Short message service access control method and base station subsystem

A technology of service access and control method, applied in the field of communication, can solve the problem that basic voice services cannot be guaranteed, and achieve the effect of preventing wanton attacks by spam messages and ensuring normal operation.

Active Publication Date: 2011-09-21
ZTE CORP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the problem in the related art that basic voice services cannot be guaranteed in areas subject to wanton attacks by spam messages, the present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short message service access control method and base station subsystem
  • Short message service access control method and base station subsystem
  • Short message service access control method and base station subsystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0021] figure 2 It is the location diagram of BSS in the overall structure of the GSM system. Such as figure 2 As shown, the GSM system includes: BSS, mobile switching center (Mobile Switching Center, referred to as MSC) / visiting location register (Visiting Location Register, referred to as VLR), home location register (Home Location Register, referred to as HLR), authentication Authentication Center (AUC for short), Equipment Identity Register (EIR for short), Operation Maintenance Center (OMC for short), etc., wherein the BSS includes: Base Station Controller (Base Station Controller for short) BSC), base transceiver station (Base Tranceiver System, referred to as BTS). MSC / VLR is the core of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short message service access control method and a base station subsystem. The method comprises that: the base station subsystem receives channel requests from a terminal, and counts the channel requests for requesting short message service access in a preset time; and if determining a count is greater than a threshold value, the base station subsystem denies new channel requests for requesting the short message service access. By the technical scheme provided by the invention, the wanton attacks of short message spam can be effectively prevented, and the normal running of basic voice services is ensured.

Description

technical field [0001] The present invention relates to the field of communications, and in particular, to a method for controlling the access volume of short message services and a base station subsystem (Base Station Sub-system, BSS for short). Background technique [0002] Short message (short message) service is a basic service provided by telecom operators to end users. However, in recent years, it has been used by some lawbreakers. With the help of some SMS group sending technologies and equipment, a large number of advertisements or harassment or even fraudulent SMS are sent every day, which makes terminal (for example, mobile phone) users and telecom operators hate it. Therefore, interception platforms and control technologies for such short messages have emerged as the times require. At present, the main processing method of this type of control technology is as follows: by analyzing the content of the short message or the characteristics of the group sending numbe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/14H04W88/08
CPCH04L12/5695H04L47/803H04W4/14H04W72/0413H04W12/12H04L47/824H04L12/5895H04L51/38H04L63/1425H04W88/08H04L12/585H04W48/06H04L51/12H04L47/70H04W12/128H04W12/122H04L51/212H04L51/58H04W72/21
Inventor 周恩惠吕晓丽
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products