US20070275739A1 - Method and System for Authorising Short Message Service Messages - Google Patents
Method and System for Authorising Short Message Service Messages Download PDFInfo
- Publication number
- US20070275739A1 US20070275739A1 US10/575,547 US57554704A US2007275739A1 US 20070275739 A1 US20070275739 A1 US 20070275739A1 US 57554704 A US57554704 A US 57554704A US 2007275739 A1 US2007275739 A1 US 2007275739A1
- Authority
- US
- United States
- Prior art keywords
- sender
- sms message
- list
- white list
- recipient
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/58—Message adaptation for wireless communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/18—Service support devices; Network management devices
- H04W88/184—Messaging devices, e.g. message centre
Definitions
- the present invention relates generally to short message service (SMS) messages, and more specifically, to a method and system for authorising SMS messages transmitted on a mobile telephone network.
- SMS short message service
- Unsolicited electronic mail often referred to as bulk electronic mail, “spam,” or “junk email,” has long plagued computer and Internet users. Unsolicited email is often of a commercial nature sent indiscriminately to individuals, mailing lists, or newsgroups. With the widespread and growing use of short message service (SMS) messages over mobile networks, mobile telephone users are now subject to unsolicited SMS messages.
- SMS short message service
- the present invention provides a method and system for authorising SMS messages on a mobile telephone that overcomes or alleviates one or more problems related to unsolicited or unwanted SMS messages.
- a method for delivering short message service (SMS) messages sent by a sender to a recipient over a communications network includes receiving an SMS message from the sender; sending an automatic verification request to the sender requesting a verification response, wherein the verification request is sent before the SMS message is delivered to the recipient; receiving the verification response from the sender; and delivering the SMS message to the recipient upon receiving the verification response.
- SMS short message service
- a system for delivering short message service (SMS) messages sent by a sender to a recipient over a communications network includes receiving means for receiving an SMS message from the sender; transmission means for sending an automatic verification request to the sender requesting a verification response, wherein the verification request is sent before the SMS message is delivered to the recipient; receiving means for receiving the verification response from the sender; and delivering means for displaying the SMS message to the recipient upon receiving the verification response.
- SMS short message service
- the method and system further includes verifying the SMS message, wherein the SMS message includes a sender identification and verifying the SMS message includes comparing the one or more sender lists, the one or more sender lists including a white list, and the SMS message is delivered to the recipient where the sender identification is included in the white list, and a verification request is sent to the sender where the sender identification is not included in the white list.
- the SMS message may be received by a mobile telephone, wherein delivering the SMS message to the recipient includes allowing display of the SMS message on the mobile telephone.
- the SMS message may also be received by a system server, wherein delivering the SMS message to the recipient includes transmitting the SMS message from the system server to the mobile telephone.
- the one or more sender lists are stored on a mobile telephone SIM card, mobile telephone memory or a system server database.
- FIG. 1 is a block diagram of a communications network in accordance with an embodiment of the present invention.
- FIG. 2 is a flowchart diagram of an application operation process in accordance with an embodiment of the present invention.
- FIG. 3 is a flowchart diagram of an application user interface in accordance with an embodiment of the present invention.
- FIG. 4 is a flowchart diagram of a method according to a simplified embodiment of the invention.
- FIG. 5 is a block diagram of a system according to a simplified embodiment of the invention.
- SMS messages are sent by a sender 501 to a recipient 502 over a communications network 503 .
- An SMS message is received 401 from the sender.
- An automatic verification request is sent 402 to the sender requesting a verification response, with the verification request being sent before the SMS message is delivered to the recipient.
- the verification response is received 403 from the sender; and the SMS message is delivered 404 to the recipient upon receiving the verification response.
- a system for delivering the SMS messages includes receiving means 504 for receiving the SMS message from the sender 501 , transmission means 505 for sending an automatic verification request to the sender 501 requesting a verification response, receiving means 506 for receiving the verification response from the sender, and delivering means 507 for delivering the SMS message to the recipient 502 upon receiving the verification response.
- the communications network is a mobile telephone network using any suitable cellular, digital cellular, digital, or other communications system such as, for example, a Global System for Mobile (GSM), a Time Division Multiple Access (TDMA) system, a Code-Division Multiple Access (CDMA) system, an Advance Mobile Phone Service (AMPS), or any other suitable communications system.
- GSM Global System for Mobile
- TDMA Time Division Multiple Access
- CDMA Code-Division Multiple Access
- AMPS Advance Mobile Phone Service
- a plurality of mobile devices 102 is provided on the communications network 100 .
- the mobile device is a mobile telephone, such as a cellular phone, personal communications service (PCS) phone, general packet radio service (GPRS) phone, or any other suitable mobile phone.
- PCS personal communications service
- GPRS general packet radio service
- the mobile device may be any other mobile or wireless device including, but not limited to, personal data assistants (PDAs), two-way pagers, laptop computers, global positioning system (GPS) devices, short message service (SMS) devices, and any other mobile device that is capable of receiving SMS messages.
- the mobile devices include a Subscriber Identity Module (SIM) and is SIM toolkit enabled.
- SIM Subscriber Identity Module
- J2ME Java 2 Platform Micro Edition
- the plurality of mobile devices communicate on the communications network 100 using radio waves using radio frequency (RF) field propagation.
- RF radio frequency
- the telecommunications network 100 illustrated in FIG. 1 includes a plurality of devices that may commonly be found in a mobile telephone network. While two mobile devices 102 are illustrated, the network 100 may include any number of mobile devices communicating within and across a plurality of cells or networks.
- a cell is a generally geographical area covered by a cellular transmitter facility, such as a base station or cellular tower.
- a software application is stored in memory of the mobile device.
- the application is a SIM-based Java application or embedded C application stored in a SIM card 104 of the mobile device 102 .
- the application may be downloaded over the network 100 from a system server 106 or preinstalled on the SIM card 104 .
- the application may be any suitable application configured to operate on the mobile device 102 .
- An example application type is a Java-based application configured for operation on an embedded device or other microprocessor-based consumer products.
- Each of the mobile devices 102 is operationally coupled to the communications network via a base station 108 .
- the mobile device 102 is in communication with the base station 108 using RF waves or any other suitable wireless communication protocol.
- the base station 108 or cell tower or any other system for receiving mobile device transmissions, is the relay station that a mobile device communicates with when initiating or receiving a wireless transmission.
- the base station 108 transmits voice and data to other devices over a forward control channel (FOCC) and mobile devices transmit voice and data to the base station over a reverse control channel (RECC).
- the base station 108 manages voice and data traffic between mobile devices and an associated mobile switching centre (MSC) 110 .
- MSC mobile switching centre
- Each of the base stations 108 is operationally coupled to the associated mobile switching centre 110 , which is a computer-controlled switch for managing automated network operations.
- Each of the mobile switching centres 110 automatically coordinates and switches transmissions between mobile phones in a given service area.
- each cell in a mobile network is controlled by a single MSC.
- each of the MSCs 110 is coupled to the associated base station 108 by T1 lines, or equivalent communication lines, or microwave channels.
- T1 lines, or equivalent communication lines, or microwave channels any suitable communication line may be used.
- each of the MSCs 110 is coupled to the public service telephone network 112 by T1 lines, or equivalent communication lines, or landlines.
- Each of the MSCs 110 is operationally coupled to one or more gateways 114 .
- each of the MSCs 110 is coupled to the one or more gateways 114 by T1 lines, or equivalent communication lines, or microwave channels.
- the gateway 114 is a network point that acts as an entrance to another network.
- the gateway 114 provides access to TCP/IP based networks 116 and also facilitates communication with the system server 106 .
- the gateway 114 may include gateway software for use on Solaris and Linux platforms. However, other platforms may be used.
- the system server 106 transmits data to and receives data from the mobile device user using the gateway 114 using an SMP protocol.
- the system server 106 may communicate with the user using the mobile switching centre 110 , using a PSTN 112 , or using a TCP/IP connection.
- the system server 106 may be operationally coupled to one or more databases 118 or other memory storage devices for storing user data, a plurality of super white lists 120 , user white lists 123 , user black lists 125 , pending lists 132 , and other sender lists, and any other desired information.
- a plurality of user lists is stored on the SIM card 104 or other memory storage means on the mobile device 102 .
- a super white list 122 a user's white list 124 , a user's black list 126 , and a pending list 130 are stored on the SIM card 104 .
- Communications lines 128 illustrates the synchronization between the sender lists stored on the data base 118 and the sender lists stored on the SIM card 104 of the mobile device 102 .
- synchronization there may be synchronization between the pending list 130 , super white list 122 , user white list 124 , and user black list 126 stored on the SIM card 104 and the pending list 132 , super white list 120 , user white list 123 , and user black list 125 stored on the database 118 .
- updates to the sender lists made by the system server 106 will be automatically synchronised with the sender lists stored on the SIM card 104 . Synchronization may occur whenever changes are made, upon request, or after predetermined time intervals. While only the sender lists are shown having synchronization capabilities, other user lists, and other data, may be synchronised and shared between the mobile device 102 and the system server 106 .
- the illustrated communications network 100 is only one simplified example of a network used for voice, electronic, and Internet communications. Any suitable network configuration may be used. The network configuration may vary depending on the particular type of network being used.
- FIG. 2 is a flowchart diagram of an SMS authorising system process in accordance with an embodiment of the present invention.
- An SMS message sender creates and sends a SMS message to a specified mobile telephone number, the SMS recipient.
- the corresponding mobile telephone receives the SMS message, step 200 .
- the application receives the SMS message and determines the type of the message received.
- the message may be one of: (a) an SMS text message; (b) a binary SMS “super white list” update; (c) a binary SMS “white list” update; and (d) a binary SMS “black list” update.
- the application determines if the message is an SMS text message.
- the application checks if the message is from a telephone number that is in a list of telephone numbers for which there are SMS messages awaiting verification, step 204 . From this comparison, the application determines whether the message is a proper response to the verification request, step 206 . In step 208 , if the message is a proper response, the application delivers the messages that are associated with the verification response for display.
- the determination of whether the SMS message is a successful verification reply is based upon the type of verification method employed by the mobile telephone user. In one embodiment, either a reply-based verification or name-based verification may be used. However, other verification methods may be used.
- the receipt of a reply message is sufficient in itself whereas for name-based verification, the SMS message needs to be matched in a fuzzy manner for the name of the mobile telephone user. If the verification message is not a successful verification reply, the message is discarded, step 210 .
- a user's white list includes a list of telephone numbers, the contents of the list controlled by the mobile device user, from which SMS messages are displayed on the mobile device.
- the white list may be the address book that is stored on the SIM card or other memory means in the mobile device.
- a super white list includes a list of telephone numbers, the list controlled by a mobile network administrator, from which SMS messages are displayed on the mobile device.
- a black list is a list of telephone numbers from which SMS messages are not displayed on the mobile device. The black list may be created and controlled by the mobile device user, the mobile network administrator, or any combination of shared control.
- step 212 the application determines whether the SMS message sender's telephone number is listed in the white list. If the SMS message sender's telephone number is listed in the white list, then the SMS message is delivered for display, step 213 .
- the SMS message may be delivered to the mobile device “inbox” and an alert sounded to inform the mobile device user that a new SMS message has arrived.
- step 214 the application determines whether the SMS message sender's telephone number is listed in the super white list. If the SMS message sender's telephone number is listed in the super white list, then the SMS message is delivered for display, step 215 .
- the application determines if the SMS message senders telephone number is listed in the black list, step 216 . If the SMS message sender's telephone number is listed in the black list, the SMS message is not delivered for display, step 218 .
- a reply message may be sent to inform the sender that the message has been returned and not viewed by the user.
- the SMS message may be deleted.
- the SMS message may be stored in a black list folder of “black listed” SMS messages where they are kept for a predetermined period of time before they are permanently deleted.
- messages in the black list folder may be viewed by the user upon user selection.
- the telephone number and associated SMS message are stored in a list or queue of messages awaiting sender verification, step 220 .
- the telephone numbers and associated messages may be stored on the SIM card or other memory means on the mobile device.
- a verification request is then sent to the SMS message sender, the content of which may depend on the type of verification method being used.
- the mobile device user may view the list of telephone numbers that are awaiting verification messages. Also, the user may be able to view the SMS messages awaiting verification if desired.
- a preview format may only allow the user to see a limited number of characters or words of the SMS message. In another embodiment, the user may see the entire SMS message upon request.
- step 224 the application checks for the receipt of a verification message. If the verification reply has not been received, the mobile device awaits a verification message, step 226 .
- the mobile device may function normally while awaiting verification messages. In one embodiment, the mobile device may save the SMS message and await the verification message for a predetermined period of time. After the predetermined period of time has elapsed, the mobile device may delete the pending SMS message and cease awaiting the verification message.
- step 228 if a proper verification reply is received including a proper response, the SMS message is released from the queue and delivered for display.
- the application determines whether the message is a binary SMS super white list update, step 230 . If the message is a binary SMS super white list update, the application processes the update, step 232 . If the message is not a binary SMS super white list update, the application determines whether the message is a binary SMS white list update, step 234 . If the message is a binary SMS white list update, the application processes the update, step 236 . If the message is not a binary SMS white list update, the application determines whether the message is a binary SMS black list update, step 238 . If the message is a binary SMS black list update, the application processes the update, step 240 .
- the application processes the data as non-text message and non-update type data, step 242 . If the message cannot be processed by the application, the message may be discarded and a reply may be generated and sent to the sender informing them that the message could not be processed.
- the flowchart diagram illustrated in FIG. 2 is only one example of the SMS authorising system's operation. Any number of changes and variations may be made.
- the system may make decisions in any desired order. For example, instead of checking first for the receipt of a text message, step 202 , the system may check to determine whether the received message is an update message.
- the illustrated steps may be included in any combination. For example, the system may only include steps relating to the white list and not include steps related to the black list or super white list. Also, additional steps may be added to the process as desired.
- the user may control the display of messages from telephone numbers listed in the super white. For example, the user may choose to only receive SMS messages that have been explicitly identified in the white list.
- the illustrated user interface diagram 300 starts at an application menu 302 including a list of available applications.
- the menu 302 includes an example SMS authorisation application titled “3B application.”
- Each of the illustrated menus includes items in a list form. Each of the items may be highlighted, pointed to, or otherwise selected. Selection of the item will display a different menu or display screen.
- Each of the menus or display screens may include a “back” option that allows the user to return to the immediately previous display screen.
- Each of the menus or display screens may include an “ok” or “select” that allows the user to view the next display screen or select the highlighted item.
- Each of the ok, select, and back options may have an associated button on the mobile device for activation.
- Selection of the 3B application displays a 3B application menu 304 including white list, black list, pending list, and setting options.
- a selection of one of the user lists displays a main options menu 306 including view all, search, and add options. Operation of the menus is similar for each of the white list, black list, and pending list. Therefore, only operation of the white list is shown in the illustrated diagram. Operation of the application for each of the lists may be modified slightly to meet the requirements of the various types of list. For example, editing options may not be necessary for the pending list since the information was received from an incoming message.
- Selection of the view all option displays a view all menu 308 including a list of names and associated telephone numbers.
- the white list and super white list may be displayed as one list on the user's mobile device.
- each of the lists may have separate display options.
- a selection of one of the names/telephone numbers displays an options menu 310 including edit, delete, and view details options.
- Selection of the delete option displays a delete confirmation menu 312 .
- Selection of ok deletes the selected name/telephone number from the list and returns the user to the view all menu 308 .
- Selection of the view details option may display a more complete detail screen 314 of the selected name/telephone number. Selection of ok returns the user to the view all menu 308 .
- Selection of the edit option displays an edit name screen 316 .
- selection of ok confirms the changes made and displays an edit telephone number screen 318 .
- selection of ok confirms the changes made and returns the user to the view all menu 308 .
- selection of the search option displays a search menu 320 .
- Selection of either the “by name” or “by mobile no.” option displays a search input screen 322 .
- the search input screen 322 will receive user input and search for either a name or a telephone number depending on which option was selected.
- Selection of ok confirms the display of the search results (not shown) and returns the user to the view all menu 308 .
- selection of the add option displays an add name input screen 324 .
- the user may input a name and select ok, which displays an add number input screen 326 .
- the user may then input a telephone number and select ok, which adds the name and associated telephone number to the selected list and returns the user to the main options menu 306 .
- selection of the settings option displays a settings menu 328 including authorization method, enable/disable, network, and “enter your name” options.
- Selection of the authorization method display a options menu 330 including a plurality of different authorization methods.
- the illustrated menu includes the reply method, where any reply from the telephone number is accepted as a proper response, and the name check method, where the name received must be checked as a legitimate sender name before the reply is accepted as a proper response.
- Selection of ok returns the user to the settings menu 328 .
- Selection of the enter your name option displays a name input screen 332 where the mobile device user may input their name into the mobile device's memory. A similar input screen may be included to provide any additional information about the mobile device user.
- Selection of ok returns the user to the settings menu 328 .
- Selection of enable/disable displays an enable/disable screen 340 where the user may choose to enable or disable the SMS authorisation system on the mobile telephone.
- a country code options display 336 may be included to change the country code of the super white list.
- a country code display 338 may be used to change the country code. Modification of the settings may be protected by a pin number display 334 where the proper pin number must be entered before settings may be changed.
- the sender may provide a response to the verification request in any suitable manner.
- the sender provides information about the intended recipient such as the recipients name.
- the sender may need to provide one or more of a password, key, token, and other electronic objects that authenticate the sender's identity.
- verification messages are identified by certain formatting rules that can be distinguished from conventional SMS messages.
- the system may expect to receive a verification request for a short period after the SMS message is sent out of the sender's system.
- the sender lists may be stored in the SIM card or other memory means on the mobile device. Referring generally to FIG. 1 , when an SMS message is received by the mobile device 102 , a file or database lookup is conducted of the SIM card or other memory means.
- the sender lists may be stored in a network database such as, for example, the database 118 coupled to the system server 106 .
- the SMS message and associated information are sent to the system server 106 over the communications network via the one or more gateways 114 .
- a database lookup may then be performed to determine whether the sender's telephone number is on one of the sender lists. If the SMS message is on a list allowing display to the user, the SMS message may be released from the SMS system server 106 and forwarded to the mobile device 102 .
- Predetermined billing procedures may be incorporated into the system so that mobile telephone users to do not bear all of the cost of sending and receiving verification SMS messages.
- the user if a verification request is sent to the sender, the user is not charged for the receipt of the SMS message until a verification response is received.
- the SMS message is blocked due to the inclusion of the associated telephone number on the black list, the user may not be charged for receiving the blocked SMS message.
- the SMS filter system server 106 receives the message, the user may not be charged until the SMS message is forwarded onto the user.
- the mobile telephone carrier may bear the additional message verification costs as an incentive for users to subscribe to the particular carrier.
- SMS message may be sent using the Internet and electronic mail (emails)
- email address and IP addresses may be used to determine the identity of the SMS message sender. Therefore, each of the super white list, the white list, the black list, and the list of pending verification requests may also include email addresses and IP addresses or any other suitable sender identification.
- SMS message formats have been described, embodiments of the present invention may also support multimedia message service (MMS), email messages, and any other desired communication formats.
- MMS multimedia message service
- the example application user interface shown in FIG. 3 describes certain functions and inputs. However, other functions and inputs may be incorporated into the user interface such as, for example, input, searching, and adding of email addresses and IP addresses into the sender lists. Any number of sender lists may also be included in the user interface.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Short message service (SMS) messages are sent by a sender (501) to a recipient (502) over a communications network (503). An SMS message is received (401) from the sender. An automatic verification request is sent (402) to the sender requesting a verification response, with the verification request being sent before the SMS message is delivered to the recipient. The verification response is received (403) from the sender; and the SMS message is delivered (404) to the recipient upon receiving the verification response. A system for delivering the SMS messages includes receiving means (504) for receiving the SMS message from the sender, transmission means (505) for sending an automatic verification request to the sender requesting a verification response, receiving means (506) for receiving the verification response from the sender, and delivering means (507) for delivering SMS message to the recipient upon receiving the verification response.
Description
- The present invention relates generally to short message service (SMS) messages, and more specifically, to a method and system for authorising SMS messages transmitted on a mobile telephone network.
- Unsolicited electronic mail (email), often referred to as bulk electronic mail, “spam,” or “junk email,” has long plagued computer and Internet users. Unsolicited email is often of a commercial nature sent indiscriminately to individuals, mailing lists, or newsgroups. With the widespread and growing use of short message service (SMS) messages over mobile networks, mobile telephone users are now subject to unsolicited SMS messages.
- The present invention provides a method and system for authorising SMS messages on a mobile telephone that overcomes or alleviates one or more problems related to unsolicited or unwanted SMS messages.
- According to one embodiment of the present invention, a method for delivering short message service (SMS) messages sent by a sender to a recipient over a communications network is disclosed. The method includes receiving an SMS message from the sender; sending an automatic verification request to the sender requesting a verification response, wherein the verification request is sent before the SMS message is delivered to the recipient; receiving the verification response from the sender; and delivering the SMS message to the recipient upon receiving the verification response.
- According to another embodiment of the present invention, a system for delivering short message service (SMS) messages sent by a sender to a recipient over a communications network is disclosed. The system includes receiving means for receiving an SMS message from the sender; transmission means for sending an automatic verification request to the sender requesting a verification response, wherein the verification request is sent before the SMS message is delivered to the recipient; receiving means for receiving the verification response from the sender; and delivering means for displaying the SMS message to the recipient upon receiving the verification response.
- According to yet another embodiment, the method and system further includes verifying the SMS message, wherein the SMS message includes a sender identification and verifying the SMS message includes comparing the one or more sender lists, the one or more sender lists including a white list, and the SMS message is delivered to the recipient where the sender identification is included in the white list, and a verification request is sent to the sender where the sender identification is not included in the white list.
- The SMS message may be received by a mobile telephone, wherein delivering the SMS message to the recipient includes allowing display of the SMS message on the mobile telephone. The SMS message may also be received by a system server, wherein delivering the SMS message to the recipient includes transmitting the SMS message from the system server to the mobile telephone.
- According to another embodiment, the one or more sender lists are stored on a mobile telephone SIM card, mobile telephone memory or a system server database.
- These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description and accompanying drawings where:
-
FIG. 1 is a block diagram of a communications network in accordance with an embodiment of the present invention. -
FIG. 2 is a flowchart diagram of an application operation process in accordance with an embodiment of the present invention. -
FIG. 3 is a flowchart diagram of an application user interface in accordance with an embodiment of the present invention. -
FIG. 4 is a flowchart diagram of a method according to a simplified embodiment of the invention. -
FIG. 5 is a block diagram of a system according to a simplified embodiment of the invention. - The detailed description set forth below in connection with the appended drawings is intended as a description of example embodiments of the present invention and is not intended to represent the only embodiments in which the present invention can be practiced. The embodiments described throughout this description are intended to serve as an example or illustration of the present invention and should not necessarily be construed as preferred or advantageous over other embodiments. Any number of the described embodiments may be incorporated in any desired combination. The detailed description includes specific details for the purpose of providing a thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced without these specific details.
- In the following description, reference is made to the accompanying drawings, which form a part hereof, and through which is shown by way of illustration specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be used as structural and other changes may be made without departing from the scope of the present invention.
- Referring firstly to
FIG. 4 andFIG. 5 , simple embodiments of the invention are illustrated. Short message service (SMS) messages are sent by asender 501 to arecipient 502 over acommunications network 503. An SMS message is received 401 from the sender. An automatic verification request is sent 402 to the sender requesting a verification response, with the verification request being sent before the SMS message is delivered to the recipient. The verification response is received 403 from the sender; and the SMS message is delivered 404 to the recipient upon receiving the verification response. A system for delivering the SMS messages includes receivingmeans 504 for receiving the SMS message from thesender 501, transmission means 505 for sending an automatic verification request to thesender 501 requesting a verification response, receivingmeans 506 for receiving the verification response from the sender, anddelivering means 507 for delivering the SMS message to therecipient 502 upon receiving the verification response. - Referring now to
FIG. 1 , a block diagram of acommunications network 100 in accordance with an embodiment of the present invention is shown. According to one example embodiment, the communications network is a mobile telephone network using any suitable cellular, digital cellular, digital, or other communications system such as, for example, a Global System for Mobile (GSM), a Time Division Multiple Access (TDMA) system, a Code-Division Multiple Access (CDMA) system, an Advance Mobile Phone Service (AMPS), or any other suitable communications system. A plurality ofmobile devices 102 is provided on thecommunications network 100. According to one example embodiment, the mobile device is a mobile telephone, such as a cellular phone, personal communications service (PCS) phone, general packet radio service (GPRS) phone, or any other suitable mobile phone. However, the mobile device may be any other mobile or wireless device including, but not limited to, personal data assistants (PDAs), two-way pagers, laptop computers, global positioning system (GPS) devices, short message service (SMS) devices, and any other mobile device that is capable of receiving SMS messages. In one embodiment, the mobile devices include a Subscriber Identity Module (SIM) and is SIM toolkit enabled. However, other platforms may be used such as, for example, Java 2 Platform Micro Edition (J2ME), and any other mobile device platforms. According to one example embodiment, the plurality of mobile devices communicate on thecommunications network 100 using radio waves using radio frequency (RF) field propagation. - The
telecommunications network 100 illustrated inFIG. 1 includes a plurality of devices that may commonly be found in a mobile telephone network. While twomobile devices 102 are illustrated, thenetwork 100 may include any number of mobile devices communicating within and across a plurality of cells or networks. A cell is a generally geographical area covered by a cellular transmitter facility, such as a base station or cellular tower. A software application is stored in memory of the mobile device. In one embodiment, the application is a SIM-based Java application or embedded C application stored in aSIM card 104 of themobile device 102. The application may be downloaded over thenetwork 100 from asystem server 106 or preinstalled on theSIM card 104. The application may be any suitable application configured to operate on themobile device 102. An example application type is a Java-based application configured for operation on an embedded device or other microprocessor-based consumer products. - Each of the
mobile devices 102 is operationally coupled to the communications network via abase station 108. In one embodiment, themobile device 102 is in communication with thebase station 108 using RF waves or any other suitable wireless communication protocol. Thebase station 108, or cell tower or any other system for receiving mobile device transmissions, is the relay station that a mobile device communicates with when initiating or receiving a wireless transmission. Generally, thebase station 108 transmits voice and data to other devices over a forward control channel (FOCC) and mobile devices transmit voice and data to the base station over a reverse control channel (RECC). Thebase station 108 manages voice and data traffic between mobile devices and an associated mobile switching centre (MSC) 110. - Each of the
base stations 108 is operationally coupled to the associatedmobile switching centre 110, which is a computer-controlled switch for managing automated network operations. Each of themobile switching centres 110 automatically coordinates and switches transmissions between mobile phones in a given service area. Generally, each cell in a mobile network is controlled by a single MSC. According to one embodiment, each of theMSCs 110 is coupled to theassociated base station 108 by T1 lines, or equivalent communication lines, or microwave channels. However, any suitable communication line may be used. According to another embodiment, each of theMSCs 110 is coupled to the publicservice telephone network 112 by T1 lines, or equivalent communication lines, or landlines. - Each of the
MSCs 110 is operationally coupled to one ormore gateways 114. According to one embodiment, each of theMSCs 110 is coupled to the one ormore gateways 114 by T1 lines, or equivalent communication lines, or microwave channels. Thegateway 114 is a network point that acts as an entrance to another network. According to one example embodiment, thegateway 114 provides access to TCP/IP basednetworks 116 and also facilitates communication with thesystem server 106. Thegateway 114 may include gateway software for use on Solaris and Linux platforms. However, other platforms may be used. In the embodiment illustrated inFIG. 1 , thesystem server 106 transmits data to and receives data from the mobile device user using thegateway 114 using an SMP protocol. However, other communication lines and protocols may be used. For example, thesystem server 106 may communicate with the user using themobile switching centre 110, using aPSTN 112, or using a TCP/IP connection. - The
system server 106 may be operationally coupled to one ormore databases 118 or other memory storage devices for storing user data, a plurality of superwhite lists 120, userwhite lists 123, user black lists 125, pendinglists 132, and other sender lists, and any other desired information. - A plurality of user lists is stored on the
SIM card 104 or other memory storage means on themobile device 102. In the illustrated embodiment, a superwhite list 122, a user'swhite list 124, a user'sblack list 126, and apending list 130 are stored on theSIM card 104.Communications lines 128 illustrates the synchronization between the sender lists stored on thedata base 118 and the sender lists stored on theSIM card 104 of themobile device 102. For example, there may be synchronization between thepending list 130, superwhite list 122, userwhite list 124, and userblack list 126 stored on theSIM card 104 and thepending list 132, superwhite list 120, userwhite list 123, and userblack list 125 stored on thedatabase 118. In one embodiment, updates to the sender lists made by thesystem server 106 will be automatically synchronised with the sender lists stored on theSIM card 104. Synchronization may occur whenever changes are made, upon request, or after predetermined time intervals. While only the sender lists are shown having synchronization capabilities, other user lists, and other data, may be synchronised and shared between themobile device 102 and thesystem server 106. - The illustrated
communications network 100 is only one simplified example of a network used for voice, electronic, and Internet communications. Any suitable network configuration may be used. The network configuration may vary depending on the particular type of network being used. -
FIG. 2 is a flowchart diagram of an SMS authorising system process in accordance with an embodiment of the present invention. An SMS message sender creates and sends a SMS message to a specified mobile telephone number, the SMS recipient. The corresponding mobile telephone receives the SMS message,step 200. The application receives the SMS message and determines the type of the message received. The message may be one of: (a) an SMS text message; (b) a binary SMS “super white list” update; (c) a binary SMS “white list” update; and (d) a binary SMS “black list” update. Instep 202, the application determines if the message is an SMS text message. If the SMS message is a SMS text message, the application checks if the message is from a telephone number that is in a list of telephone numbers for which there are SMS messages awaiting verification,step 204. From this comparison, the application determines whether the message is a proper response to the verification request,step 206. Instep 208, if the message is a proper response, the application delivers the messages that are associated with the verification response for display. The determination of whether the SMS message is a successful verification reply is based upon the type of verification method employed by the mobile telephone user. In one embodiment, either a reply-based verification or name-based verification may be used. However, other verification methods may be used. For reply-based verification, the receipt of a reply message is sufficient in itself whereas for name-based verification, the SMS message needs to be matched in a fuzzy manner for the name of the mobile telephone user. If the verification message is not a successful verification reply, the message is discarded,step 210. - If the SMS message sender's telephone number is not in the verification list, a lookup of the SMS message sender's telephone number is performed against the SIM based sender lists, including a white list, a super white list, and a black list. A user's white list includes a list of telephone numbers, the contents of the list controlled by the mobile device user, from which SMS messages are displayed on the mobile device. In one embodiment, the white list may be the address book that is stored on the SIM card or other memory means in the mobile device. A super white list includes a list of telephone numbers, the list controlled by a mobile network administrator, from which SMS messages are displayed on the mobile device. A black list is a list of telephone numbers from which SMS messages are not displayed on the mobile device. The black list may be created and controlled by the mobile device user, the mobile network administrator, or any combination of shared control. These sender lists may be stored on the SIM card or other memory means in the mobile device.
- In
step 212, the application determines whether the SMS message sender's telephone number is listed in the white list. If the SMS message sender's telephone number is listed in the white list, then the SMS message is delivered for display,step 213. For example, the SMS message may be delivered to the mobile device “inbox” and an alert sounded to inform the mobile device user that a new SMS message has arrived. Instep 214, the application determines whether the SMS message sender's telephone number is listed in the super white list. If the SMS message sender's telephone number is listed in the super white list, then the SMS message is delivered for display,step 215. - If the SMS message sender's telephone number is not in the list of those numbers awaiting verification, not listed in the white list, and not listed in the super white list, the application determines if the SMS message senders telephone number is listed in the black list,
step 216. If the SMS message sender's telephone number is listed in the black list, the SMS message is not delivered for display,step 218. A reply message may be sent to inform the sender that the message has been returned and not viewed by the user. In one embodiment, the SMS message may be deleted. In another embodiment, the SMS message may be stored in a black list folder of “black listed” SMS messages where they are kept for a predetermined period of time before they are permanently deleted. In yet another embodiment, messages in the black list folder may be viewed by the user upon user selection. - If the SMS message sender's telephone number is not in the list of those numbers awaiting verification and not in any of the sender lists, the telephone number and associated SMS message are stored in a list or queue of messages awaiting sender verification,
step 220. The telephone numbers and associated messages may be stored on the SIM card or other memory means on the mobile device. Instep 222, a verification request is then sent to the SMS message sender, the content of which may depend on the type of verification method being used. In one embodiment, the mobile device user may view the list of telephone numbers that are awaiting verification messages. Also, the user may be able to view the SMS messages awaiting verification if desired. In one embodiment, a preview format may only allow the user to see a limited number of characters or words of the SMS message. In another embodiment, the user may see the entire SMS message upon request. - In
step 224, the application checks for the receipt of a verification message. If the verification reply has not been received, the mobile device awaits a verification message,step 226. The mobile device may function normally while awaiting verification messages. In one embodiment, the mobile device may save the SMS message and await the verification message for a predetermined period of time. After the predetermined period of time has elapsed, the mobile device may delete the pending SMS message and cease awaiting the verification message. - In
step 228, if a proper verification reply is received including a proper response, the SMS message is released from the queue and delivered for display. - If the received message is not a text message, the application determines whether the message is a binary SMS super white list update,
step 230. If the message is a binary SMS super white list update, the application processes the update,step 232. If the message is not a binary SMS super white list update, the application determines whether the message is a binary SMS white list update,step 234. If the message is a binary SMS white list update, the application processes the update,step 236. If the message is not a binary SMS white list update, the application determines whether the message is a binary SMS black list update,step 238. If the message is a binary SMS black list update, the application processes the update,step 240. If the message is not a binary SMS black list update, the application processes the data as non-text message and non-update type data,step 242. If the message cannot be processed by the application, the message may be discarded and a reply may be generated and sent to the sender informing them that the message could not be processed. - The flowchart diagram illustrated in
FIG. 2 is only one example of the SMS authorising system's operation. Any number of changes and variations may be made. For example, the system may make decisions in any desired order. For example, instead of checking first for the receipt of a text message,step 202, the system may check to determine whether the received message is an update message. Also, the illustrated steps may be included in any combination. For example, the system may only include steps relating to the white list and not include steps related to the black list or super white list. Also, additional steps may be added to the process as desired. - In one embodiment, the user may control the display of messages from telephone numbers listed in the super white. For example, the user may choose to only receive SMS messages that have been explicitly identified in the white list.
- Referring now to
FIG. 3 , a flowchart diagram of an application user interface, in accordance with an embodiment of the present invention, is shown. The illustrated user interface diagram 300 starts at anapplication menu 302 including a list of available applications. Themenu 302 includes an example SMS authorisation application titled “3B application.” Each of the illustrated menus includes items in a list form. Each of the items may be highlighted, pointed to, or otherwise selected. Selection of the item will display a different menu or display screen. Each of the menus or display screens may include a “back” option that allows the user to return to the immediately previous display screen. Each of the menus or display screens may include an “ok” or “select” that allows the user to view the next display screen or select the highlighted item. Each of the ok, select, and back options may have an associated button on the mobile device for activation. - Selection of the 3B application displays a
3B application menu 304 including white list, black list, pending list, and setting options. A selection of one of the user lists displays amain options menu 306 including view all, search, and add options. Operation of the menus is similar for each of the white list, black list, and pending list. Therefore, only operation of the white list is shown in the illustrated diagram. Operation of the application for each of the lists may be modified slightly to meet the requirements of the various types of list. For example, editing options may not be necessary for the pending list since the information was received from an incoming message. Selection of the view all option displays a view allmenu 308 including a list of names and associated telephone numbers. In one embodiment, the white list and super white list may be displayed as one list on the user's mobile device. In another embodiment, each of the lists may have separate display options. A selection of one of the names/telephone numbers displays anoptions menu 310 including edit, delete, and view details options. Selection of the delete option displays adelete confirmation menu 312. Selection of ok deletes the selected name/telephone number from the list and returns the user to the view allmenu 308. Selection of the view details option may display a morecomplete detail screen 314 of the selected name/telephone number. Selection of ok returns the user to the view allmenu 308. Selection of the edit option displays anedit name screen 316. After making any desired changes to the name, selection of ok confirms the changes made and displays an edittelephone number screen 318. After making any desired changes to the telephone number, selection of ok confirms the changes made and returns the user to the view allmenu 308. At themain options menu 306, selection of the search option displays asearch menu 320. Selection of either the “by name” or “by mobile no.” option displays asearch input screen 322. Thesearch input screen 322 will receive user input and search for either a name or a telephone number depending on which option was selected. Selection of ok confirms the display of the search results (not shown) and returns the user to the view allmenu 308. At themain options menu 306, selection of the add option displays an addname input screen 324. The user may input a name and select ok, which displays an addnumber input screen 326. The user may then input a telephone number and select ok, which adds the name and associated telephone number to the selected list and returns the user to themain options menu 306. - At the
3B application menu 304, selection of the settings option displays asettings menu 328 including authorization method, enable/disable, network, and “enter your name” options. Selection of the authorization method display aoptions menu 330 including a plurality of different authorization methods. The illustrated menu includes the reply method, where any reply from the telephone number is accepted as a proper response, and the name check method, where the name received must be checked as a legitimate sender name before the reply is accepted as a proper response. Selection of ok returns the user to thesettings menu 328. Selection of the enter your name option displays aname input screen 332 where the mobile device user may input their name into the mobile device's memory. A similar input screen may be included to provide any additional information about the mobile device user. Selection of ok returns the user to thesettings menu 328. Selection of enable/disable displays an enable/disablescreen 340 where the user may choose to enable or disable the SMS authorisation system on the mobile telephone. A country code options display 336 may be included to change the country code of the super white list. Acountry code display 338 may be used to change the country code. Modification of the settings may be protected by apin number display 334 where the proper pin number must be entered before settings may be changed. - The sender may provide a response to the verification request in any suitable manner. In one embodiment, the sender provides information about the intended recipient such as the recipients name. In another embodiment, the sender may need to provide one or more of a password, key, token, and other electronic objects that authenticate the sender's identity.
- Certain procedures may be needed for the situation where both the sender and the recipient are using the SMS authorising system so that the verification request received by the sender is not seen as an unauthorised message. The verification request must be allowed to pass through to the sender without causing a verification request to be sent in the opposing direction. In one embodiment, verification messages are identified by certain formatting rules that can be distinguished from conventional SMS messages. In another embodiment, the system may expect to receive a verification request for a short period after the SMS message is sent out of the sender's system.
- In one embodiment of the invention, the sender lists may be stored in the SIM card or other memory means on the mobile device. Referring generally to
FIG. 1 , when an SMS message is received by themobile device 102, a file or database lookup is conducted of the SIM card or other memory means. In another embodiment, the sender lists may be stored in a network database such as, for example, thedatabase 118 coupled to thesystem server 106. When an SMS message is sent to the user of the SMS authorising system, the SMS message and associated information are sent to thesystem server 106 over the communications network via the one ormore gateways 114. A database lookup may then be performed to determine whether the sender's telephone number is on one of the sender lists. If the SMS message is on a list allowing display to the user, the SMS message may be released from theSMS system server 106 and forwarded to themobile device 102. - Predetermined billing procedures may be incorporated into the system so that mobile telephone users to do not bear all of the cost of sending and receiving verification SMS messages. In one embodiment, if a verification request is sent to the sender, the user is not charged for the receipt of the SMS message until a verification response is received. In another embodiment, if the SMS message is blocked due to the inclusion of the associated telephone number on the black list, the user may not be charged for receiving the blocked SMS message. In the embodiment where the SMS
filter system server 106 receives the message, the user may not be charged until the SMS message is forwarded onto the user. In another embodiment, the mobile telephone carrier may bear the additional message verification costs as an incentive for users to subscribe to the particular carrier. - Those skilled in the art will appreciate that the above-described system may be implemented in a variety of configurations. For example, specific communication protocols have been identified with reference to the illustrated mobile network. Other suitable communications lines and communication protocols may be used. Also, while the application and the various sender lists are described as using the SMS sender's telephone number to make decisions regarding displaying, queuing, and deleting SMS messages, other means may be used to identify the sender of the SMS message. For example, because SMS message may be sent using the Internet and electronic mail (emails), email address and IP addresses may be used to determine the identity of the SMS message sender. Therefore, each of the super white list, the white list, the black list, and the list of pending verification requests may also include email addresses and IP addresses or any other suitable sender identification. While SMS message formats have been described, embodiments of the present invention may also support multimedia message service (MMS), email messages, and any other desired communication formats. Also, the example application user interface shown in
FIG. 3 describes certain functions and inputs. However, other functions and inputs may be incorporated into the user interface such as, for example, input, searching, and adding of email addresses and IP addresses into the sender lists. Any number of sender lists may also be included in the user interface. - The previous description of the exemplary embodiments is provided to enable any person skilled in the art to make or use the present invention. While the invention has been described with respect to particular illustrated embodiments, various modifications to these embodiments will readily be apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. It is therefore desired that the present embodiments be considered in all respects as illustrative and not restrictive. Accordingly, the present invention is not intended to be limited to the embodiments described above but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (29)
1. A method for delivering short message service (SMS) messages sent by a sender to a recipient over a communications network, the method including: receiving an SMS message from the sender; sending an automatic verification request to the sender requesting a verification response, wherein the verification request is sent before the SMS message is delivered to the recipient; receiving the verification response from the sender; and delivering the SMS message to the recipient upon receiving the verification response.
2. A method according to claim 1 , further including verifying the SMS message, wherein the SMS message includes a sender identification and verifying the SMS message includes comparing the one or more sender lists, the one or more sender lists including a white list, and the SMS message is delivered to the recipient where the sender identification is included in the white list, and a verification request is sent to the sender where the sender identification is not included in the white list.
3. A method according to claim 1 , wherein the sender identification is a mobile telephone number.
4. A method according to claim 1 , wherein the sender identification is an email address.
5. A method according to claim 2 , wherein the one or more sender lists includes a black list, and the white list includes a list of authorised senders and the black list includes a list of unauthorised senders.
6. A method according to claim 2 , wherein the one or more sender lists includes a super white list, and the SMS message is delivered to the recipient where the sender identification is included on a super white list.
7. A method according to claim 1 , wherein the SMS message is received by a mobile telephone and wherein delivering the SMS message to the recipient includes allowing display of the SMS message on the mobile telephone.
8. A method according to claim 1 , wherein the SMS message is received by a system server and wherein delivering the SMS message to the recipient includes transmitting the SMS message from the system server to the mobile telephone.
9. A method according to claim 6 , wherein the super white list is synchronized with a second super white list over the communications network, wherein the second super white list is stored on a system server database.
10. A method according to claim 6 , wherein the white list is synchronized with a second white list over the communications network, wherein the second white list is stored on a system server database.
11. A method according to claim 6 , wherein the black list is synchronized with a second black list over the communications network, wherein the second black list is stored on a system server database.
12. A method according to any claim 2 , wherein the one or more sender lists are stored on a mobile telephone SIM card.
13. A method according to claim 2 , wherein the one or more sender lists are stored on a system server database.
14. A method according to claim 5 , wherein the SMS message is discarded where the sender identification is included on the a black list.
15. A system for delivering short message service (SMS) messages sent by a sender to a recipient over a communications network, the system including: receiving means for receiving an SMS message from the sender; transmission means for sending an automatic verification request to the sender requesting a verification response, wherein the verification request is sent before the SMS message is delivered to the recipient; receiving means for receiving the verification response from the sender; and delivering means for displaying the SMS message to the recipient upon receiving the verification response.
16. A system according to claim 15 further including verification means for verifying the SMS message, wherein the SMS message includes a sender identification and verifying the SMS message includes comparing the one or more sender lists, the one or more sender lists including a white list, and the SMS message is delivered to the recipient where the sender identification is included in the white list, and a verification request is sent to the sender where the sender identification is not included in the white list.
17. A system according to claim 16 , wherein the sender identification is a mobile telephone number.
18. A system according to claim 16 , wherein the sender identification is an email address.
19. A system according to claim 16 , wherein the one or more sender lists includes a black list, and the white list includes a list of authorised senders and the black list includes a list of unauthorised senders.
20. A system according to claim 16 , wherein the one or more sender lists includes a super white list, and the SMS message is delivered to the recipient where the sender identification is included on a super white list.
21. A system according to claim 15 , wherein the SMS message is received by a mobile telephone and wherein delivering the SMS message to the recipient includes allowing display of the SMS message on the mobile telephone.
22. A system according to claim 15 , wherein the SMS message is received by a system server and wherein delivering the SMS message to the recipient includes transmitting the SMS message from the system server to the mobile telephone.
23. A system according to claim 20 , wherein the super white list is synchronized with a second super white list over the communications network, wherein the second super white lists is stored on a system server database.
24. A system according to claim 16 , wherein the one or more sender lists are stored on a mobile telephone SIM card.
25. A system according to claim 16 , wherein the one or more sender lists are stored in a memory device on a mobile device.
26. A system according to claim 16 , wherein the one or more sender lists are stored on a system server database.
27. A system according to claim 19 , wherein the SMS message is discarded where the sender identification is included on the a black list.
28. (canceled)
29. (canceled)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003905482A AU2003905482A0 (en) | 2003-10-08 | Method and system for authorising short message service (SMS) messages | |
AU2003905482 | 2003-10-08 | ||
PCT/AU2004/001356 WO2005034537A1 (en) | 2003-10-08 | 2004-10-06 | Method and system for authorising short message service (sms) messages |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070275739A1 true US20070275739A1 (en) | 2007-11-29 |
Family
ID=34397669
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/575,547 Abandoned US20070275739A1 (en) | 2003-10-08 | 2004-10-06 | Method and System for Authorising Short Message Service Messages |
Country Status (2)
Country | Link |
---|---|
US (1) | US20070275739A1 (en) |
WO (1) | WO2005034537A1 (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060271396A1 (en) * | 2005-05-27 | 2006-11-30 | Lee Seung J | Method of certificating message, terminal thereof and system thereof |
US20070027842A1 (en) * | 2005-07-27 | 2007-02-01 | Sbc Knowledge Ventures L.P. | Information-paging delivery |
US20070143422A1 (en) * | 2005-12-21 | 2007-06-21 | Yigang Cai | Phonebook use to filter unwanted telecommunications calls and messages |
US20070208868A1 (en) * | 2006-03-03 | 2007-09-06 | Kidd John T | Electronic Communication Relationship Management System And Methods For Using The Same |
US20080182556A1 (en) * | 2007-01-30 | 2008-07-31 | Datasci, Llc | Systems and methods for filtering cellular telephone messages |
US20080207235A1 (en) * | 2005-08-22 | 2008-08-28 | Sung-Yong Choi | Method for Servicing Short Message Service Message Receiving Confirmation, Mobile Communication Terminal and Service System for the Performing the Same |
US20080268817A1 (en) * | 2007-04-25 | 2008-10-30 | Kirusa Inc. | Addressing Voice SMS Messages |
US20090280819A1 (en) * | 2008-05-07 | 2009-11-12 | At&T Mobility Ii Llc | Femto cell signaling gating |
US20090286540A1 (en) * | 2008-05-13 | 2009-11-19 | At&T Mobility Ii Llc | Femtocell architecture for information management |
US20090298470A1 (en) * | 2008-05-13 | 2009-12-03 | At&T Mobility Ii Llc | Administration of access lists for femtocell service |
US20100041364A1 (en) * | 2008-06-12 | 2010-02-18 | At&T Mobility Ii Llc | Femtocell service registration, activation, and provisioning |
US20100048229A1 (en) * | 2006-10-26 | 2010-02-25 | Gaetano Rizzi | Method for accessing databases through sms/mms messages |
US20100112981A1 (en) * | 2008-11-03 | 2010-05-06 | Samsung Electronics Co. Ltd. | Whitelist update method and apparatus for user equipment in mobile communication system |
US20100272024A1 (en) * | 2005-10-21 | 2010-10-28 | At&T Intellectual Property I, L.P. | Intelligent pico-cell for transport of wireless device communications over wireline networks |
US20110093913A1 (en) * | 2009-10-15 | 2011-04-21 | At&T Intellectual Property I, L.P. | Management of access to service in an access point |
US8326296B1 (en) | 2006-07-12 | 2012-12-04 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US20130145425A1 (en) * | 2011-12-06 | 2013-06-06 | At&T Intellectual Property I, L.P. | Verification service |
CN103152706A (en) * | 2013-02-27 | 2013-06-12 | 珠海市小源科技有限公司 | Method and system for realizing short message privacy |
US20140128028A1 (en) * | 2010-09-14 | 2014-05-08 | Vodafone Ip Licensing Limited | Method and device for controlling access to mobile telecommunications networks |
US20160057591A1 (en) * | 2007-08-27 | 2016-02-25 | International Business Machines Corporation | System and method of creating and providing sms http tagging |
WO2016120476A1 (en) * | 2015-01-30 | 2016-08-04 | Dialogue Malta Limited | Identification of sources of media traffic through a network |
US20170019779A1 (en) * | 2015-07-16 | 2017-01-19 | T-Mobile U.S.A., Inc. | Mms termination on different networks |
US20180054731A1 (en) * | 2015-03-27 | 2018-02-22 | Huawei Technologies Co., Ltd. | SMS Message Reading Control Method and Terminal |
US10250743B2 (en) * | 2005-04-20 | 2019-04-02 | Mobile Messenger Global, Inc. | Sender identification system and method |
US20190141188A1 (en) * | 2005-12-02 | 2019-05-09 | Bookit Oy Ajanvarauspalvelu | Method and system for the mass sending of messages |
US20210076302A1 (en) * | 2018-02-14 | 2021-03-11 | Samsung Electronics Co., Ltd. | Access control method for smart card and electronic device using same |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100742362B1 (en) * | 2005-10-04 | 2007-07-25 | 엘지전자 주식회사 | Method and apparatus for securely transmitting and receiving content in mobile communication network |
WO2007049285A1 (en) * | 2005-10-27 | 2007-05-03 | Ramkumar Somasundaram | Avoiding nuisance by sms, mms and other mode of communication to a mobile user |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023723A (en) * | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms |
US6101393A (en) * | 1997-11-20 | 2000-08-08 | Ericsson Inc. | Selective acceptance of short message service (SMS) messages in a cellular telephone network |
US6112227A (en) * | 1998-08-06 | 2000-08-29 | Heiner; Jeffrey Nelson | Filter-in method for reducing junk e-mail |
US6199102B1 (en) * | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages |
US6597917B1 (en) * | 1998-01-13 | 2003-07-22 | Nokia Networks Oy | Mobile communication system which transmits messaging messages |
US6645476B1 (en) * | 1999-07-15 | 2003-11-11 | Clariant Gmbh | Water-soluble polymers and their use in cosmetic and pharmaceutical compositions |
US7272853B2 (en) * | 2003-06-04 | 2007-09-18 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
US7340048B2 (en) * | 2000-07-14 | 2008-03-04 | Context Connect Llc | System and method for directory services and e-commerce across multi-provider networks |
US7454195B2 (en) * | 2001-11-16 | 2008-11-18 | At&T Mobility Ii, Llc | System for the centralized storage of wireless customer information |
-
2004
- 2004-10-06 US US10/575,547 patent/US20070275739A1/en not_active Abandoned
- 2004-10-06 WO PCT/AU2004/001356 patent/WO2005034537A1/en active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6199102B1 (en) * | 1997-08-26 | 2001-03-06 | Christopher Alan Cobb | Method and system for filtering electronic messages |
US6101393A (en) * | 1997-11-20 | 2000-08-08 | Ericsson Inc. | Selective acceptance of short message service (SMS) messages in a cellular telephone network |
US6023723A (en) * | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms |
US6597917B1 (en) * | 1998-01-13 | 2003-07-22 | Nokia Networks Oy | Mobile communication system which transmits messaging messages |
US6112227A (en) * | 1998-08-06 | 2000-08-29 | Heiner; Jeffrey Nelson | Filter-in method for reducing junk e-mail |
US6645476B1 (en) * | 1999-07-15 | 2003-11-11 | Clariant Gmbh | Water-soluble polymers and their use in cosmetic and pharmaceutical compositions |
US7340048B2 (en) * | 2000-07-14 | 2008-03-04 | Context Connect Llc | System and method for directory services and e-commerce across multi-provider networks |
US7454195B2 (en) * | 2001-11-16 | 2008-11-18 | At&T Mobility Ii, Llc | System for the centralized storage of wireless customer information |
US7272853B2 (en) * | 2003-06-04 | 2007-09-18 | Microsoft Corporation | Origination/destination features and lists for spam prevention |
Cited By (93)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10250743B2 (en) * | 2005-04-20 | 2019-04-02 | Mobile Messenger Global, Inc. | Sender identification system and method |
US20060271396A1 (en) * | 2005-05-27 | 2006-11-30 | Lee Seung J | Method of certificating message, terminal thereof and system thereof |
US20070027842A1 (en) * | 2005-07-27 | 2007-02-01 | Sbc Knowledge Ventures L.P. | Information-paging delivery |
US20080207235A1 (en) * | 2005-08-22 | 2008-08-28 | Sung-Yong Choi | Method for Servicing Short Message Service Message Receiving Confirmation, Mobile Communication Terminal and Service System for the Performing the Same |
US8208431B2 (en) | 2005-10-21 | 2012-06-26 | At&T Intellectual Property I, Lp | Intelligent pico-cell for transport of wireless device communications over wireline networks |
US20100272024A1 (en) * | 2005-10-21 | 2010-10-28 | At&T Intellectual Property I, L.P. | Intelligent pico-cell for transport of wireless device communications over wireline networks |
US11233898B2 (en) | 2005-12-02 | 2022-01-25 | Bookit Oy | Method and system for the mass sending of messages |
US10637987B2 (en) * | 2005-12-02 | 2020-04-28 | Bookit Oy | Method and system for the mass sending of messages |
US20190141188A1 (en) * | 2005-12-02 | 2019-05-09 | Bookit Oy Ajanvarauspalvelu | Method and system for the mass sending of messages |
US20070143422A1 (en) * | 2005-12-21 | 2007-06-21 | Yigang Cai | Phonebook use to filter unwanted telecommunications calls and messages |
US20070208868A1 (en) * | 2006-03-03 | 2007-09-06 | Kidd John T | Electronic Communication Relationship Management System And Methods For Using The Same |
US10149126B2 (en) | 2006-07-12 | 2018-12-04 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US8326296B1 (en) | 2006-07-12 | 2012-12-04 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US8897752B2 (en) | 2006-07-12 | 2014-11-25 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US9674679B2 (en) | 2006-07-12 | 2017-06-06 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US9301113B2 (en) | 2006-07-12 | 2016-03-29 | At&T Intellectual Property I, L.P. | Pico-cell extension for cellular network |
US20100048229A1 (en) * | 2006-10-26 | 2010-02-25 | Gaetano Rizzi | Method for accessing databases through sms/mms messages |
US20080182556A1 (en) * | 2007-01-30 | 2008-07-31 | Datasci, Llc | Systems and methods for filtering cellular telephone messages |
US8060059B2 (en) * | 2007-01-30 | 2011-11-15 | Datasci, Llc | Systems and methods for filtering cellular telephone messages |
US20110287761A1 (en) * | 2007-01-30 | 2011-11-24 | Datasci Llc | Systems and methods for filtering cellular telephone messages |
US8107978B2 (en) * | 2007-04-25 | 2012-01-31 | Kirusa Inc. | Addressing voice SMS messages |
US20080268817A1 (en) * | 2007-04-25 | 2008-10-30 | Kirusa Inc. | Addressing Voice SMS Messages |
US9986393B2 (en) | 2007-08-27 | 2018-05-29 | International Business Machines Corporation | System and method of creating and providing SMS HTTP tagging |
US20160057591A1 (en) * | 2007-08-27 | 2016-02-25 | International Business Machines Corporation | System and method of creating and providing sms http tagging |
US9686661B2 (en) * | 2007-08-27 | 2017-06-20 | International Business Machines Corporation | System and method of creating and providing SMS HTTP tagging |
US10257671B2 (en) | 2007-08-27 | 2019-04-09 | International Business Machines Corporation | System and method of creating and providing SMS HTTP tagging |
US8626223B2 (en) | 2008-05-07 | 2014-01-07 | At&T Mobility Ii Llc | Femto cell signaling gating |
US8812049B2 (en) | 2008-05-07 | 2014-08-19 | At&T Mobility Ii Llc | Femto cell signaling gating |
US20090280819A1 (en) * | 2008-05-07 | 2009-11-12 | At&T Mobility Ii Llc | Femto cell signaling gating |
US8787342B2 (en) | 2008-05-13 | 2014-07-22 | At&T Mobility Ii Llc | Intra-premises content and equipment management in a femtocell network |
US9369876B2 (en) | 2008-05-13 | 2016-06-14 | At&T Mobility Ii Llc | Location-based services in a femtocell network |
US8463296B2 (en) | 2008-05-13 | 2013-06-11 | At&T Mobility Ii Llc | Location-based services in a femtocell network |
US20090286540A1 (en) * | 2008-05-13 | 2009-11-19 | At&T Mobility Ii Llc | Femtocell architecture for information management |
US8490156B2 (en) | 2008-05-13 | 2013-07-16 | At&T Mobility Ii Llc | Interface for access management of FEMTO cell coverage |
US20090288152A1 (en) * | 2008-05-13 | 2009-11-19 | At&T Mobility Ii Llc | Automatic population of an access control list to manage femto cell coverage |
US10499247B2 (en) | 2008-05-13 | 2019-12-03 | At&T Mobility Ii Llc | Administration of access lists for femtocell service |
US8522312B2 (en) | 2008-05-13 | 2013-08-27 | At&T Mobility Ii Llc | Access control lists and profiles to manage femto cell coverage |
US8331228B2 (en) | 2008-05-13 | 2012-12-11 | At&T Mobility Ii Llc | Exchange of access control lists to manage femto cell coverage |
US20090288140A1 (en) * | 2008-05-13 | 2009-11-19 | At&T Mobility Ii Llc | Access control lists and profiles to manage femto cell coverage |
US8719420B2 (en) | 2008-05-13 | 2014-05-06 | At&T Mobility Ii Llc | Administration of access lists for femtocell service |
US20090288144A1 (en) * | 2008-05-13 | 2009-11-19 | At&T Mobility Ii Llc | Time-dependent white list generation |
US20090286510A1 (en) * | 2008-05-13 | 2009-11-19 | At&T Mobility Il Llc | Location-based services in a femtocell network |
US10225733B2 (en) | 2008-05-13 | 2019-03-05 | At&T Mobility Ii Llc | Exchange of access control lists to manage femto cell coverage |
US8755820B2 (en) | 2008-05-13 | 2014-06-17 | At&T Mobility Ii Llc | Location-based services in a femtocell network |
US8763082B2 (en) | 2008-05-13 | 2014-06-24 | At&T Mobility Ii Llc | Interactive client management of an access control list |
US8274958B2 (en) | 2008-05-13 | 2012-09-25 | At&T Mobility Ii Llc | Intra-premises content and equipment management in a femtocell network |
US8254368B2 (en) | 2008-05-13 | 2012-08-28 | At&T Mobility Ii Llc | Femtocell architecture for information management |
US8850048B2 (en) | 2008-05-13 | 2014-09-30 | At&T Mobility Ii Llc | Reciprocal addition of attribute fields in access control lists and profiles for femto cell coverage management |
US20090298470A1 (en) * | 2008-05-13 | 2009-12-03 | At&T Mobility Ii Llc | Administration of access lists for femtocell service |
US8863235B2 (en) | 2008-05-13 | 2014-10-14 | At&T Mobility Ii Llc | Time-dependent white list generation |
US8219094B2 (en) | 2008-05-13 | 2012-07-10 | At&T Mobility Ii Llc | Location-based services in a femtocell network |
US20100027521A1 (en) * | 2008-05-13 | 2010-02-04 | At&T Mobility Ii Llc | Intra-premises content and equipment management in a femtocell network |
US9019819B2 (en) | 2008-05-13 | 2015-04-28 | At&T Mobility Ii Llc | Exchange of access control lists to manage femto cell coverage |
US9094891B2 (en) | 2008-05-13 | 2015-07-28 | At&T Mobility Ii Llc | Location-based services in a femtocell network |
US9155022B2 (en) | 2008-05-13 | 2015-10-06 | At&T Mobility Ii Llc | Interface for access management of FEMTO cell coverage |
US9930526B2 (en) | 2008-05-13 | 2018-03-27 | At&T Mobility Ii Llc | Interface for access management of femto cell coverage |
US9877195B2 (en) | 2008-05-13 | 2018-01-23 | At&T Mobility Ii Llc | Location-based services in a femtocell network |
US8209745B2 (en) * | 2008-05-13 | 2012-06-26 | At&T Mobility Ii Llc | Automatic population of an access control list to manage femto cell coverage |
US9775037B2 (en) | 2008-05-13 | 2017-09-26 | At&T Mobility Ii Llc | Intra-premises content and equipment management in a femtocell network |
US9319964B2 (en) | 2008-05-13 | 2016-04-19 | At&T Mobility Ii Llc | Exchange of access control lists to manage femto cell coverage |
US9775036B2 (en) | 2008-05-13 | 2017-09-26 | At&T Mobility Ii Llc | Access control lists and profiles to manage femto cell coverage |
US9591486B2 (en) | 2008-05-13 | 2017-03-07 | At&T Mobility Ii Llc | Intra-premises content and equipment management in a femtocell network |
US9392461B2 (en) | 2008-05-13 | 2016-07-12 | At&T Mobility Ii Llc | Access control lists and profiles to manage femto cell coverage |
US9584984B2 (en) | 2008-05-13 | 2017-02-28 | At&T Mobility Ii Llc | Reciprocal addition of attribute fields in access control lists and profiles for femto cell coverage management |
US9503457B2 (en) | 2008-05-13 | 2016-11-22 | At&T Mobility Ii Llc | Administration of access lists for femtocell service |
US9538383B2 (en) | 2008-05-13 | 2017-01-03 | At&T Mobility Ii Llc | Interface for access management of femto cell coverage |
US9246759B2 (en) | 2008-06-12 | 2016-01-26 | At&T Mobility Ii Llc | Point of sales and customer support for femtocell service and equipment |
US8942180B2 (en) | 2008-06-12 | 2015-01-27 | At&T Mobility Ii Llc | Point of sales and customer support for femtocell service and equipment |
US8504032B2 (en) | 2008-06-12 | 2013-08-06 | At&T Intellectual Property I, L.P. | Femtocell service registration, activation, and provisioning |
US8743776B2 (en) | 2008-06-12 | 2014-06-03 | At&T Mobility Ii Llc | Point of sales and customer support for femtocell service and equipment |
US20100041364A1 (en) * | 2008-06-12 | 2010-02-18 | At&T Mobility Ii Llc | Femtocell service registration, activation, and provisioning |
US8655361B2 (en) | 2008-06-12 | 2014-02-18 | At&T Mobility Ii Llc | Femtocell service registration, activation, and provisioning |
US20100112981A1 (en) * | 2008-11-03 | 2010-05-06 | Samsung Electronics Co. Ltd. | Whitelist update method and apparatus for user equipment in mobile communication system |
US8510801B2 (en) | 2009-10-15 | 2013-08-13 | At&T Intellectual Property I, L.P. | Management of access to service in an access point |
US20110093913A1 (en) * | 2009-10-15 | 2011-04-21 | At&T Intellectual Property I, L.P. | Management of access to service in an access point |
US9509701B2 (en) | 2009-10-15 | 2016-11-29 | At&T Intellectual Property I, L.P. | Management of access to service in an access point |
US10645582B2 (en) | 2009-10-15 | 2020-05-05 | At&T Intellectual Property I, L.P. | Management of access to service in an access point |
US8856878B2 (en) | 2009-10-15 | 2014-10-07 | At&T Intellectual Property I, L.P | Management of access to service in an access point |
US9210174B2 (en) * | 2010-09-14 | 2015-12-08 | Vodafone Ip Licensing Limited | Method and device for controlling access to mobile telecommunications networks |
US20140128028A1 (en) * | 2010-09-14 | 2014-05-08 | Vodafone Ip Licensing Limited | Method and device for controlling access to mobile telecommunications networks |
US9325690B2 (en) | 2011-12-06 | 2016-04-26 | At&T Intellectual Property I, L.P. | Verification service |
US8739247B2 (en) * | 2011-12-06 | 2014-05-27 | At&T Intellectual Property I, L.P. | Verification service |
US20130145425A1 (en) * | 2011-12-06 | 2013-06-06 | At&T Intellectual Property I, L.P. | Verification service |
CN103152706A (en) * | 2013-02-27 | 2013-06-12 | 珠海市小源科技有限公司 | Method and system for realizing short message privacy |
AU2016211114B2 (en) * | 2015-01-30 | 2019-06-27 | Clx Networks Ab | Identification of sources of media traffic through a network |
WO2016120476A1 (en) * | 2015-01-30 | 2016-08-04 | Dialogue Malta Limited | Identification of sources of media traffic through a network |
US11349792B2 (en) | 2015-01-30 | 2022-05-31 | Sinch Sweden Ab | Identification of sources of media traffic through a network |
US10158990B2 (en) * | 2015-03-27 | 2018-12-18 | Huawei Technologies Co., Ltd | SMS message reading control method and terminal |
US20180054731A1 (en) * | 2015-03-27 | 2018-02-22 | Huawei Technologies Co., Ltd. | SMS Message Reading Control Method and Terminal |
US10567949B2 (en) * | 2015-07-16 | 2020-02-18 | T-Mobile Usa, Inc. | MMS termination on different networks |
US20170019779A1 (en) * | 2015-07-16 | 2017-01-19 | T-Mobile U.S.A., Inc. | Mms termination on different networks |
US11265695B2 (en) | 2015-07-16 | 2022-03-01 | T-Mobile Usa, Inc. | MMS termination on different networks |
US20210076302A1 (en) * | 2018-02-14 | 2021-03-11 | Samsung Electronics Co., Ltd. | Access control method for smart card and electronic device using same |
Also Published As
Publication number | Publication date |
---|---|
WO2005034537A1 (en) | 2005-04-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070275739A1 (en) | Method and System for Authorising Short Message Service Messages | |
US11445338B1 (en) | Third party server that supports a content provider | |
EP1264413B1 (en) | Method and system for messaging across cellular networks and a public data network | |
EP0982959B1 (en) | Mobile telephone user interface for short messages | |
AU2001245497A1 (en) | Method and system for messaging across cellular networks and a public data network | |
CN1988696B (en) | Method for transmitting and receiving messages using a mobile communication terminal | |
EP1672936B1 (en) | Prevention of unsolicited messages | |
US8014757B1 (en) | System and method for anonymous exchange of multimedia content utilizing a wireless network | |
US20080016158A1 (en) | Method for appending a signature to a size limited text message | |
US8787876B1 (en) | Parental control of mobile message content | |
US20090011737A1 (en) | Method for Charging Multimedia Message Service | |
US20040184613A1 (en) | Method of safely sending e-mails over LAN | |
KR100610901B1 (en) | Mobile communication system having filtering function of information message and method | |
CA2547294C (en) | Method and system for messaging across cellular networks and a public data network | |
KR20040052605A (en) | Method for Providing Informing Service of Electronic Document Forwarding Particulars | |
JP2010272124A (en) | Electronic mail system and electronic mail communication method | |
KR20090013280A (en) | Information processing method and apparatus of a terminal performing a message service | |
WO2008099222A1 (en) | Controlling messaging on a cellular telephone network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: THREE B TECHNOLOGIES PTY LTD, AUSTRALIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BLACKBURN, ROMILLY;PICKUP, ROBERT BARKLEY;REEL/FRAME:019294/0570 Effective date: 20070507 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |