Abstract

Communication service providers, such as mobile network providers, plain old telephone service (POTS) providers (e.g., landline providers), and/or Voice over Internet Protocol (VoIP) providers, provide telephone services. A communication service provider operates a computing system that connects calls from a caller to a recipient. The computing system authenticates a caller’s telephone number to determine whether the telephone number is authentic or legitimate to prevent a caller from spoofing or faking his or her telephone number. The calling device places a call over a protocol that includes the telephone number of the sending device and an encrypted security key. The computing system utilizes the encrypted security key to verify or authenticate the identity of the caller. In other words, the computing system verifies the identity of the sender based on the encrypted security key to prevent robocalls that provide false telephone numbers and that are intended to spam, trick, deceive, or scam a call recipient. In some examples, if the computing system is unable to authenticate the identity of the caller, the computing system outputs a warning to the recipient of the call indicating that the caller’s identity has been spoofed or is not authentic.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS