Method and system for the prevention of unwanted wireless telecommunications
First Claim
1. A method for filtration of unwanted wireless telecommunications comprising:
- monitoring mobile multimedia service (MMS) message traffic associated with roaming subscribers received from a mobile multimedia service-center (MMS-C) in a network that is distinct from the terminating network, said traffic carried via inter-network links;
determining whether said MMS message traffic constitutes a wanted or unwanted message, wherein whether said MMS message traffic constitutes an unwanted message is based on one or more of a source address, a destination address, a network element address, a protocol id/type, a data coding scheme, a keyword/content search, a service identifier, a location of an originator and/or a destination; and
invoking an action for managing said MMS traffic based on results of said determining, wherein when said MMS message traffic is determined to constitute a wanted message, then performing the additional step of providing said MMS message traffic to the MMS-C in the terminating network via an applicable interface, and wherein when said MMS message traffic is determined to constitute an unwanted message then said action comprises delete, store for later viewing, and notify said MMS-C of a failure or successful delivery.
3 Assignments
0 Petitions
Accused Products
Abstract
The invention of present speaks to a method and system for the prevention of unwanted wireless telecommunications which is implemented as part of a computer program product in (preferentially) the telecommunications operator'"'"'s network, which meets and/or exceeds much of current, proposed and even academically anticipated legislative (and by necessity, technical) criteria, and indeed, thereby complies with the broader body of prima facie consumer requirements associated with wireless telecommunications spam filtering. Indeed, the invention provides for a remarkably flexible and customizable advance in the art through the utilization of a progressive filtering algorithm. This algorithm offers both the subscriber and the service provider with the capability to block and/or extract potentially harmful or unsolicited SMS, MMS and other such messages on the basis of an extensive range of parameters and rules.
4 Citations
8 Claims
-
1. A method for filtration of unwanted wireless telecommunications comprising:
-
monitoring mobile multimedia service (MMS) message traffic associated with roaming subscribers received from a mobile multimedia service-center (MMS-C) in a network that is distinct from the terminating network, said traffic carried via inter-network links; determining whether said MMS message traffic constitutes a wanted or unwanted message, wherein whether said MMS message traffic constitutes an unwanted message is based on one or more of a source address, a destination address, a network element address, a protocol id/type, a data coding scheme, a keyword/content search, a service identifier, a location of an originator and/or a destination; and invoking an action for managing said MMS traffic based on results of said determining, wherein when said MMS message traffic is determined to constitute a wanted message, then performing the additional step of providing said MMS message traffic to the MMS-C in the terminating network via an applicable interface, and wherein when said MMS message traffic is determined to constitute an unwanted message then said action comprises delete, store for later viewing, and notify said MMS-C of a failure or successful delivery. - View Dependent Claims (2, 3, 4)
-
-
5. A system for filtration of unwanted wireless telecommunications comprising:
-
an incoming interface for monitoring mobile multimedia service (MMS) message traffic associated with roaming subscribers received from a mobile multimedia service-center (MMS-C) in a network that is distinct from the terminating network, said incoming interface configured to receive said traffic via inter-network links; a filter for determining whether said MMS message traffic constitutes a wanted or unwanted message, wherein whether said MMS message traffic constitutes an unwanted message is based on one or more of a source address, a destination address, a network element address, a protocol id/type, a data coding scheme, a keyword/content search, a service identifier, a location of an originator and/or a destination; and an outgoing interface for invoking an action for managing said MMS traffic based on results of said determining by said filter, wherein when said MMS message traffic is determined to constitute a wanted message, then performing the additional step of providing said MMS message traffic to the MMS-C in the terminating network via an applicable interface, and wherein when said MMS message traffic is determined to constitute an unwanted message then said action comprises delete, store for later viewing, and notify said MMS-C of a failure or successful delivery. - View Dependent Claims (6, 7)
-
-
8. A non-transitory computer program product comprising programming instructions executable for implementing a method, the method comprising:
-
monitoring mobile multimedia service (MMS) message traffic associated with roaming subscribers received from mobile multimedia service-center (MMS-C) in a network that is distinct from the terminating network, said traffic carried via inter-network links; determining whether said MMS message traffic constitutes a wanted or unwanted message, wherein whether said MMS message traffic constitutes an unwanted message is based on one or more of a source address, a destination address, a network element address, a protocol id/type, a data coding scheme, a keyword/content search, a service identifier, a location of an originator and/or a destination; and invoking an action for managing said MMS traffic based on results of said determining, wherein when said MMS message traffic is determined to constitute a wanted message, then performing the additional step of providing said MMS message traffic to the MMS-C in the terminating network via an applicable interface, and wherein when said MMS message traffic is determined to constitute an unwanted message then said action comprises delete, store for later viewing, and notify said MMS-C of a failure or successful delivery.
-
Specification