Intercepting and challenging unwanted phone calls

ABSTRACT

A call challenger can receive a user input from a called party identity to opt-in to a call challenge service, and a second user input of a keyword. When the call challenger receives a call directed to a user equipment of the called party identity, the call challenger can prompt the calling party to provide an audible response. In response to a receipt of the audible response, the call challenger can convert the audible response to a text. The call challenger can compare the text with the keyword to determine if there is a sufficient match. In response to the determining the output of the comparing does not satisfy a threshold match score, the call challenger can prevent the call from connecting with the user equipment.

TECHNICAL FIELD

The present application relates generally to the field of privacy, and,for example, intercepting and challenging unwanted phone calls.

BACKGROUND

Most telephones, fixed or mobile, appear to be getting regular unwanted(e.g., “SPAM”) calls for everything from back pain and insurance tobusiness loans and prayers. Mobile networks are suffering direct impactsfrom wasted radio-frequency (RF) resources (e.g., increasedcommunications load on the mobile network). Telecommunications customersare upset with telemarketer calls, which sometimes occur multiple timesa day. Also, for mobile devices, increased frequency in calls can alsolead to more energy consumption by the mobile device, which can impactthe mobile device's battery charge. There has been an increase in thenumber of robocalls, in which numerous calls are automatically directedto called parties by a robocall device (also referred to as a robocallsystem, automated calling system, automated dialing system, roboticcaller, robocaller, robocalling device, robocalling system, predictivedialer, robodialer, robodialing device, robotic calling device, etc.).The robocall device typically plays a pre-recorded message for thecalled parties that answer the call. These calls can be vexatious, oreven fraudulent. In addition to hiding the robocalls calling lineidentification (e.g., caller identification), there are many ways tomask a robocall as a legitimate call by “spoofing” the originatingnumber, such that the robocall appears to a blocking system, as well asto called party identities, as coming from a legitimate caller orlegitimate source.

There has been some effort in the United States (U.S.) to reduce andeven limit such unwanted calls by enforcing the laws in which numbersplaced on a “do not call” list are not be called. However, mostrobocalls do not even originate from the U.S. There are large callcenters in remote corners of the world where U.S. laws are inapplicable,or the calling parties simply ignore the applicable laws. Additionally,there have been incidences in which robocall systems have been usedmaliciously to perpetrate fraudulent transactions. According to thefederal communications commission (FCC), it received more than 214,000complaints about unwanted calls in 2014, and a recent New York Timesarticle mentioned that customers were “besieged by nearly five billionunwanted robocalls from telemarketers and scammers” in May of 2019.Congress on Jun. 20, 2019 introduced a bipartisan bill aimed at reducingunwanted phone calls.

BRIEF DESCRIPTION OF THE DRAWINGS

Non-limiting and non-exhaustive embodiments of the subject disclosureare described with reference to the following figures, wherein likereference numerals refer to like parts throughout the various viewsunless otherwise specified.

FIG. 1 is a diagram illustrating an example telecommunications andnetworking environment.

FIG. 2 is a diagram illustrating an example system and networkingenvironment in which a robocall device calls multiple user equipment(UE).

FIG. 3 is a diagram illustrating transactions between an examplerobocall device and a called party UEs.

FIG. 4 is a flow chart illustrating an example of a called party'stypical experience interacting with a robocall device.

FIG. 5 is a diagram that illustrates a system in which a robocall deviceis connected to a called party UE via a calling party's network and acalled party's network.

FIG. 6 is a diagram that illustrates an example embodiment of a callchallenger device that challenges a call directed to a called party UE,in accordance with various aspects and embodiments of the subjectdisclosure.

FIG. 7 is a diagram that illustrates example components of an exampleembodiments of a call challenger (e.g., device or system), in accordancewith various aspects and embodiments of the subject disclosure.

FIG. 8 illustrates an example graphical user interface (GUI) for entryof an opt-in input and entry of a keyword, in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 9 illustrates an example GUI comprising a feedback report, inaccordance with various aspects and embodiments of the subjectdisclosure.

FIG. 10 illustrates a flow diagram of example operations that can beperformed by a call challenger device, in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 11 illustrates a flow diagram of another example of operations thatcan be performed by a call challenger, in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 12 illustrates a flow diagram of yet another example of operationsthat can be performed by a call challenger, in accordance with variousaspects and embodiments of the subject disclosure.

FIG. 13 illustrates a block diagram of an example mobile device that canbe operable to execute processes, operations, and methods, in accordancewith various aspects and embodiments of the subject disclosure.

FIG. 14 illustrates a block diagram of an example computer that can beoperable to execute processes, operations, and methods in accordancewith various aspects and embodiments of the subject disclosure.

DETAILED DESCRIPTION

The subject disclosure is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. The following description and the annexed drawings detailcertain illustrative aspects of the subject matter. However, theseaspects are indicative of but a few of the various ways in which theprinciples of the subject matter can be employed. Other aspects,advantages, and novel features of the disclosed subject matter willbecome apparent from the following detailed description when consideredin conjunction with the provided drawings. In the following description,for purposes of explanation, numerous specific details are set forth toprovide a more thorough understanding of the subject disclosure. Itmight be evident, however, that the subject disclosure can be practicedwithout these specific details. In other instances, well-knownstructures and devices are shown in block diagram form to facilitatedescribing the subject disclosure.

The subject disclosure of the present application describes systems andmethods (comprising example computer processing systems,computer-implemented methods, apparatus, computer program products,etc.) for processing a call. The methods (e.g., processes and logicflows) described in this specification can be performed by devicescomprising programmable processors that execute machine-executableinstructions to facilitate performance of the operations describedherein. Examples of such devices are described in the figures herein andcan comprise circuitry and components as described in FIG. 13 and FIG.14. Example embodiments and components can take the form of an entirelyhardware embodiment, an entirely software embodiment, or an embodimentcombining software and hardware aspects.

Example embodiments are described below with reference to block diagramsand flowchart illustrations of methods, apparatuses, and computerprogram products. Steps of the block diagrams and flowchartillustrations support combinations of mechanisms for performing thespecified functions, combinations of steps for performing the specifiedfunctions, and program instructions for performing the specifiedfunctions. Example embodiments may take the form of web, mobile,wearable computer-implemented, computer software. It should beunderstood that each step, or block, of the block diagrams and flowchartillustrations, combinations of steps in the block diagrams and flowchartillustrations, or any functions, methods, and processes describedherein, can be implemented by a computer executing computer programinstructions. These computer program instructions may be loaded onto ageneral-purpose computer, special purpose computer, combinations ofspecial purpose hardware and other hardware, or other programmable dataprocessing apparatus. Example embodiments may take the form of acomputer program product stored on a machine-readable storage mediumcomprising executable instructions (e.g., software) that, when executedby a processor, facilitate performance of operations described herein.Any suitable machine-readable storage medium may be utilized including,for example, hard disks, compact disks, DVDs, optical data stores,and/or magnetic data stores.

The present application describes systems and methods relating to a callchallenger comprising one or more processors and one or more memoriesthat can store executable instructions that, when executed by aprocessor, facilitate the blocking of unwanted calls. A user identitycan opt-in to a call challenge service. A call challenger (e.g., whichcan be considered a device or system) can receive a call from acommunication device directed to a user equipment (UE) associated withthe user identity. The call challenger can prompt the calling party toprovide an audible response. In response to a lack of receipt of theaudible response (or lack of receipt of an audible response within acertain period), the call challenger device can take a preventativeaction relating to the call. In response to the receipt of the audibleresponse, the call challenger can convert the audible response to text.In response to a comparison of the text with a keyword provided by theuser identity, the call challenger can allow the call to proceed to theuser equipment. In response to the comparing resulting in a thresholdmatch score not being attained, the call challenger device canfacilitate taking a preventative action relating to the call. Otheraspects and features will be described below.

FIG. 1 is a diagram illustrating an example system 100 in which a userequipment (UE) can make or receive phone calls, such as make phone callsfrom a device owned by a calling party identity to a device owned by acalled party identity. The system 100 can comprise one or morecommunications networks (e.g., communication network 110, and asmentioned below with respect to FIG. 5, can comprise a calling party'snetwork 510 and a called party's network 520), one or more servers 120,one or more data stores 130 (each of which can contain one or moredatabases of information), and one or more UEs 140 _(1-N). The servers120 and user equipment 140, which can be computing devices as describedin FIG. 13 and FIG. 14, can execute software modules that can facilitatevarious functions, methods, operations, and processes described herein.

In example embodiments, the one or more communications networks can beoperable to facilitate communication between the server(s) 120, datastore(s) 130, and UEs 140. The one or more networks (e.g., communicationnetwork 110) may include any of a variety of types of wired or wirelesscomputer networks such as a cellular network, private branch exchange(PBX), private intranet, public switched telephone network (PSTN), plainold telephone service (POTS), satellite network, WiMAX, data over cablenetwork (e.g., operating under one or more data over cable serviceinterface specification (DOCSIS)), or any other type of computer orcommunications network. The communications networks can also comprise,for example, a local area network (LAN), such as an office or Wi-Finetwork.

Referring to FIG. 1, the communication network 110 can be a cellularnetwork employing various cellular technologies and modulation schemesto facilitate wireless radio communications between devices. Forexample, communication network 110 can operate in accordance with aUMTS, long term evolution (LTE), high speed packet access (HSPA), codedivision multiple access (CDMA), time division multiple access (TDMA),frequency division multiple access (FDMA), multi-carrier code divisionmultiple access (MC-CDMA), single-carrier code division multiple access(SC-CDMA), single-carrier FDMA (SC-FDMA), orthogonal frequency divisionmultiplexing (OFDM), discrete Fourier transform spread OFDM (DFT-spreadOFDM) single carrier FDMA (SC-FDMA), filter bank based multi-carrier(FBMC), zero tail DFT-spread-OFDM (ZT DFT-s-OFDM), generalized frequencydivision multiplexing (GFDM), fixed mobile convergence (FMC), universalfixed mobile convergence (UFMC), unique word OFDM (UW-OFDM), unique wordDFT-spread OFDM (UW DFT-Spread-OFDM), cyclic prefix OFDM CP-OFDM,resource-block-filtered OFDM, and citizens broadband radio system(CBRS). In example embodiments, communication network 110 can beconfigured to provide and employ 5G wireless networking features andfunctionalities. 5G wireless communication networks are expected tofulfill the demand of exponentially increasing data traffic and to allowpeople and machines to enjoy gigabit data rates with significantlyreduced latency.

Still referring to FIG. 1, the communication network 110 can comprise afixed-packet network. The fixed packet network can be a broadbandnetwork using internet protocol (IP) to deliver video, voice, and data.An example of such a network is a cable television (CATV) infrastructureimplementing the data over cable service interface specification(DOCSIS) and PacketCable standards, which allow a multiple serviceoperator (MSO) to offer both high-speed internet and voice over internetprotocol (VoIP) through an MSO's cable infrastructure. In someimplementations, the fixed packet network can have headend equipmentsuch as a cable modem termination system (CMTS) that communicatesthrough one or more hybrid fiber coax (HFC) networks with user premisesequipment such as a cable modem or embedded multimedia terminal adapter(EMTA) (see below). The fixed packet network can also comprise networksusing asynchronous transfer mode (ATM), digital subscriber line (DSL),or asymmetric digital subscriber line (ADSL) technology. These networkshave typically been provided by telephone companies. ATM and DSL/ADSLequipment can be located at an exchange or central office, and caninclude integrated DSL/ATM switches, multiplexers such as digitalsubscriber line access multiplexers (DSLAMS), and broadband remoteaccess servers (B-RAS), all of which can contribute to the aggregationof communications from user equipment onto a high-capacity uplink (ATMor Gigabit Ethernet backhaul) to internet service providers (ISPs).Transmission media connecting the central office and user equipment caninclude both twisted pair and fiber.

The communication network 110 can also comprise one or more satellitenetworks, which can enable the exchange of voice, data, and video. Inaddition to television programming services, satellite networks, such asa DBS (Direct Broadcast Satellite) system, operated by DBS broadcastsatellite providers (e.g., Dish Networks, DIRECTV, HughesNet), can beoperable to enable high speed internet and voice services.

The communication network 110 can also comprise a POTS network thatsupports the delivery of voice services employing analog signaltransmission over copper loops.

Referring to FIG. 1, servers 120 can be operable to send viacommunication network 110 executable code capable of generatinggraphical user interfaces (GUIs) that a user identity can interact withto facilitate the provision of such on-line data, or voice services. TheGUIs can be, for example, a webpage that can be displayed (andinteracted with) on a user equipment 140 (e.g., as shown in FIG. 8 andFIG. 9). Modules comprising executable instructions that, when executedby a processor of the server 120, facilitate performance of operations,such as the exchange of data or the exchange of voice (e.g., a softphone), can be stored on a memory device of the server 120 (or a memorydevice connected to the server 120).

The data stores 130 can comprise physical media for storing information,housed within the one or more servers 120, peripherally connected to theone or more servers, or connected to the servers 120 through one or morenetworks. For example, the storage device can be connected to theprocessor of a server, via, for example, a communications medium such asa bus (e.g., SATA, eSATA, SCSI, flash, or the like). As another example,data stores 130 can be peripheral devices, set up as a redundant arrayof independent disks (RAID) array, a storage area network (SAN), ornetwork attached storage (NAS). The data stores can comprise magneticmemory, such as a hard drive or a semiconductor memory, such asRandom-Access Memory (RAM), Dynamic RAM (DRAM), non-volatile computermemory, flash memory, or the like. The memory can include operatingsystem, administrative, and database program modules that support themethods and programs disclosed in this application.

Referring to FIG. 1, user equipment 140 can be, for example, a tabletcomputer, a desktop computer, or laptop computer, a cellular enabledlaptop (e.g., comprising a broadband adapter), a handheld computingdevice, a mobile phone, a telephone, a smartphone, a tablet computer, awearable device, a virtual reality (VR) device, a heads-up display (HUD)device, an IoT device, and the like.

In example embodiments, a customer premises equipment (CPE) 150 canprovide access for the UE (e.g., UE 140 ₂) to the one or more networks(e.g., communication network 110). The CPE 150 can comprise a broadbandaccess modem (e.g., cable modem, DSL modem, Wi-MAX modem, satellitemodem). The CPE 150 can also comprise a gateway device (also referred toas a residential gateway, home gateway, set top gateway) that processesvideo, voice packets, and data packets and serves as a broadbandconnectivity point for various devices (e.g., video set-top boxes,computers, mobile devices, telephones). The UE (e.g., UE 1402) can beconnected to the CPE device via, for example, an Ethernet interface, ora wireless access point device (which can be embedded within the CPEdevice, or connected to the CPE device as a peripheral device), whichcan operate in accordance with the IEEE 802.11 family of standards.

For voice services, a computer (or computing device) connected to acommunication network 110 that executes voice over IP (VoIP) softwarecan allow for voice calls to be made via a computer application (i.e., a“softphone” such as that offered by Skype). The VoIP software can beprovided by one or more servers 120. Additionally, the CPE 150 can beembedded with a VoIP adapter, through which a telephone 1403 can connect(e.g., via an RJ-11 phone jack) and make voice calls. Examples of suchdevices that support voice and data communications are referred to as atelephony modems, embedded multimedia terminal adapters (EMTAs), digitalvoice modems, voice data modems, voice and internet modems, and thelike. In other embodiments, a VoIP adapter can be peripheral to thebroadband modem, and the telephone can connect to that VoIP adapter(e.g., an adapter provided by Vonage, Ooma, etc.). In other embodiments,a VoIP adapter can be connected to a computer, for example, via itsuniversal serial bus (USB) port (e.g. an adapter provided by magicJack).

Referring to FIG. 1, a UE 140 ₄ can be a mobile device used to make andaccept voice calls, including a cellular phone, as well as a tablet witha cellular adapter. The mobile device can be operative to make voicecalls through the communication network 110 to other communicationdevices. Further details describing a mobile device are described belowin FIG. 14 below.

The UE 140 can also be a POTS telephone 140 ₅ connected to thecommunication network 110.

FIG. 2 is a diagram that illustrates an example networking environmentin which a typical robocall device 210 can be operable to initiaterobocalls (e.g., robocalls). Typically, a robocall device 210 is used inbusiness to consumer (B2C) applications, and can be one or morecomputers operable to run modules that, when executed, automaticallymakes voice calls, which can be made simultaneously or in rapidsuccession, to a plurality of call destinations. The robocall device 210can be for example, a UE having a broadband connection and operable tomake VoIP calls (e.g., UE 140 ₂), and the modules can be locally storedor provided by one or more servers (e.g., servers 120). The robocalldevice 210 can make voice calls to called party UEs 2201-N, which can beone or more UEs 140 (e.g., a cellular phone, a VoIP phone, a POTS phone,etc.) that are operable to answer voice calls. After connection with acalled party UE 220 (one of the plurality of called party UEs 220_(1-N)) the robocall device 210 plays a pre-recorded message to eitherthe called party identity, or a voicemail system if the called partyidentity does not answer. A large majority of robocalls originatethrough a VoIP network. Example vendors of robocall devices andpredictive dialers are Voice2Phone, VoiceShot, Voicent, CallFire andFive9.

Intercepting and blocking unwanted robocalls can be a challenge, inlarge part because some of these calls are actual public serviceannouncements, such as from the weather service, school system, publicsafety departments, etc. In other example use cases, largeorganizations, for example a large religious congregation, might userobocalls as an effective way to distribute pre-recorded messages. Thus,not every robocall is necessarily fraudulent, vexatious, orillegitimate.

In FIG. 3, a typical robocall device 210 operated by telemarketingidentities, can at transaction (1) receive robocall device inputs. Arobocall device input can comprise a plurality of target phone numberscorresponding to called party UEs (e.g., UEs 220 _(1-N)). The phonenumbers might have been collected from called party identities, whomight have provided their phone numbers in response to surveys,purchases, etc. A typical robocall device 210 allows input of phonenumbers manually, as well by uploading a spreadsheet, or some other typeof file, having the phone numbers. A robocall device input can alsocomprise a pre-recorded message (e.g., an audio file) which can be inputby uploading or otherwise transferring the file to the robocall device210. The pre-recorded message is played by the robocall device 210 whenthe robocall is answered by the called party UE 220 (or its answeringservice).

At transaction (2) of FIG. 3, the robocall device 210 can make amultitude of voice calls directed at called party UEs 220 _(1-N). Forillustrative purposes, only one called party UE 220 is shown. Therobocall device 210, with its own spoofing module, or through a callerID spoofing system 310 provided by another server, can be operable totransmit a “spoofed” number with the call that replaces the originatingnumber of the robocall device. The spoofed number would show up on acaller ID display. Thus, each call would have associated with it thespoofed caller ID number that was entered at transaction (1). The resultis that a number that the marketing identity wants to appear on a calledparty UE 220's caller ID display, instead of the originating number ofthe robocall (e.g., number of the calling party), and be entered. Thelikelihood that a robocall is vexatious, malicious, or fraudulent isextremely high when the calling party is spoofing its number. Manytelemarketers (and in some instances, fraudulent companies) are nowtaking advantage of VoIP, SIP (session-initiated protocol), and networkredirection services to make calls using fraudulently obtained (orobtained without authorization) phone numbers to use as a spoofed callerID number. These obtained numbers might be legitimate numbers (e.g.,actual phone numbers) belonging to a third-party identity. The robocalldevice 210 can thus mask robocalls as a legitimate call by spoofing theoriginating number, such that the robocall appears to a call blockingsystem, caller ID devices, as well as called party identities' devices(e.g., called party UE 220), as coming from the legitimate third-partyidentity. This tactic has the purpose of encouraging the called party toanswer the call as it appears to be from a legitimate caller, instead ofa telemarketer or fraudulent caller. It masks the calling party's truephone number to prevent tagging, blocking, or other activities thatcould reduce the robocalling device's opportunity to connect the callwith the called party. Spoofing a call and using another third party'snumber (e.g., “spoofed victim”) though, also can have the consequence ofpotentially redirecting negative responses back from the called party toa third party whose number was spoofed (“e.g., spoofed victim”), insteadof complaints being directed to the actual calling party that isassociated with the robocalling device (e.g., robocall device 210).

In an example case, a robocall device 210 might direct a call to acalled party identity (e.g., “Victim #1). A robocall device 210 changesthe caller ID associated with the call to a phone number not is not theactual number of the robocall device 210 (e.g., 770-555-0002), which isthe phone number of the spoofed party (e.g., “Victim #2”) in theexpectation that Victim #1 will be more likely to answer since thecaller ID number provided, that of Victim #2, appears to be a valid calland not a robocall. If the phone call is answered by Victim #1, and thecontent perceived as either vexatious or fraudulent, Victim #1 mayreport the call, or call back using the identified caller ID number,which would connect Victim #1 with Victim #2, as opposed to therobocaller. Victim #2 might be unaware that the robocall device utilizedhis or her # on the caller ID. In some instances, there have been callsin which the caller ID number is actually the same as the Victim's ownphone number. Additionally, a caller ID spoofing system 310 canrandomize the caller ID numbers so that even if one number can beblocked or reported by a victim, another spoofed number is obtained.

The calls that are made by the robocall device can be directed to phonenumbers input into the robocall device 210 at transaction (1), as wellas numbers selected by a predictive dialer, which can include numbers ina sequence (dialing numbers in sequential order), a block, or a range.Certain blocks of phone numbers are meant for certain businesses (forexample, a block of numbers can be reserved for hospitals), and as such,numbers in particular blocks might be targeted by robocall devices.Numbers in a range are like numbers that are sequentially dialed, butare certain ranges of numbers within a sequence. Robocall devices cansometimes use ranges of numbers to avoid sequence dialing detectingalgorithms that attempt to block robocalls (e.g., calling 0000 to 0500might trigger an alert, but selecting a range of numbers within thatsequence might avoid detection). Another characteristic of robocallsmight be that the calls were dialed simultaneously, or in rapidsuccession with a short timeframe between each call (e.g., no pauses, orno significant pauses between calls).

At transaction (3), when a called party UE 220 is dialed, a caller IDservice might display the number to the called party identity via thecalled party UE 220's GUI. If a robocall contained a spoofed number, thespoofed number might appear on the caller ID service (or caller IDdevice).

A typical robocall device 210 can be further operative to, in responseto a called party identity answering a robocall, connect the calledparty UE 220 with a qualifier, wherein the qualifier might be aninteractive voice response system (IVR) that prompts the called partyidentity to select or enter information. If certain information enteredby the called party to the qualifier indicates that the called partyidentity's profile matches a profile of the marketing identity's targetaudience, the robocall device 210 can be operative to connect the calledparty UE 220 with a sales agent.

FIG. 4 illustrates a typical response and experience of a user identityto a robocall. At step 405, the called party identity might haveresponded to a survey, signed up for an event, filled out an on-lineapplication, or gave approval for a service or application to access hisor her contact information, wherein the contact information comprisesthe called party identity's phone number. The called party identity'sphone number might eventually wind up on a marketing entity's phonelist.

At step 410, the called party identity might receive a phone call (e.g.,an incoming call) on his or her phone (e.g., called party UE 220). Ifthe phone is operable to display caller ID information, the callingparty's number and name might show up on the caller ID display. However,this number and information might be a spoofed number and spoofed name.The number might have, for example, an area code that is the same as thearea code of the called party identity's phone number, such that thecalled party identity might believe that the calling party is a localidentity, such as a nearby friend or neighbor, thereby increasing theprobability that the called party identity will answer the robocall.

At step 415, the called party identity can decide whether to answer thecall. In response to the user not taking the call, at step 420 the callmight be directed to the called party identity's voice mail, in whichcase the robocall device 210 plays the prerecorded message related tothe subject matter of the sales call.

At step 425, if the called party identity answers the call, the robocalldevice 210 plays a prerecorded message briefly describing the goods orservices being sold, and then prompts the called party identity toeither push a button to speak to a representative or push a button to beremoved from the marketer's phone list.

At step 430, in response to a called party identity's selection to beremoved from the telemarketer's phone list, the called party identity'sselection will most likely be ignored. If the called party entity atstep 435 decides to hang up (e.g., end the call), the called party mightstill get more robocalls in the future. If the called party identityresponds by indicating a desire to speak with a representative, therobocall device 210 might at step 440 connect the user with a qualifier,which can prompt the called party identity to select or enterinformation. If certain information entered indicates that the calledparty identity's profile matches a profile of the marketing identity'starget audience, the called party identity at step 450 is transferred toa sales agent. If the called party identity's profile does not match,then at step 455 the robocall device 210 can inform the called partyidentity that his or her profile does not qualify them for the offer,and then disconnect. After disconnection, as was the case at step 435,the called party identity might still get another robocall in thefuture. As such, with robocalls, the experience of a called partyidentity can range from being annoyed, to being angry and frustrated.

Phone numbers are serviced, or “owned,” by one or more phone networks.As an example, as shown in FIG. 5, a calling party device, which can berobocall device 210, might be serviced by, as an example Google Voiceservices, and has a subscriber phone number associated (e.g.,registered) with Google Voice services, and when robocall device 210make voice calls, it initiates these calls through its originatingnetwork (e.g., calling party's network 510), Google Voice services. Thecall can be routed and connected through, for example, another network(e.g., called party's network 520), which may be, for example, AT&T'snetwork. Thus, in this example, communication network 110 can comprisethe calling party's network 510 and the called party's network 520).There is also the possibility that calls are serviced within the samenetwork (e.g., if a calling party and called party are both serviced byAT&T's network), in which case the calling party and called party areserviced by the same network. Additionally, other intermediary networkscan be included through which a call is routed. These phone networksimplement the actual connectivity to the end user device by one or moretechnologies (e.g., circuit, VoIP, and cellular).

FIG. 6 illustrates an example of a call challenger (e.g., callchallenger 605) that can comprise one or more computing devices, each ofwhich can comprise one or more processors and one or more memories thatcan store executable instructions (e.g., comprised of one or moresoftware modules) that, when executed by the one or more processors,facilitate performance of operations in accordance with the presentapplication as described herein. In example embodiments, the examplecall challenger 605 can be implemented as a network device, which cancomprise one or more servers, one or more data stores, or can even beimplemented within a communications switch. The call challenger 605 cancomprise, for example, a network device, such as a switch, a server(e.g., device like server 120), a computer, etc. residing in thecommunication network 110, which can comprise called party's network520. The example call challenger 605 can intercept calls in response toa called party identity opting-in to the call challenge service,challenge a calling device to present a valid response, and facilitatingpreventing the call from being connected if the response falls below amatch score threshold.

Referring to FIG. 6, a calling party identity 610 might possess acalling party UE 620 (e.g., which can comprise the same type of deviceas UE 140 _(1-N)) having associated with it, a phone number770-555-0002. Normally, if this calling party identity 610 calls acalled party UE 220 using the calling party UE 620, the called party UE220's caller ID display (or some other caller ID display, for example, aperipheral caller ID device displaying the caller ID) would show thecalling number as 770-555-0002. In a spoofed call scenario, atelemarketing entity 640 (or, in some cases, a fraudulent identity)directs a robocall to called party UE 220 (thus, the called partyidentity 630 would be “Victim #1” of the robocall). The telemarketingentity 640 might be operating a robocalling device (e.g., robocalldevice 210), or some other communication device, capable of making aspoofed call (e.g., inserting a spoofed number that would be displayedby a caller ID display). It might obtain the phone number of the callingparty identity 610 (“Victim #2”)—770-555-0002 and use it to spoof a callmade to UE 220. In this scenario, when the robocall is made, and acaller ID display associated with the called party UE 220 displays thenumber of the caller, it would display the spoofednumber—770-555-0002—the number belonging to a Victim #2.

In example embodiments, a telephone or mobile device owner can opt-in toa call challenge service, which can employ the use of call challenger605. In example embodiments, the call challenger 605 can facilitatepresentation of a web-page, or some other application interface, inwhich a user identity can input a selection to opt-in to the callchallenge service (see, e.g., GUI show in FIG. 8). The selection can bestored as a data element in a database associated with the callchallenger 605 (e.g., call challenger repository 650). During the opt-inprocess, the device owner can also be prompted to provide a keyword,which can be used to challenge callers directing calls at the mobiledevice or telephone of the owner. The keyword can be a private orsemi-private word or phrase that the device owner creates, for exampleby typing the keyword into a GUI (e.g., GUI of FIG. 8), or by inputtingthe keyword orally, or audibly (e.g., by having called party identity630's voice with the keyword recorded). A keyword can comprise anything(e.g., alphanumeric, special characters, etc.), and can even comprisemultiple keywords (e.g., a keyphrase). For example, the device ownermight use his or her name as a keyword, and type or speak the deviceowner's name (e.g., device owner speaks the name “Sheldon”), much likecreating a voicemail message. In example embodiments, if the owner ofthe telephonic device orally records the keyword, and it is received asan input by the call challenger 605, a voice-to-text converter of thecall challenger can convert the audio input to text, and the spelling ofthe text can be read back to the owner for confirmation that the text iscorrect. Specifically, in the example wherein the name “Sheldon” wasinput as the keyword, the call challenger 605 can facilitate generationof sounds, resulting in the keyword being read back over the phone, forexample letter-by-letter, as “S H E L D O N” to seek confirmation beforecommitting those letters to storage (e.g., storing it into the callchallenger repository 650).

Still on FIG. 6, once keywords are retained (e.g., in call challengerrepository 650), and an incoming call directed to called party UE 220 isrouted to the call challenger 605, the call challenger 605 firstexamines (or inspects) the call and determines if the owner of thenumber associated with the called device has opted-in for the callchallenge functionality. In example embodiments, when an incoming callis routed through the call challenger 605, the call challenger 605 caninspect data associated with the call that indicates the destination ofthe call (e.g., the phone number of the destination device). The callchallenger 605 can access the call challenger repository 650 todetermine whether the phone number of the call destination matches aphone number of a device owner that has opted-in to the call challengeservice. As an example, if “Sheldon” from our example above is thecalled party identity 630 with phone number 770-522-0002 and Sheldonopted-in to the call challenge service, and the call destination dataindicates the destination number as 770-555-0002 matches an opt-in entryin the repository having 770-522-0002, then, in response to thispositive determination, the call challenger 605 can intercept the call(e.g., prevent it from connecting to the called party UE 220), andchallenge the incoming caller by prompting the caller to audibly presenta keyword. In example embodiments, the calling party can be promptedwith a challenge, or challenge question. For example, the prompt caninstruct the calling party to speak the keyword that is the name of thecalled party (e.g., “Please speak the name of the party you areattempting to reach”). An alternative embodiment would be to permit theincoming caller to type in a numeric code that has been pre-recorded bythe device owner, although entry of a code into a phone, as opposed tospeaking the keyword, can be more cumbersome.

The caller can speak the keyword (or keyphrase), and the call challenger605 can receive the spoken keyword as an audio file, and then convertthe recorded audio into text. The call challenger 605 can then comparethat text to the keyword text provided by the called party identity,looking for a match. The match does not have to be exact and can insteadbe a statistical score. For instance, if the caller says Sheldin and theconverted text is Sheldin, instead of Sheldon, it is close but notexact. Depending on acceptance criteria, if the match is sufficientlyclose (e.g., reaches a threshold match score), the call will not beprevented by the call challenger 605 from being connected to the calleddevice.

Still on FIG. 6, if acceptance criteria are sufficiently tight on matchscoring, the call challenger 605 can also prompt the calling party to“try again” to respond with the keyword again, which may result in abetter match. People who speak languages different than the called partyor having strong dialects, may have abnormally low match scores. This issomething that can also be learned over time. In example embodiments, ifthe voice to text subsystem detects certain voice characteristics, thenit may dynamically modify the required matching score... not because ofa potential mismatch with the called party, but instead a potentialmismatch with the stored text. It is also possible that some stored textis more prone to pronunciation errors than other stored text and thiscan also be learned by a machine learning subsystem of the callchallenger 605 to dynamically learn whether to tighten acceptancecriteria. In example embodiments, the call challenger 605 can alsodetermine and update the stored keyword text with known variations of aparticular word, or even variations supplied by the called party thatopted-in. For example, if a particular keyword is fortnite, the callchallenger 605 can also store variations of the word, such as fotnight,fortnyte, foughtnight, fartnite, etc., such that an audible responsethat results in a translation into a variation of the keyword mightstill produce a tight match.

In example embodiments, if an incoming call is rejected by the callchallenger 605 (e.g., low match score, if a certain amount of time haselapsed without a response, etc.), the call challenger 605 canfacilitate the playing of a message to the caller informing the callerof the reason for the rejection, and can also indicate to the callerthat he or she should attempt to reach the called party by text message,or other means.

Still referring to FIG. 6, feedback at the end of the call can be usedto identify unwanted calls that were not blocked, or calls that wereblocked that the called party desires not to be blocked. The calledparty could receive a report, which can be a periodic report, thatcomprises rejected calls, showing the calling number (or name) andperhaps rejection criteria. In example embodiments, device owner canchange, or add, keywords and variations of keywords to improve the oddsthat desired callers successfully get through to them. Or, in exampleembodiments, as a result of the called party's feedback, keywords can beupdated to comprise variations of a word. For example, for a call thatwas rejected because the audible response was translated to “sheldin”instead of “sheldon,” an indication that the call should have been letthrough by the call challenger 605 can result in an update of thatkeyword to include the text “sheldin” as acceptable. This is an exampleof how the call challenger 605 dynamically learns variations in thetext, based on input from the called party.

FIG. 7 illustrates an example embodiment of call challenger 605. Thecomponents (e.g., hardware, software, or a combination thereof) of theexample call challenger 605 can comprise an opt-in and keyword capturesubsystem 705, a voice-to-text converter 710, call challenger repository650, initial answering subsystem 715, match scoring engine 720,connection decision processor 725, and delivery facilitator 730.

Referring to FIG. 7, in an example scenario, a device owner (e.g.,called party identity 630) possesses a telephone or mobile device (e.g.,called party UE 220) having associated with called party UE 220 thephone number 770-555-0002. If the called party identity 630 wishes toopt-in to the call challenge service, the called party identity 630 canaccess a GUI (e.g., webport, webpage, dialogue, etc.) that allows thecalled party identity to make an opt-in selection to the call challengeservice, and also input and submit a keyword (see, e.g., FIG. 8).

In example embodiments, a telephone or mobile device owner can opt-in toa call challenge service, which can employ the use of call challenger605. In example embodiments, the opt-in and keyword capture subsystem705 of call challenger 605 can facilitate presentation of a web-page, orsome other application interface, in which a user identity can input aselection to opt-in to the call challenge service (see, e.g., GUI shownin FIG. 8). The opt-in and keyword capture subsystem 705 can function asa web server, for example, serving up a webpage that can present thecalled party 630 with instructions, and can receive inputs of an opt-inselection, and receive entry of a keyword that can be used to challengecallers directing calls at the called party UE 220. The webpage can bedisplayed on a browser executing on a computer, UE (e.g., UE 140), orcalled party UE 220. The keyword can be input, for example by typing thekeyword into a field displayed by the webpage, or by speaking thekeyword (e.g., by having called party identity 630's voice recorded withthe keyword recorded) into a microphone of a computer, or by speakingthe keyword into the audible input device of a cellphone. For example,the device owner might type or speak the device owner's name (e.g.,device owner speaks the name “Sheldon”), much like creating a voicemailmessage.

If the device owner speaks the keyword, the keyword in the voice inputformat can be received by the opt-in and keyword capture subsystem 705and forwarded to the voice-to-text converter 710. The voice-to-textconverter 710 can convert the audio input to text, and send the textback to the opt-in and keyword capture subsystem 705, which can thenread back the spelling of the text to the owner for confirmation thatthe text is correct. Specifically, in the example wherein the name“Sheldon” was input as the keyword, it can be read back over the phone(or computer speaker, headphone, etc.) letter by letter as “S H E L D ON” and seek confirmation before committing those letters to thechallenge subsystem (e.g., storing it into the call challengerrepository 650).

Still referring to FIG. 7, the opt-in and keyword capture subsystem 705can take the received selection to opt-in and the keyword (in textformat) and store them as data in the call challenger repository 650.The data can comprise data elements that indicate the identity of thecalled party (e.g., user name, customer number, etc.), the numberassociated with the device of the called party (e.g., 770-555-0002), thedesire to opt-in, and the keyword. As mentioned above, variations of thekeyword can also be stored.

When an incoming call is routed to the call challenger 605, the initialanswering subsystem 715 of the call challenger 605 first examines (orinspects) the call and determines if the owner of the number associatedwith the called device has opted-in for the call challengefunctionality. The initial answering subsystem 715 can inspect dataassociated with the call that indicates the destination of the call(e.g., the phone number of the destination device). The call challenger605 can access the call challenger repository 650 to determine whetherthe phone number of the call destination matches a phone number of adevice owner that has opted-in to the call challenge service. As anexample, if “Sheldon” from our example above is the called partyidentity 630 with phone number 770-522-0002 and Sheldon opted-in to thecall challenge service, and the call destination data indicates thedestination number 770-555-0002 matches an entry in the repositoryhaving 770-522-0002, then, in response to this positive determination,the call challenger 605 can challenge the incoming caller by promptingthe caller to orally present a keyword. In example embodiments, thecalling party can be prompted to speak the keyword of the called party.

The caller can speak the keyword (or keyphrase). The initial answeringsubsystem 715 can receive the spoken keyword as an audio file, and thensend the audio file to the voice-to-text converter 710 to convert therecorded audio into text. The text can be forwarded to the match scoringengine 720. The match scoring engine 720 can then compare that text tothe text provided by the called party identity (e.g., retrieve thekeyword text from the call challenger repository 650), looking for amatch. As mentioned above, if a match is sufficiently close (e.g.,reaches a threshold match score), the connection decision processor 725might not prevent the call from being connected to the called party UE220. The delivery facilitator 730 can facilitate the connection of thecall between the caller and the calling party. On the other hand, if noresponse is provided, which would likely be the case with a robocalldevice, the call can be prevented from reaching the called party (e.g.,the can be terminated; the call can also be directed by the deliveryfacilitator 730 to a voice mail system, for example, one that is not thecalled party identity's normal voice mail system). The connectiondecision processor 725 can also direct the initial answering subsystem715 to prompt the caller to “try again” so that the caller can presentthe keyword again, which might result in a better match. If an incomingcall is rejected by the call challenger 605, the initial answeringsubsystem 715 can facilitate the playing of a message to the callerinforming the caller of the reason for the rejection, and can alsoindicate to the caller that he or she should attempt to reach the calledparty by text message, or other means.

Still on FIG. 7, the connection decision processor 725 can also providefeedback after calls. The feedback can be in the form of, for example, areport, stored in the call challenger repository 650. The feedbackreport can be retrieved from the call challenger repository 650 anddelivered to, for example, a web-accessible location. The feedbackreport can be displayed in a GUI (e.g., the GUI of FIG. 9) and cancomprise entries for each call that was blocked and can also compriseentries for each call that was permitted to reach the called party. Thefeedback report can show the calling number, calling party name, andperhaps rejection criteria. In example embodiments, from the GUIdisplaying the feedback report, the device owner can change, or add,keywords and variations of keywords to improve the odds that desiredcallers successfully get through to them. Or, in example embodiments, asa result of the called party's feedback, keywords can be updated withvariations of a word that should have been accepted but was determinednot to match. Additionally, if the feedback report entry indicated thatan unwanted call was connected, the device owner can indicate that theconverted text that resulted in the match should be removed as a match,thus preventing it from being used to positively match a response. Ifthe feedback report indicated that the response was a match, the deviceowner can still add the caller to the block list, so that even should acorrect response be given by the caller next time, calls from the callercan still be blocked.

FIG. 8 illustrates an example embodiment of an opt-in and keyword entryGUI 800. The opt-in and keyword entry GUI 800 can comprise a messageprompting a device owner to sign up for the call blocking service, by,for example, checking a box. The opt-in and keyword entry GUI 800 canalso provide an indication that the device owner can speak the keywordafter, for example, pressing a button that looks like a microphone.After the keyword is received as an input, a voice-to-text converter(e.g., voice-to-text converter 710) of the call challenger 605 canconvert the audio input to text, and the spelling of the text can beread back to the owner (e.g., letter-by-letter) for confirmation thatthe text is correct.

FIG. 9 illustrates an example of a feedback report GUI 900. The feedbackreport GUI 900 can comprise lines of entries that indicate the callingparty, the keyword provided, the disposition of the call (e.g., allowedor blocked), and treatment of the next call. The feedback report GUI 900can be used to identify unwanted calls that got through. For example, asshown in feedback report GUI 900, perhaps the called party identity didnot want to receive a call from Vax Potor, even though Vax provide thecorrect response when prompted for the keyword (“sheldon”). In thisinstance, the user can select the “block” button associated with VaxPotor to indicate that the treatment for the next call from Vax would beto block the call. The feedback report GUI 900 might indicate a robocallthat was blocked (e.g., from Campground Workers of America). If thecalled party identity decides that he or she would like to receive callsfrom this party in the future, the called party identity can indicatethat the treatment of the next call from Campground Workers of Americawould be to allow the call. Feedback report GUI 900 might also indicatean entry related to a calling party that was blocked (e.g., Judy Jones),and provide the keyword with which the party responded (e.g., “showden”instead of “sheldon”). If the call challenger 605 did not alreadyaccount for this variation (e.g., saved the variation with the keyword,or a match resulted in a high enough match score threshold), the calledparty identity can see that Judy Jones, who perhaps has a northernaccent, responded to the call challenge with an audible response thatwas converted to “showden”. Here, the called party can select an optionthat allows all future calls from Judy Jones to connect, add the keywordvariation “showden” as acceptable, so that the next time Judy Jones orany other calling party responds with an audible that results in aconverted text of “showden” the call will be allowed, or do both.

In each of the example operations described above, and below in FIGS.10-12, steps, blocks, features, or aspects can be substituted orcombined with other steps, blocks, features, or aspects, unless contextwarrants that such combinations or substitutions are not possible.Further, if a step, block, feature, or aspect is not described withrespect to example operations, this does not mean that the feature,step, or aspect is incompatible or impossible with respect to thoseexample operations. As such, the example operations of the presentapplication described above and below are not necessarily limited to thesteps, features, or aspects that are described with respect to thoseexample operations.

FIG. 10 illustrates example operations that can be performed by a callchallenger (e.g., call challenger 605), in accordance with exampleembodiments of the present application. The call challenger can comprisea network device comprising a processor and machine-readable storagemedium (e.g., memory) that stores executable instructions that, whenexecuted by the processor, can facilitate performance of operations1000.

The example operations 1000 can comprise, at step 1005, accepting afirst user input associated with a user identity (e.g., called partyidentity 630) comprising a data element indicative of an opting to use anetwork-implemented service (e.g., call challenge service) thatfacilitates blocking of unwanted calls (whether robotic or other). Thedata element can be stored in a repository (e.g., call challengerrepository 650).

At step 1010, the example operations 1000 can comprise receiving asecond user input associated with the user identity comprising akeyword. The keyword can comprise alphanumeric characters entered via auser input device (e.g., in the example illustrative scenarios above, akeyword could be a name, such as “Sheldon”). The keyword can be receivedvia an audible input, wherein the keyword can be converted from anaudible format of the audible input to a text format.

The example operations 1000 at step 1015 can comprise storing thekeyword in the repository. The first user input and the second use inputcan be entered via, for example, a graphical user interface (e.g.,opt-in and keyword entry GUI 800).

The example operations 1000 can compromise, at step 1020, receiving acall from a communication device directed to a user equipment associatedwith the user identity. The call could be a robocall (e.g., fromrobocall device 210), or it could be a non-robocall.

At step 1025, the example operations 1000 can comprise, in response to apresence of the data element (e.g., determining that the user identityhas opted-in to the call challenge service), prompting the communicationdevice to provide an audible response (e.g., “please speak the name ofthe party you are trying to call”, or “To complete your call, pleasespeak the keyword.”).

In response to a lack of receipt of the audible response (e.g., after atime has elapsed), the example operations 1000 can comprise, at step1030, taking a preventative action relating to the call. Thepreventative action can be facilitating blocking the call. Thepreventative action can be directing the call to a call answeringdevice, wherein the call answering device can store a message related tothe call, and wherein the message can be accessible by the userequipment, or some other computing device.

The example operations 1000 can further comprise, in step 1035, inresponse to the receipt of the audible response, converting the audibleresponse to text.

The example operations 1000 at step 1040 can further comprise retrievingthe keyword from the repository and comparing the text to the keyword.The comparing the text to the keyword can also comprise comparing thetext to a variation of the keyword (e.g., as illustrated by a scenarioabove, fortnight can be a variation of fortnite). The variation can besupplied by the user identity, or can be determined by the networkdevice (e.g., determined based on known variations, such as night, nite,and knight).

In response to the comparing resulting in a threshold match score beingattained, at step 1045, the example operations can further compriseallowing the call to proceed to the user equipment.

In response to the comparing resulting in the threshold match score notbeing attained, facilitating taking the preventative action relating tothe call, and facilitating accepting a selection on a feedback report.The feedback report can be displayed in a web browser as a webpage(e.g., feedback report GUI 900), which can be accessible to the useridentity via a web browser of the user equipment, or some othercomputing device. The selection can indicate that the preventativeaction related to the call should not have been taken. The exampleoperations can further comprise updating the variation of the keyword tocomprise the rejected text (e.g., as illustrated above, for the keyword“Sheldon” a response of “showden” might have been rejected).

FIG. 11 illustrates example operations that can be performed by a callchallenger (e.g., call challenger 605), in accordance with exampleembodiments of the present application. The call challenger can comprisea network device comprising a processor and machine-readable storagemedium (e.g., memory) that stores executable instructions that, whenexecuted by the processor, can facilitate performance of operations1100.

The example operations 1100 at step 1105 can comprise accepting a firstuser input indicating that a call, directed to a user equipmentassociated with a user identity, is to be challenged. The first userinput can be stored in a repository (e.g., call challenger repository650).

The example operations 1100 can further comprise, at step 1110,receiving a second user input comprising a keyword.

At step 1115, the example operations 1100 can further comprisefacilitating storing the keyword in the repository. The first user inputand the second use input can be entered via, for example, a graphicaluser interface (e.g., opt-in and keyword entry GUI 800).

The example operations 1100 at step 1120 can further comprise receivingthe call from a communication device directed to the user equipment. Thecall can comprise a robotic call and the communication device cancomprise a robotic dialer device (e.g., robocall device 210). The callcan also comprise a call from a phone operated by a person.

In response to the first user input (e.g., determination that the useridentity has opted-in to the call challenge service), the exampleoperations 1100 can further comprise, at step 1125, prompting thecommunication device to provide an audible response (e.g., “please speakthe name of the party you are trying to call”, or “To complete yourcall, please speak the keyword.”).

In response to the audible response being determined not to have beenreceived within a defined duration of time, the operations 1100 can atstep 1130 comprise facilitating preventing the call from connecting withthe user equipment (e.g., by blocking the call, directing the call to acall answering device that stores a message related to the call, andwherein the message is accessible by the user equipment, etc.).

In response to the audible response being determined to have beenreceived within the defined duration of time, at step 1135, the exampleoperations 1100 can comprise converting the audible response to a text.

The example operations 1100, at step 1140, can further compriseretrieving the keyword from the repository.

The example operations 1100 can further comprise, at step 1145,comparing the text to the keyword. The comparing the text to the keywordcan also comprise comparing the text to a variation of the keyword.

At step 1150, the example operations 1100 can further comprise, inresponse to determining an output of the comparing satisfies a thresholdmatch score, allowing the call to proceed to the user equipment.

The example operations 1100, at step 1155, can further comprise, inresponse to the determining the output of the comparing does not satisfythe threshold match score, facilitating preventing the call fromconnecting with the user equipment, and facilitating accepting aselection indicating that the preventing the call should not have beenfacilitated (e.g., FIG. 9). The operations can further comprise updatingthe variation of the keyword to comprise a rejected text (e.g., textthat did not result in the threshold match score being satisfied).

The example operations 1100 can further comprise transmitting a feedbackreport indicating the details of calls directed to the user equipment(see, e.g., FIG. 9).

Moving on to FIG. 12, FIG. 12 illustrates example operations that can beperformed by a call challenger (e.g., call challenger 605), inaccordance with example embodiments of the present application. The callchallenger can comprise a network device comprising a processor andmachine-readable storage medium (e.g., memory) that stores executableinstructions that, when executed by the processor, can facilitateperformance of operations 1200.

The example operations 1200 can, at step 1205, comprise accepting afirst user input indicating that a call directed to a user equipmentassociated with a user identity be challenged. The first user input canbe stored in a data store, for example, call challenger repository 650.

At step 1210, the operations can further comprise, receiving a seconduser input comprising a keyword. The keyword can comprise alphanumericcharacters that were entered via a user input device. The keyword can bereceived via an audible input, wherein the keyword can be converted froman audible format into a text format.

The example operations 1200 can further comprise, at step 1215, storingthe keyword in the data store. The first user input and the second useinput can be entered via, for example, a graphical user interface (e.g.,opt-in and keyword entry GUI 800).

The example operations 1200 at step 1220, can further comprise,receiving the call from a communication device directed to the userequipment. The call can comprise a robotic call and the communicationdevice can comprise a robotic dialer device. Or, the call could also bea call from a phone operated by a person.

In response to the first user input being accepted (e.g., in response toa determination that the user identity has opted-in to the callchallenge service), at step 1225, the operations 1200 can furthercomprise, prompting the communication device to provide an audibleresponse (e.g., “please speak the name of the party you are trying tocall”, or “To complete your call, please speak the keyword.”).

In response to a lack of a receipt of the audible response (e.g., lackof an audible response within a period, or after an amount of time haselapsed), the example operations 1200 can, at step 1230, furthercomprise preventing the call from connecting with the user equipment(e.g., by blocking the call, or by directing the call to anotherlocation).

In response to the receipt of the audible response, the exampleoperations 1200 can further comprise, at step 1235, converting theaudible response to a text.

The example operations 1200 can further comprise, at step 1240,retrieving the keyword from the data store and comparing the text to thekeyword, and to a variation of the keyword, the comparing resulting in amatch score value.

In response to the match score value not satisfying a function of athreshold, the example operations 1200 can further comprise, at step1245, preventing the call from connecting with the user equipment,accepting a selection on a feedback report (see e.g., feedback reportGUI 900) comprising details related to the call, the selectionindicating that the text should have resulted in the match score valuesatisfying the function of the threshold, and updating the variation tocomprise the text. The feedback report can comprise a log of callsdestined for the user equipment.

Referring now to FIG. 13, illustrated is a schematic block diagram of anexample end-user device such as a user equipment (e.g., UE 140, calledparty UE 220) that can be a mobile device capable of connecting to anetwork in accordance with some embodiments described herein. One ormore of the components as illustrated in FIG. 13 can comprise the userequipment, and although a mobile handset 1300 is illustrated herein, itwill be understood that other devices can be a mobile device, and thatthe mobile handset 1300 is merely illustrated to provide context for theembodiments of the various embodiments described herein. The followingdiscussion is intended to provide a brief, general description of anexample of a suitable environment in which the various embodiments canbe implemented. While the description comprises a general context ofcomputer-executable instructions embodied on a machine-readable storagemedium, those skilled in the art will recognize that the embodimentsalso can be implemented in combination with other program modules and/oras a combination of hardware and software.

Generally, applications (e.g., program modules) can include routines,programs, components, data structures, etc., that perform particulartasks or implement particular abstract data types. Moreover, thoseskilled in the art will appreciate that the methods described herein canbe practiced with other system configurations, comprisingsingle-processor or multiprocessor systems, minicomputers, mainframecomputers, as well as personal computers, hand-held computing devices,microprocessor-based or programmable consumer electronics, and the like,each of which can be operatively coupled to one or more associateddevices.

A computing device can typically include a variety of machine-readablemedia. Machine-readable media can be any available media that can beaccessed by the computer and comprises both volatile and non-volatilemedia, removable and non-removable media. By way of example and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media can include volatileand/or non-volatile media, removable and/or non-removable mediaimplemented in any method or technology for storage of information, suchas computer-readable instructions, data structures, program modules orother data. Computer storage media can include, but is not limited to,RAM, ROM, EEPROM, flash memory or other memory technology, CD ROM,digital video disk (DVD) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to store thedesired information and that can be accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, andcomprises any information delivery media. The term “modulated datasignal” means a signal that has one or more of its characteristics setor changed in such a manner as to encode information in the signal. Byway of example, and not limitation, communication media comprises wiredmedia such as a wired network or direct-wired connection, and wirelessmedia such as acoustic, RF, infrared and other wireless media.Combinations of the any of the above should also be included within thescope of computer-readable media.

The mobile handset 1300 comprises a processor 1302 for controlling andprocessing all onboard operations and functions. A memory 1304interfaces to the processor 1302 for storage of data and one or moreapplications 1306 (e.g., a video player software, user feedbackcomponent software, etc.). Other applications can include voicerecognition of predetermined voice commands that facilitate initiationof the user feedback signals. The applications 1306 can be stored in thememory 1304 and/or in a firmware 1308, and executed by the processor1302 from either or both the memory 1304 or/and the firmware 1308. Thefirmware 1308 can also store startup code for execution in initializingthe mobile handset 1300. A communications component 1310 interfaces tothe processor 1302 to facilitate wired/wireless communication withexternal systems, e.g., cellular networks, VoIP networks, and so on.Here, the communications component 1310 can also include a suitablecellular transceiver 1311 (e.g., a GSM transceiver) and/or an unlicensedtransceiver 1313 (e.g., Wi-Fi, WiMAX) for corresponding signalcommunications. The mobile handset 1300 can be a device such as acellular telephone, a PDA with mobile communications capabilities, andmessaging-centric devices. The communications component 1310 alsofacilitates communications reception from terrestrial radio networks(e.g., broadcast), digital satellite radio networks, and Internet-basedradio services networks.

The mobile handset 1300 comprises a display 1312 for displaying text,images, video, telephony functions (e.g., a Caller ID function), setupfunctions, and for user input. For example, the display 1312 can also bereferred to as a “screen” that can accommodate the presentation ofmultimedia content (e.g., music metadata, messages, wallpaper, graphics,etc.). The display 1312 can also display videos and can facilitate thegeneration, editing and sharing of video quotes. A serial I/O interface1314 is provided in communication with the processor 1202 to facilitatewired and/or wireless serial communications (e.g., USB, and/or IEEE1394) through a hardwire connection, and other serial input devices(e.g., a keyboard, keypad, and mouse). This supports updating andtroubleshooting the mobile handset 1300, for example. Audio capabilitiesare provided with an audio I/O component 1316, which can include aspeaker for the output of audio signals related to, for example,indication that the user pressed the proper key or key combination toinitiate the user feedback signal. The audio I/O component 1316 alsofacilitates the input of audio signals through a microphone to recorddata and/or telephony voice data, and for inputting voice signals fortelephone conversations.

The mobile handset 1300 can include a slot interface 1318 foraccommodating a SIC (Subscriber Identity Component) in the form factorof a card Subscriber Identity Module (SIM) or universal SIM 1320, andinterfacing the SIM card 1320 with the processor 1302. However, it is tobe appreciated that the SIM card 1320 can be manufactured into themobile handset 1300, and updated by downloading data and software.

The mobile handset 1300 can process IP data traffic through thecommunications component 1310 to accommodate IP traffic from an IPnetwork such as, for example, the Internet, a corporate intranet, a homenetwork, a person area network, etc., through an ISP or broadband cableprovider. Thus, VoIP traffic can be utilized by the mobile handset 1300and IP-based multimedia content can be received in either an encoded ordecoded format.

A video processing component 1322 (e.g., a camera) can be provided fordecoding encoded multimedia content. The video processing component 1322can aid in facilitating the generation, editing and sharing of videoquotes. The mobile handset 1300 also comprises a power source 1324 inthe form of batteries and/or an AC power subsystem, which power source1324 can interface to an external power system or charging equipment(not shown) by a power I/O component 1326.

The mobile handset 1300 can also include a video component 1330 forprocessing video content received and, for recording and transmittingvideo content. For example, the video component 1330 can facilitate thegeneration, editing and sharing of video quotes. A location trackingcomponent 1332 facilitates geographically locating the mobile handset1300. As described hereinabove, this can occur when the user initiatesthe feedback signal automatically or manually. A user input component1334 facilitates the user initiating the quality feedback signal. Theuser input component 1334 can also facilitate the generation, editingand sharing of video quotes. The user input component 1334 can includesuch conventional input device technologies such as a keypad, keyboard,mouse, stylus pen, and/or touch screen, for example.

Referring again to the applications 1306, a hysteresis component 1336facilitates the analysis and processing of hysteresis data, which isutilized to determine when to associate with the access point. Asoftware trigger component 1338 can be provided that facilitatestriggering of the hysteresis component 1336 when the Wi-Fi transceiver1313 detects the beacon of the access point. A SIP client 1340 enablesthe mobile handset 1300 to support SIP protocols and register thesubscriber with the SIP registrar server. The applications 1306 can alsoinclude a client 1342 that provides at least the capability ofdiscovery, play and store of multimedia content, for example, music.

The mobile handset 1300, as indicated above related to thecommunications component 1310, comprises an indoor network radiotransceiver 1313 (e.g., Wi-Fi transceiver). This function supports theindoor radio link, such as IEEE 802.11, for a dual-mode GSM handset. Themobile handset 1300 can accommodate at least satellite radio servicesthrough a handset that can combine wireless voice and digital radiochipsets into a single handheld device.

In order to provide additional context for various embodiments describedherein, FIG. 14 and the following discussion are intended to provide abrief, general description of a suitable computing environment 1400 inwhich the various embodiments of the embodiment described herein can beimplemented. For example, one or more of the devices shown in FIG. 6 canhave similar components to that of the computer described in FIG. 14.

While the embodiments have been described above in the general contextof computer-executable instructions that can run on one or morecomputers, those skilled in the art will recognize that the embodimentscan be also implemented in combination with other program modules and/oras a combination of hardware and software.

Generally, program modules include routines, programs, components, datastructures, etc., that perform particular tasks or implement particularabstract data types. Moreover, those skilled in the art will appreciatethat the methods can be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, minicomputers, mainframe computers, Internet of Things (IoT)devices, distributed computing systems, as well as personal computers,hand-held computing devices, microprocessor-based or programmableconsumer electronics, and the like, each of which can be operativelycoupled to one or more associated devices.

The illustrated embodiments of the embodiments herein can be alsopracticed in distributed computing environments where certain tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules can be located in both local and remote memory storage devices.

Computing devices typically include a variety of media, which caninclude computer-readable storage media, machine-readable storage media,and/or communications media, which two terms are used herein differentlyfrom one another as follows. Computer-readable storage media ormachine-readable storage media can be any available storage media thatcan be accessed by the computer and includes both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media or machine-readablestorage media can be implemented in connection with any method ortechnology for storage of information such as computer-readable ormachine-readable instructions, program modules, structured data orunstructured data.

Computer-readable storage media can include, but are not limited to,random access memory (RAM), read only memory (ROM), electricallyerasable programmable read only memory (EEPROM), flash memory or othermemory technology, compact disk read only memory (CD-ROM), digitalversatile disk (DVD), Blu-ray disc (BD) or other optical disk storage,magnetic cassettes, magnetic tape, magnetic disk storage or othermagnetic storage devices, solid state drives or other solid statestorage devices, or other tangible and/or non-transitory media which canbe used to store desired information. In this regard, the terms“tangible” or “non-transitory” herein as applied to storage, memory orcomputer-readable media, are to be understood to exclude onlypropagating transitory signals per se as modifiers and do not relinquishrights to all standard storage, memory or computer-readable media thatare not only propagating transitory signals per se.

Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

Communications media typically embody computer-readable instructions,data structures, program modules or other structured or unstructureddata in a data signal such as a modulated data signal, e.g., a carrierwave or other transport mechanism, and includes any information deliveryor transport media. The term “modulated data signal” or signals refersto a signal that has one or more of its characteristics set or changedin such a manner as to encode information in one or more signals. By wayof example, and not limitation, communication media include wired media,such as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media.

With reference again to FIG. 14, the example environment 1400 forimplementing various embodiments of the aspects described hereinincludes a computer 1402, the computer 1402 including a processing unit1404, a system memory 1406 and a system bus 1408. The system bus 1408couples system components including, but not limited to, the systemmemory 1406 to the processing unit 1404. The processing unit 1404 can beany of various commercially available processors. Dual microprocessorsand other multi-processor architectures can also be employed as theprocessing unit 1404.

The system bus 1408 can be any of several types of bus structure thatcan further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1406includes ROM 1410 and RAM 1412. A basic input/output system (BIOS) canbe stored in a non-volatile memory such as ROM, erasable programmableread only memory (EPROM), EEPROM, which BIOS contains the basic routinesthat help to transfer information between elements within the computer1402, such as during startup. The RAM 1412 can also include a high-speedRAM such as static RAM for caching data.

The computer 1402 further includes an internal hard disk drive (HDD)1414 (e.g., EIDE, SATA), one or more external storage devices 1416(e.g., a magnetic floppy disk drive (FDD) 1416, a memory stick or flashdrive reader, a memory card reader, etc.) and an optical disk drive 1420(e.g., which can read or write from a CD-ROM disc, a DVD, a BD, etc.).While the internal HDD 1414 is illustrated as located within thecomputer 1402, the internal HDD 1414 can also be configured for externaluse in a suitable chassis (not shown). Additionally, while not shown inenvironment 1400, a solid state drive (SSD) could be used in additionto, or in place of, an HDD 1414. The HDD 1414, external storagedevice(s) 1416 and optical disk drive 1420 can be connected to thesystem bus 1408 by an HDD interface 1424, an external storage interface1426 and an optical drive interface 1428, respectively. The interface1424 for external drive implementations can include at least one or bothof Universal Serial Bus (USB) and Institute of Electrical andElectronics Engineers (IEEE) 1394 interface technologies. Other externaldrive connection technologies are within contemplation of theembodiments described herein.

The drives and their associated computer-readable storage media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1402, the drives andstorage media accommodate the storage of any data in a suitable digitalformat. Although the description of computer-readable storage mediaabove refers to respective types of storage devices, it should beappreciated by those skilled in the art that other types of storagemedia which are readable by a computer, whether presently existing ordeveloped in the future, could also be used in the example operatingenvironment, and further, that any such storage media can containcomputer-executable instructions for performing the methods describedherein.

A number of program modules can be stored in the drives and RAM 1412,including an operating system 1430, one or more application programs1432, other program modules 1434 and program data 1436. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1412. The systems and methods described herein can beimplemented utilizing various commercially available operating systemsor combinations of operating systems.

Computer 1402 can optionally comprise emulation technologies. Forexample, a hypervisor (not shown) or other intermediary can emulate ahardware environment for operating system 1430, and the emulatedhardware can optionally be different from the hardware illustrated inFIG. 14. In such an embodiment, operating system 1430 can comprise onevirtual machine (VM) of multiple VMs hosted at computer 1402.Furthermore, operating system 1430 can provide runtime environments,such as the Java runtime environment or the .NET framework, forapplications 1432. Runtime environments are consistent executionenvironments that allow applications 1432 to run on any operating systemthat includes the runtime environment. Similarly, operating system 1430can support containers, and applications 1432 can be in the form ofcontainers, which are lightweight, standalone, executable packages ofsoftware that include, e.g., code, runtime, system tools, systemlibraries and settings for an application.

Further, computer 1402 can be enable with a security module, such as atrusted processing module (TPM). For instance with a TPM, bootcomponents hash next in time boot components, and wait for a match ofresults to secured values, before loading a next boot component. Thisprocess can take place at any layer in the code execution stack ofcomputer 1402, e.g., applied at the application execution level or atthe operating system (OS) kernel level, thereby enabling security at anylevel of code execution.

A user can enter commands and information into the computer 1402 throughone or more wired/wireless input devices, e.g., a keyboard 1438, a touchscreen 1440, and a pointing device, such as a mouse 1442. Other inputdevices (not shown) can include a microphone, an infrared (IR) remotecontrol, a radio frequency (RF) remote control, or other remote control,a joystick, a virtual reality controller and/or virtual reality headset,a game pad, a stylus pen, an image input device, e.g., camera(s), agesture sensor input device, a vision movement sensor input device, anemotion or facial detection device, a biometric input device, e.g.,fingerprint or iris scanner, or the like. These and other input devicesare often connected to the processing unit 1404 through an input deviceinterface 1444 that can be coupled to the system bus 1408, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, a BLUETOOTH®interface, etc.

A monitor 1446 or other type of display device can be also connected tothe system bus 1408 via an interface, such as a video adapter 1448. Inaddition to the monitor 1446, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1402 can operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1450. The remotecomputer(s) 1450 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1402, although, for purposes of brevity, only a memory/storage device1452 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1454 and/orlarger networks, e.g., a wide area network (WAN) 1456. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich can connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1402 can beconnected to the local network 1454 through a wired and/or wirelesscommunication network interface or adapter 1458. The adapter 1458 canfacilitate wired or wireless communication to the LAN 1454, which canalso include a wireless access point (AP) disposed thereon forcommunicating with the adapter 1458 in a wireless mode.

When used in a WAN networking environment, the computer 1402 can includea modem 1460 or can be connected to a communications server on the WAN1456 via other means for establishing communications over the WAN 1456,such as by way of the Internet. The modem 1460, which can be internal orexternal and a wired or wireless device, can be connected to the systembus 1408 via the input device interface 1444. In a networkedenvironment, program modules depicted relative to the computer 1402 orportions thereof, can be stored in the remote memory/storage device1452. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

When used in either a LAN or WAN networking environment, the computer1402 can access cloud storage systems or other network-based storagesystems in addition to, or in place of, external storage devices 1416 asdescribed above. Generally, a connection between the computer 1402 and acloud storage system can be established over a LAN 1454 or WAN 1456e.g., by the adapter 1458 or modem 1460, respectively. Upon connectingthe computer 1402 to an associated cloud storage system, the externalstorage interface 1426 can, with the aid of the adapter 1458 and/ormodem 1460, manage storage provided by the cloud storage system as itwould other types of external storage. For instance, the externalstorage interface 1426 can be configured to provide access to cloudstorage sources as if those sources were physically connected to thecomputer 1402.

The computer 1402 can be operable to communicate with any wirelessdevices or entities operatively disposed in wireless communication,e.g., a printer, scanner, desktop and/or portable computer, portabledata assistant, communications satellite, any piece of equipment orlocation associated with a wirelessly detectable tag (e.g., a kiosk,news stand, store shelf, etc.), and telephone. This can include WirelessFidelity (Wi-Fi) and BLUETOOTH® wireless technologies. Thus, thecommunication can be a predefined structure as with a conventionalnetwork or simply an ad hoc communication between at least two devices.

The computer is operable to communicate with any wireless devices orentities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This comprises at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b,g, n, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11b) or 54 Mbps (802.11a) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic “10BaseT” wiredEthernet networks used in many offices.

As used in this application, the terms “system,” “component,”“interface,” and the like are generally intended to refer to acomputer-related entity or an entity related to an operational machinewith one or more specific functionalities. The entities disclosed hereincan be either hardware, a combination of hardware and software,software, or software in execution. For example, a component can be, butis not limited to being, a process running on a processor, a processor,an object, an executable, a thread of execution, a program, and/or acomputer. By way of illustration, both an application running on aserver and the server can be a component. One or more components canreside within a process and/or thread of execution and a component canbe localized on one computer and/or distributed between two or morecomputers. These components also can execute from various computerreadable storage media comprising various data structures storedthereon. The components can communicate via local and/or remoteprocesses such as in accordance with a signal comprising one or moredata packets (e.g., data from one component interacting with anothercomponent in a local system, distributed system, and/or across a networksuch as the Internet with other systems via the signal). As anotherexample, a component can be an apparatus with specific functionalityprovided by mechanical parts operated by electric or electroniccircuitry that is operated by software or firmware application(s)executed by a processor, wherein the processor can be internal orexternal to the apparatus and executes at least a part of the softwareor firmware application. As yet another example, a component can be anapparatus that provides specific functionality through electroniccomponents without mechanical parts, the electronic components cancomprise a processor therein to execute software or firmware thatconfers at least in part the functionality of the electronic components.An interface can comprise input/output (I/O) components as well asassociated processor, application, and/or API components.

Furthermore, the disclosed subject matter can be implemented as amethod, apparatus, or article of manufacture using standard programmingand/or engineering techniques to produce software, firmware, hardware,or any combination thereof to control a computer to implement thedisclosed subject matter. The term “article of manufacture” as usedherein is intended to encompass a computer program accessible from anycomputer-readable device, computer-readable carrier, orcomputer-readable media. For example, computer-readable media caninclude, but are not limited to, a magnetic storage device, e.g., harddisk; floppy disk; magnetic strip(s); an optical disk (e.g., compactdisk (CD), a digital video disc (DVD), a Blu-ray Disc™ (BD)); a smartcard; a flash memory device (e.g., card, stick, key drive); and/or avirtual device that emulates a storage device and/or any of the abovecomputer-readable media.

As it employed in the subject specification, the term “processor” canrefer to substantially any computing processing unit or devicecomprising single-core processors; single-processors with softwaremultithread execution capability; multi-core processors; multi-coreprocessors with software multithread execution capability; multi-coreprocessors with hardware multithread technology; parallel platforms; andparallel platforms with distributed shared memory. Additionally, aprocessor can refer to an integrated circuit, an application specificintegrated circuit (ASIC), a digital signal processor (DSP), a fieldprogrammable gate array (FPGA), a programmable logic controller (PLC), acomplex programmable logic device (CPLD), a discrete gate or transistorlogic, discrete hardware components, or any combination thereof designedto perform the functions described herein. Processors can exploitnano-scale architectures such as, but not limited to, molecular andquantum-dot based transistors, switches and gates, in order to optimizespace usage or enhance performance of UE. A processor also can beimplemented as a combination of computing processing units.

In the subject specification, terms such as “store,” “data store,” “datastorage,” “database,” “repository,” “queue”, and substantially any otherinformation storage component relevant to operation and functionality ofa component, refer to “memory components,” or entities embodied in a“memory” or components comprising the memory. It will be appreciatedthat the memory components described herein can be either volatilememory or nonvolatile memory, or can comprise both volatile andnonvolatile memory. In addition, memory components or memory elementscan be removable or stationary. Moreover, memory can be internal orexternal to a device or component, or removable or stationary. Memorycan comprise various types of media that are readable by a computer,such as hard-disc drives, zip drives, magnetic cassettes, flash memorycards or other types of memory cards, cartridges, or the like.

By way of illustration, and not limitation, nonvolatile memory cancomprise read only memory (ROM), programmable ROM (PROM), electricallyprogrammable ROM (EPROM), electrically erasable ROM (EEPROM), or flashmemory. Volatile memory can comprise random access memory (RAM), whichacts as external cache memory. By way of illustration and notlimitation, RAM is available in many forms such as synchronous RAM(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rateSDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), anddirect Rambus RAM (DRRAM). Additionally, the disclosed memory componentsof systems or methods herein are intended to comprise, without beinglimited to comprising, these and any other suitable types of memory.

In particular and in regard to the various functions performed by theabove described components, devices, circuits, systems and the like, theterms (comprising a reference to a “means”) used to describe suchcomponents are intended to correspond, unless otherwise indicated, toany component which performs the specified function of the describedcomponent (e.g., a functional equivalent), even though not structurallyequivalent to the disclosed structure, which performs the function inthe herein illustrated example aspects of the embodiments. In thisregard, it will also be recognized that the embodiments comprise asystem as well as a computer-readable medium comprisingcomputer-executable instructions for performing the acts and/or eventsof the various methods.

Computing devices typically comprise a variety of media, which cancomprise computer-readable storage media and/or communications media,which two terms are used herein differently from one another as follows.Computer-readable storage media can be any available storage media thatcan be accessed by the computer and comprises both volatile andnonvolatile media, removable and non-removable media. By way of example,and not limitation, computer-readable storage media can be implementedin connection with any method or technology for storage of informationsuch as computer-readable instructions, program modules, structureddata, or unstructured data. Computer-readable storage media cancomprise, but are not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disk (DVD) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or other tangible and/ornon-transitory media which can be used to store desired information.Computer-readable storage media can be accessed by one or more local orremote computing devices, e.g., via access requests, queries or otherdata retrieval protocols, for a variety of operations with respect tothe information stored by the medium.

On the other hand, communications media typically embodycomputer-readable instructions, data structures, program modules orother structured or unstructured data in a data signal such as amodulated data signal, e.g., a carrier wave or other transportmechanism, and comprises any information delivery or transport media.The term “modulated data signal” or signals refers to a signal that hasone or more of its characteristics set or changed in such a manner as toencode information in one or more signals. By way of example, and notlimitation, communications media comprise wired media, such as a wirednetwork or direct-wired connection, and wireless media such as acoustic,RF, infrared and other wireless media.

Further, terms like “user equipment,” “user device,” “mobile device,”“mobile,” station,” “access terminal,” “terminal,” “handset,” andsimilar terminology, generally refer to a wireless device utilized by asubscriber or user of a wireless communication network or service toreceive or convey data, control, voice, video, sound, gaming, orsubstantially any data-stream or signaling-stream. The foregoing termsare utilized interchangeably in the subject specification and relateddrawings. Likewise, the terms “access point,” “node B,” “base station,”“evolved Node B,” “cell,” “cell site,” and the like, can be utilizedinterchangeably in the subject application, and refer to a wirelessnetwork component or appliance that serves and receives data, control,voice, video, sound, gaming, or substantially any data-stream orsignaling-stream from a set of subscriber stations. Data and signalingstreams can be packetized or frame-based flows. It is noted that in thesubject specification and drawings, context or explicit distinctionprovides differentiation with respect to access points or base stationsthat serve and receive data from a mobile device in an outdoorenvironment, and access points or base stations that operate in aconfined, primarily indoor environment overlaid in an outdoor coveragearea. Data and signaling streams can be packetized or frame-based flows.

Furthermore, the terms “user,” “subscriber,” “customer,” “consumer,” andthe like are employed interchangeably throughout the subjectspecification, unless context warrants particular distinction(s) amongthe terms. It should be appreciated that such terms can refer to humanentities, associated devices, or automated components supported throughartificial intelligence (e.g., a capacity to make inference based oncomplex mathematical formalisms) which can provide simulated vision,sound recognition and so forth. In addition, the terms “wirelessnetwork” and “network” are used interchangeable in the subjectapplication, when context wherein the term is utilized warrantsdistinction for clarity purposes such distinction is made explicit.

Moreover, the word “exemplary,” where used, is used herein to meanserving as an example, instance, or illustration. Any aspect or designdescribed herein as “exemplary” is not necessarily to be construed aspreferred or advantageous over other aspects or designs. Rather, use ofthe word exemplary is intended to present concepts in a concretefashion. As used in this application, the term “or” is intended to meanan inclusive “or” rather than an exclusive “or”. That is, unlessspecified otherwise, or clear from context, “X employs A or B” isintended to mean any of the natural inclusive permutations. That is, ifX employs A; X employs B; or X employs both A and B, then “X employs Aor B” is satisfied under any of the foregoing instances. In addition,the articles “a” and “an” as used in this application and the appendedclaims should generally be construed to mean “one or more” unlessspecified otherwise or clear from context to be directed to a singularform.

In addition, while a particular feature may have been disclosed withrespect to only one of several implementations, such feature can becombined with one or more other features of the other implementations asmay be desired and advantageous for any given or particular application.Furthermore, to the extent that the terms “have”, “having”, “includes”and “including” and variants thereof are used in either the detaileddescription or the claims, these terms are intended to be inclusive in amanner similar to the term “comprising.”

The above descriptions of various embodiments of the subject disclosureand corresponding figures and what is described in the Abstract, aredescribed herein for illustrative purposes, and are not intended to beexhaustive or to limit the disclosed embodiments to the precise formsdisclosed. It is to be understood that one of ordinary skill in the artcan recognize that other embodiments comprising modifications,permutations, combinations, and additions can be implemented forperforming the same, similar, alternative, or substitute functions ofthe disclosed subject matter, and are therefore considered within thescope of this disclosure.

For example, disclosed systems and apparatuses and components or subsetsthereof (referred to hereinafter as components) should neither bepresumed to be exclusive of other disclosed systems and apparatuses, norshould an apparatus be presumed to be exclusive to its depictedcomponents in an example embodiment or embodiments of this disclosure,unless where clear from context to the contrary. Additionally, steps orblocks as shown in example methods, or operations, can beinterchangeable with steps or blocks as show in other examplemethods/operations. The scope of the disclosure is generally intended toencompass modifications of depicted embodiments with additions fromother depicted embodiments, where suitable, interoperability among orbetween depicted embodiments, where suitable, as well as addition of acomponent(s) from one embodiment(s) within another or subtraction of acomponent(s) from any depicted embodiment, where suitable, aggregationof components (or embodiments) into a single component achievingaggregate functionality, where suitable, or distribution offunctionality of a single system or component into multiple systems orcomponents, where suitable. In addition, incorporation, combination ormodification of systems or components depicted herein or modified asstated above with systems, apparatuses, components or subsets thereofnot explicitly depicted herein but known in the art or made evident toone with ordinary skill in the art through the context disclosed hereinare also considered within the scope of the present disclosure.

Therefore, the disclosed subject matter should not be limited to anysingle embodiment described herein, but rather should be construed inbreadth and scope in accordance with the claims below.

1. Network equipment, comprising: a processor; and a memory that storesexecutable instructions that, when executed by the processor, facilitateperformance of operations, comprising: accepting a first user inputassociated with a user identity comprising a data element indicative ofan opting to use a network-implemented service that facilitates blockingof unwanted calls; receiving a second user input associated with theuser identity comprising a keyword representing an audible input;converting the audible input to a converted text input; rendering theconverted text input letter by letter as rendered audio; based on therendered audio, facilitating confirmation, associated with the useridentity, of the converted text input; storing the keyword in arepository; receiving a call from communication equipment directed to auser equipment associated with the user identity; in response to apresence of the data element, prompting the communication equipment toprovide an audible response; in response to a lack of receipt of theaudible response, taking a preventative action relating to the call; inresponse to the receipt of the audible response, converting the audibleresponse to text; retrieving the keyword from the repository andcomparing the text to the keyword; in response to the comparingresulting in a threshold match score being attained, allowing the callto proceed to the user equipment, wherein the threshold match score isdetermined based on a statistical analysis that generates a statisticalscore value based on a statistical similarity between the keyword and avariant of the keyword; and in response to the comparing resulting inthe threshold match score not being attained, facilitating: taking thepreventative action relating to the call, and accepting a selection on afeedback report indicating that the preventative action related to thecall should not have been taken.
 2. The network equipment of claim 1,wherein the keyword comprises alphanumeric characters entered via userinput.
 3. The network equipment of claim 1, wherein the keyword isreceived via an audible input, and wherein the keyword is converted froman audible format of the audible input to a text format.
 4. The networkequipment of claim 1, wherein comparing the text to the keywordcomprises comparing the text to the variant of the keyword.
 5. Thenetwork equipment claim 4, wherein the operations further compriseupdating the variant of the keyword to comprise a rejected text.
 6. Thenetwork equipment of claim 1, wherein facilitating the taking of thepreventative action comprises facilitating blocking the call.
 7. Thenetwork equipment of claim 1, wherein facilitating the taking of thepreventative action comprises directing the call to call answeringequipment.
 8. The network equipment of claim 7, wherein the callanswering equipment stores a message related to the call, and whereinthe message is accessible by the user equipment.
 9. The networkequipment of claim 1, wherein the feedback report is accessible by theuser equipment.
 10. A method, comprising: accepting, by networkequipment comprising a processor, a first user input indicating that acall, directed to a user equipment associated with a user identity, isto be challenged; receiving, by the network equipment, a second userinput comprising a keyword representative of an audible input;converting, by the network equipment, the audible input to a convertedtext input; audibly reading, by the network equipment, the convertedtext input letter by letter; based on the audibly reading, facilitating,by the network equipment, confirmation, from a user equipment associatedwith the user identity, of the converted text input; facilitating, bythe network equipment, storing the keyword in a repository; receiving,by the network equipment, the call from communication equipment directedto the user equipment; in response to the first user input, prompting,by the network equipment, the communication equipment to provide anaudible response; in response to the audible response being determinednot to have been received within a defined duration of time,facilitating, by the network equipment, preventing the call fromconnecting with the user equipment; in response to the audible responsebeing determined to have been received within the defined duration oftime, converting, by the network equipment, the audible response to atext; retrieving, by the network equipment, the keyword from therepository; comparing, by the network equipment, the text to thekeyword; in response to determining an output of the comparing satisfiesa threshold match score, allowing, by the network equipment, the call toproceed to the user equipment, wherein the threshold match score isdetermined as a function of a statistical score value generated based ona statistical similarity between the keyword and a variant of thekeyword; and in response to the determining the output of the comparingdoes not satisfy the threshold match score, facilitating, by the networkequipment: preventing the call from connecting with the user equipment,and accepting a selection indicating that the preventing the call shouldnot have been facilitated.
 11. The method of claim 10, wherein the callcomprises a robotic call and the communication equipment comprisesrobotic dialer equipment.
 12. The method of claim 10, wherein comparingthe text to the keyword comprises comparing the text to the variant ofthe keyword.
 13. The method of claim 12, further comprising updating, bythe network equipment, the variant of the keyword to comprise a rejectedtext.
 14. The method of claim 10, wherein preventing the call fromconnecting to the user equipment comprises directing the call to callanswering equipment that stores a message related to the call, andwherein the message is accessible by the user equipment.
 15. The methodof claim 10, further comprising transmitting, by the network equipment,a feedback report indicating the details of calls directed to the userequipment.
 16. A non-transitory machine-readable medium comprisingexecutable instructions that, when executed by a processor of networkequipment, facilitate performance of operations, comprising: accepting afirst user input indicating that a call directed to a user equipmentassociated with a user identity be challenged; receiving a second userinput comprising a keyword representing an audible input; converting theaudible input to a converted text input; playing back the converted textinput letter by letter as audio; based on the audio, facilitatingconfirmation, associated with the user identity, of the converted textinput; storing the keyword in a data store; receiving the call fromcommunication equipment directed to the user equipment; in response tothe first user input being accepted, prompting the communicationequipment to provide an audible response; in response to a lack of areceipt of the audible response, preventing the call from connectingwith the user equipment; in response to the receipt of the audibleresponse, converting the audible response to a text; retrieving thekeyword from the data store, and comparing the text to the keyword, andto a variation of the keyword, the comparing resulting in a match scorevalue, wherein the match score value represents a value associated witha statistically equivalent variant of the keyword; and in response tothe match score value not satisfying a function of a threshold:preventing the call from connecting with the user equipment, accepting aselection on a feedback report comprising details related to the call,the selection indicating that the text should have resulted in the matchscore value satisfying the function of the threshold, and updating thevariation to comprise the text.
 17. The non-transitory machine-readablemedium of claim 16, wherein the call comprises a robotic call and thecommunication equipment comprises robotic dialer equipment.
 18. Thenon-transitory machine-readable medium of claim 16, wherein the keywordcomprises alphanumeric characters that were entered via user inputequipment.
 19. The non-transitory machine-readable medium of claim 16,wherein the keyword is received via an audible input, and wherein thekeyword is converted from an audible format into a text format.
 20. Thenon-transitory machine-readable medium of claim 16, wherein the feedbackreport comprises a log of calls destined for the user equipment.