Method and apparatus for detecting unsolicited multimedia communications

ABSTRACT

A service for searching for unsolicited communications is provided. For example, the service may inspect e-mail messages, instant messaging messages, facsimile transmissions, voice communications, and video telephony, and analyze these communications to determine whether an intended communication is unsolicited. In connection with voice and video telephony, a voice sample may be obtained from the caller and voice recognition may be performed on the sample to determine an identity of the person or the voice. The voice sample may also be used to determine the type of voice—i.e., if the voice is live, machine generated, or prerecorded. Where the call is a video telephony call, image recognition may be used to inspect an image of the person. The information obtained from voice recognition, voice type recognition, and image recognition may be used to detect whether the messages if from a known source of unsolicited communications.

CROSS-REFERENCE TO RELATED APPLICATION

The present application is a continuation of U.S. patent applicationSer. No. 11/305,951, filed on Dec. 19, 2005, the disclosure of which ishereby incorporated by reference in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to communication networks and, moreparticularly, to a method and apparatus for detecting unsolicitedmultimedia communications.

2. Description of the Related Art

Data communication networks may include various routers, switches,bridges, hubs, and other network devices coupled to and configured topass data to one another. These devices will be referred to herein as“network elements.” Data is communicated through the data communicationnetwork by passing protocol data units, such as Internet Protocol (IP)packets, Ethernet Frames, data cells, segments, or other logicalassociations of bits/bytes of data, between the network elements byutilizing one or more communication links between the devices. Aparticular protocol data unit may be handled by multiple networkelements and cross multiple communication links as it travels betweenits source and its destination over the network.

As communication networks have proliferated, corporations andindividuals have become reliant on the networks for many different typesof communication services. One type of common communication service isthe ability to transmit e-mail messages on the network. Sincetransmission of e-mail messages is generally free, fast, and reliable,e-mail has become a very popular way of communicating over acommunication network.

Unfortunately, many individuals and corporations determined that e-mailwould be a cheap way of advertising particular products, both wanted andunwanted. Accordingly, e-mail has become commonly used to sendunsolicited information. Unsolicited e-mail is commonly referred to asSPAM, and may take many forms, although SPAM generally is of acommercial nature and is sent in bulk form to many recipients. Thetransmission of SPAM on the Internet has increased to such an extentthat at one point it was estimated that about 90% of all e-mail trafficon the Internet was SPAM.

Because of the proliferation of SPAM, many e-mail services and networkproviders are beginning to provide anti-SPAM screening products andservices. These products generally filter SPAM at an email server or atthe user's personal computer so that the unsolicited e-mail messages donot get grouped together with other legitimate e-mail messages. SPAMfilters generally detect SPAM messages by looking at the sender's sourceaddress, the subject line of the e-mail message, and other aspects ofthe e-mail.

Initially, voice communications were carried on a voice network, anddata communications such as e-mail were carried on a separate data(Internet Protocol or IP) network. For various reasons, those networksare being consolidated so that voice calls may be made over datanetworks using a protocol commonly referred to as Voice over IP (VoIP).VoIP uses the Session Initialization Protocol (SIP) or other signalingprotocol to establish a voice call on an IP network, and then uses thetransport facilities of the IP network to enable the parties to talk inthe same manner as would occur if the voice call had been connected overthe voice network.

Although VoIP has the potential to reduce the costs associated withmaking telephone calls, it also potentially presents a new problem.Specifically, the reduction in cost and difficulty of making an Internetbased telephone call has provided an opportunity for SPAM to bedelivered over Internet Telephony. Thus, Internet telephony maypotentially be abused in the future in the same manner that e-mail hasbeen abused on the current networks. Unfortunately for telephone users,Spam over Internet Telephony (SPIT) is likely to be more intrusive thanSPAM has been, since SPIT has the potential to cause a telephone to ringat the user's place of business or home in real time. Thus, unlike SPAMwhich may be ignored, SPIT has the potential to be quite intrusive.

Other forms of SPAM are also being developed. For example, SPAM overInstant Messaging (SPIM), SPAM over Fax (SPAF), have been reported.Additionally, if video telephony becomes prominent, it is possible thatthat new media may become abused to transmit SPAM video messages.Accordingly, it would be advantageous to provide a system that couldfilter multiple types of SPAM.

SUMMARY OF THE INVENTION

The present invention overcomes these and other drawbacks by providing amethod and apparatus for detecting unsolicited multimedia communicationsthat may have been created using a number of different media. Forexample, the method and apparatus may be used to detect SPAM, SPIM,SPAF, SPIT, and video SPAM. For SPAM and SPIM, standard filters are usedto reduce the number of SPAM and SPIM messages. Content recognition maybe performed on the facsimile transmissions and the content may beanalyzed based using tables similar to the SPAM and SPIM contentanalysis tables.

In connection with VoIP calls, a voice sample may be obtained from thecaller and voice recognition may be performed on the sample to determinean identity of the person. The voice sample may also be used todetermine the type of voice—Le. if the voice is live, machine generated,or prerecorded. The voice identity and voice type may be used along withinformation available from the signaling information associated with thecall to selectively connect the call to the identified called party orto a multi-media mailbox server. Where the call is connected to amulti-media mailbox server, the content of any message may be extractedand analyzed to determine whether the message is to be considered SPX.Additional voice recognition may be performed in connection withanalyzing the content of the message. The multi-media mailbox server maybe configured to store voicemail messages, video-mail messages and othertypes of messages.

Where the call is a video telephony call, a picture of the personplacing the call (Le. A picture of the person at the source) may betransmitted along with the call setup. Where this is present, imagerecognition may be used to recognize whether the image is associatedwith a known SPX generator.

BRIEF DESCRIPTION OF THE DRAWINGS

Aspects of the present invention are pointed out with particularity inthe appended claims. The present invention is illustrated by way ofexample in the following drawings in which like references indicatesimilar elements. The following drawings disclose various embodiments ofthe present invention for purposes of illustration only and are notintended to limit the scope of the invention. For purposes of clarity,not every component may be labeled in every figure. In the figures:

FIG. 1 is a functional block diagram of an example of a network in whichanti-SPX services may be deployed to detect unsolicited multimediacommunications to reduce unwanted SPX on the network according to anembodiment of the invention;

FIG. 2 is a flow chart illustrating an example process of analyzing afacsimile transmission to determine if it is unsolicited;

FIG. 3 is a flow chart illustrating an example process of analyzingvoice and video telephony transmissions to determine if they areunsolicited; and

FIG. 4 is a functional block diagram of a computer platform configuredto implement an anti-SPX service according to an embodiment of theinvention.

DETAILED DESCRIPTION

The following detailed description sets forth numerous specific detailsto provide a thorough understanding of the invention. However, thoseskilled in the art will appreciate that the invention may be practicedwithout these specific details. In other instances, well-known methods,procedures, components, protocols, algorithms, and circuits have notbeen described in detail so as not to obscure the invention.

FIG. 1 shows an example network in which anti-SPX services may bedeployed to detect unsolicited multimedia communications to reduce theamount of unwanted SPX that is passed directly to the destination. Asused herein, the term “SPX” will be used to refer to SPAM, SPAM overInstant Messaging (SPIM), SPAM over Fax (SPAF), SPAM over InternetTelephony (SPIT), SPAM over Video Telephony (SPOV), and other types ofunsolicited multimedia communications. Multimedia, as used herein, willbe used to refer to multiple types of media, anyone or more of which maybe used to generate unwanted SPX. Thus, one media may be e-mail, anothermedia may be instant messaging, another media may be VoIP, etc. Thus,although the term “Multimedia” generally refers to a production such asa movie that is made using multiple types of media, the term“Multimedia” in this application is being used differently to refer to aservice that is able to detect unsolicited content that may have beenproduced using anyone or more of a number of different available medias.A device that is capable of multimedia detection, therefore, is a devicethat can detect unsolicited content generated using multiple types ofmedia, although anyone particular message may be produced using only oneor more of the available media. For example, a multimedia detectiondevice may be able to scan VoIP traffic, e-mail traffic, and instantmessaging traffic. The invention is not limited to this particularexample, however, as the multimedia detection device may be configuredto scan different combinations of types of traffic depending on theparticular application for which it is designed.

Anti-SPX services may be used in multiple environments. FIG. 1illustrates a generic example in which an anti-SPX service 10 isdeployed intermediate a SPX source 12 and a SPX destination 14 on acommunication network 16. The anti-SPX service 10 may be operated on anetwork element such as a router forming part of the network 16, may beoperated in connection with a gateway between different administrativeportions of the network 16, or may be operated in connection with otherservices to be provided on the network 16. For example, the anti-SPXservice may be operated in connection with a signaling server 18 and/ora multi-media mailbox server 20. The invention is not limited to theparticular environment in which the anti-SPX service 10 is configured tooperate.

When a message is to be passed from the SPX source 12 to the SPXdestination 14, the anti-SPX service 10 will receive the message or acopy of the message and attempt to determine if the message is SPX. Forexample, in connection with an e-mail message, the anti-SPX service 10will perform standard SPAM detection processes to determine if thee-mail message is SPAM. Similarly, in connection with instant messagingmessages, the anti-SPX service 10 will perform standard SPIM detectionprocesses to determine if the instant message is SPIM. Since SPAM andSPIM detection processes are well known, additional details will not beprovided with respect to these aspects of the anti-SPX service 10.

FIG. 2 illustrates a process that may be used by the anti-SPX service 10in connection with detecting whether a facsimile is SPAF. As shown inFIG. 2, when the anti-SPX service 10 receives a fax 200, it will receivethe fax 200 into memory to build a bit-map file of the fax (202).Character recognition and/or handwriting recognition may be performed toextract the content from the fax (204). For example, optical characterrecognition software generally converts optical characters into bitmapfiles and then compares the bitmap files against known bitmapsassociated with characters to identify the particular characters thatare shown in the file. A similar process may be used once a bitmap ofthe facsimile has been created so that character recognition may be usedto determine the content of the facsimile. Similarly, handwritinganalysis may be used to determine the content of hand-written materialcontained in the facsimile.

Once the content of the facsimile has been extracted, the content of thefacsimile may be analyzed to determine if the facsimile is likely to beSPAF. The content analysis of the facsimile may be similar to thecontent analysis that is commonly performed in connection with e-mailtransmissions and instant messaging transmissions. For example, thecontent may be analyzed to determine the identity of the sender, whichis likely to be in the header or in a “from” line, of the facsimile.Also, the content may be analyzed to detect the prevalence of key wordsthat are commonly used to advertise particular goods or are identifiedas being likely to be prevalent in SPAF transmissions. Other contentanalysis techniques may be used as well and the invention is not limitedto the particular manner in which the content is analyzed once it isextracted from the fax.

Although an embodiment in which store and forward processing has beenused to determine whether a facsimile is SPAF, the invention is notlimited in this regard, as content analysis may also be performed forreal-time facsimile transmissions. Thus, the invention is not limited tothe particular way in which the facsimile transmission is established onthe network. Accordingly, the underlying facsimile session may beestablished using any facsimile protocol such as protocols designed tosupport group 2/3/4 facsimile machines on the legacy voice network, T.38which is designed to support Fax over Internet Protocol (FoIP), or othertypes of facsimile protocols.

As a result of the content analysis, the anti-SPX service will generatea SPAF score (206) that may be used to determine whether the facsimileis likely to be SPAF or likely to be a legitimate facsimile. Thefacsimile may then be transmitted to the destination 14 or an alternateway of communicating the availability of the facsimile may be used tonotify the destination 14. Optionally the SPAF score may be communicatedto the destination to enable the destination to determine whether theywould like to receive the facsimile. For example, the facsimile may bestored temporarily (e.g. in the multimedia mailbox server) and an e-mailnotification may be sent to the destination. The invention is notlimited to the particular manner in which the facsimile is handled afterdetecting the possibility that a particular facsimile is likely to beSPAF.

FIG. 3 illustrates a process that may be used by the anti-SPX service 10in connection with detecting whether a voice call, such as a VoIP callor video call, is likely to be SPX. Since both voice and video calls arelikely to include an audible component, similar audio processing may beperformed on each of these types of calls. In connection with a videocall, the anti-SPX service may additionally provide image recognition onthe video portion of the call. Hence, because of the common audioaspect, these two types of call processing have been described commonlyin FIG. 3. It should be recognized, however, that not all of theprocesses illustrated in FIG. 3 will apply to calls that don't includevideo content.

In the embodiment shown in FIG. 3, when a voice or video call isreceived (300) the anti-SPX service will extract signaling information(302) and attempt to identify the caller from the signaling information(304). Examples of signaling information include information availablefrom the Session Initialization Protocol SIP), H.323, Media GatewayControl Protocol (MGCP), or proprietary protocols. Signaling protocolscontinue to evolve and new protocols are being developed and theinvention is not limited to the use of signaling information fromcurrently implemented protocols as aspects of the invention are likelyto be useable in connection with other to be developed protocols.

Whatever form of signaling information is available may then be checkedagainst black and/or white lists (306) in a conventional manner todetermine if the source 12 is black and/or white listed. Where signalinginformation is not available, for example where caller ID informationhas been blocked, the fact that the signaling information has beenblocked may be used by the anti-SPX service as an indication that thecall is likely a SPX call. Similarly, if the same caller has made manyphone calls within a given period of time, it may be that the call ismore likely to be a SPIT call. Hence, if a caller is making many phonecalls it may be that the caller is more likely to be a SPIT generator.

The signaling information may also be checked to determine if the callis a conference call. Generally, the signaling information will containan indication as to whether the call is a conference call and,accordingly, should be connected to multiple destinations. Where thesame media is being sent to multiple destinations and the signalinginformation does not indicate that the call is a conference call, thenon-conference calls may be treated as SPIT. Similarly, where the samesource is attempting to connect to multiple destinations serially, andis repeating the same media stream or similar media streams inconnection with each destination, calls from the source may be treatedas SPIT unless the source is on a white list. For example, a hospitalthat is on a white list will be able to make text to speech generatedcalls to multiple patients without having the calls screened as SPIT.The signaling information may be used in other ways to help determinewhich calls are SPIT and which are legitimate, and the invention is notlimited to these particular examples.

The anti-SPX service 10 may also attempt to obtain a voice sampleassociated with the call (308) so that voice identification may beperformed, and/or voice type identification may be performed. With avoice call, since the voice information doesn't exist until the call isplaced to the end user, filtering of voice/video calls based on voiceidentification may not occur unless a sample is obtained during theconnection process. This may be obtained, for example, by causing thecall to be temporarily placed in an off-hook condition artificially tocause a connection to be established. The caller may then be prompted tospeak their name, a particular phrase, or answer a question, so that avoice sample may be obtained. Other ways of obtaining a voice samplefrom the source 12 may be used as well and the invention is not limitedto the particular manner in which a voice sample is obtained. Where theuser refuses to speak, the lack of a voice sample may be used inconnection with determining if the call is likely to be SPX.

If a voice sample is obtained from the source 12, a voice recognitionprocess may be performed 310 to obtain a voice signature that may beused to identify the voice or identify a person associated with thesource. The voice signature determined from the voice recognitionprocess may be used to check against black and/or white lists of voicesignatures known to the anti-SPX service (312) to determine if thesource is a known source of SPX or known to the users of the service asnot likely to be a source of SPX. Optionally, where the voice sample wasobtained by asking the source to answer a question, the content of thevoice sample may be extracted using a speech recognition process and thecontent analyzed to determine if the response is an anticipatedresponse. Where the response is not anticipated, this fact may be takenin to account when determining if the call is likely to be SPX.

The type of voice may also be determined. Specifically, the anti-SPXservice may determine if the voice is associated with a live person, ispart of a pre-recorded message, or is machine generated (314). Apre-recorded voice or a machine-generated voice is much more likely tobe associated with SPX because it is much less costly to transmit 1000prerecorded or machine generated messages than it is to have a liveperson deliver the same message 1000 times. Accordingly, the type ofvoice may be used by the anti-SPX service in connection with determiningif the call is likely to be SPX.

Where the call is a video telephony call, a picture of the personplacing the call (i.e. a picture of the person at the source) may betransmitted along with the call setup. Where this is present, theanti-SPX service may obtain the image that is transmitted in connectionwith the call setup (316) and perform face recognition or other forms ofimage recognition on the image to determine whether the image providesan indication that the call is SPX. For example, where the image is of aknown SPX generator, doesn't contain an image of a person, or otherwiseindicates that the call is less likely to be a legitimate videotelephony call, the anti-SPX service may use this result in connectionwith determining if the call is likely to be SPX.

Once all of the available information has been gathered, the anti-SPXservice will weight the information individually or in one or morecombinations to determine whether the call is likely to be SPX (320).Specifically, the anti-SPX service will weight the result of signalinginformation processing or the lack of signaling information, the resultof the voice recognition and optionally content recognition from thevoice sample, the result of the voice type processing, an indication ofa lack of voice sample, and any result of the image recognitionprocesses, to provide a SPX score. The SPX score may then be used toselectively connect the call to the destination 14 or to route the callto another location such as to multimedia mailbox server 20.

If the determination by the anti-SPX server is that the call should beconnected, the call will be passed to the destination 14 to be handledin a conventional fashion. For example, the call may be routed to theintended recipient so that the phone associated with the called partymay ring, vibrate, or otherwise notify the called party that a call isbeing received. If the called party declines to answer the call or ifthe called party is already on another call (322), the call may betransferred to multimedia mailbox (324) so that the calling party mayleave a message on the multimedia mailbox server. The message in thisinstance may be stored in a safe folder so that the called party mayquickly retrieve that message at a later time without requiring thecalled party to sort through a plurality of junk messages. Optionally,the message may be analyzed as described below and as shown by thedashed line in FIG. 3.

If the anti-SPX service determines that the call is likely to be SPX, itmay cause the call to be sent to the multimedia mailbox server so thatthe content of the call may be analyzed. By sending the call directly tothe multimedia mailbox server, the destination will not be notified ofthe incoming call and, hence, will not be notified every time a SPITcall arrives. Alternatively, the call may be routed to an anti-SPITprocessing center such as an answering center and connected to a liveperson who will screen the call.

When a call is sent to the multimedia mailbox server, the multimediamailbox server may cause the content of the SPX to be analyzed (326) todetermine whether the SPX should be stored in a safe folder or a SPITfolder. The multimedia mailbox server may perform this process alone orin connection with the anti-SPX service. Optionally, the anti-SPXservice may perform this processing itself by causing the content of themessage to be transferred back to the anti-SPX system once delivery ofthe message has been completed, or by causing a copy of the message tobe stored in a temporary storage area while it is being delivered to themultimedia mailbox server 20.

As shown in FIG. 3, the content of a message may be analyzed (326) todetermine if it is SPX. For example, voice recognition, voice typeanalysis, and content analysis may be performed on the message todetermine whether the message was likely generated as a result of SPX.The processes of determining the voice recognition, voice type, andcontent may be performed in the manner described above in connectionwith analyzing the voice sample.

Other processes may also be used to determine if the message is SPX. Forexample, the content of the message may be compared to other storedmessages (328). Where the message is identical to other messages orsufficiently similar to other messages, it may be determined to be morelikely to be SPX.

Once the content is analyzed, the anti-SPX server may weight the factorsassociated with a particular message, such as by counting the number ofkeywords matched in a particular message, weighting the particular keywords, determining the type of voice, the identity of the person sendingthe message as determined by the voice-recognition process, and otherfactors, and then generate a score as to whether the message is likelyto be SPX (330). Where the weighting process indicates that thelikelihood is below a particular threshold, the message may be stored ina safe folder for the user (332). If, however, it is determined that itis more likely that this message is SPIT, the message may be place in aspecial folder designated as containing messages that are likely to beSPIT (334). The use of two folders may allow an user to prioritizereviewing messages deemed more likely to be legitimate so that the useris not constantly required to listen to SPIT messages intermixed withlegitimate messages.

Regardless of whether the call is directly connected, directly sent tothe user's safe folder in e-mail, analyzed and then sent to the safefolder, or analyzed and sent to a SPIT folder, the user may be providedwith an opportunity to provide feedback as to whether the call waslegitimate or SPIT (338). The use of this feedback may help the anti-SPXservice fine-tune the system so that it is able to identify SPX moreaccurately in connection with future voice and video calls. Similarly,where a message is identified as SPX, the user may provide feedback toindicate to the anti-SPX server that this message is not SPX and that,optionally, the caller should be added to the white list so that futurecommunications from this caller are allowed to be transmitted through tothe destination or other associated destinations.

FIG. 4 shows an embodiment of an anti-SPX service implemented on acomputer platform. The computer platform may be part of a networkelement, a gateway, a signaling server, a multimedia mailbox server, ageneral purpose computer, or a computer platform implemented to performother functions on the network.

In the embodiment shown in FIG. 4, the computer platform includes aprocessor 40 containing control logic 42 configured to implement thefunctions associated with the anti-SPX service described herein. Thecomputer platform may also include a memory 44 configured to storeanti-SPX software 46 and a database of SPX tables 48 containing data foruse by the anti-SPX software 46 to enable messages to be scored. Forexample, the SPX tables 48 may include the white and black lists, voicesignatures, and other information described above that may enable theanti-SPX service to score communications. The control logic 42 mayselectively retrieve data and instructions from the memory to enable theprocessor to implement the functions associated with the anti-SPXservice described herein and encoded into the anti-SPX software 46.

The computer platform may include many other components to enable it tooperate in a conventional manner to perform general computer processingoperations. For example, the computer platform may include a networkinterface 50 configured to enable messages to be received by thecomputer platform for processing in connection with the anti-SPX servicedescribed herein.

The functions described above may be implemented as a set of programinstructions that are stored in a computer readable memory and executedon one or more processors on the computer platform. However, it will beapparent to a skilled artisan that all logic described herein can beembodied using discrete components, integrated circuitry such as anApplication Specific Integrated Circuit (ASIC), programmable logic usedin conjunction with a programmable logic device such as a FieldProgrammable Gate Array (FPGA) or microprocessor, a state machine, orany other device including any combination thereof. Programmable logiccan be fixed temporarily or permanently in a tangible medium such as aread-only memory chip, a computer memory, a disk, or other storagemedium. Programmable logic can also be fixed in a computer data signalembodied in a carrier wave, allowing the programmable logic to betransmitted over an interface such as a computer bus or communicationnetwork. All such embodiments are intended to fall within the scope ofthe present invention.

It should be understood that various changes and modifications of theembodiments shown in the drawings and described in the specification maybe made within the spirit and scope of the present invention.Accordingly, it is intended that all matter contained in the abovedescription and shown in the accompanying drawings be interpreted in anillustrative and not in a limiting sense. The invention is limited onlyas defined in the following claims and the equivalents thereto.

1. A method of identifying a Spam over Internet Telephony (SPIT) voicemessage, comprising: receiving a voice message at a voice messageserver; analyzing content of the voice message; and determining whetherthe received voice message is a SPIT voice message based on the analysisof content of the voice message.
 2. The method of claim 1, whereinanalyzing content of the voice message comprises determining at leastone of: the voice message is associated with a live person, the voicemessage is a pre-recorded message; the voice message is amachine-generated message; and the voice message contains identifiedkeywords.
 3. The method of claim 1, wherein analyzing content of thevoice message comprises: extracting a voice sample from the voicemessage; and comparing the extracted sample to a stored voice sample. 4.The method of claim 2, further comprising storing voice messagesdetermined to be SPIT voice messages separately from voice messages notdetermined to be SPIT.
 5. A method of determining whether a call is aSPAM over Internet Telephony (SPIT) call, the method comprising:obtaining a voice sample associated with the call; analyzing the voicesample to detect presence or absence of characteristics correlated withSPIT call voice samples to determine whether the call is a SPIT call. 6.The method of claim 5, wherein analyzing the voice sample comprises:performing a voice recognition process on the voice sample to obtain avoice signature; and comparing the voice signature to at least onestored voice signature to determine whether the call is a SPIT call. 7.The method of claim 6, wherein comparing the voice signature to at leastone stored voice signature to determine whether the call is a SPIT callcomprises comparing the voice signature to stored voice signaturescorresponding to known SPIT sources and determining the call to be aSPIT call when the voice signature matches a stored voice correspondingto a known SPIT source.
 8. The method of claim 7, wherein comparing thevoice signature to at least one stored voice signature to determinewhether the call is a SPIT call comprises comparing the voice signatureto stored voice signatures corresponding to known non-SPIT sources anddetermining the call not to be a SPIT call when the voice signaturematches a stored voice corresponding to a known non-SPIT source.
 9. Themethod of claim 5, further comprising routing the call to voicemailbased on a determination that the call is a SPIT call.
 10. The method ofclaim 5, wherein analyzing the voice sample comprises: performing avoice type recognition process to determine if the voice sample isassociated with a live person, a prerecorded voice, or a machinegenerated voice; and using the result of the voice type recognitionprocess to determine whether the call is a SPIT call.
 11. The method ofclaim 10, further comprising, when the call is not determined to be aSPIT call using the result of the voice type recognition process:performing a voice recognition process on the voice sample to obtain avoice signature; and comparing the voice signature to at least onestored voice signature to determine whether the call is a SPIT call. 12.A method of determining whether an unsolicited call is a SPAM Over VideoTelephony (SPOT) call, the method comprising: sampling contentassociated with the call; and analyzing the sampled content to detectpresence or absence of characteristics correlated with SPOT call samplesto determine whether the call is a SPOT call.
 13. The method of claim12, wherein analyzing the sampled content comprises comparing an imagesample associated with the call against stored image samples todetermine whether the call is a SPOT call.
 14. The method of claim 12,wherein analyzing the sampled content comprises comparing an audiosample associated with the call against stored audio samples todetermine whether the call is a SPOT call.
 15. A method of processing amedia packet data stream, the method comprising: analyzing content ofmedia data packets to detect presence or absence of at least onecharacteristic of the content of the media data packets, the at leastone characteristic of the content being correlated with at least onecharacteristic of a source of the media data packets; directing themedia data packets based on the presence or absence of the at least onecharacteristic of the content.
 16. The method of claim 15, wherein thecontent of the media packets comprises at least one of audio content,speech content, video content and image content.
 17. An anti-SPXservice, comprising: a computer processor; and control logic configuredto execute on the computer processor, said control logic containing:first program instructions configured to enable the anti-SPX service toanalyze e-mail messages and instant messaging messages to detectunsolicited e-mail and instant messaging messages; and second programinstructions configured to enable the anti-SPX service to analyzetelephone calls to detect unsolicited telephone calls.
 18. The anti-SPXservice of claim 17, wherein the second program instructions areconfigured to enable the anti-SPX service to obtain a voice sampleassociated with a source of the telephone call.
 19. The anti-SPX serviceof claim 17, wherein the second program instructions are configured toenable the anti-SPX service to perform voice recognition on the voicesample to determine if the voice sample is associated with a knownsource of unsolicited telephone calls.
 20. The anti-SPX service of claim17, wherein the second program instructions are configured to enable theanti-SPX service to perform voice type recognition on the voice sampleto determine the type of the voice in the voice sample.
 21. The anti-SPXservice of claim 17, wherein the second program instructions areconfigured to enable the anti-SPX service to discern between livevoices, pre-recorded voices, and machine generated voices.
 22. Theanti-SPX service of claim 17, wherein the control logic furthercomprises third program instructions configured to enable the anti-SPXservice to analyze video telephone calls to detect where a receivedvideo telephone call is an unsolicited video telephone call.
 23. Theanti-SPX service of claim 22, wherein the third program instructions areconfigured to enable the anti-SPX service to obtain a video sampleassociated with the received video telephone call.
 24. The anti-SPXservice of claim 23, wherein the third program instructions areconfigured to enable the anti-SPX service to perform image recognitionon the video sample to determine if the image contained in the videosample is associated with a known source of unsolicited video telephonecalls.
 25. The anti-SPX service of claim 17, wherein the control logicfurther comprises third program instructions configured to enable theanti-SPX service to analyze a facsimile communication to detect whetherthe facsimile is unsolicited.
 26. The anti-SPX service of claim 25,wherein the third program instructions are configured to enable theanti-SPX service to intercept the facsimile communication, build abitmap from the facsimile communication, and perform characterrecognition on the bitmap to extract the content of the facsimile. 27.The anti-SPX service of claim 25, wherein the third program instructionsare further configured to perform handwriting analysis to extract thecontent of the facsimile.