Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data identification method, junk mailbox identification method and file identification method

A technology for identifying data and data, applied in the computer field, can solve the problems of inaccurate identification results and identification errors, and achieve the effect of improving the accuracy of identification

Active Publication Date: 2020-03-10
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method for identifying data, a method for identifying spam mailboxes, and a method for file identification, to at least solve the problem of using text similarity to identify data in the prior art, because the identification process of text similarity will have certain identification Errors, technical problems that lead to inaccurate recognition results

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data identification method, junk mailbox identification method and file identification method
  • Data identification method, junk mailbox identification method and file identification method
  • Data identification method, junk mailbox identification method and file identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] According to an embodiment of the present application, an embodiment of a method for identifying junk mailboxes is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0037] The method embodiments provided in the embodiments of the present application may be executed in mobile terminals, computer terminals or similar computing devices. figure 1 A hardware structure block diagram of a computer terminal (or mobile device) for realizing the method for identifying junk mailboxes is shown. Such as figure 1As shown, the computer terminal 10 (or mobile device 10) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 ma...

Embodiment 2

[0123] According to an embodiment of the present application, an embodiment of a method for file identification is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0124] Figure 5 is a flow chart of a method for file identification according to an embodiment of the present application, such as Figure 5 As shown, the above-mentioned method for file identification includes the following method steps:

[0125] Step S1102, determining the character information of the object name of the object to be detected, wherein the above character information includes: the characters of the words forming the above object name.

[0126] Optionally, the object to be detected ...

Embodiment 3

[0138] According to the embodiment of the present application, an embodiment of a method for identifying junk mailboxes is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0139] Image 6 is a flow chart of a method for identifying spam mailboxes according to an embodiment of the present application, such as Image 6 As shown, the above-mentioned method for identifying junk mailboxes includes the following method steps:

[0140] Step S1202, receiving the input character information of the mailbox, wherein the above character information includes: the characters of the words forming the name of the mailbox.

[0141] In an optional embodiment of the present appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data identification method, a junk mailbox identification method and a file identification method. The data identification method comprises the steps that to-be-recognized data is acquired, and the to-be-recognized data comprises character information used for indicating an identifier of the to-be-recognized data; language features corresponding to the character information are obtained, and the language features comprise at least one of the following: the repetition proportion of pronunciation of characters contained in words in the character information, the proportion of repeated characters contained in the words and the proportion of numbers contained in the words; and whether the to-be-identified data is the first type of data based on the language featuresis determined. According to the method, the technical problem of inaccurate identification result caused by a certain identification error in a text similarity identification process when the text similarity is adopted to identify the data in the prior art is solved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular, to a method for identifying data, a method for identifying junk mailboxes, and a method for identifying files. Background technique [0002] With the rise of overseas e-commerce platforms, many users have begun to use overseas mailboxes to register and log in to overseas e-commerce platforms, and the number of illegal users registering overseas spam mailboxes for swiping orders has gradually increased. Moreover, due to the previous domestic spam mailbox identification methods, mainly Judgment and recognition based on the usage habits of Chinese characters, directly using the domestic spam mailbox recognition method to identify overseas mailboxes, will cause recognition errors or recognition omissions. [0003] At present, the more commonly used method in the existing methods for identifying spam mailboxes is: to use text similarity to identify spam mailboxes. However, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/12G06Q10/10G06Q30/06G06F40/284G06F40/216
CPCG06Q10/107G06Q30/0609H04L61/4555
Inventor 张振永王莹
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products