Repeated short message recognition and analysis methods and system

An analysis method and short message technology, applied in the field of information security, can solve the problem of shielding the sending source and cannot shield it, and achieve the effect of efficient and accurate verification

Inactive Publication Date: 2017-01-25
广安奥海通讯电子科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Nuisance short messages are generally sent repeatedly at a high frequency, and can be easily sent by using the source shielding method. However, the current harassing short messages are sent through pseudo base stations, and frequently changin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Repeated short message recognition and analysis methods and system
  • Repeated short message recognition and analysis methods and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] All the features disclosed in this specification, except for mutually exclusive features and / or steps, can be combined in any manner.

[0034] The present invention will be described in detail below in conjunction with the drawings.

[0035] A method and system for identifying and analyzing repeated short messages. The system includes:

[0036] Short message receiving module: used to receive and buffer short messages sent to users from operators, and send the short messages in the buffer to the short message verification module for verification;

[0037] Short message verification module: includes a source verification module and a content verification module. The source verification module first compares the source of the short message with the list of repeated sources stored in the blacklist module. If it is not judged as non-repetitive Send the message source, and then verify the content of the short message through the content verification module;

[0038] Repeat counting mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to information security technology, in particular to repeated short message recognition and analysis methods and system, comprising: a short message receiving module used for receiving and caching short messages sent by the ISP to the user and for sending the messages in the cache to a short message verification module for verification; the short message verification module comprising a raw message source verification module and a content verification module, where the raw message source verification module compares the raw message source with the repeated message source stored in a blacklist module. If the raw message source is determined as non-repeated, the content of the message will then be verified through the content verification module; a repetition count module subject to the judgment of the raw message source verification module and the content verification module; a short message storage module that saves the verified short messages in the mobile phone's physical storage area and reminds the user to check. By verifying the content of short messages as well as multiple contents of short messages separately, this invention helps the user to avoid being interrupted by repeated short messages and guarantees high efficiency and accuracy of verifying repeated short messages.

Description

technical field [0001] The invention relates to information security technology, in particular to a method and system for identifying and analyzing repeated short messages. Background technique [0002] Harassing short messages generally have the following characteristics: general short message harassment without the consent of the recipient is issued unilaterally without the prior consent of the recipient of the short message; violation of the legitimate rights and interests of the recipient: In the case of consent, a series of rights such as the freedom of communication of the recipient of the short message are violated; illegality: the content of the short message violates the prohibitive provisions of laws and regulations, such as false and fraudulent advertising, pyramid schemes, harassment, pornography and Feudal superstition and so on. [0003] Nuisance short messages are generally sent repeatedly at a high frequency, and can be easily sent by using the source shield...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/14H04W12/12H04W12/128
CPCH04W4/14H04W12/12
Inventor 朱宏亮
Owner 广安奥海通讯电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products