×

Handling unsolicited content at a telecommunications terminal

  • US 7,864,761 B2
  • Filed: 02/04/2005
  • Issued: 01/04/2011
  • Est. Priority Date: 02/04/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • (1) receiving, by a telecommunications terminal, a first message transmitted from a first source, wherein;

    a. the first source initiated the transmission of the first message without communicating with a second source,b. the first message is an unsolicited message, andc. the first message instructs the telecommunications terminal to request a second message from an address specified in the first message;

    (2) transmitting, by the telecommunications terminal, a request to the second source based on the address specified in the first message, wherein;

    a. the request is transmitted when, and only when, the trustworthiness of the address specified in the first message can be verified by the telecommunications terminal, andb. the first source and the second source are different sources;

    (3) receiving, by the telecommunications terminal, the second message in response to the request transmitted to the second source;

    (4) determining, by the telecommunications terminal, a call state of the telecommunications terminal after receiving the second message;

    (5) wherein the telecommunications terminal performs at least one of the following tasks based on the type of content contained within the second message;

    a. output content contained within the second message to a user at the telecommunications terminal based on the call state, andb. transmit a third message to a third source based on a second address specified in the second message;

    (0.5) receiving, by the telecommunications terminal, a list of valid addresses from a fourth source, wherein;

    a. the list valid of addresses is received by the telecommunications terminal prior to receiving the first message from the first source, andb. the first source, the second source, the third source, and the fourth source are different sources.

View all claims
  • 24 Assignments
Timeline View
Assignment View
    ×
    ×