Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious information identification method, device and system

A malicious information and identification method technology, applied in malicious information identification devices and systems, and malicious information identification fields, can solve the problems of low identification accuracy of malicious information, low identification accuracy of malicious information, etc. Low, the effect of improving the recognition accuracy

Active Publication Date: 2016-02-10
TENCENT TECH (SHENZHEN) CO LTD
View PDF13 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a malicious information identification method that can accurately and efficiently identify malicious information, so as to solve the technical problem of low malicious information identification accuracy in existing malicious information identification methods
[0008] Embodiments of the present invention also provide a malicious information identification device that can accurately and efficiently identify malicious information, so as to solve the technical problem of low malicious information identification accuracy of existing malicious information identification devices
[0009] Embodiments of the present invention also provide a malicious information identification system that can accurately and efficiently identify malicious information, so as to solve the technical problem of low malicious information identification accuracy in existing malicious information identification systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious information identification method, device and system
  • Malicious information identification method, device and system
  • Malicious information identification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Referring to the drawings, wherein like reference numerals represent like components, the principles of the present invention are exemplified when implemented in a suitable computing environment. The following description is based on illustrated specific embodiments of the invention, which should not be construed as limiting other specific embodiments of the invention not described in detail herein.

[0058] In the following description, specific embodiments of the present invention are described with reference to steps and symbols for operations performed by one or more computers, unless otherwise stated. Accordingly, it will be appreciated that the steps and operations, which at times are referred to as being performed by a computer, include manipulation by a computer processing unit of electronic signals representing data in a structured form. This manipulation transforms the data or maintains it at a location in the computer's memory system that can reconfigure or o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious information identification method, device and system. The method comprises that real-time session information of a session group is obtained; a malicious information model is used to determine malicious information in the real-time session information and further to obtain suspicious malicious information; a malicious information determination request for the suspicious malicious information is initiated for users of the session group, and determination results input by the users are received; and malicious information is identified from the suspicious malicious information according to the determination results and a preset determination method. According to the malicious information identification method, device and system, the malicious information is determined in the suspicious malicious information by the users of the session group, and the accuracy of malicious information identification is improved.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a malicious information identification method, a malicious information identification device and a system. Background technique [0002] With the development of Internet technology, people can communicate through various conversation groups, such conversation groups can be QQ groups or WeChat groups. At the same time, more and more people use the above conversation groups to publish malicious information, such as fraudulent information, malicious advertising information, and pornographic information. [0003] The existing monitoring of malicious information on the above-mentioned conversation groups mainly adopts the following methods: [0004] 1. Monitor the text information on the conversation group. If words such as "bank card" and "remittance" are detected in the communication content, the conversation group will provide preventive reminders to the users on the con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/58H04L29/06
Inventor 张龙攀贺啸
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products