Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method for intercepting information and determining interception information

A technology of information analysis and key information, applied in the computer field, can solve problems such as mobile terminal security threats

Inactive Publication Date: 2018-11-09
SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, mobile terminals are also subject to many security threats

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intercepting information and determining interception information
  • Method for intercepting information and determining interception information
  • Method for intercepting information and determining interception information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0034] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0035] figure 1 It shows an exemplary system architecture 100 to which the method for intercepting information or the method for determining intercepted information according to the embodiments of the present application can be applied.

[0036] Such as figure 1 As shown, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for intercepting the information and determining the interception information. The method specifically comprises steps that in response to receiving a short message currently, the sending number and the content of the short message are obtained; whether to intercept the short message is determined according to the sending number and the content of the short messageand the current user attribute, and the user attribute includes the key information for characterizing the information concerned by the user; in response to determining to intercept the short message, interception operation of the short message is carried out. The method is advantaged in that whether to intercept the short message is determined according to the current user attribute of the user,that is to say, for the same short message, different processing methods can be used to achieve different processing results.

Description

technical field [0001] The embodiment of the present application relates to the field of computer technology, and in particular to a method for intercepting information and determining the intercepted information. Background technique [0002] With the rapid development of mobile Internet, people's daily life is increasingly inseparable from mobile terminals. At the same time, mobile terminals are also subject to many security threats. For example, some lawbreakers send various fraudulent and spam messages to users. Users often face economic losses, leakage of personal privacy information, and harassment in daily life. [0003] At present, for the interception and processing of spam, the cloud server usually builds an interception database based on the marked data of a large number of users. Therefore, the incoming signal code and information content are analyzed to determine whether to carry out interception processing. However, for different users, this interception pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/12G06F17/30H04W12/128
CPCH04W4/14H04W12/12
Inventor 徐学东
Owner SHANGHAI LIANSHANG NETWORK TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More