Spam interception method and device

A technology of spam information and information database, which is applied in security devices, telephone communication, wireless communication, etc., can solve the problem of inability to intercept, and achieve the effect of reducing burden, large capacity and improving processing efficiency.

Active Publication Date: 2018-10-12
北京鸿享技术服务有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the iPhone is a closed-source non-jailbroken mobile phone, the application program (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program that comes with the iOS system, so it cannot be directly controlled by the App like an open-source mobile phone. block spam

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Spam interception method and device
  • Spam interception method and device
  • Spam interception method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0069] As mentioned earlier, because the iPhone and other iOS-based terminals are closed source, the application (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program that comes with the iOS system, so it cannot Like open source mobile phones (such as mobile phones based on the andriod system), the security management App directly intercepts ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses the interception method and device of spam, which includes: to establish a MAP connection between the mobile terminal and the MAP device; after the mobile terminal receives the information, the information is sent through the MAP connection and sending the MAP connection.Give the MAP device; match the information in the preset information library to identify whether the information is a junk information; if so, the MAP device sends the request message to delete the information to the mobile terminal.Based on the characteristics of mobile terminals that run the iOS system to support the MAP protocol, the invention supports the MAP protocol. With the help of MAP devices to identify and feedback spam information, it achieves the purpose of intercepting spam and improving the user experience.

Description

Technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for intercepting spam information. Background technique [0002] The iOS system is a closed-source operating system. Limited by its development authority, applications running on the iOS system cannot access or control the system's own programs. For example, the currently popular iPhone is a closed cell phone system and does not open source code to users. [0003] When using mobile phones, users often receive spam messages, such as promotional text or MMS, fraudulent text messages, and illegal organization propaganda messages. For these spam messages, open source mobile phones can use special mobile phone guards and other security software to identify and identify spam messages. Intercept. However, because the iPhone is a closed-source, non-jailbroken mobile phone, applications downloaded from the App Store and running on the iPhone cannot access or contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04M1/725H04W4/12H04W12/12H04W12/128
CPCH04W4/12H04W12/12H04M1/72436H04M1/72412H04M1/725
Inventor 张福生于鲲鹏
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products