Method for managing blacklist user
A blacklist and user technology, applied in special data processing applications, subscriber special services, electronic digital data processing, etc., can solve the problems of poor timeliness and heavy workload of short message blacklist users, to ensure timeliness and reduce maintenance. cost effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] refer to figure 1 , the management module is a module with a blacklist user automatic management (IUAM) function. The management module can be an independent system process, or belong to other processes as a sub-function. The management module has an interface with the short message dispatch center and the short message blacklist user output system (for example: short message information security system). The management module regularly scans the short message illegal user information table provided by the short message blacklist user output system to obtain newly added blacklist user information; then through the interface with the short message center, send the blacklist user information to the short message center, The blacklist users are added locally by the SMS center.
[0028] The interface between the management module and the short message center can be implemented in many ways, which can be divided into two categories according to real-time performance:
[0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 