System and method for identifying unwanted communications using communication fingerprinting
First Claim
1. A method, in a communication environment including a data processing system comprising a processor and a memory, for identifying communicators as wanted or unwanted based on messages from such communicators, the method comprising:
- receiving, by the data processing system, an inbound message from a communicator;
comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, the fingerprints having been generated from a plurality of message sources and including message content features of messages associated with unwanted communicators;
determining, by the data processing system, at least one match of the inbound message to the fingerprints;
determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints; and
configuring, by the data processing system, handling of calls from the communicator based on the identity.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for identifying communicators as wanted or unwanted based on messages from such communicators comprising receiving, by the data processing system, an inbound message from a communicator, comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, determining, by the data processing system, at least one match to the fingerprints, determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints, and configuring, by the data processing system, handling of calls from the communicator based on the identity.
-
Citations
20 Claims
-
1. A method, in a communication environment including a data processing system comprising a processor and a memory, for identifying communicators as wanted or unwanted based on messages from such communicators, the method comprising:
-
receiving, by the data processing system, an inbound message from a communicator; comparing, by the data processing system, the inbound message to fingerprints stored in a database accessible to the data processing system, the fingerprints having been generated from a plurality of message sources and including message content features of messages associated with unwanted communicators; determining, by the data processing system, at least one match of the inbound message to the fingerprints; determining, by the data processing system, an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints; and configuring, by the data processing system, handling of calls from the communicator based on the identity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for identifying communicators in a communication environment as wanted or unwanted based on messages from such communicators, the system comprising:
-
a processor; and a memory having executable instructions stored thereon that when executed by the processor cause the processor to; receive an inbound message from a communicator; compare the inbound message to fingerprints stored in a database accessible to the data processing system, the fingerprints having been generated from a plurality of message sources and including message content features of messages associated with unwanted communicators; determine at least one match of the inbound message to the fingerprints; determine an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints; and configure handling of calls from the communicator based on the identity. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. Non-transitory computer-readable media comprising program code that when executed by a programmable processor causes execution of a method for identifying communicators in a communication environment as wanted or unwanted based on messages from such communicators, the computer-readable media comprising:
-
computer program code for receiving an inbound message from a communicator; computer program code for comparing the inbound message to fingerprints stored in a database accessible to the data processing system, the fingerprints having been generated from a plurality of message sources and including message content features of messages associated with unwanted communicators; computer program code for determining at least one match of the inbound message to the fingerprints; computer program code for determining an identity of the communicator by determining whether and how likely the communicator is wanted or unwanted based on the at least one match to the fingerprints; and computer program code for configuring handling of calls from the communicator based on the identity.
-
Specification