CN116546448B - Short message pushing system - Google Patents

Short message pushing system Download PDF

Info

Publication number
CN116546448B
CN116546448B CN202310487046.XA CN202310487046A CN116546448B CN 116546448 B CN116546448 B CN 116546448B CN 202310487046 A CN202310487046 A CN 202310487046A CN 116546448 B CN116546448 B CN 116546448B
Authority
CN
China
Prior art keywords
short message
information
module
risk
evaluation coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310487046.XA
Other languages
Chinese (zh)
Other versions
CN116546448A (en
Inventor
刘威
赵成奖
马崇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuangyan Yunzhi Information Technology Co ltd
Original Assignee
Shanghai Chuangyan Yunzhi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuangyan Yunzhi Information Technology Co ltd filed Critical Shanghai Chuangyan Yunzhi Information Technology Co ltd
Priority to CN202310487046.XA priority Critical patent/CN116546448B/en
Publication of CN116546448A publication Critical patent/CN116546448A/en
Application granted granted Critical
Publication of CN116546448B publication Critical patent/CN116546448B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a short message pushing system, which relates to the technical field of short message pushing and comprises a short message pushing module, a pushing system information acquisition module, a first analysis module, a comprehensive analysis module, a short message interception module, a short message transmission state receipt module, a receipt information acquisition module and a second analysis module. According to the invention, through risk analysis on the pushed short message, when the pushed short message has high risk, the pushed information is intercepted in time, so that the situation that a user of a short message receiving terminal is deceived due to unknowing the risk of the pushed short message is effectively prevented, and the short message with low risk is pushed; and after the short message with low risk is pushed, evaluating the risk after the short message is sent according to the short message receipt after the short message is sent, and if the short message after the short message is pushed has the risk, pushing the information again to the user terminal which is not intercepted with the information, and prompting the risk of the information, thereby further effectively preventing the user of the short message receiving terminal from being cheated.

Description

Short message pushing system
Technical Field
The invention relates to the technical field of short message pushing, in particular to a short message pushing system.
Background
With the development of mobile internet and the popularization of smart phones, people increasingly rely on the mobile phones to acquire information. As a traditional communication mode, the short message is widely applied to the field of enterprise marketing due to the characteristics of instant and conciseness and the like. At present, a plurality of short message marketing systems exist on the market, and the systems can generally realize basic functions of short message mass sending, timing sending and the like. The most commonly used solutions are enterprise short message group sending software, mobile short message platform and the like. These short message marketing systems have certain push capabilities.
The prior art has the following defects: in the prior art, a short message pushing system is adopted for pushing the short message, and because the short message pushing system cannot perform risk analysis on the pushed short message, when the risk exists in the pushed short message and a user of a short message receiving terminal does not know, the user of the short message receiving terminal may be cheated;
for example: when the number of a sender is imitated and an unreal short message is sent, a user of a short message receiving terminal may misunderstand that the pushed short message is true and is deceived;
after the information meeting the standard is pushed into the account of the terminal user after preliminary screening, the pushed short message cannot be further analyzed according to the information pushed to the user terminal, and when the short message after pushing also has risks, the pushed short message cannot be early-warned in time, and the situation that the user of the short message receiving terminal is deceived is likely to occur.
The above information disclosed in the background section is only for enhancement of understanding of the background of the disclosure and therefore it may include information that does not form the prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
The invention aims to provide a short message pushing system for solving the problems in the background technology.
In order to achieve the above object, the present invention provides the following technical solutions: a short message pushing system comprises a short message pushing module, a pushing system information acquisition module, a first analysis module, a comprehensive analysis module, a short message interception module, a short message transmission state receipt module, a receipt information acquisition module and a second analysis module;
the short message pushing module is used for pushing the short message;
the pushing system information acquisition module acquires the information pushed by the short message and the content information pushed by the short message, respectively generates a first evaluation coefficient and a second evaluation coefficient, and transmits the first evaluation coefficient and the second evaluation coefficient to the first analysis module;
the first analysis module is used for acquiring first evaluation coefficient information and second evaluation coefficient information, evaluating the risk of the short message, generating a first risk level and a second risk level, and transmitting the first risk level information and the second risk level information to the comprehensive analysis module;
the comprehensive analysis module is used for comprehensively analyzing the first risk level information and the second risk level information after acquiring the first risk level information and the second risk level information to generate a third risk level, and transmitting the generated third risk level information to the short message interception module;
the short message interception module intercepts or releases the short message pushed by the short message pushing module after receiving the third risk level information, and transmits the information of the short message to the short message transmission state receipt module and the receipt information acquisition module;
the short message transmission state receipt module sends a receipt for the transmission state of the short message;
the receipt information acquisition module acquires receipt information of the transmission state of the short message, generates a third evaluation coefficient and transmits the third evaluation coefficient to the second analysis module;
and the second analysis module is used for evaluating the risk after the short message is sent after receiving the third evaluation coefficient, generating fourth risk level information and acquiring the risk condition after the short message is sent.
Preferably, the information pushed by the short message comprises the sending frequency of the short message and the number of the using numbers for sending the same short message.
Preferably, after the collection, the push system information collection module respectively marks the collected short message sending frequency and the number of the same short message sending number as Px and Sx, and presets the short message sending frequency Px, the number of the same short message sending number Sx and the short message sending frequencyPreset value of number for same short message>Establishing a data analysis model, carrying out formulation processing, and generating a first evaluation coefficient Xi according to the following formula: />The method comprises the steps of carrying out a first treatment on the surface of the In (1) the->、/>Weight factors corresponding to the number of the short message sending frequency and the number of the same short message sending number are respectively used, and +.>Are all greater than 0, wherein->,/>
Preferably, the content information pushed by the short message comprises the ratio of wrongly written words and the ratio of sentences containing grammar errors.
Preferably, after collection, the push system information collection module marks the ratio of wrongly written words in the short message content and the ratio of sentences containing grammar errors asAnd->And the wrongly written word is taken up by +.>And the duty ratio of the sentence containing grammar error +.>Establishing a data analysis model, generating a second evaluation coefficient Yi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->And->Preset proportionality coefficients of the ratio of wrongly written words and the ratio of words containing grammar errors, respectively, and +.>And->Are all greater than 0.
Preferably, a threshold SS1 is set for the first evaluation coefficient Xi, a threshold SS2 is set for the second evaluation coefficient Yi, the first evaluation coefficient Xi is compared with the threshold SS1, the second evaluation coefficient Yi is compared with the threshold SS2, if the first evaluation coefficient Xi is greater than or equal to the threshold SS1, a first high risk mark is generated, if the first evaluation coefficient Xi is smaller than the threshold SS1, a first low risk mark is generated, if the second evaluation coefficient Yi is greater than or equal to the threshold SS2, a second high risk mark is generated, and if the second evaluation coefficient Yi is smaller than the threshold SS2, a second low risk mark is generated.
Preferably, the third risk level is generated as follows:
if the sent short message has the first low risk mark and the second low risk mark, marking the short message as a third low risk level, and if the sent short message has the first high risk mark or the second high risk mark or both the first high risk mark and the second high risk mark, marking the short message as the third high risk level;
when the short message interception module receives the short message marked as the third highest risk level, interception is implemented on the short message, and when the short message interception module receives the short message marked as the third lowest risk level, the short message is implemented and released, and the information of the short message sending completion is transferred to the short message transfer state receipt module and the receipt information acquisition module.
Preferably, the receipt information of the transmission state of the short message comprises the intercepted quantity of the short message caused by suspected fraud and the short message quantity duty ratio sent in non-working time;
after collection, the receipt information collection module marks the quantity of intercepted messages caused by suspected fraud and the proportion of the messages sent in non-working time asAnd->And is suspected of being fraudThe number of short messages intercepted caused by cheating is +.>Short message amount duty ratio of non-working time transmission +.>Establishing a data analysis model, and generating a third evaluation coefficient Zi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->And->The preset proportional coefficients of the intercepted quantity of the short message and the short message quantity duty ratio sent in the non-working time caused by suspected fraud are respectively +.>And->Are all greater than 0.
Preferably, a threshold SS3 is set for the third evaluation coefficient Zi, if the third evaluation coefficient Zi is greater than or equal to the threshold SS3, a fourth high risk level mark is generated, the second analysis module sends an instruction to the short message pushing module, the short message pushing module pushes information again to the user terminal marked as the third low risk level but not intercepted information, the risk is prompted to exist in the information, if the third evaluation coefficient Zi is less than the threshold SS3, a fourth low risk level mark is generated, and the second analysis module does not send an instruction to the short message pushing module.
A short message pushing method comprises the following steps:
collecting information pushed by a short message and content information pushed by the short message, and respectively generating a first evaluation coefficient and a second evaluation coefficient;
acquiring information of a first evaluation coefficient and a second evaluation coefficient, evaluating the risk of the short message, and generating a first risk level and a second risk level;
after the first risk level information and the second risk level information are obtained, comprehensively analyzing the first risk level information and the second risk level information to generate a third risk level;
intercepting or releasing the short message pushed by the short message pushing module;
collecting receipt information of the transmission state of the short message, and generating a third evaluation coefficient;
and after receiving the third evaluation coefficient, evaluating the risk after the short message is sent, generating fourth risk level information, and acquiring the risk condition after the short message is sent.
In the technical scheme, the invention has the technical effects and advantages that:
according to the invention, through risk analysis on the pushed short message, when the pushed short message has high risk, the pushed information is intercepted in time, so that the situation that a user of a short message receiving terminal is deceived due to unknowing the risk of the pushed short message is effectively prevented, and the short message with low risk is pushed; and after the short message with low risk is pushed, evaluating the risk after the short message is sent according to the short message receipt after the short message is sent, and if the short message after the short message is pushed has the risk, pushing the information again to the user terminal which is not intercepted with the information, and prompting the risk of the information, thereby further effectively preventing the user of the short message receiving terminal from being cheated.
Drawings
For a clearer description of embodiments of the present application or of the solutions of the prior art, the drawings that are needed in the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments described in the present invention, and that other drawings may be obtained according to these drawings for a person skilled in the art.
Fig. 1 is a schematic diagram of a system module of a short message pushing system according to the present invention.
Fig. 2 is a flow chart of a method of the short message pushing system of the present invention.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these example embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.
The invention provides a short message pushing system as shown in fig. 1 and 2, which comprises a short message pushing module, a pushing system information acquisition module, a first analysis module, a comprehensive analysis module, a short message interception module, a short message transmission state receipt module, a receipt information acquisition module and a second analysis module;
the short message pushing module is used for pushing the short message;
the pushing system information acquisition module acquires the information pushed by the short message and the content information pushed by the short message, respectively generates a first evaluation coefficient and a second evaluation coefficient, and transmits the first evaluation coefficient and the second evaluation coefficient to the first analysis module;
the information of the short message pushing comprises the short message sending frequency and the number of the using numbers of the same short message;
the same number sends a large number of short messages in a short time, which is very likely to be the operation of counterfeit numbers, the frequency of sending the short messages by a normal user is limited, and a counterfeiter can send a large number of short messages through an automatic program or other means in order to quickly achieve the purpose of fraud, so that the counterfeiter receives a large number of short messages sent by the same number in a short time, which is likely to be the fraudulent activity of the counterfeiter, so that when the sending frequency of the short messages is higher, the accuracy and the authenticity of the pushed messages are poorer, and the risk coefficient of the pushed short messages is higher, and conversely, the risk coefficient of the pushed short messages is lower;
the more the number of the same short message is sent, the greater the probability of the fake short message is, because the fake short message sender usually uses a plurality of numbers to send so as to avoid being identified and tracked, on the contrary, legal short messages are usually sent by using fixed numbers, because the numbers are verified and authorized, the validity and the credibility of the short message can be ensured, therefore, when a plurality of different numbers are found to send the same short message in a short time, the higher the risk coefficient of the pushed short message is indicated, and on the contrary, the lower the risk coefficient of the pushed short message is indicated;
after collection, the information collection module of the pushing system respectively marks the collected short message sending frequency and the number of the same short message sending number as Px and Sx, and presets the short message sending frequency Px, the number of the same short message sending number Sx and the short message sending frequencyPreset value of number for same short message>Establishing a data analysis model, carrying out formulation processing, and generating a first evaluation coefficient Xi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->、/>Weight factors corresponding to the number of the short message sending frequency and the number of the same short message sending number are respectively used, and +.>、/>Are all larger than 0, wherein the weight factors are used for balancing the duty ratio of each item of data in the formula, so that the accuracy of a calculation result is promoted, wherein ∈>,/>
The first evaluation coefficient Xi is used for analyzing the risk of pushing the short message, and the formula shows that when the short message sending frequency is higher, the number of the same short message to be sent is larger, namely the first evaluation coefficient Xi is larger, the risk coefficient of the short message to be pushed is higher, and when the short message sending frequency is lower, the number of the same short message to be sent is smaller, namely the first evaluation coefficient Xi is smaller, the risk coefficient of the short message to be pushed is lower;
the content information pushed by the short message comprises the duty ratio of wrongly written words and the duty ratio of sentences containing grammar errors;
the imitated push short message usually has language expression and spelling errors, such as mispronounced words, grammar errors and the like, which are often caused by insufficient fluency of language expression of a sketcher of the short message content or lack of professional knowledge, and the probability of error occurrence of the short message content subjected to professional editing is very small, so that the more the imitated push short message has errors, the higher the risk coefficient of the short message content is indicated, and conversely, the lower the risk coefficient of the short message content is;
the ratio of wrongly written words is the ratio of wrongly written words to the content of all short messages;
the ratio of grammar error sentences, namely the ratio of sentences with grammar errors to all short message content sentences;
identifying mispronounced words in the short message content can be achieved by:
natural language processing: the method has the advantages that the natural language processing technology is used, short message contents are processed and analyzed in the modes of word segmentation, part-of-speech tagging, named entity recognition and the like, mispronounced words in the short message contents are recognized, and the processing efficiency and accuracy can be effectively improved;
character string matching: for common wrongly written characters, the recognition can be carried out in a character string matching mode, a database of wrongly written characters needs to be constructed in advance, and then whether the wrongly written characters exist is matched in the short message content;
identifying grammar errors in the pushed short message can judge whether the short message accords with grammar rules through natural language processing technology such as grammar analysis, specifically, a grammar analyzer can be utilized to analyze the short message, determine sentence components and grammar structures, and further judge whether grammar errors exist; for example, when a subject and a predicate are inconsistent and a necessary verb or an article is missing in a sentence, a grammar error is generated, and the sentence is a sentence containing the grammar error;
after collection, the push system information collection module marks the ratio of misprinted words in the short message content and the ratio of sentences containing grammar errors as respectivelyAnd->And the wrongly written word is taken up by +.>And the duty ratio of the sentence containing grammar error +.>Establishing a data analysis model, generating a second evaluation coefficient Yi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->And->Preset proportionality coefficients of the ratio of wrongly written words and the ratio of words containing grammar errors, respectively, and +.>And->Are all greater than 0;
the second evaluation coefficient Yi is used for evaluating the risk of the short message content, and according to a formula, when the mispronounced word in the short message content is higher, the higher the mispronounced word in the short message content is, namely, the larger the value of Yi is, the higher the risk coefficient of the short message content is, and when the mispronounced word in the short message content is lower, the lower the mispronounced word in the short message content is, namely, the smaller the value of Yi is, the lower the risk coefficient of the short message content is;
the first analysis module is used for acquiring first evaluation coefficient information and second evaluation coefficient information, evaluating the risk of the short message, generating a first risk level and a second risk level, and transmitting the first risk level information and the second risk level information to the comprehensive analysis module;
setting a threshold value SS1 for the first evaluation coefficient Xi, setting a threshold value SS2 for the second evaluation coefficient Yi, comparing the first evaluation coefficient Xi with the threshold value SS1, comparing the second evaluation coefficient Yi with the threshold value SS2, generating a first high risk mark if the first evaluation coefficient Xi is greater than or equal to the threshold value SS1, generating a first low risk mark if the first evaluation coefficient Xi is less than the threshold value SS1, generating a second high risk mark if the second evaluation coefficient Yi is greater than or equal to the threshold value SS2, and generating a second low risk mark if the second evaluation coefficient Yi is less than the threshold value SS 2;
the comprehensive analysis module is used for comprehensively analyzing the first risk level information and the second risk level information after acquiring the first risk level information and the second risk level information to generate a third risk level, and transmitting the generated third risk level information to the short message interception module;
the third risk level is generated as follows:
if the sent short message has the first low risk mark and the second low risk mark, marking the short message as a third low risk level, and if the sent short message has the first high risk mark or the second high risk mark or both the first high risk mark and the second high risk mark, marking the short message as the third high risk level;
the short message interception module intercepts or releases the short message pushed by the short message pushing module after receiving the third risk level information, and transmits the information of the short message to the short message transmission state receipt module and the receipt information acquisition module;
when the short message interception module receives the short message marked as the third high risk level, interception is carried out on the short message, and the short message with high risk coefficient is effectively prevented from being transmitted to the user terminal, so that the user is effectively prevented from mistaking the pushed short message to be true and being deceived, when the short message interception module receives the short message marked as the third low risk level, the short message is carried out and released, and the information of the short message transmission completion is transmitted to the short message transmission state receipt module and the receipt information acquisition module;
the short message transmission state receipt module sends a receipt for the transmission state of the short message;
the receipt information comprises the mobile phone number of the short message receiving terminal, short message transmission states such as 'delivered', 'not delivered', short message delivery time or undelivered reasons (including 'not delivered' and the like displayed due to interception of the short message caused by suspected fraud), short message report generation time and the like;
the receipt information acquisition module acquires receipt information of the transmission state of the short message, generates a third evaluation coefficient and transmits the third evaluation coefficient to the second analysis module;
the receipt information of the transmission state of the short message comprises the quantity of intercepted short messages caused by suspected fraud and the short message quantity duty ratio sent in non-working time;
the possibility of sending the imitated short message in the non-working time is high, because the victim can not timely contact the related institutions for verification and confirmation in the non-working time, and meanwhile, the short message sent in the non-working time is easier to manufacture an urgent and urgent false image, so that the victim is induced to make a decision in a short time; in addition, the sending amount of the short messages in the non-working time is relatively less, so that the counterfeiter can more easily notice the sent short messages by the victim in the mode, and the possibility that the short messages are opened is increased;
after collection, the receipt information collection module marks the quantity of intercepted messages caused by suspected fraud and the proportion of the messages sent in non-working time asAnd->And the number of short messages intercepted caused by suspected fraud is +.>Short message amount duty ratio of non-working time transmission +.>Establishing a data analysis model, and generating a third evaluation coefficient Zi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->And->The preset proportional coefficients of the intercepted quantity of the short message and the short message quantity duty ratio sent in the non-working time caused by suspected fraud are respectively +.>And->Are all greater than 0;
the third evaluation coefficient Zi is used for evaluating the risk after the short message is sent, and according to a formula, when the number of short messages intercepted due to suspected fraud in the short message content is larger, the ratio of the short message quantity sent in the non-working time is higher, namely the value of Zi is larger, which indicates that the risk coefficient of the short message content is higher, when the number of short messages intercepted due to suspected fraud in the short message content is smaller, the ratio of the short message quantity sent in the non-working time is lower, namely the value of Zi is smaller, which indicates that the risk coefficient of the short message content is lower;
the second analysis module is used for evaluating the risk after the short message is sent after receiving the third evaluation coefficient, generating fourth risk level information and acquiring the risk condition after the short message is sent;
setting a threshold value SS3 for the third evaluation coefficient Zi, if the third evaluation coefficient Zi is greater than or equal to the threshold value SS3, generating a fourth high risk level mark, sending an instruction to the short message pushing module by the second analysis module, pushing information again to the user terminal marked as the third low risk level but not intercepted information by the short message pushing module, prompting that the information is at risk, further effectively preventing the user of the short message receiving terminal from being cheated, and if the third evaluation coefficient Zi is smaller than the threshold value SS3, generating a fourth low risk level mark, and sending no instruction to the short message pushing module by the second analysis module.
A short message pushing method comprises the following steps:
collecting information pushed by a short message and content information pushed by the short message, and respectively generating a first evaluation coefficient and a second evaluation coefficient;
acquiring information of a first evaluation coefficient and a second evaluation coefficient, evaluating the risk of the short message, and generating a first risk level and a second risk level;
after the first risk level information and the second risk level information are obtained, comprehensively analyzing the first risk level information and the second risk level information to generate a third risk level;
intercepting or releasing the short message pushed by the short message pushing module;
collecting receipt information of the transmission state of the short message, and generating a third evaluation coefficient;
after receiving the third evaluation coefficient, evaluating the risk after the short message is sent, generating fourth risk level information, and acquiring the risk condition after the short message is sent;
the specific method and flow of implementing corresponding functions by each module included in the short message pushing system are detailed in the embodiment of the short message pushing method, and are not repeated here.
According to the invention, through risk analysis on the pushed short message, when the pushed short message has high risk, the pushed information is intercepted in time, so that the situation that a user of a short message receiving terminal is deceived due to unknowing the risk of the pushed short message is effectively prevented, and the short message with low risk is pushed; and after the short message with low risk is pushed, evaluating the risk after the short message is sent according to the short message receipt after the short message is sent, and if the short message after the short message is pushed has the risk, pushing the information again to the user terminal which is not intercepted with the information, and prompting the risk of the information, thereby further effectively preventing the user of the short message receiving terminal from being cheated.
The above formulas are all formulas with dimensions removed and numerical values calculated, the formulas are formulas with a large amount of data collected for software simulation to obtain the latest real situation, and preset parameters in the formulas are set by those skilled in the art according to the actual situation.
While certain exemplary embodiments of the present invention have been described above by way of illustration only, it will be apparent to those of ordinary skill in the art that modifications may be made to the described embodiments in various different ways without departing from the spirit and scope of the invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive of the scope of the invention, which is defined by the appended claims.
It is noted that relational terms such as first and second, and the like, if any, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a random access memory (random access memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (5)

1. The short message pushing system is characterized by comprising a short message pushing module, a pushing system information acquisition module, a first analysis module, a comprehensive analysis module, a short message interception module, a short message transmission state receipt module, a receipt information acquisition module and a second analysis module;
the short message pushing module is used for pushing the short message;
the pushing system information acquisition module acquires the information pushed by the short message and the content information pushed by the short message, respectively generates a first evaluation coefficient and a second evaluation coefficient, and transmits the first evaluation coefficient and the second evaluation coefficient to the first analysis module;
the information of the short message pushing comprises the short message sending frequency and the number of the using numbers of the same short message;
after collection, the information collection module of the pushing system respectively marks the collected short message sending frequency and the number of the same short message sending number as Px and Sx, and presets the short message sending frequency Px, the number of the same short message sending number Sx and the short message sending frequency
Preset value of number for same short message>Establishing a data analysis model, carrying out formulation processing, and generating a first evaluation coefficient Xi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->、/>Weight factors corresponding to the number of the short message sending frequency and the number of the same short message sending number are respectively used, and +.>、/>Are all greater than 0, wherein->,/>
The content information pushed by the short message comprises the duty ratio of wrongly written words and the duty ratio of sentences containing grammar errors;
after collection, the push system information collection module marks the ratio of misprinted words in the short message content and the ratio of sentences containing grammar errors as respectivelyAnd->And the wrongly written word is taken up by +.>And the duty ratio of the sentence containing grammar error +.>Establishing a data analysis model, generating a second evaluation coefficient Yi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->And->Preset proportionality coefficients of the ratio of wrongly written words and the ratio of words containing grammar errors, respectively, and +.>And->Are all greater than 0;
the first analysis module is used for acquiring first evaluation coefficient information and second evaluation coefficient information, evaluating the risk of the short message, generating a first risk level and a second risk level, and transmitting the first risk level information and the second risk level information to the comprehensive analysis module;
the comprehensive analysis module is used for comprehensively analyzing the first risk level information and the second risk level information after acquiring the first risk level information and the second risk level information to generate a third risk level, and transmitting the generated third risk level information to the short message interception module;
the short message interception module intercepts or releases the short message pushed by the short message pushing module after receiving the third risk level information, and transmits the information of the short message to the short message transmission state receipt module and the receipt information acquisition module;
the short message transmission state receipt module sends a receipt for the transmission state of the short message;
the receipt information acquisition module acquires receipt information of the transmission state of the short message, generates a third evaluation coefficient and transmits the third evaluation coefficient to the second analysis module;
the receipt information of the transmission state of the short message comprises the quantity of intercepted short messages caused by suspected fraud and the short message quantity duty ratio sent in non-working time;
after collection, the receipt information collection module marks the quantity of intercepted messages caused by suspected fraud and the proportion of the messages sent in non-working time asAnd->And the number of short messages intercepted caused by suspected fraud is +.>Short message amount duty ratio of non-working time transmission +.>Establishing a data analysis model, and generating a third evaluation coefficient Zi according to the following formula:
the method comprises the steps of carrying out a first treatment on the surface of the In (1) the->And->The cause of the disease is respectively related toThe fraud causes the interception quantity of the short messages, the preset proportion coefficient of the short message quantity proportion sent in the non-working time, and +.>And->Are all greater than 0;
and the second analysis module is used for evaluating the risk after the short message is sent after receiving the third evaluation coefficient, generating fourth risk level information and acquiring the risk condition after the short message is sent.
2. The short message pushing system according to claim 1, wherein a threshold SS1 is set for the first evaluation coefficient Xi, a threshold SS2 is set for the second evaluation coefficient Yi, the first evaluation coefficient Xi is compared with the threshold SS1, the second evaluation coefficient Yi is compared with the threshold SS2, if the first evaluation coefficient Xi is greater than or equal to the threshold SS1, a first high risk flag is generated, if the first evaluation coefficient Xi is less than the threshold SS1, a first low risk flag is generated, if the second evaluation coefficient Yi is greater than or equal to the threshold SS2, a second high risk flag is generated, and if the second evaluation coefficient Yi is less than the threshold SS2, a second low risk flag is generated.
3. The short message pushing system according to claim 2, wherein the third risk level generating process is as follows:
if the sent short message has the first low risk mark and the second low risk mark, marking the short message as a third low risk level, and if the sent short message has the first high risk mark or the second high risk mark or both the first high risk mark and the second high risk mark, marking the short message as the third high risk level;
when the short message interception module receives the short message marked as the third highest risk level, interception is implemented on the short message, and when the short message interception module receives the short message marked as the third lowest risk level, the short message is implemented and released, and the information of the short message sending completion is transferred to the short message transfer state receipt module and the receipt information acquisition module.
4. The short message pushing system according to claim 1, wherein a threshold SS3 is set for the third evaluation coefficient Zi, if the third evaluation coefficient Zi is greater than or equal to the threshold SS3, a fourth high risk level mark is generated, the second analysis module sends an instruction to the short message pushing module, the short message pushing module pushes information again to the user terminal marked as the third low risk level but not intercepted information, the information is prompted to have a risk, if the third evaluation coefficient Zi is less than the threshold SS3, a fourth low risk level mark is generated, and the second analysis module does not send an instruction to the short message pushing module.
5. A method for pushing a short message, which is implemented by the short message pushing system according to any one of claims 1 to 4, and is characterized by comprising the following steps:
collecting information pushed by a short message and content information pushed by the short message, and respectively generating a first evaluation coefficient and a second evaluation coefficient;
acquiring information of a first evaluation coefficient and a second evaluation coefficient, evaluating the risk of the short message, and generating a first risk level and a second risk level;
after the first risk level information and the second risk level information are obtained, comprehensively analyzing the first risk level information and the second risk level information to generate a third risk level;
intercepting or releasing the short message pushed by the short message pushing module;
collecting receipt information of the transmission state of the short message, and generating a third evaluation coefficient;
and after receiving the third evaluation coefficient, evaluating the risk after the short message is sent, generating fourth risk level information, and acquiring the risk condition after the short message is sent.
CN202310487046.XA 2023-05-04 2023-05-04 Short message pushing system Active CN116546448B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310487046.XA CN116546448B (en) 2023-05-04 2023-05-04 Short message pushing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310487046.XA CN116546448B (en) 2023-05-04 2023-05-04 Short message pushing system

Publications (2)

Publication Number Publication Date
CN116546448A CN116546448A (en) 2023-08-04
CN116546448B true CN116546448B (en) 2024-04-12

Family

ID=87457094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310487046.XA Active CN116546448B (en) 2023-05-04 2023-05-04 Short message pushing system

Country Status (1)

Country Link
CN (1) CN116546448B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704691A (en) * 2016-04-27 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Scam short message recognition method and device
CN106792594A (en) * 2016-12-29 2017-05-31 江西博瑞彤芸科技有限公司 The sending method of short message
WO2017206341A1 (en) * 2016-06-03 2017-12-07 中兴通讯股份有限公司 Short message identification method and device
CN109040104A (en) * 2018-08-28 2018-12-18 浪潮软件集团有限公司 Distributed attack blocking method for receipt short messages
CN110337107A (en) * 2019-07-26 2019-10-15 金彩芬 A kind of fraud text message intelligent monitoring alarm device
CN113762976A (en) * 2021-09-15 2021-12-07 中国银行股份有限公司 Method and device for identifying fraud short messages, electronic equipment and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105704691A (en) * 2016-04-27 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Scam short message recognition method and device
WO2017206341A1 (en) * 2016-06-03 2017-12-07 中兴通讯股份有限公司 Short message identification method and device
CN106792594A (en) * 2016-12-29 2017-05-31 江西博瑞彤芸科技有限公司 The sending method of short message
CN109040104A (en) * 2018-08-28 2018-12-18 浪潮软件集团有限公司 Distributed attack blocking method for receipt short messages
CN110337107A (en) * 2019-07-26 2019-10-15 金彩芬 A kind of fraud text message intelligent monitoring alarm device
CN113762976A (en) * 2021-09-15 2021-12-07 中国银行股份有限公司 Method and device for identifying fraud short messages, electronic equipment and computer storage medium

Also Published As

Publication number Publication date
CN116546448A (en) 2023-08-04

Similar Documents

Publication Publication Date Title
CN111274782B (en) Text auditing method and device, computer equipment and readable storage medium
WO2020134657A1 (en) System log desensitization method, desensitization system, computer device, and storage medium
US8661545B2 (en) Classifying a message based on fraud indicators
US20050060643A1 (en) Document similarity detection and classification system
CN106296195A (en) A kind of Risk Identification Method and device
CN103415004B (en) A kind of method and device detecting junk short message
CN106874253A (en) Recognize the method and device of sensitive information
CN106713579B (en) Telephone number identification method and device
CN108418777A (en) A kind of fishing mail detection method, apparatus and system
CN111078978A (en) Web credit website entity identification method and system based on website text content
CN108366052A (en) Verify the processing method and system of short message
CN104852916A (en) Social engineering-based webpage verification code recognition method and system
CN110598982A (en) Active wind control method and system based on intelligent interaction
CN108446543B (en) Mail processing method, system and mail proxy gateway
JP2022548501A (en) Data acquisition method and device for analyzing cryptocurrency transactions
CN106790025B (en) Method and device for detecting link maliciousness
KR102297620B1 (en) In-game sexual harassment monitoring system
CN112039874B (en) Malicious mail identification method and device
CN116546448B (en) Short message pushing system
CN115603926A (en) Phishing mail identification method, system, device and storage medium
CN113438369A (en) Illegal quality inspection method and device based on business telephone recording and related equipment
CN110380952B (en) Mail receiving and sending method and device
CN116881408A (en) Visual question-answering fraud prevention method and system based on OCR and NLP
CN113923011B (en) Phishing early warning method, device, computer equipment and storage medium
CN115687754A (en) Active network information mining method based on intelligent conversation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant