Method and system for monitoring suspicious user of rubbish SMS

A technology of spam short message and monitoring system, applied in the field of short message system, can solve the problem of single strategy for capturing suspicious users, etc.

Inactive Publication Date: 2007-09-26
ZTE CORP
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the defect that the strategy for capturing suspicious users is too single in the existing spam short message monitoring system, the present invention provides a method for monitoring suspicious spam short message users, comprising the following steps:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring suspicious user of rubbish SMS
  • Method and system for monitoring suspicious user of rubbish SMS
  • Method and system for monitoring suspicious user of rubbish SMS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0028] For the convenience of description, first define a few nouns:

[0029] 1) Monitoring type: one of the necessary attributes in each rule, indicating which type the rule is based on, and the monitoring type is divided into two categories: initial call and final call, respectively for initial call response and final call The reason for the success or failure of the call response.

[0030] 2) Monitoring by frequency: monitor the amount of messages per unit time, which is directly obtained through the count value of a certain monitoring type.

[0031] 3) Monitor by ratio: monitor a certain ratio (for example, call success rate), which is obtained by dividing the count values ​​of two monitoring types.

[0032] 4) Rule cluster: a set of rules with "and" relationship.

[0033] 5) First rule: the initial rule of a rule cluster.

[0034] 6)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed monitor method for suspected garbage SMS user comprises: (1) the monitor system sets the monitor type and rules, and initiates the flow counting memory library according to monitor type quantity; (2) the monitor system obtains the SMS structure to extract its initial user number for counting in the memory library; and (3) after obtaining the user SMS in a period, the system decides whether user breaks the rule as the set rules one by one till finding out the suspected user. This invention enriches the strategy on catching suspected user in current system.

Description

technical field [0001] The invention relates to the field of short message systems, in particular to a method and system for monitoring suspicious users of spam short messages. Background technique [0002] At present, the function of the message center in the communication field is growing day by day: from the short message center, to the multimedia message center and then to the mail center. The number of users is also increasing day by day; various operators, profit groups and individuals use the promotion means of the message center to emerge in an endless stream; the interconnection and intercommunication activities among various networks are in full swing; In this market environment, a large amount of spam messages and malicious messages will inevitably appear, and the group or individual who sends out such messages is considered a suspicious user, or even a blacklisted user. Spam messages in a short period of time can paralyze the production environment of operators ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/22H04Q7/34H04M3/436H04M1/663H04M15/00H04W4/14H04W12/128H04W24/00
Inventor 陈苏刘加龙
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products