CN105491239A - Interception method and apparatus of spam - Google Patents

Interception method and apparatus of spam Download PDF

Info

Publication number
CN105491239A
CN105491239A CN201510921281.9A CN201510921281A CN105491239A CN 105491239 A CN105491239 A CN 105491239A CN 201510921281 A CN201510921281 A CN 201510921281A CN 105491239 A CN105491239 A CN 105491239A
Authority
CN
China
Prior art keywords
information
map
junk
mobile terminal
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510921281.9A
Other languages
Chinese (zh)
Other versions
CN105491239B (en
Inventor
张福生
于鲲鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hongxiang Technical Service Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510921281.9A priority Critical patent/CN105491239B/en
Publication of CN105491239A publication Critical patent/CN105491239A/en
Priority to PCT/CN2016/109229 priority patent/WO2017097258A1/en
Application granted granted Critical
Publication of CN105491239B publication Critical patent/CN105491239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Abstract

The invention discloses an interception method and apparatus of spam. The method comprises the following steps: establishing MAP connection between a mobile terminal and an MAP device; after the mobile terminal receives information, sending the information to the MAP device through the MAP connection; performing matching on the information in a preset information database, and identifying whether the information is spam; and if so, the MAP device sending a request message of deleting the information to the mobile terminal. According to the invention, based on the feature that a mobile terminal operating in an iOS system supports an MAP protocol, the spam is identified and fed back by means of the MAP device, so that the purpose of intercepting the spam is achieved and user experience is improved.

Description

The hold-up interception method of junk information and device
Technical field
The present invention relates to technical field of network security, be specifically related to a kind of hold-up interception method and device of junk information.
Background technology
IOS system is the operating system of closing source, and by the restriction of its exploitation authority, the application program (App) operating in iOS system cannot be accessed or control system self program.Such as, iPhone comparatively popular is at present closed cell phone system, not to user's open source code.
User is when using mobile phone, usually receive junk information, such as promote note or multimedia message, swindle note, illegal organization's advertisement information etc., for these junk information, the mobile phone of increasing income can carry out identification and the interception of junk information by fail-safe softwares such as special mobile phone bodyguards.But, because iPhone is the non-mobile phone of escaping from prison closing source, to download and the message handling program that iOS system carries cannot be accessed or control to the application program (App) operated in iPhone from AppStore, therefore can not the direct interception being carried out junk information by App as the mobile phone of increasing income.
Summary of the invention
In view of the above problems, the present invention is proposed to provide a kind of overcoming the problems referred to above or the hold-up interception method of junk information solved the problem at least in part and device.
According to one aspect of the present invention, provide a kind of hold-up interception method of junk information, for operating in the mobile terminal of iOS operating system, described method comprises:
The MAP set up between described mobile terminal with message access protocol MAP equipment is connected;
After described mobile terminal receives information, described information is connected by described MAP and sends to described MAP equipment;
Described information is mated in preset information bank, identifies whether described information is junk information;
If so, described MAP equipment sends the request message deleting described information to described mobile terminal.
Preferably, after described MAP receives described information, also comprise:
Described information is sent to the security management application program operating in described mobile terminal by described MAP equipment;
Whether performed described information by described security management application program is the identification of junk information;
Recognition result is sent to described MAP equipment by described security management application program.
Preferably, whether described execution described information by described security management application program is the identification of junk information, comprising:
Described security management application program according to arrange in this locality or download to local described information bank from network side server described information mated, thus identify whether described information is junk information; Or,
Described information is sent to network side server by described security management application program, and described in the described information bank identification arranged according to self by described network side server, whether information is junk information, and receives the recognition result that network side server returns.
Preferably, bluetooth 4.0 protocol communication is passed through between described MAP equipment and described security management application program.
Preferably,
Described information bank is set in described MAP equipment or described MAP equipment downloads described information bank from network side server, or described MAP equipment receives described information bank from the security management application program operating in described mobile terminal;
Whether to be performed described information according to described information bank by described MAP equipment is the identification of junk information.
Preferably, after described MAP receives described information, also comprise:
Described information is sent to network side server by described MAP equipment;
Whether the described information bank arranged according to self by described network side server performs described information is the identification of junk information;
Recognition result is sent to described MAP equipment by described network side server.
Preferably, described information bank comprises black list database and the white list database of junk information.
Preferably, described described information to be mated in preset information bank, identifies whether described information is junk information, comprising:
Extract transmission number and/or the informative abstract of described information, described number and/or informative abstract are mated in described blacklist and/or white list;
Determine whether described information is junk information according to matching result.
Preferably, at described MAP equipment to after described mobile terminal sends the request message deleting described information, also comprise:
Described mobile terminal returns the response of removal request to described MAP equipment, and, described mobile terminal by described information back-up in the security management application program operating in described mobile terminal.
A blocking apparatus for junk information, for operating in the mobile terminal of iOS operating system, described device is positioned at mobile terminal side, and described device comprises:
MAP connection establishment unit, is connected for the MAP set up between described mobile terminal with message access protocol MAP equipment;
MAP communication unit, after receiving information at described mobile terminal, is connected described information by described MAP and sends to described MAP equipment; Further, receive the request message of the described information of deletion that described MAP equipment sends, wherein, described request message is based on junk information recognition result, and described junk information recognition result is in preset information bank, mate the result that described information obtains;
Information process unit, for when described MAP communication unit receives described request message, deletes information.
Preferably, also comprise:
Security management application program control unit, whether for receiving the described information that described MAP equipment provides, and to perform described information be the identification of junk information, and, recognition result is sent to described MAP equipment.
Preferably, described security management application program control unit specifically for, according to arrange in this locality or download to local described information bank from network side server described information mated, thus identify whether described information is junk information; Or described information is sent to network side server, and whether information is junk information described in the described information bank identification arranged according to self by described network side server, and receive the recognition result that network side server returns.
Preferably, described information bank comprises black list database and the white list database of junk information.
Preferably, described security management application program control unit specifically for, extract transmission number and/or the informative abstract of described information, described number and/or informative abstract mated in described blacklist and/or white list; Determine whether described information is junk information according to matching result.
Preferably, also comprise: junk information backup units, for by described information back-up in the security management application program operating in described mobile terminal.
A blocking apparatus for junk information, for being carried out the interception of junk information to the mobile terminal operating in iOS operating system by MAP equipment, described device is positioned at described MAP equipment side, and described device comprises:
MAP connection establishment unit, is connected with the MAP between described mobile terminal for setting up described MAP equipment;
MAP communication unit, for receiving the information that described mobile terminal sends, and, the request message of the described information of deletion based on junk information recognition result is sent to described mobile terminal;
Junk information recognition result acquiring unit, for obtaining junk information recognition result, wherein, described junk information recognition result is in preset information bank, mate the result that described information obtains.
Preferably, also comprise:
Bluetooth-communication unit, for described information being sent to the security management application program operating in described mobile terminal, and receives the junk information recognition result returned by described security management application program.
Preferably, also comprise:
Information bank acquiring unit, for arranging described information bank or described MAP equipment downloads described information bank from network side server in described MAP equipment, or described MAP equipment receives described information bank from the security management application program operating in described mobile terminal;
Whether recognition unit is the identification of junk information for performing according to described information bank described information.
Preferably, described information bank comprises black list database and the white list database of junk information.
Preferably, described recognition unit specifically for, extract transmission number and/or the informative abstract of described information, described number and/or informative abstract mated in described blacklist and/or white list; Determine whether described information is junk information according to matching result.
Preferably, also comprise:
Server communication unit, for sending to network side server by described information; And receive the junk information recognition result returned by described network side server.
Visible, set up MAP equipment be connected with the MAP of mobile terminal owing to the present invention is based on MAP, thus the information making MAP equipment can get mobile terminal to receive, carry out the identification of junk information again, final MAP equipment sends the request of deletion information to mobile terminal by MAP based on the recognition result of junk information, thus reach the object of catching rubbish information.Visible, thus general App cannot the problem of catching rubbish information owing to closing source to the invention solves the mobile terminal that runs iOS system, but this feature of MAP is supported based on the mobile terminal running iOS system, identification and the feedback of junk information is carried out by MAP equipment, thus reach the object of catching rubbish information, improve Consumer's Experience.
In a preferred embodiment of the invention, mutual by between bluetooth equipment and iPhoneApp is that the App operated on iPhone has also possessed the function of catching rubbish note to the impression of user.Such as, user by installing the App such as security guard on iPhone, and this App, by the backstage mutual (user can not experience) with bluetooth equipment, is the interception function possessing junk information to the impression of user on foreground.Extend security classes App based on the application in the terminal of iOS system, promote user's impression.
In another embodiment of the present invention, only by bluetooth equipment, the identification of junk information can be completed, and by means of only bluetooth equipment, can notify that iphone deletes junk information.
In another embodiment of the present invention, by by bluetooth equipment and network side server, the identification of junk information can be completed, and delete junk information by bluetooth equipment notice iphone.Carry out junk information identification by network side server and there is certain advantage, first, network side server capacity is large, aboundresources, therefore more jumbo information bank can be set, and can real-time update; Secondly, network side server is given in the work of junk information identification and carries out, the burden of iphone or bluetooth equipment can be alleviated, improve treatment effeciency.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to technological means of the present invention can be better understood, and can be implemented according to the content of specification, and can become apparent, below especially exemplified by the specific embodiment of the present invention to allow above and other objects of the present invention, feature and advantage.
Accompanying drawing explanation
By reading hereafter detailed description of the preferred embodiment, various other advantage and benefit will become cheer and bright for those of ordinary skill in the art.Accompanying drawing only for illustrating the object of preferred implementation, and does not think limitation of the present invention.And in whole accompanying drawing, represent identical parts by identical reference symbol.In the accompanying drawings:
Fig. 1 shows the hold-up interception method flow chart of junk information according to a first embodiment of the present invention;
Fig. 2 shows in the hold-up interception method of junk information according to a first embodiment of the present invention and sets up the flow chart that between mobile terminal with MAP equipment, MAP is connected;
Fig. 3 shows MAP equipment notice mobile terminal in the hold-up interception method of junk information according to a first embodiment of the present invention and deletes the flow chart of junk information;
Fig. 4 shows the hold-up interception method flow chart of junk information according to a second embodiment of the present invention;
Fig. 5 shows the hold-up interception method flow chart of junk information according to a third embodiment of the present invention;
Fig. 6 shows the hold-up interception method flow chart of junk information according to a fourth embodiment of the present invention;
Fig. 7 shows the blocking apparatus structural representation of junk information according to an embodiment of the invention; And,
Fig. 8 shows the blocking apparatus structural representation of junk information in accordance with another embodiment of the present invention.
Embodiment
Below with reference to accompanying drawings exemplary embodiment of the present disclosure is described in more detail.Although show exemplary embodiment of the present disclosure in accompanying drawing, however should be appreciated that can realize the disclosure in a variety of manners and not should limit by the embodiment set forth here.On the contrary, provide these embodiments to be in order to more thoroughly the disclosure can be understood, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Foregoing, because iPhone etc. closes source based on the terminal of iOS system, therefore to download and the message handling program that iOS system carries cannot be accessed or control to the application program (App) operated in iPhone from AppStore, therefore can not the direct interception being carried out junk information by safety management App as the mobile phone (such as based on the mobile phone of andriod system) of increasing income.
Therefore, the present invention proposes, based on MAP (MessageAccessProfile) agreement that iPhone supports, MAP equipment receives the message notice (comprising note, multimedia message) of iPhone by MAP, if information is junk information, then MAP equipment sends the request of deletion information to iPhone by MAP, thus catching rubbish information.
See Fig. 1, show the hold-up interception method flow chart of junk information according to an embodiment of the invention.The method is used for the interception mobile terminal operating in iOS operating system being carried out to junk information.Concrete, the method comprises following S101-S104.
S101: the MAP set up between mobile terminal with MAP equipment is connected.
Those skilled in the art understand, and MAP is bluetooth note access specification, define the flow process of note on bluetooth equipment access mobile phone.In the present invention, MAP equipment refers to the equipment supporting MAP, includes but not limited at present and the following bluetooth equipment occurred, such as bluetooth earphone adapter, Bluetooth gateway etc.
About the mode set up MAP be connected between mobile terminal with MAP equipment, can with reference to the flow process shown in figure 2.MAP equipment and mobile terminal (such as iPhone) set up MessageAccessservicesession (message reference access session, MAS), and register Notification (notice), MessageNotificationservicesession (Information Notification Services session, MNS) is set up with iPhone.
In MAP, registration message notice can realize by with under type:
SetNotificationRegistration_Req(...,NotificationStatus=‘on’,...)。
S102: after mobile terminal receives information, is connected information by MAP and sends to MAP equipment.
About mobile terminal, the information received is sent to MAP equipment, please continue to refer to flow process shown in Fig. 2 by MAP connection.After mobile terminal receives note or multimedia message, the note received or multimedia message, by triggering event, are sent to MAP equipment by mobile terminal, and now, MAP device responds mobile terminal, confirms to have received this note or multimedia message.
In MAP, message informing can realize by with under type: SendEvent_Req (...).
S103: information mated in preset information bank, whether identifying information is junk information.
Pre-set information bank, such as, the information bank of setting comprises black list database and the white list database of junk information.When specifically identifying, the transmission number of information extraction and/or informative abstract, mate number and/or informative abstract in blacklist and/or white list; Whether be junk information according to matching result comformed information.Fairly simple mode is, carries out the identification of junk information by means of only transmission number, in preferred mode, adopts the mode sending number combining information summary (information characteristics code) to identify, can be more accurate.
To the identification of junk information, can be performed by different main bodys, such as, can carry out on MAP, also the 3rd equipment can be sent to be identified by the 3rd equipment by MAP equipment, the present invention does not limit this, and specifically describes wherein more preferably three kinds of modes in follow-up second embodiment, the 3rd embodiment, the 4th embodiment.
S104: if be identified as junk information, MAP equipment sends the request message of deletion information to mobile terminal.
The flow process of junk information is deleted about MAP equipment notice mobile terminal, can see Fig. 3.Set up in MNSsession at MAP equipment and mobile terminal, extract the SMS notification of MSE, after the information of identifying is junk information, MAP equipment sends the request of deletion information to mobile terminal; At mobile terminal side, the response of removal request can be returned to MAP equipment.
In MAP, deleting information request can realize by with under type:
SetMessageStatus_Req(…,‘deletedStatus,‘deleted’…)。
Visible, by the scheme of the first embodiment, set up MAP equipment based on MAP to be connected with the MAP of mobile terminal, thus the information making MAP equipment can get mobile terminal to receive, carry out the identification of junk information again, final MAP equipment sends the request of deletion information to mobile terminal by MAP based on the recognition result of junk information, thus reach the object of catching rubbish information.Visible, thus general App cannot the problem of catching rubbish information owing to closing source to the invention solves the mobile terminal that runs iOS system, but this feature of MAP is supported based on the mobile terminal running iOS system, identification and the feedback of junk information is carried out by MAP equipment, thus reach the object of catching rubbish information, improve Consumer's Experience.
See Fig. 4, show the hold-up interception method flow chart of junk information according to a second embodiment of the present invention.In a second embodiment, introduce operate in mobile terminal security management application program (such as, operate in the security guard's software on iphone), this security management application program bears the work of junk information identification, and recognition result is fed back to MAP equipment, MAP equipment sends deletion information request according to recognition result to mobile terminal.
In order to more directly perceived, in the diagram, mobile terminal with iphone imbody, MAP equipment with bluetooth equipment imbody, security management application program with iphoneApp imbody.
See Fig. 4, the second embodiment comprises the steps:
S401: set up MASsession between bluetooth equipment and iphone;
S402: set up MNSsession between bluetooth equipment and iphone;
S403:iphone receives information (note or multimedia message etc.);
S404:iphone sends a notification message to bluetooth equipment, by notification message, the information received is supplied to bluetooth equipment;
S405: bluetooth equipment sends a notification message to iphoneApp, is supplied to iphoneApp by notification message by the information received;
S406:iphoneApp carries out the identification of junk information based on information bank;
Recognition result is returned to bluetooth equipment by S407:iphoneApp;
S408: if the information that identifies is junk information, bluetooth equipment sends to iphone and deletes information request;
S409:iphone deletes junk information;
S410:iphone returns removal request response to bluetooth equipment.
Preferably, in above-mentioned flow process, step S401 mutual between iPhone and bluetooth equipment, S402, S404, S408, S410 are based on MAP, and step S405 mutual between bluetooth equipment and iphoneApp, S407 are based on bluetooth 4.0 agreement.
Mutual about based on MAP between iphone and bluetooth equipment, specifically can with reference to the explanation of the first embodiment.
About between bluetooth equipment and iPhoneApp, bluetooth 4.0 protocol communication can be adopted, can by realizing read, write, notification of parameter (Characteristic).Now, bluetooth equipment and iPhone (iPhoneApp), can respectively as central equipment or peripheral equipment, and peripheral equipment needs first to open bluetooth service, central equipment can search for peripheral equipment and registration notification in advance, also can search for the equipment of periphery when needing.Therefore, to connect in advance between bluetooth equipment and iPhoneApp and do not connect in advance can.The process CIMS of this part is flexible, can adjust which equipment as peripheral equipment, which equipment as central equipment according to personal secrets.
Step S406, iPhoneApp are carried out to the identification of junk information based on information bank, multiple specific implementation can be had.One is, iPhoneApp is in local configuration information storehouse or from network side server Download Info storehouse, and information bank that is that utilize local setting or that download to this locality identifies information; Another kind is, iPhoneApp does not arrange in this locality or preserves information bank, but information is sent to network side server, after being carried out the identification of junk information, recognition result is returned to iPhoneApp by network side server according to information bank.No matter which kind of mode, be all dominate the identification of junk information by iPhoneApp and recognition result is supplied to bluetooth equipment in step S 407.
In addition, when iPhone deletes junk information, junk information can also be saved in iPhoneApp, thus allow user to check to have tackled which junk information subsequently through App.
Visible, in a second embodiment, mutual by between bluetooth equipment and iPhoneApp is that the App operated on iPhone has also possessed the function of catching rubbish note to the impression of user.Such as, user by installing the App such as security guard on iPhone, and this App, by the backstage mutual (user can not experience) with bluetooth equipment, is the interception function possessing junk information to the impression of user on foreground.Extend security classes App based on the application in the terminal of iOS system, promote user's impression.
See Fig. 5, show the hold-up interception method flow chart of junk information according to a third embodiment of the present invention.In the third embodiment, the identification of junk information self is responsible for by MAP equipment.
In order to more directly perceived, in Figure 5, mobile terminal with iphone imbody, MAP equipment with bluetooth equipment imbody.
See Fig. 5, the 3rd embodiment comprises the steps:
S501: set up MASsession between bluetooth equipment and iphone;
S502: set up MNSsession between bluetooth equipment and iphone;
S503:iphone receives information (note or multimedia message etc.);
S504:iphone sends a notification message to bluetooth equipment, by notification message, the information received is supplied to bluetooth equipment;
S505: bluetooth equipment carries out the identification of junk information based on information bank;
S506: if the information that identifies is junk information, bluetooth equipment sends to iphone and deletes information request;
S507:iphone deletes junk information;
S508:iphone returns removal request response to bluetooth equipment.
For step S505, bluetooth equipment carries out the identification of junk information based on information bank, can have multiple specific implementation.One is, bluetooth equipment is in local configuration information storehouse, and another kind is, bluetooth equipment downloads this information bank from network side server, also have one be, bluetooth equipment from operate in iphone App obtain this information bank.No matter which kind of mode, bluetooth equipment is all final obtains information bank on equipment of itself, then carries out the identification of junk information in this locality based on information bank.
Visible, in the third embodiment, only by bluetooth equipment, the identification of junk information can be completed, and by means of only bluetooth equipment, can notify that iphone deletes junk information.
See Fig. 6, show the hold-up interception method flow chart of junk information according to a fourth embodiment of the present invention.In the fourth embodiment, introduce network side server, carried out the identification of junk information by MAP equipment by network side server.
In order to more directly perceived, in figure 6, mobile terminal with iphone imbody, MAP equipment with bluetooth equipment imbody.
See Fig. 6, the 4th embodiment comprises the steps:
S601: set up MASsession between bluetooth equipment and iphone;
S602: set up MNSsession between bluetooth equipment and iphone;
S603:iphone receives information (note or multimedia message etc.);
S604:iphone sends a notification message to bluetooth equipment, by notification message, the information received is supplied to bluetooth equipment;
S605: bluetooth equipment sends a notification message to network side server, is supplied to network side server by notification message by the information received;
S606: network side server carries out the identification of junk information based on information bank;
S607: recognition result is returned to bluetooth equipment by network side server;
S608: if the information that identifies is junk information, bluetooth equipment sends to iphone and deletes information request;
S609:iphone deletes junk information;
S610:iphone returns removal request response to bluetooth equipment.
Visible, in the fourth embodiment, by by bluetooth equipment and network side server, the identification of junk information can be completed, and delete junk information by bluetooth equipment notice iphone.Carry out junk information identification by network side server and there is certain advantage, first, network side server capacity is large, aboundresources, therefore more jumbo information bank can be set, and can real-time update; Secondly, network side server is given in the work of junk information identification and carries out, the burden of iphone or bluetooth equipment can be alleviated, improve treatment effeciency.
It should be noted that, although the present invention is repeatedly described for iphone, this programme, except supporting iPhone, also can be used for other smart mobile phone supporting MAP and non intelligent mobile phone.
Corresponding with said method, the invention provides a kind of blocking apparatus of junk information, for operating in the mobile terminal of iOS operating system, described device is positioned at mobile terminal side.See Fig. 7, described device comprises:
MAP connection establishment unit 701, is connected for the MAP set up between described mobile terminal with message access protocol MAP equipment;
MAP communication unit 702, after receiving information at described mobile terminal, is connected described information by described MAP and sends to described MAP equipment; Further, receive the request message of the described information of deletion that described MAP equipment sends, wherein, described request message is based on junk information recognition result, and described junk information recognition result is in preset information bank, mate the result that described information obtains;
Information process unit 703, for when described MAP communication unit 702 receives described request message, deletes information.
Preferably, this device also comprises:
Security management application program control unit 704, whether for receiving the described information that described MAP equipment provides, and to perform described information be the identification of junk information, and, recognition result is sent to described MAP equipment.
Preferably, described security management application program control unit 704 specifically for, according to arrange in this locality or download to local described information bank from network side server described information mated, thus identify whether described information is junk information; Or described information is sent to network side server, and whether information is junk information described in the described information bank identification arranged according to self by described network side server, and receive the recognition result that network side server returns.
Preferably, described information bank comprises black list database and the white list database of junk information.
Preferably, described security management application program control unit 704 specifically for, extract transmission number and/or the informative abstract of described information, described number and/or informative abstract mated in described blacklist and/or white list; Determine whether described information is junk information according to matching result.
Preferably, this device also comprises:
Junk information backup units 705, for by described information back-up in the security management application program operating in described mobile terminal.
Corresponding with said method, the present invention also provides a kind of blocking apparatus of junk information, and for being carried out the interception of junk information to the mobile terminal operating in iOS operating system by MAP equipment, described device is positioned at described MAP equipment side.See Fig. 8, described device comprises:
MAP connection establishment unit 801, is connected with the MAP between described mobile terminal for setting up described MAP equipment;
MAP communication unit 802, for receiving the information that described mobile terminal sends, and, the request message of the described information of deletion based on junk information recognition result is sent to described mobile terminal;
Junk information recognition result acquiring unit 803, for obtaining junk information recognition result, wherein, described junk information recognition result is in preset information bank, mate the result that described information obtains.
Preferably, this device also comprises:
Bluetooth-communication unit 804, for described information being sent to the security management application program operating in described mobile terminal, and receives the junk information recognition result returned by described security management application program.
Preferably, this device also comprises:
Information bank acquiring unit 805, for arranging described information bank or described MAP equipment downloads described information bank from network side server in described MAP equipment, or described MAP equipment receives described information bank from the security management application program operating in described mobile terminal;
Whether recognition unit 806 is the identification of junk information for performing according to described information bank described information.
Preferably, described information bank comprises black list database and the white list database of junk information.
Preferably, described recognition unit 806 specifically for, extract transmission number and/or the informative abstract of described information, described number and/or informative abstract mated in described blacklist and/or white list; Determine whether described information is junk information according to matching result.
Preferably, this device also comprises:
Server communication unit 807, for sending to network side server by described information; And receive the junk information recognition result returned by described network side server.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with display at this algorithm provided.Various general-purpose system also can with use based on together with this teaching.According to description above, the structure constructed required by this type systematic is apparent.In addition, the present invention is not also for any certain programmed language.It should be understood that and various programming language can be utilized to realize content of the present invention described here, and the description done language-specific is above to disclose preferred forms of the present invention.
In specification provided herein, describe a large amount of detail.But can understand, embodiments of the invention can be put into practice when not having these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand in each inventive aspect one or more, in the description above to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes.But, the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires feature more more than the feature clearly recorded in each claim.Or rather, as claims below reflect, all features of disclosed single embodiment before inventive aspect is to be less than.Therefore, the claims following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and adaptively can change the module in the equipment in embodiment and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and multiple submodule or subelement or sub-component can be put them in addition.Except at least some in such feature and/or process or unit be mutually repel except, any combination can be adopted to combine all processes of all features disclosed in this specification (comprising adjoint claim, summary and accompanying drawing) and so disclosed any method or equipment or unit.Unless expressly stated otherwise, each feature disclosed in this specification (comprising adjoint claim, summary and accompanying drawing) can by providing identical, alternative features that is equivalent or similar object replaces.
In addition, those skilled in the art can understand, although embodiments more described herein to comprise in other embodiment some included feature instead of further feature, the combination of the feature of different embodiment means and to be within scope of the present invention and to form different embodiments.Such as, in the following claims, the one of any of embodiment required for protection can use with arbitrary compound mode.
All parts embodiment of the present invention with hardware implementing, or can realize with the software module run on one or more processor, or realizes with their combination.It will be understood by those of skill in the art that the some or all functions that microprocessor or digital signal processor (DSP) can be used in practice to realize the some or all parts in the device of the interception of the junk information according to the embodiment of the present invention.The present invention can also be embodied as part or all equipment for performing method as described herein or device program (such as, computer program and computer program).Realizing program of the present invention and can store on a computer-readable medium like this, or the form of one or more signal can be had.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or provides with any other form.
The present invention will be described instead of limit the invention to it should be noted above-described embodiment, and those skilled in the art can design alternative embodiment when not departing from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and does not arrange element in the claims or step.Word "a" or "an" before being positioned at element is not got rid of and be there is multiple such element.The present invention can by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In the unit claim listing some devices, several in these devices can be carry out imbody by same hardware branch.Word first, second and third-class use do not represent any order.Can be title by these word explanations.
Visible, the present invention at least discloses following scheme:
The hold-up interception method of A1, a kind of junk information, for operating in the mobile terminal of iOS operating system, described method comprises:
The MAP set up between described mobile terminal with message access protocol MAP equipment is connected;
After described mobile terminal receives information, described information is connected by described MAP and sends to described MAP equipment;
Described information is mated in preset information bank, identifies whether described information is junk information;
If so, described MAP equipment sends the request message deleting described information to described mobile terminal.
A2, method as described in A1, after described MAP receives described information, also comprise:
Described information is sent to the security management application program operating in described mobile terminal by described MAP equipment;
Whether performed described information by described security management application program is the identification of junk information;
Recognition result is sent to described MAP equipment by described security management application program.
A3, method as described in A2, whether described execution described information by described security management application program is the identification of junk information, comprising:
Described security management application program according to arrange in this locality or download to local described information bank from network side server described information mated, thus identify whether described information is junk information; Or,
Described information is sent to network side server by described security management application program, and described in the described information bank identification arranged according to self by described network side server, whether information is junk information, and receives the recognition result that network side server returns.
A4, method as described in A2, by bluetooth 4.0 protocol communication between described MAP equipment and described security management application program.
A5, method as described in A1,
Described information bank is set in described MAP equipment or described MAP equipment downloads described information bank from network side server, or described MAP equipment receives described information bank from the security management application program operating in described mobile terminal;
Whether to be performed described information according to described information bank by described MAP equipment is the identification of junk information.
A6, method as described in A1, after described MAP receives described information, also comprise:
Described information is sent to network side server by described MAP equipment;
Whether the described information bank arranged according to self by described network side server performs described information is the identification of junk information;
Recognition result is sent to described MAP equipment by described network side server.
A7, method as described in any one of A1-A6, described information bank comprises black list database and the white list database of junk information.
A8, method as described in A7, describedly mate described information in preset information bank, identifies whether described information is junk information, comprising:
Extract transmission number and/or the informative abstract of described information, described number and/or informative abstract are mated in described blacklist and/or white list;
Determine whether described information is junk information according to matching result.
A9, method as described in any one of A1-A6, at described MAP equipment to after described mobile terminal sends the request message deleting described information, also comprise:
Described mobile terminal returns the response of removal request to described MAP equipment, and, described mobile terminal by described information back-up in the security management application program operating in described mobile terminal.
The blocking apparatus of B10, a kind of junk information, for operating in the mobile terminal of iOS operating system, described device is positioned at mobile terminal side, and described device comprises:
MAP connection establishment unit, is connected for the MAP set up between described mobile terminal with message access protocol MAP equipment;
MAP communication unit, after receiving information at described mobile terminal, is connected described information by described MAP and sends to described MAP equipment; Further, receive the request message of the described information of deletion that described MAP equipment sends, wherein, described request message is based on junk information recognition result, and described junk information recognition result is in preset information bank, mate the result that described information obtains;
Information process unit, for when described MAP communication unit receives described request message, deletes information.
B11, device as described in B10, also comprise:
Security management application program control unit, whether for receiving the described information that described MAP equipment provides, and to perform described information be the identification of junk information, and, recognition result is sent to described MAP equipment.
B12, device as described in B11, described security management application program control unit specifically for, according to arrange in this locality or download to local described information bank from network side server described information mated, thus identify whether described information is junk information; Or described information is sent to network side server, and whether information is junk information described in the described information bank identification arranged according to self by described network side server, and receive the recognition result that network side server returns.
B13, device as described in B12, described information bank comprises black list database and the white list database of junk information.
B14, device as described in B13, described security management application program control unit specifically for, extract transmission number and/or the informative abstract of described information, described number and/or informative abstract mated in described blacklist and/or white list; Determine whether described information is junk information according to matching result.
B15, device as described in any one of B10-B14, also comprise: junk information backup units, for by described information back-up in the security management application program operating in described mobile terminal.
The blocking apparatus of C16, a kind of junk information, for being carried out the interception of junk information to the mobile terminal operating in iOS operating system by MAP equipment, described device is positioned at described MAP equipment side, and described device comprises:
MAP connection establishment unit, is connected with the MAP between described mobile terminal for setting up described MAP equipment;
MAP communication unit, for receiving the information that described mobile terminal sends, and, the request message of the described information of deletion based on junk information recognition result is sent to described mobile terminal;
Junk information recognition result acquiring unit, for obtaining junk information recognition result, wherein, described junk information recognition result is in preset information bank, mate the result that described information obtains.
C17, device as described in C16, also comprise:
Bluetooth-communication unit, for described information being sent to the security management application program operating in described mobile terminal, and receives the junk information recognition result returned by described security management application program.
C18, device as described in C16, also comprise:
Information bank acquiring unit, for arranging described information bank or described MAP equipment downloads described information bank from network side server in described MAP equipment, or described MAP equipment receives described information bank from the security management application program operating in described mobile terminal;
Whether recognition unit is the identification of junk information for performing according to described information bank described information.
C19, device as described in C18, described information bank comprises black list database and the white list database of junk information.
C20, device as described in C19, described recognition unit specifically for, extract transmission number and/or the informative abstract of described information, described number and/or informative abstract mated in described blacklist and/or white list; Determine whether described information is junk information according to matching result.
C21, device as described in C16, also comprise:
Server communication unit, for sending to network side server by described information; And receive the junk information recognition result returned by described network side server.

Claims (10)

1. a hold-up interception method for junk information, is characterized in that, for operating in the mobile terminal of iOS operating system, described method comprises:
The MAP set up between described mobile terminal with message access protocol MAP equipment is connected;
After described mobile terminal receives information, described information is connected by described MAP and sends to described MAP equipment;
Described information is mated in preset information bank, identifies whether described information is junk information;
If so, described MAP equipment sends the request message deleting described information to described mobile terminal.
2. the method for claim 1, is characterized in that, after described MAP receives described information, also comprises:
Described information is sent to the security management application program operating in described mobile terminal by described MAP equipment;
Whether performed described information by described security management application program is the identification of junk information;
Recognition result is sent to described MAP equipment by described security management application program.
3. method as claimed in claim 2, is characterized in that, whether described execution described information by described security management application program is the identification of junk information, comprising:
Described security management application program according to arrange in this locality or download to local described information bank from network side server described information mated, thus identify whether described information is junk information; Or,
Described information is sent to network side server by described security management application program, and described in the described information bank identification arranged according to self by described network side server, whether information is junk information, and receives the recognition result that network side server returns.
4. method as claimed in claim 2, is characterized in that, by bluetooth 4.0 protocol communication between described MAP equipment and described security management application program.
5. the method for claim 1, is characterized in that,
Described information bank is set in described MAP equipment or described MAP equipment downloads described information bank from network side server, or described MAP equipment receives described information bank from the security management application program operating in described mobile terminal;
Whether to be performed described information according to described information bank by described MAP equipment is the identification of junk information.
6. the method for claim 1, is characterized in that, after described MAP receives described information, also comprises:
Described information is sent to network side server by described MAP equipment;
Whether the described information bank arranged according to self by described network side server performs described information is the identification of junk information;
Recognition result is sent to described MAP equipment by described network side server.
7. the method as described in any one of claim 1-6, is characterized in that, described information bank comprises black list database and the white list database of junk information.
8. method as claimed in claim 7, is characterized in that, describedly described information is mated in preset information bank, identifies whether described information is junk information, comprising:
Extract transmission number and/or the informative abstract of described information, described number and/or informative abstract are mated in described blacklist and/or white list;
Determine whether described information is junk information according to matching result.
9. a blocking apparatus for junk information, is characterized in that, for operating in the mobile terminal of iOS operating system, described device is positioned at mobile terminal side, and described device comprises:
MAP connection establishment unit, is connected for the MAP set up between described mobile terminal with message access protocol MAP equipment;
MAP communication unit, after receiving information at described mobile terminal, is connected described information by described MAP and sends to described MAP equipment; Further, receive the request message of the described information of deletion that described MAP equipment sends, wherein, described request message is based on junk information recognition result, and described junk information recognition result is in preset information bank, mate the result that described information obtains;
Information process unit, for when described MAP communication unit receives described request message, deletes information.
10. a blocking apparatus for junk information, is characterized in that, for being carried out the interception of junk information to the mobile terminal operating in iOS operating system by MAP equipment, described device is positioned at described MAP equipment side, and described device comprises:
MAP connection establishment unit, is connected with the MAP between described mobile terminal for setting up described MAP equipment;
MAP communication unit, for receiving the information that described mobile terminal sends, and, the request message of the described information of deletion based on junk information recognition result is sent to described mobile terminal;
Junk information recognition result acquiring unit, for obtaining junk information recognition result, wherein, described junk information recognition result is in preset information bank, mate the result that described information obtains.
CN201510921281.9A 2015-12-11 2015-12-11 The hold-up interception method and device of junk information Active CN105491239B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510921281.9A CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information
PCT/CN2016/109229 WO2017097258A1 (en) 2015-12-11 2016-12-09 Spam blocking method and apparatus, computer program, and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510921281.9A CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information

Publications (2)

Publication Number Publication Date
CN105491239A true CN105491239A (en) 2016-04-13
CN105491239B CN105491239B (en) 2018-10-12

Family

ID=55677935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510921281.9A Active CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information

Country Status (2)

Country Link
CN (1) CN105491239B (en)
WO (1) WO2017097258A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017097258A1 (en) * 2015-12-11 2017-06-15 北京奇虎科技有限公司 Spam blocking method and apparatus, computer program, and readable medium
CN110677821A (en) * 2019-10-17 2020-01-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time
CN111666525A (en) * 2020-06-17 2020-09-15 北京航天时代光电科技有限公司 Information interception system and method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2290906A1 (en) * 2009-08-28 2011-03-02 TeliaSonera AB Mobile service advertiser
WO2012174821A1 (en) * 2011-06-22 2012-12-27 中兴通讯股份有限公司 Method and system for monitoring spam short message and monitoring processing device
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN104954533A (en) * 2014-03-24 2015-09-30 北京奇虎科技有限公司 Method, device and system for junk call interception on basis of intelligent communication terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4978638B2 (en) * 2009-02-18 2012-07-18 株式会社デンソー Car-mounted device and mobile phone with hands-free function
CN104735631B (en) * 2014-12-09 2019-05-10 惠州Tcl移动通信有限公司 The method and system of simultaneously operating note data
CN105491239B (en) * 2015-12-11 2018-10-12 北京奇虎科技有限公司 The hold-up interception method and device of junk information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2290906A1 (en) * 2009-08-28 2011-03-02 TeliaSonera AB Mobile service advertiser
WO2012174821A1 (en) * 2011-06-22 2012-12-27 中兴通讯股份有限公司 Method and system for monitoring spam short message and monitoring processing device
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104954533A (en) * 2014-03-24 2015-09-30 北京奇虎科技有限公司 Method, device and system for junk call interception on basis of intelligent communication terminal
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017097258A1 (en) * 2015-12-11 2017-06-15 北京奇虎科技有限公司 Spam blocking method and apparatus, computer program, and readable medium
CN110677821A (en) * 2019-10-17 2020-01-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time
CN110677821B (en) * 2019-10-17 2021-08-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time
CN111666525A (en) * 2020-06-17 2020-09-15 北京航天时代光电科技有限公司 Information interception system and method
CN111666525B (en) * 2020-06-17 2023-09-29 北京航天时代光电科技有限公司 Information interception system and method

Also Published As

Publication number Publication date
WO2017097258A1 (en) 2017-06-15
CN105491239B (en) 2018-10-12

Similar Documents

Publication Publication Date Title
CN104838618B (en) The method and apparatus of authentication-access authorization in a wireless communication system
US8209676B2 (en) Device management in a network
CN104731625B (en) A kind of method, apparatus and mobile terminal loading plug-in unit
JP6657213B2 (en) EUICC card for storing abbreviated numbers based on subscriber profiles to be notified to a subscription management server
CN104200159B (en) Configure the method and device of the authority of application program
CN103078949A (en) Method and system for displaying phone number information
US9313650B2 (en) Communications system, mobile communications device, transition control device, transition control method, and transition control program
CN105491239A (en) Interception method and apparatus of spam
CN102932762B (en) Remote centralized management control encryption system and method for mobile storage equipment based on global system for mobile communication (GSM)
EP3171566A1 (en) Method, device and system for security domain management
CN104866389A (en) Data recovery method as well as data backup method, device and system based on mobile operating system
CN105228153A (en) Method for network access, system and wireless routing device
CN104125547A (en) Short message processing method and device
CN103577747A (en) Mobile equipment privacy protection device and method
CN105450772A (en) Traffic-free downloading method and device
CN103595867A (en) Application program implementation method and device based on multi-card recognition
WO2011111036A1 (en) Systems and methods for remote configuration or re-configuration of software residing on a sim card
CN102780987A (en) Communication method and communication terminal
CN103916846A (en) Terminal application updating method, system and device
CN104793998B (en) Terminal system resource management method and device
CN103309677B (en) Built-in resource management, device and terminal
CN103440145A (en) Method and device for updating application programs and mobile terminal
US20180107840A1 (en) Method of restoring a secure element to a factory state
CN105451220A (en) Method and apparatus for selecting an ip type during roaming
CN105306455A (en) Data processing method and terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211206

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, high tech Zone, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230713

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, high tech Zone, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right