CN101635894A - Monitoring system, monitoring method and information transmission method for junk information - Google Patents
Monitoring system, monitoring method and information transmission method for junk information Download PDFInfo
- Publication number
- CN101635894A CN101635894A CN200910091900A CN200910091900A CN101635894A CN 101635894 A CN101635894 A CN 101635894A CN 200910091900 A CN200910091900 A CN 200910091900A CN 200910091900 A CN200910091900 A CN 200910091900A CN 101635894 A CN101635894 A CN 101635894A
- Authority
- CN
- China
- Prior art keywords
- user
- transmit leg
- message
- information
- judged result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a monitoring system, a monitoring method and an information transmission method for junk information, wherein the monitoring system comprises a storage module, a reception module, a first judgment module, an obtaining module and a second correction module, wherein the storage module is used for storing a blacklist for recording users of a first type and a white list for recording users of a second type; the reception module is used for receiving information forwarded by an information center; the first judgment module is used for judging the user type of a transmitter of the information, obtaining a first judgment result and indicating that the transmitter of the information is a doubtful user; the obtaining module is used for obtaining a second judgment result that whether the transmitter of the indicating information is a user of the first type or a user of the second type when the transmitter of the information belongs to the doubtful user; and the second correction module is used for correspondingly adding the transmitter to the blacklist when the transmitter of the indicating information is the user of the first type and correspondingly adding the transmitter to the white list when the transmitter of the indicating information is the user of the second type. The invention effectively avoids the loophole of escaping monitoring when packet transmitters of junk information set transmission speed lower than the maximum threshold flow.
Description
Technical field
The present invention relates to the information security management field of communication operator, relate in particular to a kind of junk information supervisory control system, method for supervising, method for sending information.
Background technology
Note, MMS make that owing to characteristics such as the data volume of itself are enriched, content is various the information service amount in the present existing network is progressively soaring.Along with the continuous development of information service, have the illegal or unhealthy information content more at present or without the client allows the junk information to commerce, advertising message or the other guide of client's mass-sending also more and more.A large amount of junk information not only consumes the communication network resource, has also disturbed normal Business Processing simultaneously.
To junk information, especially the monitoring of garbage multimedia messages and shutoff, patent application " garbage message and multimedia message plugging method has proposed a kind of garbage message and multimedia message plugging method, may further comprise the steps: at first, the garbage message and multimedia message server monitoring goes out number and the content that the unit interval traffic volume exceeds standard; Secondly, BOSS obtains to exceed standard number file and content; Once more, with the contrast of number and white list, judge that this number is whether in white list, if then flow process finishes; Whether, by artificial cognition content be garbage message and multimedia message, if not, then flow process finishes if if not, then manually judging, being about to this number and content and being presented to the customer service operator interface; If then enter next step; At last, this number is stopped the message and multimedia message function command to the HLR transmission, add service knowledge base simultaneously, the contact staff explains when being stopped number initiation complaint for quilt.
This patent is based on the monitoring of message transmitted traffic, and refuse messages mass-sending merchant can be by being set at transmission speed the shutoff that the mode that is lower than the limited flow rate thresholding slightly escapes operator.And the method for directly stopping function of multimedia message is adopted in violation user's shutoff, the user will can not be suitable for function of multimedia message forever like this, unless the user initiatively complains requirement to open function of multimedia message again, this processing method has increased the O﹠M manual operation greatly, those users that are not intended to mass-send garbage multimedia messages are caused very poor user experience, and actual applicability is little; Transmission at the outer area under one's jurisdiction garbage multimedia messages note that roams in itself need insert MPM between MSC and lSTP, MPM is the signaling process machine hardware of custom-made, all are carried out counting statistics through the signaling of MPM, needing increases signaling hardware, and complexity sharply rises, the also corresponding rising of cost.
The method of existing monitoring junk information is based on transmitted traffic, can not monitor refuse messages mass-sending merchant and transmission speed is set at the junk information that sends when being lower than the limited flow rate thresholding slightly.And, on the mode of junk information shutoff, the user has been adopted this more extreme mode of transmission information that stops, also not too reasonable to the shutoff mode of junk information in a word.
Summary of the invention
The purpose of this invention is to provide a kind of junk information supervisory control system, method for supervising, method for sending information, the junk information mass-sending merchant who causes with the imperfection that solves existing junk information method for supervising reduces transmission speed and escapes monitoring, and to the irrational problem of user's processing mode.Junk information supervisory control system of the present invention comprises:
Preserve module, be used to preserve the white list that is used to write down first kind user's blacklist and is used to write down second type of user;
Receiver module is used to receive the message that information centre transmits, and is translated into inside story;
First judge module is used for judging user type under the transmit leg of described message according to the feature of preset rules and described inside story that obtain first judged result, the transmit leg of indicating described message is the suspicious user of the 3rd type;
Acquisition module is used for when described first judged result indicates the transmit leg of described message to be the suspicious user of described the 3rd type, and whether the transmit leg that obtains the described message of indication is second judged result of the first kind user or second type of user;
Second modified module, be used for when described second judged result indicates the transmit leg of described message to be first kind user, add the transmit leg correspondence of described message to described blacklist, when described second judged result indicates the transmit leg of described message to be second type of user, add the transmit leg correspondence of described message to described white list.
Described second judged result for the transmit leg of user's judged result by input unit input or the Indication message in described second judged result whether for first kind user for judge the result who obtains according to a pre-defined rule.
The transmit leg of the Indication message in described second judged result whether for first kind user for judge according to a pre-defined rule obtain as a result the time, described supervisory control system also comprises:
Second judge module is used for when described first judged result indicates the transmit leg of described message to be the suspicious user of described the 3rd type, judges according to predetermined condition whether described suspicious user is the user of the first kind;
Whether the transmit leg that described acquisition module obtains the described message of indication according to the judged result of described second judge module is first kind user's second judged result.
Described supervisory control system further comprises:
Update module is used for upgrading black and/or white list according to the predefined term of validity.
Described supervisory control system further comprises:
Synchronization module is used for described blacklist and/or described white list are synchronized to information centre.
When described first judge module indicated the transmit leg of described message to be first kind user, described supervisory control system further comprised:
First modified module, the transmit leg that is used for belonging to described first kind user's message adds described blacklist to.
The present invention also provides a kind of junk information method for supervising, is applied to the junk information supervisory control system, may further comprise the steps:
Described supervisory control system receives the message that information centre transmits, and is translated into inside story;
Described supervisory control system is judged the user type under the transmit leg of described message according to the feature of preset rules and described inside story, obtain first judged result, and the transmit leg of indicating described message is the suspicious user of the 3rd type;
When described supervisory control system indicated the transmit leg of described message to be the suspicious user of described the 3rd type in described first judged result, whether the transmit leg that obtains the described message of indication was second judged result of the first kind user or second type of user;
When described supervisory control system indicates the transmit leg of described message to be first kind user in described second judged result, add the transmit leg correspondence of described message to described blacklist, when described second judged result indicates the transmit leg of described message to be second type of user, add the transmit leg correspondence of described message to described white list.
The result that described second judged result is judged for the user by input unit input or the transmit leg of the Indication message in described second judged result whether for first kind user for judging the result who obtains automatically according to a pre-defined rule.
The transmit leg of the Indication message in described second judged result whether for first kind user for judge automatically according to a pre-defined rule obtain as a result the time, whether the described transmit leg that obtains Indication message is that the step of first kind user's second judged result is specially:
When the transmit leg of the first judged result Indication message is the suspicious user of described the 3rd type, judge according to predetermined condition whether the suspicious user of described the 3rd type is the user of the described first kind;
Whether the transmit leg that obtains Indication message is described first kind user's second judged result.
Described method further comprises step:
Described blacklist and/or white list are synchronized to information centre.
When described first judged result indicated the transmit leg of described message to be first kind user, described supervisory control system was added the transmit leg that belongs to described first kind user's message to described blacklist.
The present invention also provides a kind of method for sending information, may further comprise the steps:
Information centre receives information sending request;
Described information centre is according to the blacklist and the white list of storage in advance, judges that described transmission asks the list type under the corresponding Subscriber Number;
Whether described information centre carries out shutoff to described Subscriber Number according to the list type decided under the described Subscriber Number, if described Subscriber Number belongs to blacklist, then finishes transmission information;
If described Subscriber Number belongs to white list, then according to photos and sending messages under the normal flow process;
If described Subscriber Number neither belongs to blacklist and also do not belong to white list, then described information is normally issued, and a the execution to supervisory control system of making a copy for monitored flow process.
Compared with prior art, the present invention has following beneficial effect:
Method for supervising of the present invention is provided with suspicious thresholding, by the monitoring to the number that reaches suspicious thresholding, efficiently solves junk information mass-sending merchant and transmission speed is set at the leak of escaping monitoring when being lower than high threshold flow slightly.And, by suspicious thresholding is set, can also further monitor suspicious number flexibly by artificial or automatic mode, what make that the part mistake sends out or send is not that the number of real junk information avoids being stopped transmission information, has so just avoided directly stopping the infringement that user's transmission information is brought for the user.
Method for sending information of the present invention can directly according to the black and white lists tabulation, make the number that is in the blacklist stop to send in the information of transmission, then utilizes method for supervising to judge whether it needs to pipe off for suspicious number.And suspicious number is in monitored, and its corresponding information remains and issues, and therefore, can not influence the normal transmitting-receiving flow process of current information.
Implementation method of the present invention is simple, and the ext nal network element that relates to is few, only needs supervisory control system is connected with information centre, and interface is simple, is applicable to the heterogeneous networks of all operators; Not only point-to-point junk information is realized monitoring and shutoff, can realize equally monitoring and shutoff to the information of point that other functions to the user can not impact simultaneously, safeguard simple for the ESME that sends by SP and other information group sending devices.
Description of drawings
Fig. 1 is a junk information supervisory control system structural representation of the present invention;
Fig. 2 is the syndeton schematic diagram of junk information supervisory control system of the present invention and information centre;
Fig. 3 is a junk information method for supervising flow chart of the present invention;
Fig. 4 is a method for sending information flow chart of the present invention.
Embodiment
Junk information supervisory control system of the present invention and method not only can but also can be monitored based on the information element content based on the transmitted traffic of information, monitored results directly is synchronized to the black and white lists database of each information centre, thereby realizes the quick blocking of junk information.
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in further detail.
With reference to figure 1, Fig. 1 is a junk information supervisory control system structural representation of the present invention, comprising:
Preserve module, be used to preserve the white list that is used to write down first kind user's blacklist and is used to write down second type of user;
Receiver module is used to receive the message that information centre transmits, and is translated into inside story; This message can be note, also can be multimedia message.
First judge module is used for judging user type under the transmit leg of message according to the feature of preset rules and inside story that obtain first judged result, the transmit leg of Indication message is the suspicious user of the 3rd type;
When first judge module indicated the transmit leg of described message to be first kind user, supervisory control system further comprised:
First modified module, the transmit leg that is used for belonging to first kind user's message adds blacklist to.
Preset rules is specifically as follows: if the transmitted traffic in the scheduled time surpasses the blacklist threshold value of the transmitted traffic in the scheduled time, then the transmit leg of message is first kind user.For example, the transmitted traffic in the scheduled time is 1M, and the message traffic that message sender sends is 2M, and then the transmit leg of Indication message is first kind user.Perhaps, count calculated flow rate with the bar in the scheduled time, for example, the bar number in the scheduled time is 1000, and the message traffic that message sender sends is 2000, and then the transmit leg of Indication message is first kind user.
Perhaps, the information bar number of content has surpassed the blacklist threshold value of presupposed information bar number if having of sending in the scheduled time and preset keyword match, and then the transmit leg of message is first kind user.For example, will have keyword is 1 for the blacklist threshold settings of the information bar number of " Falun Gong ", has " Falun Gong " printed words in 1 if then have in the information that the user sends, and then classifies this user as first kind user.
When setting rule, except setting a blacklist thresholding, also need to set a suspicious thresholding, suspicious threshold value is less than or equal to the blacklist threshold value.The purpose of setting suspicious threshold value is to prevent that junk information mass-sending merchant from sending junk information with low transmission speed in the given time, thereby transmitted traffic in the given time is lower than the blacklist threshold value, and escapes the problem of monitoring.For example, suspicious threshold settings is 0.8M, if the information flow-rate that information sender sends in the given time more than or equal to 0.8M less than 1M, then this user is the suspicious user of the 3rd type.
When pre-defined rule is during based on the information element content, be " false invoice " if suppose keyword, then can set the suspicious threshold value of information bar number with this keyword is 500, the blacklist threshold value is 700, if the information bar number with " false invoice " printed words that certain user sends in the given time is 560, then this user is the suspicious user of the 3rd type.
In the specific implementation, can set rule as required, both can set based on transmitted traffic, also can be based on the information element content setting, also can be separately based on transmitted traffic or based on the information element content setting.The particular content of rule also is not limited to the above content of enumerating.
Acquisition module is used for when first judged result judges that the transmit leg of message belongs to suspicious user, and whether the transmit leg that obtains Indication message is second judged result of the first kind user or second type of user;
The result that can judge by the user of input unit input that obtains of second judged result obtains, and the transmit leg of Indication message wherein whether be first kind user's judged result also can judge to obtain automatically according to pre-conditioned.
If the result who judges by the user obtains second judged result, the relevant information of suspicious user then, for example, the content of the information that suspicious user sends, the transmitting time of information, illegal rules etc. can show on the screen of input unit, and the user can judge according to relevant information.After the user has judged, can be at the enterprising line operate of screen, suspicious user added blacklist or add white list or do not deal with.The result of operation is obtained by acquisition module by input unit.User's judgment mode is more more accurate than automatic judgement sometimes, can be according to the particular content of information, the user filtering of real transmission junk information is come out, and list first kind user in and avoid that those mistakes have been sent out the user relevant with the junk information content.
Second modified module is used for adding the transmit leg correspondence of message to blacklist or white list when the transmit leg of the second judged result Indication message is the first kind user or second type of user.
The transmit leg of the Indication message in second judged result whether for first kind user for system judge automatically obtain as a result the time, supervisory control system of the present invention further comprises:
Second judge module is used for judging according to predetermined condition whether suspicious user is the user of the first kind when first judged result judges that the transmit leg of message belongs to suspicious user;
Whether the transmit leg that acquisition module obtains Indication message according to the judged result of second judge module is first kind user's second judged result.
Suspicious threshold value and the blacklist threshold value of utilizing supervisory control system of the present invention to set just can be carried out more perfect classification to information sender, thus more effective monitoring junk information.The black list user who monitors out is carried out shutoff, can realize by information centre.With reference to shown in Figure 2, Fig. 2 is the syndeton schematic diagram of junk information supervisory control system of the present invention and information centre.Comprise among the figure: junk information supervisory control system and information centre 1,2......n.Among information centre 1, the 2......n each connects with the junk information supervisory control system respectively.
When beginning to monitor at first, can not store blacklist and white list in the local data base of information centre, information centre sends to Surveillance center with all information, monitor out black list user, white list user by Surveillance center, for neither belonging to blacklist, the transmit leg that does not also belong to white list, by supervisory control system further determine its belong to the black list user still be the white list user still be suspicious user (being the function of acquisition module).If determine that it is the black list user, then it is added in the blacklist, if determine that it is the white list user, then it is added in the white list, if determine that it is a suspicious user, then can it not done any processing.The blacklist of Surveillance center and white list are synchronized with blacklist and the white list in the local data base of information centre.
After storing blacklist and white list in the local data base of information centre, information centre is after receiving the information that transmit leg sends, at first with black, white list contrast in information sender and the local data base, the black list user is filtered, forbid its transmission information, and the information that the white list user sends issues according to normal flow.For neither belonging to blacklist, do not belong to the transmit leg of white list yet, its information is normally issued, a supervisory control system mentioned above of giving of making a copy for simultaneously, by supervisory control system it is monitored, with further decision its to belong to the black list user still be white list user or suspicious user.If determine it to belong to the black list user, then it is added in the blacklist, if determine it to belong to the white list user, then it is added in the white list, if determine that it is a suspicious user, then utilize the function of acquisition module, further this suspicious user of decision is black list user or white list user, if determine that it is the black list user, then add it to blacklist, if determine that it is the white list user, then add it to white list, if determine it neither the black list user neither the white list user, then still be suspicious user, can not do any processing.The blacklist of Surveillance center and white list are synchronized with blacklist and the white list in the local data base of information centre.
The blacklist of the local data base of the blacklist of supervisory control system and white list and information centre and white list synchronously, can realize by synchronization module is set in supervisory control system, this synchronization module is used for the blacklist and the white list of first modified module and the interpolation of second modified module are synchronized with information centre, so that information centre carries out shutoff according to this blacklist and white list to information sender.
Synchronous specific implementation can comprise following several:
1, synchronization module is real-time synchronous with blacklist and white list the information centre local data base with the blacklist of supervisory control system and white list.
2, synchronization module is according to from the synchronization request of information centre, and the blacklist and the white list of the blacklist of supervisory control system and white list and information centre's local data base is synchronous.
3, synchronization module scheduled time at interval, that the blacklist and the white list of the blacklist of supervisory control system and white list and information centre's local data base is synchronous.
Further, supervisory control system also comprises: the blacklist update module is used for upgrading black list user's information that first modified module and second modified module add according to the predefined term of validity.The predefined term of validity can be to set forever, certainly or the end of this monitoring granularity.After the blacklist term of validity arrived, the blacklist update module was deleted black list user's information automatically, perhaps, added black list user's information.If system adopts synchronization module and blacklist update module simultaneously, then synchronization module adopts above three kinds of modes, and the blacklist after the blacklist update module is upgraded is synchronized with the blacklist of information centre's local data base.
Further, supervisory control system also comprises: the white list updating module is used for upgrading the white list information that first modified module adds according to the predefined term of validity.For example,, can directly add in the white list, not carry out any monitoring for all information that the white list user sends for the special service number of some operators (as mobile newspaper etc.).Also can white list user profile that cross the term of validity be deleted automatically as blacklist.If system adopts synchronization module and white list updating module simultaneously, the white list after then synchronization module will upgrade is synchronized with the white list of information centre's local data base.
Supervisory control system also can adopt blacklist update module, white list updating module and synchronization module simultaneously.Blacklist after synchronization module will upgrade and white list are given information centre's local data base synchronously.
The present invention also provides a kind of junk information method for supervising, is applied to the junk information supervisory control system, and with reference to figure 3, Fig. 3 is a junk information method for supervising flow chart of the present invention, comprises step:
Preserve module, be used to preserve the white list that is used to write down first kind user's blacklist and is used to write down second type of user;
Preset rules is specifically as follows: if the transmitted traffic in the scheduled time surpasses the blacklist threshold value of the transmitted traffic in the scheduled time, then the transmit leg of message is first kind user.For example, the transmitted traffic in the scheduled time is 1M, and the message traffic that message sender sends is 2M, and then the transmit leg of Indication message is first kind user.
Perhaps, the information bar number of content has surpassed the blacklist threshold value of presupposed information bar number if having of sending in the scheduled time and preset keyword match, and then the transmit leg of message is first kind user.For example, will have keyword is 1 for the blacklist threshold settings of the information bar number of " Falun Gong ", has " Falun Gong " printed words in 1 if then have in the information that the user sends, and then classifies this user as first kind user.
When setting rule, except setting a blacklist thresholding, also need to set a suspicious thresholding, suspicious threshold value is less than or equal to the blacklist threshold value.The purpose of setting suspicious threshold value is to prevent that junk information mass-sending merchant from sending junk information with low transmission speed in the given time, thereby transmitted traffic in the given time is lower than the blacklist threshold value, and escapes the problem of monitoring.For example, suspicious threshold settings is 0.8M, if the information flow-rate that information sender sends in the given time more than or equal to 0.8M less than 1M, then this user is the suspicious user of the 3rd type.
When pre-defined rule is during based on the information element content, be " false invoice " if suppose keyword, then can set the suspicious threshold value of information bar number with this keyword is 500, the blacklist threshold value is 700, if the information bar number with " false invoice " printed words that certain user sends in the given time is 560, then this user is the suspicious user of the 3rd type.
In the specific implementation, can set rule as required, both can set based on transmitted traffic, also can be based on the information element content setting, also can be separately based on transmitted traffic or based on the information element content setting.The particular content of rule also is not limited to the above content of enumerating.
The result that can judge by the user of input unit input that obtains of second judged result obtains, and the transmit leg of Indication message wherein whether be first kind user's judged result also can judge to obtain automatically according to pre-conditioned.
If the result who judges by the user obtains second judged result, the relevant information of suspicious user then, for example, the content of the information that suspicious user sends, the transmitting time of information, illegal rules etc. can show on the screen of input unit, and the user can judge according to relevant information.After the user has judged, can be at the enterprising line operate of screen, suspicious user added blacklist or add white list or do not deal with.The result of operation is obtained by acquisition module by input unit.User's judgment mode is more more accurate than automatic judgement sometimes, can be according to the particular content of information, the user filtering of real transmission junk information is come out, and list first kind user in and avoid that those mistakes have been sent out the user relevant with the junk information content.
The transmit leg of the Indication message in second judged result whether for first kind user for system judge automatically obtain as a result the time, the step 4 of method for supervising of the present invention further comprises:
Step 41 when first judged result judges that the transmit leg of message belongs to suspicious user, judges according to pre-defined rule whether suspicious user is the user of the first kind;
Step 42, according to the judged result of step 41, whether the transmit leg that obtains Indication message is first kind user's second judged result.
In order to make information centre can in time obtain blacklist and white list that Surveillance center monitors, after step 5, further comprise:
Step 6 is synchronized with information centre with blacklist and white list, so that information centre carries out shutoff according to this blacklist and white list to information sender.
Synchronous specific implementation can comprise following several:
1, the blacklist of supervisory control system and white list is real-time synchronous with blacklist and white list the information centre local data base.
2,, that the blacklist and the white list of the blacklist of supervisory control system and white list and information centre's local data base is synchronous according to from the synchronization request of information centre.
3, scheduled time at interval, that the blacklist and the white list of the blacklist of supervisory control system and white list and information centre's local data base is synchronous.
Further, for real-time blacklist and/or white list are operated, after step 5, can also comprise:
Step 6 ', blacklist and/or white list are carried out the renewal operation.
Blacklist is carried out the process of upgrading operation to be specially: upgrade black list user's information according to the predefined term of validity.The predefined term of validity can be to set forever, certainly or the end of this monitoring granularity.After the blacklist term of validity arrives, delete black list user's information automatically, perhaps, add black list user's information.
White list is carried out the process of upgrading operation to be specially: be used for directly upgrading white list, perhaps, upgrade white list information according to the predefined term of validity.For example,, can directly add in the white list, not carry out any monitoring for all information that the white list user sends for the special service number of some operators (as mobile newspaper etc.).Also the white list user profile of having crossed the term of validity can be deleted automatically.
Method to the black list user who monitors carries out shutoff can realize by information centre.The application scenarios of this method as shown in Figure 2.With reference to figure 4, Fig. 4 is a method for sending information flow chart of the present invention, comprises step:
Whether step 13 carries out shutoff to described Subscriber Number according to the list type decided under the Subscriber Number.For the user who belongs to blacklist, directly finish the transmission of its information; For the user who belongs to white list, according to finishing behind the photos and sending messages under the normal flow process; For neither belonging to the user that blacklist does not belong to white list (Fei Heifeibai) yet, its information is normally issued, simultaneously, a execution to supervisory control system of making a copy for monitored flow process, carries out according to step shown in Figure 3.
In sum, junk information supervisory control system of the present invention and method are by setting suspicious threshold value and blacklist threshold value, make monitoring scheme more perfect, even junk information mass-sending merchant is lower than the blacklist threshold value by reducing the transmitted traffic that transmission speed obtained in the given time, still can monitor by setting suspicious threshold value.
The above only is a preferred implementation of the present invention; should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.
Claims (12)
1. a junk information supervisory control system is characterized in that, comprising:
Preserve module, be used to preserve the white list that is used to write down first kind user's blacklist and is used to write down second type of user;
Receiver module is used to receive the message that information centre transmits, and is translated into inside story;
First judge module is used for judging user type under the transmit leg of described message according to the feature of preset rules and described inside story that obtain first judged result, the transmit leg of indicating described message is the suspicious user of the 3rd type;
Acquisition module is used for when described first judged result indicates the transmit leg of described message to be the suspicious user of described the 3rd type, and whether the transmit leg that obtains the described message of indication is second judged result of the first kind user or second type of user;
Second modified module, be used for when described second judged result indicates the transmit leg of described message to be first kind user, add the transmit leg correspondence of described message to described blacklist, when described second judged result indicates the transmit leg of described message to be second type of user, add the transmit leg correspondence of described message to described white list.
2. supervisory control system as claimed in claim 1, it is characterized in that, described second judged result for the transmit leg of user's judged result by input unit input or the Indication message in described second judged result whether for first kind user for judge the result who obtains according to a pre-defined rule.
3. supervisory control system as claimed in claim 2 is characterized in that, the transmit leg of the Indication message in described second judged result whether for first kind user for judge according to a pre-defined rule obtain as a result the time, described supervisory control system also comprises:
Second judge module is used for when described first judged result indicates the transmit leg of described message to be the suspicious user of described the 3rd type, judges according to predetermined condition whether the suspicious user of described the 3rd type is the user of the first kind;
Whether the transmit leg that described acquisition module obtains the described message of indication according to the judged result of described second judge module is first kind user's second judged result.
4. supervisory control system as claimed in claim 1 is characterized in that, further comprises:
Update module is used for upgrading black and/or white list according to the predefined term of validity.
5. supervisory control system as claimed in claim 4 is characterized in that, further comprises:
Synchronization module is used for described blacklist and/or described white list are synchronized to information centre.
6. supervisory control system as claimed in claim 1 is characterized in that, when described first judge module indicated the transmit leg of described message to be first kind user, described supervisory control system further comprised:
First modified module, the transmit leg that is used for belonging to described first kind user's message adds described blacklist to.
7. a junk information method for supervising is applied to the junk information supervisory control system, it is characterized in that, may further comprise the steps:
Described supervisory control system receives the message that information centre transmits, and is translated into inside story;
Described supervisory control system is judged the user type under the transmit leg of described message according to the feature of preset rules and described inside story, obtain first judged result, and the transmit leg of indicating described message is the suspicious user of the 3rd type;
When described supervisory control system indicated the transmit leg of described message to belong to the suspicious user of described the 3rd type in described first judged result, whether the transmit leg that obtains the described message of indication was second judged result of the first kind user or second type of user;
When described supervisory control system indicates the transmit leg of described message to be first kind user in described second judged result, add the transmit leg correspondence of described message to described blacklist, when described second judged result indicates the transmit leg of described message to be second type of user, add the transmit leg correspondence of described message to described white list.
8. method for supervising as claimed in claim 7, it is characterized in that, the result that described second judged result is judged for the user by input unit input or the transmit leg of the Indication message in described second judged result whether for first kind user for judging the result who obtains automatically according to a pre-defined rule.
9. method for supervising as claimed in claim 8, it is characterized in that, the transmit leg of the Indication message in described second judged result whether for first kind user for judge automatically according to a pre-defined rule obtain as a result the time, whether the described transmit leg that obtains Indication message is that the step of first kind user's second judged result is specially:
When the transmit leg of the first judged result Indication message is the suspicious user of described the 3rd type, judge according to predetermined condition whether the suspicious user of described the 3rd type is the user of the described first kind;
Whether the transmit leg that obtains Indication message is described first kind user's second judged result.
10. method for supervising as claimed in claim 7 is characterized in that, described method further comprises step:
Described blacklist and/or white list are synchronized to information centre.
11. method for supervising as claimed in claim 7 is characterized in that, when described first judged result indicated the transmit leg of described message to be first kind user, described supervisory control system was added the transmit leg that belongs to described first kind user's message to described blacklist.
12. a method for sending information is characterized in that, may further comprise the steps:
Information centre receives information sending request;
Described information centre is according to the blacklist and the white list of storage in advance, judges that described transmission asks the list type under the corresponding Subscriber Number;
Whether described information centre carries out shutoff to described Subscriber Number according to the list type decided under the described Subscriber Number, if described Subscriber Number belongs to blacklist, then finishes transmission information;
If described Subscriber Number belongs to white list, then according to photos and sending messages under the normal flow process;
If described Subscriber Number neither belongs to blacklist and also do not belong to white list, then described information is normally issued, and a the execution to supervisory control system of making a copy for monitored flow process.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910091900A CN101635894A (en) | 2009-08-28 | 2009-08-28 | Monitoring system, monitoring method and information transmission method for junk information |
PCT/CN2010/071383 WO2011022969A1 (en) | 2009-08-28 | 2010-03-29 | System and method for monitoring junk information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910091900A CN101635894A (en) | 2009-08-28 | 2009-08-28 | Monitoring system, monitoring method and information transmission method for junk information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101635894A true CN101635894A (en) | 2010-01-27 |
Family
ID=41594913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200910091900A Pending CN101635894A (en) | 2009-08-28 | 2009-08-28 | Monitoring system, monitoring method and information transmission method for junk information |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101635894A (en) |
WO (1) | WO2011022969A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011022969A1 (en) * | 2009-08-28 | 2011-03-03 | 中兴通讯股份有限公司 | System and method for monitoring junk information |
CN102404762A (en) * | 2010-09-19 | 2012-04-04 | 联想(北京)有限公司 | Access management method and device |
CN104539514A (en) * | 2014-12-17 | 2015-04-22 | 广州酷狗计算机科技有限公司 | Information filtering method and device |
WO2015058509A1 (en) * | 2013-10-21 | 2015-04-30 | 中兴通讯股份有限公司 | Spam processing method and device |
CN105228143A (en) * | 2014-06-13 | 2016-01-06 | 中国移动通信集团公司 | A kind of refuse messages discrimination method, device and terminal |
CN105635044A (en) * | 2014-10-28 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Information synchronization method and device |
CN106162619A (en) * | 2015-04-24 | 2016-11-23 | 中国移动通信集团公司 | A kind of monitoring and early warning method and device of call center outgoing call |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105323145B (en) * | 2014-07-17 | 2020-09-04 | 腾讯科技(深圳)有限公司 | Malicious information identification method, malicious information identification device and system |
CN107305499B (en) * | 2016-04-22 | 2022-03-04 | 中兴通讯股份有限公司 | Method and device for clearing notification messages of mobile terminal |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101137085B (en) * | 2007-03-20 | 2010-05-19 | 中国移动通信集团江苏有限公司 | Junk SMS MMS Blocking Method |
CN101335968B (en) * | 2008-08-04 | 2012-05-09 | 中兴通讯股份有限公司 | Method and system for rubbish short message monitoring post processing |
CN101389074B (en) * | 2008-10-17 | 2011-08-24 | 浙江大学 | Short message monitoring method based on social network mechanism to confirm sender's identity |
CN101635894A (en) * | 2009-08-28 | 2010-01-27 | 中兴通讯股份有限公司 | Monitoring system, monitoring method and information transmission method for junk information |
-
2009
- 2009-08-28 CN CN200910091900A patent/CN101635894A/en active Pending
-
2010
- 2010-03-29 WO PCT/CN2010/071383 patent/WO2011022969A1/en active Application Filing
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011022969A1 (en) * | 2009-08-28 | 2011-03-03 | 中兴通讯股份有限公司 | System and method for monitoring junk information |
CN102404762A (en) * | 2010-09-19 | 2012-04-04 | 联想(北京)有限公司 | Access management method and device |
CN102404762B (en) * | 2010-09-19 | 2016-07-06 | 联想(北京)有限公司 | A kind of method of Access Management Access and device |
WO2015058509A1 (en) * | 2013-10-21 | 2015-04-30 | 中兴通讯股份有限公司 | Spam processing method and device |
CN105228143A (en) * | 2014-06-13 | 2016-01-06 | 中国移动通信集团公司 | A kind of refuse messages discrimination method, device and terminal |
CN105228143B (en) * | 2014-06-13 | 2019-05-24 | 中国移动通信集团公司 | A kind of refuse messages discrimination method, device and terminal |
CN105635044A (en) * | 2014-10-28 | 2016-06-01 | 腾讯科技(深圳)有限公司 | Information synchronization method and device |
CN105635044B (en) * | 2014-10-28 | 2020-06-16 | 腾讯科技(深圳)有限公司 | Information synchronization method and device |
CN104539514A (en) * | 2014-12-17 | 2015-04-22 | 广州酷狗计算机科技有限公司 | Information filtering method and device |
CN106162619A (en) * | 2015-04-24 | 2016-11-23 | 中国移动通信集团公司 | A kind of monitoring and early warning method and device of call center outgoing call |
Also Published As
Publication number | Publication date |
---|---|
WO2011022969A1 (en) | 2011-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101635894A (en) | Monitoring system, monitoring method and information transmission method for junk information | |
CN101741615B (en) | Server-based alarm filtering system and method | |
CN101137085B (en) | Junk SMS MMS Blocking Method | |
CN102088679A (en) | Working method and system of intelligent short message firewall of self-learning mobile terminal | |
CN101909261A (en) | Method and system for monitoring spam | |
CN102231888A (en) | Monitoring method and device | |
CN101848441B (en) | Suspicious short message deferrable transmitting method, device thereof and system thereof | |
CN110337107A (en) | An intelligent monitoring and warning device for fraudulent short messages | |
CN104426710A (en) | Monitoring evidence obtaining method and system | |
CN110072251B (en) | Method and device for analyzing user communication behavior and managing user | |
CN101526979B (en) | Intelligent alarm, inquiry and monitor terminal | |
CN102572747A (en) | Method and system for monitoring junk short message | |
CN102098640A (en) | Method, device and system for distinguishing and stopping equipment from sending SMS (short messaging service) spam | |
CN102111723B (en) | Method for identifying spam short message user by analyzing short message frequency and content | |
CN101321365B (en) | Rubbish message sending user identification method by message reply frequency | |
CN101715176A (en) | Short message router, short message monitoring system and short message monitoring method | |
CN102572746B (en) | A kind of method sending behavioural characteristic identification junk short message source based on the frequency and user | |
CN105307134A (en) | Short message monitoring method and device | |
CN102231874A (en) | Short message processing method, device and system | |
CN101431422A (en) | Accounting method, accounting apparatus, accounting gateway and accounting system | |
CN105763560A (en) | Web Service interface flow real-time monitoring method and system | |
WO2017193798A1 (en) | Junk information monitoring method and apparatus and communication system | |
CN114666752A (en) | Short message management and control system and management and control method of IMS domain | |
CN105025448A (en) | IM information pushing method and system, server and platform | |
CN101707752A (en) | Communication monitoring method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20100127 |