Handling unsolicited content at a telecommunications terminal
First Claim
Patent Images
1. A method comprising:
- (1) receiving, by a telecommunications terminal, a first message transmitted from a first source, wherein;
a. the first source initiated the transmission of the first message without communicating with a second source,b. the first message is an unsolicited message, andc. the first message instructs the telecommunications terminal to request a second message from an address specified in the first message;
(2) transmitting, by the telecommunications terminal, a request to the second source based on the address specified in the first message, wherein;
a. the request is transmitted when, and only when, the trustworthiness of the address specified in the first message can be verified by the telecommunications terminal, andb. the first source and the second source are different sources;
(3) receiving, by the telecommunications terminal, the second message in response to the request transmitted to the second source;
(4) determining, by the telecommunications terminal, a call state of the telecommunications terminal after receiving the second message;
(5) wherein the telecommunications terminal performs at least one of the following tasks based on the type of content contained within the second message;
a. output content contained within the second message to a user at the telecommunications terminal based on the call state, andb. transmit a third message to a third source based on a second address specified in the second message;
(0.5) receiving, by the telecommunications terminal, a list of valid addresses from a fourth source, wherein;
a. the list valid of addresses is received by the telecommunications terminal prior to receiving the first message from the first source, andb. the first source, the second source, the third source, and the fourth source are different sources.
24 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus are disclosed that enable a telecommunications terminal to securely receive unsolicited content from applications that are external to the terminal. In particular, the present invention enables the terminal to control the interaction with external applications by using a secure, two-task process. In the two-task process of the present invention, the execution of the second task is based on verifying the trustworthiness of address information that is provided in the first task. This is in contrast to a one-task process, in which an untrustworthy server that provides content might hide its own address by substituting a legitimate address.
28 Citations
14 Claims
-
1. A method comprising:
-
(1) receiving, by a telecommunications terminal, a first message transmitted from a first source, wherein; a. the first source initiated the transmission of the first message without communicating with a second source, b. the first message is an unsolicited message, and c. the first message instructs the telecommunications terminal to request a second message from an address specified in the first message; (2) transmitting, by the telecommunications terminal, a request to the second source based on the address specified in the first message, wherein; a. the request is transmitted when, and only when, the trustworthiness of the address specified in the first message can be verified by the telecommunications terminal, and b. the first source and the second source are different sources; (3) receiving, by the telecommunications terminal, the second message in response to the request transmitted to the second source; (4) determining, by the telecommunications terminal, a call state of the telecommunications terminal after receiving the second message; (5) wherein the telecommunications terminal performs at least one of the following tasks based on the type of content contained within the second message; a. output content contained within the second message to a user at the telecommunications terminal based on the call state, and b. transmit a third message to a third source based on a second address specified in the second message; (0.5) receiving, by the telecommunications terminal, a list of valid addresses from a fourth source, wherein; a. the list valid of addresses is received by the telecommunications terminal prior to receiving the first message from the first source, and b. the first source, the second source, the third source, and the fourth source are different sources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
(1) receiving, by a telecommunications terminal, a first message transmitted from a first source, wherein; a. the first source initiated the transmission of the first message without communicating with a second source, b. the first message is an unsolicited message, and c. the first message instructs the telecommunications terminal to request a second message from a first address specified in the first message; (2) transmitting, by the telecommunications terminal, a request to the second source based on the first address specified in the first message, wherein the request is transmitted when, and only when, the trustworthiness of the first address specified in the first message can be verified by the telecommunications terminal; (3) receiving, by the telecommunications terminal, the second message in response to the request transmitted to the second source, wherein the second message instructs the telecommunications terminal to transmit a third message to a second address specified in the second message; (4) transmitting, by the telecommunications terminal, the third message to a third source based on the second address specified in the second message, wherein the third message is transmitted when, and only when, the trustworthiness of the second address specified in the second message can be verified by the telecommunications terminal; and (0.5) receiving, by the telecommunications terminal, a first list of addresses from a fourth source, wherein; a. the first list of addresses is received by the telecommunications terminal prior to receiving the first message from the first source, and b. the first source, the second source, the third source, and the fourth source are different sources. - View Dependent Claims (10, 11, 12, 13, 14)
-
Specification