Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM & DEVICE FOR VETTING COMMUNICATIONS BEING SENT TO A PERSON'S COMMUNICATION DEVICE
Document Type and Number:
WIPO Patent Application WO/2023/019312
Kind Code:
A1
Abstract:
A system for vetting communications being sent to a person's communication device, said system being configured to perform the steps of (a) receiving a first communication from a first party; (b) determining if the first party is known to the system; (c) if the first party is known, then allowing the first communication to be received by the person on said communication device; and (d) otherwise, blocking the first communication.

Inventors:
CRAMPTON LESLIE (AU)
Application Number:
PCT/AU2022/050915
Publication Date:
February 23, 2023
Filing Date:
August 17, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CRAMPTON LESLIE (AU)
International Classes:
H04M1/663; G06F21/31; G06F21/45; H04L9/40; H04L51/212; H04M1/57; H04M1/64; H04M3/436
Domestic Patent References:
WO2011050235A12011-04-28
Foreign References:
US20140273987A12014-09-18
US20100158233A12010-06-24
US20060026246A12006-02-02
US10951756B12021-03-16
US20150264174A12015-09-17
Attorney, Agent or Firm:
DAVIES COLLISON CAVE PTY LTD (AU)
Download PDF:
Claims:

Claims Defining the Invention

1. A system for vetting communications being sent to a person’s communication device, said system being configured to perform the steps of:

(a) receiving a first communication from a first party;

(b) determining if the first party is known to the system;

(c) if the first party is known, then allowing the first communication to be received by the person on said communication device; and

(d) otherwise, blocking the first communication.

2. The system claimed in claim 1, wherein the step of determining if the first party is known includes the steps of determining if the first communication is being sent from a person that is included in an approved list.

3. The system claimed in claim 2, wherein the approved list includes the person's contact list on the person's communication device.

4. The system claimed in claim 2, wherein the approved list is separate to the person's contact list on the person's communication device.

5. The system claimed in any one of claims 2 to 4, wherein the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then allowing the first communication to be received by the person on said communication device.

6. The system claimed in claim 5, wherein the entry code is a randomly selected combination of numbers, letters and/or symbols.

7. The system claimed in any one of claims 2 to 4, wherein the step of blocking includes the steps of:

(a) sending a communication to the first party including a question;

(b) receiving a second communication from the first party;

(c) extracting an answer to the question from the second communication;

(d) displaying the answer to the question on the person’s communication device;

(e) receiving input from the person via the communication device;

(f) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(g) otherwise, terminating the first communication.

8. The system claimed in any one of claims 2 to 4, wherein the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then further performing the steps of:

(i) sending a communication to the first party including a question;

(ii) receiving a second communication from the first party;

(iii) extracting an answer to the question from the second communication;

(iv) displaying the answer to the question on the person’s communication device;

(v) receiving input from the person via the communication device; and

(vi) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(e) otherwise, terminating the first communication.

9. The system claimed in any one of claims 5 to 8, wherein, if the first communication to allowed to be received by the person on said communication device, then updating the approved list to include details associated with the first party.

10. The system claimed in claim 9, wherein the details associated with the first party are stored in the approved list for a fixed time.

11. The system claimed in claim 10, wherein the fixed period of time is 6 months.

12. The system claimed in claim 10 or 11, wherein the fixed period of time is configurable by the person.

13. The system claimed in any one of claims 2 to 12, wherein the first communication is being sent to the person’s telephone device; and wherein the step (b) of determining includes the steps of:

(i) determining a telephone number associated with the first communication; and

(ii) determining that the first party is known if the telephone number is in the approved list.

14. The system claimed in claim 13, wherein the telephone device is a mobile telephone device and the approved list forms part of the person’s contacts on the person’s mobile telephone device.

15. The system claimed in claim 13 or claim 14, wherein the communication is a telephone call.

16. The system claimed in claim 13 or claim 14, wherein the communication is text message.

17. The system claimed in claim 13, wherein the telephone device is a landline telephone device and the approved list is stored in system data storage.

18. The system claimed in any one of claims 2 to 12, wherein the first communication is an e-mail being sent to the person’s computer device; and wherein the step (b) of determining includes the steps of:

(i) determining an e-mail address associated with the first communication; and

(ii) determining that the party is known if the e-mail address is in the approved list.

19. The system claimed in claim 18, wherein the e-mail address forms part of the person’s contacts on the person’s computer device.

20. A device for vetting communications being sent to a person’s communication device, said device being configured to perform the steps of:

(a) receiving a first communication from a first party;

(b) determining if the first party is known to the system;

(c) if the first party is known, then allowing the first communication to be received by the person on said communication device; and

(d) otherwise, blocking the first communication.

21. The device claimed in claim 20, wherein the step of determining if the first party is known includes the steps of determining if the first communication is being sent from a person that is included in an approved list.

22. The device claimed in claim 21, wherein the approved list includes the person's contact list on the person's communication device.

23. The device claimed in claim 21, wherein the approved list is separate to the person's contact list on the person's communication device.

24. The device claimed in any one of claims 21 to 23, wherein the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then allowing the first communication to be received by the person on said communication device.

25. The device claimed in claim 24, wherein the entry code is a randomly selected combination of numbers, letters and/or symbols.

26. The device claimed in any one of claims 21 to 23, wherein the step of blocking includes the steps of:

(a) sending a communication to the first party including a question;

(b) receiving a second communication from the first party;

(c) extracting an answer to the question from the second communication;

(d) displaying the answer to the question on the person’s communication device;

(e) receiving input from the person via the communication device;

(f) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(g) otherwise, terminating the first communication.

27. The device claimed in any one of claims 21 to 23, wherein the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then further performing the steps of:

(i) sending a communication to the first party including a question;

(ii) receiving a second communication from the first party;

(iii) extracting an answer to the question from the second communication;

(iv) displaying the answer to the question on the person’s communication device;

(v) receiving input from the person via the communication device; and

(vi) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(e) otherwise, terminating the first communication.

28. The device claimed in any one of claims 24 to 27, wherein, if the first communication to allowed to be received by the person on said communication device, then updating the approved list to include details associated with the first party.

29. The device claimed in claim 28, wherein the details associated with the first party are stored in the approved list for a fixed time.

30. The device claimed in claim 29, wherein the fixed period of time is 6 months.

31. The device claimed in claim 29 or 30, wherein the fixed period of time is configurable by the person.

32. The device claimed in any one of claims 21 to 31, wherein the first communication is being sent to the person’s telephone device; and wherein the step (b) of determining includes the steps of:

(i) determining a telephone number associated with the first communication; and

(ii) determining that the first party is known if the telephone number is in the approved list.

33. The device claimed in claim 32, wherein the telephone device is a mobile telephone device and the approved list forms part of the person’s contacts on the person’s mobile telephone device.

34. The device claimed in claim 32 or claim 33, wherein the communication is a telephone call.

35. The device claimed in claim 32 or claim 33, wherein the communication is text message.

36. The device claimed in claim 32, wherein the telephone device is a landline telephone device and the approved list is stored in system data storage.

37. The device claimed in any one of claims 21 to 31, wherein the first communication is an e-mail being sent to the person’s computer device; and wherein the step (b) of determining includes the steps of:

(i) determining an e-mail address associated with the first communication; and

(ii) determining that the party is known if the e-mail address is in the approved list.

38. The device claimed in claim 37, wherein the e-mail address forms part of the person’s contacts on the person’s computer device.

Description:

SYSTEM & DEVICE FOR VETTING COMMUNICATIONS BEING SENT TO A PERSON’S COMMUNICATION DEVICE

Technical Field of the Invention

The present invention relates to a system and device for vetting communications being sent to a person’s communication device.

Background of the Invention

In today’s world of technology, there is an incessant flow of unsolicited communications around which recipients need to navigate. Such communications can arrive in a variety of forms, such as for example, emails, calls, or text messages. They may be received by a user's landline telephone, mobile phone, or computer. An immense amount of time is wasted by people receiving such communications, considering whether they are of any relevance, and then finally discarding them.

Incoming junk and spam emails may be generated by computer software programs, and come in as a do-not-reply email. This means that the email may originate from an unmonitored inbox. Emails sent to this unmonitored inbox may receive a non-delivery notification, or not received a response at all. These emails may contain links to illegitimate websites. Such websites may be operated by fraudsters or scammers. In some scenarios, the email address of the junk or spam email may appear legitimate, but are in fact spoofed by perpetrators. These emails may then direct an unsuspecting user to a website made to appear like a legitimate website to obtain personal information, passwords and banking details, or credit card details, in an attempt to defraud the recipient of funds, or make illegal purchases, or steal their Identity to generally generate new credit lines under the name of the recipient(s).

These emails are also becoming more sophisticated, where one’s contact details have been obtained during regular internet use, or illegally by hackers, for example.

It is also generally such, that people receive emails with attachments or hyperlinks that, if opened or selected, impregnate the computer with a virus, or ransomware. In more recent times, the perpetrators have sought a payment to remove the virus. Other viruses hacks into the recipient’s email contact fde, and generate emails to all of those email contacts which can be highly embarrassing and, in some cases fatal, to the relevant business.

Although it is possible to block junk or spam email, scammers are constantly adapting their techniques and are becoming more sophisticated. Most people today incorporate an internet security program with an aim to filter out all junk, spam and known virus platforms. The security programs are of great strategic importance. However, they are not fool proof, noting the amount of Junk, Spam & infected emails that get through.

One can unsubscribe to legitimate websites that send out auto-generated emails. However, there is also the situation, where one does not want to communicate with an individual or company for whatever reason, but has little means in which to stop such, as to even try to block, and or place as junk, it will still be received by the recipients inbox, and then placed into the junk inbox, which then has to be deleted.

There’re situations, where new emails come in that are not in your contact list, and go directly into the junk inbox, where such emails are wanted by the recipient, and are sometimes deleted by error.

However, unsolicited communications are not limited to emails, and may come as unsolicited calls or text messages. Most unsolicited incoming calls or text messages originate from call centres, and/or may be 'Robo Calls' which use an automatic computer software program. Such call centres and Robo Calls are becoming more sophisticated, and can target randomly generated phone numbers, of the same location or country of the operator of the mobile telephone or landline telephone. It is also generally such, that if one misses such a call and then attempts to call the number back, that the call cannot be put through. All this leads to frustration, costs and time.

Similar to emails, one major contemporary issue is that scammers may attempt to obtain confidential information from an operator, to defraud them of their money via the operator’s bank accounts, and/or for the operator to transfer funds to a so called secure investment, along with identity theft. This is becoming a major issue around the world with little to no solution and including the issue of receiving text messages with attachments with viruses, or when downloading their emails, and or when requested to visit web links.

Although it is possible to block incoming numbers using a mobile phone, this is generally ineffective as the incoming numbers may be randomly generated, or from unregistered call centres and/or scammers. This can be of little help in not receiving further calls and or text messages, and there is no way to really stop such calls to landlines.

Whilst there are existing systems which can filter or block incoming calls to mobile or cell phones, by advising the operator that it is potentially a scam call, the decision to either answer the call or not is ultimately left to the operator. Some systems require the operator to subscribe to an application program on a monthly basis which provides filtering. However, these system seem unable to deal with callers using randomly generated landline and or mobile/cell numbers, or no caller ID number.

In some jurisdictions, operators may register their number with a 'Do Not Call" registry, which are usually run by the government. However, this still does not eliminate calls and/or text messages originating from unregistered call centres, and/or scammers.

Some telecommunications providers are also trying to assist their customers from receiving unwanted calls and/or text messages via software that can alert the telco provider to a large amount of incoming calls, text messages or web links being sent from a particular area or number. Telecommunication providers can then decide whether to block such calls or text messages. However, as it has shown to date, that this is not a total successful resolution to the ever increasing problem with receiving unwanted calls & text messages, as a large number of calls, and/or text messages are still getting through.

It is generally desirable to overcome or ameliorate one or more of the above-mentioned difficulties with receiving unwanted e-mails, unwanted telephone calls and text messages, or at least provide a useful alternative.

Summary of the Invention

In accordance with the invention, there is provided a system for vetting communications being sent to a person’s communication device, said system being configured to perform the steps of:

(a) receiving a first communication from a first party;

(b) determining if the first party is known to the system;

(c) if the first party is known, then allowing the first communication to be received by the person on said communication device; and

(d) otherwise, blocking the first communication.

Preferably, the step of determining if the first party is known includes the steps of determining if the first communication is being sent from a person that is included in an approved list. The approved list includes the person's contact list on the person's communication device. Alternatively, the approved list is separate to the person's contact list on the person's communication device.

Preferably, the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then allowing the first communication to be received by the person on said communication device.

The entry code is a randomly selected combination of numbers, letters and/or symbols.

Preferably, the step of blocking includes the steps of:

(a) sending a communication to the first party including a question;

(b) receiving a second communication from the first party;

(c) extracting an answer to the question from the second communication;

(d) displaying the answer to the question on the person’s communication device;

(e) receiving input from the person via the communication device;

(f) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(g) otherwise, terminating the first communication.

Preferably, the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then further performing the steps of:

(i) sending a communication to the first party including a question;

(ii) receiving a second communication from the first party;

(iii) extracting an answer to the question from the second communication;

(iv) displaying the answer to the question on the person’s communication device;

(v) receiving input from the person via the communication device; and

(vi) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(e) otherwise, terminating the first communication.

Advantageously, if the first communication to allowed to be received by the person on said communication device, then updating the approved list to include details associated with the first party. The details associated with the first party are stored in the approved list for a fixed time. The fixed period of time is 6 months, for example. Preferably, the fixed period of time is configurable by the person.

In accordance with the invention, there is also provided a device for vetting communications being sent to a person’s communication device, said device being configured to perform the steps of:

(a) receiving a first communication from a first party;

(b) determining if the first party is known to the system;

(c) if the first party is known, then allowing the first communication to be received by the person on said communication device; and

(d) otherwise, blocking the first communication.

Preferably, the step of determining if the first party is known includes the steps of determining if the first communication is being sent from a person that is included in an approved list. The approved list includes the person's contact list on the person's communication device. Alternatively, the approved list is separate to the person's contact list on the person's communication device.

Preferably, the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then allowing the first communication to be received by the person on said communication device.

The entry code is a randomly selected combination of numbers, letters and/or symbols.

Preferably, the step of blocking includes the steps of:

(a) sending a communication to the first party including a question;

(b) receiving a second communication from the first party;

(c) extracting an answer to the question from the second communication;

(d) displaying the answer to the question on the person’s communication device;

(e) receiving input from the person via the communication device;

(f) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(g) otherwise, terminating the first communication.

Preferably, the step of blocking includes the steps of:

(a) sending a communication to the first party including an entry code;

(b) receiving a second communication from the first party;

(c) extracting a code sent from the second communication;

(d) if the entry code matches the code received in the second communication from the first party, then further performing the steps of:

(i) sending a communication to the first party including a question;

(ii) receiving a second communication from the first party;

(iii) extracting an answer to the question from the second communication;

(iv) displaying the answer to the question on the person’s communication device;

(v) receiving input from the person via the communication device; and

(vi) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(e) otherwise, terminating the first communication.

Advantageously, if the first communication to allowed to be received by the person on said communication device, then updating the approved list to include details associated with the first party. The details associated with the first party are stored in the approved list for a fixed time. The fixed period of time is 6 months, for example. Preferably, the fixed period of time is configurable by the person.

Advantageously, the above-described device intercepts unwanted and/or unsolicited communications from parties that are not known to the intended recipient.

Brief Description of the Drawings

Preferred embodiments of the present invention are hereafter described, by way of nonlimiting example only, with reference to the accompanying drawing in which:

Figure 1 is a schematic diagram of a system for vetting communications being sent to a person’s communication device;

Figure 2 is a flow diagram showing steps performed by the system shown in Figure 1 ;

Figure 3 is a schematic diagram of a landline telephone example of the system shown in Figure 1;

Figure 4 is a flow diagram showing steps performed by the example of the system shown in Figure 3;

Figure 5 is a schematic diagram of a mobile communications device forming part of the system shown in Figure 1 ;

Figure 6 is a flow diagram showing steps performed by a mobile telephone example of the system shown in Figure 1 ;

Figure 7a is a schematic diagram of another mobile telephone example of the system shown in Figure 1;

Figure 7b is a flow diagram showing steps performed by the example of the system shown in Figure 7a;

Figure 8 is a schematic diagram of an email example of the system shown in Figure 1 ; Figure 9 is a schematic diagram of an email example of the system shown in Figure 8;

Figure 10 is a flow diagram showing steps performed by the example of the system shown in Figure 9;

Figure 11 is a schematic diagram of an interceptor system;

Figures 12a to 12c are flow diagrams showing steps performed by the interceptor system shown in Figure 11;

Figure 13 is a schematic diagram of another interceptor system;

Figure 14 is a flow diagram showing steps performed by the interceptor system shown in Figure 13;

Figure 15 is a schematic diagram of yet another interceptor system;

Figures 16 and 17 are flow diagrams showing steps performed by the interceptor system shown in Figure 15;

Figure 18 is a schematic diagram of still another interceptor system; and

Figure 19 is a schematic diagram of a further interceptor system.

Detailed Description of Preferred Embodiments of the Invention

The system 10 shown in Figure 1 is used to vet communications being sent to a person’s communication device 12. Advantageously, the system 10 intercepts unwanted and/or unsolicited communications from parties that are not known to the intended recipient. As shown in Figure 2, the system 10 is configured to perform the steps of:

(a) receiving, at step 202, a first communication from a first party;

(b) determining, at step 204, if the first party is known to the system 10;

(c) if the first party is known, then allowing, at step 206, the first communication to be received by the person on his/her communication device 12; and

(d) otherwise, blocking the first communication.

The person’s communication device 12 is, for example,:

(a) a mobile telephone device 12 capable of receiving incoming telephone calls; text messages and/or e-mails;

(b) a landline telephone device 12 capable of receiving incoming telephone calls; and

(c) a computer device 12 capable of receiving incoming telephone calls and/or e-mails.

In the context of the above examples, the system 10 is embodied as:

(a) the stand-alone device 14 that interfaces between a telecommunications service provider 16 and a landline telephone device 12;

(b) an application program 500 executed by a mobile telephone device 12; and

(c) an application program executed by a computer device.

The invention is below described, by way of non-limiting example, with reference to the above-mentioned communication devices 103.

The communication device 12 is able to communicate with equipment 14, 16, 20, 22, 24 of members, or users, of the system 10 over the communications network 18 using standard communication protocols. The devices 12 can be a variety of communications devices such as personal computers; laptop computers, notepads, smart phones; hand held computers etc. The communications network 18 may include the Internet, telecommunications networks and/or local area networks.

The components of the system 10 can be configured in a variety of ways. The components can be implemented entirely by software to be executed on standard computer server hardware, which may comprise one hardware unit or different computer hardware units distributed over various locations, some of which may require the communications network 18 for communication. A number of the components or parts thereof may also be implemented by application specific integrated circuits (ASICs) or field programmable gate arrays.

Telephone Calls to Landline Telephone Device

The system 10 is embodied in a stand alone unit that 300 that is be used to vet incoming telephone calls. The unit 300 includes:

(a) a phone jack for electronic communication with a telecommunications service provider;

(b) a phone jack for electronic communication with a landline telephone device 12;

(c) a microprocessor;

(d) non transient data storage, including, stored thereon, instructions that when executed by the microprocessor cause the device 300 to perform the steps 400 shown in Figure 4:

(i) receiving, at step 402, a first communication from a first party;

(ii) determining, at step 404, if the first party is known to the system 10;

(iii) if the first party is known, then allowing, at step 406, the first communication to be received by the person on his/her communication device 12; and

(iv) otherwise, blocking, at step 408, the first communication

The step of determining if the first party is known to the system, includes the steps of:

(a) determining, at step 404a, the telephone number of the incoming call; and

(b) determining, at step 404b, if the number is in an approved list of telephone numbers.

The approved list of numbers is stored in data storage on the device 300.

Typically, telephone calls originate from a caller device sent through the caller's telecommunication service provider 302, and are routed via a telecommunication network 18 to the person's telecommunication provider 304. The call is then vetted by the device

300 prior to being allowed to progress to the recipient's communication device 12.

Advantageously, the step 408 of blocking the first communication, includes the steps of:

(a) sending, at step 410, a communication to the first party including an entry code;

(b) receiving, at step 412, a second communication from the first party;

(c) extracting, at step 414, a code from the second communication; and

(d) if the entry code matches the code received in the second communication from the first party, then allowing, at step 406, the first communication to be received by the person on said communication device.

The entry code is preferably a randomly selected combination of numbers, letters and/or symbols.

In an alternative embodiment, the step 410 of blocking includes the steps of:

(a) sending a communication to the first party including a question;

(b) receiving a second communication from the first party;

(c) extracting an answer to the question from the second communication;

(d) displaying the answer to the question on the person’s communication device;

(e) receiving input from the person via the communication device;

(f) if the input received from the person represents a desire to receive the first communication, then allowing the first communication to be received by the person on said communication device; and

(g) Otherwise, terminating the first communication.

The question is sent to the unknown caller via a reply text message. Upon the unknown caller having answered the selected questions via text, the text message is then sent to the recipient's communication device. This communication device may be the same, or a different device, to the communication device intended to receive the call. The recipient upon receiving the unknown caller's text message with answers to the questions via the interceptor, the recipient can then choose to select 'yes' to accept the call, and or 'no' to reject the call.

If the recipient selects 'no', then the caller will be advised via a return text or voice message, that the recipient has rejected their call, and the call is then terminated by the interceptor.

If the caller has not responded or enters the incorrect code, or has failed to answer the selected questions, then the caller will be advised verbally that they have not entered the correct Code, or responded to the questions via text and that their call will now be terminated, without the recipient knowing of the attempted call.

If the recipient's communication device is off, the unknown caller is advised via a verbal message that the recipient's communication device is off via the interceptor, and the call will be terminated.

Telephone Call to Mobile Telephone Device

In the example shown in Figure 5, the system 10 is embodied as a software application 500 executed by the mobile telephone device 12 that includes at least the following features:

(a) a display 502

(b) user controls 504;

(c) input / output 506

(d) a microprocessor 508;

(d) non transient data storage 510, including, stored thereon, instructions that when executed by the microprocessor 508 cause the device 12 to perform the steps 600 shown in Figure 6:

(i) receiving, at step 602, a telephone call from a first party;

(ii) determining, at step 604, if the first party is known to the system 10;

(iii) if the first party is known, then allowing, at step 606, the telephone call to be received by the person on his/her communication device 12; and

(iv) otherwise, blocking, at step 608, the telephone call.

The step (ii) of determining if the first party is known to the system 10, includes the steps of:

(a) determining, at step 604a, the telephone number of the incoming telephone call; and

(b) determining, at step 604b, if the number is in an approved list of telephone numbers.

The approved list of numbers is stored in data storage 510 on the device 12.

Typically, telephone calls originate from the caller's telecommunication service provider 302, and are routed via a telecommunication network 18 to the person's telecommunication provider 304. The call is then vetted by the App 500 prior to being allowed to progress to the recipient.

Advantageously, the step 608 of blocking the telephone call, includes the steps of:

(a) sending, at step 610, a communication to the first party including an entry code;

(b) receiving, at step 612, a second communication from the first party;

(c) extracting, at step 614, a code from the second communication; and

(d) if the entry code matches the code received in the second communication from the first party, then allowing, at step 606, the telephone call to be received by the person on said communication device.

The entry code is preferably a randomly selected combination of numbers, letters and/or symbols.

In some embodiments, rather than a code, the device 300 sends the first party a set of one or more questions to answer, which will be sent to the unknown caller via a reply text message. Upon the unknown caller having answered the selected questions via text, the text message is then sent to the recipient's communication device. This communication device may be the same, or a different device, to the communication device intended to receive the call. The recipient upon receiving the unknown caller's text message with answers to the questions via the interceptor, the recipient can then choose to select 'yes' to accept the call, and or 'no' to reject the call.

If the recipient selects 'no', then the caller will be advised via a return text or voice message, that the recipient has rejected their call, and the call is then terminated by the interceptor.

If the caller has not responded or enters the incorrect code, or has failed to answer the selected questions, then the caller will be advised verbally that they have not entered the correct Code, or responded to the questions via text and that their call will now be terminated, without the recipient knowing of the attempted call.

If the recipient's communication device is off, the unknown caller is advised via a verbal message that the recipient's communication device is off via the interceptor, and the call will be terminated.

Text Message

In another embodiment, as shown in Figure 7a, the system 10 is used to vet text messages, also referred to as a Short Message Service (SMS) messages, sent to a person's communication device 12. Generally, SMS messages are transmitted from a person's telecommunications service provider 16. However, in some embodiments, SMS messages may be routed via the internet 18. The application software 500 being executed by the person’s mobile communication device 12 vets any incoming SMS messages before being passed to the person for viewing, by checking the sender's details with information in an address book 702. If the text message sender is unknown, not listed in the address book, or there is a mismatch, then the SMS message will be temporary stored in an Intercepted SMS Database 704.

The software application 500 executed by the mobile telephone device 12 causes the device 12 to perform the steps 750 shown in Figure 7b:

(a) receiving, at step 752, a SMS message from a first party;

(b) determining, at step 754, if the first party is known to the system 10;

(c) if the first party is known, then allowing, at step 756, the SMS message to be received by the person on his/her communication device 12; and

(d) otherwise, blocking, at step 758, the SMS message.

The step (b) of determining if the first party is known to the system 10, includes the steps of:

(a) determining, at step 754a, the telephone number of the incoming telephone call; and

(b) determining, at step 754b, if the number is in an approved list of telephone numbers.

The approved list of numbers is stored in data storage 510 on the device 12.

Advantageously, the step 758 of blocking the SMS message, includes the steps of:

(a) sending, at step 760, a communication to the first party including an entry code;

(b) receiving, at step 762, a second communication from the first party;

(c) extracting, at step 764, a code from the second communication; and

(d) if the entry code matches the code received in the second communication from the first party, then allowing, at step 756, the SMS message to be received by the person on said communication device 12.

The entry code is preferably a randomly selected combination of numbers, letters and/or symbols.

In some embodiments, rather than a code, the App 500 sends the first party a set of one or more questions to answer, which will be sent to the first party via a reply text message. Upon the first party having answered the selected questions via reply text, the text message is then sent to the recipient's communication device 12. This communication device may be the same, or a different device, to the communication device intended to receive the call. The recipient upon receiving the unknown caller's text message with answers to the questions via the interceptor, the recipient can then choose to select 'yes' to accept the text message, and or 'no' to reject the text message.

If the recipient selects 'no', then the caller will be advised via a return text or voice message, that the recipient has rejected their SMS message, and the SMS message is then terminated by the interceptor App 500.

If the sender is listed in the address book, and the recipient's communication device 12 is off, then the SMS message will be forwarded to the recipient's communication device 12 once it is available without requiring the sender to enter any code, or answer any questions.

One caveat is that any text message from 'emergency services' will be exempt from the above requirements, and the interceptor will allow such text messages to be received by the recipient.

In the event the sender has not responded to enter the required code, and or not replied to the questions, the interceptor App 500 will permanently delete the text message.

If the recipient's communication device is off, the unknown sender is then advised via a text message by the interceptor, that the recipient phone is off, and that their text message will be permanently deleted by the system 10.

If the interceptor is not provided access to the address book, or the address book is unavailable, then all incoming SMS will be intercepted, and all senders will be required each time, to enter the randomly generated code, and/or answer the questions.

Email

The system 10 can be embodied as a software application stored in non-transient data storage in communication with a computer device 12, such as a mail server, a router, a personal computer, a laptop, a notebook or any other suitable device.

As shown in Figure 8, the system 10 may be configured to intercept e-mails originating from a mail server 802 of the sender, via a person's telecommunication service provider 16. The interceptor 14 may be connected directly to a networking device 804, such as a router. This allows emails to be downloaded by the interceptor 14 before being potentially forwarded to the person's communication device 12.

In the exemplary embodiment 900 shown in Figure 9, email originating from an external outbound mail server 902 transmitted over the internet 16, and received by a person's incoming mail server 904. The email is then vetted by the interceptor 14 by performing the steps 1000, shown in Figure 10, of:

(a) receiving, at step 1002, a first email communication from a first party;

(b) determining, at step 1004, if the first party is known to the system 10;

(c) if the first party is known, then allowing, at step 1006, the first email communication to be received by the person on his/her communication device 12; and

(d) otherwise, blocking, at step 1008, the first e-mail communication

The step 1004 of determining if the first e-mail communication is known to the system 10, includes the steps of:

(a) determining, at step 1004a, an e-mail address of the incoming first e-mail communication; and

(b) determining, at step 1004b, if the e-mail address is in an approved list of e- mail addresses.

The approved list of e-mail addresses is the address book 906 stored in data storage on the device 12.

Advantageously, the step 1008 of blocking the first e-mail communication, includes the steps of:

(a) sending, at step 1010, a communication to the first party including an entry code;

(b) receiving, at step 1012, a second communication from the first party;

(c) extracting, at step 1014, a code from the second communication; and

(d) if the entry code matches the code received in the second communication from the first party, then allowing, at step 1006, the first communication to be received by the person on said communication device.

The entry code is preferably a randomly selected combination of numbers, letters and/or symbols.

In the example shown in Figure 9, if the sender is unknown to the system 900, the first email communication is temporary stored in an intercepted email database 910. The first party receives the automated response e-mail through the person's outgoing mail server 912.

In an alternative embodiment, rather than sending an entry code, the system sends one or more questions to the first party. If the first party correctly answers the questions in a reply email, the sender's reply email is then sent to the recipient. At this point, the recipient can either accept the sender's email by, for example, clicking 'yes' when prompted, or 'no, to not receive the sender's email. As will be generally understood, the sender's email may also include attachments.

If the recipient selects 'yes', an automated reply email will be sent to the sender to advise the sender that their email and any attachments have been forwarded to the recipient's inbox.

The Interceptor 12 then advises the recipient as a standard template, that the senders email could be a Scam, and to be diligent in opening any attachments, or logging onto any link, and or replying to such. But, having the sender provide the various answers to the Interceptors questions, which will provide to the recipient, that this email is required by the recipient, and that the recipient was waiting for such an email, and would be less likely to select 'Yes' to receive such emails from a totally unknown subject and or sender;

In the event the recipient selects 'No', then the sender’s email is deleted from the address book 906, the intercepted email database 910, and from the incoming mail server 904. This will eliminate any chance that such emails will remain on the recipient’s email system via the Host Domain 24 or ISP Provider System 22, in the event the recipient uses a different device at a later stage to download emails, as many email systems, keep emails on the recipients inbox email file for a certain period, even though the recipient has deleted it from the device they were using at that time

An automated reply email is sent to the sender advising that, the recipient has rejected their email, and it will now be permanently deleted.

If the Email Sender has not responded or entered the correct Code, and or has failed to answer the questions after one or more attempts, the email interceptor 14 will then permanently delete the email from the intercepted email database, along with permanently deleting it from the incoming mail server without the recipient knowing of the attempted email.

If the recipient does not allow the system to utilise their address book, or an address book has not been created, then all incoming emails will be vetted by the intercepted and temporary stored in the intercepted email database, pending an adequate reply from the sender.

Alternative Embodiments

In some embodiments, the interceptor will generate a different code that is unique to each recipient. In other embodiments, the interceptor may generate a different code on a periodic basis, or provide an option for the recipient to manually request that a new code be generated. This prevents computer generated communications from being able to preempt the code, and/or the select range of questions.

In addition, such software programs will not be able to enter such verbal or text requested Codes, and or questions into a keyboard, or within their program systems or platforms, even if their computer generated program(s) for calls and/or text messages, are programmed to work on an artificial intelligence (Al) voice operated platform, or programmed to enter a set of numbers, letters and/or symbols.

It will also deter calls and text messages from individual scammers, and fraudsters, as it will make it less likely that the recipient of an incoming communication will accept or reply to unknown communications, especially when a correct code must also be entered each time, and/or answers be provided to a select range of questions. Both inputs may be verified by the recipient before deciding whether to accept or reject an incoming communication.

Further, in the event a correct code is entered, the recipient will still be notified by the interceptor that the incoming communication comes from an unknown caller.

Recipients who may wish to receive various automated calls and/or text messages such as, for example, for banking and/or credit card transactions, can simply add the appropriate names and/or numbers to their address book. The address book can be changed at any time to control the incoming communications which are automatically accepted, rejected, or subject to further vetting. Many Financial Institutions are now using a different Software System to send Verification Messages or Codes, which will assist the recipient in knowing that incoming message is from their financial institution or service provider without having to add or change the names or numbers on their device.

Where the incoming communication is an email, the interceptor may, in some embodiments, be configured to prevent continuous automated generated emails, along with emails from unknown senders, from being received by the recipient if the sender is not listed in the address book. The emails may also include attachments.

If an email originates from an automated software program that is generally designed to send emails on a bulk basis, such software programs will be unable to enter the randomly selected code consisting of, for example, randomly selected numbers and/or letters and/or symbols. Further, even if such software could enter the code, it is unlikely that it would be able to answer the selected range of questions each time.

In some embodiments, the interceptor will assign a unique code for each recipient, may be randomly generated on a periodic basis, or can be manually changed by the recipient. This ensures that auto generated email programs cannot be pre-programmed with the code, or be programmed to utilise artificial intelligence to guess the code.

The selected range of questions may request that the unknown sender provide at least one of the following answers in a reply email to the recipient, such as, their name, contact number, company name if applicable, subject matter, email address.

Furthermore, even if the email is allowed to be delivered to the recipient, any attachments may be initially prohibited until authorised by the recipient.

In certain embodiments, the interceptor can be connected directly to the main communication socket for a phone line, or an IP line. Alternatively, the interceptor may be connected to a modem or router device, an answering machine, a computer system, or any similar device.

In other embodiments, the interceptor may be provided via a person's telecommunications service provider or internet service provider, via a stand-alone platform, or via a link to their mainframe. Alternatively, the interceptor may be provided via a pre-programmed device, linked to the sim card that is uniquely provided by via a person's telecommunications service provider or internet service provider, via a downloadable app, via an authorised provider, via the manufacturer of the communication device.

Where the interceptor is configured to vet incoming emails, the interceptor may be provided by a person's in house domain, the domain host provider, or as a standalone system connected to the in house domain or domain host provider. The interceptor may also be provided by, for example, internet service provider, authorised security service, authorised providers, as an upgrade provided by an email service such as Gmail or Hotmail or similar, as a software upgrade to an operating email system provider.

The interceptor may also be physically attached to a modem, computer, and communication device such as a mobile/cell phone. It would be understood that the interceptor may be connected via any known means, such as via USB, or remotely connected via a person's local area network.

In some embodiments, the interceptor may be downloaded as an application onto one's mobile/cell phone or computer, be linked to the integrated circuit card ID of a person's sim card, or included in any new device. Company domain host providers may also incorporate an interceptor into a company's incoming mail system for standard emails to their public facing addresses such as, for example, Contact@, Enquiry@, Sales@ & Info@ etc.

In some embodiments, a recipient may operate several interceptors concurrently to vet phone calls, text messages, and emails.

The mobile device 12

The mobile device 12 is a handheld computer device such as a smart phones or a PDA such as one manufactured by Apple™, LG™, HTC™, Research In Motion™, and Motorola™. For example, the mobile device 12 includes a mobile computer such as a tablet computer. An exemplary embodiment of the mobile device 12 is shown in Figure 5.

Although the components depicted in Figure 5 represent physical components, Figure 5 is not intended to be a hardware diagram; thus many of the components depicted in Figure 2 may be realized by common constructs or distributed among additional physical components. Moreover, it is certainly contemplated that other existing and yet-to-be developed physical components and architectures may be utilized to implement the functional components described with reference to Figure 5.

In many implementations, the non-volatile memory 510 is realized by flash memory (e.g., NAND or ONENAND memory), but it is certainly contemplated that other memory types may be utilized as well. Although it may be possible to execute the code from the nonvolatile memory 104, the executable code in the non-volatile memory 510 is typically loaded into RAM and executed by one or more of the N processing components.

The N processing components in connection with RAM generally operate to execute the instructions stored in non-volatile memory 510 to effectuate the functional components depicted in Figure 5. As one of ordinarily skill in the art will appreciate, the N processing components may include a video processor, modem processor, DSP, graphics processing unit (GPU), and other processing components.

It should be recognized that Figure 5 is merely exemplary and in one or more exemplary embodiments, the functions described herein may be implemented in hardware, software, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code encoded on a non- transitory computer-readable medium. Non-transitory computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a computer. By way of example, and not limitation, such computer-readable media can comprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fibre optic cable, twisted pair, digital subscriber line (DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fibre optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes compact disc (CD), laser disc, optical disc, digital versatile disc (DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.

The Interceptor Device/App 5000

The interceptor device or App 5000 shown in Figure 11 is adapted for use in a home or a small to medium sized business. The interceptor device or App 5000 forms part of an interceptor system 5002 that is configured in the following manner:

(a) an ADSL modem/router 5004 is connected to an external wide area network

(not shown) by way of a wall socket 5006;

(b) the interceptor device/App 5000 is in communication with the modem/router 5004 by way of Ethernet ports 5008 coupled to Ethernet 5010;

(c) a telephone outlet port 5012 of the modem/router 5004 is in communication with the telephone input port 5014 of the interceptor 5000; and

(d) the interceptor 5000 is in communication with an analogue telephone (not shown) by way of wall socket 516.

In the example shown, the interceptor device/App 500 does not form part of the TSP/ISP system. Rather, it is a free standing unit that forms part of an interceptor system 5002 located in a home or a small to medium sized office.

The Interceptor Device/App 5000 connects to the user Device, not the Network Modem/Router 5004, for receiving & sending of Emails. Further, the interceptor Device/App 5000 is preferably able to be programmed to work with any ISP/TSP’s Modem/Router 5004 and becomes the surrogate to the ISP/TSP Network Modem/Router. Logon is similar to logging onto Modem: User name & Password required.

The users VoIP Phone or Analogue Phone (not shown) is connected to the interceptor Device/App 5000 via port 5014. The IP Phone socket 5014 is to work the same as the Modem/Router Phone Socket 5012. Analogue should not be an issue. In an example where the interceptor App 5000 is installed on the user’s Computer/Device (not shown), then the interceptor App 5000 communicates directly with the Modem Router 5004, and the VoIP Phone (not shown) or Analogue phone (not shown) connects via the user’s modem as usual.

Incoming E-mail

The following steps are performed by the Interceptor Device/App 5000 performs in response to the user opening up their Email program and downloading email via their

Email Protocols via their ISP or Domain Protocols:

(a) The Device/App 5000 accesses the user’s Email contacts file and their Email Protocols.

(b) The Device/App 5000 is programmed to include an “Intercepted Email File”.

The steps 5500 shown in Figures 12a and 12b are performed by the Interceptor Device/App 5000 when configured to access the user's e-mail contacts file, for all incoming email:

(a) Access, step 5502 the user’s Email contacts file;

(b) Set up, at step 5504, an intercepted Email file;

(c) Wait, at step 5506, for a new e-mail to be received and determine, at step 5508, if the sender is in the user’s email contact file;

(e) If the sender is in the user’s Email contact file, the allow, at step 5510, the e-mail to pass to the user;

(f) If the sender is unknown, then the Email is placed, ats step 5512, in the “Intercepted Emails File”;

(g) The Device/App 50000 then sends, at step 5514, a reply email to the sender which includes a randomly selected Code and a request to send a reply email back to the Device/App 5000 with the code;

(h) The Device/App 5000 waits, at step 5516, to receive the further e-mail from the sender;

(i) The Device/App 5000 checks, at step 5518, if the code received matches the code sent and if the code is correct, then the Device/App 5000 performs the steps of:

(A) sending, at step 5520, an automated reply email to the sender consisting of a number of questions that the sender must reply to;

(B) The Device/App 5000 waits, at step 5522, to receive the further e-mail from the sender;

(C) The Device/App 5000 checks, at step 5524, if the answers received match the saved answers and if the answers are all correct, then the Device/App

5000 forwards, at step 5526, the senders answers as an email to the recipient’s Inbox, which will include two options for the recipient to respond to “Yes” or “No”;

(D) The interceptor device/App 5000 then waits, at step 5528, for the recipient’s answer;

(E) If the recipient replies by clicking on “Yes”, then the interceptor device / app 50000 releases, at step 5530, the Senders email from the “Intercepted Emails File”; and forwards it to the recipients Inbox, with or without any attachments;

(F) The device/App 5000 then sends, at step 5532, a reply email to the sender, advising that their email and any attachments have been sent to the recipient Inbox. Noting that one may still prohibit any attachments to be sent through, until the recipient is happy to receive such;

(G) Alternatively, if the recipient replies by clicking “No”, then the device/App 5000, at step 5534, permanently deletes the senders email from the “Intercepted Emails File”; and also permanently delete the senders email from the recipients email system at their Domain or ISP Inbox; the device/App 5000 may also automatically send an email to the sender advising that the recipient has rejected their email.

In the event that the Incoming email is from a Known Contact of the recipient, then the device/App 5000 will automatically forward, at step 5510, the senders email to the Inbox of the recipient.

The email recipient can at all times add or remove contacts from their contact fde in the event they wish to receive emails with “Do Not reply” covering Invoices, Tracking details, purchase confirmations etc. It would be best that all vendors/banks etc amend their platforms to ensure that their customers click on a link which would download and copy their email details into the recipients Contact File, so the recipient can receive the automated email, which they can then delete from their contact file, if they do not wish to receive any further automated emails etc.

Included in the email from the sender to the recipient, is a Template Notice for the recipient to be careful not to click on any Web Links or open any attachments, as both could be a Scam, unless they now know who the sender is, and has been awaiting such contact, and adds such contact to their Contact File.

In an alternative embodiment, rather than the sender being sent the code, at step 5514, the Interceptor Device/App 5000 skips to step 5520 and sends the sender a message with the questions.

In a further alternative embodiment, the interceptor device/App 5000 is optionally given access to the user’s e-mail contacts fde. When configured to not have access to the user's e-mail contacts, all incoming e-mail will be blocked at first instance. The Interceptor Device/App 5000 will perform steps 580 shown in Figure 12c.

(a) Access, step 5581, the user’s Interceptor contact file;

(b) Set up, at step 5582, an intercepted Email file;

(c) Wait, at step 5583, for a new e-mail to be received and determine, at step 5584, if the sender is in the Interceptor Contact File;

(e) If the sender is in the Interceptor Contact File, and if the e-mail was received within the permitted fixed period of time for receiving e-mail from the sender, then allow, at step 5585, the e-mail to pass to the user;

(f) Otherwise, the the Email is placed, at step 5586, in the “Intercepted Emails File”;

(g) The Device/App 50000 then sends, at step 5587, a reply email to the sender which includes a randomly selected Code and a request to send a reply email back to the Device/App 5000 with the code;

(h) The Device/App 5000 waits, at step 5588, to receive the further e-mail from the sender;

(i) The Device/App 5000 checks, at step 5589, if the code received matches the code sent and if the code is correct, then the Device/App 5000 sends, at step 5590, a reply email to the sender, advising that their email and any attachments have been sent to the recipient Inbox. Noting that one may still prohibit any attachments to be sent through, until the recipient is happy to receive such;

(j) The Device/App 5000 then releases, at step 5585, the Senders email from the “Intercepted Emails File”; and forwards it to the recipients Inbox, with or without any attachments;

(k) Alternatively, if the code is incorrect, then the device/App 5000, at step 5591, permanently deletes the senders email from the “Intercepted Emails File”; and also permanently deletes the senders email from the recipients email system at their Domain or ISP Inbox; the device/App 5000 may also automatically send an email to the sender advising that the recipient has rejected their email.

Advantageously, if the interceptor device/app 5000 successfully forwards the e-mail to the recipient, then the interceptor device/App 5000 stores the sender's number and/or name for a fixed period of time, such as 6 months, or any other suitable amount of time. The fixed period is configurable to suit the needs of the recipient. The interceptor device/App 5000 will allow the sender to continuously communicate with the operator during the fixed time period.

Incoming Telephone Calls from Mobile Phone to VoIP or Analogue Phone

The system 5550 shown in Figure 13 is configured to all vetting of incoming telephone calls from Mobile Phone to VoIP or Analogue Phone 5552. The steps 5554 shown in Figure 14 are performed by the Interceptor Device/App 5000, for all incoming calls from a mobile phone:

(a) Wait, at step 5556, for a call to be received;

(b) Determine, at step 5558, the identity of the caller;

(c) If the caller is known to the user, then send the interceptor device/app 5000 puts, at step 5559, the call through to the recipient;

(d) If the caller is unknown to the user, then send, at step 5560, a reply message to the caller which includes a randomly selected Code and a request to send a reply back to the Device/App 5000 with the code;

(e) The Device/App 5000 waits, at step 5562, to receive the further message from the caller;

(f) The Device/App 5000 checks, at step 5564, if the code received matches the code sent and if the code is correct, then the Device/App 5000 puts, at step 5559, the call through to the recipient;

(g) If the Unknown Caller fails to respond within a set time, or enters the incorrect Code, and or fails to answer any questions, then, at step 5566, the Interceptor Device/App 5000 will Terminate the call, at step 5566, without the recipient knowing of the attempted call.

The Device/App 5000 is to work the same as above for all incoming calls that have been placed via their TSP “Virtual Receptionist” phone system, which if via an App on one’s Computer/Device linked to their Modem.

The Interceptor device/App 5000 preferably stores the caller’s number and/or name for a fixed time for later unvetted access to the recipient. In one embodiment, the Interceptor device/App 5000 stores the caller’s number and/or name for a fixed time for later unvetted access to the recipient for a fixed period of time, such as 1 month or 6 months.

The device/App 5000 may also send a text message (preferred) to the MB/Cell device with questions for the Unknown caller to answer via a reply text message which will show-up on the operators receiving device.

In an alternative embodiment, the interceptor device/App 5000 is optionally given access to the user’s Contacts File. When configured to not have access to the user's Contacts File, all incoming calls will be blocked at first instance. The Interceptor Device/App 5000 will perform steps 5560 to 5564 for all Callers at first instance.

Advantageously, if the interceptor device/app 5000 successfully forwards the call to the recipient, then the interceptor device/App 5000 stores the caller's number and/or name for a fixed period of time, such as 6 months, or any other suitable amount of time. The fixed period is configurable to suit the needs of the recipient. The interceptor device/App 5000 allows the caller to continuously communicate with the operator during the fixed time period.

Incoming Telephone Call from a Landline

The system 5550 shown in Figure 13 is also configured to all vetting of incoming telephone calls from a land line to VoIP or Analogue Phone 5552. The steps performed are analogous to the steps 5554 shown in Figure 14 performed for a mobile phone. The major difference being that the Interceptor Device / App 5000 sends a call to the caller giving them the code to enter.

Fixed Interceptor Device or Programmed App 6000

The interceptor devices or Apps 6000a, 600b shown in Figure 15 form part of an interceptor system 6002 that is configured in the following manner:

(a) TSP platform 6002 from outside operators own TSP;

(b) Operators own TSP platform 6006 Internet service provider platform; or

(c) Operator's mobile device 6008.

The TSP 6002 has the Interceptor Device/App Platform 6000a to be able to Intercept incoming calls & SMS messages being routed from other TSP’s. Further, the operator's TSP 6006 includes the Interceptor Device/ App Platform 6000b to cover MB/Cell-Landline calls & SMS Messages being sent from the operators TSP 6006.

A. Incoming SMS Message

The system 6002 shown in Figure 15 is configured to all vetting of incoming SMS messages to an operator's mobile phone 6008. The steps 6010 shown in Figure 16 are performed by the Interceptor Device/App 6000b for all incoming SMS messages:

(a) Wait, at step 6012, for an SMS to be received by an operator's MB/Cell device 6008;

(b) Determine, at step 6014, the identity of the sender;

(c) If the sender is known to the user, then the interceptor device/app 6000b puts, at step 6016, the call through to the recipient;

(d) If the caller is unknown to the user, then the Interceptor Device/App 6000b, at step 6018, saves the SMS message into an "Intercepted Message File" and sends a SMS message to the sender which includes:

(i) a randomly selected Code; and

(ii) a request to send a reply back to the Device/App 600b with the code;

(e) The Device/ App 6000b waits, at step 6020, to receive the further message from the sender;

(f) The Device/App 6000b checks, at step 6022, if the code received matches the code sent and if the code is correct, then the Device/App 6000b puts, at step 6016, the SMS through to the recipient;

(g) If the sender fails to:

(i) respond within a set time; or

(ii) enters the incorrect code; then, at step 6024, the Interceptor Device/App 6000b will terminate the SMS by deleting the texters SMS message from the “Intercepted Message File” without the recipient knowing of the attempted SMS.

In an alternative embodiment, the interceptor device/App 6000b is optionally given access to the user’s Contacts File. When configured to not have access to the user's Contacts File, all incoming SMS messages will be blocked at first instance.

Advantageously, if the interceptor device/app 6000b successfully forwards the SMS message to the recipient, then the interceptor device/App 6000b stores the texters number or name for a fixed period of time, such as 6 months, or any other suitable amount of time. The fixed period is configurable to suit the needs of the recipient. The interceptor device/App 6000b will allow the texter to continuously communicate with the operator during the fixed time period.

After receipt of the correct code, the device/App 6000b may send a further reply text message to the sender to answer a question (s) via a reply text such as: Name-Subject.

The operator having received the reply text to the questions, can then determine to either receive the SMS Message by replying “Yes” or decline to accept the message by replying “No”. In the event the operator has selected “Yes” the device/App 6000b will:

(a) forward the SMS Message from the “Intercepted Message File” to the operators device 6008; and

(b) automatically advise the texter, that their message has now been sent to the operators device.

In the event the operator has selected “No” to not receive the Texters message, the device /App 6000b automatically deletes the senders message from the “Intercepted Message File” and/or from the operators TSP Platform 6006. The device 6000b then forwards an automatic text reply to the sender, advising that the operator has rejected their attempt to send the message, and that it will now be permanently deleted.

In the event the operators device 6008 is off, and the Unknown texters message will be permanently deleted from the operators TSP Platform 6006, without the operator knowing of the attempted SMS message. The device/App 6000b will automatically advise the Texter that the operators device is off & that their SMS message will now be permanently deleted.

The device 6000b includes a white list including any Emergency Services, various financial institutions & other Government approved sources. SMS messages from these sources on the white list go through to the operators device 6008.

The Interceptor Device/App 6000b allows all incoming SMS Messages from “Known Contacts” within the Operators “Contact File” to go through to the operators device in the same manner as is currently via their TSP.

In relation to Items D, E & F shown in Figure 15, the Interceptor Device Platform 6000b between the operators device 6008 and the operators TSP 6006, the Functions of the device platform will function the same as the process 6010 in relation to SMS Message attempts to the operators MB/Cell device 6008 coming from unknown Texters, unless all is done via an App on the operators device 6008.

B. Incoming Unknown MB/Cell Callers (B), calling an operators MB/Cell device from outside the operators own TSP.

The Interceptor Device/App Platform 6000a (C) performs the steps shown in Figure 17:

(a) Wait, at step 6032, for an incoming MB/Cell call to be received from outside the operators own TSP;

(b) Determine, at step 6034, the identity of the caller;

(c) If the caller is known to the user (i.e. listed in the in the operator's Contact File), then the interceptor device/app 6000a puts, at step 6036, the call through to the recipient;

(d) Otherwise, the Interceptor Device/App 6000a, at step 6038, sends an automated voice message and/or a text message to the caller which includes:

(i) a randomly selected Code; and

(ii) a request to send a reply back to the Device/App 6000a with the code;

(e) The Device/App 6000a waits, at step 6040, to receive the further message from the sender;

(f) The Device/App 6000a checks, at step 6042, if the code received matches the code sent and if the code is correct, then the Device/App 6000a puts, at step 6036, the call through to the recipient;

(g) Otherwise, if the caller fails to:

(i) respond within a set time; or

(ii) enters the incorrect code; then, at step 6044, the Interceptor Device/App 6000a will terminate the call by deleting the texters SMS message from the “Intercepted Message File” without the recipient knowing of the attempted SMS.

In an alternative embodiment, the interceptor device/App 6000a is optionally given access to the user’s Contacts File. When configured to not have access to the user's Contacts File, all incoming calls will be blocked at first instance.

Advantageously, if the interceptor device/app 6000a successfully forwards the call to the recipient, then the interceptor device/App 6000a stores the caller's number or name for a fixed period of time, such as 6 months, or any other suitable amount of time. The fixed period is configurable to suit the needs of the recipient. The interceptor device/App 6000a will allow the caller to continuously communicate with the operator during the fixed time period.

In an alternative embodiment, after a correct code has been received, the interceptor device 6000a sends the caller one or more automated questions. The interceptor device 6000a then waits to receive answers from the caller and allow the call to pass, at step 6036, if the answers are correct.

In a further embodiment, upon the unknown caller having entered the correct code and, where applicable, correctly answered the selected question(s) via a reply text, interceptor device/App 6000a send the caller's reply text to the operator's device 6008.

Upon receiving the unknown callers text message with the answer(s) to the question(s) (such as: Your Name, Contact Number, Subject matter), the operator can then decide to choose to select “Yes” to accept the call or “No” not to accept the call. If "Yes", then the call is put through, at step 6036, to the recipient and the device/App 6000a stores the caller's number for a fixed period of time, such as 6 months, or any other suitable amount of time. The interceptor device/App 6000a will allow the caller to continuously communicate with the operator during the fixed time period.

In the event the operator selects “No”, the caller is advised, via a text message or voice message, that the operator has rejected their call, and the call is then terminated by the Interceptor Device/App 6000a.

If the operator's phone is off, the unknown caller is advised via a verbal or text message that the operators phone is switched off, and the call is terminated by the Interceptor Device/App 6000a.

C. Callers calling from a Landline or Device to an operators MB/Cell Device:

Where an unknown caller calls from a Landline device to an operators MB/Cell Device 6008, the Interceptor Device/App will intercept the call, and advise the caller to verbally enter the Code. If the caller has entered the correct Code and within a fixed time period, the call will be put through and store the number for a fixed period of time allowing the caller to continuously communicate with the operator during that time. If the caller has not entered the correct Code or within the set time period, and/or after one or more allowed attempts, the call will be terminated by the Interceptor Device/App, and without the operator knowing of the attempted call.

If the operator’s phone is off, the caller is advised via a verbal or text message that the operator’s phone is switched off, and the call is terminated by the Interceptor Device/App.

In relation to Diagram sections (G), (H) (I) & (K), the Interceptor Device/App is programmed to operate as per above described operations for the interceptor device/app 5000.

Fixed Interceptor Device Platform 7000

The fixed interceptor device platform 7000 is linked to ISP routers & direct domain server platforms in the manner shown in Figure 18. Such direct domains as with the likes of Gmail, Hotmail, Yahoo, and Host Domain Servers, the Functions of either a Device and/or an App will need to operate the same as per the interceptor device/app 5000, as these direct servers will receive all such emails directly into one Inbox, so they need to be the first Interceptor..

Portable Interceptor Device Platform 8000

Either the Interceptor Device or App 8000 shown in Figure 19 functions the same as for all the Functions covering Emails, Unknown Incoming calls from MB/Cell Devices and Landlines, including Unknown TMS Text Messages.

The Device or App 8000 overrides the Network Adapter, and work with the Operators/TSP Sim/and their Email Protocols.

The portable interceptor device platform 8000 is linked to the operator recipient device and to a LAN & TSP where their ISP-TSP is not operating the interceptor device in the manner shown in Figure 19. The portable interceptor platform 8000 can be configured as a LAN & TSP gateway device or a software application.

Many modifications will be apparent to those skilled in the art without departing from the scope of the present invention

Throughout this specification, unless the context requires otherwise, the word "comprise", and variations such as "comprises" and "comprising", will be understood to imply the inclusion of a stated integer or step or group of integers or steps but not the exclusion of any other integer or step or group of integers or steps.

The reference to any prior art in this specification is not, and should not be taken as, an acknowledgment or any form of suggestion that the prior art forms part of the common general knowledge in Australia.