Disclosure of Invention
In view of the above problems, the present invention is proposed to provide a method and apparatus for intercepting spam, which overcomes or at least partially solves the above problems.
According to an aspect of the present invention, there is provided a method for intercepting spam, which is used for a mobile terminal running in an iOS operating system, the method comprising:
establishing MAP connection between the mobile terminal and an information access protocol (MAP) device;
after receiving the information, the mobile terminal sends the information to the MAP equipment through the MAP connection;
matching the information in a preset information base, and identifying whether the information is junk information;
if so, the MAP equipment sends a request message for deleting the information to the mobile terminal.
Preferably, after the MAP receives the information, the method further includes:
the MAP device sends the information to a security management application program running on the mobile terminal;
performing, by the security management application, an identification of whether the information is spam;
the security management application sends the identification result to the MAP device.
Preferably, the identifying, performed by the security management application, whether the information is spam includes:
the security management application program matches the information according to the information base which is locally set or downloaded to the local from a network side server, so as to identify whether the information is junk information; or,
and the safety management application program sends the information to a network side server, and the network side server identifies whether the information is junk information according to the information base set by the network side server and receives an identification result returned by the network side server.
Preferably, the MAP device and the security management application communicate via a bluetooth 4.0 protocol.
Preferably, the first and second liquid crystal materials are,
setting the information base in the MAP device, or downloading the information base from a network side server by the MAP device, or receiving the information base from a security management application program running on the mobile terminal by the MAP device;
and identifying whether the information is junk information or not according to the information base by the MAP equipment.
Preferably, after the MAP receives the information, the method further includes:
the MAP equipment sends the information to a network side server;
the network side server identifies whether the information is junk information according to the information base set by the network side server;
and the network side server sends the identification result to the MAP equipment.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the matching the information in a preset information base, and identifying whether the information is spam, includes:
extracting the sending number and/or the information abstract of the information, and matching the number and/or the information abstract in the blacklist and/or the white list;
and determining whether the information is junk information according to the matching result.
Preferably, after the MAP device sends a request message for deleting the information to the mobile terminal, the method further includes:
the mobile terminal returns a response to the deletion request to the MAP device, and the mobile terminal backs up the information in a security management application running in the mobile terminal.
An interception apparatus of spam for a mobile terminal running in an iOS operating system, the apparatus being located at a mobile terminal side, the apparatus comprising:
MAP connection establishing unit, which is used for establishing MAP connection between the mobile terminal and information access protocol MAP equipment;
a MAP communication unit for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
and an information processing unit configured to delete the information when the MAP communication unit receives the request message.
Preferably, the method further comprises the following steps:
and the safety management application program control unit is used for receiving the information provided by the MAP equipment, identifying whether the information is garbage information or not and sending an identification result to the MAP equipment.
Preferably, the security management application control unit is specifically configured to match the information according to the information base set locally or downloaded locally from a network side server, so as to identify whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the security management application control unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the method further comprises the following steps: and the junk information backup unit is used for backing up the information in a safety management application program running in the mobile terminal.
A garbage information interception apparatus for intercepting garbage information of a mobile terminal running in an iOS operating system through a MAP device, the apparatus being located on the MAP device side, the apparatus comprising:
a MAP connection establishing unit for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam identification result to the mobile terminal;
and the junk information identification result acquisition unit is used for acquiring a junk information identification result, wherein the junk information identification result is obtained by matching the information in a preset information base.
Preferably, the method further comprises the following steps:
and the Bluetooth communication unit is used for sending the information to a safety management application program running on the mobile terminal and receiving a junk information identification result returned by the safety management application program.
Preferably, the method further comprises the following steps:
an information base obtaining unit, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
and the identification unit is used for identifying whether the information is the junk information according to the information base.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the identification unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the method further comprises the following steps:
the server communication unit is used for sending the information to a network side server; and receiving a spam identification result returned by the network side server.
Therefore, the MAP connection between the MAP equipment and the mobile terminal is established based on the MAP protocol, so that the MAP equipment can acquire the information received by the mobile terminal and then identify the junk information, and finally the MAP equipment sends a request for deleting the information to the mobile terminal through the MAP protocol based on the identification result of the junk information, thereby achieving the purpose of intercepting the junk information. Therefore, the method and the device solve the problem that the general App cannot intercept the junk information due to the fact that the mobile terminal running the iOS system is closed, and identify and feed back the junk information by means of the MAP equipment based on the characteristic that the mobile terminal running the iOS system supports the MAP protocol, so that the purpose of intercepting the junk information is achieved, and user experience is improved.
In a preferred embodiment of the invention, by means of interaction between the Bluetooth device and the iPhone App, the user feels that the App running on the iPhone also has the function of intercepting junk short messages. For example, a user installs an App such as a security guard on an iPhone, the App interacts with a bluetooth device in a background (the user does not feel), and the user feels that the App has a function of intercepting junk information in the foreground. The application of the safety class App on the terminal based on the iOS system is expanded, and the user experience is improved.
In another embodiment of the invention, the identification of the junk information can be completed only by the Bluetooth device, and the iphone can be informed to delete the junk information only by the Bluetooth device.
In another embodiment of the invention, the identification of the junk information can be completed by the Bluetooth device and the network side server, and the iPhone is informed to delete the junk information through the Bluetooth device. The method has certain advantages that the junk information identification is carried out through the network side server, firstly, the network side server is large in capacity and rich in resources, so that an information base with larger capacity can be set, and the junk information identification can be updated in real time; secondly, the work of identifying the junk information is transferred to a network side server to be carried out, so that the burden of an iphone or Bluetooth device can be reduced, and the processing efficiency is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As described above, since the iOS system-based terminal such as the iPhone is a closed source, an application (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program of the iOS system itself, and therefore, the secure management App cannot directly intercept spam information as in an open-source mobile phone (e.g., a mobile phone based on an android system).
Therefore, the invention provides that based on a MAP (Message Access Profile) protocol supported by the iPhone, the MAP equipment receives information notification (including short messages and multimedia messages) of the iPhone through the MAP protocol, and if the information is junk information, the MAP equipment sends a request for deleting the information to the iPhone through the MAP protocol, so as to intercept the junk information.
Referring to fig. 1, a flowchart of a method for intercepting spam according to an embodiment of the present invention is shown. The method is used for intercepting the junk information of the mobile terminal running in the iOS operating system. Specifically, the method includes the following steps S101 to S104.
S101: a MAP connection between the mobile terminal and the MAP device is established.
As known to those skilled in the art, the MAP protocol is a bluetooth short message access specification, and defines a process for a bluetooth device to access a short message on a mobile phone. In the present invention, the MAP device refers to a device supporting the MAP protocol, including but not limited to current and future bluetooth devices, such as bluetooth headset adapters, bluetooth gateways, etc.
As to the manner of establishing the MAP connection between the mobile terminal and the MAP device, reference may be made to the flow illustrated in fig. 2. The MAP device establishes a Message Access service session (MAS) with a mobile terminal (for example, an iPhone), registers Notification, and establishes a Message Notification service session (MNS) with the iPhone.
In the MAP protocol, the registration message notification may be implemented as follows:
SetNotificationRegistration_Req(...,NotificationStatus=‘on’,...)。
s102: after receiving the information, the mobile terminal transmits the information to the MAP device through the MAP connection.
With regard to the mobile terminal sending the received information to the MAP device via the MAP connection, please continue with the flow illustrated in fig. 2. When the mobile terminal receives the short message or the multimedia message, the mobile terminal sends the received short message or the multimedia message to the MAP equipment by triggering an event, and at the moment, the MAP equipment responds to the mobile terminal and confirms that the short message or the multimedia message is received.
In the MAP protocol, the message notification may be implemented as follows: SendEvent _ Req (…).
S103: and matching the information in a preset information base to identify whether the information is junk information.
The information bases are preset, and for example, the set information bases comprise a blacklist database and a white list database of the junk information. During specific identification, extracting a sending number and/or an information abstract of the information, and matching the number and/or the information abstract in a black list and/or a white list; and determining whether the information is junk information according to the matching result. In a simpler manner, spam is identified only by the sending number, and in a preferred manner, the sending number is combined with an information abstract (information feature code) for identification, so that the spam can be identified more accurately.
The identification of the spam may be performed by different subjects, for example, the identification may be performed on the MAP, or the identification may be performed by the third device after the MAP device sends the spam to the third device.
S104: if the spam is identified, the MAP device transmits a request message for deleting information to the mobile terminal.
For the procedure of the MAP device notifying the mobile terminal to delete the spam, see fig. 3. In MNS session establishment between the MAP equipment and the mobile terminal, extracting MSE short message notification, and after identifying that the information is junk information, the MAP equipment sends a request for deleting the information to the mobile terminal; on the mobile terminal side, a response to the deletion request is returned to the MAP device.
In the MAP protocol, the delete information request may be implemented as follows:
SetMessageStatus_Req(…,‘deletedStatus,‘deleted’…)。
it can be seen that, according to the scheme of the first embodiment, the MAP connection between the MAP device and the mobile terminal is established based on the MAP protocol, so that the MAP device can acquire information received by the mobile terminal, and then perform recognition of spam, and finally the MAP device sends a request for deleting information to the mobile terminal based on the recognition result of spam through the MAP protocol, thereby achieving the purpose of intercepting spam. Therefore, the method and the device solve the problem that the general App cannot intercept the junk information due to the fact that the mobile terminal running the iOS system is closed, and identify and feed back the junk information by means of the MAP equipment based on the characteristic that the mobile terminal running the iOS system supports the MAP protocol, so that the purpose of intercepting the junk information is achieved, and user experience is improved.
Referring to fig. 4, a flowchart of a method for intercepting spam according to a second embodiment of the present invention is shown. In a second embodiment, a security management application (e.g. security guard software running on iphone) running on the mobile terminal is introduced, which undertakes the work of spam identification and feeds back the identification result to the MAP device, which sends a request for deleting information to the mobile terminal according to the identification result.
For greater intuition, in fig. 4, the mobile terminal is embodied in an iphone, the MAP device is embodied in a bluetooth device, and the security management application is embodied in an iphone App.
Referring to fig. 4, the second embodiment includes the steps of:
s401: establishing MAS session between the Bluetooth equipment and the iphone;
s402: an MNS session is established between the Bluetooth equipment and the iphone;
s403: the iphone receives information (short messages or multimedia messages and the like);
s404: the iphone sends a notification message to the Bluetooth equipment and provides the received information to the Bluetooth equipment by means of the notification message;
s405: the Bluetooth equipment sends a notification message to the iphone App and provides the received information to the iphone App by means of the notification message;
s406: the iphone App identifies the junk information based on the information base;
s407: the iphone App returns the identification result to the Bluetooth equipment;
s408: if the information is identified to be junk information, the Bluetooth equipment sends an information deleting request to the iphone;
s409: deleting the junk information by the iphone;
s410: the iphone returns a delete request response to the bluetooth device.
Preferably, in the above flow, steps S401, S402, S404, S408, and S410 of interaction between the iPhone and the bluetooth device are based on the MAP protocol, and steps S405 and S407 of interaction between the bluetooth device and the iPhone App are based on the bluetooth 4.0 protocol.
For the interaction between the iphone and the bluetooth device based on the MAP protocol, reference may be made specifically to the description of the first embodiment.
The bluetooth 4.0 protocol communication can be adopted between the bluetooth device and the iPhone App, and can be realized by read, write and notification of parameters (charctertic). At this time, both the bluetooth device and the iPhone (iPhoneApp) may be used as a central device or a peripheral device, respectively, the peripheral device needs to start the bluetooth service first, and the central device may search for the peripheral device in advance and register a notification, or may search for the peripheral device when necessary. Therefore, it is possible to establish connection between the bluetooth device and the iPhone App in advance and not. The process of the part is flexible, and which device is used as the peripheral device and which device is used as the central device can be adjusted according to privacy security.
For step S406, the iPhone App identifies spam based on the information base, and there may be a variety of specific implementation manners. The iPhone App sets an information base locally or downloads the information base from a network side server, and identifies information by using the locally set information base or the information base downloaded to the local; and the other is that the iPhone App does not set or store an information base locally, but sends the information to a network side server, and the network side server identifies the junk information according to the information base and then returns the identification result to the iPhone App. In either case, the identification of spam information is dominated by the iPhone App and the identification result is provided to the bluetooth device in step S407.
In addition, when the iPhone deletes the junk information, the junk information can be stored in the iPhone App, so that the user is allowed to subsequently check which junk information is intercepted through the App.
Therefore, in the second embodiment, by means of interaction between the bluetooth device and the iPhone App, the user feels that the App running on the iPhone also has the function of intercepting spam messages. For example, a user installs an App such as a security guard on an iPhone, the App interacts with a bluetooth device in a background (the user does not feel), and the user feels that the App has a function of intercepting junk information in the foreground. The application of the safety class App on the terminal based on the iOS system is expanded, and the user experience is improved.
Referring to fig. 5, a flowchart of a method for intercepting spam according to a third embodiment of the present invention is shown. In a third embodiment, the identification of spam is handled by the MAP device itself.
For greater intuition, in fig. 5, the mobile terminal is embodied as an iphone and the MAP device is embodied as a bluetooth device.
Referring to fig. 5, the third embodiment includes the steps of:
s501: establishing MAS session between the Bluetooth equipment and the iphone;
s502: an MNS session is established between the Bluetooth equipment and the iphone;
s503: the iphone receives information (short messages or multimedia messages and the like);
s504: the iphone sends a notification message to the Bluetooth equipment and provides the received information to the Bluetooth equipment by means of the notification message;
s505: the Bluetooth equipment identifies the junk information based on the information base;
s506: if the information is identified to be junk information, the Bluetooth equipment sends an information deleting request to the iphone;
s507: deleting the junk information by the iphone;
s508: the iphone returns a delete request response to the bluetooth device.
For step S505, the bluetooth device identifies the spam based on the information base, and there may be a plurality of specific implementation manners. The Bluetooth device sets an information base locally, the Bluetooth device downloads the information base from a network side server, and the Bluetooth device acquires the information base from an App running on an iphone. In any mode, the Bluetooth device finally obtains the information base on the device of the Bluetooth device, and then the junk information is locally identified based on the information base.
Therefore, in the third embodiment, the identification of the spam information can be completed only by the bluetooth device, and the iphone can be notified to delete the spam information only by the bluetooth device.
Referring to fig. 6, a flowchart of a method for intercepting spam according to a fourth embodiment of the present invention is shown. In a fourth embodiment, a network-side server is introduced, and the MAP device identifies spam information by means of the network-side server.
For greater intuition, in fig. 6, the mobile terminal is embodied as an iphone and the MAP device is embodied as a bluetooth device.
Referring to fig. 6, the fourth embodiment includes the steps of:
s601: establishing MAS session between the Bluetooth equipment and the iphone;
s602: an MNS session is established between the Bluetooth equipment and the iphone;
s603: the iphone receives information (short messages or multimedia messages and the like);
s604: the iphone sends a notification message to the Bluetooth equipment and provides the received information to the Bluetooth equipment by means of the notification message;
s605: the Bluetooth equipment sends a notification message to a network side server, and provides the received information to the network side server by means of the notification message;
s606: the network side server identifies the junk information based on the information base;
s607: the network side server returns the identification result to the Bluetooth equipment;
s608: if the information is identified to be junk information, the Bluetooth equipment sends an information deleting request to the iphone;
s609: deleting the junk information by the iphone;
s610: the iphone returns a delete request response to the bluetooth device.
It can be seen that, in the fourth embodiment, the identification of the spam information can be completed by the bluetooth device and the network side server, and the iphone is notified to delete the spam information by the bluetooth device. The method has certain advantages that the junk information identification is carried out through the network side server, firstly, the network side server is large in capacity and rich in resources, so that an information base with larger capacity can be set, and the junk information identification can be updated in real time; secondly, the work of identifying the junk information is transferred to a network side server to be carried out, so that the burden of an iphone or Bluetooth device can be reduced, and the processing efficiency is improved.
Although iPhone is taken as an example for many times, the present invention may be applied to other smartphones and non-smartphones that support the MAP protocol, in addition to iPhone.
Corresponding to the method, the invention provides a junk information intercepting device for a mobile terminal running in an iOS operating system, and the device is positioned at the side of the mobile terminal. Referring to fig. 7, the apparatus includes:
a MAP connection establishing unit 701 configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
a MAP communication unit 702 for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
an information processing unit 703, configured to delete information when the MAP communication unit 702 receives the request message.
Preferably, the apparatus further comprises:
a security management application control unit 704, configured to receive the information provided by the MAP device, perform identification of whether the information is spam, and send an identification result to the MAP device.
Preferably, the security management application control unit 704 is specifically configured to match the information according to the information base set locally or downloaded locally from a network side server, so as to identify whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the security management application control unit 704 is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the apparatus further comprises:
a spam backup unit 705 for backing up the information in a security management application running in the mobile terminal.
Corresponding to the method, the invention also provides a device for intercepting the junk information, which is used for intercepting the junk information of the mobile terminal running in the iOS operating system through the MAP equipment, and the device is positioned at the MAP equipment side. Referring to fig. 8, the apparatus includes:
a MAP connection establishing unit 801 for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit 802 for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam recognition result to the mobile terminal;
a spam recognition result obtaining unit 803, configured to obtain a spam recognition result, where the spam recognition result is a result of matching the information in a preset information base.
Preferably, the apparatus further comprises:
and the Bluetooth communication unit 804 is used for sending the information to a security management application program running on the mobile terminal and receiving a junk information identification result returned by the security management application program.
Preferably, the apparatus further comprises:
an information base obtaining unit 805, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
an identifying unit 806, configured to perform identification on whether the information is spam according to the information base.
Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
Preferably, the identifying unit 806 is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
Preferably, the apparatus further comprises:
a server communication unit 807 for transmitting the information to a network side server; and receiving a spam identification result returned by the network side server.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of the apparatus for interception of spam according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
Therefore, the invention at least discloses the following scheme:
a1, a method for intercepting spam, which is used for a mobile terminal running in an iOS operating system, the method comprises:
establishing MAP connection between the mobile terminal and an information access protocol (MAP) device;
after receiving the information, the mobile terminal sends the information to the MAP equipment through the MAP connection;
matching the information in a preset information base, and identifying whether the information is junk information;
if so, the MAP equipment sends a request message for deleting the information to the mobile terminal.
A2, the method as in A1, further comprising, after the MAP receives the information:
the MAP device sends the information to a security management application program running on the mobile terminal;
performing, by the security management application, an identification of whether the information is spam;
the security management application sends the identification result to the MAP device.
A3, the method of A2, the identifying, by the security management application, whether the information is spam, comprising:
the security management application program matches the information according to the information base which is locally set or downloaded to the local from a network side server, so as to identify whether the information is junk information; or,
and the safety management application program sends the information to a network side server, and the network side server identifies whether the information is junk information according to the information base set by the network side server and receives an identification result returned by the network side server.
A4, the method of A2, wherein the MAP device and the security management application communicate via Bluetooth 4.0 protocol.
A5, method according to A1,
setting the information base in the MAP device, or downloading the information base from a network side server by the MAP device, or receiving the information base from a security management application program running on the mobile terminal by the MAP device;
and identifying whether the information is junk information or not according to the information base by the MAP equipment.
A6, the method as in A1, further comprising, after the MAP receives the information:
the MAP equipment sends the information to a network side server;
the network side server identifies whether the information is junk information according to the information base set by the network side server;
and the network side server sends the identification result to the MAP equipment.
A7, the method of any one of A1-A6, wherein the information bases comprise blacklist and whitelist databases of spam.
A8, the method as in a7, wherein the matching the information in a preset information base, and the identifying whether the information is spam, comprises:
extracting the sending number and/or the information abstract of the information, and matching the number and/or the information abstract in the blacklist and/or the white list;
and determining whether the information is junk information according to the matching result.
A9, the method according to any of a1-a6, further comprising, after the MAP device sends a request message to the mobile terminal to delete the information:
the mobile terminal returns a response to the deletion request to the MAP device, and the mobile terminal backs up the information in a security management application running in the mobile terminal.
B10, a spam intercepting device for a mobile terminal running in an iOS operating system, the device being located at the side of the mobile terminal, the device comprising:
MAP connection establishing unit, which is used for establishing MAP connection between the mobile terminal and information access protocol MAP equipment;
a MAP communication unit for transmitting information to the MAP device through the MAP connection after the mobile terminal receives the information; receiving a request message for deleting the information, which is sent by the MAP device, wherein the request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
and an information processing unit configured to delete the information when the MAP communication unit receives the request message.
B11, the apparatus of B10, further comprising:
and the safety management application program control unit is used for receiving the information provided by the MAP equipment, identifying whether the information is garbage information or not and sending an identification result to the MAP equipment.
B12, the apparatus according to B11, wherein the security management application control unit is specifically configured to match the information according to the information base set locally or downloaded locally from a network-side server, so as to identify whether the information is spam; or the information is sent to a network side server, the network side server identifies whether the information is junk information according to the information base set by the network side server, and receives an identification result returned by the network side server.
B13, the apparatus as in B12, the information bases including blacklist and whitelist databases of spam information.
B14, the apparatus according to B13, wherein the security management application control unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
The device of any one of B15, B10-B14, further comprising: and the junk information backup unit is used for backing up the information in a safety management application program running in the mobile terminal.
C16, a device for intercepting spam, configured to intercept spam of a mobile terminal running in an iOS operating system through a MAP device, where the device is located on the MAP device side, and the device includes:
a MAP connection establishing unit for establishing a MAP connection between the MAP device and the mobile terminal;
a MAP communication unit for receiving information transmitted from the mobile terminal and transmitting a request message for deleting the information based on a spam identification result to the mobile terminal;
and the junk information identification result acquisition unit is used for acquiring a junk information identification result, wherein the junk information identification result is obtained by matching the information in a preset information base.
C17, the apparatus of C16, further comprising:
and the Bluetooth communication unit is used for sending the information to a safety management application program running on the mobile terminal and receiving a junk information identification result returned by the safety management application program.
C18, the apparatus of C16, further comprising:
an information base obtaining unit, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal;
and the identification unit is used for identifying whether the information is the junk information according to the information base.
C19, the apparatus of C18, the information base comprising a blacklist database and a whitelist database of spam.
C20, the apparatus according to C19, wherein the identifying unit is specifically configured to extract a sending number and/or an information digest of the information, and match the number and/or the information digest in the blacklist and/or the whitelist; and determining whether the information is junk information according to the matching result.
C21, the apparatus of C16, further comprising:
the server communication unit is used for sending the information to a network side server; and receiving a spam identification result returned by the network side server.