白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Blocking unwanted communications via text modalities

專利號
US12160542B2
公開日期
2024-12-03
申請人
Zoom Video Communications, Inc.(US CA San Jose)
發(fā)明人
Thanh Le Nguyen
IPC分類
H04M3/436; H04M3/42
技術(shù)領(lǐng)域
trust,telephone,sender,recipient,or,software,challenge,may,number,telephony
地域: CA CA San Jose

摘要

A text communication is received from a telephone number of a sender. The text communication is directed to a recipient. A determination is made as to whether to challenge the sender. Responsive to determining to challenge the sender, a challenge is transmitted to the sender. A determination is made as to whether to route the text communication to the recipient based on whether a successful response to the challenge is received from the sender.

說明書

FIELD

This disclosure relates generally to communication handling and more specifically to determining whether to block communications that are unwanted from reaching intended recipients or whether to route the communications to the intended recipients.

BRIEF DESCRIPTION OF THE DRAWINGS

This disclosure is best understood from the following detailed description when read in conjunction with the accompanying drawings. It is emphasized that, according to common practice, the various features of the drawings are not to-scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity.

FIG. 1 is a block diagram of an example of an electronic computing and communications system.

FIG. 2 is a block diagram of an example internal configuration of a computing device of an electronic computing and communications system.

FIG. 3 is a block diagram of an example of a software platform implemented by an electronic computing and communications system.

FIG. 4A is a block diagram of an example of a server used for blocking unwanted communications.

FIG. 4B is an example of data of a do-not-allow list.

FIG. 5 is a block diagram of example functionality of blocking software.

FIG. 6 is an example of a flowchart of a workflow for challenging a sender based on a trust level.

權(quán)利要求

1
What is claimed is:1. A method, comprising:receiving a text communication from a telephone number of a sender, wherein the text communication is directed to a recipient;determining whether to challenge the sender, wherein determining whether to challenge the sender comprises:determining whether the text communication includes a routing permission code provided by the recipient authorizing text communications to be received by the recipient from the telephone number of the sender and whether the text communication is received during a time window provided by the recipient; andresponsive to determining to challenge the sender:transmitting a challenge to the sender;determining whether to route the text communication to the recipient based on whether a successful response to the challenge is received from the sender;determining that an unsuccessful response is received from the sender; andresponsive to determining that the unsuccessful response is received from the sender, blocking routing of future communications from the telephone number for a duration that is based on a number of unsuccessful responses received from the telephone number.2. The method of claim 1, wherein the routing permission code is configured by the recipient.3. The method of claim 1, wherein determining whether to challenge the sender comprises:transmitting a communication to the recipient indicating the text communication from the telephone number; andreceiving from the recipient a response indicating to challenge the sender.4. The method of claim 1, further comprising:determining not to challenge the sender responsive to determining that the text communication includes the routing permission code associated with the recipient.5. The method of claim 1, further comprising:receiving one or more routing permission codes from the recipient, wherein the sender is not challenged if the text communication includes at least one of the one or more routing permission codes.6. The method of claim 1, further comprising:determining not to challenge the sender responsive to determining that the telephone number is included in a contact list of a user other than the recipient.7. The method of claim 1, wherein the text communication is a first text communication, further comprising:receiving a second text communication from the telephone number directed to an intended recipient; anddetermining not to route the second text communication to the intended recipient responsive to determining that the telephone number is in a do-not-allow list.8. A device, comprising:a memory; anda processor, the processor configured to execute instructions stored in the memory to:receive a text communication from a telephone number of a sender, wherein the text communication is directed to a recipient;determine whether to challenge the sender, wherein to determine whether to challenge the sender comprises to:determine whether the text communication includes a routing permission code provided by the recipient authorizing text communications to be received by the recipient from the telephone number of the sender and whether the text communication is received during a time window provided by the recipient; andresponsive to determining to challenge the sender:transmit a challenge to the sender responsive to determining to challenge the sender;determine whether to route the text communication to the recipient based on whether a successful response to the challenge is received from the sender;determine that an unsuccessful response is received from the sender; andresponsive to determining that the unsuccessful response is received from the sender, block routing of future communications from the telephone number for a duration that is based on a number of unsuccessful responses received from the telephone number.9. The device of claim 8, wherein the processor is further configured to execute instructions stored in the memory to:store a record indicating the text communication from the telephone number to the recipient.10. The device of claim 8, wherein the processor is further configured to execute instructions to:determine not to challenge the recipient responsive to determining that the telephone number is included in a global white list of telephone numbers.11. The device of claim 8, wherein the processor is further configured to execute instructions stored in the memory to:determine to route the text communication to the recipient responsive to determining that the telephone number is included in a global white list of telephone numbers.12. The device of claim 8, wherein the processor is further configured to execute instructions stored in the memory to:determine not to challenge the sender responsive to determining that the text communication includes an indicium of the recipient.13. The device of claim 8, wherein the processor is further configured to execute instructions stored in the memory to:receive the routing permission code related to the sender; andstore the routing permission code in association with the telephone number.14. The device of claim 8, wherein to instructions to determine to challenge the sender comprise to:receive from the recipient an indication to challenge the sender.15. A non-transitory computer readable medium storing instructions operable to cause one or more processors to perform operations comprising:receiving a text communication from a telephone number of a sender, wherein the text communication is directed to a recipient;determining whether to challenge the sender, wherein determining whether to challenge the sender comprises:determining whether the text communication includes a routing permission code provided by the recipient authorizing text communications to be received by the recipient from the telephone number of the sender and whether the text communication is received during a time window provided by the recipient; andresponsive to determining to challenge the sender:transmitting a challenge to the sender responsive to determining to challenge the sender;determining whether to route the text communication to the recipient based on whether a successful response to the challenge is received from the sender;determining that an unsuccessful response is received from the sender; andresponsive to determining that the unsuccessful response is received from the sender, blocking routing of future communications from the telephone number for a duration that is based on a number of unsuccessful responses received from the telephone number.16. The non-transitory computer readable medium of claim 15, wherein determining whether to challenge the sender comprises:determining to challenge the sender responsive to determining that the text communication does not include an indicium of the recipient.17. The non-transitory computer readable medium of claim 15, wherein determining whether to challenge the sender comprises:determining not to challenge the sender responsive to determining that the telephone number is included in a global white list of telephone numbers.18. The non-transitory computer readable medium of claim 15, wherein the operations further comprise:responsive to determining not to challenge the sender, routing the text communication to the recipient.19. The non-transitory computer readable medium of claim 15, wherein the operations further comprise:responsive to determining that the telephone number is blocked, dropping the text communication.20. The non-transitory computer readable medium of claim 15, wherein the text communication is a first text communication, the operations further comprise:responsive to determining that the telephone number is in a do-not-allow list, blocking routing of a second text communication received from to the telephone number to an intended recipient of the second text communication.
微信群二維碼
意見反饋