WO2017097258A1 - Spam blocking method and apparatus, computer program, and readable medium - Google Patents

Spam blocking method and apparatus, computer program, and readable medium Download PDF

Info

Publication number
WO2017097258A1
WO2017097258A1 PCT/CN2016/109229 CN2016109229W WO2017097258A1 WO 2017097258 A1 WO2017097258 A1 WO 2017097258A1 CN 2016109229 W CN2016109229 W CN 2016109229W WO 2017097258 A1 WO2017097258 A1 WO 2017097258A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
spam
map
mobile terminal
network side
Prior art date
Application number
PCT/CN2016/109229
Other languages
French (fr)
Chinese (zh)
Inventor
张福生
于鲲鹏
Original Assignee
北京奇虎科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京奇虎科技有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2017097258A1 publication Critical patent/WO2017097258A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Definitions

  • the present invention relates to the field of network security technologies, and in particular, to a method for intercepting spam, a device for intercepting spam, a computer program, and a computer readable medium.
  • the iOS system is a closed source operating system. Due to its development permissions, applications running on the iOS system cannot access or control the system itself. For example, the currently popular iPhone is a closed mobile phone system that does not open source code to users.
  • the present invention has been made in order to provide a method and apparatus for intercepting spam that overcomes the above problems or at least partially solves the above problems.
  • a method for intercepting spam for a mobile terminal running in an iOS operating system, the method comprising:
  • the mobile terminal After receiving the information, the mobile terminal sends the information to the MAP device through the MAP connection;
  • the MAP device sends a request message to the mobile terminal to delete the information.
  • a spam intercepting apparatus for a mobile terminal running on an iOS operating system, the apparatus being located on a mobile terminal side, the apparatus comprising:
  • a MAP connection establishing unit configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
  • a MAP communication unit configured to: after the mobile terminal receives the information, send the information to the MAP device by using the MAP connection; and receive a request message that is sent by the MAP device to delete the information, where The request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
  • An information processing unit configured to delete information when the MAP communication unit receives the request message.
  • the embodiment of the present invention further provides a device for intercepting spam information, which is used for intercepting spam information of a mobile terminal running on an iOS operating system by using a MAP device, where the device is located at the MAP device side, and the device includes:
  • a MAP connection establishing unit configured to establish a MAP connection between the MAP device and the mobile terminal
  • a MAP communication unit configured to receive information sent by the mobile terminal, and send a request message for deleting the information based on the spam identification result to the mobile terminal;
  • the spam identification result obtaining unit is configured to obtain the spam identification result, wherein the spam identification result is a result obtained by matching the information in a preset information base.
  • Embodiments of the present invention also provide a computer program comprising computer readable code, when the readable code is run on a computing device, causing the computing device to perform spam according to any of the embodiments of the present invention Intercept method.
  • the embodiment of the invention further provides a readable medium, wherein the program according to the embodiment of the invention is stored.
  • the MAP device establishes a MAP connection between the MAP device and the mobile terminal, so that the MAP device can obtain the information received by the mobile terminal, and then identify the spam, and finally the MAP device passes the MAP based on the recognition result of the spam.
  • the protocol sends a request to the mobile terminal to delete the information, thereby achieving the purpose of intercepting the spam.
  • the present invention solves the problem that the mobile terminal running the iOS system cannot intercept the spam due to the closed source, but the mobile terminal supporting the iOS system supports the MAP protocol, and the MAP device is used to identify the spam. And feedback to achieve the purpose of intercepting spam and improving the user experience.
  • FIG. 1 is a flow chart showing a method for intercepting spam according to a first embodiment of the present invention
  • FIG. 2 is a flow chart showing establishing a MAP connection between a mobile terminal and a MAP device in the method for intercepting spam according to the first embodiment of the present invention
  • FIG. 3 is a flowchart of a method for intercepting spam in a method of notifying a mobile terminal to delete spam in a method for intercepting spam according to a first embodiment of the present invention
  • FIG. 4 is a flow chart showing a method for intercepting spam according to a second embodiment of the present invention.
  • FIG. 5 is a flow chart showing a method for intercepting spam according to a third embodiment of the present invention.
  • FIG. 6 is a flow chart showing a method for intercepting spam according to a fourth embodiment of the present invention.
  • FIG. 7 is a block diagram showing the structure of an intercepting device for spam according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of an intercepting apparatus for spam according to another embodiment of the present invention.
  • Figure 9 is a block diagram showing a computing device for performing an interception method of spam according to the present invention.
  • Fig. 10 shows a storage unit for holding or carrying program code of an interception method for implementing spam according to the present invention.
  • the iOS-based terminal such as the iPhone is closed source
  • the application (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program that comes with the iOS system, so it cannot
  • the security management app directly intercepts spam.
  • the present invention proposes that, based on the MAP (Message Access Profile) protocol supported by the iPhone, the MAP device receives the information notification (including the short message and the multimedia message) of the iPhone through the MAP protocol. If the information is spam, the MAP device sends the message to the iPhone through the MAP protocol. A request to delete information to block spam.
  • MAP Message Access Profile
  • FIG. 1 a flow chart of a method for intercepting spam according to an embodiment of the present invention is shown.
  • the method is used for intercepting spam on a mobile terminal running on an iOS operating system.
  • the method includes the following S101-S104.
  • S101 Establish a MAP connection between the mobile terminal and the MAP device.
  • the MAP protocol is a Bluetooth short message access specification that defines the short access of the Bluetooth device to the mobile phone.
  • the MAP device refers to a device supporting the MAP protocol, including but not limited to current and future Bluetooth devices, such as a Bluetooth headset adapter, a Bluetooth gateway, and the like.
  • the MAP device establishes a Message Access Service (MAS) session with a mobile terminal (for example, an iPhone), registers a Notification, and establishes a Message Notification Service (MNS) session with the iPhone.
  • MAS Message Access Service
  • MNS Message Notification Service
  • registration message notifications can be implemented in the following ways:
  • the mobile terminal After receiving the information, the mobile terminal sends the information to the MAP device through the MAP connection.
  • the information received by the mobile terminal is sent to the MAP device through the MAP connection. Please continue to refer to the process shown in Figure 2.
  • the mobile terminal After the mobile terminal receives the short message or the multimedia message, the mobile terminal sends the received short message or multimedia message to the MAP device by triggering an event.
  • the MAP device can respond to the mobile terminal and confirm that the short message has been received by triggering an event. Or MMS.
  • message notification can be implemented in the following way: SendEvent_Req().
  • S103 Match the information in a preset information base to identify whether the information is spam.
  • the information base is preset.
  • the set information base includes a blacklist database and a whitelist database of spam.
  • the sending number and/or the information digest of the information is extracted, and the number and/or the information digest are matched in the blacklist and/or the whitelist; and the information is determined to be spam according to the matching result.
  • a relatively simple method is to identify the spam only by sending a number.
  • the identification is combined with the information digest (information signature) to make it more accurate.
  • the identification of the spam information may be performed by different subjects, for example, may be performed on the MAP, or may be sent by the MAP device to the third device for identification by the third device, which is not limited by the present invention, and is followed by the second Three preferred modes among the embodiments, the third embodiment, and the fourth embodiment are specifically described.
  • the MAP device If it is identified as spam, the MAP device sends a request message for deleting the information to the mobile terminal.
  • the SMS notification of the MSE is extracted.
  • the MAP device sends a request for deleting the information to the mobile terminal.
  • the deletion request is returned to the MAP device. response.
  • the delete information request can be implemented in the following manner:
  • the MAP connection between the MAP device and the mobile terminal is established based on the MAP protocol. Then, the MAP device can obtain the information received by the mobile terminal, and then identify the spam. Finally, the MAP device sends a request for deleting the information to the mobile terminal through the MAP protocol based on the identification result of the spam, thereby achieving the interception of the spam. purpose. It can be seen that the present invention solves the problem that the mobile terminal running the iOS system cannot intercept the spam due to the closed source, but the mobile terminal supporting the iOS system supports the MAP protocol, and the MAP device is used to identify the spam. And feedback to achieve the purpose of intercepting spam and improving the user experience.
  • FIG. 4 a flow chart of a method for intercepting spam according to a second embodiment of the present invention is shown.
  • a security management application for example, security guard software running on the iPhone
  • the device the MAP device sends a delete information request to the mobile terminal according to the recognition result.
  • the mobile terminal is embodied by the iPhone
  • the MAP device is embodied by the Bluetooth device
  • the security management application is embodied by the iPhone app.
  • the second embodiment includes the following steps:
  • the iphone receives the information (sms or MMS, etc.);
  • the iphone sends a notification message to the Bluetooth device, and the received information is provided to the Bluetooth device by using the notification message;
  • S405 The Bluetooth device sends a notification message to the iPhone app, and provides the received information to the iPhone app by using the notification message;
  • the iPhone app identifies the spam based on the information base
  • the steps S401, S402, S404, S408, and S410 for interacting between the iPhone and the Bluetooth device are based on the MAP protocol
  • the steps S405 and S407 for the interaction between the Bluetooth device and the iPhone app are based on the Bluetooth 4.0 protocol.
  • the Bluetooth 4.0 protocol can be used, which can be realized by reading, writing, and notification of the parameter (Characteristic).
  • the Bluetooth device and the iPhone can be used as the central device or peripheral devices respectively.
  • the peripheral devices need to enable the Bluetooth service first, and the central device can be advanced. Search for peripherals and register for notifications, or search for nearby devices when needed. Therefore, it is possible to establish a connection between the Bluetooth device and the iPhone App in advance and not to establish a connection in advance. This part of the process is more flexible, you can adjust which device as a peripheral device and which device as a central device according to privacy security.
  • the iPhone App identifies the spam based on the information base, and there are various specific implementation manners.
  • the iPhone App locally sets up the information base or downloads the information base from the network side server, and uses the locally set or downloaded to the local information base to identify the information; the other is that the iPhone App does not set or save the information locally.
  • the library sends the information to the network side server, and after the network side server identifies the garbage information according to the information base, the recognition result is returned to the iPhone App. Either way, the identification of the spam is dominated by the iPhone App and the recognition result is provided to the Bluetooth device in step S407.
  • the iPhone when the iPhone deletes spam, it can also save the spam to the iPhone App, allowing the user to subsequently view which spam is intercepted through the App.
  • the interaction between the Bluetooth device and the iPhone App gives the user the feeling that the app running on the iPhone also has the function of intercepting spam messages.
  • the user installs a security guard such as an app on the iPhone, and the app interacts with the background of the Bluetooth device (the user does not feel it), and the user feels in the foreground that the spam intercept function is provided.
  • FIG. 5 a flow chart of a method for intercepting spam according to a third embodiment of the present invention is shown.
  • the MAP device itself is responsible for the identification of spam.
  • the mobile terminal is embodied by the iPhone, and the MAP device is embodied by the Bluetooth device.
  • the third embodiment includes the following steps:
  • the iphone receives the information (sms or MMS, etc.);
  • the iphone sends a notification message to the Bluetooth device, and the received information is provided to the Bluetooth device by using the notification message;
  • the Bluetooth device identifies the spam based on the information base
  • the Bluetooth device performs the identification of the spam based on the information base, and there are various specific implementation manners.
  • the identification of spam can be completed only by means of the Bluetooth device, and the iphone can be notified to delete the spam only through the Bluetooth device.
  • FIG. 6 there is shown a flow chart of a method for intercepting spam according to a fourth embodiment of the present invention.
  • a network side server is introduced, and the MAP device identifies the spam by means of the network side server.
  • the mobile terminal is embodied by the iPhone, and the MAP device is embodied by the Bluetooth device.
  • the fourth embodiment includes the following steps:
  • S601 establishing a MAS session between the Bluetooth device and the iPhone;
  • the iphone receives the information (sms or multimedia message, etc.);
  • the iphone sends a notification message to the Bluetooth device, and provides the received information to the Bluetooth device by using the notification message;
  • the Bluetooth device sends a notification message to the network side server, and provides the received information to the network side server by using the notification message;
  • the network side server identifies the spam based on the information base
  • S607 The network side server returns the identification result to the Bluetooth device.
  • the identification of the spam can be completed, and the iphone is notified by the Bluetooth device to delete the spam.
  • the identification of spam by the network side server has certain advantages. First, the network side server has large capacity and rich resources, so a larger capacity information base can be set and can be updated in real time. Secondly, the work of garbage information identification is transferred to the network. The side server can reduce the burden on the iPhone or Bluetooth device and improve the processing efficiency.
  • the present invention provides a garbage information intercepting device for a mobile terminal running on an iOS operating system, the device being located on the mobile terminal side.
  • the apparatus includes:
  • a MAP connection establishing unit 701 configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
  • the MAP communication unit 702 is configured to: after the mobile terminal receives the information, send the information to the MAP device by using the MAP connection; and receive a request message that is sent by the MAP device to delete the information, The request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
  • the information processing unit 703 is configured to delete the information when the MAP communication unit 702 receives the request message.
  • the device further comprises:
  • the security management application control unit 704 is configured to receive the information provided by the MAP device, and perform identification of whether the information is spam, and send the identification result to the MAP device.
  • the security management application control unit 704 is specifically configured to: match the information according to the information library set locally or downloaded from the network side server to identify whether the information is spam. Or, the information is sent to the network side server, and the network side server identifies whether the information is spam according to the information database set by itself, and receives the identification result returned by the network side server.
  • the information base comprises a blacklist database and a whitelist database of spam information.
  • the security management application control unit 704 is specifically configured to: extract a sending number and/or a message digest of the information, and perform the number and/or information digest in the blacklist and/or whitelist. Matching; determining whether the information is spam based on the matching result.
  • the device further comprises:
  • the spam backup unit 705 is configured to back up the information in a security management application running in the mobile terminal.
  • the present invention further provides a garbage information intercepting apparatus for intercepting spam information of a mobile terminal running on an iOS operating system by using a MAP device, and the device is located at the MAP device side.
  • the apparatus includes:
  • a MAP connection establishing unit 801 configured to establish a MAP connection between the MAP device and the mobile terminal;
  • the MAP communication unit 802 is configured to receive information sent by the mobile terminal, and send a request message for deleting the information based on the spam identification result to the mobile terminal;
  • the spam identification result obtaining unit 803 is configured to obtain a spam identification result, wherein the spam identification result is a result obtained by matching the information in a preset information base.
  • the device further comprises:
  • the Bluetooth communication unit 804 is configured to send the information to a security management application running on the mobile terminal, and receive a spam identification result returned by the security management application.
  • the device further comprises:
  • the information base obtaining unit 805 is configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device runs from the security management of the mobile terminal Receiving the information base on an application;
  • the identifying unit 806 is configured to perform, according to the information base, an identification of whether the information is spam.
  • the information base comprises a blacklist database and a whitelist database of spam information.
  • the identifying unit 806 is specifically configured to: extract a sending number and/or a message digest of the information, and match the number and/or information digest in the blacklist and/or whitelist; The result determines if the information is spam.
  • the device further comprises:
  • the server communication unit 807 is configured to send the information to the network side server; and receive the spam identification result returned by the network side server.
  • the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • Modules or units in the embodiment or The components are combined into one module or unit or component, and further they can be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • Those skilled in the art will appreciate that some or all of the functionality of some or all of the means for intercepting spam in accordance with embodiments of the present invention may be implemented in practice using a microprocessor or digital signal processor (DSP).
  • DSP digital signal processor
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
  • Figure 9 illustrates a computing device that can implement an interception method for spam in accordance with the present invention.
  • the computing device traditionally includes a processor 910 and a program product or computer readable medium in the form of a memory 920.
  • Memory 920 can be an electronic memory such as a flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, or ROM.
  • Memory 920 has a memory space 930 for program code 931 for performing any of the method steps described above.
  • storage space 930 for program code may include various program code 931 for implementing various steps in the above methods, respectively.
  • These program codes can be read from or written to one or more program products.
  • These program products include program code carriers such as memory cards.
  • Such a program product is typically a portable or fixed storage unit as described with reference to FIG.
  • the storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 920 in the computing device of FIG.
  • the program code can be compressed, for example, in an appropriate form.
  • the storage unit includes readable code 931', ie, code that can be read by a processor, such as 910, which, when executed by a computing device, causes the computing device to perform various steps in the methods described above. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A spam blocking method and apparatus, a computer program, and a readable medium. The method comprises: establish a MAP connection between a mobile terminal and a MAP device; after receiving information, the mobile terminal sends the information to the MAP device through the MAP connection; match the information in a preset information base, and identify whether the information is spam; and if so, the MAP device sends a request message for deleting the information to the mobile terminal. Based on the characteristic that a mobile terminal running the iOS supports the MAP protocol, in the present invention, spam is identified and fed back by means of a MAP device, so as to achieve the objective of blocking the spam and to improve the user experience.

Description

垃圾信息的拦截方法、装置、计算机程序及可读介质Spam interception method, device, computer program and readable medium 技术领域Technical field
本发明涉及网络安全技术领域,具体涉及一种垃圾信息的拦截方法、一种垃圾信息的拦截装置、一种计算机程序及一种计算机可读介质。The present invention relates to the field of network security technologies, and in particular, to a method for intercepting spam, a device for intercepting spam, a computer program, and a computer readable medium.
背景技术Background technique
iOS系统是闭源的操作系统,受其开发权限的限制,运行在iOS系统的应用程序(App)无法访问或控制系统自身程序。例如,目前较为流行的iPhone,是封闭手机系统,不对用户开放源代码。The iOS system is a closed source operating system. Due to its development permissions, applications running on the iOS system cannot access or control the system itself. For example, the currently popular iPhone is a closed mobile phone system that does not open source code to users.
用户在使用手机时,常常收到垃圾信息,比如推销短信或彩信、诈骗短信、非法组织宣传信息等,对于这些垃圾信息,开源的手机可以通过专门的手机卫士等安全软件进行垃圾信息的识别和拦截。然而,由于iPhone是闭源的非越狱手机,从App Store下载并运行在iPhone上的应用程序(App)无法访问或控制iOS系统自带的信息处理程序,因此不能如开源的手机那样直接由App进行垃圾信息的拦截。When users use mobile phones, they often receive spam, such as selling SMS or MMS, scam messages, illegal organization of promotional information, etc. For these spam messages, open source mobile phones can identify spam through special mobile phone security software such as mobile guards. Intercept. However, since the iPhone is a closed source non-jailbroken mobile phone, an application (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program that comes with the iOS system, so it cannot be directly used by an open source mobile phone. Intercept the spam.
发明内容Summary of the invention
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的垃圾信息的拦截方法及装置。In view of the above problems, the present invention has been made in order to provide a method and apparatus for intercepting spam that overcomes the above problems or at least partially solves the above problems.
依据本发明的一个方面,提供一种垃圾信息的拦截方法,用于运行在iOS操作系统的移动终端,所述方法包括:According to an aspect of the present invention, a method for intercepting spam is provided for a mobile terminal running in an iOS operating system, the method comprising:
建立所述移动终端与信息访问协议MAP设备之间的MAP连接;Establishing a MAP connection between the mobile terminal and an information access protocol MAP device;
所述移动终端接收到信息之后,将所述信息通过所述MAP连接发送给所述MAP设备;After receiving the information, the mobile terminal sends the information to the MAP device through the MAP connection;
将所述信息在预置的信息库中进行匹配,识别所述信息是否为垃圾信息;Matching the information in a preset information base to identify whether the information is spam;
如果是,所述MAP设备向所述移动终端发送删除所述信息的请求消息。If so, the MAP device sends a request message to the mobile terminal to delete the information.
依据本发明的另一个方面,提供一种垃圾信息的拦截装置,用于运行在iOS操作系统的移动终端,所述装置位于移动终端侧,所述装置包括:According to another aspect of the present invention, there is provided a spam intercepting apparatus for a mobile terminal running on an iOS operating system, the apparatus being located on a mobile terminal side, the apparatus comprising:
MAP连接建立单元,用于建立所述移动终端与信息访问协议MAP设备之间的MAP连接; a MAP connection establishing unit, configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
MAP通信单元,用于在所述移动终端接收到信息之后,将所述信息通过所述MAP连接发送给所述MAP设备;并且,接收所述MAP设备发送的删除所述信息的请求消息,其中,所述请求消息基于垃圾信息识别结果,所述垃圾信息识别结果是在预置的信息库中匹配所述信息得到的结果;a MAP communication unit, configured to: after the mobile terminal receives the information, send the information to the MAP device by using the MAP connection; and receive a request message that is sent by the MAP device to delete the information, where The request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
信息处理单元,用于在所述MAP通信单元收到所述请求消息的情况下,对信息进行删除。An information processing unit, configured to delete information when the MAP communication unit receives the request message.
本发明实施例还提供一种垃圾信息的拦截装置,用于通过MAP设备对运行在iOS操作系统的移动终端进行垃圾信息的拦截,所述装置位于所述MAP设备侧,所述装置包括:The embodiment of the present invention further provides a device for intercepting spam information, which is used for intercepting spam information of a mobile terminal running on an iOS operating system by using a MAP device, where the device is located at the MAP device side, and the device includes:
MAP连接建立单元,用于建立所述MAP设备与所述移动终端之间的MAP连接;a MAP connection establishing unit, configured to establish a MAP connection between the MAP device and the mobile terminal;
MAP通信单元,用于接收所述移动终端发送的信息,并且,将基于垃圾信息识别结果的删除所述信息的请求消息发送给所述移动终端;a MAP communication unit, configured to receive information sent by the mobile terminal, and send a request message for deleting the information based on the spam identification result to the mobile terminal;
垃圾信息识别结果获取单元,用于获取垃圾信息识别结果,其中,所述垃圾信息识别结果是在预置的信息库中匹配所述信息得到的结果。The spam identification result obtaining unit is configured to obtain the spam identification result, wherein the spam identification result is a result obtained by matching the information in a preset information base.
本发明实施例还提供一种计算机程序,包括计算机可读代码,当所述可读代码在计算设备上运行时,导致所述计算设备执行根据本发明实施例中的任一个所述的垃圾信息的拦截方法。Embodiments of the present invention also provide a computer program comprising computer readable code, when the readable code is run on a computing device, causing the computing device to perform spam according to any of the embodiments of the present invention Intercept method.
本发明实施例还提供了一种可读介质,其中存储了如本发明实施例所述的程序。The embodiment of the invention further provides a readable medium, wherein the program according to the embodiment of the invention is stored.
可见,由于本发明基于MAP协议建立MAP设备与移动终端的MAP连接,从而使得MAP设备可获取到移动终端收到的信息,再进行垃圾信息的识别,最终MAP设备基于垃圾信息的识别结果通过MAP协议向移动终端发送删除信息的请求,从而达到拦截垃圾信息的目的。可见,本发明解决了运行iOS系统的移动终端由于闭源因而一般App无法拦截垃圾信息的问题,而是基于运行iOS系统的移动终端支持MAP协议的这一特点,借助MAP设备进行垃圾信息的识别和反馈,从而达到拦截垃圾信息的目的,改善用户体验。It can be seen that, according to the MAP protocol, the MAP device establishes a MAP connection between the MAP device and the mobile terminal, so that the MAP device can obtain the information received by the mobile terminal, and then identify the spam, and finally the MAP device passes the MAP based on the recognition result of the spam. The protocol sends a request to the mobile terminal to delete the information, thereby achieving the purpose of intercepting the spam. It can be seen that the present invention solves the problem that the mobile terminal running the iOS system cannot intercept the spam due to the closed source, but the mobile terminal supporting the iOS system supports the MAP protocol, and the MAP device is used to identify the spam. And feedback to achieve the purpose of intercepting spam and improving the user experience.
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.
附图说明DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中: Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:
图1示出了根据本发明第一实施例的垃圾信息的拦截方法流程图;1 is a flow chart showing a method for intercepting spam according to a first embodiment of the present invention;
图2示出了根据本发明第一实施例的垃圾信息的拦截方法中建立移动终端与MAP设备之间MAP连接的流程图;2 is a flow chart showing establishing a MAP connection between a mobile terminal and a MAP device in the method for intercepting spam according to the first embodiment of the present invention;
图3示出了根据本发明第一实施例的垃圾信息的拦截方法中MAP设备通知移动终端删除垃圾信息的流程图;FIG. 3 is a flowchart of a method for intercepting spam in a method of notifying a mobile terminal to delete spam in a method for intercepting spam according to a first embodiment of the present invention; FIG.
图4示出了根据本发明第二实施例的垃圾信息的拦截方法流程图;4 is a flow chart showing a method for intercepting spam according to a second embodiment of the present invention;
图5示出了根据本发明第三实施例的垃圾信息的拦截方法流程图;FIG. 5 is a flow chart showing a method for intercepting spam according to a third embodiment of the present invention; FIG.
图6示出了根据本发明第四实施例的垃圾信息的拦截方法流程图;6 is a flow chart showing a method for intercepting spam according to a fourth embodiment of the present invention;
图7示出了根据本发明一个实施例的垃圾信息的拦截装置结构示意图;以及,FIG. 7 is a block diagram showing the structure of an intercepting device for spam according to an embodiment of the present invention;
图8示出了根据本发明另一个实施例的垃圾信息的拦截装置结构示意图;FIG. 8 is a schematic structural diagram of an intercepting apparatus for spam according to another embodiment of the present invention; FIG.
图9示出了用于执行根据本发明的垃圾信息的拦截方法的计算设备的框图;Figure 9 is a block diagram showing a computing device for performing an interception method of spam according to the present invention;
图10示出了用于保持或者携带实现根据本发明的垃圾信息的拦截方法的程序代码的存储单元。Fig. 10 shows a storage unit for holding or carrying program code of an interception method for implementing spam according to the present invention.
具体实施方式detailed description
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Rather, these embodiments are provided so that this disclosure will be more fully understood and the scope of the disclosure will be fully disclosed.
如前所述的,由于iPhone等基于iOS系统的终端是闭源的,因此从App Store下载并运行在iPhone上的应用程序(App)无法访问或控制iOS系统自带的信息处理程序,因此不能如开源的手机(例如基于andriod系统的手机)那样直接由安全管理App进行垃圾信息的拦截。As mentioned above, since the iOS-based terminal such as the iPhone is closed source, the application (App) downloaded from the App Store and running on the iPhone cannot access or control the information processing program that comes with the iOS system, so it cannot Such as open source mobile phones (such as mobile phones based on the andriod system), the security management app directly intercepts spam.
因此,本发明提出,基于iPhone支持的MAP(Message Access Profile)协议,MAP设备通过MAP协议接收iPhone的信息通知(包括短信、彩信),如果信息是垃圾信息,则MAP设备通过MAP协议向iPhone发送删除信息的请求,从而拦截垃圾信息。Therefore, the present invention proposes that, based on the MAP (Message Access Profile) protocol supported by the iPhone, the MAP device receives the information notification (including the short message and the multimedia message) of the iPhone through the MAP protocol. If the information is spam, the MAP device sends the message to the iPhone through the MAP protocol. A request to delete information to block spam.
参见图1,示出了根据本发明一个实施例的垃圾信息的拦截方法流程图。该方法用于对运行在iOS操作系统的移动终端进行垃圾信息的拦截。具体的,该方法包括如下的S101-S104。Referring to FIG. 1, a flow chart of a method for intercepting spam according to an embodiment of the present invention is shown. The method is used for intercepting spam on a mobile terminal running on an iOS operating system. Specifically, the method includes the following S101-S104.
S101:建立移动终端与MAP设备之间的MAP连接。S101: Establish a MAP connection between the mobile terminal and the MAP device.
本领域技术人员了解,MAP协议是蓝牙短信访问规范,定义了蓝牙设备访问手机上短 信的流程。本发明中,MAP设备是指支持MAP协议的设备,包括但不限于目前以及未来出现的蓝牙设备,例如蓝牙耳机适配器、蓝牙网关等。Those skilled in the art understand that the MAP protocol is a Bluetooth short message access specification that defines the short access of the Bluetooth device to the mobile phone. The process of the letter. In the present invention, the MAP device refers to a device supporting the MAP protocol, including but not limited to current and future Bluetooth devices, such as a Bluetooth headset adapter, a Bluetooth gateway, and the like.
关于在移动终端与MAP设备之间建立MAP连接的方式,可参考图2示出的流程。MAP设备与移动终端(例如iPhone)建立Message Access Service(信息访问服务,MAS)session(会话),并注册Notification(通知),与iPhone建立Message Notification Service(信息通知服务,MNS)session。Regarding the manner of establishing a MAP connection between the mobile terminal and the MAP device, reference may be made to the flow shown in FIG. 2. The MAP device establishes a Message Access Service (MAS) session with a mobile terminal (for example, an iPhone), registers a Notification, and establishes a Message Notification Service (MNS) session with the iPhone.
在MAP协议中,注册消息通知可由以下方式实现:In the MAP protocol, registration message notifications can be implemented in the following ways:
SetNotificationRegistration_Req(...,NotificationStatus=‘on’,...)。SetNotificationRegistration_Req(..., NotificationStatus=‘on’,...).
S102:移动终端接收到信息之后,将信息通过MAP连接发送给MAP设备。S102: After receiving the information, the mobile terminal sends the information to the MAP device through the MAP connection.
关于移动终端将收到的信息通过MAP连接发送给MAP设备,请继续参考图2所示流程。当移动终端接收到短信或彩信后,移动终端通过触发一个事件,将收到的短信或彩信发送给MAP设备,此时,MAP设备可以通过触发一个事件,响应移动终端,确认已收到该短信或彩信。The information received by the mobile terminal is sent to the MAP device through the MAP connection. Please continue to refer to the process shown in Figure 2. After the mobile terminal receives the short message or the multimedia message, the mobile terminal sends the received short message or multimedia message to the MAP device by triggering an event. At this time, the MAP device can respond to the mobile terminal and confirm that the short message has been received by triggering an event. Or MMS.
在MAP协议中,消息通知可由以下方式实现:SendEvent_Req(...)。In the MAP protocol, message notification can be implemented in the following way: SendEvent_Req(...).
S103:将信息在预置的信息库中进行匹配,识别信息是否为垃圾信息。S103: Match the information in a preset information base to identify whether the information is spam.
预先设置信息库,例如,设置的信息库包括垃圾信息的黑名单数据库和白名单数据库。在具体识别时,提取信息的发送号码和/或信息摘要,将号码和/或信息摘要在黑名单和/或白名单中进行匹配;根据匹配结果确定信息是否为垃圾信息。比较简单的方式是,仅通过发送号码进行垃圾信息的识别,优选的方式中,采用发送号码结合信息摘要(信息特征码)的方式进行识别,可更加准确。The information base is preset. For example, the set information base includes a blacklist database and a whitelist database of spam. In the specific identification, the sending number and/or the information digest of the information is extracted, and the number and/or the information digest are matched in the blacklist and/or the whitelist; and the information is determined to be spam according to the matching result. A relatively simple method is to identify the spam only by sending a number. In a preferred manner, the identification is combined with the information digest (information signature) to make it more accurate.
对垃圾信息的识别,可以由不同的主体执行,例如,可以在MAP上进行,也可以由MAP设备发送给第三设备由第三设备进行识别,本发明对此不限制,并在后续第二实施例、第三实施例、第四实施例中具体描述其中较优选的三种方式。The identification of the spam information may be performed by different subjects, for example, may be performed on the MAP, or may be sent by the MAP device to the third device for identification by the third device, which is not limited by the present invention, and is followed by the second Three preferred modes among the embodiments, the third embodiment, and the fourth embodiment are specifically described.
S104:如果识别为垃圾信息,MAP设备向移动终端发送删除信息的请求消息。S104: If it is identified as spam, the MAP device sends a request message for deleting the information to the mobile terminal.
关于MAP设备通知移动终端删除垃圾信息的流程,可参见图3。在MAP设备与移动终端建立MNS session中,提取MSE的短信通知,在识别出信息为垃圾信息之后,MAP设备向移动终端发送删除信息的请求;在移动终端侧,会向MAP设备返回删除请求的响应。For the process of the MAP device notifying the mobile terminal to delete the spam, see FIG. After the MNS session is established between the MAP device and the mobile terminal, the SMS notification of the MSE is extracted. After the information is identified as spam, the MAP device sends a request for deleting the information to the mobile terminal. On the mobile terminal side, the deletion request is returned to the MAP device. response.
在MAP协议中,删除信息请求可由以下方式实现:In the MAP protocol, the delete information request can be implemented in the following manner:
SetMessageStatus_Req(...,‘deletedStatus,‘deleted’...)。SetMessageStatus_Req(..., ‘deletedStatus, ‘deleted’...).
可见,通过第一实施例的方案,基于MAP协议建立MAP设备与移动终端的MAP连 接,从而使得MAP设备可获取到移动终端收到的信息,再进行垃圾信息的识别,最终MAP设备基于垃圾信息的识别结果通过MAP协议向移动终端发送删除信息的请求,从而达到拦截垃圾信息的目的。可见,本发明解决了运行iOS系统的移动终端由于闭源因而一般App无法拦截垃圾信息的问题,而是基于运行iOS系统的移动终端支持MAP协议的这一特点,借助MAP设备进行垃圾信息的识别和反馈,从而达到拦截垃圾信息的目的,改善用户体验。It can be seen that, by using the solution of the first embodiment, the MAP connection between the MAP device and the mobile terminal is established based on the MAP protocol. Then, the MAP device can obtain the information received by the mobile terminal, and then identify the spam. Finally, the MAP device sends a request for deleting the information to the mobile terminal through the MAP protocol based on the identification result of the spam, thereby achieving the interception of the spam. purpose. It can be seen that the present invention solves the problem that the mobile terminal running the iOS system cannot intercept the spam due to the closed source, but the mobile terminal supporting the iOS system supports the MAP protocol, and the MAP device is used to identify the spam. And feedback to achieve the purpose of intercepting spam and improving the user experience.
参见图4,示出了根据本发明第二实施例的垃圾信息的拦截方法流程图。在第二实施例中,引入了运行在移动终端的安全管理应用程序(例如,运行在iphone上的安全卫士软件),该安全管理应用程序承担垃圾信息识别的工作,并将识别结果反馈给MAP设备,MAP设备根据识别结果向移动终端发送删除信息请求。Referring to FIG. 4, a flow chart of a method for intercepting spam according to a second embodiment of the present invention is shown. In the second embodiment, a security management application (for example, security guard software running on the iPhone) running on the mobile terminal is introduced, which undertakes the work of spam identification and feeds the recognition result to the MAP. The device, the MAP device sends a delete information request to the mobile terminal according to the recognition result.
为了更加直观,在图4中,移动终端以iphone具体体现、MAP设备以蓝牙设备具体体现、安全管理应用程序以iphone App具体体现。In order to be more intuitive, in FIG. 4, the mobile terminal is embodied by the iPhone, the MAP device is embodied by the Bluetooth device, and the security management application is embodied by the iPhone app.
参见图4,第二实施例包括如下步骤:Referring to FIG. 4, the second embodiment includes the following steps:
S401:蓝牙设备与iphone之间建立MAS session;S401: establishing a MAS session between the Bluetooth device and the iPhone;
S402:蓝牙设备与iphone之间建立MNS session;S402: establishing an MNS session between the Bluetooth device and the iPhone;
S403:iphone收到信息(短信或彩信等);S403: The iphone receives the information (sms or MMS, etc.);
S404:iphone向蓝牙设备发送通知消息,借助通知消息将收到的信息提供给蓝牙设备;S404: The iphone sends a notification message to the Bluetooth device, and the received information is provided to the Bluetooth device by using the notification message;
S405:蓝牙设备向iphone App发送通知消息,借助通知消息将收到的信息提供给iphone App;S405: The Bluetooth device sends a notification message to the iPhone app, and provides the received information to the iPhone app by using the notification message;
S406:iphone App基于信息库进行垃圾信息的识别;S406: The iPhone app identifies the spam based on the information base;
S407:iphone App将识别结果返回给蓝牙设备;S407: The iPhone app returns the recognition result to the Bluetooth device;
S408:如果识别出信息为垃圾信息,蓝牙设备向iphone发送删除信息请求;S408: If the information is identified as spam, the Bluetooth device sends a delete information request to the iPhone.
S409:iphone删除垃圾信息;S409: iphone deletes spam;
S410:iphone向蓝牙设备返回删除请求响应。S410: The iphone returns a delete request response to the Bluetooth device.
优选的,上述流程中,iPhone与蓝牙设备之间交互的步骤S401、S402、S404、S408、S410是基于MAP协议,蓝牙设备与iphone App之间交互的步骤S405、S407基于蓝牙4.0协议。Preferably, in the above process, the steps S401, S402, S404, S408, and S410 for interacting between the iPhone and the Bluetooth device are based on the MAP protocol, and the steps S405 and S407 for the interaction between the Bluetooth device and the iPhone app are based on the Bluetooth 4.0 protocol.
关于iphone与蓝牙设备之间基于MAP协议的交互,具体可参考第一实施例的说明。For the MAP protocol-based interaction between the iPhone and the Bluetooth device, refer to the description of the first embodiment.
关于蓝牙设备与iPhone App之间,可采用蓝牙4.0协议通信,可以通过对参数(Characteristic)的read、write、notification来实现。此时,蓝牙设备和iPhone(iPhone App),都可以分别作为中央设备或周边设备,周边设备需要先开启蓝牙服务,中央设备可以提前 搜索周边设备并且注册通知,也可以在需要的时候搜索周边的设备。因此,蓝牙设备与iPhone App之间提前建立连接和不提前建立连接都可以。这部分的流程比较灵活,可以根据隐私安全来调整哪个设备作为周边设备、哪个设备作为中央设备。Regarding the communication between the Bluetooth device and the iPhone App, the Bluetooth 4.0 protocol can be used, which can be realized by reading, writing, and notification of the parameter (Characteristic). At this time, the Bluetooth device and the iPhone (iPhone App) can be used as the central device or peripheral devices respectively. The peripheral devices need to enable the Bluetooth service first, and the central device can be advanced. Search for peripherals and register for notifications, or search for nearby devices when needed. Therefore, it is possible to establish a connection between the Bluetooth device and the iPhone App in advance and not to establish a connection in advance. This part of the process is more flexible, you can adjust which device as a peripheral device and which device as a central device according to privacy security.
对于步骤S406,iPhone App基于信息库进行垃圾信息的识别,可以有多种具体实现方式。一种是,iPhone App在本地设置信息库或者从网络侧服务器下载信息库,利用本地设置的或者下载到本地的信息库对信息进行识别;另一种是,iPhone App在本地不设置或保存信息库,而是将信息发送给网络侧服务器,由网络侧服务器根据信息库进行垃圾信息的识别之后,将识别结果返回给iPhone App。不论哪种方式,都是由iPhone App主导垃圾信息的识别并将识别结果在步骤S407中提供给蓝牙设备。For step S406, the iPhone App identifies the spam based on the information base, and there are various specific implementation manners. One is that the iPhone App locally sets up the information base or downloads the information base from the network side server, and uses the locally set or downloaded to the local information base to identify the information; the other is that the iPhone App does not set or save the information locally. The library sends the information to the network side server, and after the network side server identifies the garbage information according to the information base, the recognition result is returned to the iPhone App. Either way, the identification of the spam is dominated by the iPhone App and the recognition result is provided to the Bluetooth device in step S407.
另外,在iPhone删除垃圾信息时,还可以将垃圾信息保存到iPhone App中,从而允许用户后续通过App查看拦截了哪些垃圾信息。In addition, when the iPhone deletes spam, it can also save the spam to the iPhone App, allowing the user to subsequently view which spam is intercepted through the App.
可见,在第二实施例中,借助蓝牙设备和iPhone App之间的交互,给用户的感受是,运行在iPhone上的App也具备了拦截垃圾短信的功能。例如,用户通过在iPhone上安装安全卫士等App,该App通过与蓝牙设备的后台交互(用户不会感受到),在前台给用户的感受是具备垃圾信息的拦截功能。扩展了安全类App在基于iOS系统的终端上的应用,提升用户感受。It can be seen that in the second embodiment, the interaction between the Bluetooth device and the iPhone App gives the user the feeling that the app running on the iPhone also has the function of intercepting spam messages. For example, the user installs a security guard such as an app on the iPhone, and the app interacts with the background of the Bluetooth device (the user does not feel it), and the user feels in the foreground that the spam intercept function is provided. Expanded the application of the security app on the iOS-based terminal to enhance user experience.
参见图5,示出了根据本发明第三实施例的垃圾信息的拦截方法流程图。在第三实施例中,由MAP设备自身负责垃圾信息的识别。Referring to FIG. 5, a flow chart of a method for intercepting spam according to a third embodiment of the present invention is shown. In the third embodiment, the MAP device itself is responsible for the identification of spam.
为了更加直观,在图5中,移动终端以iphone具体体现、MAP设备以蓝牙设备具体体现。In order to be more intuitive, in FIG. 5, the mobile terminal is embodied by the iPhone, and the MAP device is embodied by the Bluetooth device.
参见图5,第三实施例包括如下步骤:Referring to FIG. 5, the third embodiment includes the following steps:
S501:蓝牙设备与iphone之间建立MAS session;S501: establishing a MAS session between the Bluetooth device and the iPhone;
S502:蓝牙设备与iphone之间建立MNS session;S502: establishing an MNS session between the Bluetooth device and the iPhone;
S503:iphone收到信息(短信或彩信等);S503: The iphone receives the information (sms or MMS, etc.);
S504:iphone向蓝牙设备发送通知消息,借助通知消息将收到的信息提供给蓝牙设备;S504: The iphone sends a notification message to the Bluetooth device, and the received information is provided to the Bluetooth device by using the notification message;
S505:蓝牙设备基于信息库进行垃圾信息的识别;S505: the Bluetooth device identifies the spam based on the information base;
S506:如果识别出信息为垃圾信息,蓝牙设备向iphone发送删除信息请求;S506: If the information is identified as spam, the Bluetooth device sends a delete information request to the iPhone.
S507:iphone删除垃圾信息;S507: iphone deletes spam;
S508:iphone向蓝牙设备返回删除请求响应。S508: The iphone returns a delete request response to the Bluetooth device.
对于步骤S505,蓝牙设备基于信息库进行垃圾信息的识别,可以有多种具体实现方式。一种是,蓝牙设备在本地设置信息库,另一种是,蓝牙设备从网络侧服务器下载该信息库, 还有一种是,蓝牙设备从运行在iphone上的的App获取该信息库。无论哪种方式,蓝牙设备都最终在自身设备上得到信息库,然后基于信息库在本地进行垃圾信息的识别。For the step S505, the Bluetooth device performs the identification of the spam based on the information base, and there are various specific implementation manners. One is that the Bluetooth device sets the information base locally, and the other is that the Bluetooth device downloads the information base from the network side server. There is also a Bluetooth device that obtains the repository from an app running on the iPhone. Either way, the Bluetooth device eventually gets the information base on its own device and then identifies the spam locally based on the information base.
可见,在第三实施例中,仅借助蓝牙设备,即可完成垃圾信息的识别,并仅通过蓝牙设备,即可通知iphone删除垃圾信息。It can be seen that in the third embodiment, the identification of spam can be completed only by means of the Bluetooth device, and the iphone can be notified to delete the spam only through the Bluetooth device.
参见图6,示出了根据本发明第四实施例的垃圾信息的拦截方法流程图。在第四实施例中,引入网络侧服务器,由MAP设备借助网络侧服务器进行垃圾信息的识别。Referring to FIG. 6, there is shown a flow chart of a method for intercepting spam according to a fourth embodiment of the present invention. In the fourth embodiment, a network side server is introduced, and the MAP device identifies the spam by means of the network side server.
为了更加直观,在图6中,移动终端以iphone具体体现、MAP设备以蓝牙设备具体体现。In order to be more intuitive, in FIG. 6, the mobile terminal is embodied by the iPhone, and the MAP device is embodied by the Bluetooth device.
参见图6,第四实施例包括如下步骤:Referring to FIG. 6, the fourth embodiment includes the following steps:
S601:蓝牙设备与iphone之间建立MAS session;S601: establishing a MAS session between the Bluetooth device and the iPhone;
S602:蓝牙设备与iphone之间建立MNS session;S602: establishing an MNS session between the Bluetooth device and the iPhone;
S603:iphone收到信息(短信或彩信等);S603: The iphone receives the information (sms or multimedia message, etc.);
S604:iphone向蓝牙设备发送通知消息,借助通知消息将收到的信息提供给蓝牙设备;S604: The iphone sends a notification message to the Bluetooth device, and provides the received information to the Bluetooth device by using the notification message;
S605:蓝牙设备向网络侧服务器发送通知消息,借助通知消息将收到的信息提供给网络侧服务器;S605: The Bluetooth device sends a notification message to the network side server, and provides the received information to the network side server by using the notification message;
S606:网络侧服务器基于信息库进行垃圾信息的识别;S606: The network side server identifies the spam based on the information base;
S607:网络侧服务器将识别结果返回给蓝牙设备;S607: The network side server returns the identification result to the Bluetooth device.
S608:如果识别出信息为垃圾信息,蓝牙设备向iphone发送删除信息请求;S608: if the information is identified as spam, the Bluetooth device sends a request for deleting information to the iPhone;
S609:iphone删除垃圾信息;S609: iphone deletes spam;
S610:iphone向蓝牙设备返回删除请求响应。S610: The iphone returns a delete request response to the Bluetooth device.
可见,在第四实施例中,通过借助蓝牙设备和网络侧服务器,可完成垃圾信息的识别,并通过蓝牙设备通知iphone删除垃圾信息。通过网络侧服务器进行垃圾信息识别具有一定的优势,首先,网络侧服务器容量大、资源丰富,因此可设置更大容量的信息库,并可实时更新;其次,将垃圾信息识别的工作转给网络侧服务器进行,可减轻iphone或蓝牙设备的负担,提高处理效率。It can be seen that in the fourth embodiment, by using the Bluetooth device and the network side server, the identification of the spam can be completed, and the iphone is notified by the Bluetooth device to delete the spam. The identification of spam by the network side server has certain advantages. First, the network side server has large capacity and rich resources, so a larger capacity information base can be set and can be updated in real time. Secondly, the work of garbage information identification is transferred to the network. The side server can reduce the burden on the iPhone or Bluetooth device and improve the processing efficiency.
需要说明的是,虽然本发明多次以iphone为例进行说明,但是本方案除了支持iPhone外,也可用于其它支持MAP协议的智能手机和非智能手机。It should be noted that although the present invention has been described by taking the iPhone as an example, the solution can be used for other smartphones and non-smart phones supporting the MAP protocol in addition to the iPhone.
与上述方法相对应,本发明提供一种垃圾信息的拦截装置,用于运行在iOS操作系统的移动终端,所述装置位于移动终端侧。参见图7,所述装置包括:Corresponding to the above method, the present invention provides a garbage information intercepting device for a mobile terminal running on an iOS operating system, the device being located on the mobile terminal side. Referring to Figure 7, the apparatus includes:
MAP连接建立单元701,用于建立所述移动终端与信息访问协议MAP设备之间的MAP连接; a MAP connection establishing unit 701, configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
MAP通信单元702,用于在所述移动终端接收到信息之后,将所述信息通过所述MAP连接发送给所述MAP设备;并且,接收所述MAP设备发送的删除所述信息的请求消息,其中,所述请求消息基于垃圾信息识别结果,所述垃圾信息识别结果是在预置的信息库中匹配所述信息得到的结果;The MAP communication unit 702 is configured to: after the mobile terminal receives the information, send the information to the MAP device by using the MAP connection; and receive a request message that is sent by the MAP device to delete the information, The request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
信息处理单元703,用于在所述MAP通信单元702收到所述请求消息的情况下,对信息进行删除。The information processing unit 703 is configured to delete the information when the MAP communication unit 702 receives the request message.
优选的,该装置还包括:Preferably, the device further comprises:
安全管理应用程序控制单元704,用于接收所述MAP设备提供的所述信息,并执行对所述信息是否为垃圾信息的识别,以及,将识别结果发送给所述MAP设备。The security management application control unit 704 is configured to receive the information provided by the MAP device, and perform identification of whether the information is spam, and send the identification result to the MAP device.
优选的,所述安全管理应用程序控制单元704具体用于,根据在本地设置的或从网络侧服务器下载到本地的所述信息库对所述信息进行匹配,从而识别所述信息是否为垃圾信息;或者,将所述信息发送给网络侧服务器,由所述网络侧服务器根据自身设置的所述信息库识别所述信息是否为垃圾信息,并接收网络侧服务器返回的识别结果。Preferably, the security management application control unit 704 is specifically configured to: match the information according to the information library set locally or downloaded from the network side server to identify whether the information is spam. Or, the information is sent to the network side server, and the network side server identifies whether the information is spam according to the information database set by itself, and receives the identification result returned by the network side server.
优选的,所述信息库包括垃圾信息的黑名单数据库和白名单数据库。Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
优选的,所述安全管理应用程序控制单元704具体用于,提取所述信息的发送号码和/或信息摘要,将所述号码和/或信息摘要在所述黑名单和/或白名单中进行匹配;根据匹配结果确定所述信息是否为垃圾信息。Preferably, the security management application control unit 704 is specifically configured to: extract a sending number and/or a message digest of the information, and perform the number and/or information digest in the blacklist and/or whitelist. Matching; determining whether the information is spam based on the matching result.
优选的,该装置还包括:Preferably, the device further comprises:
垃圾信息备份单元705,用于将所述信息备份在运行在所述移动终端的安全管理应用程序中。The spam backup unit 705 is configured to back up the information in a security management application running in the mobile terminal.
与上述方法相对应,本发明还提供一种垃圾信息的拦截装置,用于通过MAP设备对运行在iOS操作系统的移动终端进行垃圾信息的拦截,所述装置位于所述MAP设备侧。参见图8,所述装置包括:Corresponding to the above method, the present invention further provides a garbage information intercepting apparatus for intercepting spam information of a mobile terminal running on an iOS operating system by using a MAP device, and the device is located at the MAP device side. Referring to Figure 8, the apparatus includes:
MAP连接建立单元801,用于建立所述MAP设备与所述移动终端之间的MAP连接;a MAP connection establishing unit 801, configured to establish a MAP connection between the MAP device and the mobile terminal;
MAP通信单元802,用于接收所述移动终端发送的信息,并且,将基于垃圾信息识别结果的删除所述信息的请求消息发送给所述移动终端;The MAP communication unit 802 is configured to receive information sent by the mobile terminal, and send a request message for deleting the information based on the spam identification result to the mobile terminal;
垃圾信息识别结果获取单元803,用于获取垃圾信息识别结果,其中,所述垃圾信息识别结果是在预置的信息库中匹配所述信息得到的结果。The spam identification result obtaining unit 803 is configured to obtain a spam identification result, wherein the spam identification result is a result obtained by matching the information in a preset information base.
优选的,该装置还包括:Preferably, the device further comprises:
蓝牙通信单元804,用于将所述信息发送给运行在所述移动终端的安全管理应用程序,并接收由所述安全管理应用程序返回的垃圾信息识别结果。 The Bluetooth communication unit 804 is configured to send the information to a security management application running on the mobile terminal, and receive a spam identification result returned by the security management application.
优选的,该装置还包括:Preferably, the device further comprises:
信息库获取单元805,用于在所述MAP设备中设置所述信息库、或者所述MAP设备从网络侧服务器下载所述信息库,或者所述MAP设备从运行在所述移动终端的安全管理应用程序上接收所述信息库;The information base obtaining unit 805 is configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device runs from the security management of the mobile terminal Receiving the information base on an application;
识别单元806,用于根据所述信息库执行对所述信息是否为垃圾信息的识别。The identifying unit 806 is configured to perform, according to the information base, an identification of whether the information is spam.
优选的,所述信息库包括垃圾信息的黑名单数据库和白名单数据库。Preferably, the information base comprises a blacklist database and a whitelist database of spam information.
优选的,所述识别单元806具体用于,提取所述信息的发送号码和/或信息摘要,将所述号码和/或信息摘要在所述黑名单和/或白名单中进行匹配;根据匹配结果确定所述信息是否为垃圾信息。Preferably, the identifying unit 806 is specifically configured to: extract a sending number and/or a message digest of the information, and match the number and/or information digest in the blacklist and/or whitelist; The result determines if the information is spam.
优选的,该装置还包括:Preferably, the device further comprises:
服务器通信单元807,用于将所述信息发送给网络侧服务器;并接收由所述网络侧服务器返回的垃圾信息识别结果。The server communication unit 807 is configured to send the information to the network side server; and receive the spam identification result returned by the network side server.
对于装置实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。For the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。The algorithms and displays provided herein are not inherently related to any particular computer, virtual system, or other device. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或 组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. Modules or units in the embodiment or The components are combined into one module or unit or component, and further they can be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的垃圾信息的拦截的装置中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functionality of some or all of the means for intercepting spam in accordance with embodiments of the present invention may be implemented in practice using a microprocessor or digital signal processor (DSP). The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.
例如,图9示出了可以实现根据本发明的垃圾信息的拦截方法的计算设备。该计算设备传统上包括处理器910和以存储器920形式的程序产品或者计算机可读介质。存储器920可以是诸如闪存、EEPROM(电可擦除可编程只读存储器)、EPROM或者ROM之类的电子存储器。存储器920具有用于执行上述方法中的任何方法步骤的程序代码931的存储空间930。例如,用于程序代码的存储空间930可以包括分别用于实现上面的方法中的各种步骤的各个程序代码931。这些程序代码可以从一个或者多个程序产品中读出或者写入到这一个或者多个程序产品中。这些程序产品包括诸如存储卡之类的程序代码载体。这样的程序产品通常为如参考图10所述的便携式或者固定存储单元。该存储单元可以具有与图9的计算设备中的存储器920类似布置的存储段、存储空间等。程序代码可以例如以适当形式进行压缩。通常,存储单元包括可读代码931’,即可以由例如诸如910之类的处理器读取的代码,这些代码当由计算设备运行时,导致该计算设备执行上面所描述的方法中的各个步骤。For example, Figure 9 illustrates a computing device that can implement an interception method for spam in accordance with the present invention. The computing device traditionally includes a processor 910 and a program product or computer readable medium in the form of a memory 920. Memory 920 can be an electronic memory such as a flash memory, EEPROM (Electrically Erasable Programmable Read Only Memory), EPROM, or ROM. Memory 920 has a memory space 930 for program code 931 for performing any of the method steps described above. For example, storage space 930 for program code may include various program code 931 for implementing various steps in the above methods, respectively. These program codes can be read from or written to one or more program products. These program products include program code carriers such as memory cards. Such a program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have storage segments, storage spaces, and the like that are similarly arranged to memory 920 in the computing device of FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit includes readable code 931', ie, code that can be read by a processor, such as 910, which, when executed by a computing device, causes the computing device to perform various steps in the methods described above. .
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技 术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。It should be noted that the above embodiments are illustrative of the invention and are not limiting of the invention, and Alternative embodiments can be devised by the skilled artisan without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分步骤可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读取存储介质中,比如ROM/RAM、磁碟、光盘等。One of ordinary skill in the art can understand that all or part of the steps of implementing the foregoing embodiments may be completed by a program to instruct related hardware, and the program may be stored in a computer readable storage medium, such as a ROM/RAM or a disk. , CD, etc.
以上所述的具体实施例,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施例而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The above described specific embodiments of the present invention are further described in detail, and are intended to be illustrative of the embodiments of the present invention. All modifications, equivalent substitutions, improvements, etc., made within the spirit and scope of the invention are intended to be included within the scope of the invention.

Claims (23)

  1. 一种垃圾信息的拦截方法,其特征在于,用于运行在iOS操作系统的移动终端,所述方法包括:A method for intercepting spam is characterized in that it is used for a mobile terminal running on an iOS operating system, and the method includes:
    建立所述移动终端与信息访问协议MAP设备之间的MAP连接;Establishing a MAP connection between the mobile terminal and an information access protocol MAP device;
    所述移动终端接收到信息之后,将所述信息通过所述MAP连接发送给所述MAP设备;After receiving the information, the mobile terminal sends the information to the MAP device through the MAP connection;
    将所述信息在预置的信息库中进行匹配,识别所述信息是否为垃圾信息;Matching the information in a preset information base to identify whether the information is spam;
    如果是,所述MAP设备向所述移动终端发送删除所述信息的请求消息。If so, the MAP device sends a request message to the mobile terminal to delete the information.
  2. 如权利要求1所述的方法,其特征在于,在所述MAP设备接收到所述信息之后,还包括:The method of claim 1, after the receiving, by the MAP device, the information further comprises:
    所述MAP设备将所述信息发送给运行在所述移动终端的安全管理应用程序;Sending, by the MAP device, the information to a security management application running on the mobile terminal;
    由所述安全管理应用程序执行对所述信息是否为垃圾信息的识别;Identifying, by the security management application, whether the information is spam;
    所述安全管理应用程序将识别结果发送给所述MAP设备。The security management application sends the recognition result to the MAP device.
  3. 如权利要求2所述的方法,其特征在于,所述由所述安全管理应用程序执行对所述信息是否为垃圾信息的识别,包括:The method of claim 2, wherein the performing, by the security management application, the identification of whether the information is spam comprises:
    所述安全管理应用程序根据在本地设置的或从网络侧服务器下载到本地的所述信息库对所述信息进行匹配,从而识别所述信息是否为垃圾信息;或者,The security management application matches the information according to the information library set locally or downloaded from the network side server to identify whether the information is spam; or
    所述安全管理应用程序将所述信息发送给网络侧服务器,由所述网络侧服务器根据自身设置的所述信息库识别所述信息是否为垃圾信息,并接收网络侧服务器返回的识别结果。The security management application sends the information to the network side server, and the network side server identifies whether the information is spam according to the information database set by itself, and receives the identification result returned by the network side server.
  4. 如权利要求2所述的方法,其特征在于,所述MAP设备与所述安全管理应用程序之间通过蓝牙4.0协议通信。The method of claim 2 wherein said MAP device communicates with said security management application via a Bluetooth 4.0 protocol.
  5. 如权利要求1所述的方法,其特征在于,The method of claim 1 wherein
    在所述MAP设备中设置所述信息库、或者所述MAP设备从网络侧服务器下载所述信息库,或者所述MAP设备从运行在所述移动终端的安全管理应用程序上接收所述信息库;Setting the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device receives the information base from a security management application running on the mobile terminal ;
    由所述MAP设备根据所述信息库执行对所述信息是否为垃圾信息的识别。The MAP device performs identification of whether the information is spam based on the information base.
  6. 如权利要求1所述的方法,其特征在于,在所述MAP接收到所述信息之后,还包括:The method of claim 1, after the MAP receives the information, further comprising:
    所述MAP设备将所述信息发送给网络侧服务器;The MAP device sends the information to a network side server;
    由所述网络侧服务器根据自身设置的所述信息库执行对所述信息是否为垃圾信息的识别;Performing, by the network side server, identification of whether the information is spam according to the information database set by itself;
    所述网络侧服务器将识别结果发送给所述MAP设备。 The network side server sends the identification result to the MAP device.
  7. 如权利要求1-6任一项所述的方法,其特征在于,所述信息库包括垃圾信息的黑名单数据库和白名单数据库。The method of any of claims 1-6, wherein the information base comprises a blacklist database of spam information and a whitelist database.
  8. 如权利要求7所述的方法,其特征在于,所述将所述信息在预置的信息库中进行匹配,识别所述信息是否为垃圾信息,包括:The method of claim 7, wherein the matching the information in a preset information base to identify whether the information is spam comprises:
    提取所述信息的发送号码和/或信息摘要,将所述号码和/或信息摘要在所述黑名单和/或白名单中进行匹配;Extracting a sending number and/or a message digest of the information, and matching the number and/or information digest in the blacklist and/or whitelist;
    根据匹配结果确定所述信息是否为垃圾信息。Whether the information is spam is determined according to the matching result.
  9. 如权利要求1-6任一项所述的方法,其特征在于,在所述MAP设备向所述移动终端发送删除所述信息的请求消息之后,还包括:The method of any one of the preceding claims, wherein after the MAP device sends the request message for deleting the information to the mobile terminal, the method further includes:
    所述移动终端向所述MAP设备返回删除请求的响应,并且,所述移动终端将所述信息备份在运行在所述移动终端的安全管理应用程序中。The mobile terminal returns a response to the deletion request to the MAP device, and the mobile terminal backs up the information in a security management application running in the mobile terminal.
  10. 一种垃圾信息的拦截装置,其特征在于,用于运行在iOS操作系统的移动终端,所述装置位于移动终端侧,所述装置包括:A device for intercepting spam, characterized in that, for a mobile terminal running on an iOS operating system, the device is located on a mobile terminal side, and the device includes:
    MAP连接建立单元,用于建立所述移动终端与信息访问协议MAP设备之间的MAP连接;a MAP connection establishing unit, configured to establish a MAP connection between the mobile terminal and an information access protocol MAP device;
    MAP通信单元,用于在所述移动终端接收到信息之后,将所述信息通过所述MAP连接发送给所述MAP设备;并且,接收所述MAP设备发送的删除所述信息的请求消息,其中,所述请求消息基于垃圾信息识别结果,所述垃圾信息识别结果是在预置的信息库中匹配所述信息得到的结果;a MAP communication unit, configured to: after the mobile terminal receives the information, send the information to the MAP device by using the MAP connection; and receive a request message that is sent by the MAP device to delete the information, where The request message is based on a spam identification result, and the spam identification result is a result obtained by matching the information in a preset information base;
    信息处理单元,用于在所述MAP通信单元收到所述请求消息的情况下,对信息进行删除。An information processing unit, configured to delete information when the MAP communication unit receives the request message.
  11. 如权利要求10所述的装置,其特征在于,还包括:The device of claim 10, further comprising:
    安全管理应用程序控制单元,用于接收所述MAP设备提供的所述信息,并执行对所述信息是否为垃圾信息的识别,以及,将识别结果发送给所述MAP设备。And a security management application control unit, configured to receive the information provided by the MAP device, and perform identification of whether the information is spam, and send the identification result to the MAP device.
  12. 如权利要求11所述的装置,其特征在于,所述安全管理应用程序控制单元具体用于,根据在本地设置的或从网络侧服务器下载到本地的所述信息库对所述信息进行匹配,从而识别所述信息是否为垃圾信息;或者,将所述信息发送给网络侧服务器,由所述网络侧服务器根据自身设置的所述信息库识别所述信息是否为垃圾信息,并接收网络侧服务器返回的识别结果。The device according to claim 11, wherein the security management application control unit is configured to: match the information according to the information library set locally or downloaded from a network side server to the local device, Therefore, the information is sent to the network side server, and the network side server identifies, according to the information database set by itself, whether the information is spam, and receives the network side server. The result of the recognition returned.
  13. 如权利要求12所述的装置,其特征在于,所述信息库包括垃圾信息的黑名单数据库和白名单数据库。 The apparatus of claim 12 wherein said repository comprises a blacklist database of spam and a whitelist database.
  14. 如权利要求13所述的装置,其特征在于,所述安全管理应用程序控制单元具体用于,提取所述信息的发送号码和/或信息摘要,将所述号码和/或信息摘要在所述黑名单和/或白名单中进行匹配;根据匹配结果确定所述信息是否为垃圾信息。The device according to claim 13, wherein the security management application control unit is specifically configured to extract a sending number and/or a message digest of the information, and summarize the number and/or information in the Matching is performed in the blacklist and/or the whitelist; determining whether the information is spam based on the matching result.
  15. 如权利要求10-14任一项所述的装置,其特征在于,还包括:垃圾信息备份单元,用于将所述信息备份在运行在所述移动终端的安全管理应用程序中。The apparatus according to any one of claims 10 to 14, further comprising: a spam backup unit for backing up the information in a security management application running in the mobile terminal.
  16. 一种垃圾信息的拦截装置,其特征在于,用于通过MAP设备对运行在iOS操作系统的移动终端进行垃圾信息的拦截,所述装置位于所述MAP设备侧,所述装置包括:An apparatus for intercepting spam is characterized in that it is used for intercepting spam information of a mobile terminal running on an iOS operating system by using a MAP device, and the device is located at the MAP device side, and the device includes:
    MAP连接建立单元,用于建立所述MAP设备与所述移动终端之间的MAP连接;a MAP connection establishing unit, configured to establish a MAP connection between the MAP device and the mobile terminal;
    MAP通信单元,用于接收所述移动终端发送的信息,并且,将基于垃圾信息识别结果的删除所述信息的请求消息发送给所述移动终端;a MAP communication unit, configured to receive information sent by the mobile terminal, and send a request message for deleting the information based on the spam identification result to the mobile terminal;
    垃圾信息识别结果获取单元,用于获取垃圾信息识别结果,其中,所述垃圾信息识别结果是在预置的信息库中匹配所述信息得到的结果。The spam identification result obtaining unit is configured to obtain the spam identification result, wherein the spam identification result is a result obtained by matching the information in a preset information base.
  17. 如权利要求16所述的装置,其特征在于,还包括:The device of claim 16 further comprising:
    蓝牙通信单元,用于将所述信息发送给运行在所述移动终端的安全管理应用程序,并接收由所述安全管理应用程序返回的垃圾信息识别结果。And a Bluetooth communication unit, configured to send the information to a security management application running on the mobile terminal, and receive a spam identification result returned by the security management application.
  18. 如权利要求16所述的装置,其特征在于,还包括:The device of claim 16 further comprising:
    信息库获取单元,用于在所述MAP设备中设置所述信息库、或者所述MAP设备从网络侧服务器下载所述信息库,或者所述MAP设备从运行在所述移动终端的安全管理应用程序上接收所述信息库;a repository acquiring unit, configured to set the information base in the MAP device, or the MAP device downloads the information base from a network side server, or the MAP device runs from a security management application running on the mobile terminal Receiving the information base program;
    识别单元,用于根据所述信息库执行对所述信息是否为垃圾信息的识别。And an identifying unit, configured to perform, according to the information base, an identification of whether the information is spam.
  19. 如权利要求18所述的装置,其特征在于,所述信息库包括垃圾信息的黑名单数据库和白名单数据库。The apparatus according to claim 18, wherein said information base comprises a blacklist database of spam information and a whitelist database.
  20. 如权利要求19所述的装置,其特征在于,所述识别单元具体用于,提取所述信息的发送号码和/或信息摘要,将所述号码和/或信息摘要在所述黑名单和/或白名单中进行匹配;根据匹配结果确定所述信息是否为垃圾信息。The device according to claim 19, wherein the identifying unit is specifically configured to extract a sending number and/or a message digest of the information, and summarize the number and/or information in the blacklist and/or Or matching in the white list; determining whether the information is spam based on the matching result.
  21. 如权利要求16所述的装置,其特征在于,还包括:The device of claim 16 further comprising:
    服务器通信单元,用于将所述信息发送给网络侧服务器;并接收由所述网络侧服务器返回的垃圾信息识别结果。a server communication unit, configured to send the information to the network side server; and receive the spam identification result returned by the network side server.
  22. 一种计算机程序,包括计算机可读代码,当所述可读代码在计算设备上运行时,导致所述计算设备执行根据权利要求1-9中的任一个所述的垃圾信息的拦截方法。A computer program comprising computer readable code causing the computing device to perform the method of intercepting spam according to any one of claims 1-9 when the readable code is run on a computing device.
  23. 一种可读介质,其中存储了如权利要求22所述的程序。 A readable medium storing the program of claim 22.
PCT/CN2016/109229 2015-12-11 2016-12-09 Spam blocking method and apparatus, computer program, and readable medium WO2017097258A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510921281.9 2015-12-11
CN201510921281.9A CN105491239B (en) 2015-12-11 2015-12-11 The hold-up interception method and device of junk information

Publications (1)

Publication Number Publication Date
WO2017097258A1 true WO2017097258A1 (en) 2017-06-15

Family

ID=55677935

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/109229 WO2017097258A1 (en) 2015-12-11 2016-12-09 Spam blocking method and apparatus, computer program, and readable medium

Country Status (2)

Country Link
CN (1) CN105491239B (en)
WO (1) WO2017097258A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491239B (en) * 2015-12-11 2018-10-12 北京奇虎科技有限公司 The hold-up interception method and device of junk information
CN110677821B (en) * 2019-10-17 2021-08-10 蓝贤秦 System and method for acquiring and identifying incoming call information in real time
CN111666525B (en) * 2020-06-17 2023-09-29 北京航天时代光电科技有限公司 Information interception system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100233998A1 (en) * 2009-02-18 2010-09-16 Denso Corporation In-vehicle apparatus having handsfree function and cellular phone having handsfree function
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN104735631A (en) * 2014-12-09 2015-06-24 惠州Tcl移动通信有限公司 Short message data synchronous operation method and system
CN105491239A (en) * 2015-12-11 2016-04-13 北京奇虎科技有限公司 Interception method and apparatus of spam

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2290906A1 (en) * 2009-08-28 2011-03-02 TeliaSonera AB Mobile service advertiser
CN102231873A (en) * 2011-06-22 2011-11-02 中兴通讯股份有限公司 Method and system for monitoring garbage message and monitor processing apparatus
CN104954533B (en) * 2014-03-24 2018-09-07 北京奇虎科技有限公司 Junk phone interception method, apparatus based on intelligent communications terminal and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100233998A1 (en) * 2009-02-18 2010-09-16 Denso Corporation In-vehicle apparatus having handsfree function and cellular phone having handsfree function
CN103391520A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 Method, terminal, server and system for intercepting malicious short message
CN104735631A (en) * 2014-12-09 2015-06-24 惠州Tcl移动通信有限公司 Short message data synchronous operation method and system
CN104539624A (en) * 2015-01-08 2015-04-22 北京奇虎科技有限公司 Safety monitoring method and device for number information in text
CN105491239A (en) * 2015-12-11 2016-04-13 北京奇虎科技有限公司 Interception method and apparatus of spam

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN105491239A (en) 2016-04-13
CN105491239B (en) 2018-10-12

Similar Documents

Publication Publication Date Title
US11934505B2 (en) Information content viewing method and terminal
US9654577B2 (en) Techniques to generate mass push notifications
US20150256352A1 (en) Method and device for sharing content between different terminals
JP6596173B1 (en) Incoming call management method and apparatus
EP3164793B1 (en) Dual channel identity authentication
WO2017097258A1 (en) Spam blocking method and apparatus, computer program, and readable medium
KR102480623B1 (en) Electronic device, external electronic device and method for managing embedded subscriber identity module of the external electronic device
US11042866B2 (en) Mobile device and method for accessing access point of wireless LAN
WO2014062756A2 (en) Person-based information aggregation
EP2716096B1 (en) Methods and apparatuses for lawful interception through a subscription manager
US9992326B1 (en) Out of the box experience (OOBE) country choice using Wi-Fi layer transmission
CN107070654B (en) Information acquisition method and device
US11943102B2 (en) Configuring a remote electronic device by a peer electronic device in a networked environment
EP3256943A1 (en) Systems and methods for adaptive cloning of mobile devices
KR102480627B1 (en) Electronic device for managing embedded subscriber identity module and method for the same
US9462566B1 (en) System and method for providing limited communication services to unprovisioned mobile communication devices
US9047470B2 (en) Secure provisioning of commercial off-the-shelf (COTS) devices
US9872176B2 (en) Method for processing authentication, electronic device and server for supporting the same
KR20200017180A (en) Electronic device, external electronic device and method for managing embedded subscriber identity module of the external electronic device
CN105282162A (en) Processing method and device for account management business
EP3793164A1 (en) Configuring a remote electronic device by a peer electronic device in a networked environment
WO2017020665A1 (en) Wallpaper switching method and apparatus
CN110691354A (en) Device identifier management method, mobile terminal and readable storage medium
EP2566207A1 (en) Computer network, mobile telephone device, and computer program for writing encrypted files to a telecommunications access card
CN105574375A (en) Secure operation method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16872447

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16872447

Country of ref document: EP

Kind code of ref document: A1