Systems and methods for providing anonymous messaging

ABSTRACT

An exemplary messaging anonymity system (MAS) for providing anonymous messaging between a mobile device and a third-party service provider via a communications network can include a processor, a network interface, and a memory. The memory can be configured to store instructions that, when executed, perform the steps of an exemplary method. The exemplary method can include receiving a mobile-originated (MO) message from a mobile device, the MO message being destined for a third-party service provider, determining to provision an anonymous subscriber identification (ASI) to be used in lieu of a subscriber address associated with the mobile device, provisioning the ASI, and sending the MO message to the third-party service provider, wherein the ASI is presented to the third-party service provider as an originating subscriber address.

TECHNICAL FIELD

The present disclosure relates generally to communications and, moreparticularly, to systems and methods for providing anonymous messagingcommunications.

BACKGROUND

Wireless telecommunications services, such as voice, data, andmessaging, provide users with communications access within a coveragearea. These services allow users to communicate without the need for alandline thereby offering superb flexibility over landline communicationsolutions.

Many people are foregoing landline services, such as landline telephoneservice, in favor of a wireless service for all their communicationsneeds. In addition to voice service, many users have adopted messagingcommunication services, such as short message service (SMS) messaging,enhanced message service (EMS) messaging, and multimedia message service(MMS) to communicate with others. The convenience offered by thesemessaging services has garnered a large following among wireless serviceusers, but has especially impacted communication habits of young,technologically astute demographics, such as high school and collegeaged persons. The wide-spread appeal of SMS service has fostered thecreation of more advanced services like MMS, which allows users toappend a sound, an image, a video or other media to a text message.

The popularity of messaging services has been leveraged by manythird-party service providers as a way to distribute content, such asringtones, images, videos, music, games, and other content to wirelessusers. For example, many third-party service providers offer servicewhereby a user can message the provider using a specific characterstring and short code to acquire content. Messages sent by a user as arequest for content are sent in the clear with no encryption or othermechanism to preserve anonymity. This practice may compromise a user'sidentity, network integrity, and/or consumer confidence in a wirelessservice provider.

SUMMARY

Systems for providing anonymous messaging between a mobile device and athird-party service provider and methods for operating such systems aredescribed herein. In one embodiment of the present disclosure, a methodfor operating a message anonymity system (MAS) to provide anonymousmessaging between a mobile device and a third-party service provider viaa communications network can include receiving a mobile-originated (MO)message from the mobile device. The MO message can include a destinationaddress for a third-party service provider. The method can furtherinclude determining to provision an anonymous subscriber identification(ASI) to be used in lieu of a subscriber address that is associated withthe mobile device, provisioning the ASI, and sending the MO message tothe third-party service provider. The ASI can be presented to thethird-party service provider as the originating subscriber address. Theoriginating subscriber address can include, but is not limited to, asubscriber's telephone number, a mobile subscriber integrated servicesdigital network number (MSISDN), a device uniform resource locator(URL), or other address that is associated with the mobile device.

In some embodiments, the MO message can be generated and sent to the MASby the mobile device in response to a mobile-terminated (MT) messagefrom the third-party service provider being received at the mobiledevice. In some embodiments, the MO message is a spontaneous messagegenerated and sent in response to the MT message being received. Inother embodiments, the MO message is automatically generated at themobile device in response to the MT message being received. In stillother embodiments, the MO message is manually created by the subscriber.

In some embodiments, the method includes determining to automaticallyprovision an ASI to be used in lieu of the subscriber address that isassociated with the mobile device by randomly assigning the ASI. The ASIcan be assigned for use in one or more messaging communications. The ASIcan be valid for one messaging communication or one or more futuremessaging communications.

In some embodiments, the method includes determining to automaticallyprovision the ASI to be used in lieu of the subscriber addressassociated with the mobile device by assigning the ASI based upon ASIselection criteria. The ASI selection criteria can include a wirelessservice provider preference and/or a subscriber preference.

In another embodiment of the present disclosure, a MAS for providinganonymous messaging between a mobile device and a third-party serviceprovider via a communications network can include a processor, a networkinterface, and a memory that is in communication with the processor. Thememory can be configured to store instructions that, when executed,perform the steps of the aforementioned method.

In another embodiment of the present disclosure, a computer-readablemedium that includes computer-executable instructions that, whenexecuted, can perform the steps of the aforementioned method.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary wireless telecommunications network inwhich the present disclosure can be implemented.

FIG. 2 illustrates an exemplary Internet protocol Multimedia Subsystem(IMS) network in which the present disclosure can be implemented

FIG. 3 illustrates a mobile device and components thereof, according toan exemplary embodiment of the present disclosure.

FIG. 4 illustrates a messaging anonymity system (MAS) and componentsthereof, according to an exemplary embodiment of the present disclosure.

FIG. 5 illustrates a method for operating an MAS, according to anexemplary embodiment of the present disclosure.

FIG. 6 illustrates a method for operating an MAS, according to anotherexemplary embodiment of the present disclosure.

FIG. 7 illustrates a method for operating an MAS, according to anotherexemplary embodiment of the present disclosure.

FIG. 8 illustrates a method for operating an MAS, according to anotherexemplary embodiment of the present disclosure.

DETAILED DESCRIPTION

As required, detailed embodiments of the present disclosure aredisclosed herein. It must be understood that the disclosed embodimentsare merely exemplary examples of the disclosure that may be embodied invarious and alternative forms, and combinations thereof. As used herein,the word “exemplary” is used expansively to refer to embodiments thatserve as an illustration, specimen, model or pattern. The figures arenot necessarily to scale and some features may be exaggerated orminimized to show details of particular components. In other instances,well-known components, systems, materials or methods have not beendescribed in detail in order to avoid obscuring the present disclosure.Therefore, specific structural and functional details disclosed hereinare not to be interpreted as limiting, but merely as a basis for theclaims and as a representative basis for teaching one skilled in the artto variously employ the present disclosure.

Referring now to the drawings, wherein like numerals represent likeelements throughout the several views, FIG. 1 illustrates an exemplarywireless telecommunications network 100 in which the present disclosurecan be implemented. The network elements and network interfacesillustrated in the wireless telecommunications network 100 are describedfor Global System for Mobile communications (GSM), General Packet RadioService (GPRS), and Universal Mobile Telecommunications System (UMTS)telecommunications technologies. It should be understood, however, thatthe present disclosure is applicable to any existing or yet to bedeveloped telecommunications technology. Some examples of other suitabletelecommunications technologies include, but are not limited to,networks utilizing Time Division Multiple Access (TDMA), FrequencyDivision Multiple Access (FDMA), Wideband Code Division Multiple Access(WCDMA), Orthogonal Frequency Division Multiplexing (OFDM), and variousother 2G, 2.5G and 3G (third generation) and above (4G and beyond)technologies. Examples of suitable data enabling bearers include GPRS,Enhanced Data rates for Global Evolution (EDGE), the High-Speed PacketAccess (HSPA) protocol family, such as, High-Speed Downlink PacketAccess (HSPDA), Enhanced Uplink (EUL) or otherwise termed High-SpeedUplink Packet Access (HSPDA), Evolved HSPA (HSPA+), and various othercurrent and future data enabling bearers.

The illustrated wireless telecommunications network 100 includes tworadio access networks (RAN). A first RAN, illustrated in the upper lefthand portion of FIG. 1, is dedicated to GSM-based network access. Asecond RAN, illustrated in the lower left hand portion of FIG. 1, isdedicated to UMTS-based network access. The present disclosure is notlimited to the illustrated embodiments for GSM and UMTS network access.Other access technologies are contemplated as described above. The firstRAN is described immediately below.

The illustrated wireless telecommunications network 100 includes a firstmobile station (MS) 102 and a second MS 104 that are each incommunication with a base transceiver station (BTS) 106 via the Um radio(air) interface. A BTS 106 is the terminating node for the radiointerface in the first RAN. Each BTS 106 can include one or moretransceivers and can be responsible for ciphering of the radiointerface.

In the illustrated embodiment, the first MS 102 is a mobile phone andthe second MS 104 is a portable computer, such as a laptop with anintegrated or external, removable GSM access card. Each MS 102, 104 caninclude mobile equipment, such as, but not limited to, keyboards,screens, touch screens, multi-touch screens, radio transceivers, circuitboards, processors, memory, a subscriber identity module (SIM) thatcontains subscriber information to enable network access to the wirelesstelecommunications network 100, and the like.

Each BTS 106 is in communication with a base station controller (BSC)108 via the Abis interface. The BSC 108 is configured to allocate radioresources to the MS's 102, 104, administer frequencies, and controlhandovers between BTS's 106 (and others not shown). Although illustratedas a distinct element, the BSC 108 functions can be incorporated in theBTS 106 and the Abis interface can be eliminated.

The BSC 108 can be logically associated with a packet control unit (PCU)110 when GPRS capabilities are employed, such as in the illustratedwireless telecommunications network 100. The PCU 110 is configured tosupport radio related aspects of GPRS when connected to a GSM network.The PCU 110 is in communication with a serving GPRS support node (SGSN)112 via the Gb interface. The SGSN 112 records and tracks the locationof each mobile device (e.g., MS's 102, 104) in the wirelesstelecommunications network 100. The SGSN 112 also provides securityfunctions and access control functions.

The BSC 108 is in communication with a mobile switching center (MSC) 114via an A interface. The MSC 114 is configured to function as atelecommunications switch and is in communication with locationdatabases, such as visiting location register (VLR) 116 and a homelocation register (HLR) 117. The VLR 116 can be logically associatedwith the MSC 114 as illustrated or can be separate from the MSC 114. TheVLR 116 is a database configured to store all subscriber data that isrequired for call processing and mobility management for mobilesubscribers that are currently located in an area controlled by the VLR116. The HLR 117 is in communication with the MSC 114 and VLR 116 viathe D interface. The HLR 117 is a database configured to provide routinginformation for mobile terminated (MT) calls and various messagingcommunications. The HLR 117 is also configured to maintain subscriberdata that is distributed to the relevant VLR (e.g., the VLR 116) or theSGSN 112 through the attach process and mobility management procedures,such as location area and routing area updates. The HLR 117 can belogically associated with an authentication center (AuC) as illustrated.The AuC is configured to authenticate each SIM card that attempts toconnect to the wireless telecommunications network 100, for example,when a mobile device is powered on. Once authenticated, the HLR 117 isallowed to manage the SIM and services provided to the MS 102, 104. TheAuC can generate an encryption key that is used to encrypt all wirelesscommunications between the MS 102, 104 and the wirelesstelecommunications network 100.

The MSC 114 is also in communication with a gateway-MSC (GMSC) 118 viathe B interface. The MSC 114 is also in communication with a messagecenter (MC) 120. The GMSC 118 is configured to provide an edge functionwithin a public land mobile network (PLMN). The GMSC 118 terminatessignaling and traffic from the public switched telephone network (PSTN)122 and integrated service digital network (ISDN) 124, and converts thesignaling and traffic to protocols employed by the mobile network. TheGMSC 118 is in communication with the HLR/AuC 117 via the C interface toobtain routing information for mobile terminated calls originating fromfixed network devices, such as fixed telephones that are incommunication with the mobile network via the PSTN 122, for example. TheMC 120 can be a short message service center (SMSC), an enhanced messageservice center (EMSC), and/or a multimedia message service center(MMSC), for example. Generally, the MC 120 can operate according to oneor more messaging protocols defined for SMS, EMS, and/or MMS messagingservices.

The MSC 114 is also in communication with a messaging anonymity system(MAS) 126 via an exemplary X₁ interface. In the illustrated embodiment,the MAS 126 is a network element in the wireless telecommunicationsnetwork 100. In an alternative embodiment, the MAS 126 is a networkelement that is in communication with an Internet protocol MultimediaSubsystem (IMS) network, as illustrated in FIG. 2. Each of thesealternative embodiments is described in detail with reference to theaforementioned figures.

The MAS 126 can include hardware, software, or any combination thereof.The MAS 126 can be a stand-alone system (as shown) or can be integratedinto other systems, servers, network elements, nodes, software,hardware, and the like. For example, the MAS 126 or functionalitythereof can be integrated into the MSC 114, the GMSC 118, or the MC 120.The MAS 126 can also be in communication with the MC 120 via anexemplary X₂ interface. The MAS 126 is described in greater detailbelow.

In some embodiments, the MAS 126 or the functionality thereof isincluded in the MC 120. Upon receipt of an incoming message the MAS 126can determine to provision an anonymous subscriber identification (ASI)to be used in lieu of the original subscriber address (e.g., telephonenumber, MSISDN, device URL) to protect the identity of the calling party(sending subscriber). The ASI can be a number string, a characterstring, or any combination thereof, and can be of any length. A specificASI format can be defined by a wireless service provider.

It is contemplated that provisioning rules can dictate how an incomingmessage is processed, that is, whether the incoming message is modifiedso as to include an ASI instead of the original subscriber address. Insome embodiments, a wireless service provider, for example, the providerof the wireless telecommunications network 100 can flag or otherwiseindicate that one or more third-party service providers 127 are to onlyreceive messages processed by the MAS 126 to include an ASI. In someembodiments, the sending subscriber can notify the wireless serviceprovider of his/her preferences regarding specific third-party serviceproviders 127 as to whether anonymity is desired when messaging.

A third-party service provider 127 can be, but is not limited to, anycontent distributor, any retailer, any online retailer, any restaurant,any vending service, any banking service, any delivery service, anyother service provider whatsoever, and the like. A content distributor,for example, can include a sound distributor, a music distributor, anaudio book distributor, a ringtone distributor, a ringback tonedistributor, a video distributor, a movie distributor, an imagedistributor, a video game distributor, an application distributor, ane-book distributor, and a news feed distributor. A vending service, forexample, can include a food and/or beverage vending service, an officesupply vending service, a clothes vending service, a tobacco vendingservice, a medicine vending service, and the like. A banking service,for example, can include a service to access a banking account, such as,but not limited to, a checking account, a savings account, a moneymarket account, a certificate of deposit account, a stock account, aretirement account, a line of credit account, a mortgage account, acredit card account, and the like. A delivery service, for example, caninclude a food and/or beverage delivery service, a gift deliveryservice, a florist delivery service, a movie delivery service, a videogame delivery service, a music delivery service, an audio book deliveryservice, a book delivery service, a package delivery service, a rentalcar delivery service, and the like.

In some embodiments, the MAS 126 or functionality thereof is integratedinto a mobile switching center, such as the MSC 114 or the GMSC 118.Incoming messages can be processed as described above and sent to the MC120 for storage until a messaging channel becomes available, at whichpoint the MC 120 can forward the message with the subscriber identitybeing used as the originating address instead of the original subscriberaddress.

In some embodiments, the MAS 126 can be configured to intercept amessage and process the message for delivery to a third-party serviceprovider 127 according to provisioning rules that can be set by asubscriber, the wireless service provider, or other entity, for example.A message can be intercepted at the MSC 114, GMSC 118, MC 120, or othernetwork element. Alternatively, the MC 120 can communicate with the MAS126 for instructions on how to modify a received message according toprovisioning rules stored in the MAS 126.

The illustrated third-party service provider 127 is not illustrated asbeing in communication with any particular network node or element. Assuch, it is contemplated that a third-party service provider 127 can bein communication with the wireless telecommunications network 100 viathe PSTN 122, the ISDN 124, the PDN 132 (e.g., the Internet), or via anynetwork node or element illustrated. In some embodiments, thethird-party service provider 127 is in communication with the wirelesstelecommunications network 100 via a network gateway (not illustrated),for example.

The MSC 114 is also in communication with an equipment identity register(EIR) 128 via an F interface. The EIR 128 is a database that can beconfigured to identify subscriber devices that are permitted to accessthe wireless telecommunications network 100. An International MobileEquipment Identity (IMEI) is a unique identifier that is allocated toeach mobile equipment and can be used to identify subscriber devices inthe EIR 128. The IMEI includes a type approval code, a final assemblycode, a serial number, and a spare digit. An IMEI is typically placed inthe EIR 128 once its operation has been certified for the infrastructurein a laboratory or validation facility.

The EIR 128 and the HLR/AuC 117 are each in communication with the SGSN112 via the Gf interface and the Gr interface, respectively. The SGSN112, in turn, is in communication with a gateway GPRS support node(GGSN) 130 via the Gn interface. The GGSN 130 is configured to providean edge routing function within a GPRS network to external packet datanetworks (PDN) 132, such as the Internet and one or more intranets, forexample. The GGSN 130 is in communication with the PDN 132 via the Giinterface. The GGSN 130 can include firewall and filteringfunctionality. The HLR/AuC 117 can be in communication with the GGSN 130via the Gc interface.

The SGSN 112 is also in communication with another PLMN 134 via anexternal GGSN 136. The external GGSN 136 provides access to the otherPLMN 134 that can be, for example, a wireless telecommunications networkoperated by another wireless service provider the same wireless serviceprovider.

The second RAN, illustrated in the lower left hand portion of FIG. 1, isdedicated to UMTS-based network access and is now described. Theillustrated wireless telecommunications network 100 also includes afirst user equipment (UE) 138 and a second UE 140 that are each incommunication with a Node B 142 via the Uu radio (air) interface. A NodeB 142 is the terminating node for the radio interface in the second RAN.Each Node B 142 can include one or more transceivers for transmissionand reception of data across the radio interface. Each Node B 142 isconfigured to apply the codes to describe channels in a CDMA-based UMTSnetwork. Generally, the Node B 142 performs similar functions for theUMTS network that the BTS 106 performs for the GSM network.

In the illustrated embodiment, the first UE 138 is a mobile phone andthe second UE 140 is a portable computer, such as a laptop with anintegrated or external, removable UMTS card. Each UE 138, 140 caninclude mobile equipment, such as keyboards, screens, touch screens,multi-touch screens, radio transceivers, circuit boards, processors, aSIM/universal SIM (US1M) that contains subscriber information to enablenetwork access to the wireless telecommunications network 100, and thelike. Generally, the UE's 138, 140 perform similar functions for theUMTS network that the MS's 102, 104 perform for the GSM network.

Each Node B 142 is in communication with a radio network controller(RNC) 144 via the lub interface. The RNC 144 is configured to allocateradio resources to the UE's 138, 140, administer frequencies, andcontrol handovers between Node B's 142 (and others not shown). Althoughillustrated as a distinct element, the RNC 144 functions can be locatedwith the Node B's 142. In this embodiment, the lub interface iseliminated. Generally, the RNC 144 performs similar functions for theUMTS network that the BSC 108 performs for the GSM network.

The RNC 144 is in communication with the MSC 114 via an lu-CS interface.The RNC 144 is also in communication with the SGSN 112 via an lu-PSinterface. The other network elements perform the same functions for theUMTS network as described above for the GSM network.

Referring now to FIG. 2, an exemplary Internet protocol MultimediaSubsystem (IMS) network 200 in which the present disclosure can beimplemented is illustrated. The IMS network 200 includes an IMS corenetwork 202 and a several access networks 204, 206, 208, 210. The IMScore network 202 primarily includes a call session control function(CSCF) 212 and a home subscriber server (HSS) 214 as illustrated,although other elements, not illustrated, are contemplated. The CSCF 212facilitates session initiation protocol (SIP) session control for SIPsession setup and SIP session teardown. The CSCF 212 communicates withthe HSS 214. The HSS 214 acts as the master database of subscribers andis configured to function similar to the HLR/AuC 117.

The CSCF 212 can be divided into three logical divisions (not shown)including a proxy-CSCF (P-CSCF), an interrogating-CSCF (I-CSCF), and aserving-CSCF (S-CSCF). The P-CSCF operates as the entry point in the IMScore network 202. The P-CSCF is configured to forward SIP messagesreceived from a device that is in communication with one of the accessnetworks 204, 206, 208, 210. The SIP messages can be sent to the I-CSCFor S-CSCF depending on the type of message and intended action. TheP-CSCF is also configured to generate call detail records. The I-CSCF isconfigured to register, route and forward SIP messages within the IMScore network 202. The S-CSCF is configured to manage deviceregistrations, maintain sessions, interact with other services, performcharging functions, and provide security.

The access networks can include, as illustrated, a broadband wirelessaccess network 204, such as wireless local area network (WLAN) and WiMaxnetworks, a broadband cable access network 206, such as cable Internetprovider networks, a fixed access network 208, such as the PSTN 122, theISDN 124, and an xDSL network, and a mobile access network 210, such as2G and 3G networks including the wireless telecommunications network100, for example.

The IMS core network 202 is in communication with a MAS 126. The MAS126, in turn, is in communication with a third-party service provider127 and an application server 216. The application server 216 can beconfigured to operate as a messaging center, emulating an SMSC or MMSC,for example. Alternatively, the MAS 126 can communicate with a legacynetwork messaging center, such as the MC 120 to provide messagingcapabilities in the IMS network 200. Presently, a few IMS messagingsolutions are available and others are in development or are slotted forfuture development. Any IMS messaging solution can be used to implementthe various features of the present disclosure described herein.

In some embodiments, the MAS 126 or the functionality thereof isincluded in the IMS core network 202 or the application server 216. Uponreceipt of an incoming message the MAS 126 can determine to provision anASI to be used in lieu of the original subscriber address (e.g.,telephone number, MSISDN, device URL) to protect the identity of thecalling party (sending subscriber). It is contemplated that provisioningrules can dictate how an incoming message is processed, that is, whetherthe incoming message is modified so as to include an alias (the ASI)instead of the original subscriber address. In some embodiments, aservice provider, for example, the provider of an access network 204,206, 208, 210 can flag or otherwise indicate that one or morethird-party service providers 127 are to only receive messages processedby the MAS 126 to include an ASI in an effort to maintain the anonymityof the sending subscriber. In some embodiments, the sending subscribercan notify the IMS service provider of his/her preferences regardinganonymous messaging when communicating with one or more third-partyservice providers 127.

In some embodiments, the MAS 126 can be configured to intercept amessage and process the message for delivery to a third-party serviceprovider 127 according to provisioning rules that can be set by asubscriber, an application provider, an access network provider, an IMSnetwork provider, or other entity, for example.

FIG. 3 illustrates a schematic block diagram of an exemplary device 300,such as, the MSs 102, 104 or the UEs 138, 140 for use in accordance withsome exemplary embodiments of the present disclosure. Although noconnections are shown between the components illustrated in FIG. 3, thecomponents can interact with each other to carry out device functions.

It should be understood that FIG. 3 and the following description areintended to provide a brief, general description of a suitableenvironment in which the various aspects of some embodiments of thepresent disclosure can be implemented. While the description includes ageneral context of computer-executable instructions, the presentdisclosure can also be implemented in combination with other programmodules and/or as a combination of hardware and software. The term“application,” or variants thereof, is used expansively herein toinclude routines, program modules, programs, components, datastructures, algorithms, and the like. Applications can be implemented onvarious system configurations, including single-processor ormultiprocessor systems, minicomputers, mainframe computers, personalcomputers, hand-held computing devices, microprocessor-based,programmable consumer electronics, combinations thereof, and the like.

The device 300 can be a multimode headset, and can include a variety ofcomputer readable media, including volatile media, non-volatile media,removable media, and non-removable media. The term “computer-readablemedia” and variants thereof, as used in the specification and claims,can include storage media and communication media. Storage media caninclude volatile and/or non-volatile, removable and/or non-removablemedia such as, for example, RAM, ROM, EEPROM, flash memory or othermemory technology, CD ROM, DVD, or other optical disk storage, magnetictape, magnetic disk storage or other magnetic storage devices, or anyother medium that can be used to store the desired information and thatcan be accessed by the device 300.

The device 300 can include a display 302 for displaying multimedia suchas, for example, text, images, video, telephony functions such as CallerID data, setup functions, menus, music, metadata, messages, wallpaper,graphics, Internet content, device status, preferences settings, map andlocation data, and the like. The device 300 can include a processor 304for controlling, and/or processing data. A memory 306 can interface withthe processor 304 for the storage of data and/or applications 308.

An application 308 can include, for example, SMS messaging software, EMSmessaging software, MMS messaging software, and the like. Theapplication 308 can also include a user interface (UI) application 310.The UI application 310 can interface with a client 312 (e.g., anoperating system) to facilitate user interaction with devicefunctionality and data, for example, entering message content, viewingreceived messages, answering/initiating calls, entering/deleting data,password entry and setting, configuring settings, address bookmanipulation, and the like. The applications 308 can include otherapplications 314 such as, for example, add-ons, plug-ins, emailapplications, music applications, video applications, cameraapplications, location-based service (LBS) applications, powerconservation applications, combinations thereof, and the like, as wellas subsystems and/or components. The applications 308 can be stored inthe memory 306 and/or in a firmware 316, and can be executed by theprocessor 304. The firmware 316 can also store code for execution duringinitialization of the device 300.

A communications component 318 can interface with the processor 304 tofacilitate wired/wireless communications with external systemsincluding, for example, cellular networks, location systems, VoIPnetworks, local area networks (LAN's), wide area networks (WAN's),metropolitan area networks (MAN's), personal area networks (PAN's), andother networks, which can be implemented using WIFI®, WIMAX™,combinations and/or improvements thereof, and the like. Thecommunications component 318 can also include a multimode communicationssubsystem for providing cellular communications via different cellulartechnologies. For example, a first cellular transceiver 320 can operatein one mode, for example, GSM, and an Nth transceiver 322 can operate ina different mode, for example UMTS. While only two transceivers 320, 322are illustrated, it should be appreciated that a plurality oftransceivers can be included. The communications component 318 can alsoinclude a transceiver 324 for other communications technologies such as,for example, WIFI®, WIMAX™, BLUETOOTH®, infrared, IRDA, NFC, RF, and thelike. The communications component 318 can also facilitate receptionfrom terrestrial radio networks, digital satellite radio networks,Internet-based radio services networks, combinations thereof, and thelike. The communications component 318 can process data from a networksuch as, for example, the Internet, a corporate intranet, a homebroadband network, a WIFI® hotspot, and the like, via an ISP, DSLprovider, or broadband provider.

An input/output (I/O) interface 326 can be provided for input/output ofdata and/or signals. The I/O interface 326 can be a hardwire connection,such as, for example, a USB, mini-USB, audio jack, PS2, IEEE 1394,serial, parallel, Ethernet (RJ48), RJ11, and the like, and can acceptother I/O devices such as, for example, keyboards, keypads, mice,interface tethers, stylus pens, printers, thumb drives, touch screens,multi-touch screens, touch pads, trackballs, joy sticks, microphones,remote control devices, monitors, displays, liquid crystal displays(LCDs), combinations thereof, and the like. It should be appreciatedthat the I/O interface 326 can be used for communications between thedevice and a network or local device, instead of, or in addition to, thecommunications component 318.

Audio capabilities can be provided by an audio I/O component 328 thatcan include a speaker for the output of audio signals and a microphoneto collect audio signals. The device 300 can include a slot interface330 for accommodating a subscriber identity system 332 such as, forexample, a SIM or universal SIM (USIM). The subscriber identity system332 instead can be manufactured into the device 300, thereby obviatingthe need for a slot interface 330. In some embodiments, the subscriberidentity system 332 can store certain features, user characteristics,rules, policies, models, and the like. The subscriber identity system332 can be programmed by a manufacturer, a retailer, a user, a computer,a network operator, and the like.

The device 300 can include an image capture and processing system 334(image system). Photos and/or videos can be obtained via an associatedimage capture subsystem of the image system 334, for example, a camera.The device 300 can also include a video system 336 for capturing,processing, recording, modifying, and/or transmitting video content.

A location component 338, can be included to send and/or receive signalssuch as, for example, GPS data, A-GPS data, WIFI®/WIMAX™ and/or cellularnetwork triangulation data, combinations thereof, and the like. Thelocation component 338 can interface with cellular network nodes,telephone lines, satellites, location transmitters and/or beacons,wireless network transmitters and receivers, for example, WIFI®hotspots, radio transmitters, combinations thereof, and the like. Thedevice 300 can obtain, generate, and/or receive data to identify itslocation, or can transmit data used by other devices to determine thedevice 300 location. The device 300 can include a power source 340 suchas batteries and/or other power subsystem (AC or DC). The power source340 can interface with an external power system or charging equipmentvia a power I/O component 342.

FIG. 4 schematically illustrates a block diagram of an MAS 126 accordingto an exemplary embodiment of the present disclosure. The MAS 126 can bea combination of hardware and software, and can exist as a node on acommunications network, such as the wireless telecommunications network100 and/or the IMS network 200. The illustrated MAS 126 includes one ormore network interfaces 400 that are operatively linked and incommunication with one or more processors 402 via one or moredata/memory busses 404. The network interface 400 can be used to allowthe MAS 126 to communicate with one or more components of thecommunications network 100, 200 or any device (e.g. device 300)connected thereto or residing thereon. The processor 402 is operativelylinked and in communication with a memory 406 via the data/memory bus404.

The word “memory,” as used herein to describe the memory 406,collectively includes all memory types associated with the MAS 126 suchas, but not limited to, processor registers, processor cache, randomaccess memory (RAM), other volatile memory forms, and non-volatile,semi-permanent or permanent memory types; for example, tape-based media,optical media, solid state media, hard disks, combinations thereof, andthe like. While the memory 406 is illustrated as residing proximate theprocessor 402, it should be understood that the memory 406 can be aremotely accessed storage system, for example, a server on the PDN 132(e.g. the Internet), a remote hard disk drive, a removable storagemedium, combinations thereof, and the like. Moreover, the memory 406 isintended to encompass network memory and/or other storage devices inwired or wireless communication with the MAS 126, which may utilize thenetwork interface 400 to facilitate such communication. Thus, any of therules, data, applications, and/or software described below can be storedwithin the memory 406 and/or accessed via network connections to otherdata processing systems (not shown) that may include a local areanetwork (LAN), a metropolitan area network (MAN), or a wide area network(WAN), for example. Accordingly, the present disclosure may operate onthe MAS 126, wherein the MAS 126 is configured as a server to one ormore client data processing systems as dictated by a client/servermodel. It should be appreciated that the memory 406 can also be astorage device associated with the device 300. The illustrated memory406 can include one or more provisioning rules 408, a third-partyservice provider database 410, and/or other data 412 (e.g.,preferences).

The provisioning rules 408 can include rules used by the MAS 126 indetermining to provision an ASI to be used in lieu of a subscriberaddress that is associated with a subscriber's mobile device (e.g.,device 300). Provisioning rules 408 can be defined for one or morethird-party service providers identified in the third-party serviceprovider database 410. Provisioning rules 408 can be defined to randomlyassign an ASI for use in the present messaging communication or one ormore future messaging communications between the device 300 and athird-party service provider. Provisioning rules 408 can also be definedbased upon ASI selection criteria provided by the wireless serviceprovider, the subscriber, or other entity. Preferences can be stored asthe illustrated other data 412. Provisioning rules 408 can be defined touse an ASI for a temporary time period or can be defined permanently.

It is contemplated that the MAS 126 can be configured to storeapplications to perform steps of the methods described herein below.Applications can include, for example, programs, routines, subroutines,algorithms, software, tools, and the like. For example, applications caninclude a user interface application for allowing a user, such as anetwork technician, to define provisioning rules 408 for ASI's asrelated to various third-party service providers.

Referring now to FIG. 5, a method 500 for operating an MAS 126 isillustrated, according to exemplary embodiment of the presentdisclosure. It should be understood that the steps of the method 500 arenot necessarily presented in any particular order and that performanceof some or all the steps in an alternative order(s) is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. It should also be understood that the illustratedmethod 500 can be ended at any time. Some or all steps of this process,and/or substantially equivalent steps, can be performed by execution ofcomputer-readable instructions included on a computer readable medium.

The method 500 begins and flow proceeds to block 502 wherein the MAS 126receives a mobile-originated (MO) message from a mobile device 300. Atdecision block 504, the MAS 126 can determine whether to provision anASI for the MO message. The MAS 126 can make this determination basedupon provisioning rules 408, for example.

In some embodiments, the MAS 126 can identify one or more third-partyservice providers that are viewed as legitimate or illegitimate basedupon the provisioning rules 408. The legitimacy of a third-party serviceprovider can be contingent upon agreements between the wireless serviceprovider and a third-party service provider 127 to protect theidentities of a wireless service provider's subscribers. For example, asubscriber can be offered an option to opt-out of allowing theirsubscriber address (e.g., telephone number, MSISDN, device URL) to beshared with parties when messaging. In some instances messages that arereceived at a subscriber's device are not provoked. That is, thesubscriber did not request to receive a message from the third-partyservice provider 127. Out of curiosity or otherwise, the subscriber mayrespond unbeknownst to them that the third-party service provider 127 isnot providing a legitimate service, rather is phishing for sensitivesubscriber data, such as a subscriber's telephone or other subscriberaddress. Accordingly, the present disclosure provides protection in thisand other instances in which a subscriber address should not be sharedwith a third-party service provider 127.

If it is determined at block 504 that an ASI is not to be provisionedfor the MO message, the MAS 126 can allow the message to pass-throughwith the original subscriber address as the originating address, atblock 506. The method 500 can end.

If it is determined at block 504 that an ASI is to be provisioned forthe MO message, the MAS 126 can provision an ASI for the currentmessaging communication, at block 508. At block 510, the MAS 126 cansend the MO message to a third-party service provider including the ASIas the originating subscriber address. The method 500 can end.

Referring now to FIG. 6, a method 600 for operating an MAS 126 isillustrated, according to another exemplary embodiment of the presentdisclosure. It should be understood that the steps of the method 600 arenot necessarily presented in any particular order and that performanceof some or all the steps in an alternative order(s) is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. It should also be understood that the illustratedmethod 600 can be ended at any time. Some or all steps of this process,and/or substantially equivalent steps, can be performed by execution ofcomputer-readable instructions included on a computer readable medium.

The method 600 begins and flow proceeds to block 602 wherein the MAS 126receives an MO message from a mobile device 300. At decision block 604,the MAS 126 can determine whether to provision an ASI for the MOmessage. The MAS 126 can make this determination based upon provisioningrules 408.

If it is determined at block 604 that an ASI is not to be provisionedfor the MO message, the MAS 126 can allow the message to pass-throughwith the original subscriber address as the originating address, atblock 606. The method 600 can end.

If it is determined at block 604 that an ASI is to be provisioned forthe MO message, the MAS 126 can provision an ASI, at block 608. At block610, the MAS 126 can store the ASI as being associated with the originalsubscriber address of the mobile device for one or more future messagingcommunications. At block 612, the MAS 126 can send the MO message to athird-party service provider 127 including the ASI as the originatingsubscriber address. The method 600 can end.

Referring now to FIG. 7, a method 700 for operating an MAS 126 isillustrated, according to another exemplary embodiment of the presentdisclosure. It should be understood that the steps of the method 700 arenot necessarily presented in any particular order and that performanceof some or all the steps in an alternative order(s) is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. It should also be understood that the illustratedmethod 700 can be ended at any time. Some or all steps of this process,and/or substantially equivalent steps, can be performed by execution ofcomputer-readable instructions included on a computer readable medium.

The method 700 begins and flow proceeds to block 702 wherein the MAS 126receives a MO message from a mobile device 300. At decision block 704,the MAS 126 can determine whether to provision an ASI for the MOmessage. The MAS 126 can make this determination based upon provisioningrules 408.

If it is determined at block 704 that an ASI is not to be provisionedfor the MO message, the MAS 126 can allow the message to pass-throughwith the original subscriber address as the originating address, atblock 706. The method 700 can end.

If it is determined at block 704 that an ASI is to be provisioned forthe MO message, flow can proceed to block 708 wherein the MAS 126 candetermine whether to provision the ASI based upon ASI selection criteriaprovided by the wireless service provider, a subscriber, or otherentity, for example. If it is determined at block 708 that an ASI is notto be provisioned for the MO message based upon ASI selection criteria,the MAS 126 can provision an ASI according to other provisioning rules,at block 710. If it is determined at block 708 that an ASI is to beprovisioned for the MO message based upon ASI selection criteria, theMAS 126 can provision an ASI based upon the ASI selection criteria, atblock 712.

Following either of the above cases, at block 714, the MAS 126 can sendthe MO message to a third-party service provider 127 including the ASIas the originating subscriber address. The method 700 can end.

Referring now to FIG. 8, a method 800 for operating an MAS 126 isillustrated, according to another exemplary embodiment of the presentdisclosure. It should be understood that the steps of the method 800 arenot necessarily presented in any particular order and that performanceof some or all the steps in an alternative order(s) is possible and iscontemplated. The steps have been presented in the demonstrated orderfor ease of description and illustration. Steps can be added, omittedand/or performed simultaneously without departing from the scope of theappended claims. It should also be understood that the illustratedmethod 800 can be ended at any time. Some or all steps of this process,and/or substantially equivalent steps, can be performed by execution ofcomputer-readable instructions included on a computer readable medium.

The method 800 begins and flow proceeds to block 802 wherein a mobiledevice 300 receives a mobile-terminated (MT) message from a third-partyservice provider 127. At block 804, the mobile device 300 generates a MOmessage to be sent in response to the MT message. In some embodiments,the MO message is generated automatically in response to the MT messagebeing received. In some embodiments, the MO message is automaticallygenerated based upon subscriber preferences to automatically respond tomessages received from certain third-party service providers 127. Insome embodiments, the MO message is provoked to generation by the MTmessage resulting in a spontaneous response message to the third-partyservice provider 127, sometimes unbeknownst to the subscriber.

At block 806, the mobile device 300 sends the MO message to the MAS 126.At block 808 wherein the MAS 126 receives the MO message from the mobiledevice 300. At decision block 810, the MAS 126 can determine whether toprovision an ASI for the MO message. The MAS 126 can make thisdetermination based upon provisioning rules 408.

If it is determined at block 810 that an ASI is not to be provisionedfor the MO message, the MAS 126 can allow the message to pass-throughwith the original subscriber address as the originating address, atblock 812. The method 800 can end.

If it is determined at block 810 that an ASI is to be provisioned forthe MO message, the MAS 126 can provision an ASI, at block 814. At block816, the MAS 126 can send the MO message to a third-party serviceprovider 127 including the ASI as the originating subscriber address.The method 800 can end.

The law does not require and it is economically prohibitive toillustrate and teach every possible embodiment of the present claims.Hence, the above-described embodiments are merely exemplaryillustrations of implementations set forth for a clear understanding ofthe principles of the disclosure. Variations, modifications, andcombinations may be made to the above-described embodiments withoutdeparting from the scope of the claims. All such variations,modifications, and combinations are included herein by the scope of thisdisclosure and the following claims.

What is claimed is:
 1. A method, comprising: receiving, by a processorin a messaging anonymity system, a mobile-originated message from amobile device, the mobile-originated message being destined for athird-party service provider; determining, by the processor in themessaging anonymity system, whether an anonymous subscriberidentification should be provisioned to be used in lieu of a subscriberaddress that is associated with the mobile device, based on provisioningrules defined for the third-party service provider; responsive to adetermination that the anonymous subscriber identification should beprovisioned: provisioning automatically the anonymous subscriberidentification to be used in lieu of the subscriber address associatedwith the mobile device by randomly assigning the anonymous subscriberidentification, the anonymous subscriber identification randomlyassigned is used in a future messaging communication conducted betweenthe mobile device and the third-party service provider; and sending themobile-originated message to the third-party service provider, theanonymous subscriber identification being presented to the third-partyservice provider as the subscriber address associated with the mobiledevice; and responsive to a determination that the anonymous subscriberidentification should not be provisioned, sending the mobile-originatedmessage to the third party service provider and presenting anoriginating subscriber address of the mobile device as the subscriberaddress associated with the mobile device.
 2. The method of claim 1,wherein the mobile-originated message is sent by the mobile device inresponse to a mobile-terminated message from the third-party serviceprovider being received at the mobile device.
 3. The method of claim 1,wherein the mobile-originated message received from the mobile device isa spontaneous message.
 4. The method of claim 1, wherein assigning theanonymous subscriber identification is based upon anonymous subscriberidentification selection criteria.
 5. The method of claim 4, wherein theanonymous subscriber identification selection criteria comprises atleast one of a wireless communications service provider preference and asubscriber preference.
 6. A system, comprising: a processor; and amemory having stored thereon instructions that, when executed by theprocessor, cause the processor to perform operations comprising:receiving a mobile-originated message from a mobile device, themobile-originated message being destined for a third-party serviceprovider; determining whether an anonymous subscriber identificationshould be provisioned to be used in lieu of a subscriber address that isassociated with the mobile device, based on provisioning rules definedfor the third-party service provider; responsive to a determination thatthe anonymous subscriber identification should be provisioned:provisioning automatically the anonymous subscriber identification to beused in lieu of the subscriber address associated with the mobile deviceby randomly assigning the anonymous subscriber identification, theanonymous subscriber identification randomly assigned is used in afuture messaging communication conducted between the mobile device andthe third-party service provider; and sending the mobile-originatedmessage to the third-party service provider, the anonymous subscriberidentification being presented to the third-party service provider asthe subscriber address associated with the mobile device; and responsiveto a determination that the anonymous subscriber identification shouldnot be provisioned, sending the mobile-originated message to thethird-party service provider and presenting an originating subscriberaddress of the mobile device as the subscriber address associated withthe mobile device.
 7. The system of claim 6, wherein themobile-originated message is sent by the mobile device in response to amobile-terminated message received from the third-party service providerat the mobile device.
 8. The system of claim 6, wherein themobile-originated message received from the mobile device is aspontaneous message.
 9. The system of claim 6, wherein assigning theanonymous subscriber identification is based upon anonymous subscriberidentification selection criteria.
 10. The system of claim 9, whereinthe anonymous subscriber identification selection criteria comprises atleast one of a wireless communications service provider preference and asubscriber preference.
 11. A non-transitory computer-readable mediumcomprising computer executable instructions that, when executed by aprocessor in a messaging anonymity system, cause the processor toperform operations comprising: receiving a mobile-originated messagefrom a mobile device, the mobile originated message being destined for athird-party service provider; determining whether an anonymoussubscriber identification should be provisioned to be used in lieu of asubscriber address that is associated with the mobile device, based onprovisioning rules defined for the third-party service provider;responsive to a determination that the anonymous subscriberidentification should be provisioned: provisioning automatically theanonymous subscriber identification to be used in lieu of the subscriberaddress associated with the mobile device by randomly assigning theanonymous subscriber identification, the anonymous subscriberidentification randomly assigned is used in a future messagingcommunication conducted between the mobile device and the third-partyservice provider; and sending the mobile-originated message to thethird-party service provider, the anonymous subscriber identificationbeing presented to the third-party service provider as the subscriberaddress associated with the mobile device; and responsive to adetermination that the anonymous subscriber identification should not beprovisioned, sending the mobile-originated message to the third partyservice provider and presenting an originating subscriber address of themobile device as the subscriber address associated with the mobiledevice.
 12. The non-transitory computer-readable medium of claim 11,wherein the mobile-originated message received from the mobile device isa spontaneous message.
 13. The non-transitory computer-readable mediumof claim 11, wherein assigning the anonymous subscriber identificationis based upon anonymous subscriber identification selection criteria.14. The non-transitory computer-readable medium of claim 13, wherein theanonymous subscriber identification selection criteria comprises atleast one of a wireless communications service provider preference and asubscriber preference.