Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for monitoring junk short message

A technology of spam text messages and text messages, which is applied in wireless communication, electrical components, messages/mailboxes/notifications, etc., which can solve problems such as judgment errors and achieve the effect of improving accuracy

Active Publication Date: 2012-07-11
CHINA MOBILE GROUP JILIN BRANCH
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then the spam messages sent by the calling party number in the future will not be reviewed, resulting in an error in judging whether the calling party number is the source of spam messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for monitoring junk short message
  • Method and system for monitoring junk short message
  • Method and system for monitoring junk short message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] Embodiment 1 Use the gray list sending tree to add the gray list sending information, and the gray list expiration tree to add the valid time period of the gray list sending information, the calling party number tree to add a new calling party number, and the calling party number to expire the tree to add the The effective time period of the calling party number is described as an example. In the embodiment of the present invention, the monitoring condition of spam text messages involved is set to the top three text messages with the same content that are sent the most times.

[0089] Assume that the current greylist sending tree data structure is as follows Figure 2a As shown, a certain calling user number is 13800000000. After the number of short messages sent in the current monitoring period (assumed to be 9:00-10:00) reaches the storage threshold (assumed that the storage threshold is 100), and the subsequent sending SMS triggers the pre-set gray list rule (assumin...

Embodiment 2

[0094] Such as Figure 6 As shown, in the embodiment of the present invention, for a certain calling party number, a schematic diagram of the implementation process of the spam SMS monitoring method, including the following steps:

[0095] S601. During the current monitoring time period, monitor the number of short messages sent by the calling user number;

[0096] S602, judging whether the number of short messages sent by the calling party number reaches the preset storage threshold; if yes, execute step S603, if not, execute step S601;

[0097] S603. Buffering each short message subsequently sent by the calling party number within the current monitoring time period;

[0098] S604. Monitor the short messages subsequently sent by the calling party number within the current monitoring time period;

[0099] S605. Determine whether the short message sent by the calling party number within the current monitoring time period triggers a certain preset gray list rule, if yes, execu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for monitoring a junk short message, which are used for providing judging information of a sending source of a junk short message accurately and effectively for a business operation support system (BOSS). The method for monitoring the junk short message includes that in a current monitoring time range, when a calling party number sending short messages with quantity reaching a preset base-entering threshold is monitored to exist, following short messages sent by the calling party number are cached; when the following short messages sent by the calling party number in the current monitoring time range trigger a preset grey list rule, generated grey list information is sent to the BOSS. The grey list information comprises the calling party number and reason parameters determined according to the triggered grey list rule.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and system for monitoring spam short messages. Background technique [0002] With the increase of short message business of mobile phone users, the problem of spam text messages is becoming more and more serious, and the technology of anti-spam text messages is constantly updated and perfected. In the prior art, there are solutions to deal with spam text messages and suspected spam text messages by setting blacklists, whitelists, and gray lists. The spam monitoring system uses various setting strategies to analyze and judge whether the text messages in the current network are suspected spam messages. For suspected spam messages, the corresponding gray list information is generated and sent to BOSS (Business Operation Support System, business operation support system) in real time , which is used to determine the source of spam messages in the live network. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/14H04W24/00
Inventor 郑光华任辉明王笑然王洋翟杨
Owner CHINA MOBILE GROUP JILIN BRANCH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products