Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message identification system, method and device

A message and message feature technology, applied in the field of communication technology applications, can solve problems such as low detection accuracy

Active Publication Date: 2017-11-10
ALIBABA GRP HLDG LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a system, method and device for message identification, to at least solve the technical problem of low detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message identification system, method and device
  • Message identification system, method and device
  • Message identification system, method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] According to an embodiment of the present invention, an embodiment of a message identification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0041] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a collector of a message identification method according to an embodiment of the present invention. Such as figure 1 As shown, the collector 10 may include one or more (only one is shown in the figure) processors 102 (the pro...

Embodiment 2

[0065] This application provides image 3 The method of message identification shown. On the aggregator side, image 3 is a flow chart of a method for message identification according to Embodiment 2 of the present invention.

[0066] Step S302, receiving the message sent by the collector;

[0067] In the above step S302 of the present application, the embodiment of the present application can be applied to the aggregator side. The aggregator receives the message sent by the collector, and the message received by the aggregator is a message suspected of carrying a virus after preliminary filtering and matching by the collector.

[0068] Step S304, extracting the message features in the message, and judging whether the message features match the features in the preset feature cluster;

[0069] Based on the message received in step S302, in the above step S304 of this application, the aggregator extracts the message feature in the message, and judges whether the message featu...

Embodiment 3

[0082] This application provides Figure 4 The method of message identification shown. On the data processor side, Figure 4 is a flowchart of a method for message identification according to Embodiment 3 of the present invention.

[0083] Step S402, receiving the message sent by the aggregator;

[0084] In the above step S402 of the present application, the embodiment of the present application can be applied to the data processor side, and the data processor receives the message reported by the aggregator, wherein the message is the second match performed by the aggregator on the message reported by the collector received message.

[0085] Step S404, classifying the messages according to preset conditions to obtain message classifications, wherein the message classification includes: messages received by the cloud network transmission node and messages sent by the cloud network transmission node;

[0086] In the above step S404 of the present application, the data proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a message identification system, method and device. The system comprises at least one collector which is used for extracting message features of collected messages, carrying out first feature matching on the message features and pre-stored virus features, and sending the feature matching successful messages to an aggregator; the aggregator which is in communication connection with the collector and is used for receiving the messages with virus features, carries out secondary feature matching on the messages through a preset feature set and sending the feature matching successful messages to a data processor; and the data processor which is in communication connection with the aggregator and is used for classifying the messages on which the secondary feature matching is carried out by the aggregator, and determining classes of terminals which send the messages. According to the system, the method and the device, the technical problem that the detection precision is low is solved.

Description

technical field [0001] The present invention relates to the application field of communication technology, in particular to a system, method and device for message identification. Background technique [0002] With the widespread use of cloud technology, how to detect a virtual machine injected with a Trojan horse program in a cloud network architecture composed of a client and a server has become an urgent problem to be solved. [0003] For the circulation environment of the Trojan horse program, it is usually a cloud network architecture composed of the client and the server. In the normal communication mode: the client actively reports its existence to a server whose address is preset in the program, And take the initiative to accept the management of the server. During the communication process, the client and the server need to follow a set of communication protocols. By analyzing the distribution methods of existing known Trojan horse programs, the number of communica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/145
Inventor 何卫斌
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products