WO2009121974A1 - Procédé et système de traitement de messages de données et de chaînes de message par comparaison de l'adresse d'origine et de l'adresse de destination pour détecter une concordance - Google Patents

Procédé et système de traitement de messages de données et de chaînes de message par comparaison de l'adresse d'origine et de l'adresse de destination pour détecter une concordance Download PDF

Info

Publication number
WO2009121974A1
WO2009121974A1 PCT/EP2009/054106 EP2009054106W WO2009121974A1 WO 2009121974 A1 WO2009121974 A1 WO 2009121974A1 EP 2009054106 W EP2009054106 W EP 2009054106W WO 2009121974 A1 WO2009121974 A1 WO 2009121974A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
user
data
mobile
messages
Prior art date
Application number
PCT/EP2009/054106
Other languages
English (en)
Inventor
Eamon Hession
Original Assignee
Txtlink Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Txtlink Limited filed Critical Txtlink Limited
Publication of WO2009121974A1 publication Critical patent/WO2009121974A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails

Definitions

  • the present invention relates to mobile telecommunications and in particular to 5 messaging provided in a mobile telecommunications network.
  • messaging is intended to include data messaging such as SMS messaging and MMS messaging.
  • mobile messaging provides an important communication tool.
  • the ability to compose, send and receive data messages between subscribers to the mobile network is an important feature of the functionality of the mobile telecommunication network.
  • 5 As part of the transmission of a message between a sender and a recipient the message travels through components of a mobile telecommunication network.
  • the message is initially routed through the normal routing mechanisms of the mobile telecommunication network which includes components such as for example a short message switching centre SMSC and a Home Location 0 Register, HLR.
  • the specific network architecture of a mobile telecommunication network will be omitted here as it will be well known to the person skilled in the art.
  • the term mobile telecommunication network is intended to define one or more networks, be those provided by the same or different service providers.
  • a common method of communicating with a Third Party by SMS is to send a pre-defined keyword in an SMS message to a short-code.
  • This short-code is hosted by mobile operators who forward on the message to the Service Provider who is registered to us the short code.
  • the service provider receives the message and analyses the text to identify the keyword. Actions can be performed as determined by the keyword at the start of the message.
  • third party service providers to provide services to users of data messages such as the facility for a single user to send multiple message to a group of parties (1 :N messaging) or indeed for a group of users to send a thread of message between themselves in a chat environment (N:N Messaging).
  • This typically requires each of the users to transmit the specifics of their messages to a third party service provider using the destination address of the third party service provider, in the form of for example a short code or the like.
  • the conventional routers treat these messages in the same way as any other two party communication and route based on the destination address associated with the data message.
  • the body of the message is examined to ascertain what action is appropriate. This can be achieved through for example the inclusion of predefined keywords within the body of the data message. On ascertaining that these keywords are present, through comparison of the words within the body of the data message with a look up table, then the third party service provider can decide what is the appropriate action for that message. It will be understood that the use of a look up table takes time and processing capability at the computing devices of the third party.
  • WO2006040749 describes how by providing an intelligent router at the network level, that messages travelling through the network may be intercepted and routed appropriately. This is achieved by maintaining a list of subscribers to a service and examining all messages travelling through the network to ascertain if those messages originate from or are destined to subscribers to that service. This step of checking is based on comparing the MSISDN numbers or some other unique identifiers of the data message originator with a look up table and if it is ascertained that the intercepted message originates with a subscriber to the service, then invoking as appropriate a value-added service for that message.
  • this value-added service has specific meaning within the telecommunications art and includes services are supplied either in- house by the mobile network operator themselves or by a third-party value- added service provider (VASP), also known as a content provider (CP).
  • VASP value- added service provider
  • CP content provider
  • short codes are special telephone numbers, significantly shorter than full telephone numbers and which are designed to be shorter to read out and easier to remember than normal telephone numbers. While this is the intention such short codes and their operation are at the network operator level unique to each service provider. In this way the user of the short code for a particular service needs to remember the particular short code for the particular service provider. This can result in a request for service being sent to the incorrect service provider. Furthermore where a service provider wishes to provide such service there is a requirement for them to register the short code with the network operator to ensure that a user of that short code will have their message routed to that service provider.
  • a system and methodology in accordance with the teaching of the present invention which provides for the filtering of data messages based on a self referencing filter for the data messages.
  • a system and methodology employing the teaching of the present invention provides for a filtering of a larger volume of data messages to a subset on which a value-added service or appropriate other action be effected.
  • the invention provides for a filtering based on the originating and destination address of the data message. These are typically provided by the MSISDN details within the header of the mobile data message. If each are found to be identical then that message is intercepted for appropriate action. If they are not found to be identical then the message is allowed to continue in its normal fashion.
  • the filter is achieved by examining only the specifics of the data message there is no look up table comparison required. In this way more messages may be initially filtered per unit time and the processing requirement is also reduced.
  • a method of filtering data messages within a mobile telecommunication environment including the steps of: Examining the originating and destination address associated with a specific data message, On determining that each of the originating and destination address are the same, selecting that message as requiring further examination and routing that message appropriately for that further examination, and On determining that each of the originating and destination addresses are not equal allowing the message to continue within the mobile telecommunication network to the appropriate destination address.
  • the examining step may be provided on a router within the mobile telecommunication network, i.e. within the mobile operator architecture such as the SMSC or may be implemented at a third party service provider to which the data message has been routed.
  • FIG 1 which is a schematic overview of a mobile network provided in accordance with the teaching of the invention and Figure 2 which shows how first and second filters may be provided to assist in identification of messages for subsequent action.
  • Figure 3 shows an example of how chains of messages can be intercepted to allow for third party service providers to piggyback on data messages sent between two users of a mobile telecommunication network.
  • Figure 4 shows an implementation of a system in accordance with the present teaching for providing remote storage of data messages pertaining to a user.
  • Figure 5 which shows how user specific information may be pulled from the secondary datastore of Figure 4
  • Figure 6 shows in schematic form how the user specific datastore may populate other datastores or receive feeds from such datastores.
  • FIG. 1 shows in schematic form a typical data message flow in accordance with the teaching of the present invention.
  • a first user 100 composes a data message on their handset 150 and using the telephone number of the intended recipient of the message transmits (step 105) the message from their handset.
  • the message is received in the mobile telecommunication network 105 and based on the destination address is routed (step 1 15) through that network onto an appropriate handset 120 associated with the intended recipient 125. While being a highly simplified schematic it will be appreciated that this message flow is representative of how data messages are traditionally transmitted.
  • the user 150 wishes to avail of additional services available to users of data messaging they generate a message and transmit (Step 130) that message to their own number. It will be appreciated that in this scenario on arrival at the mobile telecommunication network that the originating and destination addresses are the same.
  • An intelligent router 135 provided as part of that network 100, and in accordance with the teaching of the invention, is configured to receive and examine all messages passing through the mobile telecommunication network.
  • the intelligent router 135 is configured to examine the specifics of the originating and destination addresses for all messages passing through the network and to filter those messages identified as having the same originating and destination addresses as being representative of messages requiring further attention.
  • the filtering is effecting on a self- referencing basis with no requirement to compare the specifics of the SMS to an external datastore.
  • the generation of the filter set simply requires the examination of the specifics of the message being routed through the network it can be efficiently implemented without requiring use of look up tables and the like.
  • the data message can then be taken out of the normal routing process within the mobile telecommunication network and examined for appropriate action.
  • exemplary appropriate actions could include a routing of that message to a third party service provider but specifics of this will be discussed later.
  • the intelligent router was provided as part of the mobile telecommunication network.
  • a first filter 200 is provided as part of the mobile telecommunication network 1 10 and a second filter 205 is provided as part of a third party service provider 210.
  • the first filter 200 is arranged to intercept those messages either originating or destined to a subscriber to a value -added service.
  • a message will be created by a user 150 and transmitted (Step 250) into the mobile telecommunication network 1 10. On receipt of the message within the network it is examined to see if it is of the category associated with a subscriber to a value-added service.
  • this first filter may be provided.
  • the message may be routed (Step 255) to the third party service provider 210.
  • the second filter 205 is operable in a similar fashion to that described with reference to Figure 1. Specifically this second filter is configured to compare the destination and originating addresses of the data message and to filter that message for subsequent action if the two addresses are the same.
  • the message is allowed to pass back into the mobile telecommunication network (step 260), for onward transmission (Step 265) to an intended recipient handset 120.
  • Step 260 the mobile telecommunication network
  • Step 265 the message is allowed to pass back into the mobile telecommunication network.
  • the second filter routes that message to a third filter 215 where the body of the text message is examined for keywords which are then compared against a look up table 216 to ascertain the correct appropriate action.
  • a third filter 215 where the body of the text message is examined for keywords which are then compared against a look up table 216 to ascertain the correct appropriate action.
  • the teaching of the invention can also be extended to allow a subscriber to a system provided in accordance with the teaching of the present invention to tailor these services via a web or other communication channel 220.
  • a user 150 could configure groups of other users into broadcast or chat groups to which threads of messages could be broadcast or indeed where a 1 :N message could be generated, where N is the number of users defined for a specific group.
  • Txtlink system a system provided in accordance with the teaching of the invention, which for the sake of convenience will be termed a Txtlink system.
  • a system comprises both hardware and software components and can be provided on one or more dedicated computing devices or distributed across shared resources accessed by a mobile telecommunication network and in a description of such a system there are some common terms which will now be defined to assist the reader in reviewing the following:
  • Owner - A user who has created a group is the owner of that group.
  • Target - The destination for a message. Can be a user, MSISDN or group.
  • a user starts a chat session by sending CHAT followed by a list of
  • TxtLink usemames that they want to chat with.
  • the recipients receive a message from the chat starter requesting that they reply with JOIN. Once joined, the recipients receive a message from their own number confirming their participation in a chat session. They can reply to this chat message to send a message to the chat session. Chat sessions are limited to 10 chatters and entry to a chat session is on a first come first served It will be understood that the above are examples of the type of value added service that may be invoked using a system and methodology provided in accordance with the teaching of the invention. By filtering a large volume of data messages traversing through data network based on a self referencing filter within the data message it is possible to process larger volumes of data messages without increasing server of processor capacity.
  • the user of the value added service does not also have to remember the details of the value-added service provider, as is the case when using for example SHORT CODES to provide services.
  • the specific MSISDN identifiers of those users may be kept confidential and only the Txtlink names of pseudonyms of those users embedded in the date message threads. This can allow a user to maintain their MSISDN confidential while still availing of public broadcast fora.
  • Public groups have a unique group name. No more than one user can create a group with the same group name. Users subscribe and send messages to the group by sending the group name to their own number. Public groups are only open to TxtLink users. Joining a Public group from the handset
  • TxtLink sends the unique public group name to their own number. TxtLink validates the group name and access. The user will be able to join the group, either by being invited, being in the group owners friend list, or if the group is open. On joining the group, the user is sent back the group welcome message if one has been created. If no welcome message has been created, the user receives a default welcome message.
  • TxtLink intercepts the message and distributes to all other members of the group. Those who sent the message receive of the copy of the message back to themselves.
  • Members of a Public group can leave the group at any time by sending STOP followed by the unique public group name to their own number. They will receive a final message confirming that they have left the group.
  • Public chats allow TxtLink members to take part in chat without revealing their MSISDN by only sending and receiving to and from their own number.
  • the user sends the keyword CHAT followed by a list of TxtLink user names that they want to chat with.
  • the teaching of applications of a self referencing filter that is used to select specific data messages within a mobile telecommunication network has been described with reference to a single message, i.e. the originating message that is the call to action is a message sent to self by the originating requestor of the service.
  • the teaching of the present invention can also be used to for chains of messages between senders and recipients within the network.
  • a simple chain is a single message that is sent by a sender to himself.
  • a more complicated chain is a message that is sent by a sender to another recipient, the other recipient then sending a reply to the sender, such that there are two messages in the chain.
  • the filtering of messages within the normal data message traffic to select a sub-set of the messages traversing the network for subsequent action can be done by effecting a filter that is self referencing-.
  • An example of this can be considered as following the steps of: a. Determining the originating address of a first message in the chain; b. Determining the destination address of a final message in the chain; c. Comparing the originating address and destination for a match; d. Processing the message chain based on determination of a match.
  • FIG 3 shows in schematic form a typical data message flow in accordance with this embodiment of the teaching of the present invention.
  • the same reference numerals are used for similar entities or components to what was described previously with reference to Figures 1 and 2.
  • a user composes a data message on their handset 100 and using the telephone number of the intended recipient of the message transmits the message from their handset.
  • the message is routed (Step 300) through the normal routing mechanisms of the mobile telecommunication network such as for example the use of a short message switching centre SMSC, 105.
  • an intercept module 1 10 Provided as part of the mobile telecommunication operator infrastructure is an intercept module 1 10 such as was described previously. Based on the specific details of the message- be that the content and/or the sender or recipient details, the message is identified as being of the type that should be routed to a third party service provider 1 15.
  • the message On determining that the message should be routed to the third party service provider 1 15, it is routed 305 to that third party.
  • the message is modified to include additional text or data content as appropriate.
  • the length of data messages is restricted to a predefined number of characters. However typical usage of data messaging does not use all available characters. Therefore, depending on the capacity remaining within the message for additional text and/or data content to be inserted, then such text and/or data appropriate to the capacity remaining in the message will be inserted.
  • the ultimate recipient 120 receives the data message in the usual fashion. From their perspective there is nothing different in this data message than other data messages, the sender ID (related to the mobile telecommunication telephone number of the sender) is displayed as part of the message.
  • the content of the message is as input by the sender. However, in accordance with the teaching of this embodiment of the present invention the message will contain in addition, the content as inserted by the third party service provider. This content may be in the form of a display of information or indeed may be a call to action whereby the recipient of the data message is invited to engage further.
  • Such calls to action are familiar to users of mobile networks. For example, it is not unusual for a mobile operator or third party service provider to independently push information to the subscribers of particular networks. On receipt of the pushed data, the recipient would simply reply with a keyword such as "GET" or "SEND” or the like within the content of their reply to the third party service provider.
  • a keyword such as "GET” or "SEND” or the like within the content of their reply to the third party service provider.
  • the data from the third party is embedded within the data message of another sender, a person who the recipient has personal contact with and who is typically completely independent of and oblivious to the actions of the third party service provider.
  • the recipient has a data message with content appropriate to and input by the original sender 100 of the message and content appropriate to and input by the third party service provider 1 15.
  • the user interface is a mobile handset with its limited screen format, keypad functionality and actual dimensions of the handset.
  • most data messages traffic is conducted by persons on the move, they need to be able to send and receive message quickly and efficiently with minimum interaction with the handset- as is exemplified by the popularity of predictive texting where the handset functionality is configured to determine appropriate words in the usage language from the key sequence input by the user on their keypad.
  • a recipient 120 of a data message wishes to engage with the third party service provider they simply effect a reply to the original message in an appropriate form which is detailed in the original message.
  • This may be in the form of a keyword of the like, such that the recipient would insert the keyword "GET” or the like into the body of the message before pressing the SEND button on their handset and transmitting that message 320. From their perspective, and indeed from the perspective of their handset and its SENT folder, the sent message appears to have been transmitted back to the original sender 100 of the message.
  • the interceptor module 1 10 is configured to monitor for such message with the appropriate keyword and to intercept them prior to delivery to the indicated address, the original sender 100.
  • the reason for this interception is that while the destination address is appropriate to the user 100, the message content is not, it is appropriate to the third party service provider 1 15.
  • This intercept is desirably done on a first instance by comparing the original message of the chain and the destination address of the final message of the chain- finding them to be the same and then selecting that message for further analysis.
  • the body is interrogated to evaluate the presence or otherwise of specific keywords for action by the third party. In the absence of those keywords within the body, the message is simply returned back into the network and allowed to continue in its usual fashion.
  • the present invention can also provide for intelligent selection of that data content to be of a form suitable with the context of the message.
  • the third party service provider 1 15 may be considered representative of a plurality of service providers, each differing in their service offering.
  • the third party service provider may effect a software filter analysis on the content/context of the message body. By determining for example that the message relates to a future planned excursion, the content that is inserted may be appropriate to that excursion. In this way intelligent insertion of content to the data message may be implemented with the result that as its context is appropriate to the original message, that the recipient is more likely to engage with the third party service provider on receipt of the message.
  • Figure 4 shows how an external datastore can be provided which provides for the maintenance of a secondary copy of the data message traffic generated by a user's mobile handset on a remote location which is then accessible by the user.
  • This remote location is desirably accessed via an internet connection such as via a web portal or internet site which enables the user to access their data message records without requiring access to their handset.
  • Such a secondary store could also be usefully employed to store and maintain contact lists for the user.
  • By enabling the user to send and receive messages via a web interface it is possible for the user to maintain their data message flow using the functionality of a full keyboard and in locations where handsets are not operable or allowable.
  • Such a system is implemented by intercepting messages within the mobile telecommunication network prior to their delivery to the intended handset and routing predetermined messages to this secondary store where they may be subsequently accessed by the user.
  • this external backup can be implemented by the user sending a message to self- per the technique above- which will be intercepted by the network and processed as requiring a value added service.
  • a message to self with a keyword such as INITIATE within the body of the message, the user could activate a storage of all subsequent SMS messages for that user within the secondary datastore.
  • the user could then selectively turn this functionality off by for example sending a message to self with the keyword TERMINATE to advise the third party datastore that messages should no longer be stored.
  • Figure 4 shows an example of a network architecture that may be implemented to provide such functionality. It will be appreciated that once the service is activated that it does not require send to self messages to perform and that all data traffic originating from or sent to that user could be stored.
  • the same reference numerals will be used for similar modules or components to that described before.
  • a first user composes a data message on their handset 100 and using the telephone number of the intended recipient of the message transmits the message from their handset.
  • the intended recipient is a registered user 150 of a system provided in accordance with the teaching of the present invention.
  • the user 150 has a handset 120 which has a handset specific identifier, such as a MSISDN, with which data and voice traffic can be correctly routed through a mobile telecommunication network to the handset.
  • a handset specific identifier such as a MSISDN
  • the message is initially routed (Step 400) through the normal routing mechanisms of the mobile telecommunication network 105 which includes components such as for example a short message switching centre SMSC and a Home Location Register, HLR.
  • the specific network architecture of a mobile telecommunication network will be omitted here as it will be well known to the person skilled in the art.
  • the term mobile telecommunication network is intended to define one or more networks, be those provided by the same or different service providers.
  • an intercept module 1 10 Based on the specific details of the message traversing the network 105- be that the content and/or the recipient details, the message is identified by the intercept module 1 10 as being of the type that should be intercepted. As part of this intercept the data message is routed to a remote location 1 15.
  • the remote location represents one or more servers (or clusters of servers) which may send and receive data traffic over a number of different communication protocols.
  • a user specific datastore 416 is maintained at the remote location 1 15, which may typically be a computer implemented web portal provided by a third party service provider. This datastore is typically generated at the time of the user 150 registering for use of the system and is accessible by the user through conventional internet protocols 455 such as those provided by browsers such as FirefoxTM and Internet ExplorerTM
  • the user specific datastore may include one or more record data fields such that different type of information pertinent to the user may be recorded for future review.
  • this user specific data store represents a secondary datastore location for messages that are intended for transmission to the user 150.
  • the traditional datastore for such messages is located on the user's handset 120.
  • the messages and other data stored within this secondary datastore may be independently manipulated or used and changes made on the secondary datastore will not necessarily be synchronised with the handset datastore and vice versa.
  • the data message may then be then returned 410 to the mobile network infrastructure where its path to the original recipient is continued 415 in a conventional fashion. If so implemented, then it will be appreciated that the user will have two separate copies of the same data message each being provided at a separate location.
  • the user 150 of the system receives at their handset 120 the data message in the usual fashion. From their perspective there is nothing different in this data message from other data messages that they have received. Its form and content is typically identical to that originally generated at the handset 1 10, i.e. the content of the message is as input by the sender. However, in accordance with the teaching of the invention the user 150 can read that message either at their handset 120 or via the web enabled or web interface user specific datastore 416. In this way the user can access data messages in locations where handset operation is not possible. Furthermore if their handset is misplaced or broken they have not lost all their data messages in that the user specific datastore provides a master record of all data messages that were transmitted to that user over the network.
  • the message received by the user 150 is exactly the same as that generated at the handset 100, it is also possible for the third party operator of the user specific datastore to embed additional data into the data message prior to releasing the message back into the conventional messaging systems of the mobile telecommunications network.
  • the additional content may be in the form of a display of information or indeed may be a call to action whereby the recipient of the data message is invited to engage further.
  • this additional content is desirably introduced at the third party provider 1 15 at the time of copying the message into the user specific datastore 416.
  • the modification may be such as to include additional text or data content as appropriate. It will be understood that the length of data messages is restricted to a predefined number of characters. However typical usage of data messaging does not use all available characters. Therefore, depending on the capacity remaining within the message for additional text and/or data content to be inserted, then such text and/or data appropriate to the capacity remaining in the message will be inserted.
  • both the versions of the message at the handset and that at the user specific datastore will include the additional information whereas if the content is inserted subsequent to the storage at the user specific datastore 416, that the versions at each of the user specific datastore and the handset will be somewhat different.
  • the user By providing for a copy of all messages sent to a registered user of the system to be stored at two locations, the user is provided with two separate and independent interface locations to their data messages. They can use the traditional handset 120 for when they are on the move and when in a more permanent location can access the user specific datastore 416. As the user specific datastore will typically not suffer from the same memory or storage limitation of the handset is it possible that they could maintain a master record of multiple messages on the user specific datastore while trimming the messages stored on the handset to a more manageable level. As the interface to the user specific datastore 416 is typically via a conventional internet connection such as that using a computer, keyboard and screen, the advantages of this improved interface can be utilised to enable a user to manage their messages.
  • a system provided in accordance with the teaching of the invention may be operable to effect storage of additional information from the handset.
  • Such information could include contact lists and the like.
  • the transfer of such information to a computer or remote server from a handset is well known and it is not intended to limit the present invention to any one specific manner.
  • what is provided by the present invention is a capacity to update such contact lists stored at the remote server by extracting the sender details 100 from a received message at the third party service provider and updating the contact list with those additional details at the same time as storing the copy of the message.
  • the contact list stored and maintained at the handset typically includes the names associated with individual numbers.
  • the extracted numbers could be presented to the user in a number of different fashions.
  • One possible example is a list of most recently received data messages and their originating number.
  • the details of the incoming message could be compared with the details already stored on the contact list and if a match is made, then the number is associated with that name and displayed with the contact name reference.
  • the number could be displayed as the simple number and the user prompted when they next log onto the user specific datastore 416 to update their records to associate that number with a contact.
  • the third party service provider 1 15 could also be configured to compare the incoming extracted number with other numbers stored in separate and distinct user specific datastores, and if a match is found to then use those details to populate the user specific datastore 416.
  • the teaching of the invention may also be modified to enable storage of all or some of the data messages generated by the user 150 at their handset 120.
  • the user specific datastore 416 will not only provide an independent record of the incoming messages to a registered user but may also store some or all of outgoing messages.
  • a data message may be generated at the handset 120 and then transmitted 400 into the mobile telecommunication network 105.
  • the interface module 1 10 may be configured to copy all outgoing messages from the registered user to the user specific datastore 416. This may be achieved by, on detecting a message that should be intercepted, of routing that message 425 to the third party service provided 1 15 where a copy may be added to the user specific datastore 416. Once copied, then the original message flow may be continued by returning 430 the message to the mobile telecommunication network where it continues, in the usual fashion to the ultimate recipient.
  • the copying of outgoing messages from a user handset 120 may be effected by either having the intercept module 1 10 effect a routing of all messages originating from the registered handset 120 to the third party 1 15 or alternatively by availing of inserted keywords into the message.
  • the user 150 may not desire all outgoing messages to be stored on the remote user specific datastore 416. Instead they may wish to flag certain messages as warranting storage, this flag being effected by inserting a predetermined keyword such as "LOG" at a specific point within their drafted data message, or by sending the message to self with the keyword inserted as was discussed above.
  • a predetermined keyword such as "LOG"
  • the interceptor module 1 10 is configured to monitor for messages with the appropriate keywords and/or identifier parameters and to intercept them prior to delivery. It will be appreciated that while Figure 4 shows the functionality of the intercept module 1 10 as residing wholly on the mobile telecommunication network but it will be understood that the teaching of the invention should not be construed so limited.
  • the intercept module 1 10 may include a number of different elements or sub-modules some of which could reside on the telecommunications network and some on the third party service provider.
  • the portion residing on the telecommunications network could simply provide for a re-direction of all messages intended for identified recipients to the third party service provider where they would then be sorted and copied as appropriate.
  • the intercept module could provide for the copying of the data message within the telecommunications network such that on transmission of a copy of the intercepted message to the third party service provider, the message is simultaneously allowed to continue within the telecommunications network to its intended original handset address.
  • a third party service provider may maintain a secondary storage of messages routed through a mobile telecommunication network for a user. These messages may then be accessed by the user via a different communication channel to their traditional interface with data messages.
  • This enables alternative mechanisms for managing their data messages but also and more importantly allows them to access data messages without requiring access to their handset.
  • the user specific datastore is not limited by the memory capacity limitation of handsets, it can provide for storage of many more messages than possible on the handset such that on accessing the user specific datastore 1 16, the user has a better historical perspective of their data messaging traffic
  • the system of the present invention may be further expanded to provide for additional functionality.
  • An example of this is shown in Figure 5 where the same reference numerals are used for the same elements or components.
  • An example of the distribution of this information as part of a pull function will now be described with reference to an exemplary birthday request. If the user 150 has registered and recorded their birthday details on the user specific datastore 416, such details may be distributed on request by the third party service provider 1 15 to nominated parties.
  • An example of this is where for example a person 100 on the user contact list whose profile has been approved for pulling information sends a data message to the user handset 120 with the keyword "BIRTHDAY" (Step 500).
  • the intercept module 1 10 On receipt of this message within the telecommunications network, the intercept module 1 10 is configured to compare this keyword with pre-recorded keywords and with the intended recipient details and route the message directly to the third party service provider 1 15 (Step 505).
  • a data extraction module 550 extracts the birthday details from the appropriate user specific datastore 416 and embeds these details into a message for transmission back to the requester 100. Once embedded the message is routed through from the service provider 1 15 to the mobile network (Step 510) and then back to the requester (Step 515).
  • the original intended message recipient 120 never receives the original request so they are therefore not troubled with the request.
  • birthday is only an example and that any user specific information such as for example, address, title, other contact information, etc could be predefined as being allowable for transmission to requesters without requiring user authorisation at the request time.
  • the specifics of the information that may be requested will depend on the pre-association of keywords with the actual data type and this can be effected by the user during their interface 555 with the third party service provider 1 15.
  • Figure 6 shows a further modification to such an arrangement whereby the user specific datastore 416 may be used to receive information feeds from or direct information feeds to other datastores.
  • datastores include HLR records 601 that provide an indication of the location of the handset of the user.
  • HLR records 601 that provide an indication of the location of the handset of the user.
  • the HLR records provided indicative locations of the user 150.
  • authorised third parties could then request information as to the location of the user and that information could be returned to the requester without requiring interaction by the user 150.
  • This could be particularly advantageous in the case of parental monitoring of location of their children and does not require an opening of the HLR records directly to interrogation requests. In this way the load of managing these requests is diverted to the third party service provider.
  • the user specific datastore 416 could provide feeds to and receive feeds back from third parties 650a, 650b who maintain other datastores 651 a, 651 b that include information pertaining to a user or members of that users defined groups. This could be used for example to enable an update of contact information within the contact store of the user specific datastore or indeed to push out further copies of the data messages to other datastores for example those on which social networking sites such as FACEBOOKTM and the like are maintained.
  • While the management of the user specific datastore 416 has been described with reference to the user 150 directly accessing the data, it is possible within the teaching of the present invention for the user to also effect changes in the operation of the system directly from their handset 120.
  • send to self messages with keywords within the body of those data messages that have already been associated with an action or rule at the third party service provider 1 15 it is possible for the user to initiate or terminate certain actions.
  • Such control could typically be implemented by sending a data message with a specific keyword embedded therein to their own number.
  • the intercept module 1 10 directs the message to the third party 1 15 where the data message is interrogated and the appropriate functionality performed. This could for example be the establishment of an out of contact notification.
  • the system allows for the interception of message flows between the two users to a third party service provider where appropriate data may be extracted and copied into a user specific datastore for subsequent interrogation by the user.
  • the invention also provides for the pulling of user specific information using conventional mobile data messages but not requiring the user to authorise the pulling at the time of the request. From the perspective of the users of the system they are simply using the system as they have traditionally done.
  • a system in accordance with the present teaching offers a way of turning their mobile phone into a powerful social networking tool by enabling their own number as a central contact point for more than just voice and text.
  • a subscribers' number becomes a hub for group messages, alerts and user profiles, along with a unique, many-to-many, SMS based instant-messaging system that doesn't require anyone to remember short-codes, or require users to remember keywords once they are chatting.
  • a subscriber can use their own mobile number as if it were a shortcode, allowing friends, colleagues and clients to sign up to receive user's broadcasts or group messages, access profile information, or receive automated responses to an SMS.
  • a user of a system in accordance with the present teaching can use their mobile number to interact with other users by using a system defined usemame and sending a keyword, followed by a usemame to themselves. In this way, a subscriber's own number becomes a replacement for a shortcode not only for other people, but for the user as well.
  • Groups may be defined and allow a subscriber to host a group that is either open to all or invite only.
  • Group hosts can send to other group members simply by sending for example the keyword GROUP followed a message to their own mobile number.
  • Group members can send to others by sending GROUP and their message to the host's mobile number.
  • the TxtLink system may be configured to the message and distribute the message text to the other group members.
  • Joining a TxtLink subscribers' group is as simple as sending the keyword GROUP on its own to the subscriber's mobile number.
  • TxtLink Alerts allows a subscriber to host an information service, with their own number acting as a substitute for short-codes.
  • Teen can sign up to a user's alerts by sending ALERT to their mobile number.
  • the TxtLink subscriber now has a powerful tool for passing information to a large number of recipients by sending the keyword ALERT, followed by their message, to their own number.
  • system may be configured to allow two or more users to provide a unique instant-messaging tool that allows users to start a chat session with other TxtLink subscribers by sending CHAT to other TxtLink member's mobile numbers.
  • Multiple subscribers can be in the same chat session at the same time and once chatting, sending a message to everyone else is simply a case of sending your message to your own number - no need to remember any keywords or short-codes.
  • TxtLink subscribers will also have access to all of their SMS traffic, both inbound and outbound, from a web interface that can be accessed anywhere in the world.
  • the interface can be used for viewing and storing inbound messages as well as composing and sending SMS, all using the subscribers normal mobile number.
  • Sent and received messages from a subscriber's handset are automatically stored in a secure data store and accessible from the web interface without any user intervention.
  • TxtLink offers a unique permission-based channel for delivering highly relevant and targeted advertising discretely into the inbound SMS stream without adversely affecting a consumer's user experience.
  • TxtLink provides multi-dimensional targeting capabilities allowing an advertiser to select advertisements for delivery based on subscriber profile information, time of day, and message context.
  • Each SMS advertisement includes a call-to-action that the consumer can respond to as easily as replying to a received SMS and including a keyword in the response.
  • a TxtLink system such as that provided in accordance with the present teaching will intercept the keyword and deliver a response, such as an SMS coupon or a link to a mobile site.
  • TxtLink Alerts allow a TxtLink user to host a one-to-many information service using their own mobile number as a replacement to a shortcode. People can opt-in to a TxtLink Alerts by sending the keyword ALERT to the user's mobile number. When a TxtLink user sends the keyword ALERT followed by some message text to their own number, the message is sent to all those who are following the user's alerts. The message arrives on the other mobile handsets with the originating number of the alert owner, rather than a short-code. To stop receiving TxtLink Alerts, people simple send STOP ALERT to the TxtLink user's mobile number.
  • TxtLink This removes them from the Alerts list, and following a confirmation, they will not receive further alerts from the TxtLink user.
  • TxtLink usemame For one TxtLink user to join another TxtLink user's Alerts, rather than sending to the other's mobile number, they can send ALERT, followed by the other's usemame, to their own number. TxtLink will intercept this message- to-self, look up the usemame, and add a subscription to the other's TxtLink Alerts list.
  • TxtLink Alerts A typical example of using TxtLink Alerts follows.
  • a TxtLink user enables Alerts by sending themselves a text message with the text "ALERTS ON".
  • the TxtLink platform will intercept the message and enable Alerts for that user.
  • SMS Short message service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention porte sur un système et un procédé qui permettent un filtrage efficace de messages de données transmis dans un réseau de télécommunication mobile. Un utilisateur mobile 150 peut demander un service à un fournisseur de service 210 par envoi d'un message SMS comprenant un ou plusieurs mots-clés à son propre numéro de combiné. Le message est intercepté et routé vers le fournisseur de service. Dans un mode de réalisation, le service peut être un service de sauvegarde de message. Dans un mode de réalisation, un message d'un premier utilisateur à un second utilisateur est intercepté et routé vers le fournisseur de service, qui ajoute du texte au message et le transfère au second utilisateur. Si le second utilisateur envoie une réponse au message modifié comprenant un ou plusieurs mots-clés au premier utilisateur (chaîne de message), la réponse est interceptée, interprétée comme étant une demande de service et routée vers le fournisseur de service.
PCT/EP2009/054106 2008-04-04 2009-04-06 Procédé et système de traitement de messages de données et de chaînes de message par comparaison de l'adresse d'origine et de l'adresse de destination pour détecter une concordance WO2009121974A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IES2008/0261 2008-04-04
IE20080261 2008-04-04

Publications (1)

Publication Number Publication Date
WO2009121974A1 true WO2009121974A1 (fr) 2009-10-08

Family

ID=40740001

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2009/054106 WO2009121974A1 (fr) 2008-04-04 2009-04-06 Procédé et système de traitement de messages de données et de chaînes de message par comparaison de l'adresse d'origine et de l'adresse de destination pour détecter une concordance

Country Status (1)

Country Link
WO (1) WO2009121974A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013156980A1 (fr) * 2012-04-20 2013-10-24 Telefonaktiebolaget Lm Ericsson (Publ) Messagerie par sms groupés
JP7450145B1 (ja) 2023-12-19 2024-03-15 株式会社ナレッジフロー メッセージ送信代行装置及びプログラム

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1322126A1 (fr) * 2001-12-21 2003-06-25 Nokia Corporation Reacheminement des messages du réseau mobile en courrier électronique
US20050283837A1 (en) * 2004-06-16 2005-12-22 Michael Olivier Method and apparatus for managing computer virus outbreaks
WO2006040749A1 (fr) * 2004-10-14 2006-04-20 Anam Mobile Limited Procede pour acheminer des messages sms au moyen d'un noeud de routage intelligent
US7113977B1 (en) * 2002-06-26 2006-09-26 Bellsouth Intellectual Property Corporation Blocking electronic mail content
US20070293247A1 (en) * 2006-06-14 2007-12-20 Yahoo! Inc. Platform for managing mobile domains and keyword-activated applications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1322126A1 (fr) * 2001-12-21 2003-06-25 Nokia Corporation Reacheminement des messages du réseau mobile en courrier électronique
US7113977B1 (en) * 2002-06-26 2006-09-26 Bellsouth Intellectual Property Corporation Blocking electronic mail content
US20050283837A1 (en) * 2004-06-16 2005-12-22 Michael Olivier Method and apparatus for managing computer virus outbreaks
WO2006040749A1 (fr) * 2004-10-14 2006-04-20 Anam Mobile Limited Procede pour acheminer des messages sms au moyen d'un noeud de routage intelligent
US20070293247A1 (en) * 2006-06-14 2007-12-20 Yahoo! Inc. Platform for managing mobile domains and keyword-activated applications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A. LAMBERT: "Analysis of spam", DEPARTMENT OF COMPUTER SCIENCE, UNIVERSITY OF DUBLIN, TRINITY COLLEGE, September 2003 (2003-09-01), pages V-XI, 39-56, XP002533362, Retrieved from the Internet <URL:http://www.tara.tcd.ie/handle/2262/838> [retrieved on 20090622] *
HASIKA PAMUNUWA ET AL: "An Intrusion Detection System for Detecting Phishing Attacks", SECURE DATA MANAGEMENT; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, vol. 4721, 23 September 2007 (2007-09-23), pages 181 - 192, XP019101007, ISBN: 978-3-540-75247-9 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013156980A1 (fr) * 2012-04-20 2013-10-24 Telefonaktiebolaget Lm Ericsson (Publ) Messagerie par sms groupés
JP7450145B1 (ja) 2023-12-19 2024-03-15 株式会社ナレッジフロー メッセージ送信代行装置及びプログラム

Similar Documents

Publication Publication Date Title
US7730149B2 (en) Interactive communications system
KR101117451B1 (ko) 전자 메시지 전송 방법, 전자 메시지 전송 장치 및프로그램 저장 매체
US8406792B2 (en) Message modification system and method
KR101524313B1 (ko) 통합 메시징 서비스에서 인스턴트 메시징 처리 통지 요청과 응답 방법 및 그 시스템
US20060235981A1 (en) Providing a second service to a group of users using a first service
EP3010184B1 (fr) Procédé et passerelle de messages courts à protocole internet (ip-sm-gw) pour fournir un service d&#39;interfonctionnement entre une messagerie convergente sur ip (cpm) et un service de messages courts (sms)
EP2033457B1 (fr) Procédé d&#39;annonce groupée dans un service de messagerie fondé sur le protocole SIP
US20030065749A1 (en) Service authorizer
US9049165B2 (en) Method for delivering message based on CPM service and server thereof
US20040203619A1 (en) Anoymous messaging using mobile telephone
KR20180118732A (ko) 비동기 메시징 시스템에서의 단일 계정에 대한 다수 프로파일의 관리
CN1997009A (zh) 一种即时消息过滤方法
EP2560329B1 (fr) Procédé et système de traitement pour acheminer une demande de message
JP6254530B2 (ja) 連絡先情報の購読を招待する装置及び方法
US20110252105A1 (en) Mobile communication system and method for the requesting of positive delivery reports from individual group members
US20120129516A1 (en) Group Handling For Push-To-Talk Services
KR20090087791A (ko) 비통합메시징 서비스와 인터워킹하기 위한 통합메시징서비스 제공 시스템 및 방법
WO2009121974A1 (fr) Procédé et système de traitement de messages de données et de chaînes de message par comparaison de l&#39;adresse d&#39;origine et de l&#39;adresse de destination pour détecter une concordance
US9160569B2 (en) Messaging system and method
CN101305623B (zh) 用于确定具有控制功能的pt服务器的方法和装置
WO2007066354A1 (fr) Systeme et procede permettant de partager des donnees numeriques avec commande securisee et a granularite fine par un reseau de communication
US20100062797A1 (en) Method for group communication between subscribers to different messaging services, communication terminal and computer program product
EP2066090A1 (fr) Initiation de sessions dynamiques
WO2021133358A1 (fr) Système utilisé pendant la récupération ou la transmission d&#39;un message court
KR20060080627A (ko) 피티티 서비스를 지원하는 시스템에서 버디 추가 요청 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09728693

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09728693

Country of ref document: EP

Kind code of ref document: A1