CN101180629B - For managing equipment and the method for content exchange on the wireless device - Google Patents

For managing equipment and the method for content exchange on the wireless device Download PDF

Info

Publication number
CN101180629B
CN101180629B CN200680017221.3A CN200680017221A CN101180629B CN 101180629 B CN101180629 B CN 101180629B CN 200680017221 A CN200680017221 A CN 200680017221A CN 101180629 B CN101180629 B CN 101180629B
Authority
CN
China
Prior art keywords
content
wireless device
filter
spam
predetermined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200680017221.3A
Other languages
Chinese (zh)
Other versions
CN101180629A (en
Inventor
肯尼·福克
蒂亚·曼宁·卡塞特
黄智玄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Inc
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/369,377 external-priority patent/US9288078B2/en
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Priority to CN201510309637.3A priority Critical patent/CN105187290B/en
Publication of CN101180629A publication Critical patent/CN101180629A/en
Application granted granted Critical
Publication of CN101180629B publication Critical patent/CN101180629B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

Equipment, method, computer-readable media and the processor that can operate on the wireless device can provide a kind of anti-spam engine, described engine is operable to be intended to for the content of client application and/or the content that produced by client application to intercept, and filters out undesirable content. Described anti-spam engine can comprise configurable module, and described module has and can determine that the whether undesirable Spam Filter of content. Based on making described content stand the result that described Spam Filter processes, described content can be transmitted to described set client application and/or network destination by described anti-spam engine, and/or can produce spam log. Described anti-spam module can be further operable so that described spam log is transmitted to another device, for instance User Manager device, and described device is operable is available for the report that operator checks analyzing described daily record generation.

Description

For managing equipment and the method for content exchange on the wireless device
According to 35U.S.C. �� 119 CLAIM OF PRIORITY
Present application for patent advocate on March 25th, 2005 application be entitled as " MethodsandApparatusforPreventingUnauthorizedDownloadstoa WirelessDevice " the 60/665th, the priority of No. 305 provisional application cases, described application case transfers assignee of the present invention and is clearly incorporated herein with way of reference.
Technical field
Described embodiment relates generally to radio communication device and computer network, and more precisely, relates to detect equipment and the method for the unauthorized content on wireless device.
Background technology
One or more wireless devices are connected to other computer installation without directly electrical connector such as such as copper cash or optical cable etc. by Wireless Networking. Wireless device generally transmits data with packet form by wireless or part radio computer network, and opens " data " or " communication " channel on the network so that device can send and receive packet. Wireless device is generally of wireless device resources (such as program and nextport hardware component NextPort), described resource individually and be collaboratively operated with according to its design and concrete agreement or configuration use and produce data, for instance use open communication connect come on network launch and receive data.
Wireless device is just being fabricated as the computing capability with increase, and just become to be equal to personal computer, and comprise such as internet browsing, Transit time flow meter (" IM "), Email and text message transmission and (comprise short message service and many
Media information business transferring (" SMS/MMS ")) etc. feature. Because this category feature is conducive to directly contacting with wireless device, so these messaging client have become as without permission, the target of unsolicited and undesirable message and/or virus (referred to herein as " junk information ") in most instances.
Junk information sends to be defined as roughly and uses any electronic communication media to come the uncalled message of Batch sending and/or virus, and according to definition, it occurs when permitting without recipient. Send rather than the marketing of any specific aim although its usage is normally limited to indiscriminate bulk mail, but term " junk information " may refer to any be considered unnecessary and undesirable business directed, uncalled bulk mail sends. Although the most common form of junk information is by email delivery, but spammer has been developed over various junk information transmission technology, and it is different according to media: e-mail spam information, Transit time flow meter junk information, newsgroup's junk information, network search engines junk information, network log junk information and mobile phone message transmission junk information.
Junk information by means of Email relates to send the junk information of the type of identical (or almost identical) message to thousands of (or millions of) recipient. Spammer is generally posted from newsgroup and/or the address of collecting web page expection recipient, obtains address from data base, or simply by using common name and domain name conjecture address.
The Transit time flow meter such as Messenger, AIM, MSNMessenger and ICQ (" IM ") system is the frequent goal of spammer. Many IM systems can provide User Catalog, wherein comprises the such as demographic information such as age and sex. This information can be collected by advertiser, information is registered in systems, and sends uncalled message.
The mobile phone junk information of some form is included in the junk information that mobile phone text messaging service place guides, and it is likely to make user detest especially, reason is not only in that its inconvenience caused, but also because user is likely to be necessary for reception unsolicited and the paying of usual undesirable text message. Mobile phone junk information is likely to and comprises any kind of content that can be received by mobile phone, for instance audio content, video content, software program etc. and combination thereof.
Some message analysis that carry out are to protect network to comprise fingerprint verification and rule-based scoring from the method that junk information is attacked. Technique of fingerprint indentification obtains " digital picture " of each message and it is mated with known spam messages profile, to detect undesirable Email and to be marked as junk information. Rule-based scoring relates to the data base of comparison junk information rule and marks for message, and the specific characteristic based on junk information and legitimate email distributes mark to message. When the mark of message exceedes the threshold value defined in advance, it is marked as junk information.
The anti-spam filter method major part of wireless user device rank completes already by being incorporated to anti-spam module in each messaging client application program. But, if anti-spam code is incorporated in each client application (such as, Email, MMS, SMS and IM) in, then can slattern a large amount of valuable hand-held device storage device/memorizer when performing substantially identical function (namely anti-spam filters).
In addition, if the functional of anti-spam module is confined to after wireless device receives junk information just it is filtered, then filter and cannot solve because of the problem of the network blockage caused through a large amount of junk information of network, and this problem is the same with junk information problem serious even more serious. When exist millions of for the spam content example of the wireless device of a large amount of equally and increasing number of client application with some consumption contents, the network for specific bandwidth (plus a little extra bandwidth) the accurately custom-made by size of legitimate correspondence amount is likely in the urgent need to maintaining design object service quality.
Therefore it provides such a equipment and method will be advantageous for: it provides single ubiquitous anti-spam module, described module can be configured before receiving content at any client application, all the elements of entry into wireless device to be monitored. Further it is provided that it is a kind of operable so that the equipment that the garbage information filtering effect on wireless device is analyzed as target of further junk information attack will be stopped and method also will be advantageous for.
Summary of the invention
Described embodiment includes such equipment, method, computer-readable media and processor: it can operate to provide single ubiquitous anti-spam testing mechanism on the wireless device, described mechanism can filter out and be in data stream that is that receive from wireless network and that be intended for resident client application on the wireless device and/or be in the undesirable content producing on the wireless device and being intended to be transferred in the data stream of remote-control device on a wireless network, such as without permission and/or uncalled content and/or virus, i.e. junk information.
Additionally, this kind of equipment and method can comprise the information about the undesirable content detected is transmitted to User Manager and/or operator for further analysis with produce report. Additionally, undesirable content can be notified to Virtual network operator, in order to stop the following propagation to undesirable content in the entire network.
In some respects, a kind of method of content for filtering on wireless device includes intercepting described content before the content on wireless device is delivered to content destination. Described method farther includes Cempetency-based education device and analyzes described content, to determine whether described content includes undesirable content, wherein said content filter is based on following at least one and selects from multiple content filters: predetermined characteristic that the hardware characteristics that the Internet Service Provider being associated with wireless device is associated with wireless device is associated with content destination and the hardware requirement being associated with content. Additionally, described method includes based on content being transmitted to content destination by the analysis of content or isolating described content. In other side, at least one processor can perform above-mentioned functions. In other, machine-readable medium can include the instruction causing machine to perform aforesaid operations when executed by a machine.
In some other, wireless device includes the device for intercepting described content before the content on wireless device is delivered to content destination. Wireless device farther includes to analyze described content to determine the device of classifying content for Cempetency-based education device, and wherein said content filter is based on following at least one and selects from multiple content filters: predetermined characteristic that the hardware characteristics that the Internet Service Provider being associated with wireless device is associated with wireless device is associated with content destination and the hardware requirement being associated with content. Additionally, described wireless device includes for content-based classification, content being transmitted to content destination or isolating the device of described content.
In other side, a kind of wireless device includes anti-spam engine, described engine is operable to intercept described content before the content on wireless device is delivered to content destination, described anti-spam engine includes content filter, and described content filter is based on following at least one and selects from multiple content filters: predetermined characteristic that the hardware characteristics that the Internet Service Provider being associated with wireless device is associated with wireless device is associated with content destination and the hardware requirement being associated with content. In addition, described wireless device includes controlling logic, described control logical AND anti-spam engine is associated and operable with to content application content filter and determine whether described content includes undesirable content, wherein said control logic is further operable so that content to be transmitted to content destination when described content does not include undesirable content, and content is isolated when described content includes undesirable content.
In other side, a kind of method of filtration for managing the content on wireless device includes: provide predetermined content filter and Report Parameters to wireless device; And receive based on described Report Parameters and be positioned on described wireless device and stand the spam log that the content of described predetermined content filter process is relevant. Additionally, described method includes producing report based on spam log. In other side, at least one processor can perform above-mentioned behavior. In other side, machine-readable medium can include the instruction causing machine to perform aforesaid operations when executed by a machine.
In other side, the equipment of a kind of filtration for managing the content on wireless device includes: for providing the device of predetermined content filter and Report Parameters to wireless device; And for receiving with that received by described wireless device and stand the device of the relevant spam log of content of described content filter process based on described Report Parameters. Additionally, described equipment includes the device for producing report based on spam log.
In other, the equipment of a kind of filtration for managing the content on wireless device includes generator block, and described module is operable to produce to include the content filter configuration of at least one predetermined content filter and Report Parameters. In addition, described equipment includes anti-spam module, it is operable so that content filter configuration to be transmitted to wireless device, and operable to receive and spam log that is that received by described wireless device and that stand the relevant content of Spam Filter process based on described Report Parameters. Additionally, described equipment includes operable to produce the report generator of report based on spam log.
Accompanying drawing explanation
Below in conjunction with accompanying drawing, disclosed embodiment is described, it is provided that described accompanying drawing with illustrative and not limiting disclosed embodiment, wherein identical label instruction similar elements, and wherein:
Fig. 1 is the schematic diagram of an aspect for the system preventing predetermined content from being received by the client application on wireless device and/or to send;
Fig. 2 is the schematic diagram of an aspect of the wireless device according to Fig. 1;
Fig. 3 is the schematic diagram of an aspect of the resident anti-spam engine in memory of the wireless device according to Fig. 2;
Fig. 4 is the schematic diagram of an aspect of the User Manager of the system according to Fig. 1;
Fig. 5 is the schematic diagram of an aspect of the configuration generator block of the User Manager according to Fig. 4;
Fig. 6 is the schematic diagram of an aspect of the device control module of the User Manager according to Fig. 4;
Fig. 7 is the schematic diagram of an aspect of operator's work station of the system according to Fig. 1;
Fig. 8 is the schematic diagram of an aspect of the cellular telephone network according to Fig. 1;
Fig. 9 is the flow chart for preventing from carrying out the method for unauthorized download to wireless device of the system according to Fig. 1;
Figure 10 is another flow chart for preventing from carrying out the method for unauthorized download to wireless device of the system according to Fig. 1;
Figure 11 is the Event Sequence Diagram that can operate in some embodiments of the system of Fig. 1; And
Figure 12 is another Event Sequence Diagram that can operate in some embodiments of the system according to Fig. 1.
Detailed description of the invention
Referring to Fig. 1, system 100 for detecting the undesirable content (comprise and prevent from receiving and/or transmitting this kind of content) on wireless device can include wireless device 102, and described wireless device 102 is operable to receive content filter configuration 170 from User Manager 110. In undesirable, perhaps junk information can comprise without permission or uncalled content and/or virus. The parameter for following operation is defined in content filter configuration 170: use filter module 180 to filter content; Spam log 184 records the details being associated with filtered content; And daily record 184 is transmitted to User Manager 110 or another device for analysis.
For example, operator's work station 114 can be configured to receive the junk information being associated with User Manager 110 report 205 produced by report generator 204, and can be configured to further junk information obstruction instruction 116 in future is sent to message center 118. Communication between wireless device 102, User Manager 110, operator's work station 114 and message center 118 can realize via network 101.
Content filter configuration 170 and corresponding filter module 180 can comprise one or more in order to transmitting to and or from the content filter that content is applied. The content filter utilized by wireless device 102 can be selected from multiple content filters based on (such as) following at least one: predetermined characteristic that the hardware characteristics that the Internet Service Provider being associated with wireless device is associated with wireless device is associated with content destination and the hardware requirement being associated with content.
For example, wireless device 102 can operate in the Local wireless network provided by Internet Service Provider, but described device can roam into another wireless network being in another Internet Service Provider controls from local network. Owing to junk information may affect the performance of given wireless network, thus each wireless service provider can define and provide the customized content filter that will be used by any wireless device of operation on its wireless network.
In another example, described content filter can change according to the hardware characteristics of given wireless device. For example, as the hardware characteristics such as processor type/ability, speaker types/ability, ringer type/ability, type of display/ability and type of memory/ability may have influence on whether given wireless device can effectively process given content. For example, may call for by the sound of the given ringer generation being associated with given wireless device, and therefore for described setter, described given content can not to be considered as junk information including the given content of given the tinkle of bells. Therefore, the given content that the hardware characteristics of a wireless device is adversely affected can be classified as junk information for described device, and be likely to for another wireless device with different hardware feature, same content is classified as non-spam.
Similarly, content filter can change according to the predetermined characteristic being associated with content destination. For example, when the incoming content received by wireless device, the predetermined characteristic being associated with content destination can include the mark of (such as) resident destination's client application on the wireless device. In other words, define or classify as junk information content can according to described content whether with browser not text message transmission client change for destination. When spreading out of content and being intended to launch from wireless device, the predetermined characteristic being associated with content destination can include the number of the content destination that (such as) is associated with content. In other words, the duplicate exceeding predetermined number sending same content can be defined as junk information to send.
Similarly, content filter can change according to the hardware requirement being associated with content. For example, hardware requirement can include (such as) following at least one: wireless device processor type/capability/capacity use, audio-frequency assembly type/ability/use, video component type/ability/use and wireless device memory type/ability/use. In other words, for example, junk information can be defined as the capacity exceeding scheduled volume requiring to use in the total capacity of given wireless device hardware resource. Owing to using excessive capacity, the overall performance of wireless device may be adversely affected by given content, and/or may affect the performance of other application program performed on the wireless device.
Wireless device 102 can comprise any kind of computerized device, for instance cellular phone, personal digital assistant, two-way text pager, portable computer or even have wireless communication port and also can have the independent computer platform of the wired connection to network or the Internet. Wireless device can be remote-slave or not have end user and transmit other device of data simply by wireless network 101, for instance distance sensor, diagnostic tool and data link.
Wireless device 102 comprises anti-spam engine modules 138, and described module monitors transmits to and or from content and filters out undesirable, uncalled and/or unwarranted content and/or virus, and described content and/or virus are referred to as junk information. Anti-spam module 138 can be loaded in the memorizer 136 of wireless device 102 by some modes, described mode including but not limited to: install in factory 106 place's static state; By being wirelessly transferred on wireless network (such as network 101); And connected by hardwired, for instance via personal computer (PC). Wireless device 102 can be delivered to Virtual network operator and/or other certain retailer to sell and to be delivered to user and to activate on network.
Once wireless device 102 is activated by operator, just can operate on wireless device 102 for the application client and wireless device component/port/interface sending and receiving content. For example, application client can including but not limited to client and browsers such as such as Transit time flow meter (" IM "), Email and messaging client (such as short message service (SMS) client and multimedia messaging services (MMS) client). Wireless device component/port/interface can comprise any point of content entry into wireless device and/or content leaves any point of wireless device, as hereinafter will be discussed in greater detail. By with these client applications and component/port/interface for target, the advertiser of uncalled communication and other junk information generator 122 then can obtain the address information accessing and obtaining wireless device 102 to network 101. Once possess this type of information (such as telephone number and/or Internet Protocol (IP) address), junk information generator 122 just can start to send junk information 124 via message center 118 and wireless link 120 to wireless device 102. Junk information 124 can be any user without wireless device 102 and/or the content of the operator being associated with network 101 and/or Internet Service Provider's request, needs and/or mandate. Additionally, the junk information that client application intentionally or accidentally produces may be transferred to network, and then network availability is made to demote.
Anti-spam engine modules 138 is operable to intercept all incoming contents and/or all to spread out of content, and filter out based on configurable parameter and to be confirmed as without permission and/or unsolicited and/or undesirable content and/or virus, this will be discussed in detail herein.
In one aspect, the junk information detected can be isolated in off-limit file folder by anti-spam engine 138, and can produce the spam log with the junk information details detected. Additionally, on the other hand, spam log can be transferred to User Manager 110 by wireless link 108 based on configurable Report Parameters by anti-spam engine 138.
User Manager 110 can receive daily record, and analytical data also produces report. For example, described report can be sent to operator's work station 114 with E-mail form by communication channel 126 by User Manager 110, or otherwise makes the content of report be available for operator to check.
Operator can analyze described report, and order 112 can be issued based on described analysis to User Manager 110, wherein there is to update the instruction of anti-spam engine 138 (such as, in order to update the filtering characteristic of engine to detect the junk information of new model). Additionally, instruction 116 can be transferred to message center 118 to stop the junk information generator 122 further access to network 101 by operator's work station 114.
Referring to Fig. 2, wireless device 102 can include and the computer platforms 130 of input mechanism 132 and output mechanism 134 interconnection, and described input mechanism 132 and output mechanism 134 are respectively provide for input and the output of the interapplication communications with resident. For example, input mechanism 132 can including but not limited to mechanism such as such as button or keyboard, mouse, touch-screen display and sound identification modules. Output mechanism 134 can including but not limited to display, audio tweeter and tactile feedback mechanism.
Computer platform 130 can further include communication module 152, described communication module is implemented with hardware, software, firmware, executable instruction data and combination thereof, it is operable to receive/to launch and additionally aspect enables the communication between the assembly in wireless device 102, and enabling the communication between wireless device 102 and other device, other device described is such as device connected in series and the device connected via air interface (such as network 101). Communication module 152 is from one or more client applications 140 and/or from the input mechanism 132 wireless device 102 and/or from another device reception content 160 communicated with wireless device 102, and cooperates with anti-spam engine 138 with analysing content 160 before allowing to launch content from wireless device and/or received content by wireless device.
As it has been described above, communication module 152 can include any any point comprising content entry into wireless device and/or content leaves the component/port/interface of any point of wireless device. Thus, communication module 152 can comprise for hard-wired communications with for the interface module of radio communication. For example, communication module 152 can including but not limited to the interface module of such as the following: serial port, USB (universal serial bus) (USB), parallel port and the air-interface components for wireless protocols/standard, described protocol/standard is such as Wi-Fi, World Interoperability for Microwave Access, WiMax technology (WiMAX), infrared protocol (such as Infrared Data Association (IrDA)), short range wireless protocol/technology, bluetoothTechnology, ZigBeeAgreement, ultra broadband (UWB) agreement, local radio frequency (HomeRF), share Wireless Access Protocol (SWAP), broadband technology (such as wireless ethernet compatibility alliance (WECA)), Wireless Fidelity alliance (Wi-Fi Alliance), 802.11 network technology, PSTN, public heterogeneous communications network (such as the Internet), private cordless communication network, Land Mobile Radio Network, CDMA (CDMA), WCDMA (WCDMA), Universal Mobile Telecommunications System (UMTS), Advanced Mobile Phone Service (AMPS), time division multiple acess (TDMA), frequency division multiple access (FDMA), OFDM (OFDMA), global system for mobile communications (GSM), single carrier (1X) Radio Transmission Technology (RTT), Evolution Data special (EV-DO) technology, general packet radio service (GPRS), enhanced data gsm environment (EDGE), high rate downlink data bag access (HSPDA), the technique/protocol of analog-and digital-satellite system and other any at least one that can be used in cordless communication network and data communication network.
Computer platform 130 also can comprise memorizer 136, described memorizer can include volatibility and nonvolatile memory, for instance any memorizer that read-only and/or random access memory (RAM and ROM), EPROM, EEPROM, flash card or computer platform are commonly used. Additionally, memorizer 136 can comprise one or more flash memory cells, or any two grades or tertiary storage device can be included, for instance magnetic medium, optical media, tape or floppy disk or hard disk.
Memorizer 136 is operable to store one or more client applications 140, and it is including but not limited to web browser client; IM client; Messaging client, for instance SMS text transmission client and/or MMS Multimedia Messaging Client end; And email client.
In addition, anti-spam engine 138 is storable in memorizer 136, and it is operable to intercept the content 160 received by communication module 152, described content 160 directly will be transmitted to each content destination from communication module 152 when not having anti-spam engine 138, for instance the client application of resident and/or be positioned at the remote-control device on wireless network. When in position place possesses anti-spam engine 138, the content being confirmed as junk information can be stopped, legal content can be transmitted to each content destination simultaneously. It should be noted that, anti-spam engine 138 can be configured all the elements 160 received by communication module 152 are filtered, or only the chosen content from selectivity source/interface is filtered, for instance a filter needle is to the content of one or more intended client end application programs 140 and/or only filters the content received at predetermined port places such as such as USB.
Additionally, computer platform 130 can comprise process engine 148, described engine can be special IC (" ASIC ") or other chipset, processor, logic circuit or other data processing equipment. Processing engine 148 operable to perform application programming interface (" API ") layer 146, described layer can interface with the program (such as anti-spam engine 138 and client application 140) of any institute resident.
In one non-limiting, API146 is the runtime environment performed on each wireless device. One this kind of runtime environment is by the BREW of Qualcomm, Inc., ofSanDiego, California exploitation(BREW) software. The runtime environment that other (such as) operation performs can be utilized with the application program controlling on wireless computing device.
Referring still to Fig. 2, processing engine 148 and can comprise one or one group of processing subsystem 150, it provides functional to wireless device 102. In cellular phone example, processing subsystem 150 can comprise the subsystem of such as the following: sound, nonvolatile memory, file system, transmitting, reception, searcher, layer 1, layer 2, layer 3, main control, teleprogram, hand-held set, power management, diagnosis, digital signal processor, vocoder, message transmission, call manager, bluetoothSystem, bluetoothLPOS, position are determined, location engine, user interface, dormancy, data service, safety, certification, USIM/SIM, speech business, figure, multimedia, the GPRS etc. such as USB, such as MPEG.
Processing subsystem 150 can including (but not limited to) the interactive subsystem components of application program that is any and that perform on computer platform 130. For example, processing subsystem 150 can comprise any anti-spam engine 138 representing resident and other any resident client application 140 in memory and receive digital independent and the subsystem components of data write from API146.
Referring to Fig. 3, anti-spam engine 138 can monitor and analyze and produced by any client application 140 and/or specify the content received by any client application 140. Anti-spam engine 138 can be any one in hardware, software, firmware, executable instruction and data or its combination.
Anti-spam engine 138 can include the control logic 162 of anti-spam engine identification (ID) the 139 and operable all functions and assembly to manage anti-spam engine 138 identifying anti-spam engine. For example, what anti-spam Engine ID 139 can comprise in title, version etc. is one or more. Additionally, anti-spam engine 138 can comprise content filter configuration file 170, described file defines the content filter 182 to apply to incoming content. For example, content filter 182 can be included in the filter mechanism in content filter configuration file 170, can be the reference of the filter mechanism to remotely storage, or the mark of the filter mechanism in the filter module 180 that can be stored in residing on wireless device 102. In addition, control logic 162 operable to apply given content filter 182 to content 160 in conjunction with static controller/reporter module 168, and by content recognition or classify as junk information or non-spam, and collect the information being associated with filtration and sort operation further. In addition, filtered content can be stored in off-limit file folder 164 by anti-spam engine 138, and can store at least some part of filtered content and/or extra content correlated information in the spam log 184 of the activity for reporting anti-spam engine 138. Additionally, anti-spam engine 138 can comprise auxiliary user (local user of such as wireless device 102 or the remotely located user communicated with wireless device 102) operates the user interface (" UI ") 166 of anti-spam engine 138.
For example, UI166 can be operated to configure at least some of ability of anti-spam engine 138 by end user in conjunction with input mechanism 132, wherein comprises the junk information that information filtering, report, isolation and disposal detect.
Except can being configured by user, content filter configuration file 170 can download to memorizer 136 via being wirelessly transferred on wireless network 101, installed by OEM106 (Fig. 1) is static during fabrication, and download to personal computer (PC) via hardwired connection. For example, content filter configuration file 170 can be arranged by the operator being associated with Internet Service Provider, and is transferred to wireless device 102 via user manager server 110.
Content filter configuration file 170 can comprise any combination of a group or more parameter, and described parameter specifies the garbage information filtering performed by wireless device 102, record and reporting activity. For example, content filter configuration file 170 can comprise one group by no matter, how the destination of content is applied to the parameter of all the elements. Or, content filter configuration file 170 can comprise one group of specific parameter of destination, and it can receive one or more content destinatioies the resident client application 140 (Fig. 2) of content and/or wireless network 101 corresponding to one or more from network 101.
Thus, in some respects, it is one or more that content filter configuration file 170 can comprise in following parameter: content destination 172, it identifies the network equipment on the client application 140 corresponding to given group of parameter and/or wireless network 101, in order to specifying the content application given group parameter for corresponding contents destination; Content filter 182, it identifies the content filter being applied to corresponding contents; Predetermined filter test result 174, it is associated with given content filter and/or content destination, wherein predetermined filter test result 174 is and passes through to transmitting to and or from the limit that filter test result produced by content application content filter 182 compares, and wherein predetermined filter test result 174 defines junk information and non-spam content; Storage limiting parameter 176, it is associated with segregate spam content, for instance storage limiting parameter 176 may indicate that the natural law keeping being isolated content before being automatically deleted content, and/or may indicate that for storing the maximum storage being isolated content; Report Parameters 178, it defines corresponding to what information is any junk information detected to record, and when forwards daily record for analyzing, forwarding daily record to whom and/or allow whose access log; And configuration identifier (ID) 171 (one or more in such as title, version etc.), it identifies the given group of parameter being associated with given configuration.
Can operating anti-spam engine 138 based at least one in some junk information testing mechanisms, described mechanism is referred to herein as content filter 182. In certain aspects, content filter 182 includes the software mechanism for content 160 classifies as junk information or non-spam. In certain aspects, content 160 can be passed through content filter 182 and run to produce filter test result 188, and described result is based on what one group of pre-defined rule (that is, filter mechanism) calculated.
Exist many for by technology that content classification is junk information or non-spam. These technology are represented by content filter 182, and including but not limited to: Host Based filtration; Rule-based filtration; Bayes (Bayesian) statistical analysis; Noise filter; And sender policy framework (" SPF ") or transmitting side marking (ID) filter. For example, Host Based filter and the rule-based filter scope of examination are to find " junk information mark ", for instance common junk information theme, known junk information send address, known email relaying machine or be simply common junk information phrase. In one aspect, for instance when content includes message, can check that title and/or the main body of described message indicate to find these. Other method is to be junk information by all content classifications from unknown address.
The content that other people are had been received by by bayesian filtering compares to find common spam content, and realizes this operation by a large amount of junk information and a large amount of non-spam are marked. Bayesian filtering theory behind is, specific markers will be common in spam content, and will be uncommon in non-spam content, and other specific markers will be common in non-spam content, and will be uncommon in spam content. When content is classified, it is marked to check that described labelling is the labelling more like spam content or the labelling more like non-spam content.
Noise filter is a kind of form of bayes filter, and it is aimed at the junk information containing the many random word being rarely employed in marketing. Spammer is wished by reducing distribution language and hindering bayes filter by making junk information appear to individual's mail as far as possible. Bayes's noise reduction filter adopts three key steps. First step is model learning, wherein sets up model and is learnt its layout by filter. Second step can use learn to model and layout is not met text model belonging to it labelling perform " duplications " or elimination. 3rd step can from sampling until stop mark and perform to eliminate to data simultaneously. Once reach to stop mark, the length simultaneously eliminated can be performed specific checking to determine whether and elimination should be made to become permanent.
Sender policy framework (" SPF ") or transmitting side marking (ID) filter are forged for return path address and are protected, and make to be easier to identify deceptive practices. The server that SPF sends mail by making the domain name owner identify in name server (" DNS ") operates. Information like this is checked envelope sender address by SMTP recipient, and can distinguish true content and falsified content before transmitting any content-data.
In addition, because mass file is likely to adversely affect to wireless device 102 (such as by using memorizer or disposal ability) or to network 101 (such as by using bandwidth), so can be junk information by content recognition based on being transferred to wireless device 102 or the size of content transmitted out from wireless device 102.
Any one or its any combination in strobe utility disclosed herein is incorporated in filter module 180 to detect undesirable content. In addition, any filter 182 in filter module 180 can be associated with certain content destination 172, and then makes anti-spam engine 138 certain filter in filter module 180 can be selected to apply for certain content 160 based on set destination.
For example, control logic 162 operable to analyze parameter from content filter configuration file 170, and operable to monitor and analyze that received by wireless device 102 and/or produce all the elements 160 for transmission from wireless device 102 in conjunction with statistics collection device/reporter 168 (it can comprise the combination in any of hardware, software, firmware, data and executable instruction). Process in further embodiments it is possible to only intercept the content 160 with given content destination 172 for anti-spam engine 138. Additionally, in certain embodiments, same content filter 182 can be applicable to all the elements 160.
In other embodiments, different Spam Filter 182 can be applied to different content 160: predetermined characteristic that the hardware characteristics that the Internet Service Provider being associated with wireless device is associated is associated with content destination and the hardware requirement being associated with content with wireless device, as being discussed in detail above based on (such as) following at least one.
How what no matter be monitored content carrys out source and destination, anti-spam engine 138 all applies specific content filter 182 to each content 160, produce the filter test result 188 calculated, result 188 is compared with corresponding predetermined filter test result 174, and given content 160 is classified as spam content 163 or authorized content. If classifying as spam content 163, then anti-spam engine 138 then can store content in off-limit file folder 164 and/or can be automatically deleted described content according to storage restriction 176. If not classifying as junk information, then anti-spam engine 138 is initial is delivered to given content destination 172 by content 160.
Additionally, for spam content 163, statistics collection device/reporter 168 is operable to be defined by user to collect based on Report Parameters 178 and to preserve and/or is configured the information defined by content filter. For example, statistics collection device/reporter 168 is recordable: device/configuration information 141, for instance anti-spam Engine ID 139 and/or content filter configure the one in 171 or its combination, for instance to identify how to filter content 160; And wireless device information (such as hardware and software information), such as identify the information of the state etc. of mounted cast, the hardware of resident, the software of resident, selected hardware and/or component software, and generally any can be used for as wireless device 102 trouble-shooting or the information determining its diagnostic state; Whole or the selected part 173 of given content 160 and/or the information being associated with described content, it is including but not limited to the filter test result 188 calculated; Content destination 172; And source-information 186, it identifies the promoter of content and including (for example) the URL of junk information generator 122, telephone number, MAC Address, e-mail address, and the mark of the client application 140 just carrying out producing on wireless device. Can being saved in memorizer 136 as the part of spam log 184 using the information collected/calculate, wherein the size of spam log 184 is configurable equally in one aspect.
Additionally, for classifying as spam content 163 and being stored in the content 160 in independent off-limit file folder 188, anti-spam engine 138 can warn the user of wireless device 102 to there is described content, in order to promotes it to check these contents. Additionally, the traceable memory space used of anti-spam engine 138 and/or storage time, and it is automatically deleted spam content 163 based on storage limiting parameter 176. By checking and/or the behavior record of spam content 163 can be deleted in the spam log 184 specified by Report Parameters 178.
By using UI166, user can access all configurable parameters, and additionally be able to be masked as certain content unwarranted (namely, place the content in off-limit file folder 188), press from both sides from off-limit file and 188, retrieve the content being previously identified as unauthorized content 163, and control to record which junk information element and when upload daily record 184. For example, user can after checking unwarranted content 163 update content filter 182, and provide input that given content recognition is authorized content. For example, the source 186 of given content can be identified as non-spam sender and/or authorized content sources by user, and can update content filter 182 accordingly.
Statistics collection device/reporter 168 can be configured by Report Parameters 178, in order to optionally by wireless network 101, journal file 184 is transferred to User Manager 110. The timing of log transmission is nonrestrictive, and can the scheduled time, with predetermined time interval and occur scheduled event time (such as, when at least one unwarranted content being detected or when asking at the such as authorized remote-control device such as User Manager 110 or operator's work station 114) be transmitted. Additionally, Report Parameters 178 can determine that permission who local access log 170, allow for such as User Manager 110 remote-control device such as grade and access memorizer 136.
In one non-limiting, spam log 170 can be connected by the open communication between wireless device 102 with wireless network 101 and transmits. For example, anti-spam engine 138 can by spam log 170 " camel " to by the open voice or data call connecting and carrying out. Or, in cellular network configuration, anti-spam engine 138 can pass through short message service (SMS) and spam log 170 is transferred to User Manager 110. Additionally, as it has been described above, User Manager 110 can pass through network 101 by daily record 170 " pull-out " from wireless device 102 in scheduling or the special basis arranged.
Anti-spam engine modules 138 also can control module 183 including (but not limited to) local wireless devices. Local wireless devices controls module 183 can perform the control command 185 that Local or Remote produces on wireless device 102 under the control controlling logic 162. Local device control module 183 can ask first to obtain the mandate to control command 185 before performing control command 185.
For example, control command 185 can be any operation that can perform on wireless device 102, it is including (but not limited to) receiving and activating the content filter configuration file 170 downloaded from network 101, and journal file 184 is uploaded to network 101.
Additionally, anti-spam engine modules 138 can comprise restricted service configuration 187, described configuration is operable to set up the limited-access communications channel crossing over wireless network 101, and described channel is not generally available for the user of wireless device 102 and uses. For example, limited-access communications channel can be used for transmitting journal file 184, receiving content filter configuration file 170, and is used for receiving/produce control command 185.
Identification and setting to limited-access communications channel can arrange 189 based on restricted service. Restricted service arranges 189 and may recognize that the communication type allowed, and may recognize that available associated communication channels. Restricted service configuration 187 can be passed through wireless network 101 and receive, and (such as by connected in series) can be locally transferred to wireless device 102, or can pre-loaded on wireless device 102.
Referring to Fig. 4, User Manager 110 can be server, personal computer, microcomputer, mainframe computer or any operable calculation element stopping junk information with analysis measure of taking the initiative from network 101. In some respects, User Manager 110 operates to perform these functions in combinations with operator's work station 114. User Manager 110 can include User Manager anti-spam module 190, described module can comprise at least one in any kind of hardware, software, firmware, data and executable instruction, and it is operable to produce content filter configuration file 170 and to analyze the spam log 184 from wireless device 102.
In addition, there is the alone server or computer installation that are associated with User Manager 110, its co-ordination to provide the data with available formats to each side, and/or provides independent key-course in the data stream between wireless device 102 and User Manager anti-spam module 190. Software agent or application program can be sent to wireless device 102 by wireless network 101 by User Manager 110 so that wireless device 102 is from the application program of its resident and subsystem 150 return information.
Referring to Fig. 4 and Fig. 5, User Manager anti-spam module 190 can comprise configuration generator block 198, and described configuration generator block 198 includes allowing configuration generator block 198 to produce the hardware of content filter configuration file 170, content, software and/or other any associated logic. In one aspect, configuration generator block 198 is operable each ingredient of given content filter configuration file 170 to be collected based on from the selection of many configurable parameters.
For example, configuration logic 220 can provide the ability made one's options from the menu of multiple content filters 208, the plurality of content filter and Host Based filtration, rule-based filtration, bayesian statistical analysis, noise filter and sender policy framework (SPF) or sender's ID filter to authorized user.
In addition, configuration logic 220 can provide to authorized user and make one's options to produce the ability of content filter configuration file 170 from the menu of multiple content destinatioies 210, and wherein said multiple content destinatioies are including but not limited to the network equipment on resident client application 140 on wireless device 102 and network 101.
Similarly, the ability that configuration logic 220 can make one's options in providing the menu of at least one from multiple Report Parameters 212, multiple control command parameter 206 and multiple predetermined filter appraisal result value 216 to authorized user. Or, configuration logic 220 is not individually select various configuration parameter, but can provide, to authorized user, the ability made one's options from the menu of multiple predetermined content filter deployment 218, described predetermined content filter deployment 218 can comprise the predetermined packet of packets of the above-mentioned parameter including content filter configuration 170.
Furthermore, it is possible to the content being considered as junk information by a Virtual network operator is likely to be not considered as junk information by another Virtual network operator. Correspondingly, configuration logic 220 can provide, to authorized user, the ability that make one's options from the menu of multiple predetermined network providers 219, with so that given configuration is associated with given Internet Service Provider. Thus, different filtration configurations can be produced for different network provider, and roam into the device of next provider from a provider and therefore can receive new filtering configuration and filter out different contents according to network provider.
Additionally, the identification of junk information is likely to be dependent on the certain wireless devices operated. For example, owing to junk information is potentially based on the size of content, thus the memorizer using more than predetermined portions to may result in content classification be junk information. In the case, owing to different wireless devices has different memory size, thus this type of junk information defines, and to be probably device specific. Other example can based on the disposal ability of given wireless device, graph ability etc. Correspondingly, configuration logic 220 can provide, to authorized user, the ability made one's options from the menu of multiple predetermined wireless device types 213.
Once it is determined that the design parameter of given content filter configuration 170, then configuration logic 220 just can uniquely configure ID171 to given configuration assignment, and can this configuration be stored in storehouse for calling once again after a while, for instance it is stored in multiple predetermined anti-spam content filter configuration 218. Additionally, another assembly of configuration logic 220 and/or User Manager anti-spam module 190 is operable so that configuration 170 to be transferred to one or more wireless devices 102. In certain embodiments, order 185 can be transmitted to activate the configuration 170 transmitted, or wireless device can be configured to activate the configuration recently transmitted when downloading from anti-spam engine 138 with it.
User Manager anti-spam module 190 can comprise information storage area 194, and it is for storing one or more spam log 184 from one or more wireless devices 102. Information storage area 194 can comprise any kind of memorizer with User Manager anti-spam module 190 compatibility or storage device.
Additionally, User Manager anti-spam module 190 can include analyzer 202 and report generator 204. Analyzer 202 can comprise for analyzing and explain daily record 184 and producing the hardware of report 205 and analyze logic, for instance decision-making routine, statistical procedure and combination thereof. In addition, User Manager anti-spam module 190 is operable so that report 205 is available for authorized user and checks, and produce to interconnection device (such as to operator's work station 114) and transmission email message, wherein comprise at least some of of report 205. For example, unwarranted content 163 can be grouped by report 205 based on predefined parameter, and described parameter is such as certain part of promoter/sender, destination's wireless device and/or client application, content, such as word, title or file etc.
Referring to Fig. 6, User Manager anti-spam module 190 can farther include remote device control module 200, and described control module performs and operable to receive control command 185 from operator's work station 114 and/or wireless device 102 or to produce control command 185 to operator's work station 114 and/or wireless device 102 by controlling logic 230. For example, control command 185 can include operator mark (" ID ") 232 and control activity 234. Operator ID232 can be certain mode of the promoter identifying control command 185. For example, operator ID234 can be title, numbering, digital signature, hash or other any kind of data can being associated with authorized user or value. It is included in significantly in control command 185 additionally, operator ID232 is not likely to be, but the source according to control command 185 is derived.
Control activity 234 is probably the operation by performing control command 185, wireless device 102 performed by anti-spam engine modules 138. As it has been described above, described operation can comprise download configuration 170 and upload daily record 184. Before performing or forwarding control command 185, remote device control module 200 can perform permission logic 236 so that reliability or the authority of control command 185 1 side is issued in inspection.
For example, particular operators can be limited to specific control activity, or be limited to the specific wireless device of control. It is likely to be only whether prompting operator's work station 114 validation operation person's work station 114 does want to execution control activity 234 on wireless device 102 to the mandate of control command 185. Or, permission logic 236 can analyze operator ID232 and control activity 234 from control command 185, and it is these parameters are relevant to the data base of multiple operator ID226, multiple control license 224 and multiple wireless device identification (ID) 228, in order to produce license and determine 222.
It should be noted, however, that multiple operator ID270, multiple control license 224 and multiple wireless device identification (ID) 228 can be correlated with in any way. For example, control command 185 can contain operator ID232 and the control activity 234 of " the update content filter configuration file " of the specific one in multiple wireless device identification 228. Permission logic 236 can search for the data base controlling license 224 and operator ID226 to determine whether that permit operation person's on given wireless device 102 " pushing " is newly configured.
Referring now to Fig. 7, operator's work station 114 is operable so that authorized user can check report 205 and the telex network of wireless device 102, anti-spam engine 138 and/or content filter configuration file 170 are downloaded to wireless device 102, and uploads spam log 184 from wireless device 102. Additionally, the operation of the operator's person's of being operated by work station 114 is operable to ask message center 118 to stop specific junk information entrance network 101.
Operator's work station 114 can include the input mechanism 248 with computer platform 240 interconnection and output mechanism 250. Input mechanism 248 is with output mechanism 250 can each response mechanism 132 and 134 on wireless device 102 be similar to it.
Operator's work station 114 can farther include: memorizer 246, is used for storing application program and data file; Process engine 242; And communication module 244, it is operable to launch between any networking component on operator's work station 114, User Manager 110, wireless device 102 and wireless network 101 and to receive content. Additionally, communication module 244 is operable to transmit voice by network 101, allows for operator and carry out voice communication with any wireless device or other authorized personnel.
Memorizer 246 can include operator and control module 252, processes engine 242 and described module can be performed. Because the number of the number of operator's work station 114 and operator does not limit, so can previously be input in memorizer 246 referring to Fig. 6 operator's ID parameter 232 discussed, recorded in network 101 and to operator described in networking component identification.
Operator controls module 252 self can include operator's anti-spam logic 254, described logic can with graphic user interface (GUI) logic 256, input mechanism 248 and export machine-processed 250 binding operations, in order to guide operator to carry out any junk information analysis and order activity selects and transmission. For example, GUI logic 256 can control browser communication, E-mail communication, text message transmission, voice communication, report are presented, and provided the menu for selecting and transmit any control command 185 to User Manager 110 and wireless device 102.
Operator controls module 252 can farther include remote device control module 260, and described remote device control module 260 is similar to the remote device control module 200 of user manager module 190. Similar to remote device control module 200, remote device control module 260 based on operator can produce control command 185, described control command 185 can perform various activity on wireless device 102, wherein including (but not limited to): upload daily record 184, download anti-spam engine 138 and/or configuration 170.
Although the user of operator's work station 114 generally can be individual, but work station 114 can be calculation element, it includes responding or to the hardware such as responded from the PERCOM peripheral communication of the user etc. of wireless device 102, software, content and combination thereof for analysis report 205 and to report 205. This type of software can comprise algorithm, decision-making routine, statistical procedure etc., and it is used for analyzing and explain report 205. Additionally, as User Manager anti-spam module 190, operator's work station 114 can reside within any network equipment of wireless network 101, for instance at User Manager 110, be connected on another server of network, or even on wireless device 102.
Referring to Fig. 1, wireless network 101 can comprise any communication network, and described network can operate to realize the radio communication between wireless device 102 and other any device being connected to wireless network 101 at least partly. Additionally, wireless network 101 can comprise all-network assembly and form all connecting devices of network. For example, wireless network 101 can comprise following at least one or its combination in any: cellular telephone network; Land telephone network; Satellite phone network; Infrared network, for instance based on the network of Infrared Data Association IrDA (" IrDA "); Short-range wireless networks; BluetoothTechnical network; ZigBeeProtocol network; Ultra broadband (" UWB ") protocol network; Local radio frequency (" HomeRF ") network; Share Wireless Access Protocol (" SWAP ") network; Broadband network, for instance wireless ethernet compatibility alliance (" WECA ") network, Wireless Fidelity alliance (" Wi-Fi Alliance ") network and 802.11 networks; PSTN; Public heterogeneous communications network, for instance the Internet; Private communication network; And Land Mobile Radio Network.
The suitable example of telephone network comprises at least one in the analog-and digital-networks/technologies of such as the following or its combination in any: CDMA (" CDMA "), WCDMA (" WCDMA "), Universal Mobile Telecommunications System (" UMTS "), Advanced Mobile Phone Service (" AMPS "), time division multiple acess (" TDMA "), frequency division multiple access (" FDMA "), OFDM (" OFDMA "), global system for mobile communications (" GSM "), single carrier (" 1X ") Radio Transmission Technology (" RTT "), Evolution Data special (" EV-DO ") technology, general packet radio service (" GPRS "), enhanced data GSM environment (" EDGE "), high rate downlink data bag access (" HSPDA "), the technique/protocol of analog-and digital-satellite system and other any at least one that can be used in cordless communication network and data communication network.
Referring back to Fig. 1, message center 118 can comprise processor, memorizer and arrange middleware program in memory, and described middleware program is operable uses message delivery applications routine interface (API) to send the content used for other program to process. Priority generally can be queued up and arrange to content by Messaging Centre as required, and makes each client-side program need not perform these business.
Fig. 8 illustrates nonrestrictive cellular telephone system 270, and includes at least one wireless device 102 and be connected to the cellular radio network 288 of cable network 280 via wireless carrier network 284. Cellular telephone system 270 is simply exemplary, and can comprise the far modules such as such as wireless device 102 can whereby among each other and/or between the assembly of wireless network 288, transmit any system of grouped data (comprising voice-and-data) in aerial mode, wherein including (but not limited to) wireless carriers and/or server.
According to system 270, User Manager 110 can pass through cable network 280 (such as, LAN, LAN) and communicate with region of data storage 274, in order to store the junk information information from wireless device 102 collection, for instance spam log 184. Additionally, data management server 278 can communicate with User Manager 110, in order to provide reprocessing rate, data flow con-trol etc. User Manager 110, region of data storage 274 can exist with data management server 278 together with other any networking component needed for providing cellular telecommunication business. By User Manager 272, region of data storage 274 and data management server 278, wireless device 102 junk information detected can cause carrier network 284 finally to stop, from wireless device 102 and/or network 288, the junk information detected.
User Manager 110 and/or data management server 278 can pass through data link 282 and communicate with carrier network 284 with 286 (such as the Internet, safe LAN, WAN or other networks). Carrier network 284 can control the transmission to the content (being generally packet) being sent to mobile switching centre (" MSC ") 290. Additionally, carrier network 284 is communicated with MSC290 by network 286 (such as the Internet) and/or POTS (" Plain Old Telephone Service "). Generally in network 286, network or Internet portion transmit data, and POTS portion transfers voice information.
MSC290 can pass through another network 292 be connected to multiple base station (" BTS ") 294, another network described be such as data transmit data network and/or Internet portion and be used for voice messaging POTS part. Content is wirelessly broadcast to wireless device (such as wireless device 102) eventually through short message business transferring (" SMS ") or other aerial method by BTS294.
Referring to Fig. 9, illustrate that the flow chart carrying out the method for junk information detection on the wireless device can be included in step 360 place acquisition anti-spam engine 138. For example, anti-spam engine modules 138 can be implemented during manufacturing device 102 in the hardware and/or content of wireless device 102. Or, anti-spam engine 138 can be passed through wireless network 101 " pushing " to wireless device 102 by User Manager anti-spam module 190, or is passed through wireless network 101 from User Manager anti-spam module 190 " pull-out " by wireless device 102.
In step 362 place, content filter configuration 170 can be obtained by wireless device 102 by the mode similar to anti-spam engine 138, and can include the parameter defining at least one content filter 182 and Report Parameters 178.
In step 364 place, described method is included in before the content 160 on wireless device 102 is delivered to content destination and intercepts described content. For example, content 160 is likely to be intended to be sent to resident at least one client application 140 on wireless device 102, i.e. browser client, IM client, SMS client, MMS client and email client, and content 160 is intercepted before being delivered to set client application. In other embodiments, content 160 can be produced on the wireless device, and intercepted before by communication module 152 content 160 is transferred to another device on network 101.
In step 366 place, at least one filter 182 can be applied to content 160. For example, described filter can be any garbage information filtering mechanism 182, for instance: Host Based filter; Rule-based filter, namely filters out size and determines the content of size more than user, and wherein said filter can be specifically used for given Virtual network operator; Bayesian statistic filter; Noise filter; And sender policy framework (" SPF ") or transmitting side marking (ID) filter. In step 368 place, determine content filter test result 174 based on applying at least one filter 182 described to content 160. The filter test result 174 calculated can be operable to determine that content 160 is whether for the value of junk information when comparing with predetermined filter test result 188 in step 370 place.
If classifying content instruction content 160 is not junk information, then can forwarding the content to each content destination 172 in step 372 place, described content destination 172 can be resident client application on the wireless device or another network equipment. Or, if classifying content instruction content 160 is probably junk information, then do not forward the content to set client application. Additionally, in step 374 place, content 160 can be stored in off-limit file folder 163 as spam content 163, until this type of time or other predetermined condition of spam content 163 can be deleted in step 376 place. Can configure from content filter and 170, obtain predetermined condition, for instance storage restriction 176. Additionally, can realize the storage and the deletion that are isolated content 163 under the control of the control command 185 of the part as local device control module 183.
In addition, once content 160 is defined as junk information in step 370 place, then record can be input in spam log 184 in step 378 place, described record includes at least some of the 173 of content 160, for instance the source 186 of content destination 172 and content and the filter test result 188 calculated. Then in step 380 place, spam log 184 can be provided remote-control device (such as User Manager 110 and operator position 114) for further analysis.
In step 381 place, may be in response to the spam log 184 that transmits and received message by wireless device 102. For example, described message can include control command 185, and described control command 185 indicates wireless device 102 to receive and upload the renewal to content filter deployment 170.
Figure 10 illustrates can to operate to manage on such as User Manager 110 network equipment such as grade the flow chart in of the method for the content on wireless device. In one aspect, described method is included in step 382 place and provides anti-spam engine to wireless device. In an example, the anti-spam engine 138 that User Manager 110 available wireless mode will be stored in the memorizer of User Manager is transferred to wireless device 102 by wireless network 101.
Described method produces content filter configuration further contained in step 384 place to wireless device. For example, User Manager 110 can produce content filter configuration 170. User Manager 110 can produce filter deployment 170 when at least one from wireless device 102, operator 114 or User Manager anti-spam logic 192 receives request. Filter deployment 170 can be produced by configuring generator block 198 based on the parameter shown in Fig. 5 and logic. In step 386 place, content filter configuration 170 can be provided to wireless device 102. In an example, configuration 170 can be transferred to wireless device 102 by network 101 by User Manager 110.
In step 388 place, described method comprises the configuration of Cempetency-based education device and receives spam log from wireless device. In an example, User Manager 110 can receive at least one spam log 184, described spam log 184 by producing to content 160 application content filter deployment 170, and is transmitted by wireless network 101 by least one wireless device 102. Can spam log 184 be stored in information storage area 194, information storage area 194 can pass through analyzer 202 and analyze described daily record further, described analyzer 202 can comprise for analyzing and explaining the hardware of daily record 184 and analyze logic, for instance decision-making routine, statistical procedure and combination thereof.
Based on the result that spam log is analyzed, User Manager 110 can produce report 205 and make this report be available for operator 114 and use in step 390 place. Report 205 can be made can be checked by such as operator 114 authorized user such as grade on User Manager, or at least portions of of report 205 can be transferred to operator 114 as Email by network 101 by User Manager 110.
The analysis to spam log 184 based on operator 114 or analyzer 202, User Manager 110 can produce in step 392 place or receive modified content filter configuration 170. Before accepting the content filter configuration 170 transmitted by operator position 114, the remote device control module 200 of User Manager 110 is operable authorizes the configuration to update wireless device 102 with checked operation person 114.
In step 394 place, modified content filter configuration 170 can be made to be available for wireless device 102 and/or message center 118 uses. Wireless network 101 can be passed through some or all of filter deployment 170 is transferred to wireless device 102 and/or message center 118. In some cases, wireless device 102 request can authorize confirmation before accepting amendment, and described confirmation can be provided by control command 185 produced by remote device control module 200.
Referring to Figure 11, some embodiments carrying out the method for junk information detection on wireless device 102 can be included in step 302 place receiving anti-spam engine 138 at least partially on wireless device 102. For example, during manufacturing device 102, anti-spam engine modules 138 can be implemented in hardware and/or the content of wireless device 102. Or, whether there is the latest edition of the anti-spam engine modules 138 of each wireless device 102 according to (such as) wireless device 102, can by User Manager anti-spam module 190 by anti-spam engine 138 by wireless network 101 " pushing " to wireless device 102, or by wireless device 102 by wireless network 101 from User Manager anti-spam module 190 " pull-out " anti-spam engine 138. Push or pull out anti-spam engine 138 to wireless device 102 can configure in any way, for instance: initiateed by scheduled event.
In certain embodiments, anti-spam engine 138 can have basic content filter configuration 170 when activated. In certain embodiments, user can configure anti-spam engine 138 in step 304 place by input mechanism 132 and UI166 further. Or, in step 306 place, by User Manager anti-spam module 190, content filter that is new and/or that be updated over can be configured 170 by wireless network 101 " pushing " wireless device 102, or by wireless device 102 by wireless network 101 " pull-out " from User Manager anti-spam module 190 content filter configuration 170 that is new and/or that be updated over. To configuring the loading of 170 and activating and can initiate in any way, for instance by the special request of user, by scheduled event (such as activate, be energized and predetermined scheduling).
After configuring, anti-spam engine 138 can operate as background processes on wireless device 102 in step 310 place, receives and store processing at least partially of incoming content in memory to by communication module 152. Content can be received from junk information generator 122 in step 308 place. Although statistics collection device/reporter 168 can share filter 182 to all the elements type application, but in certain embodiments, statistics collection device/reporter 168 can determine that the client identification 172 being associated with each content 160, and applies corresponding filter 182 based on given content filter configuration 170 to each content 160. Configurable client identification can including (but not limited to) browser, SSM, MMS, IM and email client. Based on the result (i.e. " filter result ") including the application rule of filter applied, some contents can be transmitted to its set client, can be junk information by other content classification simultaneously and be stored in off-limit file folder 164.
In some respects, filter result 188 can produce the value calculated, described worthwhile operable to determine that described content is authorized or is classified as junk information when comparing with predetermined filter test value 174.
Parameter according at least one Spam Filter 182 described and content filter configuration file 170, the operable junk information received with detection of anti-spam engine 138, described junk information is isolated in off-limit file folder 164, and in daily record 184, creates journal entries. Journal entries is configurable and nonrestrictive, and it can include spam content 163 and/or extraneous information, for instance caller information 186, filter result 188 etc. by deriving to the content application content filter 182 received.
Additionally, the unwarranted content 163 being stored in off-limit file folder can be removed based on storage limiting parameter 176.
In step 312 place, based on Report Parameters 178, daily record 184 can be uploaded to User Manager anti-spam module 190. This kind of mechanism can comprise standard HTTP, FTP or other data transfer protocol. In other embodiments, the addressable any communicator of wireless device 102 can be used to upload the journal file 170 collected.
In step 314 place, spam log 184 can be stored in information storage area 194 by User Manager anti-spam module 190, analyzes the content of spam log, and produces report 205 based on described analysis.
In step 316 place, report 205 can be transferred to operator's work station 114 for being further analyzed and behavior by User Manager anti-spam module 190. Report 205 can comprise any type of output, and it represents the analysis to daily record 184 and other is included in the information in information storage area 194 and other any information being associated, for instance to the report of junk information, new filtering technique etc.
Although User Manager anti-spam module 190 can produce report 205, but User Manager 110 and corresponding assembly thereof are operable to present the view of the information relevant with junk information collected from wireless device 102 by any form (such as form, figure, graphics view, plain text, interactive program or webpage or to other any displays of data or present). For example, User Manager anti-spam module 190 can present the information relevant with Content-Authorize on monitor or display device, and/or this information can be transferred to another computer installation via e-mail and be further analyzed will pass through the mechanism such as such as standard HTTP, FTP or other certain data transfer protocol or check.
In step 318 place, authorized user's analysis report 205 of operator's work station 114 also determines (such as) contacted message center 118. In one aspect, the message suitably write can be transferred to User Manager 110 in step 320 place by operator's work station 114, in order to be forwarded to message center 118 in step 322 place. In alternative embodiments, operator's work station directly can send message to message center 118. This type of message can adopt any form that sender and recipient is all suitable, and it is including (but not limited to) Email, SMS text transmission and telephone communication.
Based on the message received from operator, message center 118 himself filter renewable, and stop following content in step 324 place from junk information generator 122.
Figure 12 represents the additional aspect of system 100 disclosed herein, when wherein the user of wireless device 102 receives junk information on its resident at least one client application in a wireless device, the accrued charge that produces because of unsolicited content (" junk information ") in step 330 place and contact operator 114. As disclosed above, communication between user and operator can carry out by electronic information or by real-time speech communicating.
Wireless device 102 may require to download anti-spam module 138, or may be only required to update content filter configuration file 170. In step 332 place, operator's work station 114 is operable to transmit message to User Manager 110, thus asking user manager module 190 in step 334 place by anti-spam module 138 and/or content filter configuration file 170 " pushing " wireless device 102.
Additionally in step 334 place, control command 185 can be produced by the person's of being operated by work station 114, and transfer it to wireless device 102. The operable reliability with checked operation person/User Manager of control command 185 and mandate, in order to order wireless device 102 performs specific behavior. In one non-limiting, remote device control module 200 can perform permission logic 236, in order to makes being relayed to the license of certain wireless devices 102 about whether the control command 185 operator produced and determine 222.
No matter operator's work station 114 whether initial download to anti-spam engine 138 and/or content filter configuration file 170, all new unauthorized or rubbish contents to being received by wireless device 102 in step 336 place can be filtered in step 338 place, and prevent it from arriving its destination client. Additionally, record filtered content in journal file 170, based on Report Parameters 178, described journal file 170 can be uploaded to User Manager 110 to analyze in step 340 place. Similar to the message sequence of Fig. 9, report 205 can be produced in step 342 place by User Manager 110, and transfer it to operator's work station 114 in step 344 place.
The step 346 of Figure 12,348,350 with the operation of 352 and the step 318 of Figure 11,320,322 and 324 similar, it makes the user of operator's work station 114 can analyze junk information report 205, and takes appropriate steps so that message center 118 stops similar junk information attack clogging networks 101.
On the other hand (not shown); once receive customer complaint; operator's work station 114 just can send request to wireless device 102 simply; ask upload current log 184 and/or upload the configuration 170 of current active; and content filter configuration file 170 is not updated, in order to determine the present level that the junk information on wireless device 102 is protected.
The various illustrative logical, logical blocks, module and the circuit that describe in conjunction with embodiment disclosed herein can be practiced or carried out with general processor, digital signal processor (DSP), special IC (ASIC), field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or its combination being designed to perform function described herein. General processor can be microprocessor, but as an alternative, processor can be any conventional processors, controller, microcontroller or state machine. Processor is also embodied as the combination of calculation element, for instance DSP and the combination of microprocessor, multi-microprocessor, in conjunction with one or more microprocessors of DSP core or other this type of configuration any.
Additionally, can direct hardware, by the software module performed by processor or implement the method or the step of algorithm that describe in conjunction with embodiment disclosed herein with both combinations. Software module can reside within RAM memory, flash memory, ROM memory, eprom memory, eeprom memory, depositor, hard disk, removable dish, CD-ROM or other any type of storage media known in the art. Exemplary storage medium is coupled to processor so that processor can from read information or to storing media write information. In replacement scheme, storage media can be integrally forming with processor. Processor and storage media can reside within ASIC. ASIC can reside within user terminal. In replacement scheme, processor and storage media can be resident in the user terminal as discrete component.
Although foregoing disclosure shows illustrative aspect and/or embodiment, it should be noted that, when not necessarily departing from the scope of described aspect that appended claims defines and/or embodiment, can be variously modified wherein and revise. Although being described or claimed in singulative additionally, the element of described embodiment is probably, but being limited to singulative unless explicitly stated, being otherwise also likely to be plural form. Additionally, unless otherwise stated, otherwise any aspect and/or embodiment all or part of can with other any aspect and/or embodiment all or part of together with use.

Claims (18)

1. for managing the method filtering content on the wireless device, comprising:
Predetermined content filter and Report Parameters are provided to described wireless device;
Receive to that be on described wireless device and stand the spam log that the content of described predetermined content filter process is relevant at user manager server place based on described Report Parameters; And
Produce report at described user manager server place based on described spam log;
Wherein said predetermined content filter is based on the Internet Service Provider being associated with described wireless device and what following at least one was selected from multiple content filters: predetermined characteristic that the hardware characteristics being associated with described wireless device is associated with described content destination and the hardware requirement being associated with described content.
2. method according to claim 1, wherein said spam log includes the information relevant to following at least one: the incoming content received by described wireless device, and predetermined spreads out of content from described wireless device transmissions.
3. method according to claim 1, it farther includes to provide predetermined filter test result to described wireless device so that described wireless device is able to determine whether making described content stand will the note of described content to be included in described spam log after described content filter processes.
4. method according to claim 3, wherein when described wireless device applies described content filter to described content, the operable filter test result to produce to calculate of described content filter compares for described predetermined filter test result.
5. method according to claim 1, wherein said Report Parameters is operable to define the predetermined information will being stored in described spam log.
6. method according to claim 5, wherein said predetermined information farther includes following at least one: the mark of a part for described content, the filter test result calculated that is associated with described content of the mark in source of described content and described content destination.
7. method according to claim 1, wherein provides described predetermined content filter and described Report Parameters to farther include to be forwarded to described wireless device by wireless network.
8. method according to claim 1, it farther includes, based on described spam log, modified content filter is forwarded to described wireless device.
9. a processor, it is configured to perform following behavior:
Predetermined content filter and Report Parameters are provided to wireless device;
Receive with that received by described wireless device and stand the relevant spam log of content of described content filter process at user manager server place based on described Report Parameters; And
Produce report at described user manager server place based on described spam log;
Wherein said predetermined content filter is based on the Internet Service Provider being associated with described wireless device and what following at least one was selected from multiple content filters: predetermined characteristic that the hardware characteristics being associated with described wireless device is associated with described content destination and the hardware requirement being associated with described content.
10. for managing an equipment for the filtration to the content on wireless device, comprising:
Thering is provided device, it for providing predetermined content filter and Report Parameters to described wireless device;
Receiving device, it for receiving with that received by described wireless device and stand the relevant spam log of content of described content filter process based on described Report Parameters at user manager server place; And
Generator, it for producing report based on described spam log at described user manager server place;
Wherein said predetermined content filter is based on the Internet Service Provider being associated with described wireless device and what following at least one was selected from multiple content filters: predetermined characteristic that the hardware characteristics being associated with described wireless device is associated with described content destination and the hardware requirement being associated with described content.
11. for the equipment managing the filtration to the content on wireless device, comprising:
Generator block, it is operable to produce content filter configuration, and described configuration includes at least one predetermined content filter and Report Parameters;
Anti-spam module, it is operable so that the configuration of described content filter is forwarded to described wireless device, and operable to receive with that received by described wireless device and stand the spam log that the content of Spam Filter process is relevant at user manager server place based on described Report Parameters; And
Report generator, it is operable to produce report at described user manager server place based on described spam log;
Wherein said generator block can operate to select described predetermined content filter from multiple content filters based on the Internet Service Provider being associated with described wireless device and following at least one further: predetermined characteristic that the hardware characteristics being associated with described wireless device is associated with described content destination and the hardware requirement being associated with described content.
12. equipment according to claim 11, wherein said spam log includes the information relevant to following at least one: the incoming content received by described wireless device, and predetermined spreads out of content from described wireless device transmissions.
13. equipment according to claim 11, the configuration of wherein said content filter farther includes predetermined filter test result so that described wireless device is able to determine whether making described content stand will the note of described content to be included in described spam log after described content filter processes.
14. equipment according to claim 13, wherein when described wireless device applies described content filter to described content, the operable filter test result to produce to calculate of described content filter compares for described predetermined filter test result.
15. equipment according to claim 11, wherein said Report Parameters is operable to define the predetermined information will being stored in described spam log.
16. equipment according to claim 15, wherein said predetermined information farther includes following at least one: the mark of a part for described content, the filter test result calculated that is associated with described content of the mark in source of described content and described content destination.
17. equipment according to claim 11, wherein said anti-spam module can operate by wireless network, described predetermined content filter and described Report Parameters are forwarded to described wireless device further.
18. equipment according to claim 11, wherein said anti-spam module can operate, based on described spam log, the configuration of modified content filter is forwarded to described wireless device further.
CN200680017221.3A 2005-03-25 2006-03-27 For managing equipment and the method for content exchange on the wireless device Expired - Fee Related CN101180629B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510309637.3A CN105187290B (en) 2005-03-25 2006-03-27 For managing the device and method of content exchange on the wireless device

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US66530505P 2005-03-25 2005-03-25
US60/665,305 2005-03-25
US11/369,377 US9288078B2 (en) 2005-03-25 2006-03-06 Apparatus and methods for managing content exchange on a wireless device
US11/369,377 2006-03-06
PCT/US2006/011656 WO2006105301A2 (en) 2005-03-25 2006-03-27 Apparatus and methods for managing content exchange on a wireless device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201510309637.3A Division CN105187290B (en) 2005-03-25 2006-03-27 For managing the device and method of content exchange on the wireless device

Publications (2)

Publication Number Publication Date
CN101180629A CN101180629A (en) 2008-05-14
CN101180629B true CN101180629B (en) 2016-06-01

Family

ID=37908546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200680017221.3A Expired - Fee Related CN101180629B (en) 2005-03-25 2006-03-27 For managing equipment and the method for content exchange on the wireless device

Country Status (3)

Country Link
CN (1) CN101180629B (en)
AR (1) AR052954A1 (en)
TW (1) TW200711375A (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8621614B2 (en) * 2009-05-26 2013-12-31 Microsoft Corporation Managing potentially phishing messages in a non-web mail client context
US9450781B2 (en) 2010-12-09 2016-09-20 Alcatel Lucent Spam reporting and management in a communication network
CN102256242B (en) * 2011-04-14 2015-06-03 中兴通讯股份有限公司 System and method for processing service application
CN104349395A (en) * 2013-08-06 2015-02-11 中国电信股份有限公司 Method, user terminal and system for processing data messages
US9213772B2 (en) * 2013-11-26 2015-12-15 International Business Machines Corporation Content filtering for personal productivity applications
CN107408181B (en) * 2015-03-18 2020-04-07 日本电信电话株式会社 Detection device for malware-infected terminal, detection system for malware-infected terminal, detection method for malware-infected terminal, and recording medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004008701A1 (en) * 2002-07-11 2004-01-22 Taral Networks Method and system for controlling messages in a communication network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1178951A (en) * 1997-07-23 1998-04-15 北京天融信技贸有限责任公司 Special grouped filter fire-proof wall

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2004008701A1 (en) * 2002-07-11 2004-01-22 Taral Networks Method and system for controlling messages in a communication network

Also Published As

Publication number Publication date
TW200711375A (en) 2007-03-16
AR052954A1 (en) 2007-04-11
CN101180629A (en) 2008-05-14

Similar Documents

Publication Publication Date Title
CN105187290B (en) For managing the device and method of content exchange on the wireless device
US11165741B2 (en) Introducing a new message source into an electronic message delivery environment
KR101432230B1 (en) A system and method for registering network information strings
US9439074B2 (en) Apparatus and methods for protecting data on a wireless device
CN101375617B (en) Apparatus and methods for providing configurable task management on a wireless device
EP1859643B1 (en) Monitoring usage patterns of a wireless device
CN101185355B (en) Apparatus and methods for determining network access performance of a wireless device
CN101180629B (en) For managing equipment and the method for content exchange on the wireless device
EP2339872A1 (en) De-massing method of position advertising service based on regional strategy and system thereof
CN101542429A (en) Apparatus and methods for detection and management of unauthorized executable instructions on a wireless device
CN101171861A (en) Apparatus and methods for service programming of a wireless device on a wireless communications network
CN103793838A (en) Advertisement intercepting method and device
CN102480722A (en) Sucking fee terminal identification method, apparatus and system thereof
CN103188213B (en) server and network interaction control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1113838

Country of ref document: HK

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1113838

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160601