An information identification method, device and system

A technology for information identification and communication information, applied in the field of communication, can solve problems such as failure to achieve interception, user property loss, user terminal virus Trojan intrusion, etc., and achieve the effect of improving security and interception effect.

Active Publication Date: 2018-09-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This way, to a certain extent, some spam messages, such as harassing text messages and fraudulent messages, can be intercepted. However, when sending many spam messages, the numbers are disguised through fake base stations, for example, Masquerading as the number of the operator or the number of the user's contacts, etc. Therefore, for this type of information, the use of whitelists and blacklists cannot achieve the interception effect, and, because the number of the operator is masquerading or the number of the user's contact person, therefore, the probability of the user being cheated is relatively high, which can easily cause the user's property loss, or cause the user terminal to be invaded by viruses and Trojan horses. Affects the security of information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information identification method, device and system
  • An information identification method, device and system
  • An information identification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] This embodiment will be described from the perspective of an information identification device. The information identification device may specifically be integrated in a terminal, such as a receiving terminal. The terminal may include a mobile phone, a tablet computer, a notebook computer, or a personal computer (PC, Personal Computer), etc. equipment.

[0031] An information identification method, comprising: receiving instant messaging information, the instant messaging information carries the user identifier of the sending user; determining whether the sending user belongs to a preset contact set according to the user identifier; if so, extracting the content of the instant messaging information , identify the instant messaging information according to the content; if not, identify the instant messaging information according to the user ID.

[0032] Such as Figure 1b As shown, the specific process of the information identification method can be as follows:

[0033...

Embodiment 2

[0062] According to the method described in Embodiment 1, an example will be given below for further detailed description.

[0063] In this embodiment, it will be described by taking that the information identification device is integrated in the terminal A and the instant messaging information is a short message as an example.

[0064] Such as figure 2 As shown, an information identification method, the specific process can be as follows:

[0065] 201. Terminal A receives a short message sent by user A through terminal B, where the short message may carry information such as user A's user ID.

[0066] The user identifier may include a terminal identifier, such as a SIM card number (such as a mobile phone number) or an IMEI code, or the user identifier may also include information such as a user name, a user mailbox, and / or a user's instant messaging number.

[0067] 202. Terminal A determines whether user A belongs to the preset contact set according to the user identifier...

Embodiment 3

[0093] In order to better implement the above method, the embodiment of the present invention also provides an information identification device, such as Figure 3a As shown, the information identification device includes a receiving unit 301, a determination unit 302, a first identification unit 303 and a second identification unit 304, as follows:

[0094] (1) receiving unit 301;

[0095] The receiving unit 301 is configured to receive instant messaging information.

[0096] For example, the receiving unit 301 may be specifically configured to receive instant messaging information sent by the sending terminal, where the instant messaging information may carry information such as the user ID of the sending user.

[0097] Wherein, the instant messaging information may include information such as short messages, multimedia messages, and communication messages in various instant messaging applications; the user identifier may include a terminal identifier, such as SIM or termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses an information identification method, device and system; this embodiment adopts the method of receiving instant messaging information, and determines whether the sending user belongs to the preset contact set according to the user identification carried in the instant messaging information, and if so, then Extract the content of the instant messaging information, and identify the instant messaging information according to the content; otherwise, if it does not belong to the preset contact set, then identify the instant messaging information according to the user ID; this scheme can greatly improve the blocking effect , Improve information security.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an information identification method, device and system. Background technique [0002] In recent years, communication technology has developed rapidly. At the same time, various harassing text messages and fraudulent messages are becoming more and more widespread. Therefore, how to identify and intercept these messages has become a concern of people. The problem. [0003] In the prior art, whitelists and blacklists are generally used to identify and intercept information. For example, when a terminal receives a text message, it can determine whether the number to which the text message belongs is in the white list. If it is in the list, it will not be intercepted, otherwise, if it is not in the white list, it will be judged whether the number to which the SMS belongs is in the blacklist, if it is in the blacklist, it will be intercepted, if it is not in the blackl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/046H04L63/08H04L63/12H04L51/212
Inventor 袁灿材杨田从雨许振声王亮
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products