Repeated short message recognition and analysis methods and system
An analysis method and short message technology, applied in the field of information security, can solve the problem of shielding the sending source and cannot shield it, and achieve the effect of efficient and accurate verification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0033] All the features disclosed in this specification, except for mutually exclusive features and / or steps, can be combined in any manner.
[0034] The present invention will be described in detail below in conjunction with the drawings.
[0035] A method and system for identifying and analyzing repeated short messages. The system includes:
[0036] Short message receiving module: used to receive and buffer short messages sent to users from operators, and send the short messages in the buffer to the short message verification module for verification;
[0037] Short message verification module: includes a source verification module and a content verification module. The source verification module first compares the source of the short message with the list of repeated sources stored in the blacklist module. If it is not judged as non-repetitive Send the message source, and then verify the content of the short message through the content verification module;
[0038] Repeat counting mo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap