WO2011094028A1 - System for distribution permissions for network communications - Google Patents
System for distribution permissions for network communications Download PDFInfo
- Publication number
- WO2011094028A1 WO2011094028A1 PCT/US2011/000191 US2011000191W WO2011094028A1 WO 2011094028 A1 WO2011094028 A1 WO 2011094028A1 US 2011000191 W US2011000191 W US 2011000191W WO 2011094028 A1 WO2011094028 A1 WO 2011094028A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- forwarding
- carrier
- network
- forwarded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/08—Annexed information, e.g. attachments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
Definitions
- the present invention relates to the field of electronic communication networks and, in particular, to a system and method for a sender of an electronic message on a network to control and limit the distribution of that message by flagging the message to be forwarding restricted.
- Text messaging such as Short Messages Service (SMS), also known as “texting” refers to the exchange (i.e., transmission and receipt) of brief written or text messages between digital mobile phones over cellular or other wireless networks. Individual messages are referred to as “text messages” or “texts”.
- SMS Short Messages Service
- MMS Multimedia Messaging Service
- multimedia content such as image, video and sound content.
- the most common application of the service is person-to-person messaging.
- a user To send such a message, a user types the text into a mobile phone or other text- enabled device, attaches the desired multimedia content, enters one or more phone numbers for the recipients of the message, and sends the message.
- a SMS or MMS center receives and stores the SMS/MMS message, and then forwards the message to the recipient when the recipient is available.
- One problem with such messaging services is that recipients of such messages may without limitation forward them to third parties. While a use may create a customized SMS message that he/she intends for only the intended recipient to receive, the recipient can forward the message to multiple third parties, who may in turn forward the message onto to other parties, and so on.
- sexting is slang for the act of sending sexually explicit or suggestive content within or as part of a text message.
- a genre of texting, sexting involves sending either text, images or video that is intended to be sexually arousing.
- Many surveys show that an alarming number of children and teens have electronically sent nude or semi-nude images of themselves, and this number is growing rapidly.
- sexting often takes place consensually between two people, it can also occur against the wishes of a person who is the subject of the content.
- the invention solves the above problems by providing systems and methods that control whether a recipient of an electronic message (e.g., a text message, a multimedia message, an e-mail message, etc.) is permitted to forward the message to third parties.
- the invention provides a system and mechanism for a sender of a text message including an image to limit the downstream distribution of that text message through text message forwarding by associating a forwarding restriction flag with the message.
- a sender of a message can flag the message as not being allowed to be forwarded by including some simple text, for example, "DNF", within the text portion of the message.
- DNF simple text
- a user may not be able to force the recipient's client device to respect the simple DNF text flag that is included in the message because of the number of different client devices present in a network system. Most times, one does not have control over all the operating systems and applications on such client devices, for example, all the cell phones that are on a cellular network. Also, once a message is in unencrypted form on a client device, then the user can use its own application to forward such a message.
- the messaging network would respect the forwarding restriction flag, even if the forwarding restriction flag is not respected by the recipient's client device.
- the network or a connected service, would store a copy of every message it receives with a forwarding restricted flag and then compare each message sent from one of the recipients of such a message with all the forwarding restricted messages received by that device. If there is a match, and the message sent was not allowed to be forwarded (even with the flag removed), then the network will refuse to send such a message.
- This core concept may involve several additional features:
- Hashing Whereas in one embodiment of the invention, the messaging network would store a copy of every forwarding-restricted message that it receives, many consumers may not like the idea of all their messages, particularly those that are forwarding-restricted, being stored by the carrier. Accordingly, in one embodiment, all such stored forwarding restricted messages are "hashed", i.e., passed through a mathematical hash function, prior to being stored. Hash functions are often used to speed up data comparison tasks, such as detecting duplicated or similar records in a large file.
- hashing the forwarding-restricted message converts it into a semi-unique code, which is impossible to be converted back into the message but which allows the forwarding-restricted message to be matched with the identical message that a recipient attempts to forward, because that message would be converted to the identical code.
- the carrier could detect this new message and block it from being sent. Algorithms that allow for some change to the image while still retaining the same value can also be used.
- the network can limit the viral forwarding of messages by, for instance, placing restrictions on the forwarding of a message, such as a message containing a photo, regardless of whether it was initially flagged for restricted forwarding, if there is an indication that the message is "going viral", i.e., being forwarded a very high number of times within a very short amount of time.
- a network could track, such as via hash values, the path of a message, and when it has been forwarded more than a critical number of times within the network within a pre-set time period, then either block further forwarding of the message or re-examine the content of the message, either manually or through a software program.
- the critical number of times that a message is forwarded within the a pre-set time period would be set sufficiendy high to indicate a level of interest that may be considered prurient or less-than-honorable, so as to trigger a closer inspection of the message being forwarded.
- the system can also block forwarding of a message that has been received by a chosen critical limited number of subscribers in its network, regardless of whether the message has left the carrier's network and been returned to the carrier's network by a subscriber of another carrier.
- the carrier could append to incoming messages a designation, such as "DNF", that is sufficiently noticeable to the recipient so as to provide notification that the message being received is forwarding- restricted.
- DNF designation, such as "DNF”
- the recipient of the forwarding-restricted message would then be less inclined to attempt to forward the message, thus potentially saving the computing resources of the network servers.
- the carrier could screen for "adult” keywords that accompany an image, which keywords might suggest the image content. Further, the carrier could screen for "adult” keywords in replies to the sender of the image, which keywords might shed light on the image contents. If any of the critical, preselected "adult” keywords are used in either the original message or a reply thereto, the carrier may automatically flag the original message forwarding restricted.
- a user may include parameters with the flag, such as to permit a message to be forwarded but only a limited number of times, such as up to three times.
- the user could add a flag "DNF>3", which would indicate to the system not to forward the message more than 3 times. Then, if recipients attempt to forward the message more than the chosen limited number of times, further forwarding of the message would be prevented.
- a network could track, such as via hash values, the path of a message, and, when it has been forwarded the chosen limited critical number of times within the network, then further forwarding of the message is blocked.
- the system can also block a forwarding of a message that has been received by a chosen limited number of subscribers in its network, regardless of whether the message has left the carrier and been returned by a subscriber of another carrier.
- a first carrier can detect which second carrier the message is about to be delivered to and ask the sender for verification that the message may be sent to the receiving carrier. For example, if the forwarding restricted message is being sent to a carrier that is not known to respect forwarding restriction flags, then the sending carrier may send an auto-reply to the sender as follows: "Your Do-Not-Forward request will not be enforced by 111-111-111 l's network. Should the message still be sent? (reply with "yes", or do nothing)".
- a central repository or sever would maintain all the stored forwarding-restricted messages or hash codes of those stored messages. In that way, all the carriers can share the restricted forwarding flags and thereby respect the rules set by the subscribers on any network. For instance, if a user indicates a limit of "DNF>10" on his message, then regardless of the carriers through which the forwarding-restricted message is forwarded, the central repository can track every time that the message is forwarded, keep a running tally of the number of times that the message is forwarded and advise users who try to forward the message once the forwarding limit has been reached that it can no longer be forwarded. In this embodiment, the cell phone carriers linked to the central repository would have to report forwarding on a real time basis and seek permission to forward further.
- Another aspect of the invention is to decrease incentive for the user to send incriminating photos of themselves, particularly in the case of minors, by automatically sending to the account holder a copy of all text messages sent or forwarded from a phone on a particular account.
- the user could know in advance that the cell phone account has this setting, thereby providing a disincentive to send potentially incrirninating photos of himself or others.
- the account statement could contain thumbnail images of all images in messages that were forwarded by the phone.
- a recipient of a forwarding-restricted message containing an image may attempt to defeat the forwarding restriction by copying the image into a new message.
- Forwarding of an attached photo can be limited through the addition of meta data associated with the image. For example, if a "DNF' flag is associated with the original message in which the photo was sent, the carrier could attach a DNF flag within the meta data of the image as well. In this way, the recipient would have difficulty modifying such meta data on the client device and the carrier, and other carriers could still respect the metadata flag when it reenters the network during a forwarding operation.
- a disadvantage is that if someone were to remove the tag then it could be freely forwarded, and this might be more easily achieved than modification of the image itself, especially when substantial modification of the image may be necessary to change the hash value.
- FIG.1 illustrates an exemplary network arrangement of hardware for implementing a method in accordance with an embodiment of the invention
- Fig. 2 shows a sender's handset in preparation for sending a text message with image or photo attached
- Figs. 3A-3C shows a process flow diagram of a text message with an image being sent from a sender subscribed to a first carrier to a recipient subscribed to a second carrier;
- Fig. 4 shows a graphical flow diagram of the DNF verification process taken when a text message with an image is sent from a sender to a carrier;
- Fig. 5A shows a sequence of forwarding that would occur in the absence of the system of the invention
- Fig. 5B shows a sequence of forwarding that occurs in the presence of the system of the invention.
- Fig. 1 shows an example of a network arrangement of a hardware system 100 for use with the current invention.
- System 100 can be any known system configuration, such as a standard SMS or MMS system configuration, to provide various rich content services via interactions between a plurality of mobile users and a mobile network provider.
- System 100 includes various network types, such as 2G mobile networks, 3G mobile networks, internets, etc.
- the network interface can be accommodated via cellular systems, internet protocols as well as other related network message protocols.
- the multimedia messages transfer protocols on the 2G/3G mobile network can be compatible with the existing multimedia message transfer protocols on the internet.
- System 100 has a first network 110 operated by Carrier A connected to a second network 112 operated by Carrier B through conventional carrier-carrier communications network link 108.
- Permission Service 102 operates independently from all network carriers and communicates with Carrier A and Carrier B independently. Permission Service 102 may be external to and accessible to all network carriers, or each network carrier may utilize its own separate Permission Service 102.
- Carrier A has a plurality of handsets subscribing to its network 110: a first handset 116 communicates with Carrier A 110 through link 115, as do a second handset 118 and a third handset 120 through their respective links 117 and 119.
- Carrier B also has a plurality of handsets subscribing to its network 112: a first handset 122 communicates with Carrier B 112 through link 121, as do a second handset 124 and third handset 126 through their respective links 123 and 125.
- a user takes a photo with handset 116 and wishes to send that photo in a text (SMS or MMS) message to the user of handset, that communication will typically travel over a conventional communication link.
- SMS text
- MMS mobile multimedia subsystem
- the communication will typically travel over the internal communication network 110 of Carrier A.
- the intended recipient is the user of handset 128, then that communication will typically travel over the conventional carrier-carrier communication link 108 from network 110 of Carrier to network 112 of Carrier B.
- Carrier A 110 first checks with the Permission Service 102 whether it is permitted to send the first message on to the second handset before sending the message.
- a handset 200 is depicted, such as handset 116 of Fig. 1, with its outer casing 202, screen 204 and keypad 212.
- various components of a SMS/MMS text message authoring session are displayed, such as the recipient's phone number 203, the photo 206 that was taken by that handset and is now about to be included with the message, and the text component 208 of the text message which also contains the "DNF' text flag 210 indicating that this message is for the recipient only and should not be forwarded.
- the designation, such as "DNF" be sufficiendy noticeable to the recipient so as to provide notification that the message being received is forwarding-restricted.
- the recipient of the forwarding-restricted message would then be less inclined to attempt to forward the message, thus potentially saving the computing resources of the network servers.
- Fig. 3A shows a process flow diagram 300 of the sending of text message 208 and photo 206 of Fig. 2 from handset 200 of a sender subscribed to the network of carrier A to a recipient.
- the sender captures photo 206 with handset 200
- the sender includes photo 206 in a text message 208
- the sender adds the forwarding restriction "DNF' 210 to the body of text in the message.
- the sender sends the message, which prompts handset 200 to upload the text and photo in the message to the network of the sender's carrier, e.g., network 110 of carrier A, at step 310.
- carrier A would send a copy of the photo included within the forwarding-restricted message that it receives from handset 200 (or the entire forwarding-restricted message itself) and send it to Permission Service 102 for inclusion in the Do-Not-Forward database of forwarding-restricted messages.
- Permission Service 102 When that recipient or a subsequent recipient attempts to forward a message that includes a photo, the photo in that message is compared with the photos stored in the DNF database at Permission Service 102. If a message or photo to be sent by a subscriber is identical to one that was is stored at Permission Service 102 and designated as forwarding-restricted, then the carrier would block this photo from being sent
- the carrier evaluates whether an image 206 was received from handset 200 within text message 208. If no image 206 was present, then the carrier need not check with the Permission Service 102, and the carrier proceeds to send the text message 208 as normal (see step 326 of Fig. 3C).
- the carrier calculates the hash value of the image 206.
- the hash value can be calculated by a number of different algorithms, as known by those with skill in the art. In this regard, it is preferable that the same hash algorithm be used by all the carriers so that the results of all hash values will be consistent can be compared.
- the hash value along with the "DNF' request is sent to the Permission Service .
- the Permission Service checks its Do-Not-Forward database to determine whether the image was previously been sent and designated as forwarding- restricted. If the exact same hash value is present in the Permission Service DNF database, then the image must previously have been sent and designated as forwarding-restricted, and the sender is attempting to forward this forwarding-restricted image.
- the Permission Service then sends the carrier a refusal message at step 320, and the carrier in turn then refuses to send the message and so notifyies the sender at step 322. This is also shown graphically in Fig. 4.
- the Permission Service enters this hash value into the Do-Not-Forward database of forwarding-restricted messages.
- This image or photo is saved into the DNF database at Permission Service 102 because the "DNF' flagged photo was sent to the Permission Service to determine whether the message could be forwarded.
- the photo would not be stored in the DNF database at Permission Service 102.
- step 326 the carrier proceeds to send the message.
- step 328 the message is passed to the second carrier, if the recipient is a subscriber to the network of a carrier other than the network of the sender's carrier, and at step 330 the second carrier delivers the message to the recipient
- the invention can apply to photos, as in the above process flow, or to simple text messages, where a hash value can be calculated from the text message itself and not an associated image.
- the sender may include parameters with the DNF flag, such as to permit a message to be forwarded only a limited number of times.
- the user could add a flag "DNF>3", which would indicate to the system not to forward the message more than three times.
- the Permission Service stores a counter along with each stored DNF photo to internally tally the amount of times that forwarding-restricted photo has been forwarded. If the inquiry to the Permission Service for forwarding the photo has not reached the maximum permitted number of forwards, then the Permission Service does not issue a "block", and each permitted forward of the forwarding- restricted photo increases the tally by one.
- the network could also track, such as via hash values, the path of a message, and, when it has been forwarded the chosen limited critical number of times within the network.
- the user's carrier can detect which carrier the message flagged as being forwarding restricted is about to be delivered to and ask the sender for verification that the message may be sent to the receiving carrier. For example, if the forwarding restricted message is being sent to a carrier that is not known to respect forwarding restriction flags, then the sending carrier may send an auto-reply to the sender as follows: "Your Do-Not-Forward request will not be enforced by 111-111-111 l's network. Should the message still be sent? (reply with "yes", or do nothing)".
- Fig. 5A shows a sequence of forwarding that would occur in the absence of the system of the invention.
- user of handset 116 forwards the text message with photo to the user of handset 118 within the network of Carrier A.
- User of handset 118 forwards the text message with photo to the user of handset 122, who is a subscriber to the network of Carrier B, who forwards the text message with photo to the user of handset 128, who is a subscriber to the network of Carrier C.
- the text message with photo can be forwarded to anyone anywhere.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A system can control whether a recipient of an electronic message (e.g., a text message, a multimedia message, an e-mail message, etc.) with a restricted image is permitted to forward the message to third parties. The sender of a text message may to limit the downstream distribution of that text message through text message forwarding by associating a forwarding restriction flag with the message.
Description
SYSTEM FOR DISTRIBUTION PERMISSIONS
FOR NETWORK COMMUNICATIONS
Field of the Invention
[0001] The present invention relates to the field of electronic communication networks and, in particular, to a system and method for a sender of an electronic message on a network to control and limit the distribution of that message by flagging the message to be forwarding restricted.
Background of the Invention
[0002] Text messaging, such as Short Messages Service (SMS), also known as "texting", refers to the exchange (i.e., transmission and receipt) of brief written or text messages between digital mobile phones over cellular or other wireless networks. Individual messages are referred to as "text messages" or "texts". Many service providers or carriers also offer multimedia messaging services, such as Multimedia Messaging Service (MMS), that allow for exchange of messages containing multimedia content, such as image, video and sound content. The most common application of the service is person-to-person messaging.
[0003] To send such a message, a user types the text into a mobile phone or other text- enabled device, attaches the desired multimedia content, enters one or more phone numbers for the recipients of the message, and sends the message. A SMS or MMS center receives and stores the SMS/MMS message, and then forwards the message to the recipient when the recipient is available.
[0004] One problem with such messaging services is that recipients of such messages may without limitation forward them to third parties. While a use may create a customized SMS message that he/she intends for only the intended recipient to receive, the recipient can forward the message to multiple third parties, who may in turn forward the message onto to other parties, and so on.
[0005] With the advance in technology that permits texting to include images, photos and videos, a very common practice has arisen called "sexting", which is slang for the act of sending sexually explicit or suggestive content within or as part of a text message. A genre of texting, sexting involves sending either text, images or video that is intended to be sexually arousing. Many surveys show that an alarming number of children and teens have electronically sent nude or semi-nude images of themselves, and this number is growing rapidly.
[0006] Although sexting often takes place consensually between two people, it can also occur against the wishes of a person who is the subject of the content. An increasing social danger with sexting is that material can be very easily and widely promulgated, and the originator has no control over it. There have been many instances which have been reported throughout the news media where the recipients of sexting have shared the content of the messages with others, with less intimate intentions, such as to impress their friends or embarrass the sender, thereby increasing the instances where the intended recipient is not the only one viewing the content. Celebrities have also been victims of such abuses of sexting.
[0007] Although many public service advertisements and notices have urged children, teens and the general public to be wary of sexting or of sending any text message that they would not want someone other that the recipient to see, it has proven difficult to prevent individuals from sending these types of text messages. Similarly, it has also proven difficult to prevent recipients from forwarding messages to others.
[0008] It is an object of the present invention to prevent the recipient of such text messages from forwarding the message to those who were not intended to see the message in the first place.
[0009] It is an object of the present invention to provide a means to prevent the recipient of such text messages from forwarding the message non-intended recipients, where such means are respected by the respective devices as well as by the network service providers or carriers.
Summary of the Invention
[0010] The invention solves the above problems by providing systems and methods that control whether a recipient of an electronic message (e.g., a text message, a multimedia message, an e-mail message, etc.) is permitted to forward the message to third parties. The invention provides a system and mechanism for a sender of a text message including an image to limit the downstream distribution of that text message through text message forwarding by associating a forwarding restriction flag with the message.
[0011] In one embodiment of the invention, a sender of a message can flag the message as not being allowed to be forwarded by including some simple text, for example, "DNF", within the text portion of the message. In general, a user may not be able to force the recipient's client device to respect the simple DNF text flag that is included in the message because of the number of different client devices present in a network system. Most times, one does not have control over all the operating systems and applications on such client devices, for example, all
the cell phones that are on a cellular network. Also, once a message is in unencrypted form on a client device, then the user can use its own application to forward such a message.
[0012] In a preferred embodiment of the invention, the messaging network would respect the forwarding restriction flag, even if the forwarding restriction flag is not respected by the recipient's client device. For example, the network, or a connected service, would store a copy of every message it receives with a forwarding restricted flag and then compare each message sent from one of the recipients of such a message with all the forwarding restricted messages received by that device. If there is a match, and the message sent was not allowed to be forwarded (even with the flag removed), then the network will refuse to send such a message.
[0013] This core concept may involve several additional features:
[0014] 1. Hashing: Whereas in one embodiment of the invention, the messaging network would store a copy of every forwarding-restricted message that it receives, many consumers may not like the idea of all their messages, particularly those that are forwarding-restricted, being stored by the carrier. Accordingly, in one embodiment, all such stored forwarding restricted messages are "hashed", i.e., passed through a mathematical hash function, prior to being stored. Hash functions are often used to speed up data comparison tasks, such as detecting duplicated or similar records in a large file. In this situation, hashing the forwarding-restricted message converts it into a semi-unique code, which is impossible to be converted back into the message but which allows the forwarding-restricted message to be matched with the identical message that a recipient attempts to forward, because that message would be converted to the identical code. In this way, if a message sent by a subscriber is identical to one that was previously received by that person and has been designated as forwarding-restricted, then the carrier could detect this new message and block it from being sent. Algorithms that allow for some change to the image while still retaining the same value can also be used.
[0015] 2. Flagging: In another embodiment of the invention, not all messages would be blocked, but rather only those that are flagged in some way. In this embodiment, only those messages with a designation such as "DNF" (do not forward) in them would be flagged and subject to the restrictions on forwarding. Of course, only those carriers implementing this standard would respect those flags. Alternatively, perhaps instead of "DNF", only images are subject to the forwarding restrictions.
[0016] 3. Data Pooling: In a further embodiment, the network can limit the viral forwarding of messages by, for instance, placing restrictions on the forwarding of a message,
such as a message containing a photo, regardless of whether it was initially flagged for restricted forwarding, if there is an indication that the message is "going viral", i.e., being forwarded a very high number of times within a very short amount of time. In this embodiment, it may also be acceptable for the network to re-examine the content of a message that has been forwarded more than once or twice, for example a pre-set number of times or a pre-set number of times within a pre-set time period. In this embodiment, a network could track, such as via hash values, the path of a message, and when it has been forwarded more than a critical number of times within the network within a pre-set time period, then either block further forwarding of the message or re-examine the content of the message, either manually or through a software program. The critical number of times that a message is forwarded within the a pre-set time period would be set sufficiendy high to indicate a level of interest that may be considered prurient or less-than-honorable, so as to trigger a closer inspection of the message being forwarded. The system can also block forwarding of a message that has been received by a chosen critical limited number of subscribers in its network, regardless of whether the message has left the carrier's network and been returned to the carrier's network by a subscriber of another carrier.
[0017] 4. Notification: In yet another embodiment of the invention, the carrier could append to incoming messages a designation, such as "DNF", that is sufficiently noticeable to the recipient so as to provide notification that the message being received is forwarding- restricted. The recipient of the forwarding-restricted message would then be less inclined to attempt to forward the message, thus potentially saving the computing resources of the network servers.
[0018] 5. Keyword Screening: In still another embodiment of the invention, the carrier could screen for "adult" keywords that accompany an image, which keywords might suggest the image content. Further, the carrier could screen for "adult" keywords in replies to the sender of the image, which keywords might shed light on the image contents. If any of the critical, preselected "adult" keywords are used in either the original message or a reply thereto, the carrier may automatically flag the original message forwarding restricted.
[0019] 6. User Specified Limits: In yet a further embodiment, a user may include parameters with the flag, such as to permit a message to be forwarded but only a limited number of times, such as up to three times. In this embodiment, the user could add a flag "DNF>3", which would indicate to the system not to forward the message more than 3 times. Then, if recipients attempt to forward the message more than the chosen limited number of times, further forwarding of the message would be prevented. A network could track, such as
via hash values, the path of a message, and, when it has been forwarded the chosen limited critical number of times within the network, then further forwarding of the message is blocked. The system can also block a forwarding of a message that has been received by a chosen limited number of subscribers in its network, regardless of whether the message has left the carrier and been returned by a subscriber of another carrier.
[0020] 7. DNF Non-Compliance Notification: In another embodiment, if a user flags a message as forwarding restricted, then a first carrier can detect which second carrier the message is about to be delivered to and ask the sender for verification that the message may be sent to the receiving carrier. For example, if the forwarding restricted message is being sent to a carrier that is not known to respect forwarding restriction flags, then the sending carrier may send an auto-reply to the sender as follows: "Your Do-Not-Forward request will not be enforced by 111-111-111 l's network. Should the message still be sent? (reply with "yes", or do nothing)".
[0021] In a preferred embodiment, a central repository or sever would maintain all the stored forwarding-restricted messages or hash codes of those stored messages. In that way, all the carriers can share the restricted forwarding flags and thereby respect the rules set by the subscribers on any network. For instance, if a user indicates a limit of "DNF>10" on his message, then regardless of the carriers through which the forwarding-restricted message is forwarded, the central repository can track every time that the message is forwarded, keep a running tally of the number of times that the message is forwarded and advise users who try to forward the message once the forwarding limit has been reached that it can no longer be forwarded. In this embodiment, the cell phone carriers linked to the central repository would have to report forwarding on a real time basis and seek permission to forward further.
[0022] Another aspect of the invention is to decrease incentive for the user to send incriminating photos of themselves, particularly in the case of minors, by automatically sending to the account holder a copy of all text messages sent or forwarded from a phone on a particular account. The user could know in advance that the cell phone account has this setting, thereby providing a disincentive to send potentially incrirninating photos of himself or others. In a variation on this, the account statement could contain thumbnail images of all images in messages that were forwarded by the phone.
[0023] In certain instances, a recipient of a forwarding-restricted message containing an image may attempt to defeat the forwarding restriction by copying the image into a new message. Forwarding of an attached photo can be limited through the addition of meta data associated with the image. For example, if a "DNF' flag is associated with the original
message in which the photo was sent, the carrier could attach a DNF flag within the meta data of the image as well. In this way, the recipient would have difficulty modifying such meta data on the client device and the carrier, and other carriers could still respect the metadata flag when it reenters the network during a forwarding operation. A disadvantage is that if someone were to remove the tag then it could be freely forwarded, and this might be more easily achieved than modification of the image itself, especially when substantial modification of the image may be necessary to change the hash value.
Description of the Figures
[0024] The above and other objects and advantages of the invention will be apparent upon consideration of the following detailed description, taken in conjunction with the accompanying drawings, in which the reference characters refer to like parts throughout and in which:
[0025] Fig.1 illustrates an exemplary network arrangement of hardware for implementing a method in accordance with an embodiment of the invention;
[0026] Fig. 2 shows a sender's handset in preparation for sending a text message with image or photo attached;
[0027] Figs. 3A-3C shows a process flow diagram of a text message with an image being sent from a sender subscribed to a first carrier to a recipient subscribed to a second carrier;
[0028] Fig. 4 shows a graphical flow diagram of the DNF verification process taken when a text message with an image is sent from a sender to a carrier;
[0029] Fig. 5A shows a sequence of forwarding that would occur in the absence of the system of the invention;
[0030] Fig. 5B shows a sequence of forwarding that occurs in the presence of the system of the invention.
Detailed Description of the Preferred Embodiment
[0031] Reference will now be made to the exemplary embodiments illustrated in the drawings, and specific language will be used herein to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Alterations and further modifications of the inventive features illustrated herein, and additional applications of the principles of the inventions as illustrated herein, which would occur to one
skilled in the relevant art and having possession of this disclosure, are to be considered within the scope of the invention.
[0032] Fig. 1 shows an example of a network arrangement of a hardware system 100 for use with the current invention. System 100 can be any known system configuration, such as a standard SMS or MMS system configuration, to provide various rich content services via interactions between a plurality of mobile users and a mobile network provider. System 100 includes various network types, such as 2G mobile networks, 3G mobile networks, internets, etc. The network interface can be accommodated via cellular systems, internet protocols as well as other related network message protocols. In addition, the multimedia messages transfer protocols on the 2G/3G mobile network can be compatible with the existing multimedia message transfer protocols on the internet.
[0033] System 100 has a first network 110 operated by Carrier A connected to a second network 112 operated by Carrier B through conventional carrier-carrier communications network link 108. Permission Service 102 operates independently from all network carriers and communicates with Carrier A and Carrier B independently. Permission Service 102 may be external to and accessible to all network carriers, or each network carrier may utilize its own separate Permission Service 102. Carrier A has a plurality of handsets subscribing to its network 110: a first handset 116 communicates with Carrier A 110 through link 115, as do a second handset 118 and a third handset 120 through their respective links 117 and 119. Carrier B also has a plurality of handsets subscribing to its network 112: a first handset 122 communicates with Carrier B 112 through link 121, as do a second handset 124 and third handset 126 through their respective links 123 and 125.
[0034] If a user takes a photo with handset 116 and wishes to send that photo in a text (SMS or MMS) message to the user of handset, that communication will typically travel over a conventional communication link. For example, if the intended recipient is the user of handset 118, then the communication will typically travel over the internal communication network 110 of Carrier A. However, if the intended recipient is the user of handset 128, then that communication will typically travel over the conventional carrier-carrier communication link 108 from network 110 of Carrier to network 112 of Carrier B. In embodiments of this invention, as will be discussed below, Carrier A 110 first checks with the Permission Service 102 whether it is permitted to send the first message on to the second handset before sending the message.
[0035] With reference now to Fig. 2, a handset 200 is depicted, such as handset 116 of Fig. 1, with its outer casing 202, screen 204 and keypad 212. On the screen 204, various
components of a SMS/MMS text message authoring session are displayed, such as the recipient's phone number 203, the photo 206 that was taken by that handset and is now about to be included with the message, and the text component 208 of the text message which also contains the "DNF' text flag 210 indicating that this message is for the recipient only and should not be forwarded.
[0036] It is preferred that the designation, such as "DNF", be sufficiendy noticeable to the recipient so as to provide notification that the message being received is forwarding-restricted. The recipient of the forwarding-restricted message would then be less inclined to attempt to forward the message, thus potentially saving the computing resources of the network servers.
[0037] Fig. 3A shows a process flow diagram 300 of the sending of text message 208 and photo 206 of Fig. 2 from handset 200 of a sender subscribed to the network of carrier A to a recipient. At step 302, the sender captures photo 206 with handset 200, at step 304 the sender includes photo 206 in a text message 208, and at step 306 the sender adds the forwarding restriction "DNF' 210 to the body of text in the message. At step 308, the sender sends the message, which prompts handset 200 to upload the text and photo in the message to the network of the sender's carrier, e.g., network 110 of carrier A, at step 310.
[0038] In one embodiment of the invention, carrier A would send a copy of the photo included within the forwarding-restricted message that it receives from handset 200 (or the entire forwarding-restricted message itself) and send it to Permission Service 102 for inclusion in the Do-Not-Forward database of forwarding-restricted messages. When that recipient or a subsequent recipient attempts to forward a message that includes a photo, the photo in that message is compared with the photos stored in the DNF database at Permission Service 102. If a message or photo to be sent by a subscriber is identical to one that was is stored at Permission Service 102 and designated as forwarding-restricted, then the carrier would block this photo from being sent
[0039] In another embodiment, in order to avoid Permission Service 102 having to store all forwarding-restricted photos or messages, all such stored forwarding restricted messages (or the forwarding-restricted photos forwarded within those messages are "hashed", i.e., passed through a mathematical hash function, prior to being stored and converted into code. This code is then stored by Permission Service 102. Then, when another user attempts to forward a photo, the photo to be forwarded is hashed and compared to the hash codes stored at Permission Service 102. If the hash code of the photo to be forwarded identically matches a hash code of stored at Permission Service 102 and designated as being forwarding-restricted, then the carrier would block this photo from being sent.
[0040] Continuing the process flow on Fig. 3B, at step 312 the carrier evaluates whether an image 206 was received from handset 200 within text message 208. If no image 206 was present, then the carrier need not check with the Permission Service 102, and the carrier proceeds to send the text message 208 as normal (see step 326 of Fig. 3C).
[0041] If an image 206 is present in text message 208, at step 314 of Fig. 3B the carrier calculates the hash value of the image 206. The hash value can be calculated by a number of different algorithms, as known by those with skill in the art. In this regard, it is preferable that the same hash algorithm be used by all the carriers so that the results of all hash values will be consistent can be compared.
[0042] At step 316, the hash value along with the "DNF' request is sent to the Permission Service . At step 318, the Permission Service checks its Do-Not-Forward database to determine whether the image was previously been sent and designated as forwarding- restricted. If the exact same hash value is present in the Permission Service DNF database, then the image must previously have been sent and designated as forwarding-restricted, and the sender is attempting to forward this forwarding-restricted image. The Permission Service then sends the carrier a refusal message at step 320, and the carrier in turn then refuses to send the message and so notifyies the sender at step 322. This is also shown graphically in Fig. 4.
[0043] However, if the exact same hash value is not present in the Permission Service's Do-Not-Forward database, then at step 324 the Permission Service enters this hash value into the Do-Not-Forward database of forwarding-restricted messages. This image or photo is saved into the DNF database at Permission Service 102 because the "DNF' flagged photo was sent to the Permission Service to determine whether the message could be forwarded. Naturally, if there had not been a "DNF' flag associated with the photo, then the photo would not be stored in the DNF database at Permission Service 102.
[0044] The process flow continues in Fig. 3C where at step 326 the carrier proceeds to send the message. At step 328, the message is passed to the second carrier, if the recipient is a subscriber to the network of a carrier other than the network of the sender's carrier, and at step 330 the second carrier delivers the message to the recipient
[0045] The invention can apply to photos, as in the above process flow, or to simple text messages, where a hash value can be calculated from the text message itself and not an associated image.
[0046] In a further embodiment, the sender may include parameters with the DNF flag, such as to permit a message to be forwarded only a limited number of times. In this
embodiment, the user could add a flag "DNF>3", which would indicate to the system not to forward the message more than three times. In this regard, the Permission Service stores a counter along with each stored DNF photo to internally tally the amount of times that forwarding-restricted photo has been forwarded. If the inquiry to the Permission Service for forwarding the photo has not reached the maximum permitted number of forwards, then the Permission Service does not issue a "block", and each permitted forward of the forwarding- restricted photo increases the tally by one. If a recipient attempts to forward the message but the Permission Service has determined that the maximum permitted number of forwards has been reached, further forwarding of the message is prevented. Alternatively, the network could also track, such as via hash values, the path of a message, and, when it has been forwarded the chosen limited critical number of times within the network.
[0047] In still another embodiment, the user's carrier can detect which carrier the message flagged as being forwarding restricted is about to be delivered to and ask the sender for verification that the message may be sent to the receiving carrier. For example, if the forwarding restricted message is being sent to a carrier that is not known to respect forwarding restriction flags, then the sending carrier may send an auto-reply to the sender as follows: "Your Do-Not-Forward request will not be enforced by 111-111-111 l's network. Should the message still be sent? (reply with "yes", or do nothing)".
[0048] Fig. 5A shows a sequence of forwarding that would occur in the absence of the system of the invention. In this sequence, user of handset 116 forwards the text message with photo to the user of handset 118 within the network of Carrier A. User of handset 118 forwards the text message with photo to the user of handset 122, who is a subscriber to the network of Carrier B, who forwards the text message with photo to the user of handset 128, who is a subscriber to the network of Carrier C. In this sequence, with no forwarding restrictions, the text message with photo can be forwarded to anyone anywhere.
[0049] In Fig. 5B, however, once the text message with photo that is marked with the DNF flag and has been designated as forwarding-restricted has been forwarded from user of handset 116 to the user of handset 118 within the network of Carrier A, the photo is stored within the DNF database at Permission Service 102. The system of the invention then prevents the user of handset 118 from forwarding the text message with DNF photo to the user of handset 122, who is a subscriber to the network of Carrier B. Thus, neither the user of handset 122 nor the user of handset 128, nor anyone else, can receive the text message with the DNF photo.
[0050] It is to be understood that the above-referenced arrangements are only illustrative of the application for the principles of the present invention. Numerous modifications and alternative arrangements can be devised without departing from the spirit and scope of the present invention. While the present invention has been shown in the drawings and fully described above with particularity and detail in connection with what is presently deemed to be the most practical and preferred embodiment(s) of the invention, it will be apparent to those of ordinary skill in the art that numerous modifications can be made without departing from the principles and concepts of the invention as set forth herein.
Claims
1. A method of transmitting electronic messages comprises:
allowing a sender of an electronic message to create the electronic message;
inserting or otherwise including a forwarding control indicator in the electronic message;
transmitting the electronic message with the forwarding control indicator to a message center for subsequent transmission to a recipient or recipients;
. This method may be performed at the access device of the sender, at a content server offering the electronic messages, or at another intermediate server responsible for transmission of the electronic message to the recipient.
2. The method of claim 1 wherein the forwarding control indicator comprises a sequence, flag or other indicator as to whether this electronic message is allowed to be forwarded by one or more subsequent recipients.
3. A method of controlling the forwarding of an electronic message, comprising:
processing a forwarding control indicator in the electronic message to determine if the electronic message is allowed to be forwarded;
if a determination is made that the electronic message is not allowed to be forwarded to the third party, preventing the electronic message from being forwarded;
if a determination is made that the electronic message is allowed to be forwarded to the third party, allowing the electronic message to be forwarded.
4. The method of claim 3, wherein said method is performed at the access device of the recipient, at the message center, or at another intermediate server between the access device of the recipient and the third party.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/564,569 US8832802B2 (en) | 2010-02-01 | 2012-08-01 | System for distribution permissions for network communications |
| US14/448,393 US9256760B2 (en) | 2010-02-01 | 2014-07-31 | System for distribution permissions for network communications |
| US15/018,528 US9935905B2 (en) | 2010-02-01 | 2016-02-08 | System for restricting the distribution of attachments to electronic messages |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US30012210P | 2010-02-01 | 2010-02-01 | |
| US61/300,122 | 2010-02-01 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US13/564,569 Continuation-In-Part US8832802B2 (en) | 2010-02-01 | 2012-08-01 | System for distribution permissions for network communications |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2011094028A1 true WO2011094028A1 (en) | 2011-08-04 |
Family
ID=44319685
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2011/000191 Ceased WO2011094028A1 (en) | 2010-02-01 | 2011-02-01 | System for distribution permissions for network communications |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2011094028A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012155464A1 (en) * | 2011-08-30 | 2012-11-22 | 中兴通讯股份有限公司 | A terminal for protecting short message, system and method thereof |
| WO2016033126A1 (en) * | 2014-08-29 | 2016-03-03 | Microsoft Technology Licensing, Llc | Sharing content |
| US10002260B2 (en) | 2014-08-29 | 2018-06-19 | Microsoft Technology Licensing, Llc | Sharing content |
| WO2025050057A1 (en) * | 2023-08-31 | 2025-03-06 | Votp Inc. | Electronic mail system with forwarding tracking and control |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060177005A1 (en) * | 2005-02-07 | 2006-08-10 | Anthony Shaffer | System and method for voicemail privacy |
| US20070226367A1 (en) * | 2006-03-27 | 2007-09-27 | Lucent Technologies Inc. | Electronic message forwarding control |
| US20090031393A1 (en) * | 2007-07-23 | 2009-01-29 | International Business Machines Corporation | System and method for controlling email propagation |
| US20090234922A1 (en) * | 2004-12-01 | 2009-09-17 | Aol Llc | Automatically Enabling the Forwarding of Instant Messages |
-
2011
- 2011-02-01 WO PCT/US2011/000191 patent/WO2011094028A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090234922A1 (en) * | 2004-12-01 | 2009-09-17 | Aol Llc | Automatically Enabling the Forwarding of Instant Messages |
| US20060177005A1 (en) * | 2005-02-07 | 2006-08-10 | Anthony Shaffer | System and method for voicemail privacy |
| US20070226367A1 (en) * | 2006-03-27 | 2007-09-27 | Lucent Technologies Inc. | Electronic message forwarding control |
| US20090031393A1 (en) * | 2007-07-23 | 2009-01-29 | International Business Machines Corporation | System and method for controlling email propagation |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2012155464A1 (en) * | 2011-08-30 | 2012-11-22 | 中兴通讯股份有限公司 | A terminal for protecting short message, system and method thereof |
| WO2016033126A1 (en) * | 2014-08-29 | 2016-03-03 | Microsoft Technology Licensing, Llc | Sharing content |
| US10002260B2 (en) | 2014-08-29 | 2018-06-19 | Microsoft Technology Licensing, Llc | Sharing content |
| WO2025050057A1 (en) * | 2023-08-31 | 2025-03-06 | Votp Inc. | Electronic mail system with forwarding tracking and control |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9935905B2 (en) | System for restricting the distribution of attachments to electronic messages | |
| US8364624B2 (en) | Method and arrangement for content prioritization | |
| US6779022B1 (en) | Server that obtains information from multiple sources, filters using client identities, and dispatches to both hardwired and wireless clients | |
| US9398461B2 (en) | Handling information | |
| US20080134282A1 (en) | System and method for filtering offensive information content in communication systems | |
| CN101203843A (en) | Sender identification system and method | |
| IL180566A (en) | Electronic messaging system and method | |
| CN101652967B (en) | Method and system for reducing the proliferation of electronic messages | |
| JP2006060811A (en) | Method for filtering spam mail for mobile communication apparatus | |
| KR20140066765A (en) | Control archiving of text messages | |
| US20110307565A1 (en) | Group messaging integration system, method and apparatus | |
| US20060224684A1 (en) | Multimedia messaging method and system | |
| WO2010102587A1 (en) | Method, device and system for reporting junk information | |
| WO2011094028A1 (en) | System for distribution permissions for network communications | |
| US9444775B2 (en) | Multipurpose internet mail extensions (“MIME”) metadata for group messaging | |
| KR100842868B1 (en) | Spam short message blocking system using callback short message and its method | |
| CN1997009A (en) | A filtering method for instant message | |
| Osho et al. | Frameworks for mitigating identity theft and spamming through bulk messaging | |
| WO2011033442A1 (en) | A method, mobile and network nodes for sharing content between users and for tracking messages | |
| KR100996709B1 (en) | IP application spam blocking device and method | |
| US8271008B1 (en) | Preventing spam messages | |
| EP1566931A1 (en) | Content management system | |
| CN101399781A (en) | Message sending method, system, device and message server | |
| CN102143442A (en) | System, device and method for processing multimedia message | |
| CN106559762A (en) | Note double receiving method, platform and group network systems |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11737419 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11737419 Country of ref document: EP Kind code of ref document: A1 |