Unlock instant, AI-driven research and patent intelligence for your innovation.

Suspicious mobile phone short message identification system and using method thereof

A technology for identifying systems and text messages, applied in the field of information security, can solve problems such as ineffective protection of users, inability to update in time, inability to obtain fraudulent information, etc., and achieve the effects of faster training model, high scalability, and improved performance

Inactive Publication Date: 2017-09-22
SHANGHAI JIAO TONG UNIV
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current mobile phone anti-fraud system has a single method and cannot effectively protect users.
At the same time, the current mobile phone anti-fraud system cannot be updated in time, and the latest fraud information cannot be obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Suspicious mobile phone short message identification system and using method thereof
  • Suspicious mobile phone short message identification system and using method thereof
  • Suspicious mobile phone short message identification system and using method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] like figure 1 As shown, an identification system for suspicious mobile phone short messages includes a receiving module, a preprocessing module, a comparison module and a feedback module. The receiving module passes the received short messages to the preprocessing module for preprocessing, and the preprocessing module preprocesses the short messages and Passed to the comparison module, the comparison module compares the text features of the received short message and the number of the sent short message with the deep learning model and sends the comparison result to the feedback module, and the feedback module gives feedback to the user according to the comparison result of the comparison module, wherein, SMS messages include SMS text and / or URLs.

[0024] The preprocessing of the short message by the preprocessing module includes extracting the number for sending the short message, extracting the text and / or URL of the short message and generating a feature vector.

...

Embodiment 2

[0028] like figure 2 As shown, a method for identifying a suspicious mobile phone text message includes:

[0029] Step 100, receive a short message, the short message includes short message text and / or URL, and enter step S110;

[0030] Step S110, locally judge whether the text message is a suspicious text message on the mobile phone, if the local judgment text message is a suspicious text message, then enter step S400; if the local judgment is a normal text message, then enter step S300;

[0031] Step S400, uploading suspicious text messages to the cloud for further judgment and feedback to the user, wherein the cloud updates the sample set according to the uploaded suspicious text messages, and the cloud uses the Spark algorithm;

[0032] Step S300, no feedback, silently waiting for the next text message.

Embodiment 3

[0034] like image 3 As shown, a method for identifying a suspicious mobile phone text message includes:

[0035] Step 100, receive a short message, the short message includes a short message text, and enter step 200;

[0036] Step 200, extracting the text features of the short message and the number for sending the short message, and entering step 300;

[0037] Step 300, first compare the number of sending text messages with the suspicious samples of the local deep learning model, then compare the text of the text message with the suspicious samples of the local deep learning model, if the comparison result is yes, it is determined that the text message is a suspicious text message, then enter step 500; if If the judgment result is no, then enter step 400;

[0038] Step 400, no feedback content, no feedback to the user;

[0039] Step 500, upload suspicious text messages to the cloud, and enter step 600;

[0040] Step 600, compare the text features of the short message wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a suspicious mobile phone short message identification system, and relates to the field of information safety. The system comprises a reception module, a preprocessing module, a comparison module and a feedback module, wherein the reception module is used for transferring a received short message to the preprocessing module to carry out preprocessing; the preprocessing module is used for preprocessing the short message and transferring the short message to the comparison module; the comparison module is used for comparing text feature of the received short message and a number for sending the short message with a deep learning model and sending a comparison result to the feedback module; and the feedback module is used for carrying out feedback on users according to the comparison result. The invention provides the suspicious mobile phone short message identification system which is reliable in algorithm high in identification speed and timely in sample library updating and a using method thereof, so that mobile phone users can timely identify the fraud short messages so as to reduce the fraud risk.

Description

technical field [0001] The invention relates to the field of information security, in particular to a system for identifying suspicious mobile phone short messages and a method for using the same. Background technique [0002] Mobile phones are already an essential tool in people's daily lives. Under such circumstances, there are countless things that use SMS to defraud, and there is a tendency to further expand. [0003] At present, for fraudulent text messages, well-known domestic security mobile phone manufacturers basically use databases for simple comparisons, or only use simple machine learning to identify fraudulent text messages. However, the currently adopted mobile phone anti-fraud system has a single means and cannot effectively protect users. At the same time, the current mobile phone anti-fraud system cannot be updated in time, and the latest fraud information cannot be obtained. Contents of the invention [0004] The main technical problem to be solved by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30H04W4/14H04W12/12
CPCG06F16/335H04W4/14H04W12/12H04W12/128
Inventor 邹福泰王祺文张成伟俞汤达李林森
Owner SHANGHAI JIAO TONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More