Information intercepting method and device
A technology for text information and recommended information, applied in the field of communication, can solve the problems of mobile phone number leakage, disrupting the normal life of users, and poor effect.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0094] The embodiment of the present invention provides an information interception method, which is applied to a terminal. The terminal may be a mobile phone, a tablet computer, or other terminals capable of receiving text information, which is not limited in the embodiment of the present invention. Such as image 3 As shown, the information interception method includes:
[0095] Step 301, receiving text information.
[0096] Exemplarily, the text information may be a short message, Fetion, or information received in other instant messaging tools, which is not limited in this embodiment of the present invention.
[0097] Take the mobile phone as an example. The mobile phone is usually connected to the base station wirelessly. The information sent by the information sender is relayed by the base station and then sent to the mobile phone. Therefore, the mobile phone generally receives the text information through the base station. However, in order to increase the success rat...
Embodiment 2
[0110] An embodiment of the present invention provides an information interception method, such as Figure 10 shown, including:
[0111] Step 1001, setting a database of sensitive words, and executing step 1002.
[0112] For example, the sensitive word database may be determined according to the sensitive word information input by the user, and the sensitive word database includes a plurality of sensitive words. For example, the user currently has no plans to buy a house or a car with a loan, so the three words "loan", "house" and "car" can be input into the terminal as sensitive words. For the three words "vehicle", set up a database of sensitive words.
[0113] As an example, it is also possible to first receive the sensitive word recommendation information sent by the server. The sensitive word recommendation information includes multiple sensitive words obtained by the server according to the usage rate from large to small. For example, the server may upload the Sensiti...
Embodiment 3
[0134] An embodiment of the present invention provides an information interception device 110, such as Figure 11 shown, including:
[0135] The first receiving unit 1101 is configured to receive text information.
[0136] The first determining unit 1102 is configured to determine whether there are sensitive words in the text information.
[0137] A setting unit 1103, configured to set the text information as interception information when sensitive words exist in the text information.
[0138] In this way, regardless of whether the information sender's number is known or not, and no matter what type of number the information sender's number is, as long as the received text message contains sensitive words, the information can be intercepted, which improves the security of information interception. Efficiency, thereby improving the user experience.
[0139] Optionally, the first determination unit 1102 is specifically configured to: divide the text information into N text se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 