Identification method and identification system of spam multimedia message
An identification method and MMS technology, which is applied in the field of communication, can solve the problem of low identification efficiency of junk MMS and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] This embodiment provides a method for identifying spam multimedia messages, the method comprising:
[0041] Get MMS;
[0042] Acquiring the sender of the multimedia message and its user behavior according to the multimedia message, and determining the first degree of suspicion according to the user behavior of the sender of the multimedia message;
[0043] extracting the picture data in the multimedia message, and determining the second degree of suspicion according to the picture data;
[0044] When the first degree of suspicion is less than the first threshold and the second degree of suspicion is less than the second threshold, determine the relationship between the average value of the first degree of suspicion and the second degree of suspicion and the third threshold;
[0045] In a case where the average value of the first degree of suspicion and the second degree of suspicion is greater than or equal to the third threshold, it is determined that the multimedia m...
Embodiment 2
[0048] This embodiment provides a method for identifying spam multimedia messages, such as figure 1 As shown, the method includes:
[0049] In step S11, the MMS is acquired. That is, the system for identifying spam multimedia messages receives the multimedia messages sent by the user.
[0050] In step S12, the sender of the multimedia message and its user behavior are acquired according to the multimedia message, and the first degree of suspicion is determined according to the user behavior of the sender of the multimedia message.
[0051] That is, the user behavior of each MMS sender is counted, and then a parameter is calculated according to the user behavior of the MMS sender: the first degree of suspicion, and then it is judged according to the first degree of suspicion whether the MMS is spam or needs to be further determined.
[0052] Specifically, the user behavior includes, for example, the amount of MMS package A, the number of MMS messages received B, the amount of...
Embodiment 3
[0076] This embodiment provides a system for identifying spam multimedia messages to implement the method provided in Embodiment 1 or Embodiment 2. Such as figure 2 As shown, the system includes:
[0077] An acquisition module 201, configured to acquire multimedia messages;
[0078] The first determination module 202 is used to obtain the multimedia message sender and its user behavior according to the multimedia message, and obtain the multimedia message sender and its user behavior according to the multimedia message, and determine the first degree of suspicion according to the user behavior of the multimedia message sender;
[0079] The second determination module 203 is used to extract the picture data in the multimedia message, and determine the second degree of suspicion according to the picture data;
[0080] The third determination module 204 is configured to determine the relationship between the average value of the first degree of doubt and the second degree of d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com


