Data identification method, junk mailbox identification method and file identification method
A technology for identifying data and data, applied in the computer field, can solve the problems of inaccurate identification results and identification errors, and achieve the effect of improving the accuracy of identification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] According to an embodiment of the present application, an embodiment of a method for identifying junk mailboxes is provided. It should be noted that the steps shown in the flow charts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0037] The method embodiments provided in the embodiments of the present application may be executed in mobile terminals, computer terminals or similar computing devices. figure 1 A hardware structure block diagram of a computer terminal (or mobile device) for realizing the method for identifying junk mailboxes is shown. Such as figure 1As shown, the computer terminal 10 (or mobile device 10) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 ma...
Embodiment 2
[0123] According to an embodiment of the present application, an embodiment of a method for file identification is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0124] Figure 5 is a flow chart of a method for file identification according to an embodiment of the present application, such as Figure 5 As shown, the above-mentioned method for file identification includes the following method steps:
[0125] Step S1102, determining the character information of the object name of the object to be detected, wherein the above character information includes: the characters of the words forming the above object name.
[0126] Optionally, the object to be detected ...
Embodiment 3
[0138] According to the embodiment of the present application, an embodiment of a method for identifying junk mailboxes is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0139] Image 6 is a flow chart of a method for identifying spam mailboxes according to an embodiment of the present application, such as Image 6 As shown, the above-mentioned method for identifying junk mailboxes includes the following method steps:
[0140] Step S1202, receiving the input character information of the mailbox, wherein the above character information includes: the characters of the words forming the name of the mailbox.
[0141] In an optional embodiment of the present appl...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com