A method and apparatus for implementing sms spam filtering

A garbage and regular technology, applied in the direction of digital transmission system, message/mailbox/notification, data exchange network, etc.

Inactive Publication Date: 2009-06-17
LUCENT TECH INC
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] However, none of the standard documents or existing patents disclose rule-based service logic for SMS anti-spam filtering mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for implementing sms spam filtering
  • A method and apparatus for implementing sms spam filtering
  • A method and apparatus for implementing sms spam filtering

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0112] example 1 : Default SRI_SMS ruleset

[0113] Separate rules executed in sequence

[0114] Network address consistency rule (SUSPECT (suspect))

[0115] Prohibited / Trusted Network Rules (SPAM / GOOD (SPAM / GOOD))

[0116] Volume Threshold Rules - Per Sent Network (SUSPECT)

[0117] Volume Threshold Rules - Across All Networks (SUSPECT)

[0118] Called Party Address Proximity Rule (SUSPECT)

[0119] If any of the above rules are violated, the message is marked as indicated above and no further rules are evaluated. If there is an application error in evaluating a rule, the error will be logged, but the rule will be ignored for spam filtering purposes. Execution continues in the above order for the next rule. If none of these rules are violated, the message is marked as GOOD. It should be noted that it is also possible to mark a message as GOOD when it comes from a trusted source.

example 2

[0120] Example 2 : Default FW_SMS_MT ruleset

[0121] Separate rules executed in sequence

[0122] Suspicious SRI_SMS rule (SUSPECT)

[0123] Attributed Subscriber Rules (GOOD)

[0124] Invalid Message Content Rules (SPAM)

[0125] Network Address Consistency Rules (SUSPECT)

[0126] Prohibited / Trusted Network Rules (SPAM / GOOD)

[0127] Prohibited / trusted sender (SME) rules (SPAM / GOOD)

[0128] Volume Threshold Rules - Per Sender (SME) (SPAM)

[0129] Volume Threshold Rules - Per Sent Network (SUSPECT)

[0130] Volume Threshold Rules - Across All Networks (SUSPECT)

[0131] Called Party Address Proximity Rule (SUSPECT)

[0132] Pattern Matching Rules (SUSPECT)

[0133] If any of the above rules are violated, the message is marked as indicated above and no further rules are evaluated. If there is an application error in evaluating a rule, the error will be logged, but the rule will be ignored for spam filtering purposes. Execution continues in the above order for the...

example 3

[0134] Example 3: Default FW_SMS_MO rule set

[0135] Separate rules executed in sequence

[0136] Attributed Subscriber Rules (SPAM)

[0137] Prohibited / Trusted Network Rules (SPAM / GOOD)

[0138] Prohibited / trusted sender (SME) rules (SPAM / GOOD)

[0139] Roaming Availability Rules (SPAM)

[0140] Invalid Message Content Rules (SPAM)

[0141] Volume Threshold Rules - Per Sender (SME) (SPAM)

[0142] Volume Threshold Rules - Per Sent Network (SUSPECT)

[0143] Volume Threshold Rules - Across All Networks (SUSPECT)

[0144] Destination SME Proximity Rule (SUSPECT)

[0145] Pattern Matching Rules (SUSPECT)

[0146] If any of the above rules are violated, the message is marked as indicated above and no further rules are evaluated. If there is an application error in evaluating a rule, the error will be logged, but the rule will be ignored for spam filtering purposes. Execution continues in the above order for the next rule. If none of these rules are violated, the messa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and apparatus for implementing short message service (SMS) SPAM filtering is provided. The embodiments described herein integrate policy management into spam message filtering rules to enhance an SMS anti-spam mechanism.

Description

Background of the invention [0001] The present invention relates to a method and apparatus for implementing short message service (SMS) spam (SPAM) filtering. Embodiments described herein integrate policy management into spam filtering rules in order to enhance SMS anti-spam mechanisms. [0002] While the present invention is, and will therefore be described with particular reference to, the field of SMS spam filtering, it will be appreciated that the invention may find use in other fields and applications as well. For example, the teachings of the presently described embodiments can be applied to other types of spam filtering. [0003] By way of background, with the increasing use of the Internet, it is relatively easy for senders to send messages to a large number of destinations at little or no cost. The same is true for messages sent via Short Message Service (SMS) in wireless network systems. In many cases, when the sender is a third-party solicitor or marketer, these ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/58
CPCH04L51/38H04L12/5895H04L12/5855H04L12/585H04L51/12H04L51/214H04L51/212H04L51/58H04W48/02H04W4/12
Inventor Y·蔡D·L·麦格里尔C·梅利恩
Owner LUCENT TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products