Unlock instant, AI-driven research and patent intelligence for your innovation.

Information intercepting method and device

A technology for text information and recommended information, applied in the field of communication, can solve the problems of mobile phone number leakage, disrupting the normal life of users, and poor effect.

Inactive Publication Date: 2016-06-15
NUBIA TECHNOLOGY CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because the current society does not pay enough attention to the privacy of users, many companies even illegally sell users' private information, making users' mobile phone numbers easily leaked. Send users spam messages such as sales promotion, fraud, insurance, etc., disrupting the normal life of users
[0004] In the existing technology, it is possible to intercept information according to the number of the sender, but based on technologies such as pseudo-base stations, the sending numbers of many spam messages are randomly generated, and users cannot predict and intercept them in advance, so the effect of this interception method is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information intercepting method and device
  • Information intercepting method and device
  • Information intercepting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] The embodiment of the present invention provides an information interception method, which is applied to a terminal. The terminal may be a mobile phone, a tablet computer, or other terminals capable of receiving text information, which is not limited in the embodiment of the present invention. Such as image 3 As shown, the information interception method includes:

[0095] Step 301, receiving text information.

[0096] Exemplarily, the text information may be a short message, Fetion, or information received in other instant messaging tools, which is not limited in this embodiment of the present invention.

[0097] Take the mobile phone as an example. The mobile phone is usually connected to the base station wirelessly. The information sent by the information sender is relayed by the base station and then sent to the mobile phone. Therefore, the mobile phone generally receives the text information through the base station. However, in order to increase the success rat...

Embodiment 2

[0110] An embodiment of the present invention provides an information interception method, such as Figure 10 shown, including:

[0111] Step 1001, setting a database of sensitive words, and executing step 1002.

[0112] For example, the sensitive word database may be determined according to the sensitive word information input by the user, and the sensitive word database includes a plurality of sensitive words. For example, the user currently has no plans to buy a house or a car with a loan, so the three words "loan", "house" and "car" can be input into the terminal as sensitive words. For the three words "vehicle", set up a database of sensitive words.

[0113] As an example, it is also possible to first receive the sensitive word recommendation information sent by the server. The sensitive word recommendation information includes multiple sensitive words obtained by the server according to the usage rate from large to small. For example, the server may upload the Sensiti...

Embodiment 3

[0134] An embodiment of the present invention provides an information interception device 110, such as Figure 11 shown, including:

[0135] The first receiving unit 1101 is configured to receive text information.

[0136] The first determining unit 1102 is configured to determine whether there are sensitive words in the text information.

[0137] A setting unit 1103, configured to set the text information as interception information when sensitive words exist in the text information.

[0138] In this way, regardless of whether the information sender's number is known or not, and no matter what type of number the information sender's number is, as long as the received text message contains sensitive words, the information can be intercepted, which improves the security of information interception. Efficiency, thereby improving the user experience.

[0139] Optionally, the first determination unit 1102 is specifically configured to: divide the text information into N text se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an information intercepting method. The method comprises following steps of receiving character information; determining whether sensitive words are in the character information; when the sensitive words are in the character information, setting the character information as intercepting information. Further, the embodiment of the invention also discloses an information intercepting device.

Description

technical field [0001] The invention relates to information security technology in the communication field, in particular to an information interception method and device. Background technique [0002] As the intelligence of mobile terminals becomes higher and higher, the application of mobile terminals is also more and more extensive. Many users, as well as between merchants and users, can communicate by sending text messages. [0003] However, because the current society does not pay enough attention to the privacy of users, many companies even illegally sell users' private information, making users' mobile phone numbers easily leaked. Send spam messages such as sales promotion, fraud, insurance, etc. to users, disrupting the normal life of users. [0004] In the prior art, the information sender's number can be intercepted, but based on technologies such as pseudo-base stations, the sending numbers of many spam messages are randomly generated, and users cannot predict an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/12G06F17/30H04W12/80
CPCH04W4/14H04W12/12G06F16/3329G06F16/374
Inventor 徐晓利
Owner NUBIA TECHNOLOGY CO LTD