WO2009121974A1 - Method and system for processing data messages and message chains by comparing the originating address and the destination address for a match - Google Patents

Method and system for processing data messages and message chains by comparing the originating address and the destination address for a match Download PDF

Info

Publication number
WO2009121974A1
WO2009121974A1 PCT/EP2009/054106 EP2009054106W WO2009121974A1 WO 2009121974 A1 WO2009121974 A1 WO 2009121974A1 EP 2009054106 W EP2009054106 W EP 2009054106W WO 2009121974 A1 WO2009121974 A1 WO 2009121974A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
user
data
mobile
messages
Prior art date
Application number
PCT/EP2009/054106
Other languages
French (fr)
Inventor
Eamon Hession
Original Assignee
Txtlink Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Txtlink Limited filed Critical Txtlink Limited
Publication of WO2009121974A1 publication Critical patent/WO2009121974A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/56Unified messaging, e.g. interactions between e-mail, instant messaging or converged IP messaging [CPM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • H04M1/72436User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. SMS or e-mail

Definitions

  • the present invention relates to mobile telecommunications and in particular to 5 messaging provided in a mobile telecommunications network.
  • messaging is intended to include data messaging such as SMS messaging and MMS messaging.
  • mobile messaging provides an important communication tool.
  • the ability to compose, send and receive data messages between subscribers to the mobile network is an important feature of the functionality of the mobile telecommunication network.
  • 5 As part of the transmission of a message between a sender and a recipient the message travels through components of a mobile telecommunication network.
  • the message is initially routed through the normal routing mechanisms of the mobile telecommunication network which includes components such as for example a short message switching centre SMSC and a Home Location 0 Register, HLR.
  • the specific network architecture of a mobile telecommunication network will be omitted here as it will be well known to the person skilled in the art.
  • the term mobile telecommunication network is intended to define one or more networks, be those provided by the same or different service providers.
  • a common method of communicating with a Third Party by SMS is to send a pre-defined keyword in an SMS message to a short-code.
  • This short-code is hosted by mobile operators who forward on the message to the Service Provider who is registered to us the short code.
  • the service provider receives the message and analyses the text to identify the keyword. Actions can be performed as determined by the keyword at the start of the message.
  • third party service providers to provide services to users of data messages such as the facility for a single user to send multiple message to a group of parties (1 :N messaging) or indeed for a group of users to send a thread of message between themselves in a chat environment (N:N Messaging).
  • This typically requires each of the users to transmit the specifics of their messages to a third party service provider using the destination address of the third party service provider, in the form of for example a short code or the like.
  • the conventional routers treat these messages in the same way as any other two party communication and route based on the destination address associated with the data message.
  • the body of the message is examined to ascertain what action is appropriate. This can be achieved through for example the inclusion of predefined keywords within the body of the data message. On ascertaining that these keywords are present, through comparison of the words within the body of the data message with a look up table, then the third party service provider can decide what is the appropriate action for that message. It will be understood that the use of a look up table takes time and processing capability at the computing devices of the third party.
  • WO2006040749 describes how by providing an intelligent router at the network level, that messages travelling through the network may be intercepted and routed appropriately. This is achieved by maintaining a list of subscribers to a service and examining all messages travelling through the network to ascertain if those messages originate from or are destined to subscribers to that service. This step of checking is based on comparing the MSISDN numbers or some other unique identifiers of the data message originator with a look up table and if it is ascertained that the intercepted message originates with a subscriber to the service, then invoking as appropriate a value-added service for that message.
  • this value-added service has specific meaning within the telecommunications art and includes services are supplied either in- house by the mobile network operator themselves or by a third-party value- added service provider (VASP), also known as a content provider (CP).
  • VASP value- added service provider
  • CP content provider
  • short codes are special telephone numbers, significantly shorter than full telephone numbers and which are designed to be shorter to read out and easier to remember than normal telephone numbers. While this is the intention such short codes and their operation are at the network operator level unique to each service provider. In this way the user of the short code for a particular service needs to remember the particular short code for the particular service provider. This can result in a request for service being sent to the incorrect service provider. Furthermore where a service provider wishes to provide such service there is a requirement for them to register the short code with the network operator to ensure that a user of that short code will have their message routed to that service provider.
  • a system and methodology in accordance with the teaching of the present invention which provides for the filtering of data messages based on a self referencing filter for the data messages.
  • a system and methodology employing the teaching of the present invention provides for a filtering of a larger volume of data messages to a subset on which a value-added service or appropriate other action be effected.
  • the invention provides for a filtering based on the originating and destination address of the data message. These are typically provided by the MSISDN details within the header of the mobile data message. If each are found to be identical then that message is intercepted for appropriate action. If they are not found to be identical then the message is allowed to continue in its normal fashion.
  • the filter is achieved by examining only the specifics of the data message there is no look up table comparison required. In this way more messages may be initially filtered per unit time and the processing requirement is also reduced.
  • a method of filtering data messages within a mobile telecommunication environment including the steps of: Examining the originating and destination address associated with a specific data message, On determining that each of the originating and destination address are the same, selecting that message as requiring further examination and routing that message appropriately for that further examination, and On determining that each of the originating and destination addresses are not equal allowing the message to continue within the mobile telecommunication network to the appropriate destination address.
  • the examining step may be provided on a router within the mobile telecommunication network, i.e. within the mobile operator architecture such as the SMSC or may be implemented at a third party service provider to which the data message has been routed.
  • FIG 1 which is a schematic overview of a mobile network provided in accordance with the teaching of the invention and Figure 2 which shows how first and second filters may be provided to assist in identification of messages for subsequent action.
  • Figure 3 shows an example of how chains of messages can be intercepted to allow for third party service providers to piggyback on data messages sent between two users of a mobile telecommunication network.
  • Figure 4 shows an implementation of a system in accordance with the present teaching for providing remote storage of data messages pertaining to a user.
  • Figure 5 which shows how user specific information may be pulled from the secondary datastore of Figure 4
  • Figure 6 shows in schematic form how the user specific datastore may populate other datastores or receive feeds from such datastores.
  • FIG. 1 shows in schematic form a typical data message flow in accordance with the teaching of the present invention.
  • a first user 100 composes a data message on their handset 150 and using the telephone number of the intended recipient of the message transmits (step 105) the message from their handset.
  • the message is received in the mobile telecommunication network 105 and based on the destination address is routed (step 1 15) through that network onto an appropriate handset 120 associated with the intended recipient 125. While being a highly simplified schematic it will be appreciated that this message flow is representative of how data messages are traditionally transmitted.
  • the user 150 wishes to avail of additional services available to users of data messaging they generate a message and transmit (Step 130) that message to their own number. It will be appreciated that in this scenario on arrival at the mobile telecommunication network that the originating and destination addresses are the same.
  • An intelligent router 135 provided as part of that network 100, and in accordance with the teaching of the invention, is configured to receive and examine all messages passing through the mobile telecommunication network.
  • the intelligent router 135 is configured to examine the specifics of the originating and destination addresses for all messages passing through the network and to filter those messages identified as having the same originating and destination addresses as being representative of messages requiring further attention.
  • the filtering is effecting on a self- referencing basis with no requirement to compare the specifics of the SMS to an external datastore.
  • the generation of the filter set simply requires the examination of the specifics of the message being routed through the network it can be efficiently implemented without requiring use of look up tables and the like.
  • the data message can then be taken out of the normal routing process within the mobile telecommunication network and examined for appropriate action.
  • exemplary appropriate actions could include a routing of that message to a third party service provider but specifics of this will be discussed later.
  • the intelligent router was provided as part of the mobile telecommunication network.
  • a first filter 200 is provided as part of the mobile telecommunication network 1 10 and a second filter 205 is provided as part of a third party service provider 210.
  • the first filter 200 is arranged to intercept those messages either originating or destined to a subscriber to a value -added service.
  • a message will be created by a user 150 and transmitted (Step 250) into the mobile telecommunication network 1 10. On receipt of the message within the network it is examined to see if it is of the category associated with a subscriber to a value-added service.
  • this first filter may be provided.
  • the message may be routed (Step 255) to the third party service provider 210.
  • the second filter 205 is operable in a similar fashion to that described with reference to Figure 1. Specifically this second filter is configured to compare the destination and originating addresses of the data message and to filter that message for subsequent action if the two addresses are the same.
  • the message is allowed to pass back into the mobile telecommunication network (step 260), for onward transmission (Step 265) to an intended recipient handset 120.
  • Step 260 the mobile telecommunication network
  • Step 265 the message is allowed to pass back into the mobile telecommunication network.
  • the second filter routes that message to a third filter 215 where the body of the text message is examined for keywords which are then compared against a look up table 216 to ascertain the correct appropriate action.
  • a third filter 215 where the body of the text message is examined for keywords which are then compared against a look up table 216 to ascertain the correct appropriate action.
  • the teaching of the invention can also be extended to allow a subscriber to a system provided in accordance with the teaching of the present invention to tailor these services via a web or other communication channel 220.
  • a user 150 could configure groups of other users into broadcast or chat groups to which threads of messages could be broadcast or indeed where a 1 :N message could be generated, where N is the number of users defined for a specific group.
  • Txtlink system a system provided in accordance with the teaching of the invention, which for the sake of convenience will be termed a Txtlink system.
  • a system comprises both hardware and software components and can be provided on one or more dedicated computing devices or distributed across shared resources accessed by a mobile telecommunication network and in a description of such a system there are some common terms which will now be defined to assist the reader in reviewing the following:
  • Owner - A user who has created a group is the owner of that group.
  • Target - The destination for a message. Can be a user, MSISDN or group.
  • a user starts a chat session by sending CHAT followed by a list of
  • TxtLink usemames that they want to chat with.
  • the recipients receive a message from the chat starter requesting that they reply with JOIN. Once joined, the recipients receive a message from their own number confirming their participation in a chat session. They can reply to this chat message to send a message to the chat session. Chat sessions are limited to 10 chatters and entry to a chat session is on a first come first served It will be understood that the above are examples of the type of value added service that may be invoked using a system and methodology provided in accordance with the teaching of the invention. By filtering a large volume of data messages traversing through data network based on a self referencing filter within the data message it is possible to process larger volumes of data messages without increasing server of processor capacity.
  • the user of the value added service does not also have to remember the details of the value-added service provider, as is the case when using for example SHORT CODES to provide services.
  • the specific MSISDN identifiers of those users may be kept confidential and only the Txtlink names of pseudonyms of those users embedded in the date message threads. This can allow a user to maintain their MSISDN confidential while still availing of public broadcast fora.
  • Public groups have a unique group name. No more than one user can create a group with the same group name. Users subscribe and send messages to the group by sending the group name to their own number. Public groups are only open to TxtLink users. Joining a Public group from the handset
  • TxtLink sends the unique public group name to their own number. TxtLink validates the group name and access. The user will be able to join the group, either by being invited, being in the group owners friend list, or if the group is open. On joining the group, the user is sent back the group welcome message if one has been created. If no welcome message has been created, the user receives a default welcome message.
  • TxtLink intercepts the message and distributes to all other members of the group. Those who sent the message receive of the copy of the message back to themselves.
  • Members of a Public group can leave the group at any time by sending STOP followed by the unique public group name to their own number. They will receive a final message confirming that they have left the group.
  • Public chats allow TxtLink members to take part in chat without revealing their MSISDN by only sending and receiving to and from their own number.
  • the user sends the keyword CHAT followed by a list of TxtLink user names that they want to chat with.
  • the teaching of applications of a self referencing filter that is used to select specific data messages within a mobile telecommunication network has been described with reference to a single message, i.e. the originating message that is the call to action is a message sent to self by the originating requestor of the service.
  • the teaching of the present invention can also be used to for chains of messages between senders and recipients within the network.
  • a simple chain is a single message that is sent by a sender to himself.
  • a more complicated chain is a message that is sent by a sender to another recipient, the other recipient then sending a reply to the sender, such that there are two messages in the chain.
  • the filtering of messages within the normal data message traffic to select a sub-set of the messages traversing the network for subsequent action can be done by effecting a filter that is self referencing-.
  • An example of this can be considered as following the steps of: a. Determining the originating address of a first message in the chain; b. Determining the destination address of a final message in the chain; c. Comparing the originating address and destination for a match; d. Processing the message chain based on determination of a match.
  • FIG 3 shows in schematic form a typical data message flow in accordance with this embodiment of the teaching of the present invention.
  • the same reference numerals are used for similar entities or components to what was described previously with reference to Figures 1 and 2.
  • a user composes a data message on their handset 100 and using the telephone number of the intended recipient of the message transmits the message from their handset.
  • the message is routed (Step 300) through the normal routing mechanisms of the mobile telecommunication network such as for example the use of a short message switching centre SMSC, 105.
  • an intercept module 1 10 Provided as part of the mobile telecommunication operator infrastructure is an intercept module 1 10 such as was described previously. Based on the specific details of the message- be that the content and/or the sender or recipient details, the message is identified as being of the type that should be routed to a third party service provider 1 15.
  • the message On determining that the message should be routed to the third party service provider 1 15, it is routed 305 to that third party.
  • the message is modified to include additional text or data content as appropriate.
  • the length of data messages is restricted to a predefined number of characters. However typical usage of data messaging does not use all available characters. Therefore, depending on the capacity remaining within the message for additional text and/or data content to be inserted, then such text and/or data appropriate to the capacity remaining in the message will be inserted.
  • the ultimate recipient 120 receives the data message in the usual fashion. From their perspective there is nothing different in this data message than other data messages, the sender ID (related to the mobile telecommunication telephone number of the sender) is displayed as part of the message.
  • the content of the message is as input by the sender. However, in accordance with the teaching of this embodiment of the present invention the message will contain in addition, the content as inserted by the third party service provider. This content may be in the form of a display of information or indeed may be a call to action whereby the recipient of the data message is invited to engage further.
  • Such calls to action are familiar to users of mobile networks. For example, it is not unusual for a mobile operator or third party service provider to independently push information to the subscribers of particular networks. On receipt of the pushed data, the recipient would simply reply with a keyword such as "GET" or "SEND” or the like within the content of their reply to the third party service provider.
  • a keyword such as "GET” or "SEND” or the like within the content of their reply to the third party service provider.
  • the data from the third party is embedded within the data message of another sender, a person who the recipient has personal contact with and who is typically completely independent of and oblivious to the actions of the third party service provider.
  • the recipient has a data message with content appropriate to and input by the original sender 100 of the message and content appropriate to and input by the third party service provider 1 15.
  • the user interface is a mobile handset with its limited screen format, keypad functionality and actual dimensions of the handset.
  • most data messages traffic is conducted by persons on the move, they need to be able to send and receive message quickly and efficiently with minimum interaction with the handset- as is exemplified by the popularity of predictive texting where the handset functionality is configured to determine appropriate words in the usage language from the key sequence input by the user on their keypad.
  • a recipient 120 of a data message wishes to engage with the third party service provider they simply effect a reply to the original message in an appropriate form which is detailed in the original message.
  • This may be in the form of a keyword of the like, such that the recipient would insert the keyword "GET” or the like into the body of the message before pressing the SEND button on their handset and transmitting that message 320. From their perspective, and indeed from the perspective of their handset and its SENT folder, the sent message appears to have been transmitted back to the original sender 100 of the message.
  • the interceptor module 1 10 is configured to monitor for such message with the appropriate keyword and to intercept them prior to delivery to the indicated address, the original sender 100.
  • the reason for this interception is that while the destination address is appropriate to the user 100, the message content is not, it is appropriate to the third party service provider 1 15.
  • This intercept is desirably done on a first instance by comparing the original message of the chain and the destination address of the final message of the chain- finding them to be the same and then selecting that message for further analysis.
  • the body is interrogated to evaluate the presence or otherwise of specific keywords for action by the third party. In the absence of those keywords within the body, the message is simply returned back into the network and allowed to continue in its usual fashion.
  • the present invention can also provide for intelligent selection of that data content to be of a form suitable with the context of the message.
  • the third party service provider 1 15 may be considered representative of a plurality of service providers, each differing in their service offering.
  • the third party service provider may effect a software filter analysis on the content/context of the message body. By determining for example that the message relates to a future planned excursion, the content that is inserted may be appropriate to that excursion. In this way intelligent insertion of content to the data message may be implemented with the result that as its context is appropriate to the original message, that the recipient is more likely to engage with the third party service provider on receipt of the message.
  • Figure 4 shows how an external datastore can be provided which provides for the maintenance of a secondary copy of the data message traffic generated by a user's mobile handset on a remote location which is then accessible by the user.
  • This remote location is desirably accessed via an internet connection such as via a web portal or internet site which enables the user to access their data message records without requiring access to their handset.
  • Such a secondary store could also be usefully employed to store and maintain contact lists for the user.
  • By enabling the user to send and receive messages via a web interface it is possible for the user to maintain their data message flow using the functionality of a full keyboard and in locations where handsets are not operable or allowable.
  • Such a system is implemented by intercepting messages within the mobile telecommunication network prior to their delivery to the intended handset and routing predetermined messages to this secondary store where they may be subsequently accessed by the user.
  • this external backup can be implemented by the user sending a message to self- per the technique above- which will be intercepted by the network and processed as requiring a value added service.
  • a message to self with a keyword such as INITIATE within the body of the message, the user could activate a storage of all subsequent SMS messages for that user within the secondary datastore.
  • the user could then selectively turn this functionality off by for example sending a message to self with the keyword TERMINATE to advise the third party datastore that messages should no longer be stored.
  • Figure 4 shows an example of a network architecture that may be implemented to provide such functionality. It will be appreciated that once the service is activated that it does not require send to self messages to perform and that all data traffic originating from or sent to that user could be stored.
  • the same reference numerals will be used for similar modules or components to that described before.
  • a first user composes a data message on their handset 100 and using the telephone number of the intended recipient of the message transmits the message from their handset.
  • the intended recipient is a registered user 150 of a system provided in accordance with the teaching of the present invention.
  • the user 150 has a handset 120 which has a handset specific identifier, such as a MSISDN, with which data and voice traffic can be correctly routed through a mobile telecommunication network to the handset.
  • a handset specific identifier such as a MSISDN
  • the message is initially routed (Step 400) through the normal routing mechanisms of the mobile telecommunication network 105 which includes components such as for example a short message switching centre SMSC and a Home Location Register, HLR.
  • the specific network architecture of a mobile telecommunication network will be omitted here as it will be well known to the person skilled in the art.
  • the term mobile telecommunication network is intended to define one or more networks, be those provided by the same or different service providers.
  • an intercept module 1 10 Based on the specific details of the message traversing the network 105- be that the content and/or the recipient details, the message is identified by the intercept module 1 10 as being of the type that should be intercepted. As part of this intercept the data message is routed to a remote location 1 15.
  • the remote location represents one or more servers (or clusters of servers) which may send and receive data traffic over a number of different communication protocols.
  • a user specific datastore 416 is maintained at the remote location 1 15, which may typically be a computer implemented web portal provided by a third party service provider. This datastore is typically generated at the time of the user 150 registering for use of the system and is accessible by the user through conventional internet protocols 455 such as those provided by browsers such as FirefoxTM and Internet ExplorerTM
  • the user specific datastore may include one or more record data fields such that different type of information pertinent to the user may be recorded for future review.
  • this user specific data store represents a secondary datastore location for messages that are intended for transmission to the user 150.
  • the traditional datastore for such messages is located on the user's handset 120.
  • the messages and other data stored within this secondary datastore may be independently manipulated or used and changes made on the secondary datastore will not necessarily be synchronised with the handset datastore and vice versa.
  • the data message may then be then returned 410 to the mobile network infrastructure where its path to the original recipient is continued 415 in a conventional fashion. If so implemented, then it will be appreciated that the user will have two separate copies of the same data message each being provided at a separate location.
  • the user 150 of the system receives at their handset 120 the data message in the usual fashion. From their perspective there is nothing different in this data message from other data messages that they have received. Its form and content is typically identical to that originally generated at the handset 1 10, i.e. the content of the message is as input by the sender. However, in accordance with the teaching of the invention the user 150 can read that message either at their handset 120 or via the web enabled or web interface user specific datastore 416. In this way the user can access data messages in locations where handset operation is not possible. Furthermore if their handset is misplaced or broken they have not lost all their data messages in that the user specific datastore provides a master record of all data messages that were transmitted to that user over the network.
  • the message received by the user 150 is exactly the same as that generated at the handset 100, it is also possible for the third party operator of the user specific datastore to embed additional data into the data message prior to releasing the message back into the conventional messaging systems of the mobile telecommunications network.
  • the additional content may be in the form of a display of information or indeed may be a call to action whereby the recipient of the data message is invited to engage further.
  • this additional content is desirably introduced at the third party provider 1 15 at the time of copying the message into the user specific datastore 416.
  • the modification may be such as to include additional text or data content as appropriate. It will be understood that the length of data messages is restricted to a predefined number of characters. However typical usage of data messaging does not use all available characters. Therefore, depending on the capacity remaining within the message for additional text and/or data content to be inserted, then such text and/or data appropriate to the capacity remaining in the message will be inserted.
  • both the versions of the message at the handset and that at the user specific datastore will include the additional information whereas if the content is inserted subsequent to the storage at the user specific datastore 416, that the versions at each of the user specific datastore and the handset will be somewhat different.
  • the user By providing for a copy of all messages sent to a registered user of the system to be stored at two locations, the user is provided with two separate and independent interface locations to their data messages. They can use the traditional handset 120 for when they are on the move and when in a more permanent location can access the user specific datastore 416. As the user specific datastore will typically not suffer from the same memory or storage limitation of the handset is it possible that they could maintain a master record of multiple messages on the user specific datastore while trimming the messages stored on the handset to a more manageable level. As the interface to the user specific datastore 416 is typically via a conventional internet connection such as that using a computer, keyboard and screen, the advantages of this improved interface can be utilised to enable a user to manage their messages.
  • a system provided in accordance with the teaching of the invention may be operable to effect storage of additional information from the handset.
  • Such information could include contact lists and the like.
  • the transfer of such information to a computer or remote server from a handset is well known and it is not intended to limit the present invention to any one specific manner.
  • what is provided by the present invention is a capacity to update such contact lists stored at the remote server by extracting the sender details 100 from a received message at the third party service provider and updating the contact list with those additional details at the same time as storing the copy of the message.
  • the contact list stored and maintained at the handset typically includes the names associated with individual numbers.
  • the extracted numbers could be presented to the user in a number of different fashions.
  • One possible example is a list of most recently received data messages and their originating number.
  • the details of the incoming message could be compared with the details already stored on the contact list and if a match is made, then the number is associated with that name and displayed with the contact name reference.
  • the number could be displayed as the simple number and the user prompted when they next log onto the user specific datastore 416 to update their records to associate that number with a contact.
  • the third party service provider 1 15 could also be configured to compare the incoming extracted number with other numbers stored in separate and distinct user specific datastores, and if a match is found to then use those details to populate the user specific datastore 416.
  • the teaching of the invention may also be modified to enable storage of all or some of the data messages generated by the user 150 at their handset 120.
  • the user specific datastore 416 will not only provide an independent record of the incoming messages to a registered user but may also store some or all of outgoing messages.
  • a data message may be generated at the handset 120 and then transmitted 400 into the mobile telecommunication network 105.
  • the interface module 1 10 may be configured to copy all outgoing messages from the registered user to the user specific datastore 416. This may be achieved by, on detecting a message that should be intercepted, of routing that message 425 to the third party service provided 1 15 where a copy may be added to the user specific datastore 416. Once copied, then the original message flow may be continued by returning 430 the message to the mobile telecommunication network where it continues, in the usual fashion to the ultimate recipient.
  • the copying of outgoing messages from a user handset 120 may be effected by either having the intercept module 1 10 effect a routing of all messages originating from the registered handset 120 to the third party 1 15 or alternatively by availing of inserted keywords into the message.
  • the user 150 may not desire all outgoing messages to be stored on the remote user specific datastore 416. Instead they may wish to flag certain messages as warranting storage, this flag being effected by inserting a predetermined keyword such as "LOG" at a specific point within their drafted data message, or by sending the message to self with the keyword inserted as was discussed above.
  • a predetermined keyword such as "LOG"
  • the interceptor module 1 10 is configured to monitor for messages with the appropriate keywords and/or identifier parameters and to intercept them prior to delivery. It will be appreciated that while Figure 4 shows the functionality of the intercept module 1 10 as residing wholly on the mobile telecommunication network but it will be understood that the teaching of the invention should not be construed so limited.
  • the intercept module 1 10 may include a number of different elements or sub-modules some of which could reside on the telecommunications network and some on the third party service provider.
  • the portion residing on the telecommunications network could simply provide for a re-direction of all messages intended for identified recipients to the third party service provider where they would then be sorted and copied as appropriate.
  • the intercept module could provide for the copying of the data message within the telecommunications network such that on transmission of a copy of the intercepted message to the third party service provider, the message is simultaneously allowed to continue within the telecommunications network to its intended original handset address.
  • a third party service provider may maintain a secondary storage of messages routed through a mobile telecommunication network for a user. These messages may then be accessed by the user via a different communication channel to their traditional interface with data messages.
  • This enables alternative mechanisms for managing their data messages but also and more importantly allows them to access data messages without requiring access to their handset.
  • the user specific datastore is not limited by the memory capacity limitation of handsets, it can provide for storage of many more messages than possible on the handset such that on accessing the user specific datastore 1 16, the user has a better historical perspective of their data messaging traffic
  • the system of the present invention may be further expanded to provide for additional functionality.
  • An example of this is shown in Figure 5 where the same reference numerals are used for the same elements or components.
  • An example of the distribution of this information as part of a pull function will now be described with reference to an exemplary birthday request. If the user 150 has registered and recorded their birthday details on the user specific datastore 416, such details may be distributed on request by the third party service provider 1 15 to nominated parties.
  • An example of this is where for example a person 100 on the user contact list whose profile has been approved for pulling information sends a data message to the user handset 120 with the keyword "BIRTHDAY" (Step 500).
  • the intercept module 1 10 On receipt of this message within the telecommunications network, the intercept module 1 10 is configured to compare this keyword with pre-recorded keywords and with the intended recipient details and route the message directly to the third party service provider 1 15 (Step 505).
  • a data extraction module 550 extracts the birthday details from the appropriate user specific datastore 416 and embeds these details into a message for transmission back to the requester 100. Once embedded the message is routed through from the service provider 1 15 to the mobile network (Step 510) and then back to the requester (Step 515).
  • the original intended message recipient 120 never receives the original request so they are therefore not troubled with the request.
  • birthday is only an example and that any user specific information such as for example, address, title, other contact information, etc could be predefined as being allowable for transmission to requesters without requiring user authorisation at the request time.
  • the specifics of the information that may be requested will depend on the pre-association of keywords with the actual data type and this can be effected by the user during their interface 555 with the third party service provider 1 15.
  • Figure 6 shows a further modification to such an arrangement whereby the user specific datastore 416 may be used to receive information feeds from or direct information feeds to other datastores.
  • datastores include HLR records 601 that provide an indication of the location of the handset of the user.
  • HLR records 601 that provide an indication of the location of the handset of the user.
  • the HLR records provided indicative locations of the user 150.
  • authorised third parties could then request information as to the location of the user and that information could be returned to the requester without requiring interaction by the user 150.
  • This could be particularly advantageous in the case of parental monitoring of location of their children and does not require an opening of the HLR records directly to interrogation requests. In this way the load of managing these requests is diverted to the third party service provider.
  • the user specific datastore 416 could provide feeds to and receive feeds back from third parties 650a, 650b who maintain other datastores 651 a, 651 b that include information pertaining to a user or members of that users defined groups. This could be used for example to enable an update of contact information within the contact store of the user specific datastore or indeed to push out further copies of the data messages to other datastores for example those on which social networking sites such as FACEBOOKTM and the like are maintained.
  • While the management of the user specific datastore 416 has been described with reference to the user 150 directly accessing the data, it is possible within the teaching of the present invention for the user to also effect changes in the operation of the system directly from their handset 120.
  • send to self messages with keywords within the body of those data messages that have already been associated with an action or rule at the third party service provider 1 15 it is possible for the user to initiate or terminate certain actions.
  • Such control could typically be implemented by sending a data message with a specific keyword embedded therein to their own number.
  • the intercept module 1 10 directs the message to the third party 1 15 where the data message is interrogated and the appropriate functionality performed. This could for example be the establishment of an out of contact notification.
  • the system allows for the interception of message flows between the two users to a third party service provider where appropriate data may be extracted and copied into a user specific datastore for subsequent interrogation by the user.
  • the invention also provides for the pulling of user specific information using conventional mobile data messages but not requiring the user to authorise the pulling at the time of the request. From the perspective of the users of the system they are simply using the system as they have traditionally done.
  • a system in accordance with the present teaching offers a way of turning their mobile phone into a powerful social networking tool by enabling their own number as a central contact point for more than just voice and text.
  • a subscribers' number becomes a hub for group messages, alerts and user profiles, along with a unique, many-to-many, SMS based instant-messaging system that doesn't require anyone to remember short-codes, or require users to remember keywords once they are chatting.
  • a subscriber can use their own mobile number as if it were a shortcode, allowing friends, colleagues and clients to sign up to receive user's broadcasts or group messages, access profile information, or receive automated responses to an SMS.
  • a user of a system in accordance with the present teaching can use their mobile number to interact with other users by using a system defined usemame and sending a keyword, followed by a usemame to themselves. In this way, a subscriber's own number becomes a replacement for a shortcode not only for other people, but for the user as well.
  • Groups may be defined and allow a subscriber to host a group that is either open to all or invite only.
  • Group hosts can send to other group members simply by sending for example the keyword GROUP followed a message to their own mobile number.
  • Group members can send to others by sending GROUP and their message to the host's mobile number.
  • the TxtLink system may be configured to the message and distribute the message text to the other group members.
  • Joining a TxtLink subscribers' group is as simple as sending the keyword GROUP on its own to the subscriber's mobile number.
  • TxtLink Alerts allows a subscriber to host an information service, with their own number acting as a substitute for short-codes.
  • Teen can sign up to a user's alerts by sending ALERT to their mobile number.
  • the TxtLink subscriber now has a powerful tool for passing information to a large number of recipients by sending the keyword ALERT, followed by their message, to their own number.
  • system may be configured to allow two or more users to provide a unique instant-messaging tool that allows users to start a chat session with other TxtLink subscribers by sending CHAT to other TxtLink member's mobile numbers.
  • Multiple subscribers can be in the same chat session at the same time and once chatting, sending a message to everyone else is simply a case of sending your message to your own number - no need to remember any keywords or short-codes.
  • TxtLink subscribers will also have access to all of their SMS traffic, both inbound and outbound, from a web interface that can be accessed anywhere in the world.
  • the interface can be used for viewing and storing inbound messages as well as composing and sending SMS, all using the subscribers normal mobile number.
  • Sent and received messages from a subscriber's handset are automatically stored in a secure data store and accessible from the web interface without any user intervention.
  • TxtLink offers a unique permission-based channel for delivering highly relevant and targeted advertising discretely into the inbound SMS stream without adversely affecting a consumer's user experience.
  • TxtLink provides multi-dimensional targeting capabilities allowing an advertiser to select advertisements for delivery based on subscriber profile information, time of day, and message context.
  • Each SMS advertisement includes a call-to-action that the consumer can respond to as easily as replying to a received SMS and including a keyword in the response.
  • a TxtLink system such as that provided in accordance with the present teaching will intercept the keyword and deliver a response, such as an SMS coupon or a link to a mobile site.
  • TxtLink Alerts allow a TxtLink user to host a one-to-many information service using their own mobile number as a replacement to a shortcode. People can opt-in to a TxtLink Alerts by sending the keyword ALERT to the user's mobile number. When a TxtLink user sends the keyword ALERT followed by some message text to their own number, the message is sent to all those who are following the user's alerts. The message arrives on the other mobile handsets with the originating number of the alert owner, rather than a short-code. To stop receiving TxtLink Alerts, people simple send STOP ALERT to the TxtLink user's mobile number.
  • TxtLink This removes them from the Alerts list, and following a confirmation, they will not receive further alerts from the TxtLink user.
  • TxtLink usemame For one TxtLink user to join another TxtLink user's Alerts, rather than sending to the other's mobile number, they can send ALERT, followed by the other's usemame, to their own number. TxtLink will intercept this message- to-self, look up the usemame, and add a subscription to the other's TxtLink Alerts list.
  • TxtLink Alerts A typical example of using TxtLink Alerts follows.
  • a TxtLink user enables Alerts by sending themselves a text message with the text "ALERTS ON".
  • the TxtLink platform will intercept the message and enable Alerts for that user.
  • SMS Short message service

Abstract

A system and method which enables an efficient filtering of data messages transmitted within a mobile telecommunication network is described. A mobile user 150 may request a service from a service provider 210 by sending as SMS message comprising one or more keywords to his own handset number. The message is intercepted and routed to the service provider. In an embodiment, the service may be a message backup service. In one embodiment, a message from a first user to a second user is intercepted and routed to the service provider, which adds text to the message and forwards it to the second user. If the second user sends a reply to the modified message including one or more keywords back to the first user (message chain), the reply is intercepted, interpreted as a service request and routed to the service provider.

Description

Title
METHOD AND SYSTEM FOR PROCESSING DATA MESSAGES AND MESSAGE CHAINS BY COMPARING THE ORIGINATING ADDRESS AND THE DESTINATION ADDRESS FOR A MATCH
Field of the Invention
The present invention relates to mobile telecommunications and in particular to 5 messaging provided in a mobile telecommunications network. Within the context of the present invention messaging is intended to include data messaging such as SMS messaging and MMS messaging.
Background 0 Within mobile telecommunication networks, mobile messaging provides an important communication tool. The ability to compose, send and receive data messages between subscribers to the mobile network is an important feature of the functionality of the mobile telecommunication network. 5 As part of the transmission of a message between a sender and a recipient the message travels through components of a mobile telecommunication network. The message is initially routed through the normal routing mechanisms of the mobile telecommunication network which includes components such as for example a short message switching centre SMSC and a Home Location 0 Register, HLR. The specific network architecture of a mobile telecommunication network will be omitted here as it will be well known to the person skilled in the art. The term mobile telecommunication network is intended to define one or more networks, be those provided by the same or different service providers. 5 A common method of communicating with a Third Party by SMS is to send a pre-defined keyword in an SMS message to a short-code. This short-code is hosted by mobile operators who forward on the message to the Service Provider who is registered to us the short code. The service provider receives the message and analyses the text to identify the keyword. Actions can be performed as determined by the keyword at the start of the message.
It is also known for third party service providers to provide services to users of data messages such as the facility for a single user to send multiple message to a group of parties (1 :N messaging) or indeed for a group of users to send a thread of message between themselves in a chat environment (N:N Messaging). This typically requires each of the users to transmit the specifics of their messages to a third party service provider using the destination address of the third party service provider, in the form of for example a short code or the like. Within the telecommunication network, the conventional routers treat these messages in the same way as any other two party communication and route based on the destination address associated with the data message.
Once the messages are received at the third party service provider, the body of the message is examined to ascertain what action is appropriate. This can be achieved through for example the inclusion of predefined keywords within the body of the data message. On ascertaining that these keywords are present, through comparison of the words within the body of the data message with a look up table, then the third party service provider can decide what is the appropriate action for that message. It will be understood that the use of a look up table takes time and processing capability at the computing devices of the third party.
It is also known to provide intelligent routing on a mobile telecommunication network. An example of such an arrangement is for example disclosed in WO2006040749 which describes how by providing an intelligent router at the network level, that messages travelling through the network may be intercepted and routed appropriately. This is achieved by maintaining a list of subscribers to a service and examining all messages travelling through the network to ascertain if those messages originate from or are destined to subscribers to that service. This step of checking is based on comparing the MSISDN numbers or some other unique identifiers of the data message originator with a look up table and if it is ascertained that the intercepted message originates with a subscriber to the service, then invoking as appropriate a value-added service for that message. The nature of this value-added service has specific meaning within the telecommunications art and includes services are supplied either in- house by the mobile network operator themselves or by a third-party value- added service provider (VASP), also known as a content provider (CP). This comparison is provided to filter from the total volume of messages traversing through the mobile telecommunication network, an appropriate subset for which value-added services may be required. While this is achieved transparently at the network level it still requires comparison of the message with a look up table which can take time and processing resources at the network level.
In today's mobile telecommunication network there are a large number of data messages transported between senders and recipients. For example Verizon Wireless estimated that on New Year's Eve 2007 that 300 million text messages were handled by their network. To ensure that each of these messages are timely processed and routed to the intended recipient it is imperative that the processing of these messages within the network is done in an efficient manner. Where individual messages require additional functionality it is important that the identification of those messages does not unduly burden the network or delay the transmission of the message.
There is another problem with today's mobile telecommunication networks and their provision of value added services to data message users. As was mentioned above, typically a subscriber to such services uses short codes which are special telephone numbers, significantly shorter than full telephone numbers and which are designed to be shorter to read out and easier to remember than normal telephone numbers. While this is the intention such short codes and their operation are at the network operator level unique to each service provider. In this way the user of the short code for a particular service needs to remember the particular short code for the particular service provider. This can result in a request for service being sent to the incorrect service provider. Furthermore where a service provider wishes to provide such service there is a requirement for them to register the short code with the network operator to ensure that a user of that short code will have their message routed to that service provider.
As users of the network are becoming more and more familiar with the concept of data messaging, the usage of data messaging is becoming the norm and it is not unusual for threads of messages to be developed between users or groups of users. It is also not unusual for a user to establish groups within their contact information such that a single drafted data message can be distributed to multiple persons at the same time by sending it to a group. In this way, it is known for users to send data messages directly to other users, i.e. a 1 :1 communication, it is also known to enable multiple users to participate in the same messaging transfer-sometimes referred to as mobile chat or group messages having a N:N message transfer or 1 :N message transfer (where N is representative of a plurality of numbers. To date this is traditionally achieved through use of dedicated third party numbers such as short codes. There is therefore a need to enable users to generate and participate in N:N and 1 :N message transfer without requiring such dedicated short codes or the like.
There is therefore a need for a system and methodology that can be used to filter messages traversing a mobile telecommunication network that does not require a use of a look up table. There is a further need for a system and methodology that can obviate the need for dedicated short codes in provision of value added services in data messaging.
Summary
These and other problems are addressed by a system and methodology in accordance with the teaching of the present invention which provides for the filtering of data messages based on a self referencing filter for the data messages. By examining the characteristics of the specific data message a system and methodology employing the teaching of the present invention provides for a filtering of a larger volume of data messages to a subset on which a value-added service or appropriate other action be effected. In a preferred arrangement the invention provides for a filtering based on the originating and destination address of the data message. These are typically provided by the MSISDN details within the header of the mobile data message. If each are found to be identical then that message is intercepted for appropriate action. If they are not found to be identical then the message is allowed to continue in its normal fashion. As the filter is achieved by examining only the specifics of the data message there is no look up table comparison required. In this way more messages may be initially filtered per unit time and the processing requirement is also reduced.
Once a subset of messages on which action is required is identified then appropriate additional filtering may be effected. This may be achieved through for example examination of the body of the message to ascertain if there are any keywords embedded therein and the comparison of those keywords with pre-assigned keywords in a look up table to identify what action is to be effected. As the message has already been identified as being a message on which action is required, as opposed to a message that is simply traversing the network between two parties in the conventional sense, there is no requirement for this second filtering to be implemented as efficiently as heretofore necessitated. It is possible therefore to provide these additional services using less powerful processors than heretofore required.
Accordingly a method of filtering data messages within a mobile telecommunication environment is provided the method including the steps of: Examining the originating and destination address associated with a specific data message, On determining that each of the originating and destination address are the same, selecting that message as requiring further examination and routing that message appropriately for that further examination, and On determining that each of the originating and destination addresses are not equal allowing the message to continue within the mobile telecommunication network to the appropriate destination address.
Within such a method the examining step may be provided on a router within the mobile telecommunication network, i.e. within the mobile operator architecture such as the SMSC or may be implemented at a third party service provider to which the data message has been routed.
These and other features will be understood with reference to the following drawings which provides an overview of a methodology implemented in accordance with the teaching of the present invention.
Brief Description Of The Drawings
The present invention will now be described with reference to
Figure 1 which is a schematic overview of a mobile network provided in accordance with the teaching of the invention and Figure 2 which shows how first and second filters may be provided to assist in identification of messages for subsequent action.
Figure 3 shows an example of how chains of messages can be intercepted to allow for third party service providers to piggyback on data messages sent between two users of a mobile telecommunication network.
Figure 4 shows an implementation of a system in accordance with the present teaching for providing remote storage of data messages pertaining to a user. Figure 5 which shows how user specific information may be pulled from the secondary datastore of Figure 4 Figure 6 shows in schematic form how the user specific datastore may populate other datastores or receive feeds from such datastores.
Detailed Description Of The Drawings
Figure 1 shows in schematic form a typical data message flow in accordance with the teaching of the present invention.
In a conventional transmission of a data message, a first user 100 composes a data message on their handset 150 and using the telephone number of the intended recipient of the message transmits (step 105) the message from their handset. The message is received in the mobile telecommunication network 105 and based on the destination address is routed (step 1 15) through that network onto an appropriate handset 120 associated with the intended recipient 125. While being a highly simplified schematic it will be appreciated that this message flow is representative of how data messages are traditionally transmitted. In accordance with the teaching of the invention when the user 150 wishes to avail of additional services available to users of data messaging they generate a message and transmit (Step 130) that message to their own number. It will be appreciated that in this scenario on arrival at the mobile telecommunication network that the originating and destination addresses are the same. An intelligent router 135 provided as part of that network 100, and in accordance with the teaching of the invention, is configured to receive and examine all messages passing through the mobile telecommunication network. The intelligent router 135 is configured to examine the specifics of the originating and destination addresses for all messages passing through the network and to filter those messages identified as having the same originating and destination addresses as being representative of messages requiring further attention. It will be appreciated that as the destination and originating address are both provided as part of the SMS or MMS data message, typically in a header portion of the SMS, that the filtering is effecting on a self- referencing basis with no requirement to compare the specifics of the SMS to an external datastore. As the generation of the filter set simply requires the examination of the specifics of the message being routed through the network it can be efficiently implemented without requiring use of look up tables and the like.
Once selected as being a filtered message the data message can then be taken out of the normal routing process within the mobile telecommunication network and examined for appropriate action. Exemplary appropriate actions could include a routing of that message to a third party service provider but specifics of this will be discussed later.
In the context of Figure 1 , the intelligent router was provided as part of the mobile telecommunication network. In an alternative arrangement shown in Figure 2, a first filter 200 is provided as part of the mobile telecommunication network 1 10 and a second filter 205 is provided as part of a third party service provider 210. Typically in such an implementation the first filter 200 is arranged to intercept those messages either originating or destined to a subscriber to a value -added service. A message will be created by a user 150 and transmitted (Step 250) into the mobile telecommunication network 1 10. On receipt of the message within the network it is examined to see if it is of the category associated with a subscriber to a value-added service. This will typically require use of a look up table to compare the details of the specific messages to a list of subscribers to the value-added service. An example of how this first filter may be provided is described in WO2006040749. Once filtered or intercepted then the message may be routed (Step 255) to the third party service provider 210. On receipt of that message at the third party service provider 210, the second filter 205 is operable in a similar fashion to that described with reference to Figure 1. Specifically this second filter is configured to compare the destination and originating addresses of the data message and to filter that message for subsequent action if the two addresses are the same. If they are not the same then the message is allowed to pass back into the mobile telecommunication network (step 260), for onward transmission (Step 265) to an intended recipient handset 120. In this way it will be appreciated that while being a subscriber to a value-added service that a user can still communicate with other users using data messaging in a traditional manner.
If the message comparison effected at the second filter does determine that the message is a request or is a part of a value-added service, i.e. the originating and destination addresses are identical, then the second filter routes that message to a third filter 215 where the body of the text message is examined for keywords which are then compared against a look up table 216 to ascertain the correct appropriate action. In this way it will be appreciated that there is no requirement to fully examine the body of the data message until a decision has been made that this message is of the type that does require application of a value-added service. The filtering that has been done on all messages prior to the third filter examination is efficiently based on the header information of the data message and in this way can be done on a high volume of data messages passing through the network without delay.
The use of keywords to request services is well documented in the field of mobile data messaging and any one of the known services or applications could be implemented within the context of the teaching of the present invention.
It will be appreciated that using the ability to generate value-added services simply by using self referencing of the SMS message for example by sending a data message to oneself that the teaching of the present invention provides for provision of a plurality of services in a seamless fashion.
The teaching of the invention can also be extended to allow a subscriber to a system provided in accordance with the teaching of the present invention to tailor these services via a web or other communication channel 220. In this way a user 150 could configure groups of other users into broadcast or chat groups to which threads of messages could be broadcast or indeed where a 1 :N message could be generated, where N is the number of users defined for a specific group.
Exemplary uses or applications will now be described with reference to an exemplary implementation of a system provided in accordance with the teaching of the invention, which for the sake of convenience will be termed a Txtlink system. Such a system comprises both hardware and software components and can be provided on one or more dedicated computing devices or distributed across shared resources accessed by a mobile telecommunication network and in a description of such a system there are some common terms which will now be defined to assist the reader in reviewing the following:
User - Someone subscribed to the TxtLink system.
User Name - Unique TxtLink user or screen name.
Owner - A user who has created a group is the owner of that group.
Target - The destination for a message. Can be a user, MSISDN or group.
Recipient - Receiver of any messages sent by other users. Member - A user or non-user who belongs to either a user's group or a user's chat session.
Friends - Default group that all TxtLink users have used to grant special access levels to certain users.
Open membership- Either a Broadcast or Discussion group where anyone can join.
Friends only membership - Either a Broadcast or Discussion group where only members of the group owner's Friends group can join.
Invite only membership - Either a Broadcast or Discussion group where only those who have been sent an Invite by the group owner can join. Live Chat - Chat room functionality available to all users. Users send "CHAT
<target> <target>..." . If the target has enabled Chat for the user, they will be asked to join a chat session with that user.
Chat Starter - User who sends out CHAT followed by a list of TxtLink names.
Invites - Pre-formatted messages sent to recipients, used to promote a group or chat session. Can also trigger other actions when sent, such as including recipients in a manual membership Discussion with Pending membership or enabling chat access for a recipient.
A user (chat starter) starts a chat session by sending CHAT followed by a list of
TxtLink usemames that they want to chat with. The recipients receive a message from the chat starter requesting that they reply with JOIN. Once joined, the recipients receive a message from their own number confirming their participation in a chat session. They can reply to this chat message to send a message to the chat session. Chat sessions are limited to 10 chatters and entry to a chat session is on a first come first served It will be understood that the above are examples of the type of value added service that may be invoked using a system and methodology provided in accordance with the teaching of the invention. By filtering a large volume of data messages traversing through data network based on a self referencing filter within the data message it is possible to process larger volumes of data messages without increasing server of processor capacity. As the request for a value added service is invoked by sending a message to oneself, the user of the value added service does not also have to remember the details of the value-added service provider, as is the case when using for example SHORT CODES to provide services. Furthermore in the scenario where multiple users receive and transmit messages in for example an Alert message, the specific MSISDN identifiers of those users may be kept confidential and only the Txtlink names of pseudonyms of those users embedded in the date message threads. This can allow a user to maintain their MSISDN confidential while still availing of public broadcast fora.
It is also possible within the context of the teaching of the present invention to provide for public broadcast groups. Heretofore such groups were difficult to provide within the context of data messaging but using the teaching of the present invention it is possible to provide such groups to multiple parties who can elect to join or leave the group at any time, their participation being controlled by them. Public group definition:
A Group that has been marked Public. Public groups have a unique group name. No more than one user can create a group with the same group name. Users subscribe and send messages to the group by sending the group name to their own number. Public groups are only open to TxtLink users. Joining a Public group from the handset
A TxtLink user sends the unique public group name to their own number. TxtLink validates the group name and access. The user will be able to join the group, either by being invited, being in the group owners friend list, or if the group is open. On joining the group, the user is sent back the group welcome message if one has been created. If no welcome message has been created, the user receives a default welcome message.
Sending messages to a Public group from the handset as the group owner or group member
Members of a Public group send messages to the group by sending the group name followed by the message text to their own number. TxtLink intercepts the message and distributes to all other members of the group. Those who sent the message receive of the copy of the message back to themselves.
Leaving a Public group from the handsets as a group member
Members of a Public group can leave the group at any time by sending STOP followed by the unique public group name to their own number. They will receive a final message confirming that they have left the group.
Public Chats Public chats allow TxtLink members to take part in chat without revealing their MSISDN by only sending and receiving to and from their own number. When initiating a chat, the user sends the keyword CHAT followed by a list of TxtLink user names that they want to chat with.
They send this keyword to their own number. Each user listed after the Chat keyword receives a message from their own number, not the senders, asking them to send JOIN followed by the sender's user name to their own number. Any messages sent and received during a chat session are sent to the user's own number and at no point is a user's MSISDN revealed to other users.
Heretofore the teaching of applications of a self referencing filter that is used to select specific data messages within a mobile telecommunication network has been described with reference to a single message, i.e. the originating message that is the call to action is a message sent to self by the originating requestor of the service. The teaching of the present invention can also be used to for chains of messages between senders and recipients within the network. A simple chain is a single message that is sent by a sender to himself. A more complicated chain is a message that is sent by a sender to another recipient, the other recipient then sending a reply to the sender, such that there are two messages in the chain. Using the teaching of the present invention, the filtering of messages within the normal data message traffic to select a sub-set of the messages traversing the network for subsequent action can be done by effecting a filter that is self referencing-. An example of this can be considered as following the steps of: a. Determining the originating address of a first message in the chain; b. Determining the destination address of a final message in the chain; c. Comparing the originating address and destination for a match; d. Processing the message chain based on determination of a match. It will be appreciated that as the comparison is based on the individual characteristics of the message as opposed to the use of an external look-up table that it is possible to filter and select these messages more efficiently than examining the body of a message for specific target keywords and comparing those keywords to an external look up table of those keywords.
Message insert
An example of how this use of self-referencing filters may be used in chains of more than one message will now be described. In this embodiment, on filtering a specific data message out of the plurality of data message traversing the data network it is possible to provide for the insertion of data by a third party into messages between two users of a mobile network and enable the subsequent communication with the third party by the recipient of the data message by effecting a simple reply to the original data message. In this way the present invention obviates the necessity for the recipient to create a new message, ascertain the contact number for the third party service provider and compose the new message through interaction with their mobile handset.
Figure 3 shows in schematic form a typical data message flow in accordance with this embodiment of the teaching of the present invention. The same reference numerals are used for similar entities or components to what was described previously with reference to Figures 1 and 2.
A user composes a data message on their handset 100 and using the telephone number of the intended recipient of the message transmits the message from their handset. The message is routed (Step 300) through the normal routing mechanisms of the mobile telecommunication network such as for example the use of a short message switching centre SMSC, 105. Provided as part of the mobile telecommunication operator infrastructure is an intercept module 1 10 such as was described previously. Based on the specific details of the message- be that the content and/or the sender or recipient details, the message is identified as being of the type that should be routed to a third party service provider 1 15. It will be appreciated that the aforementioned sequence is most preferably followed in the scenario that both sender and recipient are TxtLink subscribers, Le have their details pre-registered with a system in accordance with the present teaching. In the scenario where a non-Txtl_ink subscriber sends a message to a TxtLink subscriber from a network that is not TxtLink enabled, the additional text may be inserted at the recipient end. No intercept is required at the sender end.
On determining that the message should be routed to the third party service provider 1 15, it is routed 305 to that third party. At the service provider 1 15 the message is modified to include additional text or data content as appropriate. It will be understood that the length of data messages is restricted to a predefined number of characters. However typical usage of data messaging does not use all available characters. Therefore, depending on the capacity remaining within the message for additional text and/or data content to be inserted, then such text and/or data appropriate to the capacity remaining in the message will be inserted. It should be noted that, should sufficient capacity not remain for the desired additional text or data content to be inserted, then it is also possible to create an additional message or series of messages, and to 'concatenate' these into one 'long message' thus that the recipient receives just one 'long' message (or should this concatenation not be possible, then a series of messages) containing the original message from the sender combined with the additional text and/or data content that has been inserted by the third party service provider. On determination of the appropriate content for insertion into the data message and insertion of that content into the data message, the data message is returned 310 to the mobile network infrastructure where its path to the original recipient is continued 315.
The ultimate recipient 120 receives the data message in the usual fashion. From their perspective there is nothing different in this data message than other data messages, the sender ID (related to the mobile telecommunication telephone number of the sender) is displayed as part of the message. The content of the message is as input by the sender. However, in accordance with the teaching of this embodiment of the present invention the message will contain in addition, the content as inserted by the third party service provider. This content may be in the form of a display of information or indeed may be a call to action whereby the recipient of the data message is invited to engage further.
Such calls to action are familiar to users of mobile networks. For example, it is not unusual for a mobile operator or third party service provider to independently push information to the subscribers of particular networks. On receipt of the pushed data, the recipient would simply reply with a keyword such as "GET" or "SEND" or the like within the content of their reply to the third party service provider. What is different within the context of the teaching of the present invention is that the data from the third party is embedded within the data message of another sender, a person who the recipient has personal contact with and who is typically completely independent of and oblivious to the actions of the third party service provider. In this context, the recipient has a data message with content appropriate to and input by the original sender 100 of the message and content appropriate to and input by the third party service provider 1 15. It would be normally be considered that if the recipient of the data message wanted to reply to the content of the third party service provider that they would have had to extract details of the third party service provider from the content of the data message, compose a new message to that third party service provider and then transmit that message to the third party service provider using the contact details appropriate to that service provider. This it will be understood is a multiple step activity requiring the user to extract the information from the data message, remember the details of the information, input that information correctly into the new data message and then correctly send the message directly back to the third party service provider. With so many steps and activities required by the recipient of the data message it will be understood that they are prejudiced in undertaking this activity. This is even more so within the environment of mobile data messaging where the user interface is a mobile handset with its limited screen format, keypad functionality and actual dimensions of the handset. Furthermore, most data messages traffic is conducted by persons on the move, they need to be able to send and receive message quickly and efficiently with minimum interaction with the handset- as is exemplified by the popularity of predictive texting where the handset functionality is configured to determine appropriate words in the usage language from the key sequence input by the user on their keypad.
In this embodiment of the present invention addresses this prejudice on the side of the recipient to engage with the third party service provider by simplifying the response process required. To ensure that the recipient can easily engage with the third party service provider, the system and methodology of the present invention allows them to initiate the engagement through usage of the simple "REPLY TO" of the original message. This format of reply will be appreciated by those users of mobile data messaging is the simplest form of response available in mobile data messaging in that the details of where the message is to be sent are extracted from the original message. All that is required by the composer of the message is to insert their appropriate content and press "SEND" on their handset. However, it will be recalled from the above discussion of the format of the received message, that it appears to the recipient as if it has been directly channelled from the original user 100, there is no evidence (apart from the additional data content) that a third party has intercepted the message and inserted content. The sender details associated with and displayed for the message are appropriate to the original user 100. One would therefore consider that if a "REPLY TO" function was used, that the resulting message would be simply returned to the originating sender 100. The present invention however is configured to allow such routing to be determined at the network level, thereby removing the reply complexity required by the user.
Therefore, it will be understood that if a recipient 120 of a data message wishes to engage with the third party service provider they simply effect a reply to the original message in an appropriate form which is detailed in the original message. This may be in the form of a keyword of the like, such that the recipient would insert the keyword "GET" or the like into the body of the message before pressing the SEND button on their handset and transmitting that message 320. From their perspective, and indeed from the perspective of their handset and its SENT folder, the sent message appears to have been transmitted back to the original sender 100 of the message.
At the network level, the interceptor module 1 10 is configured to monitor for such message with the appropriate keyword and to intercept them prior to delivery to the indicated address, the original sender 100. The reason for this interception is that while the destination address is appropriate to the user 100, the message content is not, it is appropriate to the third party service provider 1 15. This intercept is desirably done on a first instance by comparing the original message of the chain and the destination address of the final message of the chain- finding them to be the same and then selecting that message for further analysis. In this further analysis the body is interrogated to evaluate the presence or otherwise of specific keywords for action by the third party. In the absence of those keywords within the body, the message is simply returned back into the network and allowed to continue in its usual fashion.
It will be understood from the above discussion that using a methodology provided in accordance with the teaching of the invention that to the two users of the system - the original sender 100 and recipient 120- the data traffic appear to be a simple two way message sequence. Originator 100 sends a data message and the recipient 120 responds to that data message. By providing the intercept functionality at the network level and monitoring for appropriate traffic it is possible to maintain this impression to the users of the system while at the same time enabling a third party service provider to embed content within the message and to engage with the recipient of the message to provide additional services appropriate to that third party service provider.
While the teaching heretofore has been with respect to the simple insertion of data content into a message between two users of a mobile network, that the present invention can also provide for intelligent selection of that data content to be of a form suitable with the context of the message. It will be understood that the third party service provider 1 15 may be considered representative of a plurality of service providers, each differing in their service offering. On receipt of an initial data message from the intercept module, the third party service provider may effect a software filter analysis on the content/context of the message body. By determining for example that the message relates to a future planned excursion, the content that is inserted may be appropriate to that excursion. In this way intelligent insertion of content to the data message may be implemented with the result that as its context is appropriate to the original message, that the recipient is more likely to engage with the third party service provider on receipt of the message.
It will be understood that what has been described herein is an exemplary arrangement whereby a third party service provider may utilise data message traffic to advise users of the mobile network of information/services appropriate to that service provider. By enabling the recipient of the data message to simply use the REPLY TO function of their mobile handset and yet route that message to the third party service provider, ease of use of the system is enabled. The message routing requirements are removed from the sender of the message so as to simplify the interaction from their perspective.
It will be understood that what has been described herein is an exemplary system and method which enables a third party service provider to piggyback on data message communications between two users is described. The system allows for the interception of message flows between the two users to a third party service provider where appropriate data may be inserted and calls to action responded to. From the perspective of the users of the system they are simply engaging in conventional two way direct communication with one another.
Data Backup
In another example of how a third party can provide additional services to a user of a mobile data network based on interception of messages within the network, Figure 4 shows how an external datastore can be provided which provides for the maintenance of a secondary copy of the data message traffic generated by a user's mobile handset on a remote location which is then accessible by the user. This remote location is desirably accessed via an internet connection such as via a web portal or internet site which enables the user to access their data message records without requiring access to their handset. By effecting a storage of messages received at the handset, or indeed those messages that are en route to the handset but which have not yet been delivered for reasons of for example the handset being off, it is possible for the user to utilise the benefits of data messaging without the requirement for a handset. However when the user is travelling and has the handset with them, they can continue using the handset in the traditional manner with a full record of what was generated during the periods of usage via the web portal. Such a secondary store could also be usefully employed to store and maintain contact lists for the user. By enabling the user to send and receive messages via a web interface it is possible for the user to maintain their data message flow using the functionality of a full keyboard and in locations where handsets are not operable or allowable. Such a system is implemented by intercepting messages within the mobile telecommunication network prior to their delivery to the intended handset and routing predetermined messages to this secondary store where they may be subsequently accessed by the user. The functionality of this external backup can be implemented by the user sending a message to self- per the technique above- which will be intercepted by the network and processed as requiring a value added service. Using a message to self with a keyword such as INITIATE within the body of the message, the user could activate a storage of all subsequent SMS messages for that user within the secondary datastore. The user could then selectively turn this functionality off by for example sending a message to self with the keyword TERMINATE to advise the third party datastore that messages should no longer be stored. Figure 4 shows an example of a network architecture that may be implemented to provide such functionality. It will be appreciated that once the service is activated that it does not require send to self messages to perform and that all data traffic originating from or sent to that user could be stored. The same reference numerals will be used for similar modules or components to that described before.
A first user composes a data message on their handset 100 and using the telephone number of the intended recipient of the message transmits the message from their handset. In this arrangement we are assuming that the intended recipient is a registered user 150 of a system provided in accordance with the teaching of the present invention. The user 150 has a handset 120 which has a handset specific identifier, such as a MSISDN, with which data and voice traffic can be correctly routed through a mobile telecommunication network to the handset. Such operation is well known to the person skilled in the art.
The message is initially routed (Step 400) through the normal routing mechanisms of the mobile telecommunication network 105 which includes components such as for example a short message switching centre SMSC and a Home Location Register, HLR. The specific network architecture of a mobile telecommunication network will be omitted here as it will be well known to the person skilled in the art. The term mobile telecommunication network is intended to define one or more networks, be those provided by the same or different service providers. Within the mobile telecommunication network is provided an intercept module 1 10. Based on the specific details of the message traversing the network 105- be that the content and/or the recipient details, the message is identified by the intercept module 1 10 as being of the type that should be intercepted. As part of this intercept the data message is routed to a remote location 1 15. Within the context of the teaching of the present invention it will be understood that the remote location represents one or more servers (or clusters of servers) which may send and receive data traffic over a number of different communication protocols. At the remote location 1 15, which may typically be a computer implemented web portal provided by a third party service provider, a user specific datastore 416 is maintained. This datastore is typically generated at the time of the user 150 registering for use of the system and is accessible by the user through conventional internet protocols 455 such as those provided by browsers such as Firefox™ and Internet Explorer™ The user specific datastore may include one or more record data fields such that different type of information pertinent to the user may be recorded for future review.
On determining that the message should be routed to the third party service provider 1 15, it is routed 405 to that third party. At the service provider 1 15, the message is copied and stored in the user specific datastore 416. It will be appreciated that this user specific data store represents a secondary datastore location for messages that are intended for transmission to the user 150. The traditional datastore for such messages is located on the user's handset 120. The messages and other data stored within this secondary datastore may be independently manipulated or used and changes made on the secondary datastore will not necessarily be synchronised with the handset datastore and vice versa. By intercepting the messages within the network and distributing them to the user specific datastore 416 it is possible for the user to access incoming messages without having access to their handset.
The data message, either the original or the copy depending on the implementation, may then be then returned 410 to the mobile network infrastructure where its path to the original recipient is continued 415 in a conventional fashion. If so implemented, then it will be appreciated that the user will have two separate copies of the same data message each being provided at a separate location.
The user 150 of the system, in this flow sequence the ultimate recipient, receives at their handset 120 the data message in the usual fashion. From their perspective there is nothing different in this data message from other data messages that they have received. Its form and content is typically identical to that originally generated at the handset 1 10, i.e. the content of the message is as input by the sender. However, in accordance with the teaching of the invention the user 150 can read that message either at their handset 120 or via the web enabled or web interface user specific datastore 416. In this way the user can access data messages in locations where handset operation is not possible. Furthermore if their handset is misplaced or broken they have not lost all their data messages in that the user specific datastore provides a master record of all data messages that were transmitted to that user over the network.
While conventionally the message received by the user 150 is exactly the same as that generated at the handset 100, it is also possible for the third party operator of the user specific datastore to embed additional data into the data message prior to releasing the message back into the conventional messaging systems of the mobile telecommunications network. In such a scenario the additional content may be in the form of a display of information or indeed may be a call to action whereby the recipient of the data message is invited to engage further.
If provided, such calls to action are familiar to users of mobile networks. For example, it is not unusual for a mobile operator or third party service provider to independently push information to the subscribers of particular networks. On receipt of the pushed data, the recipient would simply reply with a keyword such as "GET" or "SEND" or the like within the content of their reply to the third party service provider. What is different within the context of this embodiment of the teaching of the present invention is that the data from the third party is embedded within the data message of another sender, a person who the recipient has personal contact with and who is typically completely independent of and oblivious to the actions of the third party service provider. In this context, the recipient has a data message with content appropriate to and input by the original sender 100 of the message and content appropriate to and input by the third party service provider 1 15.
If this additional content is to be provided, it is desirably introduced at the third party provider 1 15 at the time of copying the message into the user specific datastore 416. The modification may be such as to include additional text or data content as appropriate. It will be understood that the length of data messages is restricted to a predefined number of characters. However typical usage of data messaging does not use all available characters. Therefore, depending on the capacity remaining within the message for additional text and/or data content to be inserted, then such text and/or data appropriate to the capacity remaining in the message will be inserted. It should be noted that, should sufficient capacity not remain for the desired additional text or data content to be inserted, then it is also possible to create an additional message or series of messages, and to 'concatenate' these into one 'long message' thus that the recipient receives just one 'long' message (or should this concatenation not be possible, then a series of messages) containing the original message from the sender combined with the additional text and/or data content that has been inserted by the third party service provider. On determination of the appropriate content for insertion into the data message and insertion of that content into the data message, the message transmission to the user handset 150 is continued. It will be appreciated that if the content is inserted prior to copying that both the versions of the message at the handset and that at the user specific datastore will include the additional information whereas if the content is inserted subsequent to the storage at the user specific datastore 416, that the versions at each of the user specific datastore and the handset will be somewhat different.
By providing for a copy of all messages sent to a registered user of the system to be stored at two locations, the user is provided with two separate and independent interface locations to their data messages. They can use the traditional handset 120 for when they are on the move and when in a more permanent location can access the user specific datastore 416. As the user specific datastore will typically not suffer from the same memory or storage limitation of the handset is it possible that they could maintain a master record of multiple messages on the user specific datastore while trimming the messages stored on the handset to a more manageable level. As the interface to the user specific datastore 416 is typically via a conventional internet connection such as that using a computer, keyboard and screen, the advantages of this improved interface can be utilised to enable a user to manage their messages.
It will also be understood that a system provided in accordance with the teaching of the invention may be operable to effect storage of additional information from the handset. Such information could include contact lists and the like. The transfer of such information to a computer or remote server from a handset is well known and it is not intended to limit the present invention to any one specific manner. However what is provided by the present invention is a capacity to update such contact lists stored at the remote server by extracting the sender details 100 from a received message at the third party service provider and updating the contact list with those additional details at the same time as storing the copy of the message. It will be appreciated that the contact list stored and maintained at the handset typically includes the names associated with individual numbers. Within the context of extracting the numbers from the incoming messages at the third party service provider 1 15, it will be appreciated that the extracted numbers could be presented to the user in a number of different fashions. One possible example is a list of most recently received data messages and their originating number. Where the user has already populated their user specific datastore 416 with a contact list, the details of the incoming message could be compared with the details already stored on the contact list and if a match is made, then the number is associated with that name and displayed with the contact name reference. Where the number is not already identified with a member of the contact list, the number could be displayed as the simple number and the user prompted when they next log onto the user specific datastore 416 to update their records to associate that number with a contact. The third party service provider 1 15 could also be configured to compare the incoming extracted number with other numbers stored in separate and distinct user specific datastores, and if a match is found to then use those details to populate the user specific datastore 416.
The teaching of the invention may also be modified to enable storage of all or some of the data messages generated by the user 150 at their handset 120. In this scenario the user specific datastore 416 will not only provide an independent record of the incoming messages to a registered user but may also store some or all of outgoing messages. As shown in Figure 4, a data message may be generated at the handset 120 and then transmitted 400 into the mobile telecommunication network 105. Depending on the user set up configuration, the interface module 1 10 may be configured to copy all outgoing messages from the registered user to the user specific datastore 416. This may be achieved by, on detecting a message that should be intercepted, of routing that message 425 to the third party service provided 1 15 where a copy may be added to the user specific datastore 416. Once copied, then the original message flow may be continued by returning 430 the message to the mobile telecommunication network where it continues, in the usual fashion to the ultimate recipient.
The copying of outgoing messages from a user handset 120 may be effected by either having the intercept module 1 10 effect a routing of all messages originating from the registered handset 120 to the third party 1 15 or alternatively by availing of inserted keywords into the message. For example, the user 150 may not desire all outgoing messages to be stored on the remote user specific datastore 416. Instead they may wish to flag certain messages as warranting storage, this flag being effected by inserting a predetermined keyword such as "LOG" at a specific point within their drafted data message, or by sending the message to self with the keyword inserted as was discussed above. When this data message is then being transmitted through the telecommunications network, the presence or otherwise of the mentioned keyword within the body of the data message will prompt the intercept module to route the message to the user specific data store 416 or to allow it to continue uninterrupted to the ultimate recipient.
It will be appreciated that implementation of this dual storage requires the ability at the network level to interrogate message flows and to intercept messages as appropriate. The interceptor module 1 10 is configured to monitor for messages with the appropriate keywords and/or identifier parameters and to intercept them prior to delivery. It will be appreciated that while Figure 4 shows the functionality of the intercept module 1 10 as residing wholly on the mobile telecommunication network but it will be understood that the teaching of the invention should not be construed so limited. For example the intercept module 1 10 may include a number of different elements or sub-modules some of which could reside on the telecommunications network and some on the third party service provider. In such a latter arrangement, the portion residing on the telecommunications network could simply provide for a re-direction of all messages intended for identified recipients to the third party service provider where they would then be sorted and copied as appropriate. In another exemplary implementation the intercept module could provide for the copying of the data message within the telecommunications network such that on transmission of a copy of the intercepted message to the third party service provider, the message is simultaneously allowed to continue within the telecommunications network to its intended original handset address.
It will be understood from the above discussion that using a methodology provided in accordance with the teaching of the invention that to the registered user 120 of the system, the creation and maintenance of their secondary storage 416 occurs without any real interaction by the user. Once registered, their registration details are used to effect the interception which from their perspective occurs seamlessly. All they are aware of is that they can access and manipulate their incoming messages via one of two different interfaces; the first being a handset in the traditional fashion and the second being via a web or internet interface.
It will be understood that what has been described herein is an exemplary arrangement whereby a third party service provider may maintain a secondary storage of messages routed through a mobile telecommunication network for a user. These messages may then be accessed by the user via a different communication channel to their traditional interface with data messages. This enables alternative mechanisms for managing their data messages but also and more importantly allows them to access data messages without requiring access to their handset. This has particular advantage in the heretofore mentioned problematic environments where use of radio frequency wireless telecommunication devices is strictly controlled or where the coverage of the mobile network is problematic or where they no longer have access to the handset such as in scenarios where the handset is damaged or lost. Furthermore as the user specific datastore is not limited by the memory capacity limitation of handsets, it can provide for storage of many more messages than possible on the handset such that on accessing the user specific datastore 1 16, the user has a better historical perspective of their data messaging traffic
By providing a storage of user details and messages on the remote platform, the system of the present invention may be further expanded to provide for additional functionality. An example of this is shown in Figure 5 where the same reference numerals are used for the same elements or components. An example of the distribution of this information as part of a pull function will now be described with reference to an exemplary birthday request. If the user 150 has registered and recorded their birthday details on the user specific datastore 416, such details may be distributed on request by the third party service provider 1 15 to nominated parties. An example of this is where for example a person 100 on the user contact list whose profile has been approved for pulling information sends a data message to the user handset 120 with the keyword "BIRTHDAY" (Step 500). On receipt of this message within the telecommunications network, the intercept module 1 10 is configured to compare this keyword with pre-recorded keywords and with the intended recipient details and route the message directly to the third party service provider 1 15 (Step 505). At the service provider a data extraction module 550 extracts the birthday details from the appropriate user specific datastore 416 and embeds these details into a message for transmission back to the requester 100. Once embedded the message is routed through from the service provider 1 15 to the mobile network (Step 510) and then back to the requester (Step 515). The original intended message recipient 120 never receives the original request so they are therefore not troubled with the request. It will be appreciated that the example of a birthday is only an example and that any user specific information such as for example, address, title, other contact information, etc could be predefined as being allowable for transmission to requesters without requiring user authorisation at the request time. The specifics of the information that may be requested will depend on the pre-association of keywords with the actual data type and this can be effected by the user during their interface 555 with the third party service provider 1 15.
Figure 6 shows a further modification to such an arrangement whereby the user specific datastore 416 may be used to receive information feeds from or direct information feeds to other datastores. Examples of such datastores include HLR records 601 that provide an indication of the location of the handset of the user. By providing a feed 605 from the HLR to the user specific datastore 416 and having a buffered cache or data field that operates for example on a FIFO principle it is possible to maintain within the user specific datastore, location information pertaining to the handset. As the handset is typically co-located with the user 150, the HLR records provided indicative locations of the user 150. Using the pull information sequence- described above with reference to Figure 5, authorised third parties could then request information as to the location of the user and that information could be returned to the requester without requiring interaction by the user 150. This could be particularly advantageous in the case of parental monitoring of location of their children and does not require an opening of the HLR records directly to interrogation requests. In this way the load of managing these requests is diverted to the third party service provider. In another scenario the user specific datastore 416 could provide feeds to and receive feeds back from third parties 650a, 650b who maintain other datastores 651 a, 651 b that include information pertaining to a user or members of that users defined groups. This could be used for example to enable an update of contact information within the contact store of the user specific datastore or indeed to push out further copies of the data messages to other datastores for example those on which social networking sites such as FACEBOOK™ and the like are maintained.
While the management of the user specific datastore 416 has been described with reference to the user 150 directly accessing the data, it is possible within the teaching of the present invention for the user to also effect changes in the operation of the system directly from their handset 120. By using send to self messages with keywords within the body of those data messages that have already been associated with an action or rule at the third party service provider 1 15 it is possible for the user to initiate or terminate certain actions. Such control could typically be implemented by sending a data message with a specific keyword embedded therein to their own number. On receipt of the data message within the network, the intercept module 1 10 directs the message to the third party 1 15 where the data message is interrogated and the appropriate functionality performed. This could for example be the establishment of an out of contact notification. If implemented such a notification could be used to advise subsequent senders 100 of messages to that user 150, that the user is out of contact. In such scenarios the messages sent by user 100 is typically stored only at the user specific datastore and not routed onwards to the handset 120. It will be understood that what has been described herein is an exemplary system and method which enables a third party service provider to provide additional functionality to a user of a mobile telecommunication network. By providing a secondary storage of the user data messaging and/or their specific details it is possible to enable the user to interface with their messages through a non- mobile telecommunication specific protocol or interface. This can provide a number of advantages such as those highlighted above. The system allows for the interception of message flows between the two users to a third party service provider where appropriate data may be extracted and copied into a user specific datastore for subsequent interrogation by the user. The invention also provides for the pulling of user specific information using conventional mobile data messages but not requiring the user to authorise the pulling at the time of the request. From the perspective of the users of the system they are simply using the system as they have traditionally done.
Using such a system, it is possible to combine a number of interactive messaging functions into a single integrated SMS social network, turning a subscribers' mobile number into a powerful hub for communicating with many people at once and sharing information about themselves - with group messaging, alerts and instant-messaging. As was explained above such a system allows subscribers to view, send and store all of their SMS traffic online and provides third parties with a unique permissions-based SMS advertising channel.
For the user, a system in accordance with the present teaching offers a way of turning their mobile phone into a powerful social networking tool by enabling their own number as a central contact point for more than just voice and text. A subscribers' number becomes a hub for group messages, alerts and user profiles, along with a unique, many-to-many, SMS based instant-messaging system that doesn't require anyone to remember short-codes, or require users to remember keywords once they are chatting. A subscriber can use their own mobile number as if it were a shortcode, allowing friends, colleagues and clients to sign up to receive user's broadcasts or group messages, access profile information, or receive automated responses to an SMS. A user of a system in accordance with the present teaching can use their mobile number to interact with other users by using a system defined usemame and sending a keyword, followed by a usemame to themselves. In this way, a subscriber's own number becomes a replacement for a shortcode not only for other people, but for the user as well.
Groups may be defined and allow a subscriber to host a group that is either open to all or invite only. Group hosts can send to other group members simply by sending for example the keyword GROUP followed a message to their own mobile number. Group members can send to others by sending GROUP and their message to the host's mobile number. In a manner such as that described above the TxtLink system may be configured to the message and distribute the message text to the other group members. Joining a TxtLink subscribers' group is as simple as sending the keyword GROUP on its own to the subscriber's mobile number.
TxtLink Alerts allows a subscriber to host an information service, with their own number acting as a substitute for short-codes. Anyone can sign up to a user's alerts by sending ALERT to their mobile number. The TxtLink subscriber now has a powerful tool for passing information to a large number of recipients by sending the keyword ALERT, followed by their message, to their own number.
In another configuration the system may be configured to allow two or more users to provide a unique instant-messaging tool that allows users to start a chat session with other TxtLink subscribers by sending CHAT to other TxtLink member's mobile numbers. Multiple subscribers can be in the same chat session at the same time and once chatting, sending a message to everyone else is simply a case of sending your message to your own number - no need to remember any keywords or short-codes.
In addition to the powerful social networking functions, TxtLink subscribers will also have access to all of their SMS traffic, both inbound and outbound, from a web interface that can be accessed anywhere in the world. The interface can be used for viewing and storing inbound messages as well as composing and sending SMS, all using the subscribers normal mobile number. Sent and received messages from a subscriber's handset are automatically stored in a secure data store and accessible from the web interface without any user intervention.
For the third party advertiser, TxtLink offers a unique permission-based channel for delivering highly relevant and targeted advertising discretely into the inbound SMS stream without adversely affecting a consumer's user experience. TxtLink provides multi-dimensional targeting capabilities allowing an advertiser to select advertisements for delivery based on subscriber profile information, time of day, and message context. Each SMS advertisement includes a call-to-action that the consumer can respond to as easily as replying to a received SMS and including a keyword in the response. A TxtLink system such as that provided in accordance with the present teaching will intercept the keyword and deliver a response, such as an SMS coupon or a link to a mobile site.
TxtLink Alerts
TxtLink Alerts allow a TxtLink user to host a one-to-many information service using their own mobile number as a replacement to a shortcode. People can opt-in to a TxtLink Alerts by sending the keyword ALERT to the user's mobile number. When a TxtLink user sends the keyword ALERT followed by some message text to their own number, the message is sent to all those who are following the user's alerts. The message arrives on the other mobile handsets with the originating number of the alert owner, rather than a short-code. To stop receiving TxtLink Alerts, people simple send STOP ALERT to the TxtLink user's mobile number. This removes them from the Alerts list, and following a confirmation, they will not receive further alerts from the TxtLink user. One of the features of a TxtLink system such as that described above is that interaction with other TxtLink users can be carried out using a TxtLink usemame. For one TxtLink user to join another TxtLink user's Alerts, rather than sending to the other's mobile number, they can send ALERT, followed by the other's usemame, to their own number. TxtLink will intercept this message- to-self, look up the usemame, and add a subscription to the other's TxtLink Alerts list. A typical example of using TxtLink Alerts follows.
1. A TxtLink user enables Alerts by sending themselves a text message with the text "ALERTS ON". The TxtLink platform will intercept the message and enable Alerts for that user.
2. The user can now publish their alerts wherever they wish. For example, on their business card or blog, they could have the text "Send ALERTS to
<users number> to receive up to date info on our products"
3. Anyone sending ALERTS to the user's number is signed up to receive the alerts.
4. When the user wishes to send a message to the Alerts subscription list, they send themselves a text with the text "ALERT new release of Business Now newsletter available at www.mybizblog.com ". This is intercepted by TxtLink and distributed to all those who have signed up to receive alerts.
5. Subscribers receive the message from the Alerts owners mobile number. Therefore while the invention has been described with reference to preferred arrangements it will be understood that this is provided to assist in an understanding of the teaching of the present invention and it is not intended that the teaching of the invention be limited except as is deemed necessary in the light of the appended claims.
It will be understood that what has been described herein is an exemplary system and method which enables a processing of a multiplicity of data messages within a data network to identify whether specific messages are requests for ancillary or value-added services. By using a self referencing filter based on header information of the data messages it is possible to ensure that normal traffic is delayed for a minimum of time. The capacity to filter without requiring use of a look up table can provide for improved throughput within the context of the mobile telecommunication network. The system allows for the interception of message flows between the users of a mobile telecommunication network and the provision of specific services to subscribers to a third party service provider where appropriate. By implementing one or more filters where at least one of the filters is based on self referencing it is possible to minimise the delay in filtering. From the perspective of the users of the system they are simply using the system as they have traditionally done.
It will be appreciated that mobile network operators are increasingly seeking to be able to probe and intercept person to person SMS and MMS messages that are traversing their networks for a number of reasons including the optimisation of network capacity, the prevention of 'spam' and the implementation of parental controls to name just a few examples. This probing and interception can be affected in a number of ways for example by the installation of a dedicated 'intelligent router' within the mobile telecommunication network or by the process known 'home routing'. This latter process is a term that will be understood by those skilled in the art as the scenario where the responsibility for the delivery of a Short message service (SMS) is assumed by the receiving mobile operator rather than the sending mobile operator. It is however not intended to limit the application of the present invention to either of these scenarios, ultimately the teaching of the present invention may be implemetd in any environment where the mobile network operator is configured to direct person to person messages to the TxtLink service in whatever method is best for that operator.
The words comprises/comprising when used in this specification are to specify the presence of stated features, integers, steps or components but does not preclude the presence or addition of one or more other features, integers , steps, components or groups thereof.

Claims

Claims
1. A method of processing data message chains received within a telecommunication network, the method comprising: a. Determining the originating address of a first message in the chain; b. Determining the destination address of a final message in the chain; c. Comparing the originating address and destination for a match; d. Processing the message chain based on determination of a match.
2. The method of claim 1 wherein the message chain comprises a single message.
3. The method of claim 1 wherein the message chain comprises a plurality of messages including a first message sent from a sender to a recipient and a second message routed from the original recipient to the original sender.
4. The method of claim 3 wherein the second message is intercepted prior to forwarding to the original sender such that the original sender does not receive the second message.
5. The method of any preceding claim comprising using the match between the originating and destination address to intercept messages transmitted into a mobile telecommunication network to filter those messages requiring the provision of a value-added service, the method including the steps of: a. Receiving a data message into a mobile telecommunication network; b. examining using a first filter, the characteristics of the data message based on the originating and destination address of the data message; and c. If each of the originating and destination address are found to be identical then diverting that message for appropriate action.
6. The method of claim 5 wherein on examining the characteristics of the data message based on the originating and destination address of the data message, if they are not found to be identical then including the step of routing the message onward within the telecommunication network.
7. The method of claim 6 wherein the routing onwards is to the appropriate destination address associated with the message.
8. The method of any one of claims 5 to 7 including providing a second filter configured to extract keywords from within the body of messages filtered as requiring the provision of a value-added service, and to compare those keywords with a look up table to identify the appropriate value- added service.
9. The method of any one of claims 5 to 8 wherein the first filter is provided on a third party service provider in communication with the mobile telecommunication network and to which selected messages traversing the mobile telecommunication network are routed.
10. The method of claim 9 wherein all messages traversing the mobile telecommunication network are routed to the third party service provider for examination at the first filter.
1 1.The method of claim 9 wherein a subset of messages traversing the mobile telecommunication network are routed to the third party service provider for examination at the first filter.
12. The method of claim 11 wherein the subset is determined by examining within the telecommunication network at least one of the originating and destination address associated with individual data messages and routing those messages to the third party service provider which match predefined originating or destination addresses.
13. The method of claim 8 wherein the second filter is provided on a third party service provider and is externally configurable by a user interfacing with the second filter via a web interface.
14. The method of claim 8 wherein the second filter is operable to effect an examination of the body of the message to ascertain if there are any keywords embedded therein and to effect a comparison of those keywords with pre-assigned keywords in a look up table to identify what action is to be effected.
15.A method of filtering data messages within a mobile telecommunication environment is provided the method including the steps of: a. Examining the originating and destination address associated with a specific data message, b. On determining that each of the originating and destination address are the same, selecting that message as requiring further examination and routing that message appropriately for that further examination, and c. On determining that each of the originating and destination addresses are not equal allowing the message to continue within the mobile telecommunication network.
16. The method of claim 15 wherein the examining step is provided on a router within a mobile operator architecture or may be implemented at a third party service provider to which the data message has been routed.
17.A system for filtering data messages within a mobile telecommunication environment, the system including: a. Means for examining the originating and destination address associated with a specific data message, b. Means for, on determining that each of the originating and destination address are the same, selecting that message as requiring further examination and routing that message appropriately for that further examination, and c. Means for, on determining that each of the originating and destination addresses are not equal, allowing the message to continue within the mobile telecommunication network.
18. The method of claim 1 further configured to enable a third party service provider to provide information to a user of a mobile telecommunication network, the method including the steps of: a) Receiving within the mobile telecommunication network a data message from a sender of the message to a recipient of the message; b) Intercepting the message and routing the message to a third party service provider; c) Receiving at the mobile telecommunication network a returned message from the third party service, the returned message including the content of the original message plus additional data content provided by the third party service provider; d) Routing the message onward to the intended recipient of the message; e) Receiving a reply message at the mobile telecommunication network to the original message from the recipient of the message, the reply message including the destination details of the original sender of the message and data content appropriate to the third party service provider; and f) on matching the destination details of the original message of the chain with the destination details of the reply message routing the reply message to the third party service provider.
19. The method of claim 18, wherein the routing step of step f) is a routing only to the third party service provider and not a distribution of the reply message to the user of the mobile network appropriate to the destination address.
20. The method of claim 18 or 19 wherein the data content appropriate to the third party service provider within the reply message is in the form of one or more keywords.
21. The method of any one of claims 18 to 20 wherein the third party service provider is configured to insert data content appropriate to the context of the original message.
22. A system for enabling two way mobile data traffic between two or more users within a mobile network to be used by third party service providers, the system including: a) An intercept module provided as part of the mobile telecommunication network architecture configured on an outward journey of a mobile data message between two users of the mobile network to intercept the mobile data message and to route that data message to a third party service provider, the intercept module being configured on receipt of modified data message from the third party service provider to continue the routing of that message to the intended recipient; b) An intercept module provided as part of the telecommunication network architecture configured on a return journey of the mobile data message of a) to intercept the mobile data message and to route that data message to third party service provider, the intercept module being configured on effect said interception based on the presence of a predetermined keyword within the returned mobile message.
23. A method of providing user access to a remote replication of data message traffic sent to their mobile handset so as to enable a user to access their data message without requiring operation of their handset, the method including the steps of: a. Generating a user specific datastore at an internet accessible location, b. Receiving within the mobile telecommunication network a data message directed to a mobile handset associated with the user; c. Intercepting the message and transmitting a copy of the data message to the user specific datastore for storage; and d. Enabling the user to access the user specific database to review the stored data message, and
Wherein the interception of messages is effected subsequent to a receipt of a send to self message generated by the user and sent to their own number.
24. The method of claim 23 including the additional step of routing the message onward to the mobile handset associated with the user.
25. The method of claim 23, wherein the generation of the user specific datastore is effected a proiri to the intercept of any messages for that user.
26. The method of claim 23 or 24 wherein the intercept step is configured to intercept all messages being routed to a user having a user specific datastore.
27. The method of any one of claim 23 to 26 further including the steps of: a. Receiving within the mobile telecommunication network a data message originating from a mobile handset associated with the user b. Determining within the network whether that message should be routed to the user specific datastore, c. On determination that the message should be routed to the user specific datastore effecting a transmission of a copy of the data message to the user specific datastore; and d. Routing the message onward to the original intended recipient of the message.
28. The message of claim 27 wherein the determination is effected on the presence of otherwise of a predetermined keyword within the body of the data message.
29. The method of any one of claims 23 to 28 including the step of enabling storage of user specific information separate to the data messages within the user specific datastore.
30. The method of claim 29 of allowing authorised third parties to effect a pulling of selected user specific information from the user specific datastore by transmitting a pull request to the handset number of the user associated with the user specific datastore.
31. The method of claim 29 including the step of providing the user specific datastore in communication with other datastores having information pertinent to the user of the user specific datastore and populating the user specific datastore with that information.
32. The method of claim 29 including the step of providing the user specific datastore in communication with other datastores having information pertinent to the user of the user specific datastore and populating the other datastores with information from the user specific datastore.
33. The method of any one of claims 23 to 32 comprising the step of maintaining a set of rules associated with the user specific datastores and allowing the user to implement at least one of these rules through transmission of a data message from the user via the mobile telecommunication network to their own handset identifier.
34. A system for providing user access to a remote replication of data message traffic sent to their mobile handset so as to enable the user to access their data message without requiring operation of their handset, the system including: a. A first server having a user specific datastore, the user specific datastore being associated with a specific user and a mobile handset associated therewith, b. Intercept means provided within a mobile telecommunication network to intercept a data message directed to the mobile handset associated with the user; c. Routing means to route from the mobile telecommunication network the data message, or a copy thereof, to the first server, d. Storage means provided at the first server to effect, on receipt of a routed data message from the routing means, a population of the user specific datastore with the data message, and e. A user interface to the first server to enable a user to access, over internet protocol channels their user specific datastore to review the stored data message.
PCT/EP2009/054106 2008-04-04 2009-04-06 Method and system for processing data messages and message chains by comparing the originating address and the destination address for a match WO2009121974A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IES2008/0261 2008-04-04
IE20080261 2008-04-04

Publications (1)

Publication Number Publication Date
WO2009121974A1 true WO2009121974A1 (en) 2009-10-08

Family

ID=40740001

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2009/054106 WO2009121974A1 (en) 2008-04-04 2009-04-06 Method and system for processing data messages and message chains by comparing the originating address and the destination address for a match

Country Status (1)

Country Link
WO (1) WO2009121974A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013156980A1 (en) * 2012-04-20 2013-10-24 Telefonaktiebolaget Lm Ericsson (Publ) Group sms messaging
JP7450145B1 (en) 2023-12-19 2024-03-15 株式会社ナレッジフロー Message sending agent device and program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1322126A1 (en) * 2001-12-21 2003-06-25 Nokia Corporation Mobile network message to email redirection
US20050283837A1 (en) * 2004-06-16 2005-12-22 Michael Olivier Method and apparatus for managing computer virus outbreaks
WO2006040749A1 (en) * 2004-10-14 2006-04-20 Anam Mobile Limited Method for routing sms messages using an intelligent routing node
US7113977B1 (en) * 2002-06-26 2006-09-26 Bellsouth Intellectual Property Corporation Blocking electronic mail content
US20070293247A1 (en) * 2006-06-14 2007-12-20 Yahoo! Inc. Platform for managing mobile domains and keyword-activated applications

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1322126A1 (en) * 2001-12-21 2003-06-25 Nokia Corporation Mobile network message to email redirection
US7113977B1 (en) * 2002-06-26 2006-09-26 Bellsouth Intellectual Property Corporation Blocking electronic mail content
US20050283837A1 (en) * 2004-06-16 2005-12-22 Michael Olivier Method and apparatus for managing computer virus outbreaks
WO2006040749A1 (en) * 2004-10-14 2006-04-20 Anam Mobile Limited Method for routing sms messages using an intelligent routing node
US20070293247A1 (en) * 2006-06-14 2007-12-20 Yahoo! Inc. Platform for managing mobile domains and keyword-activated applications

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A. LAMBERT: "Analysis of spam", DEPARTMENT OF COMPUTER SCIENCE, UNIVERSITY OF DUBLIN, TRINITY COLLEGE, September 2003 (2003-09-01), pages V-XI, 39-56, XP002533362, Retrieved from the Internet <URL:http://www.tara.tcd.ie/handle/2262/838> [retrieved on 20090622] *
HASIKA PAMUNUWA ET AL: "An Intrusion Detection System for Detecting Phishing Attacks", SECURE DATA MANAGEMENT; [LECTURE NOTES IN COMPUTER SCIENCE], SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, vol. 4721, 23 September 2007 (2007-09-23), pages 181 - 192, XP019101007, ISBN: 978-3-540-75247-9 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013156980A1 (en) * 2012-04-20 2013-10-24 Telefonaktiebolaget Lm Ericsson (Publ) Group sms messaging
JP7450145B1 (en) 2023-12-19 2024-03-15 株式会社ナレッジフロー Message sending agent device and program

Similar Documents

Publication Publication Date Title
US7730149B2 (en) Interactive communications system
KR101117451B1 (en) Electronic message forwarding
KR101524313B1 (en) METHOD FOR A REQUEST AND RESPONSE OF AN INSTANT MESSAGE DISPOSITION NOTIFICATION IN A CONVERGED-IP message SERVICE AND SYSTEM THEREOF
US8406792B2 (en) Message modification system and method
US20060235981A1 (en) Providing a second service to a group of users using a first service
EP3010184B1 (en) Method and internet protocol short message gateway (ip-sm-gw) for providing an interworking service between converged ip messaging (cpm) and short message service (sms)
EP2033457B1 (en) Group advertisement method in a SIP based message service
US9049165B2 (en) Method for delivering message based on CPM service and server thereof
US20040203619A1 (en) Anoymous messaging using mobile telephone
KR20180118732A (en) Managing multiple profiles for a single account in an asynchronous messaging system
CN1997009A (en) A filtering method for instant message
EP2560329B1 (en) Method and processing system for routing a message request
JP6254530B2 (en) Apparatus and method for inviting subscription of contact information
KR20090087791A (en) Converged ip messaging service system and method for interworking with non-converged ip messaging services
KR20100038991A (en) Mobile communication system and method for requesting disposition notification of im message for each of group members
WO2009121974A1 (en) Method and system for processing data messages and message chains by comparing the originating address and the destination address for a match
CN101385293A (en) Method for communicating with several users, arrangement, communication management server, and communication terminal
US9160569B2 (en) Messaging system and method
CN101305623B (en) Method and apparatus for determining PT server having controlling function
WO2007066354A1 (en) A system and method to share digital data in a secure and fine grained controlled manner over a communication network
US20100062797A1 (en) Method for group communication between subscribers to different messaging services, communication terminal and computer program product
EP2066090A1 (en) Initiation of dynamic sessions
WO2021133358A1 (en) A system used during retrieval or transmission of short message
GB2492419A (en) Distributing status information for a telecommunications network subscriber
KR20090060655A (en) Method and system for sharing handle state information of receipt message in converged internet protocol messaging service

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09728693

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09728693

Country of ref document: EP

Kind code of ref document: A1