This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0006] The above processing forms of full-text sequential scanning or regular expression matching use the complete strings in the string library to filter emails. When the size of the string library is relatively large, the efficiency is low, and it is impossible to filter the received emails in real time. , which seriously affects the user's use effect
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0039] The processing flow of the method for intercepting spam provided by this embodiment is as follows: figure 1 As shown, the following processing steps are included:
[0040] Step 11, acquiring the text data of the emails that need to be filtered.
[0041] After receiving an email that needs to be filtered, the email is decoded to obtain the title and text content of the email, and after the title and the text are directly spliced, a text data to be filtered is obtained, and the text data is saved.
[0042] Step 12, according to the loaded character string resource library, establish the total hash table and the hash linked list in the hash scheme.
[0043] After obtaining the text data of the above email, the string resource library needs to be loaded. The strings in the string resource library are composed of one or more character units, which can be: an English word, a Chinese character, a single English letter, half a Chinese character, or a full-width and half-width p...
Embodiment 2
[0060] The embodiment of the present invention also provides a device for intercepting spam, and its specific implementation structure is as follows: figure 2 As shown, it may specifically include:
[0061] Text data obtaining module 21, is used for obtaining the text data of the mail that needs to be filtered;
[0062] Character judging module 22, is used for judging whether described text data contains the keyword in the character string in the character string resource storehouse that is used for mail filtering, when described text data contains described keyword, then judges described Whether the text data contains the character string in the character string resource library corresponding to the keyword;
[0063] The email processing module 23 is configured to determine whether the email is spam according to the determination result of whether the text data contains the character string in the character string resource library corresponding to the keyword, and a predete...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides a method for intercepting junk e-mail and a device thereof. The method mainly comprises: text data of an e-mail, which needs to be filtered is acquired, and whether the text data includes a key word which is in a character string in a character string resource bank and is used for filtering the e-mail or not is judged; when the key word is included in the text data, whetherthe text data includes the character string in the character string resource bank corresponding to the key word or not is judged; according to the judgment result that whether the text data includes the character string in the character string resource bank corresponding to the key word or not and a pre-determined judgment strategy, whether the e-mail is the junk e-mail or not is determined, and the junk e-mail is intercepted. By adopting the invention, the text data of the e-mail is scanned according to the key word, after the key word is matched, the text data of the e-mail is scanned according to the character string corresponding to the key word, so that the scanning speed and efficiency are improved, and the e-mail can be filtered in real time when the character string library is larger.
Description
technical field [0001] The invention relates to the technical field of network communication, in particular to a method and device for intercepting spam. Background technique [0002] In the field of e-mail, spam is becoming more and more rampant, which not only increases the processing time of normal mail users, but also wastes valuable resources of the mail system, thereby hindering the process of users obtaining useful information. Therefore, spam is a must. issues that need resolving. [0003] At present, string-based interception technology is commonly used in email systems to combat spam. This string-based interception technology needs to establish a string library in advance. The strings in the string library use existing words or words. The length of the string is relatively fixed. The string library needs to have a certain update period and scale, and the string size available for scanning in the string library often reaches millions. In practical applications, u...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.