Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System, method and device for message identification

A message and message feature technology, applied in the application field of communication technology, can solve problems such as low detection accuracy, and achieve the effect of solving low detection accuracy and improving detection accuracy

Active Publication Date: 2021-04-20
ALIBABA GRP HLDG LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a system, method and device for message identification, to at least solve the technical problem of low detection accuracy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, method and device for message identification
  • System, method and device for message identification
  • System, method and device for message identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] According to an embodiment of the present invention, an embodiment of a message identification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0041] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a block diagram of the hardware structure of a collector of a message identification method according to an embodiment of the present invention. Such as figure 1 As shown, the collector 10 may include one or more (only one is shown in the figure) processors 102 (the pro...

Embodiment 2

[0065] This application provides image 3 The method of message identification shown. On the aggregator side, image 3 is a flow chart of a method for message identification according to Embodiment 2 of the present invention.

[0066] Step S302, receiving the message sent by the collector;

[0067] In the above step S302 of the present application, the embodiment of the present application can be applied to the aggregator side. The aggregator receives the message sent by the collector, and the message received by the aggregator is a message suspected of carrying a virus after preliminary filtering and matching by the collector.

[0068] Step S304, extracting the message features in the message, and judging whether the message features match the features in the preset feature cluster;

[0069] Based on the message received in step S302, in the above step S304 of this application, the aggregator extracts the message feature in the message, and judges whether the message featu...

Embodiment 3

[0082] This application provides Figure 4 The method of message identification shown. On the data processor side, Figure 4 is a flowchart of a method for message identification according to Embodiment 3 of the present invention.

[0083] Step S402, receiving the message sent by the aggregator;

[0084] In the above step S402 of the present application, the embodiment of the present application can be applied to the data processor side, and the data processor receives the message reported by the aggregator, wherein the message is the second match performed by the aggregator on the message reported by the collector received message.

[0085] Step S404, classifying the messages according to preset conditions to obtain message classifications, wherein the message classification includes: messages received by the cloud network transmission node and messages sent by the cloud network transmission node;

[0086] In the above step S404 of the present application, the data proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system, method and device for message identification. Wherein, the system includes: a collector for extracting message features from the collected messages, performing first feature matching between the message features and pre-stored virus features, and sending the successfully matched messages to the summary The aggregator is in communication connection with at least one collector, and is used to receive the packets with virus features, and perform the second feature matching on the packets through the preset feature cluster, and send the successfully matched packets to the data processing. The data processor is connected in communication with the aggregator, and is used for classifying the packets after the second feature matching of the aggregator, and determining the terminal category for sending the packets. The invention solves the technical problem of low detection precision.

Description

technical field [0001] The present invention relates to the application field of communication technology, in particular to a system, method and device for message identification. Background technique [0002] With the widespread use of cloud technology, how to detect a virtual machine injected with a Trojan horse program in a cloud network architecture composed of a client and a server has become an urgent problem to be solved. [0003] For the circulation environment of the Trojan horse program, it is usually a cloud network architecture composed of the client and the server. In the normal communication mode: the client actively reports its existence to a server whose address is preset in the program, And take the initiative to accept the management of the server. During the communication process, the client and the server need to follow a set of communication protocols. By analyzing the distribution methods of existing known Trojan horse programs, the number of communica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/145
Inventor 何卫斌
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products