System and method for spam detection
First Claim
Patent Images
1. A voice-over-Internet protocol (VoIP) caller verification method comprising:
- generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller;
determining a response or lack thereof from the VoIP caller; and
analyzing the response relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.
0 Assignments
0 Petitions
Accused Products
Abstract
A voice-over-internet protocol (VoIP) caller verification method includes generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller. A response or lack thereof is determined from the VoIP caller, and the response is analyzed relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with.
18 Citations
21 Claims
-
1. A voice-over-Internet protocol (VoIP) caller verification method comprising:
-
generating a challenge to be sent to a VoIP caller which needs a response from the VoIP caller prior to accepting a VoIP call, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller; determining a response or lack thereof from the VoIP caller; and analyzing the response relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising a non-transitory computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to perform the method steps of:
-
generating a challenge to be sent to a VoIP caller which requires a response from the VoIP caller prior to accepting a VoIP call or permitting the VoIP call to ring at the callee, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller; determining a response or lack thereof from the VoIP caller; analyzing the response relative to an acceptable response to determine whether the VoIP caller is acceptable to communicate with; and if the VoIP caller is acceptable, accepting the VoIP call or permitting a ring at the callee. - View Dependent Claims (17, 19)
-
-
13. A non-software system for VoIP caller verification, comprising:
-
a challenge generator which generates challenges to be sent to a VoIP caller responsive to an initiation by the VoIP caller for communications, the challenge requiring a response, wherein the challenge includes a test pattern crafted to create a greater load at a spammer VoIP caller as compared to a human VoIP caller; a determination module which determines if a response has been received and receives the response from the VoIP caller; and an analyzing device which determines if the response is acceptable as compared to an acceptable response to determine whether the VoIP caller is acceptable to communicate with. - View Dependent Claims (14, 15, 16, 18, 20, 21)
-
Specification