Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Interception method and apparatus of spam

A technology of spam information and information database, applied in security devices, telephone communication, wireless communication, etc., can solve problems such as inability to intercept, and achieve the effect of reducing burden, improving user experience, and improving processing efficiency

Active Publication Date: 2016-04-13
北京鸿享技术服务有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the iPhone is a closed-source non-jailbroken mobile phone, the application program (App) downloaded from the AppStore and running on the iPhone cannot access or control the information processing program that comes with the iOS system, so it cannot be directly controlled by the App like an open-source mobile phone. Blocking of spam

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interception method and apparatus of spam
  • Interception method and apparatus of spam
  • Interception method and apparatus of spam

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0069] As mentioned earlier, because terminals based on the iOS system such as the iPhone are closed-source, the application program (App) downloaded from the AppStore and running on the iPhone cannot access or control the information processing program that comes with the iOS system. Open source mobile phones (such as mobile phones based on the andriod system) are directly intercepted by the security management App.

[0070] There...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an interception method and apparatus of spam. The method comprises the following steps: establishing MAP connection between a mobile terminal and an MAP device; after the mobile terminal receives information, sending the information to the MAP device through the MAP connection; performing matching on the information in a preset information database, and identifying whether the information is spam; and if so, the MAP device sending a request message of deleting the information to the mobile terminal. According to the invention, based on the feature that a mobile terminal operating in an iOS system supports an MAP protocol, the spam is identified and fed back by means of the MAP device, so that the purpose of intercepting the spam is achieved and user experience is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a spam interception method and device. Background technique [0002] The iOS system is a closed-source operating system. Due to the limitation of its development authority, the application program (App) running on the iOS system cannot access or control the system's own program. For example, the currently popular iPhone is a closed mobile phone system, and the source code is not open to users. [0003] When users use mobile phones, they often receive spam messages, such as marketing text messages or MMS messages, fraudulent text messages, promotional information of illegal organizations, etc. For these spam messages, open-source mobile phones can use special mobile phone guards and other security software to identify and monitor spam messages. intercept. However, since the iPhone is a closed-source non-jailbroken mobile phone, the application program (App) downloaded f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04W4/12H04W12/12H04W12/128
CPCH04W4/12H04W12/12H04M1/72436H04M1/72412H04M1/725
Inventor 张福生于鲲鹏
Owner 北京鸿享技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products