Method and apparatus for the prevention of unwanted calls in a callback system
First Claim
1. A computerized method for processing a request for a call comprising the steps of:
- receiving by a call server via a packet switched network a request from a first party for a call from a second party to the first party, the request including information sufficient to identify a device associated with the first party who wishes to receive the call, the request originating from a source computer;
making a determination whether a total number of requests received from the source computer during a period of time exceeds a threshold; and
connecting the first party to the second party or blocking the request based on the determination.
2 Assignments
0 Petitions
Accused Products
Abstract
In one method and apparatus for blocking unwanted calls in a callback system, parameters associated with a callback request (e.g., the user device to which the call is to be directed, the IP address from which the request originated or an identifier of the source computer from which the callback request originated, the party from whom the call is requested) are tracked for each call. A decision to automatically block the requested callback is made based on one or more criteria based on a combination of these parameters, which may be a total over a period of time. In a second method, one or both of the parties to the callback is queried as to whether the callback is unwanted and, if so, one or more parameters associated with the request are blacklisted.
-
Citations
21 Claims
-
1. A computerized method for processing a request for a call comprising the steps of:
-
receiving by a call server via a packet switched network a request from a first party for a call from a second party to the first party, the request including information sufficient to identify a device associated with the first party who wishes to receive the call, the request originating from a source computer; making a determination whether a total number of requests received from the source computer during a period of time exceeds a threshold; and connecting the first party to the second party or blocking the request based on the determination. - View Dependent Claims (2, 12, 13, 14, 15, 16)
-
-
3. A method for processing a request for a call comprising the steps of:
-
receiving by a call server via a packet switched network a request from a first party for a call from a second party to the first party, the request including information sufficient to identify a device associated with the first party who wishes to receive the call, the request originating from a source computer; making a determination whether a total number of requests received from the source computer for a call from the second party during a period of time exceeds a threshold; and connecting the first party to the second party or blocking the request based on the determination. - View Dependent Claims (4, 17, 18, 19, 20, 21)
-
-
5. A method for processing a request for a call comprising the steps of:
-
receiving by a call server via a packet switched network a request from a first party for a call from a second party to the first party, the request including information sufficient to identify a device associated with the first party who wishes to receive the call, the request originating from a source computer; making a determination whether a total number of requests received from the source computer for a call to the first party during a period of time exceeds a threshold; and connecting the first party to the second party or blocking the request based on the determination. - View Dependent Claims (6, 7, 8, 9, 10, 11)
-
Specification