A method and apparatus for implementing sms spam filtering
A garbage and regular technology, applied in the direction of digital transmission system, message/mailbox/notification, data exchange network, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0112] example 1 : Default SRI_SMS ruleset
[0113] Separate rules executed in sequence
[0114] Network address consistency rule (SUSPECT (suspect))
[0115] Prohibited / Trusted Network Rules (SPAM / GOOD (SPAM / GOOD))
[0116] Volume Threshold Rules - Per Sent Network (SUSPECT)
[0117] Volume Threshold Rules - Across All Networks (SUSPECT)
[0118] Called Party Address Proximity Rule (SUSPECT)
[0119] If any of the above rules are violated, the message is marked as indicated above and no further rules are evaluated. If there is an application error in evaluating a rule, the error will be logged, but the rule will be ignored for spam filtering purposes. Execution continues in the above order for the next rule. If none of these rules are violated, the message is marked as GOOD. It should be noted that it is also possible to mark a message as GOOD when it comes from a trusted source.
example 2
[0120] Example 2 : Default FW_SMS_MT ruleset
[0121] Separate rules executed in sequence
[0122] Suspicious SRI_SMS rule (SUSPECT)
[0123] Attributed Subscriber Rules (GOOD)
[0124] Invalid Message Content Rules (SPAM)
[0125] Network Address Consistency Rules (SUSPECT)
[0126] Prohibited / Trusted Network Rules (SPAM / GOOD)
[0127] Prohibited / trusted sender (SME) rules (SPAM / GOOD)
[0128] Volume Threshold Rules - Per Sender (SME) (SPAM)
[0129] Volume Threshold Rules - Per Sent Network (SUSPECT)
[0130] Volume Threshold Rules - Across All Networks (SUSPECT)
[0131] Called Party Address Proximity Rule (SUSPECT)
[0132] Pattern Matching Rules (SUSPECT)
[0133] If any of the above rules are violated, the message is marked as indicated above and no further rules are evaluated. If there is an application error in evaluating a rule, the error will be logged, but the rule will be ignored for spam filtering purposes. Execution continues in the above order for the...
example 3
[0134] Example 3: Default FW_SMS_MO rule set
[0135] Separate rules executed in sequence
[0136] Attributed Subscriber Rules (SPAM)
[0137] Prohibited / Trusted Network Rules (SPAM / GOOD)
[0138] Prohibited / trusted sender (SME) rules (SPAM / GOOD)
[0139] Roaming Availability Rules (SPAM)
[0140] Invalid Message Content Rules (SPAM)
[0141] Volume Threshold Rules - Per Sender (SME) (SPAM)
[0142] Volume Threshold Rules - Per Sent Network (SUSPECT)
[0143] Volume Threshold Rules - Across All Networks (SUSPECT)
[0144] Destination SME Proximity Rule (SUSPECT)
[0145] Pattern Matching Rules (SUSPECT)
[0146] If any of the above rules are violated, the message is marked as indicated above and no further rules are evaluated. If there is an application error in evaluating a rule, the error will be logged, but the rule will be ignored for spam filtering purposes. Execution continues in the above order for the next rule. If none of these rules are violated, the messa...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com