Counteracting Spam in Voice Over Internet Protocol Telephony Systems
First Claim
1. A method of detecting a spam message transmitted over a packetized, network-based telephony system, the method comprising:
- receiving, over a computer network, a first request to initiate a first voice communication session from a requestor;
establishing the first voice communications session with the requestor over the computer network;
sending an audible ringing tone to the requestor over the established first voice communications session;
analyzing audio data received from the requestor while the audible ringing tone is being sent;
identifying the requestor as a possible spam source in response to the analysis detecting an audible message in the audio data; and
handling the voice communications session as a non-spam event in response to the analysis failing to detect the audible message in the audio data.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided to detect a spam message transmitted over a packetized, network-based telephony system. A request to initiate a first voice communication session is received from a requestor. A voice communications session is established with the requestor over the computer network. An audible ringing tone is sent to the requestor over the established voice communications session. While the audible ringing tone is being sent, audio data that is received from the requestor is analyzed. If the analysis detects an audible message in the audio data, then the requestor is identified as a possible spam source. On the other hand, if the analysis fails to detect the audible message in the audio data then the established voice communications session is handled as a non-spam event.
-
Citations
20 Claims
-
1. A method of detecting a spam message transmitted over a packetized, network-based telephony system, the method comprising:
-
receiving, over a computer network, a first request to initiate a first voice communication session from a requestor; establishing the first voice communications session with the requestor over the computer network; sending an audible ringing tone to the requestor over the established first voice communications session; analyzing audio data received from the requestor while the audible ringing tone is being sent; identifying the requestor as a possible spam source in response to the analysis detecting an audible message in the audio data; and handling the voice communications session as a non-spam event in response to the analysis failing to detect the audible message in the audio data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An information handling system comprising:
-
one or more processors; a memory coupled to at least one of the processors; a network adapter that connects the information handling system to a computer network; and a set of instructions stored in the memory and executed by at least one of the, wherein the set of instructions perform actions of; receiving, at the network adapter, a first request to initiate a first voice communication session from a requestor; establishing the first voice communications session with the requestor over the computer network; sending an audible ringing tone to the requestor over the established first voice communications session; analyzing audio data received from the requestor while the audible ringing tone is being sent; identifying the requestor as a possible spam source in response to the analysis detecting an audible message in the audio data; and handling the voice communications session as a non-spam event in response to the analysis failing to detect the audible message in the audio data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product stored in a computer readable medium, comprising functional descriptive material that, when executed by an information handling system, causes the information handling system to perform actions that include:
-
receiving, over a computer network, a first request to initiate a first voice communication session from a requestor; establishing the first voice communications session with the requestor over the computer network; sending an audible ringing tone to the requestor over the established first voice communications session; analyzing audio data received from the requestor while the audible ringing tone is being sent; identifying the requestor as a possible spam source in response to the analysis detecting an audible message in the audio data; and handling the voice communications session as a non-spam event in response to the analysis failing to detect the audible message in the audio data. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification