Method and apparatus for controlling unsolicited messaging
First Claim
1. A method for controlling unsolicited RTM calls, the method comprising:
- assigning one or more system identifiers that do not correspond to an actual user;
receiving a first call to one or more of the system identifiers;
retrieving caller identification information from the first call; and
creating one or more filter rules based upon the caller identification information.
17 Assignments
0 Petitions
Accused Products
Abstract
Sensor nodes (or addresses therefore), acting as real-time message decoys, are distributed across a real-time communications network to attract unsolicited real-time messages. Filtering rules are derived from the message characteristics (such as the source address) and messaging content of the traffic encountered at the sensor nodes. The filtering rules are distributed to filtering agents positioned in the communications network in such a way that they can filter traffic for legitimate users. The filtering agents may identify and control the disposition of real-time messaging traffic that is part of a mass communication campaign on behalf of legitimate users of the real-time messaging communication system. Disposition may include suppressing, diverting, or labeling.
-
Citations
38 Claims
-
1. A method for controlling unsolicited RTM calls, the method comprising:
-
assigning one or more system identifiers that do not correspond to an actual user;
receiving a first call to one or more of the system identifiers;
retrieving caller identification information from the first call; and
creating one or more filter rules based upon the caller identification information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for controlling unsolicited messaging in a real-time messaging (RTM) network comprising at least one receiving terminal device adapted to receive RTM messages and at least one sending terminal device adapted to send RTM messages including unsolicited RTM messages via said RTM network to said at least one receiving device, said system comprising:
-
at least one sensor node coupled to the RTM network, each sensor node adapted to receive RTM messages from said sending terminal devices;
a monitoring and analysis facility coupled to the at least one sensor node, said monitoring and analysis facility adapted to;
collect RTM message characteristics determined from unsolicited RTM messages received by said at least one sensor node;
construct filtering rules to identify and control unsolicited RTM messages; and
provide the filtering rules to one or more filtering agents; and
one or more filtering agents, each filtering agent coupled to the monitoring and analysis facility to receive said filtering rules and coupled to the RTM network to receive RTM messages for at least one receiving terminal device, each filtering agent applying said filtering rules to identify and control unsolicited RTM messages. - View Dependent Claims (7, 8)
-
-
9. A method for controlling unsolicited messaging in a real-time messaging (RTM) network comprising at least one receiving terminal device adapted to receive RTM messages and at least one sending terminal device adapted to send RTM messages including unsolicited RTM messages via said RTM network to said at least one receiving device, said method comprising:
-
receiving unsolicited RTM messages from said sending terminal devices;
collecting real-time message characteristics determined from said unsolicited RTM messages;
constructing and providing filtering rules for application to identify and control unsolicited RTM messages;
receiving RTM messages for a first receiving terminal device; and
applying said filtering rules to identify and control unsolicited RTM messages received for said first receiving terminal device. - View Dependent Claims (10)
-
-
11. A method of controlling unsolicited real-time messaging (RTM) messages, the method comprising:
-
receiving unsolicited RTM messages from a sending device;
automatically constructing one or more filtering rules from the unsolicited RTM messages, the filtering rules identifying characteristics of messages that are to be blocked;
receiving a first RTM message sent to a first terminal device;
determining whether the first RTM message matches one or more of the filtering rules;
upon determining that the first RTM message matches one or more of the filtering rules, acting upon the first RTM message; and
upon determining that the first RTM message does not match one or more of the filtering rules, allowing the first RTM message. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of controlling unsolicited real-time messaging (RTM) messages, the method comprising:
-
identifying one or more network addresses, the network addresses not being related to an actual user;
receiving unsolicited RTM messages from a sending device; and
constructing one or more filtering rules from the unsolicited RTM messages, the filtering rules identifying characteristics of messages that are to be acted upon. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A computer program product for controlling unsolicited real-time messaging (RTM) messages, the computer program product having a medium with a computer program embodied thereon, the computer program comprising:
-
computer program code for identifying one or more network addresses, the network addresses not being related to an actual user;
computer program code for receiving unsolicited RTM messages from a sending device; and
computer program code for constructing one or more filtering rules from the unsolicited RTM messages, the filtering rules identifying characteristics of messages that are to be acted upon. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
Specification