Multi-dimensional spam message filtering method and system

A technology of spam text messages and filtering methods, which is applied in wireless communication, advanced technology, security devices, etc., and can solve problems such as wireless network resource shortage, only spam text messages, congestion, etc.

Inactive Publication Date: 2015-12-16
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. Force users to re-select into the simulated mobile system within the coverage of the fake base station. During this period, users will not be able to use the normal services provided by the mobile operator (shown as disconnected from the network). Generally, mobile phone users will temporarily disconnect from the network for 8-12 seconds. Some mobile phone users must switch on and off to re-connect to the network
[0008] 2. Pseudo base stations steal the frequency resources of mobile operators, and high-power transmission will cause strong interference to the surrounding wireless environment, which will cause unstable service quality of mobile operators
[0009] 3. The existence of pseudo base stations will also cause mobile phone users to generate frequent location updates, which will make the wireless network resources in this area tense and local congestion will occur, affecting the normal communication services of users
[0010] 4. The fake base station can display the sending number as any number, even 10086, 95555, 110 and other special numbers for public security and banks, making it difficult to distinguish. Criminals use this to conduct text message fraud, causing huge social harm
Although many of them claim to have the protection function of fake base stations, in reality, the essence of SMS interception in the market is still based on feature word matching and user blacklist matching, so one of the biggest sources of improved variant SMS and spam SMS Pseudo base station text messages have no protective effect
[0012] And now for the processing of SMS, most mobile phone protection software only considers spam SMS, but does not take into account the continuous improvement of users' demand for mobile phone SMS functions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-dimensional spam message filtering method and system
  • Multi-dimensional spam message filtering method and system
  • Multi-dimensional spam message filtering method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The specific implementation of the present invention will be described below in conjunction with the accompanying drawings, so that those skilled in the art can better understand the present invention. It should be particularly noted that in the following description, detailed descriptions of known functions and designs will be omitted when they may obscure the gist of the present invention.

[0023] figure 1 , figure 2 It is the overall architecture and module relationship diagram of this protection system, which illustrates the main functions of each module and the control relationship between modules.

[0024] Turn on the pseudo-base station module, and first obtain the signal status of the mobile phone. If it remains stable for a period of time, the system will stay in the waiting state and will not execute the pseudo-base station discrimination algorithm; when the signal changes, the pseudo-base station discrimination algorithm will be executed, as follows:

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a multi-dimensional spam message filtering method and designs a corresponding system. The following three main functions are realized by a spam message interception module and a short message management module: 1, intercepting variant spam messages and pseudo base-station spam messages; 2, positioning pseudo base-stations; and 3, increasing short message security encryption, importance reminding and other management functions. Through more than 3000 spam message interception tests on more than 100 mobile phones, a basic function module is realized, the running is stable, the occupied internal storage is 4.5M, and the power consumption is only 0.2%. Compared with the existing spam message protection systems on the market, the system and method provided by the present invention are obviously improved, greatly help users to avoid harassment of the spam messages and bring convenience for the users.

Description

technical field [0001] The invention relates to the fields of data mining and complex network analysis, in particular to a community structure detection method based on mixed measures in large-scale weighted social networks. technical field [0002] The invention belongs to the technical field of information security, and is specifically an improvement on an existing method for intercepting spam short messages. It proposes a perfect solution for pseudo-base stations and variant spam short messages, and adds management functions according to user needs. Background technique [0003] Nowadays, the proliferation of spam text messages has seriously affected people's normal life, the image of operators and even social stability. The specific hazards can be divided into the following aspects: (1) using text messages to blackmail and defraud; (2) spreading false news and rumors, causing widespread panic among the masses; (3) spreading pornographic information and poisoning the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/14H04W12/12H04W12/128
CPCH04W4/14H04W12/12Y02D30/70
Inventor 王瑞锦张凤荔秦志光王昊李冬芬田飞陈中王罗昊项阳黄亚娟
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products