H04M2215/7072

System and Method of deterring unsolicited telephone calls
20250385971 · 2025-12-18 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.

System and method of deterring unsolicited telephone calls
12549671 · 2026-02-10 ·

Disclosed herein is a call processing system for controlling unsolicited telephone calls in a telecommunications network. The system includes at least one processor configured to receive a call request from an originating telephone number, determine that the number is not present in a contact list of a called-party device, and transmit a pre-connection notification indicating that completion of the call may be subject to a charge. Upon acceptance of the potential charge, the processor connects the call and provisionally authorizes the charge. After call termination, the processor triggers presentation of a prompt on the called-party device requesting an instruction to confirm or waive the charge. The processor then processes the charge in accordance with the instruction, finalizing or voiding the charge. The system may maintain a repeat-offender database, apply penalty escalation, support timeout and SIM verification, and enable adaptive bypass for trusted callers.