Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method for Identifying Spam Sources Based on Frequency and Called Distribution Rules

A technology of spam text messages and text messages, applied in wireless communication, network data management, security devices, etc., can solve problems such as ineffective identification, and achieve the effect of improving completeness and precision, accurate search and management

Inactive Publication Date: 2017-08-08
SHANGHAI LIANGJIANG COMM SYST
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the above-mentioned situation where a large number of numbers send spam messages at a low speed, the existing interception methods based on frequency and content cannot effectively identify

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Identifying Spam Sources Based on Frequency and Called Distribution Rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below.

[0035] see figure 1 , the method for identifying spam source based on frequency and called distribution rules of the present invention, specifically comprises the following steps:

[0036] Step S1: Set parameters and rules, that is, set time granularity range, SMS frequency threshold and called number dispersion rules, among which:

[0037] SMS frequency threshold, that is, the maximum threshold of the number of SMS messages sent by the calling source within the set time granularity range; when the number of SMS messages sent by the calling source within the set time granularity range exceeds the SMS frequency threshold, the calling source SMS messages will be monitored;

[0038] Called number dispersal rules, that is, within the set time granularity, monitor the dispersive rule feature of calling source SMS sending called numbers; when the sending behavior of the calling source conforms to the called number dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying spam sources based on frequency and called distribution rules, including: setting the short message frequency threshold, that is, the maximum threshold of the number of short messages sent by the calling source within the set time granularity range, when the set When the number of short messages sent by the calling source within the time granularity exceeds the SMS frequency threshold, the short messages of the calling source will be monitored; set the called number dispersion rule, that is, monitor the calling source within the set time granularity Dispersion rules of called numbers for SMS sending. When the sending behavior of the calling source conforms to the called number dispersion rules within the set time granularity, the calling source is determined to be a spam source. The invention intercepts short messages according to the method of combining called rules and frequency of spam short messages, adopts calling source monitoring and adds calling sources conforming to called dispersion characteristics into blacklist.

Description

technical field [0001] The invention relates to a method for identifying spam message sources based on frequency and called distribution rules. Background technique [0002] With the strengthening of spam SMS management, the behavior of sending spam SMS is also gradually changing. The behavior of spam SMS sources is also more and more imitating the sending behavior of normal users. Discrete so that it can be used to interfere with the existing SMS spam management system. Even so, the behavior of sending spam text messages still has its unique rules, and the called numbers scatter to present specific rules within a specific time of sending. [0003] For the above-mentioned situation where a large number of numbers send spam short messages at a low speed, the existing blocking methods based on frequency and content cannot effectively identify them. Contents of the invention [0004] The purpose of the present invention is to overcome the defect of prior art and provide a k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/14H04W8/26H04W12/12H04W12/128
Inventor 狄卫华
Owner SHANGHAI LIANGJIANG COMM SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products