WO2011094028A1 - System for distribution permissions for network communications - Google Patents

System for distribution permissions for network communications Download PDF

Info

Publication number
WO2011094028A1
WO2011094028A1 PCT/US2011/000191 US2011000191W WO2011094028A1 WO 2011094028 A1 WO2011094028 A1 WO 2011094028A1 US 2011000191 W US2011000191 W US 2011000191W WO 2011094028 A1 WO2011094028 A1 WO 2011094028A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
forwarding
carrier
network
forwarded
Prior art date
Application number
PCT/US2011/000191
Other languages
French (fr)
Inventor
David M. Orbach
Evan John Kaye
Original Assignee
Orbach David M
Evan John Kaye
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US30012210P priority Critical
Priority to US61/300,122 priority
Application filed by Orbach David M, Evan John Kaye filed Critical Orbach David M
Publication of WO2011094028A1 publication Critical patent/WO2011094028A1/en
Priority claimed from US13/564,569 external-priority patent/US8832802B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/14Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/08Messages including annexed information, e.g. attachments

Abstract

A system can control whether a recipient of an electronic message (e.g., a text message, a multimedia message, an e-mail message, etc.) with a restricted image is permitted to forward the message to third parties. The sender of a text message may to limit the downstream distribution of that text message through text message forwarding by associating a forwarding restriction flag with the message.

Description

SYSTEM FOR DISTRIBUTION PERMISSIONS

FOR NETWORK COMMUNICATIONS

Field of the Invention

[0001] The present invention relates to the field of electronic communication networks and, in particular, to a system and method for a sender of an electronic message on a network to control and limit the distribution of that message by flagging the message to be forwarding restricted.

Background of the Invention

[0002] Text messaging, such as Short Messages Service (SMS), also known as "texting", refers to the exchange (i.e., transmission and receipt) of brief written or text messages between digital mobile phones over cellular or other wireless networks. Individual messages are referred to as "text messages" or "texts". Many service providers or carriers also offer multimedia messaging services, such as Multimedia Messaging Service (MMS), that allow for exchange of messages containing multimedia content, such as image, video and sound content. The most common application of the service is person-to-person messaging.

[0003] To send such a message, a user types the text into a mobile phone or other text- enabled device, attaches the desired multimedia content, enters one or more phone numbers for the recipients of the message, and sends the message. A SMS or MMS center receives and stores the SMS/MMS message, and then forwards the message to the recipient when the recipient is available.

[0004] One problem with such messaging services is that recipients of such messages may without limitation forward them to third parties. While a use may create a customized SMS message that he/she intends for only the intended recipient to receive, the recipient can forward the message to multiple third parties, who may in turn forward the message onto to other parties, and so on.

[0005] With the advance in technology that permits texting to include images, photos and videos, a very common practice has arisen called "sexting", which is slang for the act of sending sexually explicit or suggestive content within or as part of a text message. A genre of texting, sexting involves sending either text, images or video that is intended to be sexually arousing. Many surveys show that an alarming number of children and teens have electronically sent nude or semi-nude images of themselves, and this number is growing rapidly. [0006] Although sexting often takes place consensually between two people, it can also occur against the wishes of a person who is the subject of the content. An increasing social danger with sexting is that material can be very easily and widely promulgated, and the originator has no control over it. There have been many instances which have been reported throughout the news media where the recipients of sexting have shared the content of the messages with others, with less intimate intentions, such as to impress their friends or embarrass the sender, thereby increasing the instances where the intended recipient is not the only one viewing the content. Celebrities have also been victims of such abuses of sexting.

[0007] Although many public service advertisements and notices have urged children, teens and the general public to be wary of sexting or of sending any text message that they would not want someone other that the recipient to see, it has proven difficult to prevent individuals from sending these types of text messages. Similarly, it has also proven difficult to prevent recipients from forwarding messages to others.

[0008] It is an object of the present invention to prevent the recipient of such text messages from forwarding the message to those who were not intended to see the message in the first place.

[0009] It is an object of the present invention to provide a means to prevent the recipient of such text messages from forwarding the message non-intended recipients, where such means are respected by the respective devices as well as by the network service providers or carriers.

Summary of the Invention

[0010] The invention solves the above problems by providing systems and methods that control whether a recipient of an electronic message (e.g., a text message, a multimedia message, an e-mail message, etc.) is permitted to forward the message to third parties. The invention provides a system and mechanism for a sender of a text message including an image to limit the downstream distribution of that text message through text message forwarding by associating a forwarding restriction flag with the message.

[0011] In one embodiment of the invention, a sender of a message can flag the message as not being allowed to be forwarded by including some simple text, for example, "DNF", within the text portion of the message. In general, a user may not be able to force the recipient's client device to respect the simple DNF text flag that is included in the message because of the number of different client devices present in a network system. Most times, one does not have control over all the operating systems and applications on such client devices, for example, all the cell phones that are on a cellular network. Also, once a message is in unencrypted form on a client device, then the user can use its own application to forward such a message.

[0012] In a preferred embodiment of the invention, the messaging network would respect the forwarding restriction flag, even if the forwarding restriction flag is not respected by the recipient's client device. For example, the network, or a connected service, would store a copy of every message it receives with a forwarding restricted flag and then compare each message sent from one of the recipients of such a message with all the forwarding restricted messages received by that device. If there is a match, and the message sent was not allowed to be forwarded (even with the flag removed), then the network will refuse to send such a message.

[0013] This core concept may involve several additional features:

[0014] 1. Hashing: Whereas in one embodiment of the invention, the messaging network would store a copy of every forwarding-restricted message that it receives, many consumers may not like the idea of all their messages, particularly those that are forwarding-restricted, being stored by the carrier. Accordingly, in one embodiment, all such stored forwarding restricted messages are "hashed", i.e., passed through a mathematical hash function, prior to being stored. Hash functions are often used to speed up data comparison tasks, such as detecting duplicated or similar records in a large file. In this situation, hashing the forwarding-restricted message converts it into a semi-unique code, which is impossible to be converted back into the message but which allows the forwarding-restricted message to be matched with the identical message that a recipient attempts to forward, because that message would be converted to the identical code. In this way, if a message sent by a subscriber is identical to one that was previously received by that person and has been designated as forwarding-restricted, then the carrier could detect this new message and block it from being sent. Algorithms that allow for some change to the image while still retaining the same value can also be used.

[0015] 2. Flagging: In another embodiment of the invention, not all messages would be blocked, but rather only those that are flagged in some way. In this embodiment, only those messages with a designation such as "DNF" (do not forward) in them would be flagged and subject to the restrictions on forwarding. Of course, only those carriers implementing this standard would respect those flags. Alternatively, perhaps instead of "DNF", only images are subject to the forwarding restrictions.

[0016] 3. Data Pooling: In a further embodiment, the network can limit the viral forwarding of messages by, for instance, placing restrictions on the forwarding of a message, such as a message containing a photo, regardless of whether it was initially flagged for restricted forwarding, if there is an indication that the message is "going viral", i.e., being forwarded a very high number of times within a very short amount of time. In this embodiment, it may also be acceptable for the network to re-examine the content of a message that has been forwarded more than once or twice, for example a pre-set number of times or a pre-set number of times within a pre-set time period. In this embodiment, a network could track, such as via hash values, the path of a message, and when it has been forwarded more than a critical number of times within the network within a pre-set time period, then either block further forwarding of the message or re-examine the content of the message, either manually or through a software program. The critical number of times that a message is forwarded within the a pre-set time period would be set sufficiendy high to indicate a level of interest that may be considered prurient or less-than-honorable, so as to trigger a closer inspection of the message being forwarded. The system can also block forwarding of a message that has been received by a chosen critical limited number of subscribers in its network, regardless of whether the message has left the carrier's network and been returned to the carrier's network by a subscriber of another carrier.

[0017] 4. Notification: In yet another embodiment of the invention, the carrier could append to incoming messages a designation, such as "DNF", that is sufficiently noticeable to the recipient so as to provide notification that the message being received is forwarding- restricted. The recipient of the forwarding-restricted message would then be less inclined to attempt to forward the message, thus potentially saving the computing resources of the network servers.

[0018] 5. Keyword Screening: In still another embodiment of the invention, the carrier could screen for "adult" keywords that accompany an image, which keywords might suggest the image content. Further, the carrier could screen for "adult" keywords in replies to the sender of the image, which keywords might shed light on the image contents. If any of the critical, preselected "adult" keywords are used in either the original message or a reply thereto, the carrier may automatically flag the original message forwarding restricted.

[0019] 6. User Specified Limits: In yet a further embodiment, a user may include parameters with the flag, such as to permit a message to be forwarded but only a limited number of times, such as up to three times. In this embodiment, the user could add a flag "DNF>3", which would indicate to the system not to forward the message more than 3 times. Then, if recipients attempt to forward the message more than the chosen limited number of times, further forwarding of the message would be prevented. A network could track, such as via hash values, the path of a message, and, when it has been forwarded the chosen limited critical number of times within the network, then further forwarding of the message is blocked. The system can also block a forwarding of a message that has been received by a chosen limited number of subscribers in its network, regardless of whether the message has left the carrier and been returned by a subscriber of another carrier.

[0020] 7. DNF Non-Compliance Notification: In another embodiment, if a user flags a message as forwarding restricted, then a first carrier can detect which second carrier the message is about to be delivered to and ask the sender for verification that the message may be sent to the receiving carrier. For example, if the forwarding restricted message is being sent to a carrier that is not known to respect forwarding restriction flags, then the sending carrier may send an auto-reply to the sender as follows: "Your Do-Not-Forward request will not be enforced by 111-111-111 l's network. Should the message still be sent? (reply with "yes", or do nothing)".

[0021] In a preferred embodiment, a central repository or sever would maintain all the stored forwarding-restricted messages or hash codes of those stored messages. In that way, all the carriers can share the restricted forwarding flags and thereby respect the rules set by the subscribers on any network. For instance, if a user indicates a limit of "DNF>10" on his message, then regardless of the carriers through which the forwarding-restricted message is forwarded, the central repository can track every time that the message is forwarded, keep a running tally of the number of times that the message is forwarded and advise users who try to forward the message once the forwarding limit has been reached that it can no longer be forwarded. In this embodiment, the cell phone carriers linked to the central repository would have to report forwarding on a real time basis and seek permission to forward further.

[0022] Another aspect of the invention is to decrease incentive for the user to send incriminating photos of themselves, particularly in the case of minors, by automatically sending to the account holder a copy of all text messages sent or forwarded from a phone on a particular account. The user could know in advance that the cell phone account has this setting, thereby providing a disincentive to send potentially incrirninating photos of himself or others. In a variation on this, the account statement could contain thumbnail images of all images in messages that were forwarded by the phone.

[0023] In certain instances, a recipient of a forwarding-restricted message containing an image may attempt to defeat the forwarding restriction by copying the image into a new message. Forwarding of an attached photo can be limited through the addition of meta data associated with the image. For example, if a "DNF' flag is associated with the original message in which the photo was sent, the carrier could attach a DNF flag within the meta data of the image as well. In this way, the recipient would have difficulty modifying such meta data on the client device and the carrier, and other carriers could still respect the metadata flag when it reenters the network during a forwarding operation. A disadvantage is that if someone were to remove the tag then it could be freely forwarded, and this might be more easily achieved than modification of the image itself, especially when substantial modification of the image may be necessary to change the hash value.

Description of the Figures

[0024] The above and other objects and advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which the reference characters refer to like parts throughout and in which:

[0025] Fig.1 illustrates an exemplary network arrangement of hardware for implementing a method in accordance with an embodiment of the invention;

[0026] Fig. 2 shows a sender's handset in preparation for sending a text message with image or photo attached;

[0027] Figs. 3A-3C shows a process flow diagram of a text message with an image being sent from a sender subscribed to a first carrier to a recipient subscribed to a second carrier;

[0028] Fig. 4 shows a graphical flow diagram of the DNF verification process taken when a text message with an image is sent from a sender to a carrier;

[0029] Fig. 5A shows a sequence of forwarding that would occur in the absence of the system of the invention;

[0030] Fig. 5B shows a sequence of forwarding that occurs in the presence of the system of the invention.

Detailed Description of the Preferred Embodiment

[0031] Reference will now be made to the exemplary embodiments illustrated in the drawings, and specific language will be used herein to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Alterations and further modifications of the inventive features illustrated herein, and additional applications of the principles of the inventions as illustrated herein, which would occur to one skilled in the relevant art and having possession of this disclosure, are to be considered within the scope of the invention.

[0032] Fig. 1 shows an example of a network arrangement of a hardware system 100 for use with the current invention. System 100 can be any known system configuration, such as a standard SMS or MMS system configuration, to provide various rich content services via interactions between a plurality of mobile users and a mobile network provider. System 100 includes various network types, such as 2G mobile networks, 3G mobile networks, internets, etc. The network interface can be accommodated via cellular systems, internet protocols as well as other related network message protocols. In addition, the multimedia messages transfer protocols on the 2G/3G mobile network can be compatible with the existing multimedia message transfer protocols on the internet.

[0033] System 100 has a first network 110 operated by Carrier A connected to a second network 112 operated by Carrier B through conventional carrier-carrier communications network link 108. Permission Service 102 operates independently from all network carriers and communicates with Carrier A and Carrier B independently. Permission Service 102 may be external to and accessible to all network carriers, or each network carrier may utilize its own separate Permission Service 102. Carrier A has a plurality of handsets subscribing to its network 110: a first handset 116 communicates with Carrier A 110 through link 115, as do a second handset 118 and a third handset 120 through their respective links 117 and 119. Carrier B also has a plurality of handsets subscribing to its network 112: a first handset 122 communicates with Carrier B 112 through link 121, as do a second handset 124 and third handset 126 through their respective links 123 and 125.

[0034] If a user takes a photo with handset 116 and wishes to send that photo in a text (SMS or MMS) message to the user of handset, that communication will typically travel over a conventional communication link. For example, if the intended recipient is the user of handset 118, then the communication will typically travel over the internal communication network 110 of Carrier A. However, if the intended recipient is the user of handset 128, then that communication will typically travel over the conventional carrier-carrier communication link 108 from network 110 of Carrier to network 112 of Carrier B. In embodiments of this invention, as will be discussed below, Carrier A 110 first checks with the Permission Service 102 whether it is permitted to send the first message on to the second handset before sending the message.

[0035] With reference now to Fig. 2, a handset 200 is depicted, such as handset 116 of Fig. 1, with its outer casing 202, screen 204 and keypad 212. On the screen 204, various components of a SMS/MMS text message authoring session are displayed, such as the recipient's phone number 203, the photo 206 that was taken by that handset and is now about to be included with the message, and the text component 208 of the text message which also contains the "DNF' text flag 210 indicating that this message is for the recipient only and should not be forwarded.

[0036] It is preferred that the designation, such as "DNF", be sufficiendy noticeable to the recipient so as to provide notification that the message being received is forwarding-restricted. The recipient of the forwarding-restricted message would then be less inclined to attempt to forward the message, thus potentially saving the computing resources of the network servers.

[0037] Fig. 3A shows a process flow diagram 300 of the sending of text message 208 and photo 206 of Fig. 2 from handset 200 of a sender subscribed to the network of carrier A to a recipient. At step 302, the sender captures photo 206 with handset 200, at step 304 the sender includes photo 206 in a text message 208, and at step 306 the sender adds the forwarding restriction "DNF' 210 to the body of text in the message. At step 308, the sender sends the message, which prompts handset 200 to upload the text and photo in the message to the network of the sender's carrier, e.g., network 110 of carrier A, at step 310.

[0038] In one embodiment of the invention, carrier A would send a copy of the photo included within the forwarding-restricted message that it receives from handset 200 (or the entire forwarding-restricted message itself) and send it to Permission Service 102 for inclusion in the Do-Not-Forward database of forwarding-restricted messages. When that recipient or a subsequent recipient attempts to forward a message that includes a photo, the photo in that message is compared with the photos stored in the DNF database at Permission Service 102. If a message or photo to be sent by a subscriber is identical to one that was is stored at Permission Service 102 and designated as forwarding-restricted, then the carrier would block this photo from being sent

[0039] In another embodiment, in order to avoid Permission Service 102 having to store all forwarding-restricted photos or messages, all such stored forwarding restricted messages (or the forwarding-restricted photos forwarded within those messages are "hashed", i.e., passed through a mathematical hash function, prior to being stored and converted into code. This code is then stored by Permission Service 102. Then, when another user attempts to forward a photo, the photo to be forwarded is hashed and compared to the hash codes stored at Permission Service 102. If the hash code of the photo to be forwarded identically matches a hash code of stored at Permission Service 102 and designated as being forwarding-restricted, then the carrier would block this photo from being sent. [0040] Continuing the process flow on Fig. 3B, at step 312 the carrier evaluates whether an image 206 was received from handset 200 within text message 208. If no image 206 was present, then the carrier need not check with the Permission Service 102, and the carrier proceeds to send the text message 208 as normal (see step 326 of Fig. 3C).

[0041] If an image 206 is present in text message 208, at step 314 of Fig. 3B the carrier calculates the hash value of the image 206. The hash value can be calculated by a number of different algorithms, as known by those with skill in the art. In this regard, it is preferable that the same hash algorithm be used by all the carriers so that the results of all hash values will be consistent can be compared.

[0042] At step 316, the hash value along with the "DNF' request is sent to the Permission Service . At step 318, the Permission Service checks its Do-Not-Forward database to determine whether the image was previously been sent and designated as forwarding- restricted. If the exact same hash value is present in the Permission Service DNF database, then the image must previously have been sent and designated as forwarding-restricted, and the sender is attempting to forward this forwarding-restricted image. The Permission Service then sends the carrier a refusal message at step 320, and the carrier in turn then refuses to send the message and so notifyies the sender at step 322. This is also shown graphically in Fig. 4.

[0043] However, if the exact same hash value is not present in the Permission Service's Do-Not-Forward database, then at step 324 the Permission Service enters this hash value into the Do-Not-Forward database of forwarding-restricted messages. This image or photo is saved into the DNF database at Permission Service 102 because the "DNF' flagged photo was sent to the Permission Service to determine whether the message could be forwarded. Naturally, if there had not been a "DNF' flag associated with the photo, then the photo would not be stored in the DNF database at Permission Service 102.

[0044] The process flow continues in Fig. 3C where at step 326 the carrier proceeds to send the message. At step 328, the message is passed to the second carrier, if the recipient is a subscriber to the network of a carrier other than the network of the sender's carrier, and at step 330 the second carrier delivers the message to the recipient

[0045] The invention can apply to photos, as in the above process flow, or to simple text messages, where a hash value can be calculated from the text message itself and not an associated image.

[0046] In a further embodiment, the sender may include parameters with the DNF flag, such as to permit a message to be forwarded only a limited number of times. In this embodiment, the user could add a flag "DNF>3", which would indicate to the system not to forward the message more than three times. In this regard, the Permission Service stores a counter along with each stored DNF photo to internally tally the amount of times that forwarding-restricted photo has been forwarded. If the inquiry to the Permission Service for forwarding the photo has not reached the maximum permitted number of forwards, then the Permission Service does not issue a "block", and each permitted forward of the forwarding- restricted photo increases the tally by one. If a recipient attempts to forward the message but the Permission Service has determined that the maximum permitted number of forwards has been reached, further forwarding of the message is prevented. Alternatively, the network could also track, such as via hash values, the path of a message, and, when it has been forwarded the chosen limited critical number of times within the network.

[0047] In still another embodiment, the user's carrier can detect which carrier the message flagged as being forwarding restricted is about to be delivered to and ask the sender for verification that the message may be sent to the receiving carrier. For example, if the forwarding restricted message is being sent to a carrier that is not known to respect forwarding restriction flags, then the sending carrier may send an auto-reply to the sender as follows: "Your Do-Not-Forward request will not be enforced by 111-111-111 l's network. Should the message still be sent? (reply with "yes", or do nothing)".

[0048] Fig. 5A shows a sequence of forwarding that would occur in the absence of the system of the invention. In this sequence, user of handset 116 forwards the text message with photo to the user of handset 118 within the network of Carrier A. User of handset 118 forwards the text message with photo to the user of handset 122, who is a subscriber to the network of Carrier B, who forwards the text message with photo to the user of handset 128, who is a subscriber to the network of Carrier C. In this sequence, with no forwarding restrictions, the text message with photo can be forwarded to anyone anywhere.

[0049] In Fig. 5B, however, once the text message with photo that is marked with the DNF flag and has been designated as forwarding-restricted has been forwarded from user of handset 116 to the user of handset 118 within the network of Carrier A, the photo is stored within the DNF database at Permission Service 102. The system of the invention then prevents the user of handset 118 from forwarding the text message with DNF photo to the user of handset 122, who is a subscriber to the network of Carrier B. Thus, neither the user of handset 122 nor the user of handset 128, nor anyone else, can receive the text message with the DNF photo. [0050] It is to be understood that the above-referenced arrangements are only illustrative of the application for the principles of the present invention. Numerous modifications and alternative arrangements can be devised without departing from the spirit and scope of the present invention. While the present invention has been shown in the drawings and fully described above with particularity and detail in connection with what is presently deemed to be the most practical and preferred embodiment(s) of the invention, it will be apparent to those of ordinary skill in the art that numerous modifications can be made without departing from the principles and concepts of the invention as set forth herein.

Claims

Claims
1. A method of transmitting electronic messages comprises:
allowing a sender of an electronic message to create the electronic message;
inserting or otherwise including a forwarding control indicator in the electronic message;
transmitting the electronic message with the forwarding control indicator to a message center for subsequent transmission to a recipient or recipients;
. This method may be performed at the access device of the sender, at a content server offering the electronic messages, or at another intermediate server responsible for transmission of the electronic message to the recipient.
2. The method of claim 1 wherein the forwarding control indicator comprises a sequence, flag or other indicator as to whether this electronic message is allowed to be forwarded by one or more subsequent recipients.
3. A method of controlling the forwarding of an electronic message, comprising:
processing a forwarding control indicator in the electronic message to determine if the electronic message is allowed to be forwarded;
if a determination is made that the electronic message is not allowed to be forwarded to the third party, preventing the electronic message from being forwarded;
if a determination is made that the electronic message is allowed to be forwarded to the third party, allowing the electronic message to be forwarded.
4. The method of claim 3, wherein said method is performed at the access device of the recipient, at the message center, or at another intermediate server between the access device of the recipient and the third party.
PCT/US2011/000191 2010-02-01 2011-02-01 System for distribution permissions for network communications WO2011094028A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US30012210P true 2010-02-01 2010-02-01
US61/300,122 2010-02-01

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US13/564,569 US8832802B2 (en) 2010-02-01 2012-08-01 System for distribution permissions for network communications
US14/448,393 US9256760B2 (en) 2010-02-01 2014-07-31 System for distribution permissions for network communications
US15/018,528 US9935905B2 (en) 2010-02-01 2016-02-08 System for restricting the distribution of attachments to electronic messages

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/564,569 Continuation-In-Part US8832802B2 (en) 2010-02-01 2012-08-01 System for distribution permissions for network communications

Publications (1)

Publication Number Publication Date
WO2011094028A1 true WO2011094028A1 (en) 2011-08-04

Family

ID=44319685

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/000191 WO2011094028A1 (en) 2010-02-01 2011-02-01 System for distribution permissions for network communications

Country Status (1)

Country Link
WO (1) WO2011094028A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012155464A1 (en) * 2011-08-30 2012-11-22 中兴通讯股份有限公司 A terminal for protecting short message, system and method thereof
WO2016033126A1 (en) * 2014-08-29 2016-03-03 Microsoft Technology Licensing, Llc Sharing content
US10002260B2 (en) 2014-08-29 2018-06-19 Microsoft Technology Licensing, Llc Sharing content

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060177005A1 (en) * 2005-02-07 2006-08-10 Anthony Shaffer System and method for voicemail privacy
US20070226367A1 (en) * 2006-03-27 2007-09-27 Lucent Technologies Inc. Electronic message forwarding control
US20090031393A1 (en) * 2007-07-23 2009-01-29 International Business Machines Corporation System and method for controlling email propagation
US20090234922A1 (en) * 2004-12-01 2009-09-17 Aol Llc Automatically Enabling the Forwarding of Instant Messages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090234922A1 (en) * 2004-12-01 2009-09-17 Aol Llc Automatically Enabling the Forwarding of Instant Messages
US20060177005A1 (en) * 2005-02-07 2006-08-10 Anthony Shaffer System and method for voicemail privacy
US20070226367A1 (en) * 2006-03-27 2007-09-27 Lucent Technologies Inc. Electronic message forwarding control
US20090031393A1 (en) * 2007-07-23 2009-01-29 International Business Machines Corporation System and method for controlling email propagation

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012155464A1 (en) * 2011-08-30 2012-11-22 中兴通讯股份有限公司 A terminal for protecting short message, system and method thereof
WO2016033126A1 (en) * 2014-08-29 2016-03-03 Microsoft Technology Licensing, Llc Sharing content
US10002260B2 (en) 2014-08-29 2018-06-19 Microsoft Technology Licensing, Llc Sharing content

Similar Documents

Publication Publication Date Title
US8291011B2 (en) Alert broadcasting to a plurality of diverse communications devices
US9083695B2 (en) Control and management of electronic messaging
ES2237022T3 (en) Instant messaging.
US8737580B2 (en) Toggling voicemail class of service
CN100486370C (en) Electronic message forwarding device and method
AU2005272189B2 (en) Methods and apparatus for identifying and facilitating a social interaction structure over a data packet network
JP4689921B2 (en) System for identifying distributed content
DE60114692T2 (en) Method for transferring stored data of a database
US7532890B2 (en) Content-based notification and user-transparent pull operation for simulated push transmission of wireless email
JP5166244B2 (en) System and method for identifying a sender
US7308090B2 (en) Conference call facility
JP2007504563A (en) Data message mirroring and destination change
EP1523837B1 (en) Method and system for controlling messages in a communication network
US20090247198A1 (en) Method and Apparatus for Blocking ID Information Associated with a Sender of a Short Messaging Service (SMS) Message
EP1599985B1 (en) Method and apparatus for a non-revealing do-not-contact list system
US20080168146A1 (en) Electronic messaging system and method
US8472595B1 (en) Method and apparatus for providing a wireless portable communication device with the ability to selectively display picture and video images
EP1625716B1 (en) Messaging system and service
US8732250B2 (en) Provision of secure RSS feeds using a secure RSS catcher
US20100015976A1 (en) System and method for sharing rights-enabled mobile profiles
US20050004992A1 (en) Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients
EP1482748A2 (en) Inbox caching of messages on a mobile terminal
US6928149B1 (en) Method and apparatus for a user controlled voicemail management system
JP4917776B2 (en) Method for filtering spam mail for mobile communication devices
US20040037259A1 (en) Method of operating a virtual private wireless network implementing message delivery preferences of the user

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11737419

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11737419

Country of ref document: EP

Kind code of ref document: A1