Event recognition method and terminal, model generation method and server and storage medium

An identification method and event technology, applied in the field of data processing, can solve the problem of difficulty in identifying and intercepting malicious information, achieve the effect of improving identification and alarm capabilities, and solving the difficulty of identification and interception

Active Publication Date: 2021-05-07
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide an event identification method and terminal, an event identification model generation method, and a server that can conveniently identify malicious events and alarm operations; to solve the problem of identifying and intercepting malicious calls and malicious information by existing mobile terminals Difficult technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Event recognition method and terminal, model generation method and server and storage medium
  • Event recognition method and terminal, model generation method and server and storage medium
  • Event recognition method and terminal, model generation method and server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Referring to the drawings, wherein like reference numerals represent like components, the principles of the present invention are exemplified when implemented in a suitable computing environment. The following description is based on illustrated specific embodiments of the invention, which should not be construed as limiting other specific embodiments of the invention not described in detail herein.

[0050] In the following description, specific embodiments of the present invention are described with reference to steps and symbols for operations performed by one or more computers, unless otherwise stated. Accordingly, it will be understood that the steps and operations, which at times are referred to as being performed by a computer, include manipulation by a computer processing unit of electronic signals representing data in a structured form. This manipulation transforms the data or maintains it at a location in the computer's memory system that can reconfigure or ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an event identification method, which includes: collecting terminal information logs of mobile terminals; converting terminal information logs into corresponding event identification information according to preset rules; generating malicious events of mobile terminals according to event identification information and preset models Event probability: when the probability of a malicious event is greater than the first set value, a malicious event alarm operation is performed. The invention also provides an event recognition model generation method, an event recognition terminal and an event recognition model generation server. The event recognition method and terminal, the event recognition model generation method and the server of the present invention generate a corresponding malicious event recognition model on the server and send the malicious event recognition model to the corresponding mobile terminal, thereby improving the mobile terminal's ability to detect malicious events. Event identification and alerting capabilities.

Description

technical field [0001] The invention relates to the field of data processing, in particular to an event identification method and terminal, an event identification model generation method and server, and a storage medium. Background technique [0002] With the development of science and technology, people use mobile terminals to interact more and more frequently, and the frequency of telecom fraud incidents through mobile terminals is also increasing. The identification of the current telecom fraud incidents is generally through the identification and interception of fraudulent text messages and fraudulent calls, that is, the defensive interception of fraudulent text messages and calls with specific numbers transmitted by fake base stations. [0003] For example, malicious user a uses a certain phone number to send telecom fraud text messages or telecom fraud phone calls. If a user reports the phone number, after verification, the phone number can be sent to other users for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06H04W12/12G06N3/08H04W12/121
Inventor 張瑋杰
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products