Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Spam short message identification method, device and equipment

A technology of spam short message and identification method, applied in the field of communication, can solve the problem of not being able to intercept spam short messages

Inactive Publication Date: 2015-01-28
XIAOMI INC
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventor found that the blacklist needs to be continuously updated by constantly identifying strangers. If the stranger is sending a message for the first time, there will be false blocking or missing blocking of the stranger in this case, and by analyzing the information in the message Keywords, since the message has been sent to the message receiver, the message has not been intercepted. At this time, for the message receiver, the authenticity of the message can only be identified through the receiver's subjective determination, so spam messages cannot be identified. effective interception

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Spam short message identification method, device and equipment
  • Spam short message identification method, device and equipment
  • Spam short message identification method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0124] Embodiment 1 Using the above method provided by the embodiment of the present disclosure, the method for determining intimacy when the first phone number and the second phone number are friends in the address book, such as figure 2 As shown, do the following:

[0125] In step S201, the first address book of the first communication terminal and the second address book of the second communication terminal are acquired.

[0126] In one embodiment, the first address book and the second address book have been respectively backed up by the first user and the second user in the server on the network side; The second communication terminal sends a request message for obtaining the address book, and the first communication terminal and the second communication terminal return their respective address books to the server after receiving the request message.

[0127] In step S202, if the first address book and the second address book determine that the first phone number and the...

Embodiment 2

[0130] Embodiment 2 Using the above-mentioned method provided by the embodiment of the present disclosure, the intimacy between the two communicating parties is determined when the first phone number and the second phone number are not friends of each other or at least one of them is not a friend of the other party, as shown in Figure 3A As shown, do the following:

[0131] In step S301, a short message to be sent from a first communication terminal to a second communication terminal is acquired.

[0132] In step S302, the first address book of the first communication terminal and the second address book of the second communication terminal are obtained.

[0133] In step S303, the common contact number stored in the first address book and the second address book is determined.

[0134] In step S304, the degree of intimacy between the first phone number and the second phone number is determined according to the communication records between the first phone number and the comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a spam short message identification method, device and equipment to be used for reducing the false intercept rate of spam short messages. The spam short message identification method comprises obtaining short messages from a first communication terminal and are to send to a second communication terminal; obtaining the intimacy between a first phone number which is corresponding to the first communication terminal and a second phone number which is corresponding to the second communication terminal; determining whether the short messages are the spam short messages or not according to the intimacy. According to the technical scheme of the spam short message identification method, the short messages between user are judged to be the spam short messages or not according to the intimacy between the first phone number which is corresponding to the first communication terminal and the second phone number which is corresponding to the second communication terminal, determination of whether the short messages are the spam short messages or not in advance is achieved, and the spam short message intercept rate is improved and meanwhile the second communication terminal is avoided from receiving the spam short messages.

Description

technical field [0001] The present disclosure relates to the technical field of communication, and in particular to a method, device and equipment for identifying spam short messages. Background technique [0002] With the rapid development of mobile Internet technology, more and more Internet services will involve communication between people. In the process of mutual communication, information such as fraud and deception brought by strangers cannot be avoided. In order to prevent information such as deception and fraud brought by strangers, related technologies record the users who have been blacklisted on the server side, so as to intercept the information sent by the blacklisted users. Alternatively, the related technology intercepts the message from the stranger by analyzing the characteristic words in the message sent by the stranger. The inventor found that the blacklist needs to be continuously updated by constantly identifying strangers. If the stranger is sending ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/14H04W12/12
CPCH04W4/14H04W12/12
Inventor 马森马骥孙鹏
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products