Technique for detecting and blocking unwanted instant messages
First Claim
1. A method for blocking first, second and third different screen names, correlated to a same e-mail address, from sending subsequent instant messages via an instant messaging server system, the method comprising the steps of:
- the instant messaging server system receiving first, second and third instant messages from the first, second and third screen names addressed to first, second and third respective users of the instant messaging server system;
the instant messaging server system receiving a first blocking request from the first user to block the first screen name individually from sending subsequent instant messages to the first user, and in response, the instant messaging server system configuring itself to block subsequent instant messages from the first screen name addressed to the first user;
the instant messaging server system receiving a second blocking request from the second user to block the second screen name individually from sending subsequent instant messages to the second user, and in response, the instant messaging server system configuring itself to block subsequent instant messages from the second screen name addressed to the second user; and
the instant messaging system server correlating the first, second and third screen names to the e-mail address by checking a prior registration of the first, second and third screen names by a fourth user using the e-mail address, and subsequently determining that a predetermined amount of users of the instant messaging server system have sent blocking requests for any individual screen name correlated to the e-mail address, and in response, the instant messaging server system configuring itself to block subsequent instant messages from the first, second and third screen names addressed to the first, second and third users and other users of the instant messaging server system regardless of whether the first user has sent a blocking request for the second or third screen name, the second user has sent a blocking request for the first or third screen name, and the third user and other users have sent a blocking request for the first, second or third screen name.
5 Assignments
0 Petitions
Accused Products
Abstract
A technique for tracking one or more thresholds relating to the blocking of a particular screen name used on an IM system is disclosed. If the number of people who have blocked a particular screen name reaches a threshold amount, a determination is made that the screen name is being used by a spimmer or other bothersome person, and disciplinary action can be taken. In a preferred embodiment, the email address associated with a user name of a suspected spimmer is identified and all screen names associated with that email address are also subjected to disciplinary action, if desired. Thus, an IM company can suspend all screen names of a spimmer that are tied to the same email address, even though not all (or even none) of the screen names individually have reached a threshold level for discipline/suspension.
50 Citations
9 Claims
-
1. A method for blocking first, second and third different screen names, correlated to a same e-mail address, from sending subsequent instant messages via an instant messaging server system, the method comprising the steps of:
- the instant messaging server system receiving first, second and third instant messages from the first, second and third screen names addressed to first, second and third respective users of the instant messaging server system;
the instant messaging server system receiving a first blocking request from the first user to block the first screen name individually from sending subsequent instant messages to the first user, and in response, the instant messaging server system configuring itself to block subsequent instant messages from the first screen name addressed to the first user;
the instant messaging server system receiving a second blocking request from the second user to block the second screen name individually from sending subsequent instant messages to the second user, and in response, the instant messaging server system configuring itself to block subsequent instant messages from the second screen name addressed to the second user; and
the instant messaging system server correlating the first, second and third screen names to the e-mail address by checking a prior registration of the first, second and third screen names by a fourth user using the e-mail address, and subsequently determining that a predetermined amount of users of the instant messaging server system have sent blocking requests for any individual screen name correlated to the e-mail address, and in response, the instant messaging server system configuring itself to block subsequent instant messages from the first, second and third screen names addressed to the first, second and third users and other users of the instant messaging server system regardless of whether the first user has sent a blocking request for the second or third screen name, the second user has sent a blocking request for the first or third screen name, and the third user and other users have sent a blocking request for the first, second or third screen name. - View Dependent Claims (2, 3)
- the instant messaging server system receiving first, second and third instant messages from the first, second and third screen names addressed to first, second and third respective users of the instant messaging server system;
-
4. An instant messaging server system for blocking first, second and third different screen names, correlated to a same e-mail address, from sending subsequent instant messages via the instant messaging server system, the instant messaging server system comprising:
- a CPU, a computer readable memory and a computer readable storage media;
first program instructions to receive first, second and third instant messages from the first, second and third screen names addressed to first, second and third respective users of the instant messaging server system;
second program instructions to receive a first blocking request from the first user to block the first screen name individually from sending subsequent instant messages to the first user, and in response, configure the instant messaging server system to block subsequent instant messages from the first screen name addressed to the first user, and receive a second blocking request from the second user to block the second screen name individually from sending subsequent instant messages to the second user, and in response, configure the instant messaging server system to block subsequent instant messages from the second screen name addressed to the second user; and
third program instructions to correlate the first, second and third screen names to the e-mail address by checking a prior registration of the first, second and third screen names by a fourth user using the e-mail address, and subsequently determine that a predetermined amount of users of the instant messaging server system have sent blocking requests for any individual screen name correlated to the e-mail address, and in response, configure the instant messaging server system to block subsequent instant messages from the first, second and third screen names addressed to the first, second and third users and other users of the instant messaging server system regardless of whether the first user has sent a blocking request for the second or third screen name, the second user has sent a blocking request for the first or third screen name, and the third user and other users have sent a blocking request for the first, second or third screen name; and
wherein the first, second and third program instructions are stored on the computer readable storage media for execution by the CPU via the computer readable memory. - View Dependent Claims (5, 6)
- a CPU, a computer readable memory and a computer readable storage media;
-
7. A computer program product for execution in an instant messaging server system to block first, second and third different screen names, correlated to a same e-mail address, from sending subsequent instant messages via the instant messaging server system, the computer program product comprising:
- a computer readable storage media;
first program instructions to receive first, second and third instant messages from the first, second and third screen names addressed to first, second and third respective users of the instant messaging server system;
second program instructions to receive a first blocking request from the first user to block the first screen name individually from sending subsequent instant messages to the first user, and in response, configure the instant messaging server system to block subsequent instant messages from the first screen name addressed to the first user, and receive a second blocking request from the second user to block the second screen name individually from sending subsequent instant messages to the second user, and in response, configure the instant messaging server system to block subsequent instant messages from the second screen name addressed to the second user; and
third program instructions to correlate the first, second and third screen names to the e-mail address by checking a prior registration of the first, second and third screen names by a fourth user using the e-mail address, and subsequently determine that a predetermined amount of users of the instant messaging server system have sent blocking requests for any individual screen name correlated to the e-mail address, and in response, configure the instant messaging server system to block subsequent instant messages from the first, second and third screen names addressed to the first, second and third users and other users of the instant messaging server system regardless of whether the first user has sent a blocking request for the second or third screen name, the second user has sent a blocking request for the first or third screen name, and the third user and other users have sent a blocking request for the first, second or third screen name; and
wherein the first, second and third program instructions are stored on the computer readable storage media. - View Dependent Claims (8, 9)
- a computer readable storage media;
Specification