Message identification system, method and device
A message and message feature technology, applied in the field of communication technology applications, can solve problems such as low detection accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] According to an embodiment of the present invention, an embodiment of a message identification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0041] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a collector of a message identification method according to an embodiment of the present invention. Such as figure 1 As shown, the collector 10 may include one or more (only one is shown in the figure) processors 102 (the pro...
Embodiment 2
[0065] This application provides image 3 The method of message identification shown. On the aggregator side, image 3 is a flow chart of a method for message identification according to Embodiment 2 of the present invention.
[0066] Step S302, receiving the message sent by the collector;
[0067] In the above step S302 of the present application, the embodiment of the present application can be applied to the aggregator side. The aggregator receives the message sent by the collector, and the message received by the aggregator is a message suspected of carrying a virus after preliminary filtering and matching by the collector.
[0068] Step S304, extracting the message features in the message, and judging whether the message features match the features in the preset feature cluster;
[0069] Based on the message received in step S302, in the above step S304 of this application, the aggregator extracts the message feature in the message, and judges whether the message featu...
Embodiment 3
[0082] This application provides Figure 4 The method of message identification shown. On the data processor side, Figure 4 is a flowchart of a method for message identification according to Embodiment 3 of the present invention.
[0083] Step S402, receiving the message sent by the aggregator;
[0084] In the above step S402 of the present application, the embodiment of the present application can be applied to the data processor side, and the data processor receives the message reported by the aggregator, wherein the message is the second match performed by the aggregator on the message reported by the collector received message.
[0085] Step S404, classifying the messages according to preset conditions to obtain message classifications, wherein the message classification includes: messages received by the cloud network transmission node and messages sent by the cloud network transmission node;
[0086] In the above step S404 of the present application, the data proces...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com