System and method for identifying, authenticating, and processing an automated call

ABSTRACT

A system can be operable to receive a call from a communications device and identify whether the call is an automated call (e.g., robocall) from an automated dialer by determining whether its caller identification number (caller ID number) has been spoofed, and determine whether the call is part of a pattern consistent with automated calls. In response to the identification of the call as an automated call, the system can determine whether the call is approved for connection to the call destination by querying one or more databases.

TECHNICAL FIELD

The present application relates generally to the field of privacy, and,for example, to identifying, authenticating, and processing an automatedcall.

BACKGROUND

in today's busy world, receiving calls at inconvenient times can be veryannoying, especially if a called party is not interested in the subjectmatter to which the calls relate, or if the called party receivesrepeated calls at inopportune times. There has been an increase in thenumber of automated calls (e.g., robocalls) in which a large number ofcalls are automatically directed to called parties by automated callers,which typically play a pre-recorded message for the called parties.There has been some effort to reduce and even limit such calls byenforcing the laws in which called parties on a “do not call” list arenot be called. However, the majority of these automated calls do noteven originate from the United States. There are large call centers inremote corners of the world where U.S. laws are inapplicable, or thecalling parties simply ignore the applicable laws. Additionally, therehave been incidences in which robocall systems have been usedmaliciously to perpetrate fraudulent transactions. According to thefederal communications commission (FCC), it received more than 214,000complaints about unwanted calls in 2014.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 illustrates an example system and networking environment foraccessing on-line services and products.

FIG. 2 illustrates an example system and networking environment in whichan automated dialer calls multiple user equipment.

FIG. 3 is a diagram illustrating transactions between an exampleautomated dialer and a called party user equipment.

FIG. 4 is a flow chart illustrating an example of a called party'stypical experience interacting with an automated dialer.

FIG. 5 is a block diagram providing an overview of an example processthat can be performed by an automated call detection and processingsystem in accordance with various aspects and embodiments of the subjectdisclosure.

FIG. 6 is a block diagram illustrating an example communications networkhaving an automated call detection and processing system in accordancewith various aspects and embodiments of the subject disclosure.

FIG. 7 is a block diagram illustrating an example automated calldetection and processing system in accordance with various aspects andembodiments of the subject disclosure.

FIG. 8 and FIG. 9 illustrate example graphical user interfaces (GUIs) inwhich a called party user equipment displays options to a user formanaging robocalls directed at the called party user equipment, inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 10 illustrates an example method for performing operations thatfacilitate automated call detection, authentication, and processing inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 11 illustrates an example device operable to facilitate performanceof operations related to automated call detection, authentication, andprocessing in accordance with various aspects and embodiments of thesubject disclosure.

FIG. 12 illustrates an example of a machine-readable storage mediumcomprising executable instructions that, when executed by a processor,facilitate performance of operations related to automated calldetection, authentication, and processing in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 13 illustrates a block diagram of an example computer that can beoperable to execute processes and methods in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 14 illustrates a block diagram of an example mobile device that canbe operable to execute processes and methods in accordance with variousaspects and embodiments of the subject disclosure.

DETAILED DESCRIPTION

The subject disclosure is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. The following description and the annexed drawings set forthin detail certain illustrative aspects of the subject matter. However,these aspects are indicative of but a few of the various ways in whichthe principles of the subject matter can be employed. Other aspects,advantages, and novel features of the disclosed subject matter willbecome apparent from the following detailed description when consideredin conjunction with the provided drawings. In the following description,for purposes of explanation, numerous specific details are set forth toprovide a more thorough understanding of the subject disclosure. Itmight be evident, however, that the subject disclosure can be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form to facilitatedescribing the subject disclosure.

The subject disclosure of the present application describes systems andmethods (comprising example computer processing systems,computer-implemented methods, apparatus, computer program products,etc.) for processing a call. The methods (e.g., processes and logicflows) described in this specification can be performed by devicescomprising programmable processors that execute machine-executableinstructions to facilitate performance of the operations describedherein. Examples of such devices are described in the figures herein(for example, FIG. 1, FIG. 2, FIG. 6, FIG. 7, FIG. 8, and FIG. 9), andcan comprise circuitry and components as described in FIG. 13 and FIG.14. Example embodiments and components can take the form of an entirelyhardware embodiment, an entirely software embodiment, or an embodimentcombining software and hardware aspects.

Example embodiments are described below with reference to block diagramsand flowchart illustrations of methods, apparatuses, and computerprogram products. Steps of the block diagrams and flowchartillustrations support combinations of mechanisms for performing thespecified functions, combinations of steps for performing the specifiedfunctions, and program instructions for performing the specifiedfunctions. Example embodiments may take the form of web, mobile,wearable computer-implemented, computer software. It should beunderstood that each step of the block diagrams and flowchartillustrations, combinations of steps in the block diagrams and flowchartillustrations, or any functions, methods, and processes describedherein, can be implemented by a computer executing computer programinstructions. These computer program instructions may be loaded onto ageneral-purpose computer, special purpose computer, combinations ofspecial purpose hardware and other hardware, or other programmable dataprocessing apparatus. Example embodiments may take the form of acomputer program product stored on a machine-readable storage mediumcomprising executable instructions (e.g., software) that, when executedby a processor, facilitate performance of operations described herein.Any suitable machine-readable storage medium may be utilized including,for example, hard disks, compact disks, DVDs, optical data stores,and/or magnetic data stores.

The present application describes systems and methods relating to anautomated call detection and processing system 500 comprising one ormore processors and one or more memories that can store executableinstructions that, when executed by a processor, facilitate performanceof identifying, authenticating, and processing automated calls, whereinthe executable instructions can be comprised of one or more softwaremodules.

FIG. 1 is a diagram illustrating an example of system 100 in which auser equipment can access on-line services provided through one or moreserver devices having access to one or more data stores, or can makephone calls from a device owned by a calling party identity to a deviceowned by a called party identity. The system 100 can comprise one ormore computer networks 110, one or more servers 120, one or more datastores 130 (each of which can contain one or more databases ofinformation), and one or more user equipment (“UE”) 140 _(1-N). Theservers 120 and user equipment 140, which can be computing devices asdescribed in FIG. 13 and FIG. 14, can execute software modules that canfacilitate various functions, methods, and processes described herein.

In example embodiments, the one or more computer networks 110 (network110) can be operable to facilitate communication between the server(s)120, data store(s) 130, and UEs 140. The one or more networks 110 mayinclude any of a variety of types of wired or wireless computer networkssuch as a cellular network, private branch exchange (PBX), privateintranet, public switched telephone network (PSTN), plain old telephoneservice (POTS), satellite network, WiMax, data over cable network (e.g.,operating under one or more data over cable service interfacespecification (DOCSIS)), or any other type of computer or communicationsnetwork. The communications networks can also comprise, for example, alocal area network (LAN), such as an office or Wi-Fi network.

Referring to FIG. 1, the network 110 can be a cellular network employingvarious cellular technologies and modulation schemes to facilitatewireless radio communications between devices. For example, network 110can operate in accordance with a UMTS, long term evolution (LTE), highspeed packet access (HSPA), code division multiple access (CDMA), timedivision multiple access (TDMA), frequency division multiple access(FDMA), multi-carrier code division multiple access (MC-CDMA),single-carrier code division multiple access (SC-CDMA), single-carrier1-DMA (SC-FDMA), orthogonal frequency division multiplexing (OFDM),discrete Fourier transform spread OFDM (DFT-spread OFDM) single carrierFDMA (SC-FDMA), filter bank based multi-carrier (FBMC), zero tailDFT-spread-OFDM (ZT DFT-s-OFDM), generalized frequency divisionmultiplexing (GFDM), fixed mobile convergence (FMC), universal fixedmobile convergence (UFMC), unique word OFDM (UW-OFDM), unique wordDFT-spread OFDM (UW DFT-Spread-OFDM), cyclic prefix OFDM CP-OFDM, andresource-block-filtered OFDM. However, various features andfunctionalities of system 100 are particularly described wherein thedevices (e.g., the UEs 102 and the network device 104) of system 100 areconfigured to communicate through wireless signals using one or moremulti-carrier modulation schemes, wherein data symbols can betransmitted simultaneously over multiple frequency subcarriers.

In example embodiments, network 110 can be configured to provide andemploy 5G wireless networking features and functionalities. 5G wirelesscommunication networks are expected to fulfill the demand ofexponentially increasing data traffic and to allow people and machinesto enjoy gigabit data rates with significantly reduced latency. Comparedto 4G, 5G can support more diverse traffic scenarios. For example, inaddition to the various types of data communication between conventionalUEs (e.g., phones, smartphones, tablets, PCs, televisions, internetenabled televisions, etc.) supported by 4G networks, 5G networks can beemployed to support data communication between smart cars in associationwith driverless car environments, “internet of things” (IoT) devices, aswell as machine type communications (MTCs). Considering the drasticallydifferent communication resources of these different traffic scenarios,the ability to dynamically configure waveform parameters based ontraffic scenarios while retaining the benefits of multi-carriermodulation schemes (e.g., OFDM and related schemes) can provide asignificant contribution to the high speed/capacity and low latencydemands of 5G networks. With waveforms that split the bandwidth intoseveral sub-bands, different types of services can be accommodated indifferent sub-bands with the most suitable waveform and numerology,leading to improved spectrum utilization for 5G networks.

To meet the demand for data centric applications, features of proposed5G networks can comprise: increased peak bit rate (e.g., 20 Gbps),larger data volume per unit area (e.g., high system spectralefficiency—for example about 3.5 times that of spectral efficiency oflong term evolution (LTE) systems), high capacity that allows moredevice connectivity both concurrently and instantaneously, lowerbattery/power consumption (which reduces energy and consumption costs),better connectivity regardless of the geographic region in which a useris located, a larger numbers of devices, lower infrastructuraldevelopment costs, and higher reliability of the communications. Thus,5G networks can allow for: data rates of several tens of megabits persecond should be supported for tens of thousands of users, 1 gigabit persecond to be offered simultaneously to tens of workers on the sameoffice floor, for example; several hundreds of thousands of simultaneousconnections to be supported for massive sensor deployments; improvedcoverage, enhanced signaling efficiency; reduced latency compared toLTE.

The upcoming 5G access network can utilize higher frequencies (e.g., >6GHz) to aid in increasing capacity. Currently, much of the millimeterwave (mmWave) spectrum, the band of spectrum between 30 GHz and 300 GHzis underutilized. The millimeter waves have shorter wavelengths thatrange from 10 millimeters to 1 millimeter, and these mmWave signalsexperience severe path loss, penetration loss, and fading. The upcoming5G access network can also employ an architecture in which a user planeand control plane are separate, wherein complex control plane functionsare abstracted from forwarding elements, simplifying user planeoperations by relocating control logic to physical or virtual servers.

Still referring to FIG. 1, the communications network 110 can comprise afixed-packet network. The fixed packet network can be a broadbandnetwork using internet protocol (IP) to deliver video, voice, and data.An example of such a network is a cable television (CATV) infrastructureimplementing the data over cable service interface specification(DOCSIS) and PacketCable standards, which allow a multiple serviceoperator (MSO) to offer both high-speed internet and voice over internetprotocol (VoIP) through an MSO's cable infrastructure. In someimplementations, the fixed packet network can have headend equipmentsuch as a cable modem termination system (CMTS) that communicatesthrough one or more hybrid fiber coax (HFC) networks with user premisesequipment such as a cable modem or embedded multimedia terminal adapter(EMTA) (see below). The fixed packet network can also comprise networksusing asynchronous transfer mode (ATM), digital subscriber line (DSL),or asymmetric digital subscriber line (ADSL) technology. These networkshave typically been provided by telephone companies. ATM and DSL/ADSLequipment can be located at an exchange or central office, and caninclude integrated DSL/ATM switches, multiplexers such as digitalsubscriber line access multiplexers (DSLAMS), and broadband remoteaccess servers (B-RAS), all of which can contribute to the aggregationof communications from user equipment onto a high-capacity uplink (ATMor Gigabit Ethernet backhaul) to internet service providers (ISPs).Transmission media connecting the central office and user equipment caninclude both twisted pair and fiber.

The network 110 can also comprise a one or more satellite networks,which can enable the exchange of voice, data, and video. In addition totelevision programming services, satellite networks, such as a DBS(Direct Broadcast Satellite) system, operated by DBS broadcast satelliteproviders (e.g., Dish Networks, DIRECTV, HughesNet), can be operable toenable high speed internet and voice services.

The network 110 can also comprise a POTS network that supports thedelivery of voice services employing analog signal transmission overcopper loops.

Referring to FIG. 1, servers 120 can be operable to send via network 110executable code capable of generating graphical user interfaces (GUIs)that a user identity can interact with to facilitate the provision ofsuch on-line data, or voice services. The GUIs can be, for example, awebpage that can be displayed (and interacted with) on a user equipment140. Modules comprising executable instructions that, when executed by aprocessor of the server 120, facilitate performance of operations, suchas the exchange of data or the exchange of voice (e.g., a soft phone),can be stored on a memory device of the server 120 (or a memory deviceconnected to the server 120).

The data stores 130 can comprise physical media for storing information,housed within the one or more servers 120, peripherally connected to theone or more servers, or connected to the servers 120 through one or morenetworks. For example, the storage device can be connected to theprocessor of a server, via, for example, a communications medium such asa bus (e.g., SATA, eSATA, SCSI, flash, or the like). As another example,data stores 130 can be peripheral devices, set up as a redundant arrayof independent disks (RAID) array, a storage area network (SAN), ornetwork attached storage (NAS). The data stores can comprise magneticmemory, such as a hard drive or a semiconductor memory, such as RandomAccess Memory (RAM), Dynamic RAM (DRAM), non-volatile computer memory,flash memory, or the like. The memory can include operating system,administrative, and database program modules that support the methodsand programs disclosed in this application.

Referring to FIG. 1, user equipment 140 can be, for example, a tabletcomputer, a desktop computer, or laptop computer, a cellular enabledlaptop (e.g., comprising a broadband adapter), a handheld computingdevice, a mobile phone, a telephone, a smartphone, a tablet computer, awearable device, a virtual reality (VR) device, a heads-up display (HUD)device, an IoT device, and the like.

In example embodiments, a customer premises equipment (CPE) 150 canprovide access for the UE (e.g., UE 140 ₂) to the one or more networks110. The CPE 150 can comprise a broadband access modem (e.g., cablemodem, DSL modem, Wi-MAX modem, satellite modem). The CPE 150 can alsocomprise a gateway device (also referred to as a residential gateway,home gateway, set top gateway) that processes video, voice packets, anddata packets and serves as a broadband connectivity point for variousdevices (e.g., video set-top boxes, computers, mobile devices,telephones). The UE (e.g., UE 140 ₂) can be connected to the CPE devicevia, for example, an Ethernet interface, or a wireless access pointdevice (which can be embedded within the CPE device, or connected to theCPE device as a peripheral device), which can operate in accordance withthe IEEE 802.11 family of standards.

For voice services, a computer (or computing device) connected to anetwork 110 that executes VoIP software can allow for voice calls to bemade via a computer application (i.e., a “softphone” such as thatoffered by Skype). The VoIP software can be provided by one or moreservers 120. Additionally, the CPE 150 can be embedded with a VoIPadapter, through which a telephone 140 ₃ can connect (e.g., via an RJ-11phone jack) and make voice calls. Examples of such devices that supportvoice and data communications are referred to as a telephony modems,embedded multimedia terminal adapters (EMTAs), digital voice modems,voice data modems, voice and internet modems, and the like. In otherembodiments, a VoIP adapter can be peripheral to the broadband modem,and the telephone can connect to that VoIP adapter (e.g., an adapterprovided by Vonage, Ooma, etc.). In other embodiments, a VoIP adaptercan be connected to a computer, for example, via its universal serialbus (USB) port (e.g. an adapter provided by magicJack).

Referring to FIG. 1, a UE 140 ₄ can be a mobile device used to make andaccept voice calls, including a cellular phone, as well as a tablet witha cellular adapter. The mobile device can be operative to make voicecalls through the network 110 to other communications devices. Furtherdetails describing a mobile device are described below in FIG. 14 below.

The UE 140 can also be a POTS telephone 140 ₅ connected to the network110.

FIG. 2 is a diagram that illustrates an example networking environmentin which a typical automated dialer 210 can be operable to initiateautomated calls (e.g., robocalls). Typically, an automated dialer 210(also referred to as an automated dialer system, automated callingsystem, robocaller, or predictive dialer) is used in business toconsumer (B2C) applications, and can be one or more computers operableto run modules that, when executed, automatically makes voice calls,which can be made simultaneously or in rapid succession, to a pluralityof call destinations. The automated dialer 210 can be for example, a UEhaving a broadband connection and operable to make VoIP calls (e.g., UE140 ₂), and the modules can be locally stored or provided by one or moreservers (e.g., servers 120). The automated dialer 210 can make voicecalls to called party UEs 220 _(1-N), which can be one or more UEs 140(e.g., a cellular phone, a VoIP phone, a POTS phone, etc.) that areoperable to answer voice calls. After connection with a called party UE220 (one of the plurality of called party UEs 220 _(1-N)) the automateddialer 210 plays a pre-recorded message to either the called partyidentity, or a voicemail system if the called party identity does notanswer. Almost all robocalls originate through a VoIP network. Examplevendors of automated dialers and predictive dialers can includeVoice2Phone, VoiceShot, Voicent, CallFire and Five9.

Intercepting and blocking unwanted automated calls can be a challenge,in large part because some of these calls are actual public serviceannouncements, such as from the weather service, school system, publicsafety departments, etc. In other example use cases, largeorganizations, for example a large religious congregation, might userobocalls as an effective way to distribute pre-recorded messages. Thereare many ways to mask a call as a legitimate call by “spoofing” theoriginating number, such that the automated call appears to a blockingsystem, as well as called party identities, as coming from a legitimatesource. Additionally, some called party identities might desire tocontinue to receive robocalls for which they have an interest.

In FIG. 3, a typical automated dialer 210 operated by marketingidentities, can at transaction (1) receive automated dialer inputs. Anautomated dialer input can comprise a plurality of target phone numberscorresponding to called party UEs (e.g., UEs 220 _(1-N)). The phonenumbers might have been collected from called party identities, whomight have provided their phone numbers in response to surveys,purchases, etc. A typical automated dialer 210 allows input of phonenumbers manually, as well by uploading a spreadsheet, or some other typeof file, having the phone numbers. An automated dialer input can alsocomprise a “spoofed” number. A marketing identity can enter a numberthat the marketing identity wants to appear on a called party UE 220'scaller ID display, instead of the originating number of the automatedcall (e.g., number of the calling party, also known as an “A number”).An automated dialer input can also comprise a pre-recorded message(e.g., an audio file) which can be input by uploading or otherwisetransferring the file to the automated dialer 210. The pre-recordedmessage is played by the automated dialer 210 when the automated call isanswered by the called party UE 220 (or its answering service).

At transaction (2) of FIG. 3, the automated dialer 210 can make amultitude of voice calls directed at called party UEs 220 _(1-N). Forillustrative purposes, only one called party UE 220 is shown. Theautomated dialer 210, with its own spoofing module, or through a callerID spoofing system 310 provided by another server, can be operable totransmit the inputted spoofed number with the call in place of theoriginating number that would otherwise show up on a caller ID display.Thus, each call would have associated with it the spoofed caller IDnumber that was entered at transaction (1). The calls that are made bythe auto-dialer can be directed to phone numbers input into theautomated dialer 210 at transaction (1), as well as numbers selected bya predictive dialer, which can include numbers in a sequence (dialingnumbers in sequential order), a block, or a range. Certain blocks ofphone numbers are meant for certain businesses (for example, a block ofnumbers can be reserved for hospitals), and as such, numbers inparticular blocks might be targeted by automated dialers. Numbers in arange are like numbers that are sequentially dialed, but are certainranges of numbers within a sequence. Automated dialers can sometimes useranges of numbers to avoid sequence dialing detecting algorithms thatattempt to block automated calls (e.g., calling 0000 to 0500 mighttrigger an alert, but selecting a range of numbers within that sequencemight avoid detection). Another characteristic of automated calls mightbe that the calls were dialed simultaneously, or in rapid successionwith a short time-frame between each call (e.g., no pauses, or nosignificant pauses between calls).

At transaction (3), when a called party UE 220 is dialed, a caller IDservice might display the number to the called party identity via thecalled party UE 220's GUI. If an automated call contained a spoofednumber, the spoofed number might appear.

A typical automated dialer 210 can be further operative to, in responseto a called party identity answering an automated call, connect thecalled party UE 220 with a qualifier, wherein the qualifier might be aninteractive voice response system (IVR) that prompts the called partyidentity to select or enter information. If certain information enteredby the called party to the qualifier indicates that the called partyidentity's profile matches a profile of the marketing identity's targetaudience, the automated dialer 210 can be operative to connect thecalled party UE 220 with a sales agent.

FIG. 4 illustrates a typical response and experience of a user identityto an automated call. At step 405, the called party identity might haveresponded to a survey, signed up for an event, filled out an on-lineapplication, or gave approval for a particular service or application toaccess his or her contact information, wherein the contact informationcomprises the called party identity's phone number. The called partyidentity's phone number might eventually wind up on a marketing entity'sphone list.

At step 410, the called party identity might receive a phone call (e.g.,an incoming call) on his or her phone (e.g., called party UE 220). Ifthe phone is operable to display caller ID information, the callingparty's number and name might show up on the caller ID display. However,this number and information might be a spoofed number and spoofed name.The number might have, for example, an area code that is the same as thearea code of the called party identity's phone number, such that thecalled party identity might believe that the calling party is a localidentity, such as a nearby friend or neighbor, thereby increasing theprobability that the called party identity will answer the automatedcall.

At step 415, the called party identity can decide whether to answer thecall. In response to the user not taking the call, at step 420 the callmight be directed to the called party identity's voice mail, in whichcase the automated dialer 210 plays the prerecorded message related tothe subject matter of the sales call.

At step 425, if the called party identity answers the call, theautomated dialer 210 plays a prerecorded message briefly describing thegoods or services being sold, and then prompts the called party identityto either push a button to speak to a representative or push a button tobe removed from the marketer's phone list.

At step 430, in response to a called party identity's selection to beremoved from the marketer's phone list, the called party identity'sselection will most likely be ignored. If the called party entity atstep 435 decides to hang up (e.g., end the call), the called party mightstill get more automated calls in the future. If the called partyidentity responds by indicating a desire to speak with a representative,the automated dialer 210 might at step 440 connect the user with aqualifier, which can prompt the called party identity to select or enterinformation. If certain information entered indicates that the calledparty identity's profile matches a profile of the marketing identity'starget audience, the called party identity at step 450 is transferred toa sales agent. If the called party identity's profile does not match,then at step 455 the automated dialer 210 can inform the called partyidentity that his or her profile does not qualify them for the offer,and then disconnect. After disconnection, as was the case at step 435,the called party identity might still get another automated call in thefuture. As such, with automated calls, the experience of a called partyidentity can range from being annoyed, to being angry and frustrated.

Referring to FIG. 5, in example embodiments of the present applicationdescribed herein, an automated call detection and processing system 500comprising one or more processors and one or more memories that canstore executable instructions that, when executed by a processor,facilitate performance of identifying, authenticating, and blocking ofautomated calls, wherein the executable instructions can be comprised ofone or more software modules. The system 500 can be implemented as anetwork device, which can comprise one or more servers, one or more datastores, or even within a communications switch. Regarding theoperations, at the identification stage 510, the system can determinewhether the originating number is a number that has been spoofed. Whilethere might be legitimate reasons for a calling party's use of spoofednumbers (e.g., a police investigation in which an investigator uses apretense), the likelihood that an automated call is vexatious,malicious, or fraudulent is higher when the calling party is spoofingits number. In response to a determination that the originating numberhas been spoofed, the system can determine whether the characteristicsof the call are consistent with those of an automated call, for exampleexhibit certain patterns or behaviors (e.g., by determining whether thecalls coming from the originating number are in a sequence, a range, ora block, or whether the calls were dialed simultaneously, or in rapidsuccession with a short time-frame between each call).

At the authentication stage 520, in response to a determination that thecall is an automated call, the system 500 can be operative to determinewhether the automated call originates from certain authorities approvedfor legitimate automated calls (e.g., emergency authorities, NSA,political fund raising, etc.). It can also be determined whether theoriginating number is in a database comprising crowdsourced orinvestigated blacklisted numbers (e.g., known to be a source ofmalicious or vexatious automated calls), or whether the originatingnumber is in a database comprising the called party's personalized blacklist.

At the blocking stage 530, in response to a determination during theauthentication process that the automated call should be blocked, thesystem 500 can be operative to block the call (e.g., terminate thecall), or alternatively, divert the call with to a voice messagingsystem that answers with a “do not call.”

FIG. 6 depicts an example environment 600 in which the automated calldetection and processing system (e.g., call detection and processingsystem 500) can be implemented. The environment can comprise anautomated dialer (e.g., automated dialer 210) that directs automatedcalls thought a communications network (e.g., network 110) to one ormore called party UEs (e.g., UEs 220 _(1-N)). For illustrative purposes,only one called party UE 220 is shown.

In example embodiments, as shown in FIG. 6, the network can comprise anIP network 610, which can be a fixed packet network, and a cellularnetwork 620. The call can be processed through a user plane and acontrol plane, wherein each plane can be conceptualized as differentareas of communications operations. Each plane carries a different typeof traffic and can be implemented as overlay networks that runsindependently on top of another one, although supported by itsinfrastructure. The user plane (sometimes known as the data plane,forwarding plane, carrier plane, or bearer plane) carries the networkuser traffic, and the control plane carries signaling traffic. Inexample embodiments, the planes can be implemented in the firmware ofrouters and switches. Software-defined networking (SDN) decouples thedata and control planes, removes the control plane from networkhardware, and implements the control plane in software instead, whichenables programmatic access and, as a such, can make networkadministration much more flexible and dynamic A network administratorcan shape traffic from a centralized control console without having totouch individual switches. The administrator can change any networkswitch's rules when necessary—prioritizing, de-prioritizing or evenblocking specific types of packets.

With respect to FIG. 6, the user plane 630 can carry the network usertraffic (e.g., voice traffic) between the automated dialer 210 and thecalled party UE 220. In the example embodiment shown, the communicationsthrough the user plane can comprise session border controllers (SBCs)640 ₁ and 640 ₂ at the edge of the IP network 610, wherein an SBC can behardware or software applications that oversees the manner in whichcalls (e.g., sessions) are initiated (set up), conducted, and terminated(or torn down) on a voice over internet protocol (VoIP) network,including for both telephone calls or other interactive mediacommunications. An SBC can act as a router, allowing only authorizedsessions to pass through the connection point (e.g., border). The SBCcan also monitor the quality of service (QoS) status for calls, applyQoS rules, prioritized calls (e.g., emergency calls), and function as afirewall by identifying threats. Additionally, SBCs often providemeasurement, access control, and data conversion for the calls theycontrol. Typically, SBCs are deployed on both the carrier and enterprisesides of the connection.

In FIG. 6, the automated call detection and processing system 500 canoperate at the control plane level, wherein the control plane 650carries signaling traffic (e.g., control packets), including the controlpackets between automated dialer 210 and called party UE 220. Theautomated call detection and processing system 500, described in furtherdetail below with respect to FIG. 7, can be operative to facilitate theidentifying, authenticating, and blocking of automated calls. Withrespect to authentication, as mentioned above in FIG. 5 and itscorresponding text, a called party identity, after being called by anautomated dialer, can select for entry the originating number to adatabase comprising the called party's personalized black list. Inexample embodiments, the called party identity's entry can be storedwith a called party identity's profile in a user data registry (UDR)660, which can contain a multitude of profiles of different called partyidentities (e.g., crowdsourced from other parties who have been autodialed). Other user data registries can comprise a home subscriberserver (HS S) database, which contains subscription-related information(subscriber profiles), performs authentication and authorization of thecallers, and provides information about a subscriber's location and IPinformation. Other user data registries can comprise a home locationregister (HLR), or an authentication centre (AuC).

FIG. 7 illustrates a block diagram of an example automated calldetection and processing system 500 that facilitates operationscomprising the identification, authentication, and blocking of automatedcalls. The system 500 can comprise a spoofing detector 710, forfacilitating the identification of automated calls. The spoofingdetector 710 can receive incoming calls, and determine whether anoriginating number associated with the call matches a caller ID numberassociated with the call. If an automated dialer (e.g., automated dialer210) used a caller ID spoofer (e.g., caller ID spoofer 310) to present acaller ID number different from the originating number of the calledparty, then the likelihood of the call being a vexatious or maliciousautomated call increases. In a typical communications system, one ormore switches, which can reside within a switching center, performs theswitching necessary to interconnect calls between user devices. When acalling party contacts a called party, a request from the user'stelephone is sent to network (e.g., network 110) to make a connectionwith the called party. As is known in the art, the number from which thecall originates (e.g., the originating number) is referred to as the “Anumber” and the called party's number is termed the “B number.”Typically, a “B number analysis” is performed whereby a switch uses theA number and B number to determine the better path to route the call.Although a caller ID number can be spoofed, the underlying A number ofthe call remains and is not only used for routing purposes, but is alsoassociated with the calling party's account for billing purposes (whichcan be stored in, for example, a UDR 660).

In example embodiments in accordance with the present application, thefunctionality of the automated call detection and processing system 500,or in some example embodiments the spoofing detector 710, can residewithin a switch. The spoofing detector can be operable to, inconjunction with the switch's B number analysis, use the A number todetermine whether the A number matches the caller ID number of the call.If the caller ID number associated with the call does not match up withthe calling party's originating number, then this is an indication thatthe originating number has been spoofed. In response to a determinationthat the originating number has been spoofed, the system 500 can performfurther analysis to determine whether the call is one of a group ofcalls consistent with calls made by an automated dialer. Automateddialers typically place an exorbitant number of calls. Onecharacteristic of auto dialed calls are that there are no significantpauses between the calls, or that the calls might be simultaneouslydialed. As another example, calls coming from an automated dialer are ina sequence, a range, or a block (as mentioned above). The system 500 candetermine, based on an aggregate number of calls having the originatingnumber, whether calls associated with that originating number exhibitthe characteristics of automated calls.

Still referring to FIG. 7, in response to a determination by thespoofing detector that the call is one of a group of calls from theautomated dialer that exhibit the characteristics of automated calls, aprofile quarantine component 720 can processes anomalous profiles thatcan use more examination and approval. It can determine whether theoriginating number corresponds to a number of a legitimate callingparty, or whether the originating number is a blacklisted number (i.e.,determined to belong to a party that originates vexatious or maliciousrobocalls) by querying one or more databases, which may reside in one ormore data stores. The profile quarantine component 720 can query anentity identity database EID 730, wherein the EID contains entries forlegitimate government identities or official identities that are allowedto initiate robocalls for various reasons such as public safety,national security, and political polling. If the originating numbermatches an entry in this database, the call can be directed to a callforwarding component 740 which forwards the call to be connected withthe intended called party UE.

Still on FIG. 7, if the originating number does not match an entry inthe EDI 730, the profile quarantine component 720 can be furtheroperable to query a caller blacklisted database CBD, which can containentries relating to identified and verified blacklisted profiles. TheCBD 750 can be a dynamic database that is continuously updated with theoriginating numbers from which automated calls are made. The updates canbe based upon the submissions of called party identities indicating thatthe call is an unwanted robocall (e.g., crowdsoured). The originatingnumber can be used to determine the name of the calling party identity.The calling party identity can be determined, for example, by queryingthe UDR 660 to determine the name of the called party associated withthe originating number, as the UDR 660 can contain not only informationrelated to the called party, but also information related to the callingparty. A database entry for that calling party identity can haveassociated with it numerous originating numbers. Each originating numbercan be associated with the calling party identity, and each callingparty identity can have numerous originating numbers associated with it.

As an example, a determination can be made that the originating numberis associated with the Ajax Marketing Company, and further that the AjaxMarketing Company might have five originating numbers that it has beenusing to make automated calls. Each time a called party identity reportsone of the originating numbers as being a robocall to be blocked, anentry can be created in the profile for Ajax Marketing Company. If theaggregate number of entries of originating numbers associated with AjaxMarketing Company reaches a certain threshold number (e.g., 200entries), then future calls from Ajax Marketing Company, regardless ofwhich automated number Ajax Marketing Company uses to dial, can resultin automated calls from Ajax Marketing Company being blocked.

The CBD 750 can also store entries for originating numbers associatedwith called parties that have been subject to criminal investigation, orthat have been added based on consumer complaints to the federalcommunications commission (FCC).

Additionally, the profile quarantine component 720 can query a UDR(e.g., UDR 660) to determine whether the originating number isassociated with an entry stored in the UDR 660 under the called partyidentity's profile. This entry can be based upon the submissions of thecalled party UE 220 indicating that the call is an unwanted robocall.

Still referring to FIG. 7, in response to a determination by the productquarantine component 720 that the originating number is associated witha blacklisted entry that is in either in the CBD 750 or in the URD 660,the product quarantine component 720 can communicate with a call denialof service (CDoS) component 760 that handles blocking of the call. Thesystem 500 can be operative to block the call. The system can alsodivert the call by connecting it with a voice messaging service thatanswers with a “do not call” message. An IVR service can also be used toemit a dial tone of “2” signifying to the automated dialer 210 that thecalled party wishes to be removed from the automated dialer 210'scalling list.

In response to a determination by the product quarantine component 720that the originating number does not appear in any blacklist database(e.g., contained in the CBD 750 or UDR 660), the product quarantinecomponent 720 can communicate with the call forwarding component 740 toprocess the call and connect the calling party identity with the calledparty identity. In this situation, a call that had been determined tohave been identified by the spoofing detector 710 to be an automatedcall, and been further investigated by the product quarantine component720 as not originating from a blacklisted identity, has been allowed toproceed with connection establishment. In some example embodiments, thesystem 500 can be operative to replace a caller ID number, if spoofed,with the actual originating number of the automated dialer 210. Afterestablishment of this call with the called party UE 220, the calledparty identity can still block future calls from the calling party. Forexample, the called party UE 220 can provide the called party identitywith options to block the automated call from the calling party, asdescribed below with respect to FIG. 8 and FIG. 9. In response to anindication that the called party wishes to block future calls from thecalled party initiating the robocall, the called party UE 220 can send amessage back to the system 500. The system 500 can store the originatingnumber in a blacklist entry in the CBD 750. As mentioned above, ifenough called party identities indicate that they would like to have thenumber blocked, then at some point (e.g., after reaching a thresholdnumber of indications to block), the originating number, as well as anyother originating numbers belonging to the calling party identityassociated with the originating number, can be blacklisted. As a result,the next time a call is made by the automated dialer 210, any callsinitiated by the calling party identity can be blocked.

Still referring to FIG. 7, additionally, when a called party UE 220sends a communication back to the system 500 indicating that anoriginating number should be blocked, the system 500 can also update thecalled party identity's blacklist, which can be stored as part of thecalled party's profile in UDR 660, so that future calls to the calledparty from this originating number can be blocked by the system 500. Thesystem 500 can also be operable to identify the calling party identity,and determine whether other originating numbers belong to the callingparty identity; those other originating numbers can also be added tocalled party identity's blacklist.

FIG. 8 illustrates an example GUI in which a called party UE 220 can beoperative to present a called party identity with a prompt to manageoptions related to the processing of the originating number of anautomated call. In response to a determination by the automated calldetection and processing system 500 to process an automated call andconnect the calling party identity with the called party identity, acalled party UE 220 might ring to alert a user of the call. The calledparty identity might answer the call and experience one or more of thesteps as shown in FIG. 4. The called party UE 200 can be operable todisplay a call log entry showing a log entry for the automated call. Inresponse to the called party identity selecting the call log entry, thecalled party UE 220 can display a GUI as shown in FIG. 8 that shows thecalled party identity's originating number 800. As mentioned above,system 500 can be operable to replace any spoofed caller ID number withthe actual originating number that made the call, but here, the system500 replaced the spoofed caller ID number with the originating number.

While a typical phone can have options to create a contact for theoriginating number 800, or update a contact so as to associate theoriginating number with an existing contact, in example embodiments ofthe present application, the called party UE 220 can be operable todisplay a “Robocall Options” button 810. Upon selection of the robocalloptions button 810, the called party UE 220 can be operable to displaythe interface show in FIG. 9.

FIG. 9 illustrates an example GUI in which a called party UE 220 can beoperative to present a called party identity with several promptsrelated to options for responding to an automated call.

If the called party identity selects the “block this number” option 900,the called party UE 220 can be operable to send a communication to theautomated call detection and processing system 500 indicating that theoriginating number 800 (e.g., 678-856-1115) should be blocked. Thesystem 500 can also update the called party identity's blacklist, whichcan be stored as part of the called party's profile in UDR 660 in thenetwork 110, so that future calls to the called party from thisoriginating number can be blocked at the network level, as opposed tothe device level. The system 500 can also be operable to identify thecalling party identity, and determine whether other originating numbersbelong to the calling party identity; those other originating numberscan also be added to called party identity's blacklist.

Still referring to FIG. 9, if the called party identity selects the“Send to Robocall Blacklist Registry,” button 910, the system 500 canrespond to the communication to block the originating number 800 byupdating the CBD 750, which contains entries based on requests to blockfrom a plurality of called parties. If the called party identity doesnot believe the automated call to be vexatious or malicious, he or shecan choose to block the call, but choose not to send a communicationthat might result in all future calls from the calling party beingblocked.

The called party device 220 can also be operable to display to thecalled party identity an option to initiate the filing of an FTCcomplaint regarding the automated call. For example, a user can select a“File FTC Complaint” button 920. After receiving a user input selectingthis option, the called party device 220 can automatically present astep-by-step “wizard” interface to obtain information from the calledparty identity that the FTC typically seeks to obtain when an identityfiles a complaint regarding robocalls. For example, the first screenmight have the categories of “telemarketing—unwanted telemarketing callson a landline or mobile device”, or “the call in question was apre-recorded call, commonly known as a robocall” already selected inresponse to the called party's selection of button 920. The wizard canbe operative to enable the called party to input other details as well,as such as the contact date, phone call, how much did the telemarketerask the consumer identity to pay, how much did the consumer actuallypay, how did the consumer respond to the contact, etc.

Still referring to FIG. 9, the called party device 220 can also beoperable to display to the called party identity an option to “Allowfuture calls from this number” 930. A called party identity can selectthis option so as to “whitelist” the number. In example embodiments, thecalled party identity's selection can be stored in the network 110(e.g., in the UDR 660), and the product quarantine component 720 can beoperative to query the UDR 660 for future calls from the originatingnumber. Here, the called party identity can choose to receive robocalls,even if other called parties have identified and reported theoriginating number as a vexatious or malicious robocall.

Moving on to FIG. 10, in example embodiments, a method performed by anetwork device (e.g., a switch, a server, a computer, etc.) comprising aprocessor can facilitate performance of operations as illustrated inflow diagram 1000 of FIG. 10. As shown at 1010, the operations cancomprise receiving a call from a communications device directed to acall destination. The communication device can be an automated dialer(e.g., automated dialer 210), and the call destination can be a calledparty UE (e.g., called party UE 220).

At step 1020, the operations can comprise identifying the call as anautomated call from the communications device. The identifying cancomprise determining whether a first phone number of a call used by anetwork to route the call (e.g., the originating number, or the Anumber) matches a second phone number identifying the call (e.g., thecaller ID number, which may have been spoofed). The identifying can alsocomprise, in response to a determination that the first and secondnumbers do not match, analyzing, by the network device, a call behaviordetermined to be related to the call to determine whether the callexhibits a characteristic of automated calls (e.g., whether the calldestination number is a call that is in a sequence, a range, or a block(as mentioned above), thereby exhibiting the characteristic of automatedcalls).

At step 1030, the operations can comprise, in response to identifyingthe call as the automated call, determining whether the call is approvedfor connection to the call destination. In example embodiments,determining whether the call is approved comprises accessing an entityidentity data store (e.g., EID 730), comprising a data entry for anentity identity (e.g., the government, severe weather warning services,emergency services, etc.) indicated to be allowed to initiate theautomated call and determining whether the call is associated with thedata entry. In example embodiments, determining whether the call isapproved comprises accessing an entity identity data store (e.g., CBD750) comprising a data entry for an entity identity that is indicatednot to be permitted to initiate the automated call (e.g., a blacklistedcalling party) and determining whether the call is associated with thedata entry. The data entry stored can be stored at the request of thecommunications device associated with the call destination (e.g., thecalled party UE).

Still referring to FIG. 10, the operations further comprise, in responseto determining that the call is approved for connection to the calldestination, connecting the call to the call destination. The operationscan optionally further comprise, in response to determining that thecall is not approved for connection to the call destination, blockingthe call to the call destination.

Referring now to FIG. 11, in example embodiments a device (e.g., aswitch, network device, computer, etc.), comprising a processor and amemory that stores executable instructions that, when executed by theprocessor, facilitate performance of operations 1100. The operations1100 at step 1110 can comprise receiving a call from a communicationsdevice (which might be an automated dialer) directed to a calldestination (e.g., a called party UE).

The operations 1100 can further comprise, in step 1120, identifyingwhether the call is an automated call from the communications device,wherein the identifying comprises determining whether an originatingnumber of the call (e.g., an A number) matches a caller identificationnumber of the call (e.g. caller ID number), wherein the originatingnumber is used by a network to route the call, and analyzing a callbehavior determined to be related to the call to determine whether thecall exhibits a characteristic of automated calls.

Still referring to FIG. 11, the operations 1100 can further comprise, instep 1130, in response to the identification of the call as theautomated call, determining whether the call is approved for connectionto the call destination. In example embodiments, determining whether thecall is approved comprises accessing an entity identity data store(e.g., EID 730), comprising a data entry for an entity identity (e.g.,the government, severe weather warning services, emergency services,etc.) indicated to be allowed to initiate the automated call anddetermining whether the call is associated with the data entry. Inexample embodiments, determining whether the call is approved comprisesaccessing an entity identity data store (e.g., CBD 750) comprising adata entry for an entity identity that is indicated not to be permittedto initiate the automated call (e.g., a blacklisted calling party) anddetermining whether the call is associated with the data entry. The dataentry stored can be stored at the request of the communications deviceassociated with the call destination (e.g., the called party UE).

Referring now to FIG. 12, in example embodiments, there is provided amachine-readable storage medium comprising executable instructions that,when executed by a processor, facilitate performance of operations 1200.

The operations can comprise, at step 1210, receiving a call from acommunications device directed to a user equipment (e.g., called partyUE 220). The communications device might be an automated dialer(automated dialer 210).

Still on FIG. 12, at step 1220, the operations 1200 can further compriseidentifying whether the call is an automated call from thecommunications device, wherein the identifying comprises determiningwhether an originating number of the call used by a network to route thecall matches a caller identification number of the call, and determiningwhether the call is one of a group of received calls from thecommunications device, wherein the call and the group of received callscollectively exhibit a characteristic of automated calls (e.g., whetherthe call destination number is a call that is in a sequence, a range, ora block, or whether the calls were dialed in rapid succession with ashort time-frame between each call).

At step 1230, the operations 1200 can further comprise, in response tothe identification of the call as an automated call, determining whetherthe call is approved for connection to the user equipment.

Referring now to FIG. 13, there is illustrated a block diagram of acomputer 1300 operable to execute the functions and operations performedin the described example embodiments. For example, a user device (e.g.,called party UE 220), or a communications network system (e.g.,automated call detection and processing system 500), can containcomponents as described in FIG. 13. The computer 1300 can providenetworking and communication capabilities between a wired or wirelesscommunication network and a server and/or communication device. In orderto provide additional context for various aspects thereof, FIG. 13 andthe following discussion are intended to provide a brief, generaldescription of a suitable computing environment in which the variousaspects of the various embodiments can be implemented to facilitate theestablishment of a transaction between an entity and a third party.While the description above is in the general context ofcomputer-executable instructions that can run on one or more computers,those skilled in the art will recognize that the various embodimentsalso can be implemented in combination with other program modules and/oras a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the inventive methods can be practiced with other computer systemconfigurations, comprising single-processor or multiprocessor computersystems, minicomputers, mainframe computers, as well as personalcomputers, hand-held computing devices, microprocessor-based orprogrammable consumer electronics, and the like, each of which can beoperatively coupled to one or more associated devices.

The illustrated aspects of the various embodiments can also be practicedin distributed computing environments where certain tasks are performedby remote processing devices that are linked through a communicationsnetwork. In a distributed computing environment, program modules can belocated in both local and remote memory data stores.

Computing devices typically include a variety of media, which caninclude computer-readable storage media or communications media, whichtwo terms are used herein differently from one another as follows.

Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media can include,but are not limited to, RAM, ROM, EEPROM, flash memory or other memorytechnology, CD-ROM, digital versatile disk (DVD) or other optical diskstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic data stores, or other tangible and/or non-transitorymedia which can be used to store desired information. Computer-readablestorage media can be accessed by one or more local or remote computingdevices, e.g., via access requests, queries or other data retrievalprotocols, for a variety of operations with respect to the informationstored by the medium.

Communications media can embody computer-readable instructions, datastructures, program modules or other structured or unstructured data ina data signal such as a modulated data signal, e.g., a carrier wave orother transport mechanism, and comprises any information delivery ortransport media. The term “modulated data signal” or signals refers to asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in one or more signals. By way ofexample, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference to FIG. 13, implementing various aspects described hereinwith regards to the network devices (e.g., server 120, switch, etc.),UEs (e.g., UE 140, called party UE 220), and user premises devices(e.g., user premise device 230) can comprise a computer 1300, thecomputer 1300 comprising a processing unit 1304, a system memory 1306and a system bus 1308. The system bus 1308 couples system componentscomprising the system memory 1306 to the processing unit 1304. Theprocessing unit 1304 can be any of various commercially availableprocessors. Dual microprocessors and other multi-processor architecturescan also be employed as the processing unit 1304.

The system bus 1308 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1306comprises read-only memory (ROM) 1327 and random access memory (RAM)1312. A basic input/output system (BIOS) is stored in a non-volatilememory 1327 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1300, such as during start-up. The RAM 1312 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1300 further comprises an internal hard disk drive (HDD)1314 (e.g., EIDE, SATA), which internal hard disk drive 1314 can also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1316, (e.g., to read from or write to aremovable diskette 1318) and an optical disk drive 1320, (e.g., readinga CD-ROM disk 1322 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1314, magnetic diskdrive 1316 and optical disk drive 1320 can be connected to the systembus 1308 by a hard disk drive interface 1324, a magnetic disk driveinterface 1326 and an optical drive interface 1328, respectively. Theinterface 1324 for external drive implementations comprises at least oneor both of Universal Serial Bus (USB) and IEEE 1294 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject embodiments.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1300 the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer 1300, such aszip drives, magnetic cassettes, flash memory cards, cartridges, and thelike, can also be used in the example operating environment, andfurther, that any such media can contain computer-executableinstructions for performing the methods of the disclosed embodiments.

A number of program modules can be stored in the drives and RAM 1312,comprising an operating system 1330, one or more application programs1332, other program modules 1334 and program data 1336. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1312. It is to be appreciated that the variousembodiments can be implemented with various commercially availableoperating systems or combinations of operating systems.

A user can enter commands and information into the computer 1300 throughone or more wired/wireless input devices, e.g., a keyboard 1338 and apointing device, such as a mouse 1339. Other input devices 1340 caninclude a microphone, camera, an IR remote control, a joystick, a gamepad, a stylus pen, touch screen, biometric reader (e.g., fingerprintreader, retinal scanner, iris scanner, hand geometry reader, etc.), orthe like. These and other input devices are often connected to theprocessing unit 1304 through an input device interface 1342 that iscoupled to the system bus 1308, but can be connected by otherinterfaces, such as a parallel port, an IEEE 2394 serial port, a gameport, a USB port, an IR interface, etc.

A monitor 1344 or other type of display device can also be connected tothe system bus 1308 through an interface, such as a video adapter 1346.In addition to the monitor 1344, a computer 1300 typically comprisesother peripheral output devices (not shown), such as speakers, printers,etc.

The computer 1300 can operate in a networked environment using logicalconnections by wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1348. The remotecomputer(s) 1348 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentdevice, a peer device or other common network node, and typicallycomprises many or all of the elements described relative to thecomputer, although, for purposes of brevity, only a memory/data store1350 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1352 and/orlarger networks, e.g., a wide area network (WAN) 1354. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theinternet.

When used in a LAN networking environment, the computer 1300 isconnected to the local network 1352 through a wired and/or wirelesscommunication network interface or adapter 1356. The adapter 1356 canfacilitate wired or wireless communication to the LAN 1352, which canalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1356.

When used in a WAN networking environment, the computer 1300 can includea modem 1358, or is connected to a communications server on the WAN1354, or has other means for establishing communications over the WAN1354, such as by way of the internet. The modem 1358, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1308 through the input device interface 1342. In a networkedenvironment, program modules depicted relative to the computer, orportions thereof, can be stored in the remote memory/data store 1350. Itwill be appreciated that the network connections shown are exemplary andother means of establishing a communications link between the computerscan be used.

The computer is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This comprises at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theinternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands andin accordance with, for example, IEEE 802.11 standards, or with productsthat contain both bands (dual band), so the networks can providereal-world performance similar to the basic “10BaseT” wired Ethernetnetworks used in many offices.

Referring now to FIG. 14, illustrated is a schematic block diagram of amobile device 1400 (which can be, for example, called party UE 220)capable of connecting to a network in accordance with some embodimentsdescribed herein. Although a mobile device 1400 is illustrated herein,it will be understood that other devices can be a mobile device, andthat the mobile device 1400 is merely illustrated to provide context forthe embodiments of the various embodiments described herein. Thefollowing discussion is intended to provide a brief, general descriptionof an example of a suitable environment 1400 in which the variousembodiments can be implemented. While the description comprises ageneral context of computer-executable instructions embodied on amachine-readable storage medium, those skilled in the art will recognizethat the various embodiments also can be implemented in combination withother program modules and/or as a combination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, comprisingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and comprises both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magnetic datastores, or any other medium which can be used to store the desiredinformation and which can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, andcomprises any information delivery media. The term “modulated datasignal” means a signal that has one or more of its characteristics setor changed in such a manner as to encode information in the signal. Byway of example, and not limitation, communication media comprises wiredmedia such as a wired network or direct-wired connection, and wirelessmedia such as acoustic, RF, infrared and other wireless media.Combinations of the any of the above should also be included within thescope of computer-readable media.

The mobile device 1400 comprises a processor 1402 for controlling andprocessing all onboard operations and functions. A memory 1404interfaces to the processor 1402 for storage of data and one or moreapplications 1406 (e.g., a video player software, user feedbackcomponent software, etc.). Other applications can include voicerecognition of predetermined voice commands that facilitate initiationof the user feedback signals. The applications 1406 can be stored in thememory 1404 and/or in a firmware 1408, and executed by the processor1402 from either or both the memory 1404 or/and the firmware 1408. Thefirmware 1408 can also store startup code for execution in initializingthe mobile device 1400. A communications component 1410 interfaces tothe processor 1402 to facilitate wired/wireless communication withexternal systems, e.g., cellular networks, VoIP networks, and so on.Here, the communications component 1410 can also include a suitablecellular transceiver 1411 (e.g., a GSM transceiver) and/or an unlicensedtransceiver 1413 (e.g., Wi-Fi, WiMax) for corresponding signalcommunications. The mobile device 1400 can be a device such as acellular telephone, a PDA with mobile communications capabilities, andmessaging-centric devices. The communications component 1410 alsofacilitates communications reception from terrestrial radio networks(e.g., broadcast), digital satellite radio networks, and internet-basedradio services networks.

The mobile device 1400 comprises a display 1412 for displaying text,images, video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 1412 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 1412 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface1414 is provided in communication with the processor 1402 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1394) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This supports updating andtroubleshooting the mobile device 1400, for example. Audio capabilitiesare provided with an audio I/O component 1416, which can include aspeaker for the output of audio signals related to, for example,indication that the user pressed the proper key or key combination toinitiate the user feedback signal. The audio I/O component 1416 alsofacilitates the input of audio signals through a microphone to recorddata and/or telephony voice data, and for inputting voice signals fortelephone conversations.

The mobile device 1400 can include a slot interface 1418 foraccommodating a SIC (Subscriber Identity Component) in the form factorof a card Subscriber Identity Module (SIM) or universal SIM 1420, andinterfacing the SIM card 1420 with the processor 1402. However, it is tobe appreciated that the SIM card 1420 can be manufactured into themobile device 1400, and updated by downloading data and software.

The mobile device 1400 can process IP data traffic through thecommunication component 1410 to accommodate IP traffic from an IPnetwork such as, for example, the internet, a corporate intranet, a homenetwork, a person area network, etc., through an ISP or broadband cableprovider. Thus, VoIP traffic can be utilized by the mobile device 1400and IP-based multimedia content can be received in either an encoded ordecoded format.

A video processing component 1422 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 1422can aid in facilitating the generation, editing and sharing of videoquotes. The mobile device 1400 also comprises a power source 1424 in theform of batteries and/or an AC power subsystem, which power source 1424can interface to an external power system or charging equipment (notshown) by a power I/O component 1426.

The mobile device 1400 can also include a video component 1430 forprocessing video content received and, for recording and transmittingvideo content. For example, the video component 1430 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 1432 facilitates geographically locating the mobile device1400. As described hereinabove, this can occur when the user initiatesthe feedback signal automatically or manually. A user input component1434 facilitates the user initiating the quality feedback signal. Theuser input component 1434 can also facilitate the generation, editingand sharing of video quotes. The user input component 1434 can includesuch conventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 1406, a hysteresis component 1436facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 1438 can be provided that facilitatestriggering of the hysteresis component 1438 when the Wi-Fi transceiver1413 detects the beacon of the access point. A SIP client 1440 enablesthe mobile device 1400 to support SIP protocols and register thesubscriber with the SIP registrar server. The applications 1406 can alsoinclude a client 1442 that provides at least the capability ofdiscovery, play and store of multimedia content, for example, music.

The mobile device 1400, as indicated above related to the communicationscomponent 1410, comprises an indoor network radio transceiver 1413(e.g., Wi-Fi transceiver). This function supports the indoor radio link,such as IEEE 802.11, for the dual-mode GSM mobile device 1400. Themobile device 1400 can accommodate at least satellite radio servicesthrough a handset that can combine wireless voice and digital radiochipsets into a single handheld device.

As used in this application, the terms “system,” “component,”“interface,” and the like are generally intended to refer to acomputer-related entity or an entity related to an operational machinewith one or more specific functionalities. The entities disclosed hereincan be either hardware, a combination of hardware and software,software, or software in execution. For example, a component can be, butis not limited to being, a process running on a processor, a processor,an object, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components canreside within a process and/or thread of execution and a component canbe localized on one computer and/or distributed between two or morecomputers. These components also can execute from various computerreadable storage media comprising various data structures storedthereon. The components can communicate via local and/or remoteprocesses such as in accordance with a signal comprising one or moredata packets (e.g., data from one component interacting with anothercomponent in a local system, distributed system, and/or across a networksuch as the internet with other systems via the signal). As anotherexample, a component can be an apparatus with specific functionalityprovided by mechanical parts operated by electric or electroniccircuitry that is operated by software or firmware application(s)executed by a processor, wherein the processor can be internal orexternal to the apparatus and executes at least a part of the softwareor firmware application. As yet another example, a component can be anapparatus that provides specific functionality through electroniccomponents without mechanical parts, the electronic components cancomprise a processor therein to execute software or firmware thatconfers at least in part the functionality of the electronic components.An interface can comprise input/output (I/O) components as well asassociated processor, application, and/or API components.

Furthermore, the disclosed subject matter can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, computer-readable carrier, orcomputer-readable media. For example, computer-readable media caninclude, but are not limited to, a magnetic data store, e.g., hard disk;floppy disk; magnetic strip(s); an optical disk (e.g., compact disk(CD), a digital video disc (DVD), a Blu-ray Disc™ (BD)); a smart card; aflash memory device (e.g., card, stick, key drive); and/or a virtualdevice that emulates a data store and/or any of the abovecomputer-readable media.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor (DSP), a fieldprogrammable gate array (FPGA), a programmable logic controller (PLC), acomplex programmable logic device (CPLD), a discrete gate or transistorlogic, discrete hardware components, or any combination thereof designedto perform the functions described herein. Processors can exploitnano-scale architectures such as, but not limited to, molecular andquantum-dot based transistors, switches and gates, in order to optimizespace usage or enhance performance of UE. A processor also can beimplemented as a combination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” “queue”, “storage device,” andsubstantially any other information storage component relevant tooperation and functionality of a component, refer to “memorycomponents,” or entities embodied in a “memory” or components comprisingthe memory. It will be appreciated that the memory components describedherein can be either volatile memory or nonvolatile memory, or cancomprise both volatile and nonvolatile memory. In addition, memorycomponents or memory elements can be removable or stationary. Moreover,memory can be internal or external to a device or component, orremovable or stationary. Memory can comprise various types of media thatare readable by a computer, such as hard-disc drives, zip drives,magnetic cassettes, flash memory cards or other types of memory cards,cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory cancomprise read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can comprise random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (comprising a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated example aspects of the embodiments. In thisregard, it will also be recognized that the embodiments comprises asystem as well as a computer-readable medium comprisingcomputer-executable instructions for performing the acts and/or eventsof the various methods.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media cancomprise, but are not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disk (DVD) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic data stores, or other tangible and/ornon-transitory media which can be used to store desired information.Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

On the other hand, communications media typically embodycomputer-readable instructions, data structures, program modules orother structured or unstructured data in a data signal such as amodulated data signal, e.g., a carrier wave or other transportmechanism, and comprises any information delivery or transport media.The term “modulated data signal” or signals refers to a signal that hasone or more of its characteristics set or changed in such a manner as toencode information in one or more signals. By way of example, and notlimitation, communications media comprise wired media, such as a wirednetwork or direct-wired connection, and wireless media such as acoustic,RF, infrared and other wireless media.

Further, terms like “user equipment,” “user device,” “mobile device,”“mobile,” station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, can generally refer to a wireless device utilizedby a subscriber or user of a wireless communication network or serviceto receive or convey data, control, voice, video, sound, gaming, orsubstantially any data-stream or signaling-stream. The foregoing termsare utilized interchangeably in the subject specification and relateddrawings. Likewise, the terms “access point,” “node B,” “base station,”“evolved Node B,” “cell,” “cell site,” and the like, can be utilizedinterchangeably in the subject application, and refer to a wirelessnetwork component or appliance that serves and receives data, control,voice, video, sound, gaming, or substantially any data-stream orsignaling-stream from a set of subscriber stations. Data and signalingstreams can be packetized or frame-based flows. It is noted that in thesubject specification and drawings, context or explicit distinctionprovides differentiation with respect to access points or base stationsthat serve and receive data from a mobile device in an outdoorenvironment, and access points or base stations that operate in aconfined, primarily indoor environment overlaid in an outdoor coveragearea. Data and signaling streams can be packetized or frame-based flows.

Furthermore, the terms “user,” “subscriber,” “called party,” “consumer,”and the like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary,” where used, is used herein to meanserving as an example, instance, or illustration. Any aspect or designdescribed herein as “exemplary” is not necessarily to be construed aspreferred or advantageous over other aspects or designs. Rather, use ofthe word exemplary is intended to present concepts in a concretefashion. As used in this application, the term “or” is intended to meanan inclusive “or” rather than an exclusive “or”. That is, unlessspecified otherwise, or clear from context, “X employs A or B” isintended to mean any of the natural inclusive permutations. That is, ifX employs A; X employs B; or X employs both A and B, then “X employs Aor B” is satisfied under any of the foregoing instances. In addition,the articles “a” and “an” as used in this application and the appendedclaims should generally be construed to mean “one or more” unlessspecified otherwise or clear from context to be directed to a singularform.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature can becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “have”, “having”, “includes”and “including” and variants thereof are used in either the detaileddescription or the claims, these terms are intended to be inclusive in amanner similar to the term “comprising.”

The above descriptions of various embodiments of the subject disclosureand corresponding figures and what is described in the Abstract, aredescribed herein for illustrative purposes, and are not intended to beexhaustive or to limit the disclosed embodiments to the precise formsdisclosed. It is to be understood that one of ordinary skill in the artcan recognize that other embodiments comprising modifications,permutations, combinations, and additions can be implemented forperforming the same, similar, alternative, or substitute functions ofthe disclosed subject matter, and are therefore considered within thescope of this disclosure. Therefore, the disclosed subject matter shouldnot be limited to any single embodiment described herein, but rathershould be construed in breadth and scope in accordance with the claimsbelow.

What is claimed is:
 1. A method, comprising: receiving, by a networkdevice comprising a processor, a call from a communications devicedirected to a call destination; identifying, by the network device,whether the call is an automated call from the communications device,wherein the identifying comprises: determining, by the network device,whether a first phone number of the call used by a network to route thecall matches a second phone number identifying the call, and analyzing,by the network device, a call behavior determined to be related to thecall to determine whether the call exhibits a characteristic ofautomated calls; and in response to the identification of the call asthe automated call, determining, by the network device, whether the callis approved for connection to the call destination.
 2. The method ofclaim 1, wherein the second phone number comprises a calleridentification number of the call.
 3. The method of claim 1, wherein theanalyzing comprises determining whether the call is one of a group ofprevious calls from the communications device, wherein the call and thegroup of previous calls collectively exhibit the characteristic ofautomated calls.
 4. The method of claim 1, wherein the determiningwhether the call is approved comprises accessing an entity identity datastore comprising a data entry for an entity identity indicated to beallowed to initiate the automated call and determining whether the callis associated with the data entry.
 5. The method of claim 1, wherein thedetermining whether the call is approved comprises accessing an entityidentity data store comprising a data entry for an entity identity thatis indicated not to be permitted to initiate the automated call anddetermining whether the call is associated with the data entry.
 6. Themethod of claim 5, wherein the communications device is a firstcommunications device, and wherein the data entry was stored at therequest of a second communications device associated with the calldestination.
 7. The method of claim 1, further comprising, in responseto determining that the call is approved for connection to the calldestination, connecting, by the network device, the call to the calldestination.
 8. The method of claim 1, further comprising, in responseto determining that the call is not approved for connection to the calldestination, blocking, by the network device, the call to the calldestination.
 9. A device, comprising: a processor; and a memory thatstores executable instructions that, when executed by the processor,facilitate performance of operations, comprising: receiving a call froma communications device directed to a call destination; identifyingwhether the call is an automated call from the communications device,wherein the identifying comprises: determining whether an originatingnumber of the call matches a caller identification number of the call,wherein the originating number is used by a network to route the call,and analyzing a call behavior determined to be related to the call todetermine whether the call exhibits a characteristic of automated calls;and in response to the identification of the call as the automated call,determining whether the call is approved for connection to the calldestination.
 10. The device of claim 9, wherein the performance ofoperations further comprises connecting the call to the call destinationin response to the call not being identified as an automated call. 11.The device of claim 9, wherein the determining whether the call isapproved comprises accessing an entity identity data store comprising adata entry for an entity identity indicated to be allowed to initiatethe automated call and determining whether the call is associated withthe data entry.
 12. The device of claim 9, wherein the determiningwhether the call is approved comprises accessing an entity identity datastore comprising a data entry for an entity identity that is indicatednot to be permitted to initiate the automated call and determiningwhether the call is associated with the data entry.
 13. The device ofclaim 12, wherein the communications device is a first communicationsdevice, and wherein the data entry was stored at the request of a secondcommunications device associated with the call destination.
 14. Thedevice of claim 9, wherein the operations further comprise, in responseto determining that the call is approved for connection to the calldestination, connecting the call to the call destination.
 15. The deviceof claim 9, wherein the operations further comprise, in response todetermining that the call is not approved for connection to the calldestination, blocking the call to the call destination.
 16. Amachine-readable storage medium comprising executable instructions that,when executed by a processor, facilitate performance of operations,comprising: receiving a call from a communications device directed to auser equipment; identifying whether the call is an automated call fromthe communications device, wherein the identifying comprises:determining whether an originating number of the call used by a networkto route the call matches a caller identification number of the call,and determining whether the call is one of a group of previous callsfrom the communications device, wherein the call and the group ofprevious calls collectively exhibit a characteristic of automated calls;and in response to the identification of the call as the automated call,determining whether the call is approved for connection to the userequipment.
 17. The machine-readable storage medium of claim 16, whereinthe determining whether the call is approved comprises accessing anentity identity data store comprising a data entry for an entityidentity indicated to be allowed to initiate the automated call anddetermining whether the call is associated with the data entry.
 18. Themachine-readable storage medium of claim 17, wherein the entity identitycomprises an identity of a government agency.
 19. The machine-readablestorage medium of 16, wherein the operations further comprise, inresponse to determining that the call is approved for connection to thecall destination, connecting the call to the user equipment.
 20. Themachine-readable storage medium of 16, wherein the operations furthercomprise, in response to determining that the call is not approved forconnection to the call destination, blocking the call to the userequipment.