Check patentability & draft patents in minutes with Patsnap Eureka AI!

Identification method and identification system of spam multimedia message

An identification method and MMS technology, which is applied in the field of communication, can solve the problem of low identification efficiency of junk MMS and achieve the effect of improving efficiency

Inactive Publication Date: 2018-11-13
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The present invention at least partly solves the problem of low identification efficiency of the existing MMS spam, and provides a MMS spam identification method and a MMS spam identification system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method and identification system of spam multimedia message
  • Identification method and identification system of spam multimedia message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] This embodiment provides a method for identifying spam multimedia messages, the method comprising:

[0041] Get MMS;

[0042] Acquiring the sender of the multimedia message and its user behavior according to the multimedia message, and determining the first degree of suspicion according to the user behavior of the sender of the multimedia message;

[0043] extracting the picture data in the multimedia message, and determining the second degree of suspicion according to the picture data;

[0044] When the first degree of suspicion is less than the first threshold and the second degree of suspicion is less than the second threshold, determine the relationship between the average value of the first degree of suspicion and the second degree of suspicion and the third threshold;

[0045] In a case where the average value of the first degree of suspicion and the second degree of suspicion is greater than or equal to the third threshold, it is determined that the multimedia m...

Embodiment 2

[0048] This embodiment provides a method for identifying spam multimedia messages, such as figure 1 As shown, the method includes:

[0049] In step S11, the MMS is acquired. That is, the system for identifying spam multimedia messages receives the multimedia messages sent by the user.

[0050] In step S12, the sender of the multimedia message and its user behavior are acquired according to the multimedia message, and the first degree of suspicion is determined according to the user behavior of the sender of the multimedia message.

[0051] That is, the user behavior of each MMS sender is counted, and then a parameter is calculated according to the user behavior of the MMS sender: the first degree of suspicion, and then it is judged according to the first degree of suspicion whether the MMS is spam or needs to be further determined.

[0052] Specifically, the user behavior includes, for example, the amount of MMS package A, the number of MMS messages received B, the amount of...

Embodiment 3

[0076] This embodiment provides a system for identifying spam multimedia messages to implement the method provided in Embodiment 1 or Embodiment 2. Such as figure 2 As shown, the system includes:

[0077] An acquisition module 201, configured to acquire multimedia messages;

[0078] The first determination module 202 is used to obtain the multimedia message sender and its user behavior according to the multimedia message, and obtain the multimedia message sender and its user behavior according to the multimedia message, and determine the first degree of suspicion according to the user behavior of the multimedia message sender;

[0079] The second determination module 203 is used to extract the picture data in the multimedia message, and determine the second degree of suspicion according to the picture data;

[0080] The third determination module 204 is configured to determine the relationship between the average value of the first degree of doubt and the second degree of d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identification method and identification system of a spam multimedia message, and belongs to the technical field of the communication. The problem that the existing spam multimedia message identification rate is low can be at least partially solved. The identification method comprises the following steps: acquiring the multimedia message; acquiring a multimedia sender anda user behavior thereof according to the multimedia message, and determining the first suspect degree according to the user behavior of the multimedia message sender; extracting picture data in the multimedia message, and determining the second suspect degree according to the picture data, determining the relation between an average value of the first suspect degree and the second suspect degreeand a third threshold when the first suspect degree is less than a first threshold, and the second suspect is less than a second threshold; and judging the multimedia message as the suspect spam multimedia message when the average value of the first suspect degree and the second suspect is greater than or equal to the third threshold.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a method for identifying junk multimedia messages and a system for identifying junk multimedia messages. Background technique [0002] The identification technology of spam messages is relatively mature. However, the sending of short messages is based on the No. 7 signaling network as a carrier, and what is sent is text information, and because MMS is sent using WAP wireless application protocol as a carrier, the two are different mechanisms, which leads to the inability of the existing identification methods of junk MMS Copy the identification method of spam text messages. [0003] Existing identification methods for multimedia spam mainly include the following types: identification based on blacklist database, identification based on text and identification based on image. [0004] The identification technology based on the blacklist database is to establish...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04W4/12
CPCH04W4/12
Inventor 刘伟徐雷陶冶寇金锋王雷
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More