Junk mail identification method and device

A spam and identification method technology, applied in the computer field, can solve problems such as low identification accuracy, high maintenance cost, and rapid content change, and achieve the effect of improving accuracy, reducing maintenance cost, and improving accuracy

Pending Publication Date: 2020-10-09
北京天空卫士网络安全技术有限公司 +1
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There are various forms of spam, and the content changes rapidly, which makes it easy to avoid filtering based on content keyword analysis technology, and the recognition accuracy is low; based on the manual definition of filtering rules, it is often necessary to manually analyze a large number of spam to summarize the corresponding Regularity, high maintenance cost, and strong subjectivity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Junk mail identification method and device
  • Junk mail identification method and device
  • Junk mail identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0043] figure 1 is a schematic diagram of the main steps of the spam identification method according to the embodiment of the present invention. Such as figure 1 As shown, the spam identification method of the embodiment of the present invention mainly includes the following steps:

[0044] Step S101: Analyzing the target email, obtaining the email information of the ta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a junk mail identification method and device, and relates to the technical field of computers. One specific embodiment of the method comprises the steps of analyzing a target mail, obtaining mail information of the target mail and key information with a set label, and splicing the mail information and the key information to obtain text data; carrying out word segmentation on the text data to obtain a word segmentation result, and carrying out vectorization representation on the word segmentation result by utilizing a pre-trained word vector model to obtain a corresponding feature matrix; inputting the feature matrix into a pre-trained mail recognition model for recognition, and outputting a recognition result of the target mail; wherein the mail identification modelis used for identifying whether the target mail is a junk mail or not. According to the embodiment, the junk mail identification accuracy is improved, the maintenance cost is reduced, and the junk mail identification method is not influenced by human factors.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a spam identification method and device. Background technique [0002] With the development of Internet technology, e-mail has become a very important means of communication in life and work. However, due to its high popularity, low transmission cost, and a certain degree of anonymity, e-mail has become a medium for advertising or some illegal information transmission, resulting in the flood of spam. Among them, spam in this article refers to various types of emails such as advertising emails and phishing emails that are forcibly delivered to the recipient's mailbox without the recipient's permission. [0003] The proliferation of spam not only requires users to spend a lot of time to deal with it, but may also directly or indirectly cause property loss or personal information leakage of users. Therefore, how to identify spam has become a current research hotspot. Current ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/35G06F40/284G06F40/289H04L12/58
CPCG06F16/35G06F40/284G06F40/289H04L51/42H04L51/212
Inventor 谭振华黎升达刘茜
Owner 北京天空卫士网络安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products