Information interception method, device and system

A technology for information content and sending information, applied in the information field, can solve the problem of not being able to intercept spam messages in a timely and effective manner, and achieve the effect of simple and timely interception

Active Publication Date: 2014-09-10
KENIU NETWORK TECH BEIJING
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method only judges the rules locally and has strong limitations. It is easy for criminals to easily evade the keyword matching detection rules, such as adding special symbols between keywords or replacing them with homophones, etc.
Moreover, most of the spam messages are sent in bulk through SMS mass senders. If you wait until a large number of users report and then modify the interception rules and push the rules to the local area, the mass spam messages may have already been sent, so the spam messages cannot be blocked in a timely and effective manner.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information interception method, device and system
  • Information interception method, device and system
  • Information interception method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0039] See figure 1 , Is a schematic flow chart of an information interception method provided by an embodiment of the present invention. The method in the embodiment of the present invention can be specifically applied to a detection terminal that can be used to detect and store information data such as a cloud server. Specifically, the Methods include:

[0040] S101: Receive the content ciphertext data and its identification ciphertext d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an information interception method. The information interception method includes receiving content ciphertext data and identification ciphertext data sent by a client; detecting whether information indicated by the content ciphertext data is harassing information or not if the combination number of the received content ciphertext data and the identification ciphertext data is detected to reach a preset threshold value; if so, indicating the client to intercept the information. The embodiment of the invention also discloses a detecting terminal, a client and an information interception system. The information interception method, the detecting end, the client and the information interception system can effectively and timely intercept spam messages of mass texting and are simple in the method.

Description

Technical field [0001] The present invention relates to the field of information technology, in particular to an information interception method, device and system. Background technique [0002] With the rapid development of mobile communication services, mobile phones have become an indispensable communication tool in people's daily lives. As one of the key information transmission methods between mobile terminals such as mobile phones, short messages have been widely used, bringing great convenience to people. However, attracted by a large number of users who use short messages, some criminals attempt to seek profits through a large number of advertising short messages, fraudulent short messages and other spam short messages, causing great harassment to users. [0003] Currently, some spam messages can be intercepted through the interception client on the mobile phone. When the client detects spam messages, it uses preset local rules to detect spam messages and intercepts messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王春雷傅盛
Owner KENIU NETWORK TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products