专利摘要:
PURPOSE: A method for processing a spam SMS message is provided to receive messages only included in ready-for-receiving groups registered by a user, and to reject other unnecessary spam messages, thereby preventing the user from confirming the unnecessary messages. CONSTITUTION: When a mobile communication terminal is operated(301), the terminal user sets numbers of desired message groups(302). If an SMS message or an e-mail message is received(303), the terminal analyzes the received message(304). The terminal decides whether a number of the analyzed message is included in the set message groups(305). If the number of the received message is equal to a defined number of the ready-for-receiving groups, the terminal receives the corresponding e-mail message or the SMS message to store the received message in a phone memory(308), and informs a user that the necessary message is received(307). The terminal displays the received message on a display, and completes the procedures(310).
公开号:KR20040044749A
申请号:KR1020020072916
申请日:2002-11-22
公开日:2004-05-31
发明作者:이창수
申请人:엘지전자 주식회사;
IPC主号:
专利说明:

Method for processing the spam SMS message
[4] The present invention relates to a message processing method including various spam mails of a mobile communication terminal. Particularly, in a mobile communication system, only a message corresponding to a receiveable group registered by a user among an email message or an SMS message is received, and other unnecessary spam messages are received. The present invention relates to a method for processing spam SMS messages which are not received.
[5] In the case of Global Systems for Mobile communication (GSM), which is commercially available as a second generation mobile communication system in Europe, and General Packet Radio Service (GPRS), which is commercially available as a 2.5 generation mobile communication system, user authentication and encryption procedures are used.
[6] In the user authentication and encryption procedure, whenever the mobile communication terminal is powered on, the terminal must receive the user's intention of registering the user's intention to use the terminal in the network.
[7] However, in the case of a mobile communication system using a code division multiple access (CDMA) scheme, only a user authentication process, which is a registration procedure, is required when an initial terminal is opened.
[8] The registration procedure includes an attach registration procedure, a location area update registration procedure, and a routing area update registration procedure.
[9] While going through the above registration procedures, the network undergoes user authentication and encryption when necessary.
[10] By performing the user authentication and encryption process on the network as described above, when a mobile station (MS) requests registration on the network, an authentication procedure (Authentication) confirms whether the corresponding terminal is an authenticated terminal on the network, and the terminal and the network. It goes through a ciphering process that decides whether to encrypt the data transmitted between them.
[11] The authentication procedure and encryption procedure as described above may be referred to as a procedure for preventing the case of eavesdropping and exploitation of the transmitted wireless voice or wireless data by others.
[12] In general, a mobile communication system provides a specific service, which is a kind of additional service function, such as a voice call for a voice call, a short message service for short message transmission, a supplementary service for an additional service, This includes PDP Context Activation for GPRS packet transmission.
[13] In the above case, if the data transmission process is not promised between the terminal and the network, that is, even if the data is transmitted without encryption because no encryption procedure is performed during network registration, the data is encrypted and encrypted by the network at the time of service. Related procedures can be made.
[14] In this case, the terminal and the network encrypt data transmitted from this point and then transmit the data.
[15] In the transmission data encryption technique of the mobile communication terminal of various communication methods as described above, a general schematic system configuration is as shown in FIG.
[16] In FIG. 1, a mobile communication terminal 10 commonly used by a user is provided, and there are a plurality of base stations 11 that exchange voice and data with the terminal 10, and collectively control the plurality of base stations 11. There is a base station controller 12, which consists of a switching device 13 connected to the base station controller 12.
[17] In the mobile communication system of various communication methods as described above, when a spam short message service (SMS) message or a spam e-mail message is received in a mobile communication terminal, the user is unconditionally received regardless of the received message and notified to the user through an alarm function. It is supposed to be.
[18] Among the spam SMS messages, various voice messages, messages with specific character strings, for example, messages containing mostly sensational texts that are not necessary for the user such as various advertisement messages are indiscriminately flown.
[19] Then, the conventional technology allows a user using a mobile communication terminal to receive all unnecessary illegal advertisements and various spam messages without filtering.
[20] However, in the conventional mobile communication system, as shown in FIG. 2, when various SMS messages are received in the mobile communication terminal in operation 201, the terminal informs the user of the received message through an alarm function or the like (202). ).
[21] Then, the user using the mobile communication terminal manually checks the received message (203), and then determines whether the received message is a required message or an unnecessary message according to the user's judgment (204), and if it is an unnecessary message, the user manually manually. It deletes 205 and archives 206 if necessary.
[22] In such a conventional message processing method, a user using a mobile communication terminal can effectively block even if various kinds of high-compliance advertising text messages come indiscriminately, or even indiscriminately the messages containing mostly sensational texts. There is no method, and there is a problem that the user may suffer in good faith due to the continuous advertising and sensibility various text messages or specific reply calls.
[23] Of course, the conventional mobile communication terminal also has a protocol between the terminal and the network during an incoming call or an outgoing call, and blocks spam SMS messages or email messages from the network. After the barring, the terminal may send a message indicating that the block is blocked, but since this is entirely done by the network, the terminal cannot cope with the spam SMS message or the spam email message.
[24] Accordingly, the present invention has been proposed to solve the above-described problems, and a plurality of receiving groups are created in the terminal for receiving only messages having necessary contents among various e-mail messages or SMS messages received by the mobile communication terminal. Its purpose is to allow unsolicited messages to be rejected.
[25] In order to achieve the above object, the present invention provides a method for blocking various unnecessary email or SMS messages received by a mobile communication terminal,
[26] A message group setting step of setting a plurality of message group numbers to be received among various email or SMS messages in the user terminal;
[27] An unnecessary message rejection step of rejecting a message newly received by the user terminal if it does not match a number set as the allowable group;
[28] If the newly received message in the user terminal is consistent with the number set to the reception group is included, and receiving the necessary message to display on the display device.
[29] The method of checking whether the newly received e-mail or SMS message in the terminal is a message of a number included in a group preset by a user or a message of a number not included in the terminal is checked with a caller IDentifier (CID).
[30] When setting the message group, CB (Cell Broadcasting) is excluded.
[31] Store the necessary message received in the user memory upon receiving the required message;
[32] Activate the alarm function to notify the user that the required message has been received.
[1] 1 is a schematic schematic system diagram showing a transmission data processing procedure of a mobile communication terminal.
[2] 2 is a flow chart illustrating an operational flow for processing various messages according to a conventional method.
[3] 3 is a flowchart illustrating an operation for processing various messages in a terminal of the present invention.
[33] Hereinafter, an embodiment of the present invention will be described in detail with reference to the accompanying drawings.
[34] 3 is a flowchart illustrating an operation for processing various messages in a mobile communication terminal of the present invention. When an operation is started 301, a terminal user receives a message group from among various e-mail or SMS messages in his terminal. Set the number of (302).
[35] The type of group is set to various different groups.
[36] For example, the terminal user's own family group, family relative group, friend group, especially group of friends by school, straight friend group, social friend and coworker group, various group group, marketing sales group, etc. Set up a group of concepts.
[37] In setting the group, CB (Cell Broadcasting) is excluded.
[38] The CB contains various important information required by the mobile communication service provider for providing a mobile communication service, for example, area code, etc., so that the CB is not intended to receive when the terminal wants to receive it or not when it does not want to receive it. .
[39] And since CB is data that mobile service provider distributes to terminal, this data does not contain unnecessary messages such as spam messages.
[40] When the group number is set 302 and the e-mail message or SMS message is received 303 by the terminal, the received message is analyzed 304.
[41] The received message is analyzed 304 and then determined 305 whether the number of the analyzed message belongs to or does not belong to the group that set the number of the group.
[42] The method of checking whether a newly received e-mail message or an SMS message is a message of a number included in a group previously set by a user or a message of a number not included in the terminal is checked with a caller IDentifier (CID).
[43] As a result of the determination 305, if the received message does not match the number determined by the user as a receivable group, the operation 310 is terminated without receiving the corresponding e-mail message or the SMS message (306).
[44] As a result of the determination (305), if the received message matches the number determined by the user as a reception group, the user receives the corresponding email message or SMS message and stores it in the phone memory (308) and activates an alarm function to arrive at a message required by the user. At the same time as the notification (307) and the display to the display device of the terminal indicates that the message required by the user has arrived 307 and then the operation is terminated (310).
[45] All of the above operations of the present invention are operations performed by the mobile communication user terminal itself of the GSM method or the GPRS method independently of the network.
[46] The above-described technology of the present invention is applicable to all mobile communication systems including GSM or GPRS mobile communication systems, for example, CDMA, CDMA2000, CDMA2000 1x EVDO, IMT2000 mobile communication systems, and the like. .
[47] As described above, the present invention provides an unnecessary message that does not match the user input group number after the user inputs a group number for reception to receive only necessary messages among various e-mail messages or SMS messages received by the mobile communication terminal. When a number is received and found, it can be automatically rejected, so that the user does not need to check unnecessary messages one by one, thereby providing the effect of being freed from various advertisement-selective messages or spam mails.
权利要求:
Claims (4)
[1" claim-type="Currently amended] In the method for processing various unnecessary email or SMS messages received by the mobile communication terminal,
A message group setting step of setting a plurality of message group numbers to be received among various e-mail or SMS messages received by the user terminal;
An unnecessary message rejection step of rejecting a message newly received by the user terminal if it does not match a number set as the allowable group;
And receiving a necessary message for receiving a new message received by the user terminal and matching the number set to the receivable group and displaying the message on a display device.
[2" claim-type="Currently amended] The method according to claim 1,
The method of checking whether the newly received e-mail or SMS message in the terminal is a message of a number included in a group preset by a user or a message of a number not included in the terminal is characterized by checking with a caller IDentifier (CID). How to handle spam SMS messages.
[3" claim-type="Currently amended] The method according to claim 1,
Spam SMS message processing method characterized in that the CB (Cell Broadcasting) is excluded when setting the message group.
[4" claim-type="Currently amended] The method according to claim 1,
Store the necessary message received in the user memory upon receiving the required message;
A method of handling spam SMS messages that activates an alarm function to notify the user that a required message has been received.
类似技术:
公开号 | 公开日 | 专利标题
EP2710842B1|2016-07-27|A system and method for registering network information strings
JP5980496B2|2016-08-31|Access point connection apparatus and method for portable terminal
EP2453633B1|2020-01-08|Participant identification apparatus, mobile radio system and method for participant authentication
US20150079956A1|2015-03-19|Method and system for sending messages
ES2612566T3|2017-05-17|Packet data service with circuit switched call notification
EP2192724B1|2013-10-23|A method for creating a peer-to-peer immediate messaging solution without using an instant messaging server
US8014801B2|2011-09-06|Method and apparatus for blocking ID information associated with a sender of a short messaging service | message
US7890084B1|2011-02-15|Enterprise instant message aggregator
ES2262233T3|2006-11-16|Roading of short messages.
US6856809B2|2005-02-15|SMS conference
US20150296361A1|2015-10-15|Utilization Of SMS And/Or Cellular Broadcast To Receive Multimedia Alerts
US6892074B2|2005-05-10|Selective message service to primary and secondary mobile stations
US8750906B2|2014-06-10|Dynamic elements on a map within a mobile device, such as elements that facilitate communication between users
US8649314B2|2014-02-11|Peer-to-peer mobile data transfer method and device
US7664527B2|2010-02-16|Network identity and timezone | functionality for non-3GPP devices
US7013132B2|2006-03-14|Method for the provision and allocation of call numbers in a telecommunication network
JP4829302B2|2011-12-07|Management of anonymous communication between users based on short-range wireless connection identifier
US8509729B2|2013-08-13|Interactive personal emergency communications
US20120322505A1|2012-12-20|Mobile communications
EP1839457B1|2012-01-11|Method for activating a network-based service in a communication network, apparatus, device and network therefor
ES2300536T3|2008-06-16|Dissemination of services based on the location of a mobile terminal in a wireless network.
EP1169873B1|2003-10-29|Method for finding members of a common interest group
KR101031800B1|2011-04-29|Method and apparatus for use in communicating short messages of the emergency type from mobile communication devices
EP1707019B1|2011-10-05|System and method for wirelessly provisioning a mobile communication device
US8594613B2|2013-11-26|Mapping commercial mobile alert service messages to cell broadcasts
同族专利:
公开号 | 公开日
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题
法律状态:
2002-11-22|Application filed by 엘지전자 주식회사
2002-11-22|Priority to KR1020020072916A
2004-05-31|Publication of KR20040044749A
优先权:
申请号 | 申请日 | 专利标题
KR1020020072916A|KR20040044749A|2002-11-22|2002-11-22|Method for processing the spam SMS message|
[返回顶部]