Abstract: Authentication of voice message recipient network addresses employs generating (102) and storing (104) a “network file” that includes “voice clips” and associated network addresses that are extracted from voice messages received across a network (10) from voice message systems (16, 18). A voice clip is the first one to three seconds of voice extracted from each received voice message. Over time, the network file will grow to contain multiple voice clips and associated network voice message addresses. When a voice message originator subsequently enters a recipient's network address (106), the originating voice message system searches (114) the network file for the network address, retrieves the associated voice clip (116), and plays it for the voice message originator to authenticate the recipient's network address.
Abstract: The present invention is directed to a method of controlling transmission of voice messages or information via telephonic voice message systems, which are sometimes referred to as Voice Mail systems. Users of the system selectively specify voice message transmission instructions for controlling transmission of voice messages directed to them. Upon receipt of a user's voice message address, the voice message system determines whether the destination voice message address has a specified voice message transmission instruction previously selected by the recipient and processes the voice message in accordance with the instruction.