US20150161400A1 - Archive control for text messages - Google Patents

Archive control for text messages Download PDF

Info

Publication number
US20150161400A1
US20150161400A1 US14/624,087 US201514624087A US2015161400A1 US 20150161400 A1 US20150161400 A1 US 20150161400A1 US 201514624087 A US201514624087 A US 201514624087A US 2015161400 A1 US2015161400 A1 US 2015161400A1
Authority
US
United States
Prior art keywords
text message
protection information
protection
message
controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/624,087
Inventor
Yigang Cai
Shaumir Shah
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Corp
Nokia USA Inc
Original Assignee
Alcatel Lucent USA Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent USA Inc filed Critical Alcatel Lucent USA Inc
Priority to US14/624,087 priority Critical patent/US20150161400A1/en
Publication of US20150161400A1 publication Critical patent/US20150161400A1/en
Assigned to CORTLAND CAPITAL MARKET SERVICES, LLC reassignment CORTLAND CAPITAL MARKET SERVICES, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP, LLC
Assigned to NOKIA USA INC. reassignment NOKIA USA INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP LLC
Assigned to PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT SAS, NOKIA SOLUTIONS AND NETWORKS BV, NOKIA TECHNOLOGIES OY
Assigned to NOKIA US HOLDINGS INC. reassignment NOKIA US HOLDINGS INC. ASSIGNMENT AND ASSUMPTION AGREEMENT Assignors: NOKIA USA INC.
Assigned to PROVENANCE ASSET GROUP LLC, PROVENANCE ASSET GROUP HOLDINGS LLC reassignment PROVENANCE ASSET GROUP LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CORTLAND CAPITAL MARKETS SERVICES LLC
Assigned to PROVENANCE ASSET GROUP HOLDINGS LLC, PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP HOLDINGS LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA US HOLDINGS INC.
Assigned to RPX CORPORATION reassignment RPX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP LLC
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • H04L51/22
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/42Mailbox-related aspects, e.g. synchronisation of mailboxes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • H04W4/185Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals by embedding added-value information into content, e.g. geo-tagging

Definitions

  • the invention is related to the field of communications and, in particular, to text messaging, such as Short Message Service (SMS).
  • SMS Short Message Service
  • Text messaging has become a popular mode of communication in many mobile (or wireless) networks.
  • SMS Short Message Service
  • SMS Short Message Service
  • MMS Multimedia Message Service
  • An archive service allows end users to store a record of SMS messages that are sent or received through a particular mobile device. For example, an application may be loaded onto a mobile device that is programmed to send a copy of SMS messages that are sent or received to a secure online server for long-term storage. The end user may then access the SMS record at a later time.
  • service providers may implement an archive server that stores text messages for end users that subscribe to an archive service.
  • Embodiments described herein provide control over archiving of text messages.
  • Present archive/backup services store all text messages associated with an end user or a mobile device.
  • the present archive/backup services do not provide protection on how or which text messages are stored.
  • Some of the text messages may be private in nature, such as messages that include financial or medical content. Thus, it is desirable to implement controls on how/which text messages are archived.
  • protection information is inserted in a text message to indicate whether the text message is authorized to be archived.
  • the devices and systems that handle the text message may then process the protection information before archiving the text message.
  • One embodiment comprises a system that inserts protection information in a text message.
  • Some examples of a system in this embodiment are end user devices (e.g., a mobile phone) and automated message centers (e.g., ESME).
  • the system includes a controller operable to identify a text message for delivery over a mobile network, and to identify protection information for controlling archiving of the text message.
  • the controller is further operable to insert the protection information in the text message, such as in user data (i.e., payload) of the text message.
  • the system further includes a network interface operable to transmit the text message with the protection information towards a destination over the mobile network.
  • Another embodiment comprises a method of inserting protection information in a text message.
  • the method includes identifying a text message for delivery over a mobile network, and identifying protection information for controlling archiving of the text message.
  • the method further includes inserting the protection information in the text message, and transmitting the text message with the protection information towards a destination over the mobile network.
  • Another embodiment comprises a system that controls archiving of text messages.
  • Some examples of a system in this embodiment are message centers (e.g., an SMSC) and archive servers.
  • the system includes a network interface operable to receive a text message.
  • the system further includes a controller operable to identify protection information inserted in the text message, such as in the user data.
  • the controller is further operable to identify an end user associated with the text message (e.g., sender or recipient), and to identify privacy policies provisioned for the end user.
  • the controller is further operable to process the privacy policies and the protection information to determine if the text message is authorized to be archived. If authorized, then the controller is further operable to initiate archiving of the text message. If not, then the controller is further operable to block the text message from being archived.
  • Another embodiment is a method of controlling how text messages are archived.
  • the method includes receiving a text message, and identifying protection information inserted in the text message.
  • the method further includes identifying an end user associated with the text message, and identifying privacy policies provisioned for the end user.
  • the method further includes processing the privacy policies and the protection information to determine if the text message is authorized to be archived. If authorized, then the method includes initiating archiving of the text message. If not, then the method includes blocking the text message from being archived.
  • control for forwarding or copying text messages Other embodiments include control for forwarding or copying text messages.
  • FIG. 1 illustrates a communication system in an exemplary embodiment.
  • FIG. 2 illustrates a text-enabled device in an exemplary embodiment.
  • FIG. 3 is a flow chart illustrating a method of inserting protection information in a text message in an exemplary embodiment.
  • FIG. 4 illustrates a text message in an exemplary embodiment.
  • FIG. 5 illustrates a message center in an exemplary embodiment.
  • FIG. 6 is a flow chart illustrating a method of controlling how text messages are archived in an exemplary embodiment.
  • FIG. 7 illustrates a communication system in another exemplary embodiment.
  • FIG. 1 illustrates a communication system 100 in an exemplary embodiment.
  • Communication system 100 includes a text-enabled device 110 connected to a mobile network 120 .
  • Device 110 comprises any system, server, or end user device operable to send or receive text messages, such as SMS or MMS messages.
  • Device 110 may comprise an end user device (or User Equipment (UE)), such as a mobile phone.
  • UE User Equipment
  • Device 110 may alternatively comprise an automated message center that generates text messages, such as an External Short Messaging Entity (ESME).
  • ESME External Short Messaging Entity
  • Typical examples of ESMEs are systems that send automated marketing messages to mobile users, voting systems that process text message votes, etc.
  • Mobile network 120 provides services to device 110 and other devices not shown. The services offered and provided by mobile network 120 may vary, but at a minimum, device 110 has subscriptions for text messaging with mobile network 120 .
  • Mobile network 120 may comprise a circuit-switched mobile network, such as a cdma2000 network, a GSM network, etc.
  • Mobile network 120 may also comprise a packet-switched network, such as an IP Multimedia Subsystem (IMS) network or a Long Term Evolution (LTE) network.
  • IMS IP Multimedia Subsystem
  • LTE Long Term Evolution
  • mobile network 120 includes a message center 122 .
  • Message center 122 comprises any system, server, or device that facilitates delivery of text messages.
  • message center 122 may comprise a Short Message Service Center (SMSC), a Multimedia Message Service Center (MMSC), an IP Short Message Gateway (IP-SM-GW), etc.
  • SMSC Short Message Service Center
  • MMSC Multimedia Message Service Center
  • IP-SM-GW IP Short Message Gateway
  • message center 122 may be implemented in multiple locations within network 120 , it is merely shown as being included within network 120 and not tied to any specific network node.
  • FIG. 1 those skilled in the art understand that other servers or nodes are connected between device 110 and message center 122 , such as base stations, wireless access points, switching systems (e.g., MSC or S-CSCF), gateways, etc.
  • Mobile network 120 further includes an archive server 124 .
  • Archive server 124 comprises any system, server, or device that archives or otherwise saves text messages for long-term storage.
  • Mobile network 120 may offer a service that allows end users to backup their text messages to a server instead of having to save the text messages on their phones.
  • An archive service such as this may be provided by archive server 124 so that text messages sent or received by end users will be backed-up to server 124 .
  • Archive server 124 may be provided by a third party that is not affiliated with the service provider of mobile network 120 .
  • FIG. 2 illustrates text-enabled device 110 in an exemplary embodiment.
  • Device 110 includes a network interface 202 , a controller 204 , and a user interface 206 .
  • Network interface 202 comprises any components, devices, or functions operable to exchange communications with other elements (e.g., message center 122 ) over network 120 .
  • Controller 204 comprises any components or devices operable to control the operations of device 110 .
  • User interface 206 comprises any components, devices, or functions operable to receive input from an end user, such as a keypad, a pointing device, etc., and/or convey content to the end user, such as a display, a speaker, etc.
  • protection information is inserted in the text message to control whether or not the text message is allowed to be archived.
  • the protection information advantageously provides a layer of privacy for end users so that selected text messages are archived and selected text messages are blocked from being archived; especially the text messages that contain sensitive content, such as financial or medical content.
  • FIG. 3 is a flow chart illustrating a method 300 of inserting protection information in a text message in an exemplary embodiment.
  • the steps of method 300 will be described with reference to device 110 in FIGS. 1-2 , but those skilled in the art will appreciate that method 300 may be performed in other devices or systems.
  • the steps of the flow charts described herein are not all inclusive and may include other steps not shown. The steps may also be performed in an alternative order.
  • controller 204 identifies a text message for delivery over mobile network 120 .
  • Controller 204 may identify the text message when an end user creates a new text message.
  • Controller 204 may identify the text message when an end user selects an existing text message for reply, forward, or a similar function.
  • controller 204 may identify the text message when an automated application creates a text message.
  • controller 204 identifies protection information for the text message.
  • Protection information comprises any data that controls archiving of the text message in a network.
  • the protection information may include a protection class that applies to the text message.
  • a protection class is a category of text messages that share a similar type of content.
  • a protection class may be financial, medical, health, parental control, business, social, etc.
  • text messages that include financial content may be grouped into a common protection class.
  • Text messages that include medical content may be grouped into a common protection class.
  • the protection class may be indicated by a string or value, such as A, B, C, etc.
  • the protection information may alternatively or additionally include a protection level.
  • a protection level is a degree or amount of protection desired for text messages, such as in a protection class.
  • the protection level may be indicated by a range of integers, such as from 1 to 5. If the protection level is “5” for instance, then a high level of protection is desired for archiving the text message (e.g., no archiving is allowed). This protection level may be desired for financial or medical classes of text messages. If the protection level is “1” for instance, then a lower level of protection is desired for archiving the text message (e.g., archiving is always allowed). This protection level may be desired for social classes of text messages.
  • Controller 204 may identify the protection information by querying an end user through user interface 206 (assuming that device 110 is an end user device). When the end user composes a new text message or attempts to copy or forward an existing text message, controller 204 may ask the end user for the privacy information via user interface 206 .
  • the query may be for a protection class for the text message (e.g., financial, medical, etc.), and/or for a protection level (e.g., 1, 2, 3, or high, medium, low).
  • User interface 206 then receives input from the end user indicating the desired protection information, and the user interface 206 provides the end user input to controller 204 .
  • Controller 204 may alternatively identify the protection information by locating predefined or pre-provisioned information stored in device 110 . This may be the case if device 110 is an automatic message server, such as an ESME. Those skilled in the art will appreciate that user interface 206 of device 110 may not be needed if device 110 comprises an ESME instead of an end user device.
  • controller 204 inserts the identified protection information in the text message. Controller 204 may insert the protection information in a header of the text message (or a signaling message encapsulating the text message), or in the payload or body of the text message.
  • Text messages are encoded as a header and a payload in a Protocol Description Unit (PDU).
  • FIG. 4 illustrates a text message 400 in an exemplary embodiment.
  • Text message 400 includes header 410 and payload 420 .
  • Header 410 includes metadata for transporting the text message, such as an originating address for the text message, a destination address for the text message, etc.
  • Payload 420 includes the actual content for the text message.
  • Controller 204 may insert the protection information in the user data of payload 420 .
  • controller 204 may insert the protection information in a User Data Header (UDH) 422 of payload 420 (Short Message Transport Layer (SM-TL) of the 3GPP specifications) as shown in FIG. 4 .
  • UDH 422 includes a User Data Header Length (UDHL) parameter 430 and one or more Information Elements (IE) 432 - 433 .
  • Each Information Element (IE) 432 includes the following sub-parameters (typically in octets): Information Element Identifier (IEI) 442 , Information Element Data Length (IEDL) 444 , and Information Element Data (IED) 446 .
  • Controller 204 may insert the protection information in an IE or IEI.
  • controller 204 may insert the protection information in a User Data parameter of payload 420 (based on 3GPP2 specifications).
  • the User Data parameter is part of the Teleservice Layer in the 3GPP2 protocol stack.
  • the protection information may be inserted in the “reserved parameter” of the User Data.
  • network interface 202 transmits the text message with the inserted protection information towards a destination over mobile network 120 .
  • network interface 202 may transmit the text message (in the appropriate signaling message) to message center 122 in mobile network 120 .
  • message center 122 may perform store-and-forward processing to attempt delivery of the text message to a destination (not shown).
  • FIG. 5 illustrates message center 122 in an exemplary embodiment.
  • Message center 122 includes a network interface 502 and a controller 504 . If message center 122 receives a text message, such as a text message destined for device 110 (see FIG. 1 ), then message center 122 may perform method 300 as follows. Controller 504 (see FIG. 5 ) identifies the text message for delivery over mobile network 120 in step 302 (which is the received text message).
  • Controller 504 then identifies protection information for the text message (step 304 ).
  • the protection information may be predefined or pre-provisioned in a subscriber profile.
  • controller 504 identifies the proper profile and identifies the protection information predefined in the profile.
  • Controller 504 may then insert the identified protection information in the text message (step 306 ).
  • the protection information inserted in the text message may be new, or may modify (or delete) protection information already inserted in the text message.
  • Network interface 502 then transmits the text message with the inserted protection information towards a destination (step 308 ) as part of store-and-forward processing.
  • message center 122 may communicate with archive server 124 to store a copy of the text message. Before the text message can be archived, message center 122 may operate as described in FIG. 6 to control whether the text message is archived.
  • FIG. 6 is a flow chart illustrating a method 600 of controlling how text messages are archived in an exemplary embodiment. The steps of method 600 will be described with reference to message center 122 in FIG. 1 and FIG. 5 , but those skilled in the art will appreciate that method 600 may be performed in other devices or systems.
  • controller 504 After the text message is received, controller 504 identifies the protection information inserted in the text message in step 602 . To do so, controller 504 may parse the header or the user data (i.e., payload) of the text message to identify the protection information. Controller 504 then identifies an end user associated with the text message in step 604 . For example, controller 504 may parse the header of the text message to identify a directory number, a network address, a public identifier (PUID), or some other information that identifies an end user that sent or will receive the text message.
  • PID public identifier
  • controller 504 identifies privacy policies defined or provisioned for the end user.
  • the privacy policies may be stored in a subscriber profile for the end user that is stored locally on message center 122 or stored on a remote system.
  • the privacy policies comprise any rules that control archiving (and/or forwarding/copying) of text messages involving the end user.
  • the privacy policies may be defined by the end user or the service provider operating mobile network 120 .
  • the privacy policies may take the following conditions into account:
  • controller 504 processes the protection information and the privacy policies (and possibly other information, such as the destination address) to determine if the text message is authorized to be archived. For example, if the protection information indicates a protection class of “financial” and a protection level of “1”, then the privacy policies may indicate that the text message is authorized to be archived. If the protection information indicates a protection class of “financial” and a protection level of “3”, then the privacy policies may indicate that the text message is not authorized to be archived. The privacy policies may take other information into account such as the source of the text message, the destination of the text message, the time of day, etc.
  • controller 504 initiates archiving of the text message in archive server 124 (in step 610 ). For example, controller 504 may send the text message to archive server 124 for storage. If the text message is not authorized, then controller 504 blocks the text message from being archived in archive server 124 (in step 612 ). For example, controller 504 may refrain from sending the text message to archive server 124 for storage.
  • method 600 has been described in terms of archiving text messages, a similar method may be used for forwarding text messages, copying text messages, etc.
  • archive server 124 may operate similar to method 600 .
  • Archive server 124 may have a similar structure as shown in FIG. 5 with a network interface and a controller.
  • archive server 124 receives the text message from message center 122 for archiving, archive server 124 operates as in method 600 before storing the text message.
  • the controller in archive server 124 identifies the protection information inserted in the text message (step 602 ), and identifies an end user associated with the text message (step 604 ). The controller then identifies the privacy policies defined for the end user (step 606 ).
  • the controller processes the protection information and the privacy policies to determine if the text message is authorized to be archived (step 608 ). If the text message is authorized, then the controller initiates archiving of the text message (in step 610 ). For example, the controller may store the text message in a local memory. If the text message is not authorized, then the controller blocks the text message from being archived (in step 612 ). For example, the controller may refrain from storing the text message in the local memory.
  • end users advantageously have more privacy with sensitive text messages. Instead of archiving all text messages, end users can specify which text messages are archived through the protection information and the privacy policies. And, there is a determination made on a message-by-message basis as to whether the message is allowed to be achieved. Thus, private text messages, such as those being financial and medical in nature, will not be archived and at risk of being viewed by unauthorized individuals.
  • FIG. 7 illustrates a communication system 700 in another exemplary embodiment.
  • Communication system 700 includes a mobile network 720 that provides service to a mobile device 730 .
  • Mobile network 720 is also connected to an ESME 710 of a bank 712 .
  • ESME 710 is configured to send credit card transaction confirmations to mobile device 730 via SMS messages.
  • SMS messages When an end user of mobile device 730 uses his/her credit card, ESME 710 composes an SMS message with the credit card transaction confirmation.
  • ESME 710 is also configured to provide archiving protection as discussed above. Therefore, ESME 710 identifies the SMS message that was composed for mobile device 730 , and identifies protection information for the SMS message.
  • the SMS message in this example is financial in nature. Therefore, ESME 710 identifies the protection information as having a protection class “B” (financial) and a protection level “5” (high) for the SMS message.
  • ESME 710 then inserts the protection information in the user data of the SMS message, and transmits the SMS message to SMSC 722 .
  • SMSC 722 may perform store-and-forward processing to attempt delivery of the SMS message to mobile device 730 .
  • SMSC 722 identifies the end user associated with the SMS message, and identifies a subscriber profile for the end user.
  • the subscriber profile includes privacy policies defined for archiving SMS messages.
  • SMSC 722 processes the protection information inserted in the SMS message, and the privacy policies to determine whether this SMS message is allowed to be archived.
  • the privacy policies disallow archiving of the SMS message to archive server 724 based on a protection class “B” and a protection level “5”. Therefore, SMSC 722 blocks the SMS message from being sent to archive server 724 for long-term storage.
  • SMSC 722 processes the protection information inserted in the SMS message, and the privacy policies to determine whether this SMS message is allowed to be forwarded.
  • the privacy policies allow forwarding of the SMS message to an email server 740 (which is hosting the email account of the end user) based on a protection class “B” and a protection level “5”. Therefore, SMSC 722 forwards the SMS message to email server 740 .
  • the end user of mobile device 730 is able to control whether a sensitive SMS message (i.e., an SMS message containing information on a credit card transaction) is archived or forwarded.
  • a sensitive SMS message i.e., an SMS message containing information on a credit card transaction
  • a similar process is performed for each individual SMS message that involves this end user.
  • only authorized SMS messages are archived/forwarded instead of every SMS message.
  • any of the various elements shown in the figures or described herein may be implemented as hardware, software, firmware, or some combination of these.
  • an element may be implemented as dedicated hardware.
  • Dedicated hardware elements may be referred to as “processors”, “controllers”, or some similar terminology.
  • processors When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
  • processor or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, a network processor, application specific integrated circuit (ASIC) or other circuitry, field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), non-volatile storage, logic, or some other physical hardware component or module.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA field programmable gate array
  • ROM read only memory
  • RAM random access memory
  • non-volatile storage logic, or some other physical hardware component or module.
  • an element may be implemented as instructions executable by a processor or a computer to perform the functions of the element.
  • Some examples of instructions are software, program code, and firmware.
  • the instructions are operational when executed by the processor to direct the processor to perform the functions of the element.
  • the instructions may be stored on storage devices that are readable by the processor. Some examples of the storage devices are digital or solid-state memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Systems and methods for controlling how text messages are archived. A system identifies a text message for delivery over a mobile network, and identifies protection information for controlling archiving of the text message. The system inserts the protection information in the text message, and transmits the text message with the protection information towards a destination. The same or another system, such as a message center, receives the text message, and identifies the protection information inserted in the text message. The receiving system further identifies an end user associated with the text message, and identifies privacy policies provisioned for the end user. The receiving system then processes the privacy policies and the protection information to determine if the text message is authorized to be archived, such as in an archive server.

Description

    RELATED APPLICATIONS
  • This patent application is a divisional of co-pending U.S. non-provisional patent application Ser. No. 13/240,783, filed on Sep. 22, 2011, which is hereby incorporated by reference.
  • FIELD OF THE INVENTION
  • The invention is related to the field of communications and, in particular, to text messaging, such as Short Message Service (SMS).
  • BACKGROUND
  • Text messaging has become a popular mode of communication in many mobile (or wireless) networks. One example of text messaging is Short Message Service (SMS), which is a set of communication protocols allowing the exchange of short text messages (i.e., 160 characters or less) between devices. While the term “text message” traditionally referred to text-only messages sent using SMS, it has been extended to include multimedia messages, such as images, video, sound content, etc. The multimedia messages may be sent using Multimedia Message Service (MMS) protocol. Many mobile users more frequently use text messaging for communication than voice calls.
  • One service offered for SMS messaging is an archive service or backup service. An archive service allows end users to store a record of SMS messages that are sent or received through a particular mobile device. For example, an application may be loaded onto a mobile device that is programmed to send a copy of SMS messages that are sent or received to a secure online server for long-term storage. The end user may then access the SMS record at a later time. In another example, service providers may implement an archive server that stores text messages for end users that subscribe to an archive service.
  • SUMMARY
  • Embodiments described herein provide control over archiving of text messages. Present archive/backup services store all text messages associated with an end user or a mobile device. The present archive/backup services do not provide protection on how or which text messages are stored. Some of the text messages may be private in nature, such as messages that include financial or medical content. Thus, it is desirable to implement controls on how/which text messages are archived. In the embodiments described herein, protection information is inserted in a text message to indicate whether the text message is authorized to be archived. The devices and systems that handle the text message may then process the protection information before archiving the text message. Thus, there is a determination made on a message-by-message basis as to whether a text message is archived.
  • One embodiment comprises a system that inserts protection information in a text message. Some examples of a system in this embodiment are end user devices (e.g., a mobile phone) and automated message centers (e.g., ESME). The system includes a controller operable to identify a text message for delivery over a mobile network, and to identify protection information for controlling archiving of the text message. The controller is further operable to insert the protection information in the text message, such as in user data (i.e., payload) of the text message. The system further includes a network interface operable to transmit the text message with the protection information towards a destination over the mobile network.
  • Another embodiment comprises a method of inserting protection information in a text message. The method includes identifying a text message for delivery over a mobile network, and identifying protection information for controlling archiving of the text message. The method further includes inserting the protection information in the text message, and transmitting the text message with the protection information towards a destination over the mobile network.
  • Another embodiment comprises a system that controls archiving of text messages. Some examples of a system in this embodiment are message centers (e.g., an SMSC) and archive servers. The system includes a network interface operable to receive a text message. The system further includes a controller operable to identify protection information inserted in the text message, such as in the user data. The controller is further operable to identify an end user associated with the text message (e.g., sender or recipient), and to identify privacy policies provisioned for the end user. The controller is further operable to process the privacy policies and the protection information to determine if the text message is authorized to be archived. If authorized, then the controller is further operable to initiate archiving of the text message. If not, then the controller is further operable to block the text message from being archived.
  • Another embodiment is a method of controlling how text messages are archived. The method includes receiving a text message, and identifying protection information inserted in the text message. The method further includes identifying an end user associated with the text message, and identifying privacy policies provisioned for the end user. The method further includes processing the privacy policies and the protection information to determine if the text message is authorized to be archived. If authorized, then the method includes initiating archiving of the text message. If not, then the method includes blocking the text message from being archived.
  • Other embodiments include control for forwarding or copying text messages.
  • DESCRIPTION OF THE DRAWINGS
  • Some embodiments of the present invention are now described, by way of example only, and with reference to the accompanying drawings. The same reference number represents the same element or the same type of element on all drawings.
  • FIG. 1 illustrates a communication system in an exemplary embodiment.
  • FIG. 2 illustrates a text-enabled device in an exemplary embodiment.
  • FIG. 3 is a flow chart illustrating a method of inserting protection information in a text message in an exemplary embodiment.
  • FIG. 4 illustrates a text message in an exemplary embodiment.
  • FIG. 5 illustrates a message center in an exemplary embodiment.
  • FIG. 6 is a flow chart illustrating a method of controlling how text messages are archived in an exemplary embodiment.
  • FIG. 7 illustrates a communication system in another exemplary embodiment.
  • DESCRIPTION OF EMBODIMENTS
  • The figures and the following description illustrate specific exemplary embodiments of the invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the invention and are included within the scope of the invention. Furthermore, any examples described herein are intended to aid in understanding the principles of the invention, and are to be construed as being without limitation to such specifically recited examples and conditions. As a result, the invention is not limited to the specific embodiments or examples described below, but by the claims and their equivalents.
  • FIG. 1 illustrates a communication system 100 in an exemplary embodiment. Communication system 100 includes a text-enabled device 110 connected to a mobile network 120. Device 110 comprises any system, server, or end user device operable to send or receive text messages, such as SMS or MMS messages. Device 110 may comprise an end user device (or User Equipment (UE)), such as a mobile phone. Device 110 may alternatively comprise an automated message center that generates text messages, such as an External Short Messaging Entity (ESME). Typical examples of ESMEs are systems that send automated marketing messages to mobile users, voting systems that process text message votes, etc.
  • Mobile network 120 provides services to device 110 and other devices not shown. The services offered and provided by mobile network 120 may vary, but at a minimum, device 110 has subscriptions for text messaging with mobile network 120. Mobile network 120 may comprise a circuit-switched mobile network, such as a cdma2000 network, a GSM network, etc. Mobile network 120 may also comprise a packet-switched network, such as an IP Multimedia Subsystem (IMS) network or a Long Term Evolution (LTE) network. Because mobile network 120 may represent different types of networks, device 110 may likewise represent different types of devices, such as mobile or cellular devices, wireline devices, SIP phones, dual mode devices, etc.
  • In this embodiment, mobile network 120 includes a message center 122. Message center 122 comprises any system, server, or device that facilitates delivery of text messages. For example, message center 122 may comprise a Short Message Service Center (SMSC), a Multimedia Message Service Center (MMSC), an IP Short Message Gateway (IP-SM-GW), etc. Because message center 122 may be implemented in multiple locations within network 120, it is merely shown as being included within network 120 and not tied to any specific network node. Although not shown in FIG. 1, those skilled in the art understand that other servers or nodes are connected between device 110 and message center 122, such as base stations, wireless access points, switching systems (e.g., MSC or S-CSCF), gateways, etc.
  • Mobile network 120 further includes an archive server 124. Archive server 124 comprises any system, server, or device that archives or otherwise saves text messages for long-term storage. Mobile network 120 may offer a service that allows end users to backup their text messages to a server instead of having to save the text messages on their phones. An archive service such as this may be provided by archive server 124 so that text messages sent or received by end users will be backed-up to server 124. Archive server 124 may be provided by a third party that is not affiliated with the service provider of mobile network 120.
  • FIG. 2 illustrates text-enabled device 110 in an exemplary embodiment. Device 110 includes a network interface 202, a controller 204, and a user interface 206. Network interface 202 comprises any components, devices, or functions operable to exchange communications with other elements (e.g., message center 122) over network 120. Controller 204 comprises any components or devices operable to control the operations of device 110. User interface 206 comprises any components, devices, or functions operable to receive input from an end user, such as a keypad, a pointing device, etc., and/or convey content to the end user, such as a display, a speaker, etc.
  • In the embodiment described below, when device 110 sends a text message, protection information is inserted in the text message to control whether or not the text message is allowed to be archived. The protection information advantageously provides a layer of privacy for end users so that selected text messages are archived and selected text messages are blocked from being archived; especially the text messages that contain sensitive content, such as financial or medical content.
  • FIG. 3 is a flow chart illustrating a method 300 of inserting protection information in a text message in an exemplary embodiment. The steps of method 300 will be described with reference to device 110 in FIGS. 1-2, but those skilled in the art will appreciate that method 300 may be performed in other devices or systems. The steps of the flow charts described herein are not all inclusive and may include other steps not shown. The steps may also be performed in an alternative order.
  • In step 302, controller 204 (see FIG. 2) identifies a text message for delivery over mobile network 120. Controller 204 may identify the text message when an end user creates a new text message. Controller 204 may identify the text message when an end user selects an existing text message for reply, forward, or a similar function. Still further, controller 204 may identify the text message when an automated application creates a text message.
  • In step 304, controller 204 identifies protection information for the text message. Protection information comprises any data that controls archiving of the text message in a network. The protection information may include a protection class that applies to the text message. A protection class is a category of text messages that share a similar type of content. For example, a protection class may be financial, medical, health, parental control, business, social, etc. Thus, text messages that include financial content may be grouped into a common protection class. Text messages that include medical content may be grouped into a common protection class. The protection class may be indicated by a string or value, such as A, B, C, etc.
  • The protection information may alternatively or additionally include a protection level. A protection level is a degree or amount of protection desired for text messages, such as in a protection class. The protection level may be indicated by a range of integers, such as from 1 to 5. If the protection level is “5” for instance, then a high level of protection is desired for archiving the text message (e.g., no archiving is allowed). This protection level may be desired for financial or medical classes of text messages. If the protection level is “1” for instance, then a lower level of protection is desired for archiving the text message (e.g., archiving is always allowed). This protection level may be desired for social classes of text messages.
  • Controller 204 may identify the protection information by querying an end user through user interface 206 (assuming that device 110 is an end user device). When the end user composes a new text message or attempts to copy or forward an existing text message, controller 204 may ask the end user for the privacy information via user interface 206. The query may be for a protection class for the text message (e.g., financial, medical, etc.), and/or for a protection level (e.g., 1, 2, 3, or high, medium, low). User interface 206 then receives input from the end user indicating the desired protection information, and the user interface 206 provides the end user input to controller 204.
  • Controller 204 may alternatively identify the protection information by locating predefined or pre-provisioned information stored in device 110. This may be the case if device 110 is an automatic message server, such as an ESME. Those skilled in the art will appreciate that user interface 206 of device 110 may not be needed if device 110 comprises an ESME instead of an end user device.
  • In step 306, controller 204 inserts the identified protection information in the text message. Controller 204 may insert the protection information in a header of the text message (or a signaling message encapsulating the text message), or in the payload or body of the text message. Text messages are encoded as a header and a payload in a Protocol Description Unit (PDU). FIG. 4 illustrates a text message 400 in an exemplary embodiment. Text message 400 includes header 410 and payload 420. Header 410 includes metadata for transporting the text message, such as an originating address for the text message, a destination address for the text message, etc. Payload 420 includes the actual content for the text message.
  • Controller 204 may insert the protection information in the user data of payload 420. For example, controller 204 may insert the protection information in a User Data Header (UDH) 422 of payload 420 (Short Message Transport Layer (SM-TL) of the 3GPP specifications) as shown in FIG. 4. More particularly, UDH 422 includes a User Data Header Length (UDHL) parameter 430 and one or more Information Elements (IE) 432-433. Each Information Element (IE) 432 includes the following sub-parameters (typically in octets): Information Element Identifier (IEI) 442, Information Element Data Length (IEDL) 444, and Information Element Data (IED) 446. Controller 204 may insert the protection information in an IE or IEI.
  • In another example, controller 204 may insert the protection information in a User Data parameter of payload 420 (based on 3GPP2 specifications). The User Data parameter is part of the Teleservice Layer in the 3GPP2 protocol stack. The protection information may be inserted in the “reserved parameter” of the User Data.
  • In step 308, network interface 202 transmits the text message with the inserted protection information towards a destination over mobile network 120. In FIG. 1, network interface 202 may transmit the text message (in the appropriate signaling message) to message center 122 in mobile network 120. In response to the text message, message center 122 may perform store-and-forward processing to attempt delivery of the text message to a destination (not shown).
  • The description above applies to a text message sent from device 110 to mobile network 120. However, method 300 may also be performed in message center 122 or in another element of mobile network 120. FIG. 5 illustrates message center 122 in an exemplary embodiment. Message center 122 includes a network interface 502 and a controller 504. If message center 122 receives a text message, such as a text message destined for device 110 (see FIG. 1), then message center 122 may perform method 300 as follows. Controller 504 (see FIG. 5) identifies the text message for delivery over mobile network 120 in step 302 (which is the received text message).
  • Controller 504 then identifies protection information for the text message (step 304). When method 300 is performed in a network element such as message center 122, the protection information may be predefined or pre-provisioned in a subscriber profile. Thus, when the text message is identified for a particular end user, controller 504 identifies the proper profile and identifies the protection information predefined in the profile. Controller 504 may then insert the identified protection information in the text message (step 306). The protection information inserted in the text message may be new, or may modify (or delete) protection information already inserted in the text message. Network interface 502 then transmits the text message with the inserted protection information towards a destination (step 308) as part of store-and-forward processing.
  • One assumption when handling a text message in message center 122 is that either the sender or recipient of the text message has subscribed to an archive service (or backup service) for storing copies of the text messages for later use. Thus, message center 122 may communicate with archive server 124 to store a copy of the text message. Before the text message can be archived, message center 122 may operate as described in FIG. 6 to control whether the text message is archived.
  • FIG. 6 is a flow chart illustrating a method 600 of controlling how text messages are archived in an exemplary embodiment. The steps of method 600 will be described with reference to message center 122 in FIG. 1 and FIG. 5, but those skilled in the art will appreciate that method 600 may be performed in other devices or systems.
  • After the text message is received, controller 504 identifies the protection information inserted in the text message in step 602. To do so, controller 504 may parse the header or the user data (i.e., payload) of the text message to identify the protection information. Controller 504 then identifies an end user associated with the text message in step 604. For example, controller 504 may parse the header of the text message to identify a directory number, a network address, a public identifier (PUID), or some other information that identifies an end user that sent or will receive the text message.
  • In step 606, controller 504 identifies privacy policies defined or provisioned for the end user. The privacy policies may be stored in a subscriber profile for the end user that is stored locally on message center 122 or stored on a remote system. The privacy policies comprise any rules that control archiving (and/or forwarding/copying) of text messages involving the end user. The privacy policies may be defined by the end user or the service provider operating mobile network 120. The privacy policies may take the following conditions into account:
  • Protection class
  • Protection level
  • Copying/Forward/Archiving destinations
  • Source address
  • Destination address
  • Time of Day, Day of Week, etc.
  • Message types
  • Network domain
  • Protocols
  • Languages
  • Routing methods
  • Charging methods
  • Usage control rules
  • In step 608, controller 504 processes the protection information and the privacy policies (and possibly other information, such as the destination address) to determine if the text message is authorized to be archived. For example, if the protection information indicates a protection class of “financial” and a protection level of “1”, then the privacy policies may indicate that the text message is authorized to be archived. If the protection information indicates a protection class of “financial” and a protection level of “3”, then the privacy policies may indicate that the text message is not authorized to be archived. The privacy policies may take other information into account such as the source of the text message, the destination of the text message, the time of day, etc.
  • If the text message is authorized, then controller 504 initiates archiving of the text message in archive server 124 (in step 610). For example, controller 504 may send the text message to archive server 124 for storage. If the text message is not authorized, then controller 504 blocks the text message from being archived in archive server 124 (in step 612). For example, controller 504 may refrain from sending the text message to archive server 124 for storage.
  • Although method 600 has been described in terms of archiving text messages, a similar method may be used for forwarding text messages, copying text messages, etc.
  • If message center 122 sends the text message to archive server 124 without performing archiving control as described in method 600, then archive server 124 may operate similar to method 600. Archive server 124 may have a similar structure as shown in FIG. 5 with a network interface and a controller. When archive server 124 receives the text message from message center 122 for archiving, archive server 124 operates as in method 600 before storing the text message. In particular, the controller in archive server 124 identifies the protection information inserted in the text message (step 602), and identifies an end user associated with the text message (step 604). The controller then identifies the privacy policies defined for the end user (step 606). The controller processes the protection information and the privacy policies to determine if the text message is authorized to be archived (step 608). If the text message is authorized, then the controller initiates archiving of the text message (in step 610). For example, the controller may store the text message in a local memory. If the text message is not authorized, then the controller blocks the text message from being archived (in step 612). For example, the controller may refrain from storing the text message in the local memory.
  • By controlling how individual text messages are archived in the above embodiments, end users advantageously have more privacy with sensitive text messages. Instead of archiving all text messages, end users can specify which text messages are archived through the protection information and the privacy policies. And, there is a determination made on a message-by-message basis as to whether the message is allowed to be achieved. Thus, private text messages, such as those being financial and medical in nature, will not be archived and at risk of being viewed by unauthorized individuals.
  • EXAMPLE
  • FIG. 7 illustrates a communication system 700 in another exemplary embodiment. Communication system 700 includes a mobile network 720 that provides service to a mobile device 730. Mobile network 720 is also connected to an ESME 710 of a bank 712. ESME 710 is configured to send credit card transaction confirmations to mobile device 730 via SMS messages. Thus, when an end user of mobile device 730 uses his/her credit card, ESME 710 composes an SMS message with the credit card transaction confirmation.
  • ESME 710 is also configured to provide archiving protection as discussed above. Therefore, ESME 710 identifies the SMS message that was composed for mobile device 730, and identifies protection information for the SMS message. The SMS message in this example is financial in nature. Therefore, ESME 710 identifies the protection information as having a protection class “B” (financial) and a protection level “5” (high) for the SMS message. ESME 710 then inserts the protection information in the user data of the SMS message, and transmits the SMS message to SMSC 722. In response to the SMS message, SMSC 722 may perform store-and-forward processing to attempt delivery of the SMS message to mobile device 730.
  • In this example, the end user has subscribed to a service that archives SMS messages. Before archiving the SMS message in this instance, SMSC 722 identifies the end user associated with the SMS message, and identifies a subscriber profile for the end user. The subscriber profile includes privacy policies defined for archiving SMS messages. SMSC 722 processes the protection information inserted in the SMS message, and the privacy policies to determine whether this SMS message is allowed to be archived. In this example, the privacy policies disallow archiving of the SMS message to archive server 724 based on a protection class “B” and a protection level “5”. Therefore, SMSC 722 blocks the SMS message from being sent to archive server 724 for long-term storage.
  • The end user also subscribes to a service that forwards a copy of SMS messages to an email account for the end user. Before forwarding the SMS message in this instance, SMSC 722 processes the protection information inserted in the SMS message, and the privacy policies to determine whether this SMS message is allowed to be forwarded. In this example, the privacy policies allow forwarding of the SMS message to an email server 740 (which is hosting the email account of the end user) based on a protection class “B” and a protection level “5”. Therefore, SMSC 722 forwards the SMS message to email server 740.
  • As is evident in this example, the end user of mobile device 730 is able to control whether a sensitive SMS message (i.e., an SMS message containing information on a credit card transaction) is archived or forwarded. A similar process is performed for each individual SMS message that involves this end user. Thus, only authorized SMS messages are archived/forwarded instead of every SMS message.
  • Any of the various elements shown in the figures or described herein may be implemented as hardware, software, firmware, or some combination of these. For example, an element may be implemented as dedicated hardware. Dedicated hardware elements may be referred to as “processors”, “controllers”, or some similar terminology. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
  • Moreover, explicit use of the term “processor” or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, a network processor, application specific integrated circuit (ASIC) or other circuitry, field programmable gate array (FPGA), read only memory (ROM) for storing software, random access memory (RAM), non-volatile storage, logic, or some other physical hardware component or module.
  • Also, an element may be implemented as instructions executable by a processor or a computer to perform the functions of the element. Some examples of instructions are software, program code, and firmware. The instructions are operational when executed by the processor to direct the processor to perform the functions of the element. The instructions may be stored on storage devices that are readable by the processor. Some examples of the storage devices are digital or solid-state memories, magnetic storage media such as a magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media.
  • Although specific embodiments were described herein, the scope of the invention is not limited to those specific embodiments. The scope of the invention is defined by the following claims and any equivalents thereof

Claims (20)

We claim:
1. A system comprising:
a network interface configured to receive a text message; and
a controller configured to identify protection information inserted in the text message, wherein the protection information controls archiving of the text message;
the controller is configured to identify an end user associated with the text message, to identify privacy policies provisioned for the end user, to process the privacy policies and the protection information to determine whether the text message is authorized to be archived in an archive server for long-term storage, and to store a copy of the text message in the archive server responsive to a determination that archiving is authorized.
2. The system of claim 1 wherein:
the controller is configured to block the copy of the text message from being stored in the archive server responsive to a determination that archiving is not authorized.
3. The system of claim 1 wherein:
the controller is configured to identify the protection information inserted in user data of the text message.
4. The system of claim 3 wherein:
the controller is configured to identify the protection information in an Information Element (IE) of a User Data Header (UDH) in the user data.
5. The system of claim 1 wherein:
the protection information includes a protection class which is a category of text messages that share a similar type of content.
6. The system of claim 5 wherein:
the protection information includes a protection level indicating a degree of protection desired for text messages in the protection class.
7. The system of claim 1 wherein:
the protection information includes a source of the text message.
8. The system of claim 1 wherein:
the protection information includes a destination of the text message.
9. The system of claim 1 wherein:
the protection information includes a time of day.
10. The system of claim 1 wherein:
the network interface and the controller are implemented in a message center that facilitates delivery of the text message.
11. A method comprising:
receiving a text message through a network interface;
identifying, at a controller, protection information inserted in the text message, wherein the protection information controls archiving of the text message;
identifying, at the controller, an end user associated with the text message;
identifying, at the controller, privacy policies provisioned for the end user;
processing, at the controller, the privacy policies and the protection information to determine whether the text message is authorized to be archived in an archive server for long-term storage; and
storing a copy of the text message in the archive server responsive to a determination that archiving is authorized.
12. The method of claim 11 further comprising:
blocking the copy of the text message from being stored in the archive server responsive to a determination that archiving is not authorized.
13. The method of claim 11 wherein identifying protection information inserted in the text message comprises:
identifying the protection information inserted in user data of the text message.
14. The method of claim 13 wherein identifying the protection information inserted in user data of the text message comprises:
identifying the protection information in an Information Element (IE) of a User Data Header (UDH) in the user data.
15. The method of claim 11 wherein:
the protection information includes a protection class which is a category of text messages that share a similar type of content.
16. The method of claim 15 wherein:
the protection information includes a protection level indicating a degree of protection desired for text messages in the protection class.
17. The method of claim 11 wherein:
the protection information includes a source of the text message.
18. The method of claim 11 wherein:
the protection information includes a destination of the text message.
19. The method of claim 11 wherein:
the protection information includes a time of day.
20. The method of claim 11 wherein:
the network interface and the controller are implemented in a message center that facilitates delivery of the text message.
US14/624,087 2011-09-22 2015-02-17 Archive control for text messages Abandoned US20150161400A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/624,087 US20150161400A1 (en) 2011-09-22 2015-02-17 Archive control for text messages

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/240,783 US8990322B2 (en) 2011-09-22 2011-09-22 Archive control for text messages
US14/624,087 US20150161400A1 (en) 2011-09-22 2015-02-17 Archive control for text messages

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/240,783 Division US8990322B2 (en) 2011-09-22 2011-09-22 Archive control for text messages

Publications (1)

Publication Number Publication Date
US20150161400A1 true US20150161400A1 (en) 2015-06-11

Family

ID=46852402

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/240,783 Expired - Fee Related US8990322B2 (en) 2011-09-22 2011-09-22 Archive control for text messages
US14/624,087 Abandoned US20150161400A1 (en) 2011-09-22 2015-02-17 Archive control for text messages

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US13/240,783 Expired - Fee Related US8990322B2 (en) 2011-09-22 2011-09-22 Archive control for text messages

Country Status (6)

Country Link
US (2) US8990322B2 (en)
EP (1) EP2759099A1 (en)
JP (2) JP6000359B2 (en)
KR (1) KR20140066765A (en)
CN (1) CN103891212B (en)
WO (1) WO2013043365A1 (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140052793A1 (en) * 2012-08-15 2014-02-20 Microsoft Corporation Message synchronization with extended properties
US8983509B2 (en) * 2013-03-22 2015-03-17 Argela Yazilim ve Bilisim Teknolojileri San. ve Tic. A.S. Internet-based short message retrieval and display system
US20150046565A1 (en) * 2013-08-08 2015-02-12 Quicktext Inc. System and method for archiving messages
US20150200897A1 (en) * 2014-01-14 2015-07-16 Quicktext,Inc Method and system for routing and analyzing messages
CN106031202B (en) * 2014-03-27 2019-08-02 宇龙计算机通信科技(深圳)有限公司 Method for sending information and device and message receiving method and device
CN105635995B (en) * 2015-04-30 2019-02-01 宇龙计算机通信科技(深圳)有限公司 SMS processing method, terminal, cloud platform and short message process system
US10419225B2 (en) 2017-01-30 2019-09-17 Factom, Inc. Validating documents via blockchain
US10817873B2 (en) 2017-03-22 2020-10-27 Factom, Inc. Auditing of electronic documents
US11134120B2 (en) 2018-05-18 2021-09-28 Inveniam Capital Partners, Inc. Load balancing in blockchain environments
US11170366B2 (en) * 2018-05-18 2021-11-09 Inveniam Capital Partners, Inc. Private blockchain services
US10783164B2 (en) 2018-05-18 2020-09-22 Factom, Inc. Import and export in blockchain environments
US20200042982A1 (en) 2018-08-06 2020-02-06 Factom Digital Contracts in Blockchain Environments
US11989208B2 (en) 2018-08-06 2024-05-21 Inveniam Capital Partners, Inc. Transactional sharding of blockchain transactions
US11343075B2 (en) 2020-01-17 2022-05-24 Inveniam Capital Partners, Inc. RAM hashing in blockchain environments
US12008526B2 (en) 2021-03-26 2024-06-11 Inveniam Capital Partners, Inc. Computer system and method for programmatic collateralization services
US12007972B2 (en) 2021-06-19 2024-06-11 Inveniam Capital Partners, Inc. Systems and methods for processing blockchain transactions

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6035327A (en) * 1997-12-08 2000-03-07 Microsoft Corporation SMTP extension to preserve per-message and per-recipient properties
US6055302A (en) * 1996-10-03 2000-04-25 Telefonaktiebolaget L M Ericsson (Publ) System and method for incoming and outgoing interrogations for store-and-forward services
US20040177042A1 (en) * 2003-03-05 2004-09-09 Comverse Network Systems, Ltd. Digital rights management for end-user content
US20050064881A1 (en) * 2001-09-24 2005-03-24 T-Mobile Deutschland Gmbh Method for storing short data
US20050091318A1 (en) * 2003-10-09 2005-04-28 International Business Machines Corporation Enabling a sender to control future recipients of an email
US20070124789A1 (en) * 2005-10-26 2007-05-31 Sachson Thomas I Wireless interactive communication system
US7228334B1 (en) * 2001-12-28 2007-06-05 Bellsouth Intellectual Property Corp Systems methods to selectively control forwarding of electronic mail
US20070226367A1 (en) * 2006-03-27 2007-09-27 Lucent Technologies Inc. Electronic message forwarding control
US20080046352A1 (en) * 2004-06-09 2008-02-21 Mobilians Co., Ltd. System for Charging Royalty of Copyrights in Digital Multimedia Broadcasting and Method Thereof
US20080172462A1 (en) * 2007-01-16 2008-07-17 Oracle International Corporation Thread-based conversation management
US20100223097A1 (en) * 2009-03-02 2010-09-02 Hoozware, Inc. Method for providing information to contacts without being given contact data
US20100250686A1 (en) * 2009-03-31 2010-09-30 O'sullivan Patrick Joseph Propagation control system and method
US20100304766A1 (en) * 2009-06-02 2010-12-02 Goyal Amitabh Method and apparatus for providing enhanced sms/ems/mms
US7849213B1 (en) * 2007-10-30 2010-12-07 Sendside Networks, Inc. Secure communication architecture, protocols, and methods
US20110202756A1 (en) * 2010-02-15 2011-08-18 Cyglan LLC Secure encrypted email server
US20110275349A1 (en) * 2008-11-06 2011-11-10 Voxp Pte. Ltd. Mobile Phone Message Archiving System
US8073122B2 (en) * 2007-06-20 2011-12-06 Microsoft Corporation Message recall using digital rights management
US20120100830A1 (en) * 2009-06-30 2012-04-26 Markport Limited Anonymous party voice call processing
US8176064B2 (en) * 2004-03-25 2012-05-08 Nokia Corporation Method, device and system for information based automated selective data handling and provision by identification means
US20120149339A1 (en) * 2010-12-10 2012-06-14 MobileIron, Inc. Archiving Text Messages
US20120297463A1 (en) * 2010-02-01 2012-11-22 Orbach David M System for distribution permissions for network communications

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3736145B2 (en) * 1998-10-23 2006-01-18 トヨタ自動車株式会社 E-mail device and system
JP2003298576A (en) * 2002-03-29 2003-10-17 Fuji Xerox Co Ltd Group signature apparatus and method
FR2844948B1 (en) * 2002-09-23 2005-01-07 Eastman Kodak Co METHOD FOR ARCHIVING MULTIMEDIA MESSAGES
US7095829B2 (en) * 2003-09-04 2006-08-22 Emc Corporation Data message mirroring and redirection
JP2005293432A (en) * 2004-04-02 2005-10-20 Olympus Corp Information management method
US7426541B2 (en) 2004-09-07 2008-09-16 Storage Technology Corporation Electronic mail metadata generation and management
US7552179B2 (en) 2004-09-20 2009-06-23 Microsoft Corporation Envelope e-mail journaling with best effort recipient updates
US7970743B1 (en) 2005-09-15 2011-06-28 Emc Corporation Retention and disposition of stored content associated with multiple stored objects
US8396493B2 (en) * 2007-02-28 2013-03-12 Yahoo! Inc. Network-based archiving for threaded mobile text messages
KR101506254B1 (en) * 2007-04-02 2015-03-26 삼성전자 주식회사 Wireless telephone apparatus and method for protecting system resources
CN101068382B (en) * 2007-06-13 2010-04-21 中兴通讯股份有限公司 Short message center tolerance disaster distributary processing system and method
JP2009169507A (en) * 2008-01-11 2009-07-30 Yaskawa Information Systems Co Ltd Archive system and program for archive system
CN101296422A (en) * 2008-06-20 2008-10-29 中兴通讯股份有限公司 Data backup method, short message platform and client terminal
CN101404792A (en) * 2008-10-24 2009-04-08 北京亿企通信息技术有限公司 Mobile phone message backup method and system
CN102196381A (en) * 2011-04-12 2011-09-21 上海师范大学 GSM (Global System for Mobile Communications) short message transmissionbased remote data storage system of flow totalizer

Patent Citations (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6055302A (en) * 1996-10-03 2000-04-25 Telefonaktiebolaget L M Ericsson (Publ) System and method for incoming and outgoing interrogations for store-and-forward services
US6035327A (en) * 1997-12-08 2000-03-07 Microsoft Corporation SMTP extension to preserve per-message and per-recipient properties
US7299061B2 (en) * 2001-09-24 2007-11-20 T-Mobile Deutschland Gmbh Method for storing short data
US20050064881A1 (en) * 2001-09-24 2005-03-24 T-Mobile Deutschland Gmbh Method for storing short data
US20070117542A1 (en) * 2001-09-24 2007-05-24 T-Mobile Deutschland Gmbh Method for storing short data
US7228334B1 (en) * 2001-12-28 2007-06-05 Bellsouth Intellectual Property Corp Systems methods to selectively control forwarding of electronic mail
US20040177042A1 (en) * 2003-03-05 2004-09-09 Comverse Network Systems, Ltd. Digital rights management for end-user content
US20050091318A1 (en) * 2003-10-09 2005-04-28 International Business Machines Corporation Enabling a sender to control future recipients of an email
US8176064B2 (en) * 2004-03-25 2012-05-08 Nokia Corporation Method, device and system for information based automated selective data handling and provision by identification means
US20080046352A1 (en) * 2004-06-09 2008-02-21 Mobilians Co., Ltd. System for Charging Royalty of Copyrights in Digital Multimedia Broadcasting and Method Thereof
US20070124789A1 (en) * 2005-10-26 2007-05-31 Sachson Thomas I Wireless interactive communication system
US20070226367A1 (en) * 2006-03-27 2007-09-27 Lucent Technologies Inc. Electronic message forwarding control
US7912908B2 (en) * 2006-03-27 2011-03-22 Alcatel-Lucent Usa Inc. Electronic message forwarding control
US20080172462A1 (en) * 2007-01-16 2008-07-17 Oracle International Corporation Thread-based conversation management
US8171087B2 (en) * 2007-01-16 2012-05-01 Oracle International Corporation Thread-based conversation management
US8073122B2 (en) * 2007-06-20 2011-12-06 Microsoft Corporation Message recall using digital rights management
US7849213B1 (en) * 2007-10-30 2010-12-07 Sendside Networks, Inc. Secure communication architecture, protocols, and methods
US20110275349A1 (en) * 2008-11-06 2011-11-10 Voxp Pte. Ltd. Mobile Phone Message Archiving System
US20100223097A1 (en) * 2009-03-02 2010-09-02 Hoozware, Inc. Method for providing information to contacts without being given contact data
US20100250686A1 (en) * 2009-03-31 2010-09-30 O'sullivan Patrick Joseph Propagation control system and method
US20100304766A1 (en) * 2009-06-02 2010-12-02 Goyal Amitabh Method and apparatus for providing enhanced sms/ems/mms
US20120100830A1 (en) * 2009-06-30 2012-04-26 Markport Limited Anonymous party voice call processing
US20120297463A1 (en) * 2010-02-01 2012-11-22 Orbach David M System for distribution permissions for network communications
US8832802B2 (en) * 2010-02-01 2014-09-09 Protextion Technologies, Llc System for distribution permissions for network communications
US20110202756A1 (en) * 2010-02-15 2011-08-18 Cyglan LLC Secure encrypted email server
US20120149339A1 (en) * 2010-12-10 2012-06-14 MobileIron, Inc. Archiving Text Messages

Also Published As

Publication number Publication date
US20130080540A1 (en) 2013-03-28
CN103891212A (en) 2014-06-25
EP2759099A1 (en) 2014-07-30
JP2016146633A (en) 2016-08-12
KR20140066765A (en) 2014-06-02
WO2013043365A1 (en) 2013-03-28
US8990322B2 (en) 2015-03-24
CN103891212B (en) 2017-03-15
JP2015501559A (en) 2015-01-15
JP6000359B2 (en) 2016-09-28

Similar Documents

Publication Publication Date Title
US8990322B2 (en) Archive control for text messages
US9998419B2 (en) Systems, methods, and computer readable media for controlling social networking service originated message traffic
US8005493B2 (en) Messaging system and method
US8675831B2 (en) Storage of data messages for later retrieval by the recipient
US8630669B2 (en) Messaging system
KR20140015539A (en) Interface between restful web services and packet-switched networks for text messaging
US9161187B2 (en) Caller ID for text messaging
WO2010141008A1 (en) Management of advertisements inserted in text/multimedia messages
US20090037539A1 (en) Methods and Systems for Message Interworking
US8549083B2 (en) Message waiting notification to external message centers
US20040078439A1 (en) Messaging method
US20170142215A1 (en) Relaying mobile communications
US8271008B1 (en) Preventing spam messages
TW201108673A (en) Selective first delivery attempt (FDA) processing for text messages
GB2383229A (en) Preventing the wastage of network resources by preventing delivery of a message to a recipient who is not intended to receive it
IE20040693U1 (en) A messaging system and method
WO2010139775A1 (en) System and method for archiving messages

Legal Events

Date Code Title Description
AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001

Effective date: 20170912

Owner name: NOKIA USA INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001

Effective date: 20170913

Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001

Effective date: 20170913

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: NOKIA US HOLDINGS INC., NEW JERSEY

Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682

Effective date: 20181220

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

AS Assignment

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001

Effective date: 20211129