Method and apparatus for controlling unsolicited messaging in real time messaging networks
First Claim
1. A method for controlling unsolicited messaging in a real time messaging (RTM) network, the method comprising:
- receiving a call initiation request from a first terminal device coupled to the RTM network;
marking the call initiation request on behalf of the first terminal device to identify an origination characteristic of the initiation request, generating a marked call initiation request; and
wherein the marking comprises applying a digital signature to the call initiation request; and
, wherein the applying a digital signature to the call initiation request comprises;
creating a message digest of the call initiation request;
applying a private key of a public/private key pair to the message digest to generate the digital signature; and
providing a public key of the public/private key pair for verifying the digital signature;
verifying the marked call initiation request on behalf of at least one of the second terminal devices to determine the origination characteristics of the marked call initiation request;
determining a delivery action in response to the verifying; and
delivering the marked call initiation request in accordance with the delivery action, wherein the delivery action comprises transmitting the marked call initiation request on the RTM network for delivery to one or more second terminal devices coupled to the RTM network.
11 Assignments
0 Petitions
Accused Products
Abstract
A Voice over IP (VoIP) or Real Time Messaging (RTM) firewall device is claimed that protects VoIP or RTM network traffic by identifying and controlling the delivery of such network traffic that is unsolicited and undesired by the recipient (i.e. VoIP or RTM spam). The system involves applying a unique marking to RTM messages close to a point of message origination and then at a point close to message termination for the intended recipient examining a reputation store for information on the unique marking and using that information in conjunction with a set of policy rules to decide whether to pass, reject, pass on to an RTM store or otherwise filter the RTM message. The unique marking serves to identify a source characteristic of the message such as the message originator, a corporate affiliation for the originator, or a RTM network characteristic of the originator such as a transmission gateway.
44 Citations
10 Claims
-
1. A method for controlling unsolicited messaging in a real time messaging (RTM) network, the method comprising:
-
receiving a call initiation request from a first terminal device coupled to the RTM network; marking the call initiation request on behalf of the first terminal device to identify an origination characteristic of the initiation request, generating a marked call initiation request; and wherein the marking comprises applying a digital signature to the call initiation request; and
, wherein the applying a digital signature to the call initiation request comprises;creating a message digest of the call initiation request;
applying a private key of a public/private key pair to the message digest to generate the digital signature; andproviding a public key of the public/private key pair for verifying the digital signature;
verifying the marked call initiation request on behalf of at least one of the second terminal devices to determine the origination characteristics of the marked call initiation request;
determining a delivery action in response to the verifying; anddelivering the marked call initiation request in accordance with the delivery action, wherein the delivery action comprises transmitting the marked call initiation request on the RTM network for delivery to one or more second terminal devices coupled to the RTM network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification