Prevention of call spoofing in a Voice over Internet Protocol (VoIP) network
First Claim
Patent Images
1. A network device-implemented method, comprising:
- receiving, by the network device, a call request to initiate a voice over Internet Protocol (VoIP) call, the call request being issued by a computing device on behalf of a calling party that is placing a call between a telephone device of the calling party, that is different than the computing device, and a telephone device of the called party;
analyzing, by the network device, marker information in the call request to determine whether the call request, issued by the computing device on behalf of the calling party, was validly issued by the computing device;
analyzing, by the network device, the call request, based on call pattern information of a quantity of other calls, to determine whether the call request is suspicious; and
initiating, by the network device, completion of the call based on the determination of whether the call request was validly issued and the determination of whether the call request is suspicious.
1 Assignment
0 Petitions
Accused Products
Abstract
Call spoofing in a Voice over Internet Protocol (IP) system may be detected and/or prevented. A device may receive a call request to initiate a VoIP call. The device may analyze marker information in the call request to determine whether the call request is valid. The device may also analyze the call request, based on call pattern information of a quantity of other calls, to determine whether the call request is suspicious; and complete the call based on the determination of whether the call request is valid and the determination of whether the call request is suspicious.
14 Citations
22 Claims
-
1. A network device-implemented method, comprising:
-
receiving, by the network device, a call request to initiate a voice over Internet Protocol (VoIP) call, the call request being issued by a computing device on behalf of a calling party that is placing a call between a telephone device of the calling party, that is different than the computing device, and a telephone device of the called party; analyzing, by the network device, marker information in the call request to determine whether the call request, issued by the computing device on behalf of the calling party, was validly issued by the computing device; analyzing, by the network device, the call request, based on call pattern information of a quantity of other calls, to determine whether the call request is suspicious; and initiating, by the network device, completion of the call based on the determination of whether the call request was validly issued and the determination of whether the call request is suspicious. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable medium containing programming instructions for execution by one or more processors, the programming instructions including:
-
instructions to receive a call request to initiate a voice over Internet Protocol (VoIP) call, the call request being issued by a computing device on behalf of a calling party that is placing a call between a telephone device of the calling party, that is different than the computing device, and a telephone device of the called party; instructions to analyze marker information in the call request, issued by the computing device on behalf of the calling party, to determine whether the call request was validly issued by the computing device; instructions to analyze the call request based on call pattern information of a quantity of other calls, to determine whether the call request is suspicious; and instructions to initiate completion of the call based on the determination of whether the call request was validly issued and the determination of whether the call request is suspicious. - View Dependent Claims (13, 14, 15)
-
-
16. A network server comprising:
-
one or more processors; and one or more memories, coupled to the one or more processors, the one or more memories storing instructions, that when executed by the one or more processors, cause the one or more processors to; receive a call request, from a computing device, to initiate a voice over Internet Protocol (VoIP) call between a calling telephone number and a called telephone number, the call request being issued by the computing device on behalf of a calling party that is placing a call between a telephone device of the calling party, that is different than the computing device, and a telephone device of the called party; analyze information contained in the call request to determine whether the call request, issued by the computing device on behalf of the calling party, was validly issued by the computing device; analyze call pattern information of a quantity of other calls issued by the computing device and other computing devices, to determine whether the call request is suspicious; and initiate completion of the call between the calling telephone number and the called telephone number based on the determination of whether the call request was validly issued and the determination of whether the call request is suspicious. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification