Method for distinguishing suspicious spam message

A spam and suspicious technology, applied in the field of communication, can solve the problems of limited identification of spam messages and misjudgment by normal users.

Inactive Publication Date: 2012-01-11
秦政
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The above methods are easy to cause misjudgment of normal users, and the identification of spam messages is very limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for distinguishing suspicious spam message
  • Method for distinguishing suspicious spam message
  • Method for distinguishing suspicious spam message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Embodiments of the present invention will now be described in detail in conjunction with the accompanying drawings.

[0029] refer to figure 1 The network diagram of the suspicious spam short message discrimination system implemented by the present invention is shown, according to figure 2 The process of judging suspicious spam text messages shown, except major festivals: such as Spring Festival, Lantern Festival, Dragon Boat Festival, Mid-Autumn Festival, National Day, New Year’s Day, May 1st, Christmas, Valentine’s Day, Father’s Day, Mother’s Day, etc., spam text message analysis and identification server The short message bill collection module collects short message bills from the short message center, and the suspicious spam short message statistical analysis and discrimination module of the server analyzes the suspicious short message receiving direction and suspicious short message number of overfrequency signal codes in one or more time periods, and sends suspi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for distinguishing suspicious spam message, which can be applied in the public telephone communication network, is disclosed. The method comprises the following steps that: a short message ticket acquisition module of a spam message analysis discrimination server collects short message ticket from a short message center; a suspicious spam message statistics analysis and discrimination module of the server analyzes a suspicious short message receiving direction and a suspicious short message number of overclocking sending signal code in one or more time quantum, compares a ratio of short message sending amount of the suspicious short message number in all suspicious short message directions to the whole short message sending amount of the number with a thousand digit and a hundred digit of the other suspicious short message numbers, and carries out statistics and analysis to association situations of suspicious short message direction number; user information data of the suspicious short message numbers is retrieved from a charging tent system and discrimination is performed; the numbers which satisfy all the setting rules and conditions simultaneous can be determined to be sending numbers of the suspicious spam message, and the numbers are classified in a blacklist and put into a short message center. By using the method, accuracy of discriminating the spam message can be greatly raised.

Description

technical field [0001] The invention relates to a short message system and belongs to the communication field. Background technique [0002] Some lawbreakers in the society are driven by economic interests, and activities such as mobile phone text message fraud and dissemination of illegal text messages are becoming more and more rampant. One is to send illegal text messages in the name of a bank or UnionPay to defraud or extort public and private property; the other is to spread obscenity, pornography, gambling, violence, murder, terrorist content or to instigate crimes and teach criminal methods; the third is to illegally sell guns, ammunition, Explosives, smuggled cars, drugs, ecstasy, obscene items, counterfeit banknotes, fake invoices, or stolen goods known to be obtained by crimes; the fourth is posting fake lottery wins, fake matchmaking, fake recruitment, or luring or introducing others to prostitution and whoring; fifth is Repeatedly send content that interferes wi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12H04W88/18H04W12/128
Inventor 不公告发明人
Owner 秦政
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products