Method and apparatus for controlling unsolicited messaging
First Claim
1. A method for controlling unsolicited RTM calls, the method comprising:
- assigning a system identifier to a sensor node in an RTM network, wherein the system identifier assigned to the sensor node does not correspond to an actual user of the RTM network;
receiving a first call to the system identifier of the sensor node;
retrieving caller identification information from the first call; and
creating one or more filter rules based upon the caller identification information, the one or more filter rules indicating that the caller identification information is a source of unsolicited RTM calls.
9 Assignments
0 Petitions
Accused Products
Abstract
Sensor nodes (or addresses therefore), acting as real-time message decoys, are distributed across a real-time communications network to attract unsolicited real-time messages. Filtering rules are derived from the message characteristics (such as the source address) and messaging content of the traffic encountered at the sensor nodes. The filtering rules are distributed to filtering agents positioned in the communications network in such a way that they can filter traffic for legitimate users. The filtering agents may identify and control the disposition of real-time messaging traffic that is part of a mass communication campaign on behalf of legitimate users of the real-time messaging communication system. Disposition may include suppressing, diverting, or labeling.
57 Citations
8 Claims
-
1. A method for controlling unsolicited RTM calls, the method comprising:
-
assigning a system identifier to a sensor node in an RTM network, wherein the system identifier assigned to the sensor node does not correspond to an actual user of the RTM network; receiving a first call to the system identifier of the sensor node; retrieving caller identification information from the first call; and creating one or more filter rules based upon the caller identification information, the one or more filter rules indicating that the caller identification information is a source of unsolicited RTM calls. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for controlling unsolicited messaging in a real-time (RTM) network comprising at least one receiving terminal device adapted to receive RTM messages, said system comprising:
-
a sensor node coupled to the RTM network adapted to receive RTM messages from said one or more sending terminal devices, wherein the sensor node does not correspond to an actual user of the RTM network; a monitoring and analysis facility coupled to the sensor node, said monitoring and analysis facility adapted to; collect RTM message characteristics determined from unsolicited RTM messages received by said sensor node; and construct filtering rules to identify and control unsolicited RTM messages, said filtering rules identifying sources of unsolicited RTM messages received at the sensor node. - View Dependent Claims (7, 8)
-
Specification