System and method of dynamic management of spam
First Claim
1. A computer-implemented method for managing spam directed to a communications device, the computer-implemented method comprising:
- comparing a contact for each incoming message item to contacts on a whitelist;
if the contact is not found on the whitelist, then adding the contact to a blacklist based on predetermined criteria;
at a selected time, making available to the communications device a summary of each message item corresponding to a contact on the blacklist;
receiving a user selection of a contact to transfer from the blacklist to the whitelist.
4 Assignments
0 Petitions
Accused Products
Abstract
There is disclosed a system and method of dynamically managing spam directed to a communications device. In an embodiment, a contact for each incoming message item is compared to contacts on a whitelist. If the contact is not found on the whitelist, the contact is added to a blacklist based on predetermined criteria. At a selected time, a summary of each message item corresponding to a contact on the blacklist is made available to the communications device. Based on this summary, a user selects contacts to transfer from the blacklist to the whitelist. The user selection is received, and any message items corresponding to a contact on the whitelist are transmitted to the communications device.
-
Citations
20 Claims
-
1. A computer-implemented method for managing spam directed to a communications device, the computer-implemented method comprising:
-
comparing a contact for each incoming message item to contacts on a whitelist;
if the contact is not found on the whitelist, then adding the contact to a blacklist based on predetermined criteria;
at a selected time, making available to the communications device a summary of each message item corresponding to a contact on the blacklist;
receiving a user selection of a contact to transfer from the blacklist to the whitelist. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A communications device comprising:
-
(a) a main processor that controls the operation of the communications device;
(b) a communication subsystem connected to the main processor, the communication subsystem configured to send data to and receive data from a host system;
(c) a blacklist/whitelist module executable by the main processor for managing spam directed to the communications device by;
i) receiving a summary of each message item corresponding to a contact on a blacklist;
ii) providing a selection means operable by a user for selecting a contact for transfer from the blacklist to the whitelist;
iii) communicating the user selection to the host system. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer readable medium storing computer code that, when loaded into a computing device, adapts the device to manage spam directed to a communications device, the computer readable medium including:
-
code for comparing a contact for each incoming message item to contacts on a whitelist;
code for adding the contact for the incoming message to a blacklist based on predetermined criteria, if the contact is not found on the whitelist;
code for making available to the communications device, at a selected time, a summary of each message item corresponding to a contact on the blacklist;
code for receiving a user selection of a contact to transfer from the blacklist to the whitelist. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification