number.
5. The information interception method according to claim 4, wherein the frequency of sending information by the calling number is the total number of times of sending information by the calling number in a preset time period, and the step of calculating the number of occurrences of each called number sent by the calling number when the frequency of sending information by the calling number reaches the pre-configured sending frequency threshold value and calculating the called number information entropy of the calling number by using a preset information entropy mining algorithm according to the frequency of sending information by the calling number and the number of occurrences of each called number comprises:
calculating the occurrence frequency of each called number sent by the calling number in a preset time period according to the total number of information sending times of the calling number in the preset time period;
calculating the occurrence probability of each called number according to the total number of information sent by the calling number in a preset time period and the occurrence number of each sent called number;
and calculating the called number information entropy of the calling number according to the occurrence probability of each called number and a preset information entropy mining algorithm.
6. The information interception method according to any of claims 1 to 5, wherein said step of obtaining a history of calling number transmission information further comprises:
and setting a sending frequency threshold of the calling number and a called number information entropy preset threshold in the configuration file.
7. The information interception method according to any of claims 1 to 5, characterized in that said method further comprises:
and when the validity period of the preset blacklist is exceeded, the calling number is removed from the blacklist of the calling number.
8. The information interception method according to claim 3, wherein the step of intercepting the information sent by the calling number when the information sent by the calling number is monitored comprises:
when receiving information sent by a calling number through a short message center, filtering the calling number according to the calling number blacklist, and if the calling number is in the calling number blacklist, intercepting the information sent by the calling number.
9. An information intercepting apparatus, comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program when executed by the processor performing the operations of:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the occurrence frequency of each called number sent by the calling number according to the frequency of information sending of the calling number, and calculating the called number information entropy of the calling number according to the frequency of information sending of the calling number and the occurrence frequency of each called number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
10. A computer-readable storage medium, having a computer program stored thereon, which when executed by a processor, performs operations comprising:
acquiring a history record of calling number sending information;
obtaining the frequency of the information sent by the calling number according to the history record of the information sent by the calling number;
calculating the occurrence frequency of each called number sent by the calling number according to the frequency of information sending of the calling number, and calculating the called number information entropy of the calling number according to the frequency of information sending of the calling number and the occurrence frequency of each called number;
and when the called number information entropy of the calling number is larger than a preset threshold value, determining that the calling number is a number for sending junk information, and adding the calling number into a calling number blacklist.
CN201710474569.5A 2017-06-20 2017-06-20 Information interception method, device and storage medium Active CN109104702B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710474569.5A CN109104702B (en) 2017-06-20 2017-06-20 Information interception method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710474569.5A CN109104702B (en) 2017-06-20 2017-06-20 Information interception method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109104702A CN109104702A (en) 2018-12-28
CN109104702B true CN109104702B (en) 2021-07-02

Family

ID=64796055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710474569.5A Active CN109104702B (en) 2017-06-20 2017-06-20 Information interception method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109104702B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111556109B (en) * 2020-04-17 2021-05-18 北京达佳互联信息技术有限公司 Request processing method and device, electronic equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6701236B2 (en) * 2001-10-19 2004-03-02 Yamaha Hatsudoki Kabushiki Kaisha Intelligent mechatronic control suspension system based on soft computing
CN102111767A (en) * 2009-12-24 2011-06-29 上海粱江通信***股份有限公司 Method for improving correct rate of identifying junk short message number based on called dispersed degree
CN103714057A (en) * 2012-09-28 2014-04-09 北京亿赞普网络技术有限公司 Real-time monitoring method and device for online web information
CN103092975A (en) * 2013-01-25 2013-05-08 武汉大学 Detection and filter method of network community garbage information based on topic consensus coverage rate
CN104573304A (en) * 2014-07-30 2015-04-29 南京坦道信息科技有限公司 User property state assessment method based on information entropy and cluster grouping
CN104244216B (en) * 2014-09-29 2017-07-04 ***通信集团浙江有限公司 The method and system of real-time blocking fraudulent call in a kind of communication process
CN106506769B (en) * 2016-10-08 2019-01-04 浙江鹏信信息科技股份有限公司 A kind of method and system for realizing malicious call filtering using real time algorithm

Also Published As

Publication number Publication date
CN109104702A (en) 2018-12-28

Similar Documents

Publication Publication Date Title
EP2959707B1 (en) Network security system and method
US20230085233A1 (en) Cloud-based spam detection
US8984632B1 (en) Systems and methods for identifying malware
CN102209326B (en) Malicious behavior detection method and system based on smartphone radio interface layer
EP2800024A1 (en) System and methods for identifying applications in mobile networks
CN106201783B (en) A kind of data reconstruction method and device
CN105635044B (en) Information synchronization method and device
CN101715192B (en) Harassing call filtering method, device and system
CN109858250A (en) A kind of Android Malicious Code Detection model method based on cascade classifier
WO2014201872A1 (en) Method and device for processing short messages
CN111065061A (en) Short message request sending system and method based on multiple channels and storage medium
CN109474510B (en) Mailbox safety cross audit method, system and storage medium
CN105553770B (en) Data acquisition control method and device
CN104853357A (en) Method and system for automatically identifying and triggering fraud number
CN109104702B (en) Information interception method, device and storage medium
CN114168423A (en) Abnormal number calling monitoring method, device, equipment and storage medium
EP4052499B1 (en) Sim swap fraud detection
CN111786940A (en) Data processing method and device
CN111209171A (en) Closed loop handling method and device for security risk and storage medium
CN103326892B (en) The operating method and device of web interface
US8503636B1 (en) Systems and methods for blocking an outgoing request associated with an outgoing telephone number
US9374474B1 (en) System, method, and computer program for detecting duplicated telecommunications events in a consumer telecommunications network
CN111107552B (en) Method and system for identifying pseudo base station
CN105323733A (en) Short message filtering method and device
CN112040068B (en) False international number identification method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant