US20120128144A1 - Screening system and method - Google Patents
Screening system and method Download PDFInfo
- Publication number
- US20120128144A1 US20120128144A1 US13/363,723 US201213363723A US2012128144A1 US 20120128144 A1 US20120128144 A1 US 20120128144A1 US 201213363723 A US201213363723 A US 201213363723A US 2012128144 A1 US2012128144 A1 US 2012128144A1
- Authority
- US
- United States
- Prior art keywords
- assigned
- screening
- originator
- telephone number
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1076—Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
- H04L65/1079—Screening of IP real time communications, e.g. spam over Internet telephony [SPIT] of unsolicited session attempts, e.g. SPIT
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
Definitions
- This invention relates to an incoming communications screening system.
- the invention relates to an automated system and method for enabling users to block and manage unwanted calls, text messages.
- Unsolicited telemarketing communications such as incoming calls have been identified by the Canadian and American governments as a serious problem, as is evident in the fact that both countries have initiated the implementation of national ‘do not call lists’ (DNCL).
- DNCL national ‘do not call lists’
- Rules regarding DNCL have numerous proposed exceptions to telemarketing rules that will allow charities, political parties, polling companies, businesses with existing business relationship, and others to telemarket to those listed on the DNCL.
- DNCL national ‘do not call lists’
- call-blocking services which allow subscribers to manually manage all calls from specific callers or category of calls (e.g. all 900 calling codes, all toll-free codes, or all calls where caller identification information is unavailable) that the subscriber identifies.
- call-blocking services are static lists with little or no exclusion capabilities and may only capture a fraction of the telemarketing calls; the blocking parameters have to be determined in advance; and they may prevent desired calls from reaching the recipient.
- SMS messages short message service
- XMS extended Messaging Service
- Mobile phone users may receive unwanted text messages such as marketing, advertising or similar messages. In addition to merely being unwanted, in some instances unwanted text messages may cost the mobile phone user money. Mobile phone users may be required to pay their mobile phone service providers for each text message they receive—whether wanted or unwanted. While recipients may delete the unwanted messages, the user is still interrupted and can not take advantage of the experience of other recipients of messages from the same originator.
- FIG. 1 is a schematic view of a list of suspect callers (‘greylist’) and examples of rules that may be associated with the greylist.
- greylist a list of suspect callers
- FIGS. 2A , 2 B, 2 C and 2 D illustrate a flowchart depicting one embodiment of a telephone call screen management system (TMG) according to the system and method of the invention.
- TMG telephone call screen management system
- FIG. 3 is a flowchart depicting an embodiment of a post-call management system according to the invention.
- FIG. 4 is a schematic illustration of how an inbound call may be treated in the system of FIGS. 2A , 2 B, 2 C and 2 D.
- FIGS. 5A and 5B illustrate a flowchart of the call process flow through the call screening system in the system of FIGS. 2A , 2 B, 2 C and 2 D.
- FIGS. 6A , 6 B, 6 C and 6 D illustrate flowcharts of the processing options of a call flagged as being from a telemarketer (TM) in the system of FIGS. 2A , 2 B, 2 C and 2 D.
- TM telemarketer
- FIG. 7 illustrates a flowchart of a message processing flow through the screen system.
- FIGS. 8A , 8 B, 8 C and 8 D illustrate flowcharts of the processing options of a message flagged as being from a telemarketer in the system.
- CLID means “calling line identification number” and refers to a caller's assigned telephone number or originating number, whether or not the identity of the caller can be determined.
- the telephone number may be a CLID, or may be an Automatic Number Identification (ANI) or a telephone number in any other form.
- ANI Automatic Number Identification
- CLID is used herein solely by way of example of a telephone number format which can be used in the implementation of the invention.
- certain protocols have an originating number which contains information about the sender of the message. The sender ID or originating number serves to identify the party originating the message.
- the invention creates a screening list comprising a dynamic list of suspect originating numbers, or a “greylist,” comprising a list of originating numbers, for example in the form of telephone numbers in conformance with the North American Numbering Plan (NANP), or in any other desired format, along with score ratings as to the likelihood of the originating number being that of a telemarketer (TM) or other unwanted caller or originator of text messages.
- the greylist may be stored in a database maintained by the service provider at a central office or node, for example as a lookup table, and in the preferred embodiment is made accessible to all subscribers to the screening feature.
- the service provider may typically be a telephone company (Telco), and for ease of description the term ‘Telco’ will be used by way of example throughout this description when referring to the service provider, but the service provider can be any entity administering the communication blocking feature whether in a conventional telephone system, wireless system, VOIP system, or otherwise.
- Telco telephone company
- the service provider can be any entity administering the communication blocking feature whether in a conventional telephone system, wireless system, VOIP system, or otherwise.
- the screening list or “greylist” comprises originating numbers which one or more users have identified as belonging to a telemarketer or other undesirable caller or originator of text messages, as determined by the service provider or system administrator.
- the screening list can also be created and/or updated by the service provider entering call or messaging data into the system, for example through one or more algorithms which can identify which of the users in the system may be a telemarketer, examples of which are set out below.
- the users of the system can manage the incoming originating numbers by utilizing a list of acceptable originating numbers or ‘whitelist’ (WL) that the user has identified as being friends, family or other acceptable callers; and a list of unacceptable originating numbers or ‘blacklist’ (BL) that the user has identified as unwanted callers.
- WL acceptable originating numbers
- BL blacklist
- the blacklist and whitelist may be stored in a client database maintained at the Telco server, and optionally also stored locally at the subscriber's premises or mobile phone in order to reduce the need for communications between the Telco and the subscriber when determining how to treat an incoming call or message.
- the whitelist and blacklist are personal to the subscriber, while the greylist is a communal list, common to all subscribers to the screening system.
- an originator ie a caller or sender
- Some factors that might be considered when moving an originator to the greylist or increasing the originator number's greylist score include the frequency between calls and which originator number gets placed on subscribers blacklists or whitelists.
- the invention may comprise a computer program product embodied on a tangible medium for operation on telecommunications hardware for carrying out a method of screening telephone calls or text messages, the program product operative to carry out the steps of: a. maintaining on memory in the telecommunications hardware, a screening list of telephone numbers assigned to suspect callers and/or message senders; b. storing on memory in the telecommunications hardware, one or more rules defining when an assigned telephone number will be added to or removed from the screening list, or modifying a screening value to be assigned to an assigned telephone number on the screening list, or both; c. receiving data relating to suspect callers and/or text message senders; d. applying the one or more rules to the data; e. adding to or removing from the screening list the assigned telephone number, or modifying the screening value assigned to the assigned telephone number, or both, based on the application of the one or more rules to the data; and f.
- FIG. 1 illustrates examples of some rules that can be implemented to create and maintain the greylist for originator's telephone numbers. It will be appreciated that these rules are provided by way of non-limiting example solely to illustrate the principles of the invention.
- the greylist comprises a sublist of CLIDs, or originating numbers, with their associated modifiable scores.
- the first sublist is populated automatically by applying rules to database queries. These rules may for example include the following:
- each individual subscriber determines whether an originating number should be assigned to his or her blacklist or whitelist, and effects this by manual assignment of an originating number to a particular list (for example using their dial pad or a voice recognition menu system)
- rules such as these are used to automatically assign an originating number to the greylist.
- an originating number is added to the greylist based on data received from one or more subscribers (as dictated by the rules) and is assigned an initial score or s‘screening value’ by default.
- the screening value of a particular originating number is modified as further data relating to the originating number is received from subscribers.
- the originating number is flagged as a potential telemarketer (or other unwanted caller or sender of text messages) for all subscribers to the system.
- the greylist is associated with a second sublist that is populated by the service provider setting the scores associated with particular originating numbers. These scores cannot be modified by user input.
- One purpose for this sublist may be to store originating numbers that should never be flagged as a telemarketer, for example, essentially creating a “global whitelist.” For example, it may be desirable to ensure that certain originating numbers associated with government departments, police, telephone carriers, etc., and/or the service provider itself, are never blocked and cannot be inadvertently assigned to a greylist or blacklist.
- the greylist is maintained and managed by the service provider, for example a Telco.
- the service provider for example a Telco.
- No hardware other than the telephone equipment normally used by the user is required, for example the telephone set at their premises to make and receive telephone calls or their mobile phone.
- a conventional telephone or mobile phone set may be modified to store the whitelist and/or blacklist, which as noted above will allow the subscriber's equipment to determine how to treat an incoming call or test message without the need for communications between the Telco and the subscriber.
- the decision to route or block the call can be made at a routing point, for example the Telco's central office, gateway or node.
- the client database is part of the service provider's network and stores the user's telephone number, whitelist and blacklist amongst other things. It exchanges data with the service provider's information services system and provides the greylist with data such as query results.
- a customer subscribes to the screening service, and thereby becomes a user, a record identifying the subscriber and associated with the subscriber's assigned telephone number is added to the client database.
- Customers who are not subscribed to the service may contribute to the functioning of the system. For example, if an originating number is used to try to contact many recipients in a short period of time, the system may put the originating number on a greylist or blacklist, even if many of the intended recipients are non-subscribers. In this way the experience of subscribers is improved based on the characteristics of communications over the entire system, both to subscribers and non-subscribers of the system.
- the system may use a ‘watchlist’ to monitor potential telemarketing originators. Originating numbers on the watchlist may be monitored more closely than other originating numbers to confirm if they are telemarketers or not. For example, originating numbers on the watchlist may be monitored for duration of the calls, the time of day for calls, or other criteria.
- a watchlist By using a watchlist, the system benefits from only doing the more detailed monitoring on a shorter list of originators than all the originating numbers using the system or all the originating numbers on the greylist.
- a user can add an originating number to their blacklist and whitelist by manually entering the phone numbers to be accepted or blocked, for example using the dial pad on their telephone via the call screen management system (as shown in FIG. 2 ) or by reporting the last caller or sender through the same or a separate call screen management system or text message management system after the call is complete (as in FIG. 3 ).
- the user dials a unique preset code, e.g., “*555” or menu option displayed on the screen of their phone.
- this information is communicated to the Telco server, which applies the rules to the data received from the subscriber to add the originating number to the grey list, remove the originating number from the grey list, or modify the screening value or ‘score’ assigned to the originating number on the greylist, which facilitates the ability to set individual subscriber tolerance levels.
- FIGS. 2A , 2 B, 2 C and 2 D depict an example of how the menu system can work in this embodiment of the invention.
- the user can be presented with the option of pressing “1” to access the Enable/Disable setting, pressing “2” to set the tolerance to be applied to the greylist scores (various thresholds for the list transfer parameters may be established by the telco), pressing “3” to set the desired method of treating the call or message, pressing “4” to add a telemarketing number to the user's blacklist and have the number reported to the greylist database, pressing “5” to identify a number to be added to the whitelist, pressing “6” to remove a number from the user's whitelist or blacklist, or pressing “7” to exit the call screen management system, etc.
- a submenu if the user presses “1” from the main menu, they would be presented with the options of pressing “1” to turn the screening system on, or pressing “2” to turn the screening system off. If the user then presses “1” they would hear a pre-recorded message confirming that the system has been enabled. If the user presses “2” they would hear a pre-recorded message confirming that the system has been disabled. The user would then be redirected to the main menu.
- ⁇ B 1 and ⁇ 2 are threshold score values set by the service provider for the low score tolerance and the medium score tolerance respectively. If the user selects anything other than “*” their selection will be confirmed and they will be redirected to the main menu.
- the user presses “3” from the main menu to set how they wish to handle calls or messages screened by the system, for calls they will be presented with the options of pressing “1” to end the call (either immediately or after a predetermined interval, as shown), without the call ringing through, pressing “2” to require the caller to announce their identity and allow the user to accept or reject the call, pressing “3” to play a message indicating that the user does not accept telemarketing calls and to then pass the call through as a conventional call, pressing “4” to play a message indicating that the user does not accept telemarketing calls and to then send the caller through to the voicemail (VM) system (if the user has subscribed to such service), or pressing “*” to return to the main menu. If the user selects anything other than “*”, their selection will be confirmed and they will be redirected to the main menu.
- VM voicemail
- buttons “1” to delete the message without a message notification FIG. 8A
- pressing “2” to deliver a reply message to the message sender requesting a further message providing identifying the sender's name and identity FIG. 8B
- pressing “3” to deliver a reply messaging to the message sender requesting a further message containing an answer to a question such as the intended recipient's name FIG. 8C
- pressing “4” to deliver the message but with a message notification that the message may be unwanted FIG. 8D ).
- the options requiring the sender to send a further message are intended to identify human initiated messages, senders who are likely to receive the request for a further response and be able to provide the response.
- the system requests an answer to a simple question such as to a simple mathematical equation.
- the system may maintain the original message in the system for a predetermined period of time until either a reply message is received from the original sender or the message is deleted.
- Many of the call treatments shown in FIGS. 6A , 6 B, 6 C and 6 D are analogous to those message treatments shown in FIG. 8A , 8 B, 8 C and 8 D.
- FIGS. 8A , 8 B, 8 C, and 8 D show examples of these message treatment options.
- the user If the user pressed “4” from the main menu, they will be prompted to enter the 7- or 10-digit telephone number of the telemarketer (TM) they want to add to their blacklist and thereby have reported to the greylist. The user will have the option of pressing “*” to return to the main menu. If the user enters a valid 7- or 10-digit number and there is room available on the user's blacklist, the number will be read back to the user or displayed on the screen of the phone and the user will be prompted to confirm that they want to add the number to their blacklist. If the user confirms that they wish to add the number to their blacklist, the number is added to the blacklist and a message is played or displayed to indicate that the number has been so added.
- TM telemarketer
- the user will then be redirected to the main menu. If the user does not wish to proceed with adding the number that they entered onto their blacklist, they will be redirected back to the blacklist submenu. If the number that they enter is invalid, a message will be played or displayed to indicate that the number is invalid and the user will be redirected back to the blacklist submenu. If there is insufficient room on the user's blacklist for the number, an error message will be played or displayed and the user will be redirected to the main menu.
- the user If the user pressed “5” from the main menu, they will be prompted to enter the 7- or 10-digit telephone number of the friend or family member, or other acceptable caller or message sender, which they want to add to their whitelist. The user will have the option of pressing “*” to return to the main menu. If the user enters a valid 7- or 10-digit number, the number will be read back to the user or displayed on the screen of the phone and the user will be prompted to confirm that they want to add the number to their whitelist. If the user confirms that they wish to add the number to their whitelist and there is room available on the user's whitelist, a message will be played or displayed to indicate that the number has been so added. The user will then be redirected to the main menu.
- the user If the user pressed “6” from the main menu, they will be prompted to enter the 7- or 10-digit telephone number of the party they wish to remove from either their whitelist or blacklist. The user will have the option of pressing “*” to return to the main menu. If the user enters a valid 7- or 10-digit number, the number will be read back to the user or displayed and the user will be prompted to confirm that they want to remove the number from their whitelist or blacklist. If the user confirms that they wish to remove the number from their whitelist or blacklist, a message will be played or displayed to indicate that the number has been removed. The user will then be redirected to the main menu.
- the screening system may also provide the user with the option of hearing or displaying the numbers or names associated with the numbers on their blacklist and/or whitelist.
- a post-call management tool that will add the last caller to their blacklist or whitelist (as in FIG. 3 ).
- the user can access a post-call management tool that will add the last caller to their blacklist or whitelist (as in FIG. 3 ).
- the user Once the user gains access to this tool by dialling the assigned series of keystrokes, they will be given the option of reporting the last caller as a telemarketer and adding the number to their blacklist, or adding the last caller to their whitelist if the last CLID is valid.
- the user will then be prompted to confirm that they wish to take the action requested. If the user affirms their request and there is room on the appropriate list, the number will be added to the appropriate list.
- a test message screening embodiment when a text message is received, the user can access a message management tool that will add the message sender to their blacklist, if the message is an unwanted message from a telemarketer or to their whitelist if the message is valid. The user may be prompted to confirm their selection. In one embodiment, the user may forward the unwanted text message to an address associated with the Telco or service provider for the screening system to add the originating number associated with the unwanted message to the blacklist.
- All of the settings selected by the user may be stored in the client database at the Telco server.
- the menu will replay a preset number of times or display for a preset amount of time and await a selection, failing which the session is terminated.
- FIGS. 5A and 5B show how an inbound call may be processed.
- the system first checks to see that the originating number (or CLID) is valid, then the call screening system will look up the recipient telephone number in the client database and retrieve the user's settings. If the database indicates that the user has disabled the call screening system, the inbound call does not have a valid originating number, or the caller's originating number is on the user's whitelist, the inbound call will be connected to the recipient as any conventional call.
- the Telco server software will conduct a lookup to determine whether the originating number is on the various lists maintained by the system. If the originating number is on the global or user's whitelist, the Telco server software will route the call through to the subscriber telephone line. If the caller's originating number is on the user's blacklist, then the incoming call is automatically terminated.
- the Telco server software will retrieve the current score associated with the originating number on the greylist. If no entry is found for the originating number, the Telco software will add it to the greylist and assign a default score of 1 to the originating number. If the score is below the level of tolerance selected by the subscriber, the call is routed to the subscriber as a conventional call. If the score is equal to or above the level of tolerance selected by the user, the call is flagged and the call treatment selected by the user is applied, as shown in FIG. 6A pre-selected the option of ending calls flagged as being from a telemarketer, the call is terminated (either immediately or after a predetermined interval).
- the pre-recorded message addressed to telemarketers is played to the caller (as illustrated in FIG. 6C ).
- the caller is then presented with the option of pressing “1” to record a voice message to the recipient or pressing “2” to end the call. If the caller enters “1”, they are put on hold for an interval proportional to the greylist score (sometimes known as “tarpitting”) before being forwarded to the user's voicemail service. If the caller pressed “2”, the call is terminated immediately.
- the caller will be presented with the option of pressing “1” to proceed with the call or pressing “2” to end the call. If the caller enters “1”, they are put on hold for a period of time proportional to the greylist score before being passed through to the user as a conventional call. If no message has been recorded by the caller, the call is terminated. If “2” is selected, the call is terminated.
- a pre-recorded message will be played to the caller giving the caller the option of pressing “1” to leave a message announcing their identity for the recipient, or pressing “2” to end the call. If the user presses “1” they will be prompted to record a message. The screening system will then call the subscriber and play the recorded message, optionally identifying the caller as a potential telemarketer. If the call is not answered, the call will continue as a conventional call, perhaps being redirected to the user's voicemail system.
- the user will then be given the option to press “1” to receive the call, press “2” to forward the call to voicemail, press “3” to terminate the call, or press “4” to play a pre-recorded message that the user does not accept telemarketing calls and then terminate the call.
- a similar process as shown in FIGS. 5 and 6 may be used for incoming text messages as indicated in FIG. 7 .
- the originating number of the message is checked if it is valid, then the number is looked up the recipient's number in the client database and retrieves the user's settings. If the recipient is not using the system or does not have the screening service enabled, the incoming text message is passed through to the recipient.
- the message is passed through to the recipient. If the originating number is on the user's blacklist, the selected message treatment is applied to the message as discussed above with regards to FIGS. 8A , 8 B, 8 C, and 8 D. If the originating number appears on the greylist and has a score below the level of tolerance selected by the subscriber, the message is routed to the recipient as a conventional message. If the score for the originating number is equal to or above the level of tolerance selected by the user, the call is flagged and the treatment selected by the user is applied.
- Internet telephony subscribers may have the option of accessing their call screen management tool via the service provider's website. Similar settings can be presented through that medium.
- all originating numbers are maintained in the greylist with a default screening value, and the screening value of a particular originating number is modified as data relating to the originating number is received from subscribers.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
A system and method for screening incoming communications to a subscriber telephone number comprises a screening list of telephone numbers assigned to suspect incoming communication originators and rules defining when a telephone number will be added to or removed from the screening list or ‘greylist,’ and/or modifying a screening value to be assigned to a telephone number in the greylist. Data relating to an incoming communication is received from subscribers and processed, and the telephone number is screened in accordance with the rules, based on the screening value assigned to the telephone number and optionally a selected subscriber tolerance level. Subscribers may add any telephone number to a personal list of telephone numbers to be blocked (blacklist) or telephone numbers to be accepted (whitelist).
Description
- This invention relates to an incoming communications screening system. In particular, the invention relates to an automated system and method for enabling users to block and manage unwanted calls, text messages.
- Unsolicited telemarketing communications, such as incoming calls have been identified by the Canadian and American governments as a serious problem, as is evident in the fact that both countries have initiated the implementation of national ‘do not call lists’ (DNCL). Rules regarding DNCL, have numerous proposed exceptions to telemarketing rules that will allow charities, political parties, polling companies, businesses with existing business relationship, and others to telemarket to those listed on the DNCL. In addition to those entities who will still be allowed to call numbers registered on the DNCL, there will likely still be noncompliant telemarketers who call numbers listed on the DNCL.
- Several means of screening and/or blocking unwanted calls, such as telemarketing calls, currently exist. For example, some telecommunications companies offer call-blocking services which allow subscribers to manually manage all calls from specific callers or category of calls (e.g. all 900 calling codes, all toll-free codes, or all calls where caller identification information is unavailable) that the subscriber identifies. The limitation of such call-blocking services is that they are static lists with little or no exclusion capabilities and may only capture a fraction of the telemarketing calls; the blocking parameters have to be determined in advance; and they may prevent desired calls from reaching the recipient.
- There are electronic devices on the market which automatically remove the assigned telephone number of the receiving line from computer dialled telemarketing call-lists, by sending a tone when the user picks up the call that falsely indicates to the calling computer that the number is disconnected, so the computer deletes the phone number. This solution does not spare the user from the disturbance of the call, as the call must be answered in order for the device to take effect, and is limited to computer-initiated telemarketing calls. Also, each user cannot take advantage of the experience of other users.
- In another example of incoming communications, mobile phone users can also receive text messages or SMS messages (short message service) that typically consist of a message in the form a short piece of text. Like phone calls, text messages include a sender identifier, often a phone number. Various extended formats for short messages such as XMS (eXtended Messaging Service) have similar functionality for the purposes of this application.
- Mobile phone users may receive unwanted text messages such as marketing, advertising or similar messages. In addition to merely being unwanted, in some instances unwanted text messages may cost the mobile phone user money. Mobile phone users may be required to pay their mobile phone service providers for each text message they receive—whether wanted or unwanted. While recipients may delete the unwanted messages, the user is still interrupted and can not take advantage of the experience of other recipients of messages from the same originator.
- In drawings which illustrate by way of example only a preferred embodiment of the invention,
-
FIG. 1 is a schematic view of a list of suspect callers (‘greylist’) and examples of rules that may be associated with the greylist. -
FIGS. 2A , 2B, 2C and 2D illustrate a flowchart depicting one embodiment of a telephone call screen management system (TMG) according to the system and method of the invention. -
FIG. 3 is a flowchart depicting an embodiment of a post-call management system according to the invention. -
FIG. 4 is a schematic illustration of how an inbound call may be treated in the system ofFIGS. 2A , 2B, 2C and 2D. -
FIGS. 5A and 5B illustrate a flowchart of the call process flow through the call screening system in the system ofFIGS. 2A , 2B, 2C and 2D. -
FIGS. 6A , 6B, 6C and 6D illustrate flowcharts of the processing options of a call flagged as being from a telemarketer (TM) in the system ofFIGS. 2A , 2B, 2C and 2D. -
FIG. 7 illustrates a flowchart of a message processing flow through the screen system. -
FIGS. 8A , 8B, 8C and 8D illustrate flowcharts of the processing options of a message flagged as being from a telemarketer in the system. - Embodiments of the present invention are described below and illustrated in the Figures by way of example only. As used in the following description, the term “CLID” means “calling line identification number” and refers to a caller's assigned telephone number or originating number, whether or not the identity of the caller can be determined. The telephone number may be a CLID, or may be an Automatic Number Identification (ANI) or a telephone number in any other form. The term CLID is used herein solely by way of example of a telephone number format which can be used in the implementation of the invention. For text messages, certain protocols have an originating number which contains information about the sender of the message. The sender ID or originating number serves to identify the party originating the message.
- In one preferred embodiment the invention creates a screening list comprising a dynamic list of suspect originating numbers, or a “greylist,” comprising a list of originating numbers, for example in the form of telephone numbers in conformance with the North American Numbering Plan (NANP), or in any other desired format, along with score ratings as to the likelihood of the originating number being that of a telemarketer (TM) or other unwanted caller or originator of text messages. The greylist may be stored in a database maintained by the service provider at a central office or node, for example as a lookup table, and in the preferred embodiment is made accessible to all subscribers to the screening feature. The service provider may typically be a telephone company (Telco), and for ease of description the term ‘Telco’ will be used by way of example throughout this description when referring to the service provider, but the service provider can be any entity administering the communication blocking feature whether in a conventional telephone system, wireless system, VOIP system, or otherwise.
- The screening list or “greylist” comprises originating numbers which one or more users have identified as belonging to a telemarketer or other undesirable caller or originator of text messages, as determined by the service provider or system administrator. The screening list can also be created and/or updated by the service provider entering call or messaging data into the system, for example through one or more algorithms which can identify which of the users in the system may be a telemarketer, examples of which are set out below. The users of the system can manage the incoming originating numbers by utilizing a list of acceptable originating numbers or ‘whitelist’ (WL) that the user has identified as being friends, family or other acceptable callers; and a list of unacceptable originating numbers or ‘blacklist’ (BL) that the user has identified as unwanted callers. The blacklist and whitelist may be stored in a client database maintained at the Telco server, and optionally also stored locally at the subscriber's premises or mobile phone in order to reduce the need for communications between the Telco and the subscriber when determining how to treat an incoming call or message.
- According to the invention, the whitelist and blacklist are personal to the subscriber, while the greylist is a communal list, common to all subscribers to the screening system. Thus, depending upon the rules adopted by the service provider or system administrator, an originator, ie a caller or sender, may be moved to the greylist or its greylist score increased by the event of being added to one or more subscriber's blacklists, either over a specific time interval, cumulatively, or some other process. Some factors that might be considered when moving an originator to the greylist or increasing the originator number's greylist score include the frequency between calls and which originator number gets placed on subscribers blacklists or whitelists.
- In an embodiment the invention may comprise a computer program product embodied on a tangible medium for operation on telecommunications hardware for carrying out a method of screening telephone calls or text messages, the program product operative to carry out the steps of: a. maintaining on memory in the telecommunications hardware, a screening list of telephone numbers assigned to suspect callers and/or message senders; b. storing on memory in the telecommunications hardware, one or more rules defining when an assigned telephone number will be added to or removed from the screening list, or modifying a screening value to be assigned to an assigned telephone number on the screening list, or both; c. receiving data relating to suspect callers and/or text message senders; d. applying the one or more rules to the data; e. adding to or removing from the screening list the assigned telephone number, or modifying the screening value assigned to the assigned telephone number, or both, based on the application of the one or more rules to the data; and f.
-
- screening a call from the assigned telephone number to a subscriber in accordance with one or more rules based on the assigned telephone number being in the screening list or on the screening value assigned to the assigned telephone number, or both.
-
FIG. 1 illustrates examples of some rules that can be implemented to create and maintain the greylist for originator's telephone numbers. It will be appreciated that these rules are provided by way of non-limiting example solely to illustrate the principles of the invention. - As illustrated in
FIG. 1 , using the example of a caller's telephone number, the greylist comprises a sublist of CLIDs, or originating numbers, with their associated modifiable scores. The first sublist is populated automatically by applying rules to database queries. These rules may for example include the following: -
- 1. Add to the greylist any originating number that makes over X1 number of calls over Y1 timeframe to Z1 number of people;
- 2. Add to the greylist any originating number that has been added to X2 number of user blacklists over a time interval of Y2;
- 3. Remove from the greylist any originating number that has not been added to any user blacklists and who's greylist score has not increased over a time interval of Y3; and/or
- 4. Remove from the greylist any originating number that has been added to X4 number of user whitelists (users' independent lists of originating number that they have identified as being friends or family, stored on the client database) in Y4 timeframe,
where the variables X, Y, and Z are threshold values set by the Telco (or other service provider or administrator of the system).
- Whereas each individual subscriber determines whether an originating number should be assigned to his or her blacklist or whitelist, and effects this by manual assignment of an originating number to a particular list (for example using their dial pad or a voice recognition menu system), rules such as these are used to automatically assign an originating number to the greylist. In this embodiment, an originating number is added to the greylist based on data received from one or more subscribers (as dictated by the rules) and is assigned an initial score or s‘screening value’ by default. The screening value of a particular originating number is modified as further data relating to the originating number is received from subscribers. Once on the greylist, the originating number is flagged as a potential telemarketer (or other unwanted caller or sender of text messages) for all subscribers to the system. Thus, the more subscribers there are, the faster unwanted originators, such as callers or senders, become listed on the greylist and the entire community of subscribers benefits from the experiences of the other subscribers.
- Preferably the greylist is associated with a second sublist that is populated by the service provider setting the scores associated with particular originating numbers. These scores cannot be modified by user input. One purpose for this sublist may be to store originating numbers that should never be flagged as a telemarketer, for example, essentially creating a “global whitelist.” For example, it may be desirable to ensure that certain originating numbers associated with government departments, police, telephone carriers, etc., and/or the service provider itself, are never blocked and cannot be inadvertently assigned to a greylist or blacklist.
- The greylist is maintained and managed by the service provider, for example a Telco. No hardware other than the telephone equipment normally used by the user is required, for example the telephone set at their premises to make and receive telephone calls or their mobile phone. A conventional telephone or mobile phone set may be modified to store the whitelist and/or blacklist, which as noted above will allow the subscriber's equipment to determine how to treat an incoming call or test message without the need for communications between the Telco and the subscriber. However, in an embodiment of the invention the decision to route or block the call can be made at a routing point, for example the Telco's central office, gateway or node.
- As shown in
FIG. 4 , the client database is part of the service provider's network and stores the user's telephone number, whitelist and blacklist amongst other things. It exchanges data with the service provider's information services system and provides the greylist with data such as query results. When a customer subscribes to the screening service, and thereby becomes a user, a record identifying the subscriber and associated with the subscriber's assigned telephone number is added to the client database. Customers who are not subscribed to the service may contribute to the functioning of the system. For example, if an originating number is used to try to contact many recipients in a short period of time, the system may put the originating number on a greylist or blacklist, even if many of the intended recipients are non-subscribers. In this way the experience of subscribers is improved based on the characteristics of communications over the entire system, both to subscribers and non-subscribers of the system. - In one embodiment, the system may use a ‘watchlist’ to monitor potential telemarketing originators. Originating numbers on the watchlist may be monitored more closely than other originating numbers to confirm if they are telemarketers or not. For example, originating numbers on the watchlist may be monitored for duration of the calls, the time of day for calls, or other criteria. By using a watchlist, the system benefits from only doing the more detailed monitoring on a shorter list of originators than all the originating numbers using the system or all the originating numbers on the greylist.
- An exemplary embodiment of the invention is explained below with regarding to call screening by way of non-limiting example, in accordance with the exemplary embodiment shown in the drawings. It will be appreciated that the particular selection of parameters such as keystrokes, menus, functions, prompts, commands and others may be varied without departing from the principles of the invention, and the invention is not intended to be limited thereby.
- A user can add an originating number to their blacklist and whitelist by manually entering the phone numbers to be accepted or blocked, for example using the dial pad on their telephone via the call screen management system (as shown in
FIG. 2 ) or by reporting the last caller or sender through the same or a separate call screen management system or text message management system after the call is complete (as inFIG. 3 ). To gain access to the screening management system menu, the user dials a unique preset code, e.g., “*555” or menu option displayed on the screen of their phone. In either case this information is communicated to the Telco server, which applies the rules to the data received from the subscriber to add the originating number to the grey list, remove the originating number from the grey list, or modify the screening value or ‘score’ assigned to the originating number on the greylist, which facilitates the ability to set individual subscriber tolerance levels. - The following are some tools which may be accessed through menus in an automated attendant system. These examples are provided solely for illustrative purposes and are not to be construed as essential or an exhaustive list.
- When the screening management system is first accessed, the user will be guided by an automated attendant (such as is commonly known to those skilled in the art) through a series of menus to set up their screening system. The user may hear a voice message indicating the status of their screening management service, then a pre-recorded main menu, indicating to the user which number to press on their dial pad to change certain settings in the system or the system will display the current status and menu options on a display screen associated with their phone.
FIGS. 2A , 2B, 2C and 2D depict an example of how the menu system can work in this embodiment of the invention. The user can be presented with the option of pressing “1” to access the Enable/Disable setting, pressing “2” to set the tolerance to be applied to the greylist scores (various thresholds for the list transfer parameters may be established by the telco), pressing “3” to set the desired method of treating the call or message, pressing “4” to add a telemarketing number to the user's blacklist and have the number reported to the greylist database, pressing “5” to identify a number to be added to the whitelist, pressing “6” to remove a number from the user's whitelist or blacklist, or pressing “7” to exit the call screen management system, etc. - In an example of a submenu, if the user presses “1” from the main menu, they would be presented with the options of pressing “1” to turn the screening system on, or pressing “2” to turn the screening system off. If the user then presses “1” they would hear a pre-recorded message confirming that the system has been enabled. If the user presses “2” they would hear a pre-recorded message confirming that the system has been disabled. The user would then be redirected to the main menu.
- If the user presses “2” from the main menu to set their desired greylist tolerance, they would be presented with the option of pressing “1” to never allow any calls or messages through from originating numbers that have ever been marked as a telemarketer, pressing “2” to only allow callers or message senders through who have a score less than β1, pressing “3” to only allow callers or message senders through who have a score less than β2 (where β2>β1), or pressing “*” to return to the main menu. βB1 and β2 are threshold score values set by the service provider for the low score tolerance and the medium score tolerance respectively. If the user selects anything other than “*” their selection will be confirmed and they will be redirected to the main menu.
- If the user presses “3” from the main menu to set how they wish to handle calls or messages screened by the system, for calls, they will be presented with the options of pressing “1” to end the call (either immediately or after a predetermined interval, as shown), without the call ringing through, pressing “2” to require the caller to announce their identity and allow the user to accept or reject the call, pressing “3” to play a message indicating that the user does not accept telemarketing calls and to then pass the call through as a conventional call, pressing “4” to play a message indicating that the user does not accept telemarketing calls and to then send the caller through to the voicemail (VM) system (if the user has subscribed to such service), or pressing “*” to return to the main menu. If the user selects anything other than “*”, their selection will be confirmed and they will be redirected to the main menu.
- For messages, they may be presented with the options of pressing “1” to delete the message without a message notification (
FIG. 8A ), pressing “2” to deliver a reply message to the message sender requesting a further message providing identifying the sender's name and identity (FIG. 8B ), pressing “3” to deliver a reply messaging to the message sender requesting a further message containing an answer to a question such as the intended recipient's name (FIG. 8C ), pressing “4” to deliver the message but with a message notification that the message may be unwanted (FIG. 8D ). The options requiring the sender to send a further message are intended to identify human initiated messages, senders who are likely to receive the request for a further response and be able to provide the response. In one embodiment, the system requests an answer to a simple question such as to a simple mathematical equation. In the message treatments requiring a response discussed above, the system may maintain the original message in the system for a predetermined period of time until either a reply message is received from the original sender or the message is deleted. Many of the call treatments shown inFIGS. 6A , 6B, 6C and 6D are analogous to those message treatments shown inFIG. 8A , 8B, 8C and 8D.FIGS. 8A , 8B, 8C, and 8D show examples of these message treatment options. - If the user pressed “4” from the main menu, they will be prompted to enter the 7- or 10-digit telephone number of the telemarketer (TM) they want to add to their blacklist and thereby have reported to the greylist. The user will have the option of pressing “*” to return to the main menu. If the user enters a valid 7- or 10-digit number and there is room available on the user's blacklist, the number will be read back to the user or displayed on the screen of the phone and the user will be prompted to confirm that they want to add the number to their blacklist. If the user confirms that they wish to add the number to their blacklist, the number is added to the blacklist and a message is played or displayed to indicate that the number has been so added. The user will then be redirected to the main menu. If the user does not wish to proceed with adding the number that they entered onto their blacklist, they will be redirected back to the blacklist submenu. If the number that they enter is invalid, a message will be played or displayed to indicate that the number is invalid and the user will be redirected back to the blacklist submenu. If there is insufficient room on the user's blacklist for the number, an error message will be played or displayed and the user will be redirected to the main menu.
- If the user pressed “5” from the main menu, they will be prompted to enter the 7- or 10-digit telephone number of the friend or family member, or other acceptable caller or message sender, which they want to add to their whitelist. The user will have the option of pressing “*” to return to the main menu. If the user enters a valid 7- or 10-digit number, the number will be read back to the user or displayed on the screen of the phone and the user will be prompted to confirm that they want to add the number to their whitelist. If the user confirms that they wish to add the number to their whitelist and there is room available on the user's whitelist, a message will be played or displayed to indicate that the number has been so added. The user will then be redirected to the main menu. If the user does not wish to proceed with adding the number that they entered onto their whitelist, they will be redirected back to the whitelist submenu. If the number that they enter is invalid, a message will be played or displayed to indicate that the number is invalid and the user will be redirected back to the whitelist submenu. If there is insufficient room on the user's whitelist for the number, an error message will be played or displayed and the user will be redirected to the main menu.
- If the user pressed “6” from the main menu, they will be prompted to enter the 7- or 10-digit telephone number of the party they wish to remove from either their whitelist or blacklist. The user will have the option of pressing “*” to return to the main menu. If the user enters a valid 7- or 10-digit number, the number will be read back to the user or displayed and the user will be prompted to confirm that they want to remove the number from their whitelist or blacklist. If the user confirms that they wish to remove the number from their whitelist or blacklist, a message will be played or displayed to indicate that the number has been removed. The user will then be redirected to the main menu. If the user indicates that they do not wish to proceed with removing the number that they entered, they will be redirected back to the submenu for removing a number. If the number that they enter is invalid, a message will be played or displayed to indicate that the number is invalid and the user will be redirected back to the submenu for removing a number.
- The screening system may also provide the user with the option of hearing or displaying the numbers or names associated with the numbers on their blacklist and/or whitelist.
- In a call screening embodiment, by entering a preset series of keystrokes, for example a *-number code, the user can access a post-call management tool that will add the last caller to their blacklist or whitelist (as in
FIG. 3 ). Once the user gains access to this tool by dialling the assigned series of keystrokes, they will be given the option of reporting the last caller as a telemarketer and adding the number to their blacklist, or adding the last caller to their whitelist if the last CLID is valid. The user will then be prompted to confirm that they wish to take the action requested. If the user affirms their request and there is room on the appropriate list, the number will be added to the appropriate list. If the user responds in the negative, they will be redirected to the main menu. If there is no room left on the list to add another number, an error message will be played or displayed and the management session terminated. If the last CLID is invalid, an error message will be played or displayed and the call management session will be terminated. - In a test message screening embodiment, when a text message is received, the user can access a message management tool that will add the message sender to their blacklist, if the message is an unwanted message from a telemarketer or to their whitelist if the message is valid. The user may be prompted to confirm their selection. In one embodiment, the user may forward the unwanted text message to an address associated with the Telco or service provider for the screening system to add the originating number associated with the unwanted message to the blacklist.
- All of the settings selected by the user may be stored in the client database at the Telco server.
- At any menu, if the user fails to make a selection, the menu will replay a preset number of times or display for a preset amount of time and await a selection, failing which the session is terminated.
-
FIGS. 5A and 5B show how an inbound call may be processed. When an inbound call is detected, the system first checks to see that the originating number (or CLID) is valid, then the call screening system will look up the recipient telephone number in the client database and retrieve the user's settings. If the database indicates that the user has disabled the call screening system, the inbound call does not have a valid originating number, or the caller's originating number is on the user's whitelist, the inbound call will be connected to the recipient as any conventional call. - If the call screening system is enabled and the inbound call has a valid originating number, the Telco server software will conduct a lookup to determine whether the originating number is on the various lists maintained by the system. If the originating number is on the global or user's whitelist, the Telco server software will route the call through to the subscriber telephone line. If the caller's originating number is on the user's blacklist, then the incoming call is automatically terminated.
- If the originating number is already on the greylist, the Telco server software will retrieve the current score associated with the originating number on the greylist. If no entry is found for the originating number, the Telco software will add it to the greylist and assign a default score of 1 to the originating number. If the score is below the level of tolerance selected by the subscriber, the call is routed to the subscriber as a conventional call. If the score is equal to or above the level of tolerance selected by the user, the call is flagged and the call treatment selected by the user is applied, as shown in
FIG. 6A pre-selected the option of ending calls flagged as being from a telemarketer, the call is terminated (either immediately or after a predetermined interval). - If the user pre-selected the option of sending flagged calls to voicemail, the pre-recorded message addressed to telemarketers is played to the caller (as illustrated in
FIG. 6C ). The caller is then presented with the option of pressing “1” to record a voice message to the recipient or pressing “2” to end the call. If the caller enters “1”, they are put on hold for an interval proportional to the greylist score (sometimes known as “tarpitting”) before being forwarded to the user's voicemail service. If the caller pressed “2”, the call is terminated immediately. - If the user pre-selected the option of accepting telemarketing calls (the default setting illustrated in
FIG. 6D ), the pre-recorded message addressed to telemarketers is played to the caller, then the caller will be presented with the option of pressing “1” to proceed with the call or pressing “2” to end the call. If the caller enters “1”, they are put on hold for a period of time proportional to the greylist score before being passed through to the user as a conventional call. If no message has been recorded by the caller, the call is terminated. If “2” is selected, the call is terminated. - If the user pre-selected the option of requesting that a greylist caller announce themselves (as illustrated in
FIG. 6B ), a pre-recorded message will be played to the caller giving the caller the option of pressing “1” to leave a message announcing their identity for the recipient, or pressing “2” to end the call. If the user presses “1” they will be prompted to record a message. The screening system will then call the subscriber and play the recorded message, optionally identifying the caller as a potential telemarketer. If the call is not answered, the call will continue as a conventional call, perhaps being redirected to the user's voicemail system. If the call is answered, the user will then be given the option to press “1” to receive the call, press “2” to forward the call to voicemail, press “3” to terminate the call, or press “4” to play a pre-recorded message that the user does not accept telemarketing calls and then terminate the call. - A similar process as shown in
FIGS. 5 and 6 may be used for incoming text messages as indicated inFIG. 7 . The originating number of the message is checked if it is valid, then the number is looked up the recipient's number in the client database and retrieves the user's settings. If the recipient is not using the system or does not have the screening service enabled, the incoming text message is passed through to the recipient. - If the originating number of message is on the global whitelist or the recipient's whitelist, the message is passed through to the recipient. If the originating number is on the user's blacklist, the selected message treatment is applied to the message as discussed above with regards to
FIGS. 8A , 8B, 8C, and 8D. If the originating number appears on the greylist and has a score below the level of tolerance selected by the subscriber, the message is routed to the recipient as a conventional message. If the score for the originating number is equal to or above the level of tolerance selected by the user, the call is flagged and the treatment selected by the user is applied. - Internet telephony subscribers may have the option of accessing their call screen management tool via the service provider's website. Similar settings can be presented through that medium.
- In a further embodiment of the invention, all originating numbers are maintained in the greylist with a default screening value, and the screening value of a particular originating number is modified as data relating to the originating number is received from subscribers.
- Various embodiments of the present invention having been thus described in detail by way of example, it will be apparent to those skilled in the art that variations and modifications may be made without departing from the invention.
Claims (18)
1. A method of screening incoming communications originating at originating number, comprising the steps of:
a. maintaining a screening list of originating numbers assigned to suspect originators;
b. storing one or more rules defining when an originator's assigned originating number will be added to or removed from the screening list, or modifying a screening value to be assigned to the originator's assigned originating number on the screening list, or both;
c. receiving data relating to suspect originators;
d. applying the one or more rules to the data;
e. adding to or removing from the screening list the originator's assigned originating number, or modifying the screening value assigned to the originator's assigned originating number, or both, based on the application of the one or more rules to the data; and
f. screening an incoming communication from the sender's assigned originating number to a recipient in accordance with one or more rules based on the originator's assigned originating number being in the screening list or on the screening value assigned to the originator's assigned originating number, or both.
2. The method of claim 1 wherein step f. comprises the sub-step of establishing a recipient tolerance level based on the screening value.
3. The method of claim 2 wherein one of a plurality of options for blocking, allowing or confirming the incoming communication is performed based on the recipient tolerance level.
4. The method of claim 1 comprising, at any time, the step of a recipient assigning an originator's assigned originating number to a blocked sender list or to a list of acceptable senders.
5. The method of claim 1 wherein some or all of the data is received from recipients relating to incoming communications messages received by the recipients
6. The method of claim 1 wherein some or all of the data is received from an administrator of the system.
7. A system for screening incoming communications to a recipient telephone number, comprising
at least one database, for maintaining a screening list of telephone numbers assigned to suspect communication originators and one or more rules defining when an originator's assigned telephone number will be added to or removed from the screening list, or modifying a screening value to be assigned to an originator's assigned telephone number on the screening list, or both; and
a data processing device, for
receiving data relating to suspect originators and applying the one or more rules to the data,
adding to or removing from the screening list the originator's assigned telephone number, or modifying the screening value assigned to the originator's assigned telephone number, or both, based on the application of the one or more rules to the data; and
screening a text message from the originator's assigned telephone number to a recipient in accordance with one or more rules, based on the originator's assigned telephone number being in the screening list or on the screening value assigned to the originator's assigned telephone number, or both.
8. The system of claim 7 wherein the data processing device screens an incoming communication from the originator's assigned telephone number to a recipient based on the screening value.
9. The system of claim 8 wherein the data processing device screens an incoming communication from the originator's assigned telephone number to a recipient based on a preset recipient tolerance level.
10. The system of claim 7 wherein the recipient can assign an originator's assigned telephone number to a blocked sender list or to a list of acceptable originators.
11. The system of claim 7 wherein some or all of the data is received from recipients relating to incoming communications received by the recipients.
12. The system of claim 7 wherein some or all of the data is received from an administrator of the system.
13. A computer program product embodied on a tangible medium for operation on telecommunications hardware for carrying out a method of screening incoming communications, the program product operative to carry out the steps of:
a. maintaining on memory in the telecommunications hardware, a screening list of telephone numbers assigned to suspect communication originators;
b. storing on memory in the telecommunications hardware, one or more rules defining when an originator's assigned telephone number will be added to or removed from the screening list, or modifying a screening value to be assigned to an originator's assigned telephone number on the screening list, or both;
c. receiving data relating to suspect originators;
d. applying the one or more rules to the data;
e. adding to or removing from the screening list the originator's assigned telephone number, or modifying the screening value assigned to the originator's assigned telephone number, or both, based on the application of the one or more rules to the data; and
f. screening an incoming communication from the originator's assigned telephone number to a recipient in accordance with one or more rules based on the originator's assigned telephone number being in the screening list or on the screening value assigned to the originator's assigned telephone number, or both.
14. The computer program product of claim 13 wherein step f. comprises the sub-step of establishing a recipient tolerance level based on the screening value.
15. The computer program product of claim 14 wherein one of a plurality of options for blocking, allowing or confirming the incoming communication is performed based on the recipient tolerance level.
16. The computer program product of claim 15 comprising, at any time, the step of assigning a telephone number to a blocked originator list or to a list of acceptable originators based on input by a recipient to the telecommunications hardware.
17. The computer program product of claim 13 wherein some or all of the data is received from recipients relating to incoming communications received by the recipients.
18. The computer program product of claim 13 wherein some or all of the data is received from an administrator of the system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/363,723 US20120128144A1 (en) | 2007-08-15 | 2012-02-01 | Screening system and method |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2597977 | 2007-08-15 | ||
CA2597377A CA2597377C (en) | 2007-08-15 | 2007-08-15 | Call screening system and method |
PCT/CA2008/001465 WO2009021332A1 (en) | 2007-08-15 | 2008-08-13 | Call screening system and method |
US67337711A | 2011-02-18 | 2011-02-18 | |
US13/363,723 US20120128144A1 (en) | 2007-08-15 | 2012-02-01 | Screening system and method |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CA2008/001465 Continuation WO2009021332A1 (en) | 2007-08-15 | 2008-08-13 | Call screening system and method |
US67337711A Continuation | 2007-08-15 | 2011-02-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120128144A1 true US20120128144A1 (en) | 2012-05-24 |
Family
ID=40350323
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/673,377 Active 2029-04-20 US8577002B2 (en) | 2007-08-15 | 2008-08-13 | Call screening system and method |
US13/363,723 Abandoned US20120128144A1 (en) | 2007-08-15 | 2012-02-01 | Screening system and method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/673,377 Active 2029-04-20 US8577002B2 (en) | 2007-08-15 | 2008-08-13 | Call screening system and method |
Country Status (3)
Country | Link |
---|---|
US (2) | US8577002B2 (en) |
CA (1) | CA2597377C (en) |
WO (1) | WO2009021332A1 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140177479A1 (en) * | 2012-12-21 | 2014-06-26 | Centurylink Intellectual Property Llc | No Call List Deterrent |
US8781093B1 (en) * | 2012-04-18 | 2014-07-15 | Google Inc. | Reputation based message analysis |
US8917843B2 (en) * | 2012-10-17 | 2014-12-23 | Kedlin Company, LLC | Methods and systems for inbound call control |
US20160036991A1 (en) * | 2009-05-20 | 2016-02-04 | Peerless Network, Inc. | Auto-dialer detector for inter-carrier network switch |
US20160309024A1 (en) * | 2015-04-20 | 2016-10-20 | YouMail, Inc | System and method for identifying unwanted callers and rejecting or otherwise disposing of calls from same |
US9736300B2 (en) | 2012-12-21 | 2017-08-15 | Centurylink Intellectual Property Llc | Blocking unsolicited calls from CallerID-spoofing autodialing devices |
US9819797B2 (en) | 2012-10-17 | 2017-11-14 | Kedlin Company, LLC | Methods and systems for inbound call control |
US20170353593A1 (en) * | 2015-05-22 | 2017-12-07 | Tencent Technology (Shenzhen) Company Limited | Communication event processing method and apparatus |
US10051121B2 (en) * | 2015-04-20 | 2018-08-14 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US10230837B2 (en) | 2012-10-17 | 2019-03-12 | Kedlin Company, LLC | Methods and systems for inbound and outbound call control |
US20190238595A1 (en) * | 2018-01-30 | 2019-08-01 | Comcast Cable Communications, Llc | Voice Call Controller |
US10904392B2 (en) | 2016-08-01 | 2021-01-26 | Youmail, Inc. | System and method for facilitating setup and joining of conference calls |
US11363139B2 (en) | 2019-06-25 | 2022-06-14 | Youmail, Inc. | Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks |
US11665278B2 (en) | 2021-03-10 | 2023-05-30 | International Business Machines Corporation | Contextual call handling mechanism with learned relationship filter |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10469556B2 (en) | 2007-05-31 | 2019-11-05 | Ooma, Inc. | System and method for providing audio cues in operation of a VoIP service |
US9225626B2 (en) | 2007-06-20 | 2015-12-29 | Ooma, Inc. | System and method for providing virtual multiple lines in a communications system |
US20090168755A1 (en) * | 2008-01-02 | 2009-07-02 | Dennis Peng | Enforcement of privacy in a VoIP system |
US9002333B1 (en) * | 2008-08-11 | 2015-04-07 | Trend Micro Inc. | Mobile device reputation system |
US20110150191A1 (en) * | 2009-12-18 | 2011-06-23 | Mitel Networks Corporation | Method and apparatus for call handling |
US9191498B2 (en) * | 2010-04-29 | 2015-11-17 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for handling anonymous calls |
US8630393B2 (en) * | 2010-07-27 | 2014-01-14 | Marchex, Inc. | System and method for blocking telephone calls |
CN101938583B (en) * | 2010-09-03 | 2012-12-05 | 电子科技大学 | Method for filtering abnormal call based on multiple lists |
US20120159580A1 (en) * | 2010-11-24 | 2012-06-21 | Galwas Paul Anthony | Method of Establishing Trusted Contacts With Access Rights In a Secure Communication System |
KR102081926B1 (en) * | 2012-12-04 | 2020-02-26 | 엘지전자 주식회사 | Moble terminal and method for reciving call |
US8634520B1 (en) * | 2013-01-31 | 2014-01-21 | Marchex, Inc. | Call tracking system utilizing an automated filtering function |
CN104113466A (en) * | 2013-04-17 | 2014-10-22 | 腾讯科技(深圳)有限公司 | Harassing phone call identification method, client, server and system |
US9078134B2 (en) * | 2013-08-28 | 2015-07-07 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Security recommendations for providing information in a communication system |
US9560198B2 (en) | 2013-09-23 | 2017-01-31 | Ooma, Inc. | Identifying and filtering incoming telephone calls to enhance privacy |
US9386148B2 (en) | 2013-09-23 | 2016-07-05 | Ooma, Inc. | Identifying and filtering incoming telephone calls to enhance privacy |
US9288319B2 (en) * | 2013-12-18 | 2016-03-15 | Aaron Foss | Call management system |
US9232056B2 (en) * | 2014-04-02 | 2016-01-05 | Xiang Liu | Apparatus for blocking unwanted telephone calls and faxes |
US10553098B2 (en) | 2014-05-20 | 2020-02-04 | Ooma, Inc. | Appliance device integration with alarm systems |
US9633547B2 (en) | 2014-05-20 | 2017-04-25 | Ooma, Inc. | Security monitoring and control |
US10769931B2 (en) | 2014-05-20 | 2020-09-08 | Ooma, Inc. | Network jamming detection and remediation |
US11330100B2 (en) | 2014-07-09 | 2022-05-10 | Ooma, Inc. | Server based intelligent personal assistant services |
US9432506B2 (en) * | 2014-12-23 | 2016-08-30 | Intel Corporation | Collaborative phone reputation system |
US10911368B2 (en) | 2015-05-08 | 2021-02-02 | Ooma, Inc. | Gateway address spoofing for alternate network utilization |
US9521069B2 (en) | 2015-05-08 | 2016-12-13 | Ooma, Inc. | Managing alternative networks for high quality of service communications |
US10771396B2 (en) | 2015-05-08 | 2020-09-08 | Ooma, Inc. | Communications network failure detection and remediation |
US11171875B2 (en) | 2015-05-08 | 2021-11-09 | Ooma, Inc. | Systems and methods of communications network failure detection and remediation utilizing link probes |
US10009286B2 (en) | 2015-05-08 | 2018-06-26 | Ooma, Inc. | Communications hub |
US10116796B2 (en) | 2015-10-09 | 2018-10-30 | Ooma, Inc. | Real-time communications-based internet advertising |
JP6584993B2 (en) * | 2016-03-31 | 2019-10-02 | Nttテクノクロス株式会社 | Call processing system and call processing method |
US10116656B1 (en) * | 2016-06-03 | 2018-10-30 | Symantec Corporation | Systems and methods for enabling calls to bypass call-blocking functions |
US9986079B1 (en) * | 2016-11-04 | 2018-05-29 | Republic Wireless, Inc. | Virtual telephony assistant |
US10110741B1 (en) * | 2017-07-25 | 2018-10-23 | Teltech Systems, Inc. | Determining and denying call completion based on detection of robocall or telemarketing call |
WO2019075382A1 (en) | 2017-10-13 | 2019-04-18 | Soleo Communications, Inc. | Robocall detection |
CA3020143A1 (en) * | 2018-10-09 | 2020-04-09 | Telus Communications Inc. | System and method for limiting incoming spam calls |
US10798241B1 (en) * | 2019-06-25 | 2020-10-06 | Youmail, Inc. | System and method for determining unwanted call origination in communications networks |
US11330406B1 (en) | 2021-01-29 | 2022-05-10 | T-Mobile Usa, Inc. | Caller identifier |
US12028479B2 (en) * | 2021-09-06 | 2024-07-02 | AO Kaspersky Lab | System and method for protecting subscriber data in the event of unwanted calls |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7613286B2 (en) * | 2006-06-02 | 2009-11-03 | Uangel Corporation | Automatic identification and blocking method of spam cell |
US7787606B2 (en) * | 2005-07-19 | 2010-08-31 | Lg Electronics Inc. | Communication terminal and reception blocking method thereof |
US7873695B2 (en) * | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6289084B1 (en) | 1998-05-29 | 2001-09-11 | Lucent Technologies Inc. | Apparatus, method and system for personal telecommunication call screening and alerting |
US6631182B1 (en) | 1998-07-29 | 2003-10-07 | Ameritech Corporation | Call screening apparatus and method |
US20030072426A1 (en) * | 2001-09-26 | 2003-04-17 | Richard Davidson | Method for processing potentially unwanted calls |
US7236577B2 (en) * | 2002-11-14 | 2007-06-26 | International Business Machines Corporation | Call screening system and method |
US6990187B2 (en) | 2003-04-25 | 2006-01-24 | Lucent Technologies Inc. | Methods for blocking repeated occurrences of nuisance calls |
US7715538B2 (en) * | 2003-04-29 | 2010-05-11 | At&T Intellectual Property I, L.P. | Privacy screening services |
US7295660B1 (en) | 2003-10-23 | 2007-11-13 | Aol Llc | Telemarketer screening |
US20050185784A1 (en) | 2004-02-20 | 2005-08-25 | Samuel Chiu | Method and electronic device for selective telephone call screening |
US8270588B2 (en) * | 2006-10-04 | 2012-09-18 | Ronald Schwartz | Method and system for incoming call management |
TWI413400B (en) * | 2006-12-13 | 2013-10-21 | Htc Corp | Methods and systems for screening incoming calls, and machine readable medium thereof |
-
2007
- 2007-08-15 CA CA2597377A patent/CA2597377C/en active Active
-
2008
- 2008-08-13 US US12/673,377 patent/US8577002B2/en active Active
- 2008-08-13 WO PCT/CA2008/001465 patent/WO2009021332A1/en active Application Filing
-
2012
- 2012-02-01 US US13/363,723 patent/US20120128144A1/en not_active Abandoned
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7873695B2 (en) * | 2004-05-29 | 2011-01-18 | Ironport Systems, Inc. | Managing connections and messages at a server by associating different actions for both different senders and different recipients |
US7787606B2 (en) * | 2005-07-19 | 2010-08-31 | Lg Electronics Inc. | Communication terminal and reception blocking method thereof |
US7613286B2 (en) * | 2006-06-02 | 2009-11-03 | Uangel Corporation | Automatic identification and blocking method of spam cell |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160036991A1 (en) * | 2009-05-20 | 2016-02-04 | Peerless Network, Inc. | Auto-dialer detector for inter-carrier network switch |
US9729586B2 (en) * | 2009-05-20 | 2017-08-08 | Peerless Networks, Inc. | Auto-dialer detector for inter-carrier network switch |
US8781093B1 (en) * | 2012-04-18 | 2014-07-15 | Google Inc. | Reputation based message analysis |
US20140295802A1 (en) * | 2012-04-18 | 2014-10-02 | Google Inc. | Reputation based message analysis |
US9094325B2 (en) * | 2012-04-18 | 2015-07-28 | Google Inc. | Reputation based message analysis |
US8917843B2 (en) * | 2012-10-17 | 2014-12-23 | Kedlin Company, LLC | Methods and systems for inbound call control |
US10230837B2 (en) | 2012-10-17 | 2019-03-12 | Kedlin Company, LLC | Methods and systems for inbound and outbound call control |
US9491286B2 (en) | 2012-10-17 | 2016-11-08 | Kedlin Company, LLC | Methods and systems for inbound call control |
US9819797B2 (en) | 2012-10-17 | 2017-11-14 | Kedlin Company, LLC | Methods and systems for inbound call control |
US9154597B2 (en) * | 2012-12-21 | 2015-10-06 | Centurylink Intellectual Property Llc | No call list deterrent |
US20140177479A1 (en) * | 2012-12-21 | 2014-06-26 | Centurylink Intellectual Property Llc | No Call List Deterrent |
US10097688B2 (en) * | 2012-12-21 | 2018-10-09 | Centurylink Intellectual Property Llc | Blocking unsolicited calls from CallerID-spoofing autodialing devices |
US9736300B2 (en) | 2012-12-21 | 2017-08-15 | Centurylink Intellectual Property Llc | Blocking unsolicited calls from CallerID-spoofing autodialing devices |
US9591131B2 (en) * | 2015-04-20 | 2017-03-07 | Youmail, Inc. | System and method for identifying unwanted callers and rejecting or otherwise disposing of calls from same |
US11695869B2 (en) * | 2015-04-20 | 2023-07-04 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US10051121B2 (en) * | 2015-04-20 | 2018-08-14 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US20170134575A1 (en) * | 2015-04-20 | 2017-05-11 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US10110739B2 (en) * | 2015-04-20 | 2018-10-23 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US20160309024A1 (en) * | 2015-04-20 | 2016-10-20 | YouMail, Inc | System and method for identifying unwanted callers and rejecting or otherwise disposing of calls from same |
US20190098132A1 (en) * | 2015-04-20 | 2019-03-28 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US12113933B2 (en) * | 2015-04-20 | 2024-10-08 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US10498887B2 (en) * | 2015-04-20 | 2019-12-03 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US12107993B2 (en) * | 2015-04-20 | 2024-10-01 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US20200244804A1 (en) * | 2015-04-20 | 2020-07-30 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US20240031480A1 (en) * | 2015-04-20 | 2024-01-25 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US20240031478A1 (en) * | 2015-04-20 | 2024-01-25 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US10992803B2 (en) * | 2015-04-20 | 2021-04-27 | Youmail, Inc. | System and method for identifying and handling unwanted callers using a call answering system |
US11115527B2 (en) * | 2015-04-20 | 2021-09-07 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US20220060579A1 (en) * | 2015-04-20 | 2022-02-24 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US11716417B2 (en) * | 2015-04-20 | 2023-08-01 | Youmail, Inc. | System and method for identifying unwanted communications using communication fingerprinting |
US20170353593A1 (en) * | 2015-05-22 | 2017-12-07 | Tencent Technology (Shenzhen) Company Limited | Communication event processing method and apparatus |
US10587741B2 (en) * | 2015-05-22 | 2020-03-10 | Tencent Technology (Shenzhen) Company Limited | Communication event processing method and apparatus |
US11606464B2 (en) | 2016-08-01 | 2023-03-14 | Youmail, Inc. | System and method for facilitating setup and joining of conference calls |
US10904392B2 (en) | 2016-08-01 | 2021-01-26 | Youmail, Inc. | System and method for facilitating setup and joining of conference calls |
US10735474B2 (en) * | 2018-01-30 | 2020-08-04 | Comcast Cable Communications, Llc | Voice call controller |
US20190238595A1 (en) * | 2018-01-30 | 2019-08-01 | Comcast Cable Communications, Llc | Voice Call Controller |
US11363139B2 (en) | 2019-06-25 | 2022-06-14 | Youmail, Inc. | Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks |
US11665278B2 (en) | 2021-03-10 | 2023-05-30 | International Business Machines Corporation | Contextual call handling mechanism with learned relationship filter |
Also Published As
Publication number | Publication date |
---|---|
US8577002B2 (en) | 2013-11-05 |
US20110170680A1 (en) | 2011-07-14 |
CA2597377C (en) | 2010-11-16 |
CA2597377A1 (en) | 2009-02-15 |
WO2009021332A1 (en) | 2009-02-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120128144A1 (en) | Screening system and method | |
US8787549B2 (en) | Programmable caller ID | |
CA2710245C (en) | Method and apparatus for interrupting an active telephony session to deliver information to a subscriber | |
US8130931B2 (en) | Call waiting using external notification and presence detection | |
US7460857B2 (en) | Method and apparatus for providing information in response to a delayed grant of subscriber permission | |
US6990187B2 (en) | Methods for blocking repeated occurrences of nuisance calls | |
US6999577B2 (en) | Multi-user call waiting | |
US20030142807A1 (en) | Method and apparatus for providing expanded telecommunications service | |
US20040109557A1 (en) | Outbound dialing decision criteria based | |
US20050195802A1 (en) | Dynamically routing telephone calls | |
CA2556892C (en) | Call management | |
US20120100830A1 (en) | Anonymous party voice call processing | |
WO2001037531A1 (en) | Method and system for capturing telephone calls | |
US11647113B2 (en) | System and method for limiting incoming spam calls | |
EP2266303B1 (en) | Managing communications | |
US20030072426A1 (en) | Method for processing potentially unwanted calls | |
RU2724630C1 (en) | Method of filtering unwanted incoming calls on cellular telephones | |
US7715544B1 (en) | Method and apparatus for selective call waiting treatment | |
WO2008048484A2 (en) | Automatic complaint registration for violations of telephonic communication regulations with call rejection | |
US8750842B1 (en) | System, method, and computer program for filtering a request to communicate with a user | |
KR20070020829A (en) | Telephone, System and Method for preventing tele-marketing | |
US20070041549A1 (en) | Card armor | |
RU2419240C2 (en) | Method to reduce unwanted conversations in mobile communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: PRIMUS TELECOMMUNICATIONS CANADA INC., CANADA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHISLETT, EDMUND;STEIN, MATTHEW JASON;THOMPSON, ROBERT GORDON;SIGNING DATES FROM 20080331 TO 20080402;REEL/FRAME:030893/0037 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |