CN105491239B - The hold-up interception method and device of junk information - Google Patents

The hold-up interception method and device of junk information Download PDF

Info

Publication number
CN105491239B
CN105491239B CN201510921281.9A CN201510921281A CN105491239B CN 105491239 B CN105491239 B CN 105491239B CN 201510921281 A CN201510921281 A CN 201510921281A CN 105491239 B CN105491239 B CN 105491239B
Authority
CN
China
Prior art keywords
information
map
mobile terminal
spam
network side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510921281.9A
Other languages
Chinese (zh)
Other versions
CN105491239A (en
Inventor
张福生
于鲲鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 360 Zhiling Technology Co ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510921281.9A priority Critical patent/CN105491239B/en
Publication of CN105491239A publication Critical patent/CN105491239A/en
Priority to PCT/CN2016/109229 priority patent/WO2017097258A1/en
Application granted granted Critical
Publication of CN105491239B publication Critical patent/CN105491239B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of hold-up interception method of junk information and device, method therein includes:Establish the MAP connections between mobile terminal and MAP equipment;After the mobile terminal receives information, described information is sent to the MAP equipment by the MAP connections;Described information is matched in preset information bank, whether identification described information is junk information;If so, the MAP equipment sends the request message for deleting described information to the mobile terminal.The present invention is based on this features that the mobile terminal of operation iOS system supports MAP protocol, and identification and the feedback of junk information are carried out by MAP equipment, to achieve the purpose that catching rubbish information, improve user experience.

Description

Method and device for intercepting junk information
Technical Field
The invention relates to the technical field of network security, in particular to a method and a device for intercepting junk information.
Background
The iOS system is a closed-source operating system, and an application program (App) running on the iOS system cannot access or control a system program itself due to the limitation of its development authority. For example, the current popular iPhone is a closed mobile phone system, and does not open a source code to a user.
When a user uses the mobile phone, the user often receives junk information, such as promotion short messages or multimedia messages, fraud short messages, illegal organization propaganda information and the like, and for the junk information, the open-source mobile phone can identify and intercept the junk information through special security software such as a mobile phone guard and the like. However, since the iPhone is a closed source non-jail mobile phone, an application program (App) downloaded from an App Store and running on the iPhone cannot access or control an information processing program carried by the iOS system itself, and therefore, the App cannot directly intercept spam information as an open source mobile phone does.
Disclosure of Invention
In view of the above problems, the present invention is proposed to provide a method and apparatus for intercepting spam, which overcomes or at least partially solves the above problems.
According to an aspect of the present invention, there is provided a method for intercepting spam, which is used for a mobile terminal running in an iOS operating system, the method comprising:
establishing MAP connection between the mobile terminal and an information access protocol (MAP) device;
after receiving the information, the mobile terminal sends the information to the MAP equipment through the MAP connection;
matching the information in a preset information base, and identifying whether the information is junk information;
if so, the MAP equipment sends a request message for deleting the information to the mobile terminal.
Preferably, after the MAP receives the information, the method further includes:
the MAP device sends the information to a security management application program running on the mobile terminal;
performing, by the security management application, an identification of whether the information is spam;
the security management application sends the identification result to the MAP device.
Preferably, the identifying, performed by the security management application, whether the information is spam includes:
the security management application program matches the information according to the information base which is locally set or downloaded to the local from a network side server, so as to identify whether the information is junk information; or,
and the safety management application program sends the information to a network side server, and the network side server identifies whether the information is junk information according to the information base set by the network side server and receives an identification result returned by the network side server.
Preferably, the MAP device and the security management application communicate via a bluetooth 4.0 protocol.
Preferably, the first and second liquid crystal materials are,
setting the information base in the MAP device, or downloading the information base from a network side server by the MAP device, or receiving the information base from a security management application program running on the mobile terminal by the MAP device;
and identifying whether the information is junk information or not according to the information base by the MAP equipment.
Preferably, after the MAP receives the information, the method further includes:
the MAP equipment sends the information to a network side server;
the network side server identifies whether the information is junk information according to the information base set by the network side server;
and the network side server sends the identification result to the MAP equipment.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the matching the information in a preset information base, and identifying whether the information is spam, includes:
extracting the sending number and/or the information abstract of the information, and matching the number and/or the information abstract in the blacklist and/or the white list;
and determining whether the information is junk information according to the matching result.
Preferably, after the MAP device sends a request message for deleting the information to the mobile terminal, the method further includes:
the mobile terminal returns a response to the deletion request to the MAP device, and the mobile terminal backs up the information in a security management application running in the mobile terminal.
An interception apparatus of spam for a mobile terminal running in an iOS operating system, the apparatus being located at a mobile terminal side, the apparatus comprising:
MAP connection establishing unit, which is used for establishing MAP connection between the mobile terminal and information access protocol MAP equipment;
a MAP communication unit for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
and an information processing unit configured to delete the information when the MAP communication unit receives the request message.
Preferably, the method further comprises the following steps:
and the safety management application program control unit is used for receiving the information provided by the MAP equipment, identifying whether the information is garbage information or not and sending an identification result to the MAP equipment.
Preferably, the security management application control unit is specifically configured to match the information according to the information base set locally or downloaded locally from a network side server, so as to identify whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the security management application control unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the method further comprises the following steps: and the junk information backup unit is used for backing up the information in a safety management application program running in the mobile terminal.
A garbage information interception apparatus for intercepting garbage information of a mobile terminal running in an iOS operating system through a MAP device, the apparatus being located on the MAP device side, the apparatus comprising:
a MAP connection establishing unit for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam identification result to the mobile terminal;
and the junk information identification result acquisition unit is used for acquiring a junk information identification result, wherein the junk information identification result is obtained by matching the information in a preset information base.
Preferably, the method further comprises the following steps:
and the Bluetooth communication unit is used for sending the information to a safety management application program running on the mobile terminal and receiving a junk information identification result returned by the safety management application program.
Preferably, the method further comprises the following steps:
an information base obtaining unit, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
and the identification unit is used for identifying whether the information is the junk information according to the information base.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the identification unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the method further comprises the following steps:
the server communication unit is used for sending the information to a network side server; and receiving a spam identification result returned by the network side server.
Therefore, the MAP connection between the MAP equipment and the mobile terminal is established based on the MAP protocol, so that the MAP equipment can acquire the information received by the mobile terminal and then identify the junk information, and finally the MAP equipment sends a request for deleting the information to the mobile terminal through the MAP protocol based on the identification result of the junk information, thereby achieving the purpose of intercepting the junk information. Therefore, the method and the device solve the problem that the general App cannot intercept the junk information due to the fact that the mobile terminal running the iOS system is closed, and identify and feed back the junk information by means of the MAP equipment based on the characteristic that the mobile terminal running the iOS system supports the MAP protocol, so that the purpose of intercepting the junk information is achieved, and user experience is improved.
In a preferred embodiment of the invention, by means of interaction between the Bluetooth device and the iPhone App, the user feels that the App running on the iPhone also has the function of intercepting junk short messages. For example, a user installs an App such as a security guard on an iPhone, the App interacts with a bluetooth device in a background (the user does not feel), and the user feels that the App has a function of intercepting junk information in the foreground. The application of the safety class App on the terminal based on the iOS system is expanded, and the user experience is improved.
In another embodiment of the invention, the identification of the junk information can be completed only by the Bluetooth device, and the iphone can be informed to delete the junk information only by the Bluetooth device.
In another embodiment of the invention, the identification of the junk information can be completed by the Bluetooth device and the network side server, and the iPhone is informed to delete the junk information through the Bluetooth device. The method has certain advantages that the junk information identification is carried out through the network side server, firstly, the network side server is large in capacity and rich in resources, so that an information base with larger capacity can be set, and the junk information identification can be updated in real time; secondly, the work of identifying the junk information is transferred to a network side server to be carried out, so that the burden of an iphone or Bluetooth device can be reduced, and the processing efficiency is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a method for intercepting spam according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating establishment of a MAP connection between a mobile terminal and a MAP device in a spam intercepting method according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a MAP device notifying a mobile terminal of deletion of spam in a spam interception method according to a first embodiment of the present invention;
FIG. 4 is a flowchart of a method for intercepting spam according to a second embodiment of the present invention;
fig. 5 is a flowchart illustrating a spam intercepting method according to a third embodiment of the present invention;
fig. 6 is a flowchart illustrating a spam intercepting method according to a fourth embodiment of the present invention;
FIG. 7 is a schematic diagram of a garbage information intercepting apparatus according to an embodiment of the present invention; and the number of the first and second groups,
fig. 8 is a schematic structural diagram of a spam intercepting apparatus according to another embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As described above, since the iOS system-based terminal such as the iPhone is a closed source, an application (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program of the iOS system itself, and therefore, the secure management App cannot directly intercept spam information as in an open-source mobile phone (e.g., a mobile phone based on an android system).
Therefore, the invention provides that based on a MAP (Message Access Profile) protocol supported by the iPhone, the MAP equipment receives information notification (including short messages and multimedia messages) of the iPhone through the MAP protocol, and if the information is junk information, the MAP equipment sends a request for deleting the information to the iPhone through the MAP protocol, so as to intercept the junk information.
Referring to fig. 1, a flowchart of a method for intercepting spam according to an embodiment of the present invention is shown. The method is used for intercepting the junk information of the mobile terminal running in the iOS operating system. Specifically, the method includes the following steps S101 to S104.
S101: a MAP connection between the mobile terminal and the MAP device is established.
As known to those skilled in the art, the MAP protocol is a bluetooth short message access specification, and defines a process for a bluetooth device to access a short message on a mobile phone. In the present invention, the MAP device refers to a device supporting the MAP protocol, including but not limited to current and future bluetooth devices, such as bluetooth headset adapters, bluetooth gateways, etc.
As to the manner of establishing the MAP connection between the mobile terminal and the MAP device, reference may be made to the flow illustrated in fig. 2. The MAP device establishes a Message Access service session (MAS) with a mobile terminal (for example, an iPhone), registers Notification, and establishes a Message Notification service session (MNS) with the iPhone.
In the MAP protocol, the registration message notification may be implemented as follows:
SetNotificationRegistration_Req(...,NotificationStatus=‘on’,...)。
s102: after receiving the information, the mobile terminal transmits the information to the MAP device through the MAP connection.
With regard to the mobile terminal sending the received information to the MAP device via the MAP connection, please continue with the flow illustrated in fig. 2. When the mobile terminal receives the short message or the multimedia message, the mobile terminal sends the received short message or the multimedia message to the MAP equipment by triggering an event, and at the moment, the MAP equipment responds to the mobile terminal and confirms that the short message or the multimedia message is received.
In the MAP protocol, the message notification may be implemented as follows: SendEvent _ Req (…).
S103: and matching the information in a preset information base to identify whether the information is junk information.
The information bases are preset, and for example, the set information bases comprise a blacklist database and a white list database of the junk information. During specific identification, extracting a sending number and/or an information abstract of the information, and matching the number and/or the information abstract in a black list and/or a white list; and determining whether the information is junk information according to the matching result. In a simpler manner, spam is identified only by the sending number, and in a preferred manner, the sending number is combined with an information abstract (information feature code) for identification, so that the spam can be identified more accurately.
The identification of the spam may be performed by different subjects, for example, the identification may be performed on the MAP, or the identification may be performed by the third device after the MAP device sends the spam to the third device.
S104: if the spam is identified, the MAP device transmits a request message for deleting information to the mobile terminal.
For the procedure of the MAP device notifying the mobile terminal to delete the spam, see fig. 3. In MNS session establishment between the MAP equipment and the mobile terminal, extracting MSE short message notification, and after identifying that the information is junk information, the MAP equipment sends a request for deleting the information to the mobile terminal; on the mobile terminal side, a response to the deletion request is returned to the MAP device.
In the MAP protocol, the delete information request may be implemented as follows:
SetMessageStatus_Req(…,‘deletedStatus,‘deleted’…)。
it can be seen that, according to the scheme of the first embodiment, the MAP connection between the MAP device and the mobile terminal is established based on the MAP protocol, so that the MAP device can acquire information received by the mobile terminal, and then perform recognition of spam, and finally the MAP device sends a request for deleting information to the mobile terminal based on the recognition result of spam through the MAP protocol, thereby achieving the purpose of intercepting spam. Therefore, the method and the device solve the problem that the general App cannot intercept the junk information due to the fact that the mobile terminal running the iOS system is closed, and identify and feed back the junk information by means of the MAP equipment based on the characteristic that the mobile terminal running the iOS system supports the MAP protocol, so that the purpose of intercepting the junk information is achieved, and user experience is improved.
Referring to fig. 4, a flowchart of a method for intercepting spam according to a second embodiment of the present invention is shown. In a second embodiment, a security management application (e.g. security guard software running on iphone) running on the mobile terminal is introduced, which undertakes the work of spam identification and feeds back the identification result to the MAP device, which sends a request for deleting information to the mobile terminal according to the identification result.
For greater intuition, in fig. 4, the mobile terminal is embodied in an iphone, the MAP device is embodied in a bluetooth device, and the security management application is embodied in an iphone App.
Referring to fig. 4, the second embodiment includes the steps of:
s401: establishing MAS session between the Bluetooth equipment and the iphone;
s402: an MNS session is established between the Bluetooth equipment and the iphone;
s403: the iphone receives information (short messages or multimedia messages and the like);
s404: the iphone sends a notification message to the Bluetooth equipment and provides the received information to the Bluetooth equipment by means of the notification message;
s405: the Bluetooth equipment sends a notification message to the iphone App and provides the received information to the iphone App by means of the notification message;
s406: the iphone App identifies the junk information based on the information base;
s407: the iphone App returns the identification result to the Bluetooth equipment;
s408: if the information is identified to be junk information, the Bluetooth equipment sends an information deleting request to the iphone;
s409: deleting the junk information by the iphone;
s410: the iphone returns a delete request response to the bluetooth device.
Preferably, in the above flow, steps S401, S402, S404, S408, and S410 of interaction between the iPhone and the bluetooth device are based on the MAP protocol, and steps S405 and S407 of interaction between the bluetooth device and the iPhone App are based on the bluetooth 4.0 protocol.
For the interaction between the iphone and the bluetooth device based on the MAP protocol, reference may be made specifically to the description of the first embodiment.
The bluetooth 4.0 protocol communication can be adopted between the bluetooth device and the iPhone App, and can be realized by read, write and notification of parameters (charctertic). At this time, both the bluetooth device and the iPhone (iPhoneApp) may be used as a central device or a peripheral device, respectively, the peripheral device needs to start the bluetooth service first, and the central device may search for the peripheral device in advance and register a notification, or may search for the peripheral device when necessary. Therefore, it is possible to establish connection between the bluetooth device and the iPhone App in advance and not. The process of the part is flexible, and which device is used as the peripheral device and which device is used as the central device can be adjusted according to privacy security.
For step S406, the iPhone App identifies spam based on the information base, and there may be a variety of specific implementation manners. The iPhone App sets an information base locally or downloads the information base from a network side server, and identifies information by using the locally set information base or the information base downloaded to the local; and the other is that the iPhone App does not set or store an information base locally, but sends the information to a network side server, and the network side server identifies the junk information according to the information base and then returns the identification result to the iPhone App. In either case, the identification of spam information is dominated by the iPhone App and the identification result is provided to the bluetooth device in step S407.
In addition, when the iPhone deletes the junk information, the junk information can be stored in the iPhone App, so that the user is allowed to subsequently check which junk information is intercepted through the App.
Therefore, in the second embodiment, by means of interaction between the bluetooth device and the iPhone App, the user feels that the App running on the iPhone also has the function of intercepting spam messages. For example, a user installs an App such as a security guard on an iPhone, the App interacts with a bluetooth device in a background (the user does not feel), and the user feels that the App has a function of intercepting junk information in the foreground. The application of the safety class App on the terminal based on the iOS system is expanded, and the user experience is improved.
Referring to fig. 5, a flowchart of a method for intercepting spam according to a third embodiment of the present invention is shown. In a third embodiment, the identification of spam is handled by the MAP device itself.
For greater intuition, in fig. 5, the mobile terminal is embodied as an iphone and the MAP device is embodied as a bluetooth device.
Referring to fig. 5, the third embodiment includes the steps of:
s501: establishing MAS session between the Bluetooth equipment and the iphone;
s502: an MNS session is established between the Bluetooth equipment and the iphone;
s503: the iphone receives information (short messages or multimedia messages and the like);
s504: the iphone sends a notification message to the Bluetooth equipment and provides the received information to the Bluetooth equipment by means of the notification message;
s505: the Bluetooth equipment identifies the junk information based on the information base;
s506: if the information is identified to be junk information, the Bluetooth equipment sends an information deleting request to the iphone;
s507: deleting the junk information by the iphone;
s508: the iphone returns a delete request response to the bluetooth device.
For step S505, the bluetooth device identifies the spam based on the information base, and there may be a plurality of specific implementation manners. The Bluetooth device sets an information base locally, the Bluetooth device downloads the information base from a network side server, and the Bluetooth device acquires the information base from an App running on an iphone. In any mode, the Bluetooth device finally obtains the information base on the device of the Bluetooth device, and then the junk information is locally identified based on the information base.
Therefore, in the third embodiment, the identification of the spam information can be completed only by the bluetooth device, and the iphone can be notified to delete the spam information only by the bluetooth device.
Referring to fig. 6, a flowchart of a method for intercepting spam according to a fourth embodiment of the present invention is shown. In a fourth embodiment, a network-side server is introduced, and the MAP device identifies spam information by means of the network-side server.
For greater intuition, in fig. 6, the mobile terminal is embodied as an iphone and the MAP device is embodied as a bluetooth device.
Referring to fig. 6, the fourth embodiment includes the steps of:
s601: establishing MAS session between the Bluetooth equipment and the iphone;
s602: an MNS session is established between the Bluetooth equipment and the iphone;
s603: the iphone receives information (short messages or multimedia messages and the like);
s604: the iphone sends a notification message to the Bluetooth equipment and provides the received information to the Bluetooth equipment by means of the notification message;
s605: the Bluetooth equipment sends a notification message to a network side server, and provides the received information to the network side server by means of the notification message;
s606: the network side server identifies the junk information based on the information base;
s607: the network side server returns the identification result to the Bluetooth equipment;
s608: if the information is identified to be junk information, the Bluetooth equipment sends an information deleting request to the iphone;
s609: deleting the junk information by the iphone;
s610: the iphone returns a delete request response to the bluetooth device.
It can be seen that, in the fourth embodiment, the identification of the spam information can be completed by the bluetooth device and the network side server, and the iphone is notified to delete the spam information by the bluetooth device. The method has certain advantages that the junk information identification is carried out through the network side server, firstly, the network side server is large in capacity and rich in resources, so that an information base with larger capacity can be set, and the junk information identification can be updated in real time; secondly, the work of identifying the junk information is transferred to a network side server to be carried out, so that the burden of an iphone or Bluetooth device can be reduced, and the processing efficiency is improved.
Although iPhone is taken as an example for many times, the present invention may be applied to other smartphones and non-smartphones that support the MAP protocol, in addition to iPhone.
Corresponding to the method, the invention provides a junk information intercepting device for a mobile terminal running in an iOS operating system, and the device is positioned at the side of the mobile terminal. Referring to fig. 7, the apparatus includes:
a MAP connection establishing unit 701 configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
a MAP communication unit 702 for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
an information processing unit 703, configured to delete information when the MAP communication unit 702 receives the request message.
Preferably, the apparatus further comprises:
a security management application control unit 704, configured to receive the information provided by the MAP device, perform identification of whether the information is spam, and send an identification result to the MAP device.
Preferably, the security management application control unit 704 is specifically configured to match the information according to the information base set locally or downloaded locally from a network side server, so as to identify whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the security management application control unit 704 is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the apparatus further comprises:
a spam backup unit 705 for backing up the information in a security management application running in the mobile terminal.
Corresponding to the method, the invention also provides a device for intercepting the junk information, which is used for intercepting the junk information of the mobile terminal running in the iOS operating system through the MAP equipment, and the device is positioned at the MAP equipment side. Referring to fig. 8, the apparatus includes:
a MAP connection establishing unit 801 for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit 802 for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam recognition result to the mobile terminal;
a spam recognition result obtaining unit 803, configured to obtain a spam recognition result, where the spam recognition result is a result of matching the information in a preset information base.
Preferably, the apparatus further comprises:
and the Bluetooth communication unit 804 is used for sending the information to a security management application program running on the mobile terminal and receiving a junk information identification result returned by the security management application program.
Preferably, the apparatus further comprises:
an information base obtaining unit 805, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
an identifying unit 806, configured to perform identification on whether the information is spam according to the information base.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the identifying unit 806 is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the apparatus further comprises:
a server communication unit 807 for transmitting the information to a network side server; and receiving a spam identification result returned by the network side server.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of the apparatus for interception of spam according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
Therefore, the invention at least discloses the following scheme:
a1, a method for intercepting spam, which is used for a mobile terminal running in an iOS operating system, the method comprises:
establishing MAP connection between the mobile terminal and an information access protocol (MAP) device;
after receiving the information, the mobile terminal sends the information to the MAP equipment through the MAP connection;
matching the information in a preset information base, and identifying whether the information is junk information;
if so, the MAP equipment sends a request message for deleting the information to the mobile terminal.
A2, the method as in A1, further comprising, after the MAP receives the information:
the MAP device sends the information to a security management application program running on the mobile terminal;
performing, by the security management application, an identification of whether the information is spam;
the security management application sends the identification result to the MAP device.
A3, the method of A2, the identifying, by the security management application, whether the information is spam, comprising:
the security management application program matches the information according to the information base which is locally set or downloaded to the local from a network side server, so as to identify whether the information is junk information; or,
and the safety management application program sends the information to a network side server, and the network side server identifies whether the information is junk information according to the information base set by the network side server and receives an identification result returned by the network side server.
A4, the method of A2, wherein the MAP device and the security management application communicate via Bluetooth 4.0 protocol.
A5, method according to A1,
setting the information base in the MAP device, or downloading the information base from a network side server by the MAP device, or receiving the information base from a security management application program running on the mobile terminal by the MAP device;
and identifying whether the information is junk information or not according to the information base by the MAP equipment.
A6, the method as in A1, further comprising, after the MAP receives the information:
the MAP equipment sends the information to a network side server;
the network side server identifies whether the information is junk information according to the information base set by the network side server;
and the network side server sends the identification result to the MAP equipment.
A7, the method of any one of A1-A6, wherein the information bases comprise blacklist and whitelist databases of spam.
A8, the method as in a7, wherein the matching the information in a preset information base, and the identifying whether the information is spam, comprises:
extracting the sending number and/or the information abstract of the information, and matching the number and/or the information abstract in the blacklist and/or the white list;
and determining whether the information is junk information according to the matching result.
A9, the method according to any of a1-a6, further comprising, after the MAP device sends a request message to the mobile terminal to delete the information:
the mobile terminal returns a response to the deletion request to the MAP device, and the mobile terminal backs up the information in a security management application running in the mobile terminal.
B10, a spam intercepting device for a mobile terminal running in an iOS operating system, the device being located at the side of the mobile terminal, the device comprising:
MAP connection establishing unit, which is used for establishing MAP connection between the mobile terminal and information access protocol MAP equipment;
a MAP communication unit for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
and an information processing unit configured to delete the information when the MAP communication unit receives the request message.
B11, the apparatus of B10, further comprising:
and the safety management application program control unit is used for receiving the information provided by the MAP equipment, identifying whether the information is garbage information or not and sending an identification result to the MAP equipment.
B12, the apparatus according to B11, wherein the security management application control unit is specifically configured to match the information according to the information base set locally or downloaded locally from a network-side server, so as to identify whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
B13, the apparatus as in B12, the information bases including blacklist and whitelist databases of spam information.
B14, the apparatus according to B13, wherein the security management application control unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
The device of any one of B15, B10-B14, further comprising: and the junk information backup unit is used for backing up the information in a safety management application program running in the mobile terminal.
C16, a device for intercepting spam, configured to intercept spam of a mobile terminal running in an iOS operating system through a MAP device, where the device is located on the MAP device side, and the device includes:
a MAP connection establishing unit for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam identification result to the mobile terminal;
and the junk information identification result acquisition unit is used for acquiring a junk information identification result, wherein the junk information identification result is obtained by matching the information in a preset information base.
C17, the apparatus of C16, further comprising:
and the Bluetooth communication unit is used for sending the information to a safety management application program running on the mobile terminal and receiving a junk information identification result returned by the safety management application program.
C18, the apparatus of C16, further comprising:
an information base obtaining unit, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
and the identification unit is used for identifying whether the information is the junk information according to the information base.
C19, the apparatus of C18, the information base comprising a blacklist database and a whitelist database of spam.
C20, the apparatus according to C19, wherein the identifying unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
C21, the apparatus of C16, further comprising:
the server communication unit is used for sending the information to a network side server; and receiving a spam identification result returned by the network side server.

Claims (21)

1. A method for intercepting spam, which is used for a mobile terminal running in an iOS operating system, the method comprising:
establishing MAP connection between the mobile terminal and an information access protocol (MAP) device;
after receiving the information, the mobile terminal sends the information to the MAP equipment through the MAP connection;
matching the information in a preset information base, and identifying whether the information is junk information;
if so, the MAP equipment sends a request message for deleting the information to the mobile terminal.
2. The method of claim 1, wherein after the MAP receives the information, further comprising:
the MAP device sends the information to a security management application program running on the mobile terminal;
performing, by the security management application, an identification of whether the information is spam;
the security management application sends the identification result to the MAP device.
3. The method of claim 2, wherein said identifying by the security management application whether the information is spam comprises:
the security management application program matches the information according to the information base which is locally set or downloaded to the local from a network side server, so as to identify whether the information is junk information; or,
and the safety management application program sends the information to a network side server, and the network side server identifies whether the information is junk information according to the information base set by the network side server and receives an identification result returned by the network side server.
4. The method of claim 2, wherein the MAP device and the security management application communicate via a bluetooth 4.0 protocol.
5. The method of claim 1,
setting the information base in the MAP device, or downloading the information base from a network side server by the MAP device, or receiving the information base from a security management application program running on the mobile terminal by the MAP device;
the identifying whether the information is spam includes: and identifying whether the information is junk information or not according to the information base by the MAP equipment.
6. The method of claim 1, wherein after the MAP receives the information, further comprising:
the MAP equipment sends the information to a network side server;
the network side server identifies whether the information is junk information according to the information base set by the network side server;
and the network side server sends the identification result to the MAP equipment.
7. The method of any of claims 1-6, wherein the information repositories include blacklist and whitelist databases of spam information.
8. The method of claim 7, wherein said matching said information in a pre-set library of information to identify whether said information is spam comprises:
extracting the sending number and/or the information abstract of the information, and matching the number and/or the information abstract in the blacklist and/or the white list;
and determining whether the information is junk information according to the matching result.
9. The method of any of claims 1-6, further comprising, after the MAP device sends a request message to the mobile terminal to delete the information:
the mobile terminal returns a response to the deletion request to the MAP device, and the mobile terminal backs up the information in a security management application running in the mobile terminal.
10. An interception apparatus of spam, which is used for a mobile terminal running in an iOS operating system, the apparatus is located at the mobile terminal side, the apparatus comprises:
MAP connection establishing unit, which is used for establishing MAP connection between the mobile terminal and information access protocol MAP equipment;
a MAP communication unit for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
and an information processing unit configured to delete the information when the MAP communication unit receives the request message.
11. The apparatus of claim 10, further comprising:
and the safety management application program control unit is used for receiving the information provided by the MAP equipment, identifying whether the information is garbage information or not and sending an identification result to the MAP equipment.
12. The apparatus of claim 11, wherein the security management application control unit is specifically configured to match the information according to the information base set locally or downloaded locally from a network-side server, thereby identifying whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
13. The apparatus of claim 12, wherein the information bases comprise a blacklist database and a whitelist database of spam information.
14. The apparatus of claim 13, wherein the security management application control unit is specifically configured to extract a sending number and/or a message digest of the message, and match the number and/or the message digest in the blacklist and/or whitelist; and determining whether the information is junk information according to the matching result.
15. The apparatus of any of claims 10-14, further comprising: and the junk information backup unit is used for backing up the information in a safety management application program running in the mobile terminal.
16. An interception apparatus of spam, configured to intercept spam of a mobile terminal operating in an iOS operating system through a MAP device, the apparatus being located on the MAP device side, the apparatus comprising:
a MAP connection establishing unit for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam identification result to the mobile terminal;
and the junk information identification result acquisition unit is used for acquiring a junk information identification result, wherein the junk information identification result is obtained by matching the information in a preset information base.
17. The apparatus of claim 16, further comprising:
and the Bluetooth communication unit is used for sending the information to a safety management application program running on the mobile terminal and receiving a junk information identification result returned by the safety management application program.
18. The apparatus of claim 16, further comprising:
an information base obtaining unit, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
and the identification unit is used for identifying whether the information is the junk information according to the information base.
19. The apparatus of claim 18, wherein the information base comprises a blacklist database and a whitelist database of spam information.
20. The apparatus according to claim 19, wherein the identifying unit is specifically configured to extract a transmission number and/or a message digest of the message, and match the number and/or the message digest in the blacklist and/or whitelist; and determining whether the information is junk information according to the matching result.
21. The apparatus of claim 16, further comprising:
the server communication unit is used for sending the information to a network side server; and receiving a spam identification result returned by the network side server.
CN201510921281.9A 2015-12-11 2015-12-11 The hold-up interception method and device of junk information Active CN105491239B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510921281.9A CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information
PCT/CN2016/109229 WO2017097258A1 (en) 2015-12-11 2016-12-09 Spam blocking method and apparatus, computer program, and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510921281.9A CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information

Publications (2)

Publication Number Publication Date
CN105491239A CN105491239A (en) 2016-04-13
CN105491239B true CN105491239B (en) 2018-10-12

Family

ID=55677935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510921281.9A Active CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information

Country Status (2)

Country Link
CN (1) CN105491239B (en)
WO (1) WO2017097258A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491239B (en) * 2015-12-11 2018-10-12 北京奇虎科技有限公司 The hold-up interception method and device of junk information
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium
CN110677821B (en) * 2019-10-17 2021-08-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time
CN111666525B (en) * 2020-06-17 2023-09-29 北京航天时代光电科技有限公司 Information interception system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2290906A1 (en) * 2009-08-28 2011-03-02 TeliaSonera AB Mobile service advertiser
WO2012174821A1 (en) * 2011-06-22 2012-12-27 中兴通讯股份有限公司 Method and system for monitoring spam short message and monitoring processing device
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN104954533A (en) * 2014-03-24 2015-09-30 北京奇虎科技有限公司 Method, device and system for junk call interception on basis of intelligent communication terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4978638B2 (en) * 2009-02-18 2012-07-18 株式会社デンソー Car-mounted device and mobile phone with hands-free function
CN104735631B (en) * 2014-12-09 2019-05-10 惠州Tcl移动通信有限公司 The method and system of simultaneously operating note data
CN105491239B (en) * 2015-12-11 2018-10-12 北京奇虎科技有限公司 The hold-up interception method and device of junk information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2290906A1 (en) * 2009-08-28 2011-03-02 TeliaSonera AB Mobile service advertiser
WO2012174821A1 (en) * 2011-06-22 2012-12-27 中兴通讯股份有限公司 Method and system for monitoring spam short message and monitoring processing device
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104954533A (en) * 2014-03-24 2015-09-30 北京奇虎科技有限公司 Method, device and system for junk call interception on basis of intelligent communication terminal
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text

Also Published As

Publication number Publication date
CN105491239A (en) 2016-04-13
WO2017097258A1 (en) 2017-06-15

Similar Documents

Publication Publication Date Title
CN109417696B (en) Method and entity for ending subscription
CN105812479B (en) Request method and device and acquisition method and device for use permission
CN105491239B (en) The hold-up interception method and device of junk information
TWI559787B (en) Mobile network operator identification
CN108702386B (en) Method and device for managing configuration file of embedded universal integrated circuit card
CA2700174C (en) Apparatus and methods for network identification of open market wireless devices
CN109495433B (en) Data downloading method and device, storage medium and electronic device
WO2012091349A2 (en) System and method for managing mobile wallet and its related credentials
JP5870471B2 (en) Method, apparatus, and system for sharing software between terminals
DE112015004267T5 (en) Storage and transfer of application data between devices
CN105100220A (en) Drug information sharing method, client and server
CN108712439B (en) User information management method, device, server and storage medium
KR102538663B1 (en) Electronic device, external electronic device and method for managing embedded subscriber identity module of the external electronic device
WO2016179966A1 (en) Method for realizing network access, terminal and computer storage medium
US11109201B2 (en) Device and method for provisioning services to mobile communication device
CN107852603A (en) The method and apparatus of terminal authentication
US11140554B2 (en) Management of a multi-SIM offer with multiple activation codes
CN106934272B (en) Application information verification method and device
CN104601448A (en) Method and device for handling virtual card
CN109040050A (en) Data interactive method and Related product
WO2016078090A1 (en) Charging control device, method and system
CN104410679A (en) Method, client terminal, server and system of extracting shared file/file folder
CN112738019A (en) Method and device for displaying device information, storage medium and electronic device
CN102271095A (en) Community platform-based batch processing transmission method and instant communication server
CN109348472B (en) OTA (over the air) upgrading method and system based on single-point pushing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211206

Address after: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, high tech Zone, Binhai New Area, Tianjin

Patentee after: 3600 Technology Group Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230713

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing Hongxiang Technical Service Co.,Ltd.

Address before: 300450 No. 9-3-401, No. 39, Gaoxin 6th Road, Binhai Science Park, high tech Zone, Binhai New Area, Tianjin

Patentee before: 3600 Technology Group Co.,Ltd.

TR01 Transfer of patent right
CP03 Change of name, title or address

Address after: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: Beijing 360 Zhiling Technology Co.,Ltd.

Country or region after: China

Address before: 1765, floor 17, floor 15, building 3, No. 10 Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee before: Beijing Hongxiang Technical Service Co.,Ltd.

Country or region before: China