Technique for detecting and blocking unwanted instant messages
First Claim
1. A method of identifying and controlling undesirable use of an instant messaging system, comprising the steps of:
- storing, in a database, each instance of the blocking of a screen name of a user by another user of said instant messaging system; and
identifying as an undesirable user of said instant messaging system, any user that has reached a threshold level of screen name blockages.
5 Assignments
0 Petitions
Accused Products
Abstract
A technique for tracking one or more thresholds relating to the blocking of a particular screen name used on an IM system is disclosed. If the number of people who have blocked a particular screen name reaches a threshold amount, a determination is made that the screen name is being used by a spimmer or other bothersome person, and disciplinary action can be taken. In a preferred embodiment, the email address associated with a user name of a suspected spimmer is identified and all screen names associated with that email address are also subjected to disciplinary action, if desired. Thus, an IM company can suspend all screen names of a spimmer that are tied to the same email address, even though not all (or even none) of the screen names individually have reached a threshold level for discipline/suspension.
126 Citations
13 Claims
-
1. A method of identifying and controlling undesirable use of an instant messaging system, comprising the steps of:
-
storing, in a database, each instance of the blocking of a screen name of a user by another user of said instant messaging system; and
identifying as an undesirable user of said instant messaging system, any user that has reached a threshold level of screen name blockages. - View Dependent Claims (2, 3, 4)
-
-
5. A system of identifying and controlling undesirable use of an instant messaging system, comprising:
-
means for storing, in a database, each instance of the blocking of a screen name of a user by another user of said instant messaging system; and
means for identifying as an undesirable user of said instant messaging system, any user that has reached a threshold level of screen name blockages. - View Dependent Claims (6, 7, 8)
-
-
9. A computer program product for identifying and controlling undesirable use of an instant messaging system, the computer program product comprising a computer-readable storage medium having computer-readable program code embodied in the medium, the computer-readable program code comprising:
-
computer-readable program code that stores, in a database, each instance of the blocking of a screen name of a user by another user of said instant messaging system; and
computer-readable program code that identifies as an undesirable user of said instant messaging system, any user that has reached a threshold level of screen name blockages. - View Dependent Claims (10, 11, 12)
-
-
13. A method of controlling unwanted messages in an instant messaging system, comprising the steps of:
-
receiving a request from an instant messaging user to block messages from a sender;
determining whether said sender is a human by sending a message including a question to said sender and monitoring an answer to said question; and
taking temporary blocking measures against all messages sent by said sender depending on the number of said requests and whether the sender is a human.
-
Specification