Method and apparatus for intercepting junk mail

A spam and mail technology, applied in the field of network communication, can solve problems such as low efficiency and affecting user use effect, and achieve the effect of improving scanning speed and efficiency

Active Publication Date: 2009-04-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above processing forms of full-text sequential scanning or regular expression matching use the complete strings in the string library to filter emails. When the size of the string library is relatively large, the efficiency is low, and it is impossible to filter the received emails in real time. , which seriously affects the user's use effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for intercepting junk mail
  • Method and apparatus for intercepting junk mail
  • Method and apparatus for intercepting junk mail

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] The processing flow of the method for intercepting spam provided by this embodiment is as follows: figure 1 As shown, the following processing steps are included:

[0036] Step 11, acquiring the text data of the emails that need to be filtered.

[0037] After receiving an email that needs to be filtered, the email is decoded to obtain the title and text content of the email, and after the title and the text are directly spliced, a text data to be filtered is obtained, and the text data is saved.

[0038] Step 12, according to the loaded character string resource library, establish the total hash table and the hash linked list in the hash scheme.

[0039] After obtaining the text data of the above email, the string resource library needs to be loaded. The strings in the string resource library are composed of one or more character units, which can be: an English word, a Chinese character, a single English letter, half a Chinese character, or a full-width and half-width...

Embodiment 2

[0056] The embodiment of the present invention also provides a device for intercepting spam, and its specific implementation structure is as follows: figure 2 As shown, it may specifically include:

[0057] Text data obtaining module 21, is used for obtaining the text data of the mail that needs to be filtered;

[0058] Character judging module 22, is used for judging whether described text data contains the keyword in the character string in the character string resource storehouse that is used for mail filtering, when described text data contains described keyword, then judges described Whether the text data contains the character string in the character string resource library corresponding to the keyword;

[0059] The email processing module 23 is configured to determine whether the email is spam according to the determination result of whether the text data contains the character string in the character string resource library corresponding to the keyword, and a predete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for intercepting junk e-mail and a device thereof. The method mainly comprises: text data of an e-mail, which needs to be filtered is acquired, and whether the text data includes a key word which is in a character string in a character string resource bank and is used for filtering the e-mail or not is judged; when the key word is included in the text data, whether the text data includes the character string in the character string resource bank corresponding to the key word or not is judged; according to the judgment result that whether the text data includes the character string in the character string resource bank corresponding to the key word or not and a pre-determined judgment strategy, whether the e-mail is the junk e-mail or not is determined, and the junk e-mail is intercepted. By adopting the invention, the text data of the e-mail is scanned according to the key word, after the key word is matched, the text data of the e-mail is scanned according to the character string corresponding to the key word, so that the scanning speed and efficiency are improved, and the e-mail can be filtered in real time when the character string library is larger.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method and device for intercepting spam. Background technique [0002] In the field of e-mail, spam is becoming more and more rampant, which not only increases the processing time of normal mail users, but also wastes valuable resources of the mail system, thereby hindering the process of users obtaining useful information. Therefore, spam is a must. issues that need resolving. [0003] At present, string-based interception technology is commonly used in email systems to combat spam. This string-based interception technology needs to establish a string library in advance. The strings in the string library use existing words or words. The length of the string is relatively fixed. The string library needs to have a certain update period and scale, and the string size available for scanning in the string library often reaches millions. In practical applications, u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/12H04W48/08H04W12/12
CPCH04L12/585H04L51/12H04L51/212
Inventor 王晖
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products