Intelligent communication screening to restrict spam
First Claim
1. A computer-implemented method performed by a communication screening system comprising at least one server with a processor and a non-transitory computer-readable medium, the computer-implemented method comprising:
- intercepting at the communication screening system, a communication that is intended for delivery to an intended contacted entity;
extracting from the communication, an identifier identifying a contacting entity that originates the communication;
querying an entity database using the identifier, the entity database comprising a plurality of entity profiles, each entity profile of the plurality of entity profiles storing verified identifying and contact information for a different entity;
receiving, responsive to said querying, an entity profile comprising verified identifying and contact information for the contacting entity, wherein information for said entity profile is not provided by the contacted entity and includes at least one of an industry in which the contacting entity operates, a verified street address, a verified telephone number, and a verified online presence of the contacting entity; and
screening the communication based on the information from the entity profile, wherein screening the communication comprises performing a first action for the communication in response to determining from the entity profile information that the contacting entity is not a spammer and performing a second action for the communication in response to determining from the entity profile information that the contacting entity is a spammer.
7 Assignments
0 Petitions
Accused Products
Abstract
A system is provided to restrict the ability of a spammer to freely contact an entity over a communication channel. To do so, the system reconfigures a communication channel used to contact the target entity such that the system can intercept a communication from a source contacting entity en route to the target entity. The system extracts an identifier (e.g., contacting entity'"'"'s telephone number) from the communication and uses the identifier to query a database storing information about the contacting entity. The information reveals the contacting entity'"'"'s industry, occupation, credibility, etc. From this information, the system automatically identifies the contacting entity as a spammer, potential spammer, or non-spammer. The system performs a default screening of the communication based on the classification. Alternatively, the target contacted entity can specify a configuration for different actions the system takes to screen the communication based on the source contacting entity classification.
44 Citations
18 Claims
-
1. A computer-implemented method performed by a communication screening system comprising at least one server with a processor and a non-transitory computer-readable medium, the computer-implemented method comprising:
-
intercepting at the communication screening system, a communication that is intended for delivery to an intended contacted entity; extracting from the communication, an identifier identifying a contacting entity that originates the communication; querying an entity database using the identifier, the entity database comprising a plurality of entity profiles, each entity profile of the plurality of entity profiles storing verified identifying and contact information for a different entity; receiving, responsive to said querying, an entity profile comprising verified identifying and contact information for the contacting entity, wherein information for said entity profile is not provided by the contacted entity and includes at least one of an industry in which the contacting entity operates, a verified street address, a verified telephone number, and a verified online presence of the contacting entity; and screening the communication based on the information from the entity profile, wherein screening the communication comprises performing a first action for the communication in response to determining from the entity profile information that the contacting entity is not a spammer and performing a second action for the communication in response to determining from the entity profile information that the contacting entity is a spammer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method performed by a communication screening system comprising at least one server with a processor and a non-transitory computer-readable medium, the computer-implemented method comprising:
-
intercepting a communication at the communication screening system before delivery of the communication to an intended contacted entity; extracting from the communication, an identifier identifying a contacting entity that originates the communication; obtaining credibility of the contacting entity using the identifier, said credibility quantifying sentiment expressed from any of a plurality of reviews and a plurality of ratings relating to experiences that others have had with the contacting entity; screening the communication according to the credibility of the contacting entity, wherein screening the communication comprises performing a first action for the communication when the credibility of the contacting entity is below a specified threshold and performing a second action for the communication when the credibility of the contacting entity is greater than the specified threshold, wherein the first action is different than the second action. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer-implemented method performed by a communication screening system comprising at least one server with a processor and a non-transitory computer-readable medium, the computer-implemented method comprising:
-
storing a plurality of configurations defined by a plurality of entities to the non-transitory computer-readable medium, wherein a particular configuration defined by a first entity of the plurality of entities specifies a first action for the screening system to perform when a spammer attempts to contact the first entity and a second action for the screening system to perform when a non-spammer attempts to content the first entity, and wherein the particular configuration does not specify an enumerated listing of spammers or non-spammers; intercepting a communication from a second entity to the first entity, wherein the communication comprises a source identifier used for contacting the second entity and a target identifier used for contacting the first entity; obtaining, using the source identifier, information identifying the second entity to at least one of a first classification and a second classification; retrieving the particular configuration for the first entity using the target identifier; and screening the communication by performing the first action specified in the particular configuration when the contacting entity is identified to the first classification and performing the second action specified in the particular configuration when the contacting entity is identified to the second classification. - View Dependent Claims (18)
-
Specification