Information interception method, device and storage medium
A technology of information entropy and sending information, applied in the field of mobile communication, can solve the problems of not being able to fully cover blacklist numbers, high error rate, complicated operation, etc., to achieve the effect of simple operation, improved accuracy, and improved processing efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0080] Example 1: If a calling number sends 15 text messages to 5 called numbers in total, and each called number receives 3 text messages, the times of sending are as follows:
[0081] {3,3,3,3,3}
[0082] Then the distribution probability of each called number is as follows:
[0083] {0.2,0.2,0.2,0.2,0.2}
[0084] Therefore, the calculated called information entropy of the calling number is 1, indicating that the called number distribution of the calling number has a high degree of dispersion and a low degree of concentration.
example 2
[0085] Example 2: If a calling number sends 15 text messages to 5 called numbers in total, 1 text message is sent to each of 4 called numbers, and 11 text messages are sent to 1 called number, The number of times it is sent is as follows:
[0086] {1,1,1,1,11}
[0087] Then the distribution probability of each called number is as follows:
[0088] {0.067,0.067,0.067,0.067,0.733}
[0089] The calculated called information entropy of the calling number is 0.59, indicating that the distribution of called numbers of the calling number has a small degree of dispersion and a high degree of concentration.
[0090] According to the calculation of the above information entropy, the scheme of the present invention performs data mining on the historical records of short messages within a certain period of time. When the frequency of sending short messages by a certain calling number exceeds a certain threshold, the calling number is calculated according to the above formula (1). The c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


