CN108966234B - Malicious information processing method and device - Google Patents
Malicious information processing method and device Download PDFInfo
- Publication number
- CN108966234B CN108966234B CN201810552950.3A CN201810552950A CN108966234B CN 108966234 B CN108966234 B CN 108966234B CN 201810552950 A CN201810552950 A CN 201810552950A CN 108966234 B CN108966234 B CN 108966234B
- Authority
- CN
- China
- Prior art keywords
- information
- malicious
- url
- receiving
- sending
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention provides a method and a device for processing malicious information, wherein the method comprises the following steps: receiving information sent by first terminal equipment of a sending end, carrying out safety check on the information according to a safety rule acquired in advance, determining whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audio or videos, and if the information does not contain the malicious information, sending the information to second terminal equipment of a receiving end.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for processing malicious information.
Background
With the development of mobile internet, mobile terminals gradually become a platform for person-to-person communication, especially in recent years, chat software and network construction are rapidly developed, the cost of networks is lower and lower, communication modes between users are also transited from traditional short messages/telephones to mainstream chat software such as WeChat and QQ, so that the cost of message sending is basically zero, and meanwhile, malicious information (including various malicious marketing information, harassing information and the like) also fills the whole network.
The malicious information currently exists includes text, audio, video, picture and other types of information. Taking WeChat as an example, a 'WeChat explosion group' exists at present, and the specific operation is that a user sends a message containing malicious information to a group or an individual, so that the WeChat of the user who sees the information is 'stuck' or directly crashed.
In summary, in the chat software or other applications, malicious information is enriched, which has already seriously affected the user experience.
Disclosure of Invention
The invention provides a method and a device for processing malicious information, which are used for solving the problem that the experience of a user is seriously influenced because the chat software or other application programs are filled with the malicious information.
The first aspect of the present invention provides a method for processing malicious information, including:
receiving information sent by first terminal equipment of a sending end;
performing security check on the information according to a pre-acquired security rule, and determining whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audios or videos;
and if the information does not contain malicious information, sending the information to second terminal equipment of a receiving end.
Optionally, the method further includes:
and if the information contains malicious information, intercepting the information and sending warning information to the first terminal equipment.
Optionally, before performing security check on the information according to a pre-obtained security rule and determining whether the information contains malicious information, the method further includes:
according to the type of the information, the information is sent to a corresponding server for verification;
receiving a URL returned by the server; and if the information is abnormal, the URL is empty, otherwise, the URL is the URL of the resource of the information.
Optionally, the method further includes:
if the malicious information contained in the information is fraud information, adding prompt information in the information and then sending the prompt information to the second terminal equipment; wherein the prompt message is used for reminding the user that the message contains fraud information.
Optionally, the method further includes:
receiving a malicious information reporting message sent by terminal equipment;
and updating the safety rules according to the malicious information reporting message, wherein the safety rules comprise rules for filtering at least one type of malicious information in characters, pictures, audios or videos.
A second aspect of the present invention provides an apparatus for processing malicious information, including:
the receiving module is used for receiving information sent by first terminal equipment of a sending end;
the processing module is used for carrying out security check on the information according to a pre-acquired security rule and determining whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audios or videos;
and the sending module is used for sending the information to second terminal equipment of a receiving end if the information does not contain malicious information.
Optionally, the processing module is further configured to intercept the information if the information contains malicious information;
the sending module is further configured to send warning information to the first terminal device.
Optionally, the sending module is further configured to send the information to a corresponding server for verification according to the type of the information;
the receiving module is also used for receiving a Uniform Resource Locator (URL) returned by the server; and if the information is abnormal, the URL is empty, otherwise, the URL is the URL of the resource of the information.
Optionally, the processing module is further configured to, if malicious information contained in the information is fraud information, add a prompt message to the information and send the prompt message to the second terminal device through the sending module; wherein the prompt message is used for reminding the user that the message contains fraud information.
Optionally, the receiving module is further configured to receive a malicious information reporting message sent by the terminal device;
the processing module is further configured to update the security rule according to the malicious information reporting message, where the security rule includes a rule for filtering at least one type of malicious information in text, picture, audio, or video.
A third aspect of the present invention provides a server comprising: a receiver, a processor, a transmitter, a memory, and a computer program; the computer program is stored in the memory, and the processor executes the computer program to implement the malicious information processing method according to any one of the first aspect.
A fourth aspect of the present invention provides a computer-readable storage medium storing a computer program, wherein a server executes the computer program to implement the malicious information processing method according to any one of the first aspects.
According to the malicious information processing method and device provided by the embodiment of the invention, after receiving the information sent by the first terminal equipment at the sending end, the server carries out security check on the information according to the pre-obtained security rules to determine whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audio or videos, and if the information does not contain the malicious information, the information is sent to the second terminal equipment at the receiving end.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart of a malicious information processing method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a second malicious information processing method according to an embodiment of the present invention;
fig. 3 is a flowchart of a third embodiment of a malicious information processing method according to the present invention;
fig. 4 is a flowchart of a fourth embodiment of a method for processing malicious information according to the present invention;
fig. 5 is a flowchart illustrating an example of a malicious information processing method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an embodiment of a malicious information processing apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an embodiment of a server according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Aiming at the problem that in the existing communication software, a user may send messages or information containing protocol information to other users, which causes troubles or harm to the other side and leads to poor user experience.
The malicious information processing method is applied to a server of an application program, safety check is carried out on information sent by a user before, information containing malicious information is filtered, and then the information is sent to terminal equipment of a receiving end, so that malicious information sending between users is effectively prevented, and malicious information is reduced.
This embodiment will be described in detail below with reference to several embodiments.
Fig. 1 is a flowchart of a first embodiment of a method for processing malicious information according to an embodiment of the present invention, and as shown in fig. 1, the method for processing malicious information is applied between a first terminal device at a sending end, a server of an application program, and a second terminal device at a receiving end, and the method for processing malicious information includes the following steps:
s101: and receiving information sent by the first terminal equipment of the sending end.
In this step, the user installs an application program capable of implementing instant messaging or information transmission in the terminal device according to the requirement, so that the user can send information to the terminal device of another user through the application program when needed, however, in the specific application process, part of the users have a behavior of sending malicious information to other users for a malicious purpose, and the malicious information is also called spam information, harassing information, and the like. Based on this, a special security check process may be set on the server serving the application program to filter the transmitted information, specifically, the first terminal device at the sending end sends information through the client of the application program according to the operation of the user, and the server receives the information sent by the first terminal device.
S102: and carrying out security check on the information according to a pre-acquired security rule, and determining whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audios or videos.
In this step, the server needs to obtain a certain security rule in advance through configuration or other manners, where the security rule is used to filter at least one of malicious words, malicious pictures, malicious audios, and malicious videos in the information, and after receiving the information, the server performs inspection filtering on the information according to the security rule to determine whether the information includes some malicious information, such as: sensitive information, dangerous information, fraud information, and other information that affects the user experience, and the like.
S103: and if the information does not contain malicious information, the information is sent to second terminal equipment of the receiving end.
In this step, after the server performs security check on the information according to the security rules, if the information contains malicious information, the information is intercepted at the server and is not sent to the user at the receiving end, that is, not sent to the terminal device at the receiving end.
If after the check it is determined that the information does not contain malicious information, the information may be sent to the user at the receiving end, i.e. to the second terminal device via the client of the application, and displayed to the user.
In a specific implementation of the scheme, if the information contains malicious information, the information is intercepted, and warning information is sent to the first terminal device. The method has the meaning that the malicious information is intercepted, and meanwhile, the warning information can be sent to the first terminal equipment of the sending end, so that the opposite user is warned not to send the malicious information to other people maliciously, and the existence of the malicious information can be effectively reduced.
According to the malicious information processing method provided by the embodiment, after the server receives the information sent by the first terminal device, the server performs security check on the information according to the security rules, namely, whether the information contains malicious information is determined, and if the information does not contain the malicious information, the information is sent to the second terminal device at the receiving end.
Fig. 2 is a flowchart of a second embodiment of a malicious information processing method provided in an embodiment of the present invention, and as shown in fig. 2, in another implementation process of the scheme, before a server performs security check on information according to a security rule obtained in advance and determines whether the information includes malicious information, the method may further include the following steps:
s201: and sending the information to a corresponding server for verification according to the type of the information.
S202: receiving a Uniform Resource Locator (URL) returned by the server; and if the information is abnormal, the URL is empty, otherwise, the URL is the URL of the resource of the information.
In the above steps, after receiving the information sent by the user, the server may send the picture to the picture server for verification if the information is a picture, and may send the information to an audio server if the information is an audio file, after receiving the information, the corresponding server verifies the data binary system of the picture or the audio file to determine whether the information is abnormal, and if the picture or the audio is abnormal, an empty resource URL is returned, and if the information is not abnormal, a resource URL of correct information is returned. If the video or the text type can be verified in the same way, the scheme is not limited.
After the information is verified by the resource server, security check is performed on the information by using a security rule obtained in advance, then according to the process of the embodiment, the information is determined not to contain malicious information and then is sent to the second terminal device of the receiving end, and if the information contains the malicious information, interception is performed and a warning is sent to the first terminal device.
According to the malicious information processing method provided by the embodiment, after the server receives the information, the information is firstly sent to the corresponding resource server for verification, after the information is determined to be abnormal, safety inspection is carried out on the information according to the safety rules, namely whether the information contains malicious information or not is determined, and if the information does not contain the malicious information, the information is sent to the second terminal equipment at the receiving end.
Fig. 3 is a flowchart of a third embodiment of a processing method for malicious information according to an embodiment of the present invention, and as shown in fig. 3, on the basis of the another embodiment, another implementation method of the processing method for malicious information includes the following steps:
s101: and receiving information sent by the first terminal equipment of the sending end.
S102: and carrying out security check on the information according to a pre-acquired security rule, and determining whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audios or videos.
The steps are similar to those in the first embodiment, and the specific implementation scheme refers to the first embodiment.
S104: and if the information contains malicious information, intercepting the information and sending warning information to the first terminal equipment.
In this step, if the information contains malicious information, the information is intercepted, and warning information is sent to the first terminal device. The method has the meaning that the malicious information is intercepted, and meanwhile, the warning information can be sent to the first terminal equipment of the sending end, so that the opposite user is warned not to send the malicious information to other people maliciously, and the existence of the malicious information can be effectively reduced.
S105: if the malicious information contained in the information is fraud information, adding prompt information in the information and then sending the prompt information to the second terminal equipment.
In the above steps, if it is determined that there is no illegal information or dangerous information in the malicious information, but fraud information is included, if the user cannot take care of causing a certain property loss or other loss, prompt information for reminding the user that the fraud information is included in the information can be added while sending to the second terminal device. So that the user can take care of handling according to the reminder information.
In the processing scheme of the malicious information provided by this embodiment, after determining that the received information contains fraud information, the server adds prompt information to the information and sends the information to the user at the receiving end, so that the user can pay attention to property security according to the prompt, and the experience of the user using the application program is improved.
Fig. 4 is a flowchart of a fourth embodiment of a processing method for malicious information according to the embodiment of the present invention, as shown in fig. 4, on the basis of any of the above embodiments, the processing method for malicious information further includes the following steps:
s301: and receiving a malicious information reporting message sent by the terminal equipment.
In this step, after the server sends the information to the terminal device at the receiving end, the user at the receiving end determines whether malicious information such as sensitive information, fraud information, information affecting user experience, and the like exists in the information after receiving the information, if not, the information does not need to be reported, and the subsequent process is continued.
In a specific implementation manner, the malicious information reporting message may include information such as a user identifier of the sending end, a type of the malicious information, and the like.
S302: and updating the safety rules according to the malicious information reporting message, wherein the safety rules comprise rules for filtering at least one type of malicious information in characters, pictures, audios or videos.
In this step, after receiving the malicious information report message, the server may update the local security rule according to the information therein, so that the next time the information containing the same malicious information appears, the server may filter the information and ensure that the information is not sent to the user at the receiving end.
In this scheme, it should be understood that the security rules include rules for filtering at least one type of malicious information in text, pictures, audio, or video.
In the method for processing malicious information provided by this embodiment, the security rules on the server side are updated according to the malicious information reported by each terminal device after the user receives the information, so that the same malicious information is not greatly diffused, the network security is improved, the occurrence of malicious information is further reduced, and the user experience is improved.
On the basis of the above embodiments, the following describes in detail the malicious information processing method through specific implementation.
Based on the scheme, regarding how to filter the pictures and the audio and video files in the information and the filtering rules in the interference filtering device, the scheme adopted for filtering the pictures and the audio and video files can be compared through corresponding binary data streams when the pictures or the audio files are uploaded to a file server, and abnormal pictures or abnormal audio and video files are filtered. How to update the security rules in the filtering means provided in the server takes two approaches: the first scheme is to continuously update the rule based on big data. For example: sensitive information fields, pictures, audio, etc. The second scheme is as follows: and setting the established safety rules and the processing mode through manual intervention, updating the safety rules of the filtering device and flexibly setting the effective time.
Fig. 5 is a flowchart illustrating an example of a malicious information processing method according to an embodiment of the present invention, where as shown in fig. 5, the method specifically includes:
1. the user of the sending end sends information through the client of the application program installed on the first terminal equipment. For example, the message body is:
2. the server of the application program receives information sent by a user, firstly, the user sends a picture or audio file to the picture or audio server, the server checks through a data binary system of the picture or audio/video file, if the picture is abnormal, an empty resource url is returned, and otherwise, a corresponding resource url is returned.
3. The server performs security check on the information sent by the user according to security rules, for example: whether the sent information contains sensitive information, dangerous information, fraud information and information influencing user experience is filtered according to different security levels, if the information contains the sensitive information or the information influencing the user experience, the information is directly intercepted and stopped from being sent, and a prompt or a warning and the like are given to a sender. If the fraud information is contained, the prompt information is added to the user behind the message body, so that the loss of the user is reduced. The code fragments are as follows: when the message body isSafe is YES, it indicates that the message conforms to the security rules (also called filtering rules). The method specifically comprises the following steps:
4. the user at the receiving end receives the information through the client of the application installed on the second terminal device.
5. And the user determines whether the received information contains sensitive information, fraud information and information influencing user experience, if not, the information is not reported, and the process is ended. If the information is contained, the information is reported to the server manually, and the server updates the filtering device according to a certain rule, thereby further achieving the purpose of updating the security rule.
According to the scheme, the mechanism for solving malicious sending of the junk information through the intelligent filtering device is provided, and after the scheme is used, users can effectively prevent malicious sending of information among the users, so that the improvement of user experience, the reduction of malicious information and the establishment of brand credibility are facilitated.
Fig. 6 is a schematic structural diagram of an embodiment of a malicious information processing apparatus according to an embodiment of the present invention; as shown in fig. 6, the malicious information processing apparatus 10 according to the present embodiment includes:
a receiving module 11, configured to receive information sent by a first terminal device at a sending end;
the processing module 12 is configured to perform security check on the information according to a pre-obtained security rule, and determine whether the information contains malicious information, where the malicious information includes at least one of malicious characters, pictures, audio, or videos;
and a sending module 13, configured to send the information to a second terminal device of the receiving end if the information does not include malicious information.
The malicious information processing apparatus provided in this embodiment is configured to implement the technical scheme of the server side in any one of the foregoing method embodiments, perform security check and filtering on received information, and then determine whether to send the received information to a terminal device at a receiving end.
On the basis of the above embodiment, the processing module 12 is further configured to intercept the information if the information contains malicious information;
the sending module 13 is further configured to send warning information to the first terminal device.
Optionally, the sending module 13 is further configured to send the information to a corresponding server for verification according to the type of the information;
the receiving module 11 is further configured to receive a uniform resource locator URL returned by the server; and if the information is abnormal, the URL is empty, otherwise, the URL is the URL of the resource of the information.
Optionally, the processing module 12 is further configured to, if malicious information contained in the information is fraud information, add a prompt message to the information and send the prompt message to the second terminal device through the sending module; wherein the prompt message is used for reminding the user that the message contains fraud information.
Optionally, the receiving module 11 is further configured to receive a malicious information reporting message sent by the terminal device;
the processing module 12 is further configured to update the security rule according to the malicious information reporting message, where the security rule includes a rule for filtering at least one type of malicious information in text, picture, audio, or video.
The malicious information processing apparatus provided in this embodiment is used to implement the technical scheme on the server side in any of the foregoing method embodiments, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 7 is a schematic structural diagram of an embodiment of the server provided in the embodiment of the present invention, and as shown in fig. 7, the server further includes: a receiver, a processor, a transmitter, a memory, and a computer program; the computer program is stored in the memory, and the processor executes the computer program to realize the malicious information processing method provided by any one of the foregoing embodiments.
The invention further provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, and a server executes the computer program to realize the malicious information processing method provided by any one of the foregoing embodiments.
In the implementation of the server, it should be understood that the Processor may be a Central Processing Unit (CPU), other general-purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: read-only memory (ROM), RAM, flash memory, hard disk, solid state disk, magnetic tape (magnetic tape), floppy disk (flexible disk), optical disk (optical disk), and any combination thereof.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (8)
1. A method for processing malicious information is characterized by comprising the following steps:
receiving information sent by first terminal equipment of a sending end;
according to the type of the information, the information is sent to a corresponding server for verification;
receiving a Uniform Resource Locator (URL) returned by the server; if the information is abnormal, the URL is empty, otherwise, the URL is the URL of the resource of the information;
if the URL is the URL of the resource of the information, safety inspection is carried out on the information according to a pre-obtained safety rule, whether the information contains malicious information or not is determined, and the malicious information comprises at least one of malicious characters, pictures, audios or videos;
if the information does not contain malicious information, the information is sent to second terminal equipment of a receiving end;
receiving a malicious information reporting message sent by terminal equipment;
and updating the safety rules according to the malicious information reporting message, wherein the safety rules comprise rules for filtering at least one type of malicious information in characters, pictures, audios or videos.
2. The method of claim 1, further comprising:
and if the information contains malicious information, intercepting the information and sending warning information to the first terminal equipment.
3. The method of claim 2, further comprising:
if the malicious information contained in the information is fraud information, adding prompt information in the information and then sending the prompt information to the second terminal equipment; wherein the prompt message is used for reminding the user that the message contains fraud information.
4. An apparatus for processing malicious information, comprising:
the receiving module is used for receiving information sent by first terminal equipment of a sending end;
the processing module is used for carrying out security check on the information according to a pre-acquired security rule and determining whether the information contains malicious information, wherein the malicious information comprises at least one of malicious characters, pictures, audios or videos;
the sending module is used for sending the information to second terminal equipment of a receiving end if the information does not contain malicious information;
the sending module is also used for sending the information to a corresponding server for verification according to the type of the information;
the receiving module is also used for receiving a Uniform Resource Locator (URL) returned by the server; if the information is abnormal, the URL is empty, otherwise, the URL is the URL of the resource of the information;
the receiving module is also used for receiving a malicious information reporting message sent by the terminal equipment;
the processing module is further configured to update the security rule according to the malicious information reporting message, where the security rule includes a rule for filtering at least one type of malicious information in text, picture, audio, or video.
5. The apparatus of claim 4, wherein the processing module is further configured to intercept the information if the information contains malicious information;
the sending module is further configured to send warning information to the first terminal device.
6. The apparatus according to claim 5, wherein the processing module is further configured to, if malicious information contained in the information is fraud information, add prompt information to the information and send the prompt information to the second terminal device through the sending module; wherein the prompt message is used for reminding the user that the message contains fraud information.
7. A server, comprising: a receiver, a processor, a transmitter, a memory, and a computer program; the computer program is stored in the memory, and the processor executes the computer program to realize the malicious information processing method according to any one of claims 1 to 3.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program, and a server executes the computer program to implement the malicious information processing method according to any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810552950.3A CN108966234B (en) | 2018-05-31 | 2018-05-31 | Malicious information processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810552950.3A CN108966234B (en) | 2018-05-31 | 2018-05-31 | Malicious information processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108966234A CN108966234A (en) | 2018-12-07 |
CN108966234B true CN108966234B (en) | 2021-11-30 |
Family
ID=64492846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810552950.3A Active CN108966234B (en) | 2018-05-31 | 2018-05-31 | Malicious information processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108966234B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112398786B (en) * | 2019-08-15 | 2023-08-15 | 奇安信安全技术(珠海)有限公司 | Method and device for identifying penetration attack, system, storage medium and electronic device |
CN110705364B (en) * | 2019-09-06 | 2021-04-30 | 武汉美格科技股份有限公司 | Malicious advertisement eliminating method and system |
CN112565655A (en) * | 2020-11-27 | 2021-03-26 | Oppo广东移动通信有限公司 | Video data yellow identification method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079877A (en) * | 2006-07-27 | 2007-11-28 | 腾讯科技(深圳)有限公司 | Filtering method and filtering system for communication information in communication system |
CN102394838A (en) * | 2011-11-04 | 2012-03-28 | 宇龙计算机通信科技(深圳)有限公司 | IM (instant messaging) method, server and IM system |
CN104883293A (en) * | 2015-04-30 | 2015-09-02 | 广东欧珀移动通信有限公司 | Message interaction method, relevant apparatus and communication system |
CN106453216A (en) * | 2015-08-13 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Malicious website interception method, malicious website interception device and client |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101854335A (en) * | 2009-03-30 | 2010-10-06 | 华为技术有限公司 | Method, system and network device for filtration |
CN102402620A (en) * | 2011-12-26 | 2012-04-04 | 余姚市供电局 | Malicious webpage defense method and system |
CN102547794B (en) * | 2012-01-12 | 2015-05-06 | 郑州金惠计算机系统工程有限公司 | Identification and supervision platform for pornographic images and videos and inappropriate contents on wireless application protocol (WAP)-based mobile media |
CN104008331A (en) * | 2013-02-21 | 2014-08-27 | 腾讯科技(深圳)有限公司 | Access method, device and system of malicious web |
-
2018
- 2018-05-31 CN CN201810552950.3A patent/CN108966234B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079877A (en) * | 2006-07-27 | 2007-11-28 | 腾讯科技(深圳)有限公司 | Filtering method and filtering system for communication information in communication system |
CN102394838A (en) * | 2011-11-04 | 2012-03-28 | 宇龙计算机通信科技(深圳)有限公司 | IM (instant messaging) method, server and IM system |
CN104883293A (en) * | 2015-04-30 | 2015-09-02 | 广东欧珀移动通信有限公司 | Message interaction method, relevant apparatus and communication system |
CN106453216A (en) * | 2015-08-13 | 2017-02-22 | 阿里巴巴集团控股有限公司 | Malicious website interception method, malicious website interception device and client |
Also Published As
Publication number | Publication date |
---|---|
CN108966234A (en) | 2018-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10068090B2 (en) | Systems and methods for detecting undesirable network traffic content | |
US7925707B2 (en) | Declassifying of suspicious messages | |
US8397301B2 (en) | System and method for identifying and assessing vulnerabilities on a mobile communication device | |
US20040199597A1 (en) | Method and system for image verification to prevent messaging abuse | |
CN108966234B (en) | Malicious information processing method and device | |
US11070495B2 (en) | Systems and methods for a chatbot communication framework | |
EP1653693B1 (en) | File transmission method in instant messaging service | |
CN108280346B (en) | Application protection monitoring method, device and system | |
US20180089465A1 (en) | Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved | |
CN105165035B (en) | Have both the multimedia message transmission of text message transmission | |
CN110247897B (en) | System login method, device, gateway and computer readable storage medium | |
CN111355682A (en) | E-mail sending method and E-mail proxy server | |
CN112087475B (en) | Message pushing method and device for cloud platform component application and message server | |
CN108718274A (en) | A kind of anti-loss method of instant communication information | |
WO2024109270A1 (en) | Short message processing method and apparatus, device, and readable storage medium | |
CN103607324B (en) | Data processing method for Java message service, Java message client and server | |
EP3293924B1 (en) | Message processing method and device | |
CN111586344B (en) | Message sending method and device of network camera | |
CN113096298B (en) | Network voting method and device | |
CN114584827B (en) | Red packet processing method and device | |
CN104936155B (en) | A kind of processing method and processing device of SMS signature | |
CN114978737B (en) | Comprehensive management system for Doppler weather radar data | |
WO2022041923A1 (en) | Network slice connection method, terminal, and computer-readable storage medium | |
CN109474644B (en) | Security protection method, device, equipment, WAF and readable storage medium | |
CN115941198A (en) | Interface calling method and device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |