WO2023019312A1 - Système et dispositif de vérification de communications envoyées au dispositif de communication d'un individu - Google Patents
Système et dispositif de vérification de communications envoyées au dispositif de communication d'un individu Download PDFInfo
- Publication number
- WO2023019312A1 WO2023019312A1 PCT/AU2022/050915 AU2022050915W WO2023019312A1 WO 2023019312 A1 WO2023019312 A1 WO 2023019312A1 AU 2022050915 W AU2022050915 W AU 2022050915W WO 2023019312 A1 WO2023019312 A1 WO 2023019312A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication
- person
- party
- received
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/64—Automatic arrangements for answering calls; Automatic arrangements for recording messages for absent subscribers; Arrangements for recording conversations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
- H04M1/665—Preventing unauthorised calls to a telephone set by checking the validity of a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
- H04M1/72436—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages for text messaging, e.g. short messaging services [SMS] or e-mails
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6081—Service authorization mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/65—Aspects of automatic or semi-automatic exchanges related to applications where calls are combined with other types of communication
- H04M2203/651—Text message transmission triggered by call
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/60—Details of telephonic subscriber devices logging of communication history, e.g. outgoing or incoming calls, missed calls, messages or URLs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
Definitions
- the present invention relates to a system and device for vetting communications being sent to a person’s communication device.
- Incoming junk and spam emails may be generated by computer software programs, and come in as a do-not-reply email. This means that the email may originate from an unmonitored inbox. Emails sent to this unmonitored inbox may receive a non-delivery notification, or not received a response at all. These emails may contain links to illegitimate websites. Such websites may be operated by fraudsters or scammers. In some scenarios, the email address of the junk or spam email may appear legitimate, but are in fact spoofed by perpetrators.
- emails may then direct an unsuspecting user to a website made to appear like a legitimate website to obtain personal information, passwords and banking details, or credit card details, in an attempt to defraud the recipient of funds, or make illegal purchases, or steal their Identity to generally generate new credit lines under the name of the recipient(s).
- unsolicited communications are not limited to emails, and may come as unsolicited calls or text messages.
- Most unsolicited incoming calls or text messages originate from call centres, and/or may be 'Robo Calls' which use an automatic computer software program.
- Such call centres and Robo Calls are becoming more sophisticated, and can target randomly generated phone numbers, of the same location or country of the operator of the mobile telephone or landline telephone. It is also generally such, that if one misses such a call and then attempts to call the number back, that the call cannot be put through. All this leads to frustration, costs and time.
- Some telecommunications providers are also trying to assist their customers from receiving unwanted calls and/or text messages via software that can alert the telco provider to a large amount of incoming calls, text messages or web links being sent from a particular area or number. Telecommunication providers can then decide whether to block such calls or text messages. However, as it has shown to date, that this is not a total successful resolution to the ever increasing problem with receiving unwanted calls & text messages, as a large number of calls, and/or text messages are still getting through.
- a system for vetting communications being sent to a person’s communication device, said system being configured to perform the steps of:
- the step of determining if the first party is known includes the steps of determining if the first communication is being sent from a person that is included in an approved list.
- the approved list includes the person's contact list on the person's communication device.
- the approved list is separate to the person's contact list on the person's communication device.
- the step of blocking includes the steps of:
- the entry code is a randomly selected combination of numbers, letters and/or symbols.
- the step of blocking includes the steps of:
- the step of blocking includes the steps of:
- the approved list is updated to include details associated with the first party.
- the details associated with the first party are stored in the approved list for a fixed time.
- the fixed period of time is 6 months, for example.
- the fixed period of time is configurable by the person.
- a device for vetting communications being sent to a person’s communication device, said device being configured to perform the steps of:
- the step of determining if the first party is known includes the steps of determining if the first communication is being sent from a person that is included in an approved list.
- the approved list includes the person's contact list on the person's communication device.
- the approved list is separate to the person's contact list on the person's communication device.
- the step of blocking includes the steps of:
- the entry code is a randomly selected combination of numbers, letters and/or symbols.
- the step of blocking includes the steps of:
- the step of blocking includes the steps of:
- the approved list is updated to include details associated with the first party.
- the details associated with the first party are stored in the approved list for a fixed time.
- the fixed period of time is 6 months, for example.
- the fixed period of time is configurable by the person.
- the above-described device intercepts unwanted and/or unsolicited communications from parties that are not known to the intended recipient.
- Figure 1 is a schematic diagram of a system for vetting communications being sent to a person’s communication device
- Figure 2 is a flow diagram showing steps performed by the system shown in Figure 1 ;
- Figure 3 is a schematic diagram of a landline telephone example of the system shown in Figure 1;
- Figure 4 is a flow diagram showing steps performed by the example of the system shown in Figure 3;
- Figure 5 is a schematic diagram of a mobile communications device forming part of the system shown in Figure 1 ;
- Figure 6 is a flow diagram showing steps performed by a mobile telephone example of the system shown in Figure 1 ;
- Figure 7a is a schematic diagram of another mobile telephone example of the system shown in Figure 1;
- Figure 7b is a flow diagram showing steps performed by the example of the system shown in Figure 7a;
- Figure 8 is a schematic diagram of an email example of the system shown in Figure 1 ;
- Figure 9 is a schematic diagram of an email example of the system shown in Figure 8;
- Figure 10 is a flow diagram showing steps performed by the example of the system shown in Figure 9;
- Figure 11 is a schematic diagram of an interceptor system
- FIGS 12a to 12c are flow diagrams showing steps performed by the interceptor system shown in Figure 11;
- Figure 13 is a schematic diagram of another interceptor system
- Figure 14 is a flow diagram showing steps performed by the interceptor system shown in Figure 13;
- Figure 15 is a schematic diagram of yet another interceptor system
- FIGS 16 and 17 are flow diagrams showing steps performed by the interceptor system shown in Figure 15;
- Figure 18 is a schematic diagram of still another interceptor system.
- Figure 19 is a schematic diagram of a further interceptor system.
- the system 10 shown in Figure 1 is used to vet communications being sent to a person’s communication device 12.
- the system 10 intercepts unwanted and/or unsolicited communications from parties that are not known to the intended recipient.
- the system 10 is configured to perform the steps of:
- the person’s communication device 12 is, for example,:
- a mobile telephone device 12 capable of receiving incoming telephone calls; text messages and/or e-mails;
- a computer device 12 capable of receiving incoming telephone calls and/or e-mails.
- system 10 is embodied as:
- the communication device 12 is able to communicate with equipment 14, 16, 20, 22, 24 of members, or users, of the system 10 over the communications network 18 using standard communication protocols.
- the devices 12 can be a variety of communications devices such as personal computers; laptop computers, notepads, smart phones; hand held computers etc.
- the communications network 18 may include the Internet, telecommunications networks and/or local area networks.
- the components of the system 10 can be configured in a variety of ways.
- the components can be implemented entirely by software to be executed on standard computer server hardware, which may comprise one hardware unit or different computer hardware units distributed over various locations, some of which may require the communications network 18 for communication.
- a number of the components or parts thereof may also be implemented by application specific integrated circuits (ASICs) or field programmable gate arrays.
- ASICs application specific integrated circuits
- the system 10 is embodied in a stand alone unit that 300 that is be used to vet incoming telephone calls.
- the unit 300 includes:
- non transient data storage including, stored thereon, instructions that when executed by the microprocessor cause the device 300 to perform the steps 400 shown in Figure 4:
- the step of determining if the first party is known to the system includes the steps of:
- the approved list of numbers is stored in data storage on the device 300.
- telephone calls originate from a caller device sent through the caller's telecommunication service provider 302, and are routed via a telecommunication network 18 to the person's telecommunication provider 304. The call is then vetted by the device
- the step 408 of blocking the first communication includes the steps of:
- step 406 if the entry code matches the code received in the second communication from the first party, then allowing, at step 406, the first communication to be received by the person on said communication device.
- the entry code is preferably a randomly selected combination of numbers, letters and/or symbols.
- the step 410 of blocking includes the steps of:
- the question is sent to the unknown caller via a reply text message.
- the text message is then sent to the recipient's communication device.
- This communication device may be the same, or a different device, to the communication device intended to receive the call.
- the recipient upon receiving the unknown caller's text message with answers to the questions via the interceptor, the recipient can then choose to select 'yes' to accept the call, and or 'no' to reject the call.
- the caller will be advised via a return text or voice message, that the recipient has rejected their call, and the call is then terminated by the interceptor.
- the caller If the caller has not responded or enters the incorrect code, or has failed to answer the selected questions, then the caller will be advised verbally that they have not entered the correct Code, or responded to the questions via text and that their call will now be terminated, without the recipient knowing of the attempted call.
- the unknown caller is advised via a verbal message that the recipient's communication device is off via the interceptor, and the call will be terminated.
- system 10 is embodied as a software application 500 executed by the mobile telephone device 12 that includes at least the following features:
- non transient data storage 510 including, stored thereon, instructions that when executed by the microprocessor 508 cause the device 12 to perform the steps 600 shown in Figure 6:
- the step (ii) of determining if the first party is known to the system 10, includes the steps of:
- the approved list of numbers is stored in data storage 510 on the device 12.
- telephone calls originate from the caller's telecommunication service provider 302, and are routed via a telecommunication network 18 to the person's telecommunication provider 304. The call is then vetted by the App 500 prior to being allowed to progress to the recipient.
- the step 608 of blocking the telephone call includes the steps of:
- step 606 if the entry code matches the code received in the second communication from the first party, then allowing, at step 606, the telephone call to be received by the person on said communication device.
- the entry code is preferably a randomly selected combination of numbers, letters and/or symbols.
- the device 300 sends the first party a set of one or more questions to answer, which will be sent to the unknown caller via a reply text message.
- the text message is then sent to the recipient's communication device.
- This communication device may be the same, or a different device, to the communication device intended to receive the call.
- the recipient upon receiving the unknown caller's text message with answers to the questions via the interceptor, the recipient can then choose to select 'yes' to accept the call, and or 'no' to reject the call.
- the caller will be advised via a return text or voice message, that the recipient has rejected their call, and the call is then terminated by the interceptor.
- the caller If the caller has not responded or enters the incorrect code, or has failed to answer the selected questions, then the caller will be advised verbally that they have not entered the correct Code, or responded to the questions via text and that their call will now be terminated, without the recipient knowing of the attempted call.
- the unknown caller is advised via a verbal message that the recipient's communication device is off via the interceptor, and the call will be terminated.
- the system 10 is used to vet text messages, also referred to as a Short Message Service (SMS) messages, sent to a person's communication device 12.
- SMS messages are transmitted from a person's telecommunications service provider 16.
- SMS messages may be routed via the internet 18.
- the application software 500 being executed by the person’s mobile communication device 12 vets any incoming SMS messages before being passed to the person for viewing, by checking the sender's details with information in an address book 702. If the text message sender is unknown, not listed in the address book, or there is a mismatch, then the SMS message will be temporary stored in an Intercepted SMS Database 704.
- the software application 500 executed by the mobile telephone device 12 causes the device 12 to perform the steps 750 shown in Figure 7b:
- step 756 if the first party is known, then allowing, at step 756, the SMS message to be received by the person on his/her communication device 12;
- the step (b) of determining if the first party is known to the system 10, includes the steps of:
- step 754b determining, at step 754b, if the number is in an approved list of telephone numbers.
- the approved list of numbers is stored in data storage 510 on the device 12.
- the step 758 of blocking the SMS message includes the steps of:
- the entry code is preferably a randomly selected combination of numbers, letters and/or symbols.
- the App 500 sends the first party a set of one or more questions to answer, which will be sent to the first party via a reply text message.
- the text message is then sent to the recipient's communication device 12.
- This communication device may be the same, or a different device, to the communication device intended to receive the call.
- the recipient upon receiving the unknown caller's text message with answers to the questions via the interceptor, the recipient can then choose to select 'yes' to accept the text message, and or 'no' to reject the text message.
- the caller will be advised via a return text or voice message, that the recipient has rejected their SMS message, and the SMS message is then terminated by the interceptor App 500.
- the SMS message will be forwarded to the recipient's communication device 12 once it is available without requiring the sender to enter any code, or answer any questions.
- the interceptor App 500 will permanently delete the text message.
- the unknown sender is then advised via a text message by the interceptor, that the recipient phone is off, and that their text message will be permanently deleted by the system 10.
- the system 10 can be embodied as a software application stored in non-transient data storage in communication with a computer device 12, such as a mail server, a router, a personal computer, a laptop, a notebook or any other suitable device.
- a computer device 12 such as a mail server, a router, a personal computer, a laptop, a notebook or any other suitable device.
- the system 10 may be configured to intercept e-mails originating from a mail server 802 of the sender, via a person's telecommunication service provider 16.
- the interceptor 14 may be connected directly to a networking device 804, such as a router. This allows emails to be downloaded by the interceptor 14 before being potentially forwarded to the person's communication device 12.
- the email is then vetted by the interceptor 14 by performing the steps 1000, shown in Figure 10, of:
- step 1006 if the first party is known, then allowing, at step 1006, the first email communication to be received by the person on his/her communication device 12;
- the step 1004 of determining if the first e-mail communication is known to the system 10, includes the steps of:
- step 1004b determining, at step 1004b, if the e-mail address is in an approved list of e- mail addresses.
- the approved list of e-mail addresses is the address book 906 stored in data storage on the device 12.
- the step 1008 of blocking the first e-mail communication includes the steps of:
- step 1006 if the entry code matches the code received in the second communication from the first party, then allowing, at step 1006, the first communication to be received by the person on said communication device.
- the entry code is preferably a randomly selected combination of numbers, letters and/or symbols.
- the first email communication is temporary stored in an intercepted email database 910.
- the first party receives the automated response e-mail through the person's outgoing mail server 912.
- the system sends one or more questions to the first party. If the first party correctly answers the questions in a reply email, the sender's reply email is then sent to the recipient. At this point, the recipient can either accept the sender's email by, for example, clicking 'yes' when prompted, or 'no, to not receive the sender's email. As will be generally understood, the sender's email may also include attachments.
- an automated reply email will be sent to the sender to advise the sender that their email and any attachments have been forwarded to the recipient's inbox.
- the Interceptor 12 then advises the recipient as a standard template, that the senders email could be a Scam, and to be diligent in opening any attachments, or logging onto any link, and or replying to such. But, having the sender provide the various answers to the Interceptors questions, which will provide to the recipient, that this email is required by the recipient, and that the recipient was waiting for such an email, and would be less likely to select 'Yes' to receive such emails from a totally unknown subject and or sender;
- the sender’s email is deleted from the address book 906, the intercepted email database 910, and from the incoming mail server 904. This will eliminate any chance that such emails will remain on the recipient’s email system via the Host Domain 24 or ISP Provider System 22, in the event the recipient uses a different device at a later stage to download emails, as many email systems, keep emails on the recipients inbox email file for a certain period, even though the recipient has deleted it from the device they were using at that time
- An automated reply email is sent to the sender advising that, the recipient has rejected their email, and it will now be permanently deleted.
- the email interceptor 14 will then permanently delete the email from the intercepted email database, along with permanently deleting it from the incoming mail server without the recipient knowing of the attempted email.
- the interceptor will generate a different code that is unique to each recipient. In other embodiments, the interceptor may generate a different code on a periodic basis, or provide an option for the recipient to manually request that a new code be generated. This prevents computer generated communications from being able to preempt the code, and/or the select range of questions.
- Such software programs will not be able to enter such verbal or text requested Codes, and or questions into a keyboard, or within their program systems or platforms, even if their computer generated program(s) for calls and/or text messages, are programmed to work on an artificial intelligence (Al) voice operated platform, or programmed to enter a set of numbers, letters and/or symbols.
- Al artificial intelligence
- the recipient will still be notified by the interceptor that the incoming communication comes from an unknown caller.
- Recipients who may wish to receive various automated calls and/or text messages such as, for example, for banking and/or credit card transactions, can simply add the appropriate names and/or numbers to their address book.
- the address book can be changed at any time to control the incoming communications which are automatically accepted, rejected, or subject to further vetting.
- Many Financial Institutions are now using a different Software System to send Verification Messages or Codes, which will assist the recipient in knowing that incoming message is from their financial institution or service provider without having to add or change the names or numbers on their device.
- the interceptor may, in some embodiments, be configured to prevent continuous automated generated emails, along with emails from unknown senders, from being received by the recipient if the sender is not listed in the address book.
- the emails may also include attachments.
- the interceptor will assign a unique code for each recipient, may be randomly generated on a periodic basis, or can be manually changed by the recipient. This ensures that auto generated email programs cannot be pre-programmed with the code, or be programmed to utilise artificial intelligence to guess the code.
- the selected range of questions may request that the unknown sender provide at least one of the following answers in a reply email to the recipient, such as, their name, contact number, company name if applicable, subject matter, email address.
- any attachments may be initially prohibited until authorised by the recipient.
- the interceptor can be connected directly to the main communication socket for a phone line, or an IP line.
- the interceptor may be connected to a modem or router device, an answering machine, a computer system, or any similar device.
- the interceptor may be provided via a person's telecommunications service provider or internet service provider, via a stand-alone platform, or via a link to their mainframe.
- the interceptor may be provided via a pre-programmed device, linked to the sim card that is uniquely provided by via a person's telecommunications service provider or internet service provider, via a downloadable app, via an authorised provider, via the manufacturer of the communication device.
- the interceptor may be provided by a person's in house domain, the domain host provider, or as a standalone system connected to the in house domain or domain host provider.
- the interceptor may also be provided by, for example, internet service provider, authorised security service, authorised providers, as an upgrade provided by an email service such as Gmail or Hotmail or similar, as a software upgrade to an operating email system provider.
- the interceptor may also be physically attached to a modem, computer, and communication device such as a mobile/cell phone. It would be understood that the interceptor may be connected via any known means, such as via USB, or remotely connected via a person's local area network.
- the interceptor may be downloaded as an application onto one's mobile/cell phone or computer, be linked to the integrated circuit card ID of a person's sim card, or included in any new device.
- Company domain host providers may also incorporate an interceptor into a company's incoming mail system for standard emails to their public facing addresses such as, for example, Contact@, Enquiry@, Sales@ & Info@ etc.
- a recipient may operate several interceptors concurrently to vet phone calls, text messages, and emails.
- the mobile device 12 The mobile device 12
- the mobile device 12 is a handheld computer device such as a smart phones or a PDA such as one manufactured by AppleTM, LGTM, HTCTM, Research In MotionTM, and MotorolaTM.
- the mobile device 12 includes a mobile computer such as a tablet computer.
- An exemplary embodiment of the mobile device 12 is shown in Figure 5.
- Figure 5 Although the components depicted in Figure 5 represent physical components, Figure 5 is not intended to be a hardware diagram; thus many of the components depicted in Figure 2 may be realized by common constructs or distributed among additional physical components. Moreover, it is certainly contemplated that other existing and yet-to-be developed physical components and architectures may be utilized to implement the functional components described with reference to Figure 5.
- the non-volatile memory 510 is realized by flash memory (e.g., NAND or ONENAND memory), but it is certainly contemplated that other memory types may be utilized as well. Although it may be possible to execute the code from the nonvolatile memory 104, the executable code in the non-volatile memory 510 is typically loaded into RAM and executed by one or more of the N processing components.
- flash memory e.g., NAND or ONENAND memory
- the N processing components in connection with RAM generally operate to execute the instructions stored in non-volatile memory 510 to effectuate the functional components depicted in Figure 5.
- the N processing components may include a video processor, modem processor, DSP, graphics processing unit (GPU), and other processing components.
- Non-transitory computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another.
- a storage media may be any available media that can be accessed by a computer.
- such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
- any connection is properly termed a computer-readable medium.
- the software is transmitted from a website, server, or other remote source using a coaxial cable, fibre optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave
- DSL digital subscriber line
- wireless technologies such as infrared, radio, and microwave
- Disk and disc includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
- the interceptor device or App 5000 shown in Figure 11 is adapted for use in a home or a small to medium sized business.
- the interceptor device or App 5000 forms part of an interceptor system 5002 that is configured in the following manner:
- an ADSL modem/router 5004 is connected to an external wide area network
- the interceptor device/App 5000 is in communication with the modem/router 5004 by way of Ethernet ports 5008 coupled to Ethernet 5010;
- a telephone outlet port 5012 of the modem/router 5004 is in communication with the telephone input port 5014 of the interceptor 5000;
- the interceptor 5000 is in communication with an analogue telephone (not shown) by way of wall socket 516.
- the interceptor device/App 500 does not form part of the TSP/ISP system. Rather, it is a free standing unit that forms part of an interceptor system 5002 located in a home or a small to medium sized office.
- the Interceptor Device/App 5000 connects to the user Device, not the Network Modem/Router 5004, for receiving & sending of Emails. Further, the interceptor Device/App 5000 is preferably able to be programmed to work with any ISP/TSP’s Modem/Router 5004 and becomes the surrogate to the ISP/TSP Network Modem/Router. logon is similar to logging onto Modem: User name & Password required.
- the users VoIP Phone or Analogue Phone (not shown) is connected to the interceptor Device/App 5000 via port 5014.
- the IP Phone socket 5014 is to work the same as the Modem/Router Phone Socket 5012. Analogue should not be an issue.
- the interceptor App 5000 is installed on the user’s Computer/Device (not shown)
- the interceptor App 5000 communicates directly with the Modem Router 5004, and the VoIP Phone (not shown) or Analogue phone (not shown) connects via the user’s modem as usual.
- the following steps are performed by the Interceptor Device/App 5000 performs in response to the user opening up their Email program and downloading email via their
- the Device/App 5000 accesses the user’s Email contacts file and their Email Protocols.
- the Device/App 5000 is programmed to include an “Intercepted Email File”.
- the steps 5500 shown in Figures 12a and 12b are performed by the Interceptor Device/App 5000 when configured to access the user's e-mail contacts file, for all incoming email:
- step 5502 the user’s Email contacts file
- the Device/App 50000 then sends, at step 5514, a reply email to the sender which includes a randomly selected Code and a request to send a reply email back to the Device/App 5000 with the code;
- the Device/App 5000 waits, at step 5516, to receive the further e-mail from the sender;
- the Device/App 5000 checks, at step 5518, if the code received matches the code sent and if the code is correct, then the Device/App 5000 performs the steps of:
- the Device/App 5000 waits, at step 5522, to receive the further e-mail from the sender;
- the Device/App 5000 checks, at step 5524, if the answers received match the saved answers and if the answers are all correct, then the Device/App
- step 5526 the senders answers as an email to the recipient’s Inbox, which will include two options for the recipient to respond to “Yes” or “No”;
- the device/App 5000 then sends, at step 5532, a reply email to the sender, advising that their email and any attachments have been sent to the recipient Inbox. Noting that one may still prohibit any attachments to be sent through, until the recipient is happy to receive such;
- the device/App 5000 at step 5534, permanently deletes the senders email from the “Intercepted Emails File”; and also permanently delete the senders email from the recipients email system at their Domain or ISP Inbox; the device/App 5000 may also automatically send an email to the sender advising that the recipient has rejected their email.
- the device/App 5000 will automatically forward, at step 5510, the senders email to the Inbox of the recipient.
- the email recipient can at all times add or remove contacts from their contact fde in the event they wish to receive emails with “Do Not reply” covering Invoices, Tracking details, purchase confirmations etc. It would be best that all vendors/banks etc amend their platforms to ensure that their customers click on a link which would download and copy their email details into the recipients Contact File, so the recipient can receive the automated email, which they can then delete from their contact file, if they do not wish to receive any further automated emails etc.
- the Interceptor Device/App 5000 skips to step 5520 and sends the sender a message with the questions.
- the interceptor device/App 5000 is optionally given access to the user’s e-mail contacts fde. When configured to not have access to the user's e-mail contacts, all incoming e-mail will be blocked at first instance.
- the Interceptor Device/App 5000 will perform steps 580 shown in Figure 12c.
- step 5581 the user’s Interceptor contact file
- the Device/App 50000 then sends, at step 5587, a reply email to the sender which includes a randomly selected Code and a request to send a reply email back to the Device/App 5000 with the code;
- the Device/App 5000 waits, at step 5588, to receive the further e-mail from the sender;
- the Device/App 5000 checks, at step 5589, if the code received matches the code sent and if the code is correct, then the Device/App 5000 sends, at step 5590, a reply email to the sender, advising that their email and any attachments have been sent to the recipient Inbox. Noting that one may still prohibit any attachments to be sent through, until the recipient is happy to receive such;
- the Device/App 5000 then releases, at step 5585, the Senders email from the “Intercepted Emails File”; and forwards it to the recipients Inbox, with or without any attachments;
- the device/App 5000 at step 5591, permanently deletes the senders email from the “Intercepted Emails File”; and also permanently deletes the senders email from the recipients email system at their Domain or ISP Inbox; the device/App 5000 may also automatically send an email to the sender advising that the recipient has rejected their email.
- the interceptor device/app 5000 if the interceptor device/app 5000 successfully forwards the e-mail to the recipient, then the interceptor device/App 5000 stores the sender's number and/or name for a fixed period of time, such as 6 months, or any other suitable amount of time.
- the fixed period is configurable to suit the needs of the recipient.
- the interceptor device/App 5000 will allow the sender to continuously communicate with the operator during the fixed time period.
- the system 5550 shown in Figure 13 is configured to all vetting of incoming telephone calls from Mobile Phone to VoIP or Analogue Phone 5552.
- the steps 5554 shown in Figure 14 are performed by the Interceptor Device/App 5000, for all incoming calls from a mobile phone:
- step 5560 If the caller is unknown to the user, then send, at step 5560, a reply message to the caller which includes a randomly selected Code and a request to send a reply back to the Device/App 5000 with the code;
- the Device/App 5000 waits, at step 5562, to receive the further message from the caller;
- the Device/App 5000 checks, at step 5564, if the code received matches the code sent and if the code is correct, then the Device/App 5000 puts, at step 5559, the call through to the recipient;
- the Device/App 5000 is to work the same as above for all incoming calls that have been placed via their TSP “Virtual Receptionist” phone system, which if via an App on one’s Computer/Device linked to their Modem.
- the Interceptor device/App 5000 preferably stores the caller’s number and/or name for a fixed time for later unvetted access to the recipient. In one embodiment, the Interceptor device/App 5000 stores the caller’s number and/or name for a fixed time for later unvetted access to the recipient for a fixed period of time, such as 1 month or 6 months.
- the device/App 5000 may also send a text message (preferred) to the MB/Cell device with questions for the Unknown caller to answer via a reply text message which will show-up on the operators receiving device.
- a text message (preferred) to the MB/Cell device with questions for the Unknown caller to answer via a reply text message which will show-up on the operators receiving device.
- the interceptor device/App 5000 is optionally given access to the user’s Contacts File. When configured to not have access to the user's Contacts File, all incoming calls will be blocked at first instance. The Interceptor Device/App 5000 will perform steps 5560 to 5564 for all Callers at first instance.
- the interceptor device/app 5000 if the interceptor device/app 5000 successfully forwards the call to the recipient, then the interceptor device/App 5000 stores the caller's number and/or name for a fixed period of time, such as 6 months, or any other suitable amount of time.
- the fixed period is configurable to suit the needs of the recipient.
- the interceptor device/App 5000 allows the caller to continuously communicate with the operator during the fixed time period.
- the system 5550 shown in Figure 13 is also configured to all vetting of incoming telephone calls from a land line to VoIP or Analogue Phone 5552.
- the steps performed are analogous to the steps 5554 shown in Figure 14 performed for a mobile phone.
- the major difference being that the Interceptor Device / App 5000 sends a call to the caller giving them the code to enter.
- interceptor devices or Apps 6000a, 600b shown in Figure 15 form part of an interceptor system 6002 that is configured in the following manner:
- TSP platform 6002 from outside operators own TSP
- the TSP 6002 has the Interceptor Device/App Platform 6000a to be able to Intercept incoming calls & SMS messages being routed from other TSP’s. Further, the operator's TSP 6006 includes the Interceptor Device/ App Platform 6000b to cover MB/Cell-Landline calls & SMS Messages being sent from the operators TSP 6006.
- the system 6002 shown in Figure 15 is configured to all vetting of incoming SMS messages to an operator's mobile phone 6008.
- the steps 6010 shown in Figure 16 are performed by the Interceptor Device/App 6000b for all incoming SMS messages:
- the Interceptor Device/App 6000b saves the SMS message into an "Intercepted Message File" and sends a SMS message to the sender which includes:
- the Device/ App 6000b waits, at step 6020, to receive the further message from the sender;
- the Device/App 6000b checks, at step 6022, if the code received matches the code sent and if the code is correct, then the Device/App 6000b puts, at step 6016, the SMS through to the recipient;
- the interceptor device/App 6000b is optionally given access to the user’s Contacts File.
- the interceptor device/App 6000b is optionally given access to the user’s Contacts File.
- all incoming SMS messages will be blocked at first instance.
- the interceptor device/app 6000b if the interceptor device/app 6000b successfully forwards the SMS message to the recipient, then the interceptor device/App 6000b stores the texters number or name for a fixed period of time, such as 6 months, or any other suitable amount of time.
- the fixed period is configurable to suit the needs of the recipient.
- the interceptor device/App 6000b will allow the texter to continuously communicate with the operator during the fixed time period.
- the device/App 6000b may send a further reply text message to the sender to answer a question (s) via a reply text such as: Name-Subject.
- the device /App 6000b automatically deletes the senders message from the “Intercepted Message File” and/or from the operators TSP Platform 6006. The device 6000b then forwards an automatic text reply to the sender, advising that the operator has rejected their attempt to send the message, and that it will now be permanently deleted.
- the device 6000b includes a white list including any Emergency Services, various financial institutions & other Government approved sources. SMS messages from these sources on the white list go through to the operators device 6008.
- the Interceptor Device/App 6000b allows all incoming SMS Messages from “Known Contacts” within the Operators “Contact File” to go through to the operators device in the same manner as is currently via their TSP.
- the Interceptor Device/App Platform 6000a (C) performs the steps shown in Figure 17:
- the Interceptor Device/App 6000a at step 6038, sends an automated voice message and/or a text message to the caller which includes:
- the Device/App 6000a waits, at step 6040, to receive the further message from the sender;
- the Device/App 6000a checks, at step 6042, if the code received matches the code sent and if the code is correct, then the Device/App 6000a puts, at step 6036, the call through to the recipient;
- the interceptor device/App 6000a is optionally given access to the user’s Contacts File. When configured to not have access to the user's Contacts File, all incoming calls will be blocked at first instance.
- the interceptor device/app 6000a if the interceptor device/app 6000a successfully forwards the call to the recipient, then the interceptor device/App 6000a stores the caller's number or name for a fixed period of time, such as 6 months, or any other suitable amount of time.
- the fixed period is configurable to suit the needs of the recipient.
- the interceptor device/App 6000a will allow the caller to continuously communicate with the operator during the fixed time period.
- the interceptor device 6000a sends the caller one or more automated questions.
- the interceptor device 6000a then waits to receive answers from the caller and allow the call to pass, at step 6036, if the answers are correct.
- interceptor device/App 6000a upon the unknown caller having entered the correct code and, where applicable, correctly answered the selected question(s) via a reply text, interceptor device/App 6000a send the caller's reply text to the operator's device 6008.
- the operator can then decide to choose to select “Yes” to accept the call or “No” not to accept the call. If "Yes”, then the call is put through, at step 6036, to the recipient and the device/App 6000a stores the caller's number for a fixed period of time, such as 6 months, or any other suitable amount of time. The interceptor device/App 6000a will allow the caller to continuously communicate with the operator during the fixed time period.
- the caller is advised, via a text message or voice message, that the operator has rejected their call, and the call is then terminated by the Interceptor Device/App 6000a.
- the unknown caller is advised via a verbal or text message that the operators phone is switched off, and the call is terminated by the Interceptor Device/App 6000a.
- the Interceptor Device/App will intercept the call, and advise the caller to verbally enter the Code. If the caller has entered the correct Code and within a fixed time period, the call will be put through and store the number for a fixed period of time allowing the caller to continuously communicate with the operator during that time. If the caller has not entered the correct Code or within the set time period, and/or after one or more allowed attempts, the call will be terminated by the Interceptor Device/App, and without the operator knowing of the attempted call.
- the caller is advised via a verbal or text message that the operator’s phone is switched off, and the call is terminated by the Interceptor Device/App.
- the Interceptor Device/App is programmed to operate as per above described operations for the interceptor device/app 5000.
- the fixed interceptor device platform 7000 is linked to ISP routers & direct domain server platforms in the manner shown in Figure 18.
- Such direct domains as with the likes of Gmail, Hotmail, Yahoo, and Host Domain Servers, the Functions of either a Device and/or an App will need to operate the same as per the interceptor device/app 5000, as these direct servers will receive all such emails directly into one Inbox, so they need to be the first Interceptor..
- Either the Interceptor Device or App 8000 shown in Figure 19 functions the same as for all the Functions covering Emails, Unknown Incoming calls from MB/Cell Devices and Landlines, including Unknown TMS Text Messages.
- the Device or App 8000 overrides the Network Adapter, and work with the Operators/TSP Sim/and their Email Protocols.
- the portable interceptor device platform 8000 is linked to the operator recipient device and to a LAN & TSP where their ISP-TSP is not operating the interceptor device in the manner shown in Figure 19.
- the portable interceptor platform 8000 can be configured as a LAN & TSP gateway device or a software application.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2022331635A AU2022331635A1 (en) | 2021-08-20 | 2022-08-17 | System & device for vetting communications being sent to a person's communication device |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2021218220 | 2021-08-20 | ||
| AU2021218220A AU2021218220A1 (en) | 2021-08-20 | 2021-08-20 | System for vetting communications being sent to a person’s communication device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2023019312A1 true WO2023019312A1 (fr) | 2023-02-23 |
Family
ID=85239274
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2022/050915 Ceased WO2023019312A1 (fr) | 2021-08-20 | 2022-08-17 | Système et dispositif de vérification de communications envoyées au dispositif de communication d'un individu |
Country Status (2)
| Country | Link |
|---|---|
| AU (2) | AU2021218220A1 (fr) |
| WO (1) | WO2023019312A1 (fr) |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060026246A1 (en) * | 2004-07-08 | 2006-02-02 | Fukuhara Keith T | System and method for authorizing delivery of E-mail and reducing spam |
| US20100158233A1 (en) * | 2008-12-23 | 2010-06-24 | International Business Machines Corporation | Performing human client verification over a voice interface |
| WO2011050235A1 (fr) * | 2009-10-23 | 2011-04-28 | Interdigital Patent Holdings, Inc. | Protection contre une communication non sollicitée |
| US20140273987A1 (en) * | 2013-03-14 | 2014-09-18 | Google Inc. | Challenge Response System to Detect Automated Communications |
| US20150264174A1 (en) * | 2009-04-06 | 2015-09-17 | Wendell D. Brown | Method and apparatus for content presentation in association with a telephone call |
| US10951756B1 (en) * | 2019-03-04 | 2021-03-16 | Jonathan Silverstein | User-customized call filtering system and method |
-
2021
- 2021-08-20 AU AU2021218220A patent/AU2021218220A1/en active Pending
-
2022
- 2022-08-17 AU AU2022331635A patent/AU2022331635A1/en active Pending
- 2022-08-17 WO PCT/AU2022/050915 patent/WO2023019312A1/fr not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060026246A1 (en) * | 2004-07-08 | 2006-02-02 | Fukuhara Keith T | System and method for authorizing delivery of E-mail and reducing spam |
| US20100158233A1 (en) * | 2008-12-23 | 2010-06-24 | International Business Machines Corporation | Performing human client verification over a voice interface |
| US20150264174A1 (en) * | 2009-04-06 | 2015-09-17 | Wendell D. Brown | Method and apparatus for content presentation in association with a telephone call |
| WO2011050235A1 (fr) * | 2009-10-23 | 2011-04-28 | Interdigital Patent Holdings, Inc. | Protection contre une communication non sollicitée |
| US20140273987A1 (en) * | 2013-03-14 | 2014-09-18 | Google Inc. | Challenge Response System to Detect Automated Communications |
| US10951756B1 (en) * | 2019-03-04 | 2021-03-16 | Jonathan Silverstein | User-customized call filtering system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2021218220A1 (en) | 2023-03-09 |
| AU2022331635A1 (en) | 2024-03-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10581780B1 (en) | Tertiary classification of communications | |
| US20220086158A1 (en) | Domain-based isolated mailboxes | |
| JP5166244B2 (ja) | 送信者を識別するシステムおよび方法 | |
| US20220247859A1 (en) | Communication system for mitigating incoming spoofed callers using social media | |
| US20170230323A1 (en) | Detection of business email compromise | |
| US20160156654A1 (en) | Stopping and remediating outbound messaging abuse | |
| US20150356630A1 (en) | Method and system for managing spam | |
| US20030191969A1 (en) | System for eliminating unauthorized electronic mail | |
| US11665277B2 (en) | Apparatus, methods, and articles of manufacture for filtering calls and reducing spoofing and spamming | |
| MXPA05014002A (es) | Lista segura de emisor seguridad. | |
| EP3729745A1 (fr) | Système et procédé de fonctionnement d'un service de courrier électronique pour téléphones mobiles | |
| US20060179157A1 (en) | System and method for discerning the authenticity of the sender and controlling the routing of electronic messages prior to said messages reaching a recipient's device | |
| US20110004919A1 (en) | Method for Processing Emails in a Private Email Network | |
| US20070043813A1 (en) | Method and system for delivering electronic messages using a trusted delivery system | |
| WO2023019312A1 (fr) | Système et dispositif de vérification de communications envoyées au dispositif de communication d'un individu | |
| CN111162996B (zh) | 一种邮件注册的优化方法及其系统 | |
| US8503636B1 (en) | Systems and methods for blocking an outgoing request associated with an outgoing telephone number | |
| Androulidakis | Sms security issues | |
| AU2020277328B2 (en) | Using a public registry to enhance caller information | |
| FR3126582A1 (fr) | Procédé de sécurisation d’un échange entre terminaux de communication, dispositif de sécurisation, terminal et programme d’ordinateur correspondants. | |
| US11949641B2 (en) | Verification of selected inbound electronic mail messages | |
| US20250211678A1 (en) | Methods and systems for verification of an affiliation of a call initiator with an organization | |
| WO2006130928A1 (fr) | Moyens et procede pour gerer la distribution de communications electroniques non sollicitees | |
| WO2016046812A1 (fr) | Appareil, systèmes et procédés de protection contre des messages malveillants | |
| AU2004276844A1 (en) | Method and system for delivering electronic messages using a trusted delivery system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22857145 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2022331635 Country of ref document: AU Ref document number: AU2022331635 Country of ref document: AU |
|
| ENP | Entry into the national phase |
Ref document number: 2022331635 Country of ref document: AU Date of ref document: 20220817 Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 22857145 Country of ref document: EP Kind code of ref document: A1 |