Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal and junk information effectively filtering method and device thereof

A spam and spam technology, applied in special data processing applications, instruments, electrical digital data processing, etc., can solve problems such as unrecognizable spam keywords

Active Publication Date: 2015-01-07
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a mobile terminal and its method and device for effectively filtering spam information, so as to achieve the purpose of effectively filtering spam information and overcome the defect that the above-mentioned existing security software cannot identify spam keywords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal and junk information effectively filtering method and device thereof
  • Mobile terminal and junk information effectively filtering method and device thereof
  • Mobile terminal and junk information effectively filtering method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 It is a flow chart of a method for effectively filtering junk information according to an embodiment of the present invention, combined below figure 1 To describe a method for effectively filtering junk information according to an embodiment of the present invention, such as figure 1 As shown, in order to prevent spam pushers from editing part of the text in the message into pinyin to avoid identification of spam keywords, the method includes the following steps:

[0027] S10. When a message is received, acquire the message content of the received message;

[0028] S20. Convert the text in the message content into pinyin, and obtain all the pinyin included in the converted message content;

[0029] S30. Perform semantic analysis on the converted pinyin through the input method lexicon;

[0030] S40. According to the result of the semantic analysis, determine whether the message content is spam, if so, filter the message content, otherwise, display the messag...

Embodiment 2

[0040] figure 2 It is a flowchart of a semantic analysis method according to an embodiment of the present invention, such as figure 2 As shown, the present invention includes the above step S10 and step S20, and the above step S30 specifically includes:

[0041] S31. Translate the acquired pinyin into all possible Chinese sentences according to the input method lexicon;

[0042] S32. Carry out word segmentation for each translated sentence, and obtain all vocabulary after word segmentation of all sentences;

[0043] S33. Based on the number of all possible sentences, calculate the occurrence frequency of each vocabulary;

[0044] S34. Obtain the weight of each vocabulary according to the weight of the preset junk keywords, and record the weight of the vocabulary as zero if there is no corresponding vocabulary in the preset junk keywords;

[0045] S35. Combining the occurrence frequency of each word and the weight of the word, calculate the spam similarity of the message c...

Embodiment 3

[0054] image 3 It is a flowchart of a method for removing special characters according to an embodiment of the present invention, such as image 3 As shown, in order to avoid that spam keywords are not identified due to inserting special characters when spammers edit messages, the present invention includes above-mentioned step S10, step S20, step S30, and step S40 (step S40 is in image 3 not shown), also includes:

[0055] S51. Extract preset characters included in the message content;

[0056] S52. Eliminate the extracted characters.

[0057] As an option, the above steps S51 and S52 may be between step S10 and step S20 as shown in the figure, or steps S51 and S52 may be placed between step S20 and step S30.

[0058] Wherein, the above preset characters include but not limited to special characters such as space, ",", "*", "#".

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal and a junk information effectively filtering method and device thereof and belongs to the technical field of mobile terminals. The junk information effectively filtering method comprises, when a message is received, obtaining the content of the received message; converting characters inside the message content into pinyin letters; performing semantic analysis on the converted pinyin letters through an input method word library; according to the result of the semantic analysis, determining whether the message content is junk, and if so, filtering out the message content. The junk information effectively filtering method can effectively filter junk messages by converting the received message content into the pinyin letters and then determining whether the received message is a junk message according to the semantic analysis on the pinyin letters.

Description

technical field [0001] The present invention relates to the technical field of mobile terminals, in particular to a mobile terminal and its method and device for effectively filtering junk information. Background technique [0002] With the widespread popularization of smart mobile terminals and the rapid development of mobile Internet technology, instant tools in mobile terminals often send and receive a large amount of information. While enjoying the convenience brought by the information wave, people also need to endure the harassment of a large amount of spam information, which brings troubles to users. [0003] Aiming at this situation, a lot of mobile terminal security software emerges as the times require to filter junk information and provide users with a clean mobile terminal environment. Common filtering methods include: filtering according to mobile phone numbers, filtering unknown contact information; blacklist filtering; filtering preset content; receiving the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30G06F17/27
CPCG06F16/9535G06F40/216
Inventor 王贤伟
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products