WO2008019972A1 - Procédé de traitement assisté par ordinateur d'appels entre des abonnés dans un réseau de communication - Google Patents

Procédé de traitement assisté par ordinateur d'appels entre des abonnés dans un réseau de communication Download PDF

Info

Publication number
WO2008019972A1
WO2008019972A1 PCT/EP2007/058192 EP2007058192W WO2008019972A1 WO 2008019972 A1 WO2008019972 A1 WO 2008019972A1 EP 2007058192 W EP2007058192 W EP 2007058192W WO 2008019972 A1 WO2008019972 A1 WO 2008019972A1
Authority
WO
WIPO (PCT)
Prior art keywords
subscriber
identifier
call
lists
list
Prior art date
Application number
PCT/EP2007/058192
Other languages
German (de)
English (en)
Inventor
Walter Klausberger
Christof STÖRMANN
Janna Vossnacker
Original Assignee
Nokia Siemens Networks Gmbh & Co. Kg
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Siemens Networks Gmbh & Co. Kg filed Critical Nokia Siemens Networks Gmbh & Co. Kg
Publication of WO2008019972A1 publication Critical patent/WO2008019972A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier

Definitions

  • Each subscriber of the communication network is assigned a unique identifier for switching a call in the network.
  • the identifier can be transmitted in the call signal in unencrypted form as the first identifier to the subscriber to be called.
  • the identifier is transmitted in the call signal as a second, anonymized identifier in encrypted form to the subscriber to be called.
  • one or more of the subscribers are respectively assigned lists which comprise one or more first and one or more second lists, wherein the first lists contain first identifiers of other subscribers and the second lists contain second identifiers of others Contain participants.
  • a step b) when a call is placed, a check is made as to whether the identifier in the call signal agrees with a subscriber in the lists of the called subscriber. If a match is found in step b), the call is processed in step c) by the called party depending on the list in which the match is present. The processing takes place in this case in particular by the called subscriber himself, but may also be carried out by a separate unit in the network.
  • the method according to the invention is based on the recognition that the anonymized, second identifiers can also be processed in the same way as the unencrypted first identifiers by generating lists for the second identifiers, analogous to the first identifiers, in which the anonymized identifiers are stored. In this case, in the determination of a match between the second identifiers of call signal and list corresponding further processing steps are performed.
  • step b) it is first determined in step b) whether the identifier in the call signal is a first or second identifier, wherein in the case of a first identifier checks whether the identifier in the call signal with a first identifier in the or matches the first lists of the called party and, in the case of a second identifier, checks to see if the identifier in the calling signal matches a second identifier in the called party's second list or lists. In this way, it is ensured that only those lists are searched, in which also only a corresponding identifier of the call signal can be contained.
  • At least one second list of a subscriber in each case contains at least those identifiers in encrypted form, which are contained in unencrypted form in a first list of the subscriber.
  • At least one second list of a subscriber at least partially contains second identifiers, which are not identifiers in encrypted form from the first lists of the subscriber.
  • second identifiers which are not identifiers in encrypted form from the first lists of the subscriber.
  • a particularly preferred embodiment of the method according to the invention is characterized by the following features: the lists are each assigned a category from a plurality of categories, the plurality of categories comprising a first category and a second category; a call from a calling party is put through if it is determined in step b) above that the lis- in which the match is in the first category; a call from a calling subscriber is blocked if it is determined in the above step b) that the list in which the match exists belongs to the second category.
  • the whitelists and blacklists mentioned at the outset can be realized by subscribers, whitelists being those subscribers whose calls are desired, and on the blacklists subscribers with whom communication is not desired.
  • other categories may also be provided, in particular a third category, which is characterized in that a call from a calling subscriber is forwarded to a mailbox of the called subscriber, if it is determined in the above step b) that the list in which the Match, belongs to the third category.
  • This also takes into account subscribers whose calls are undesirable but who, if appropriate, attempt to transmit important information. This information can be cached by using a mailbox and retrieved later by the called party.
  • a criterion according to which the call is placed to the called party if the criterion is met a criterion according to which the call is forwarded to a called party's mailbox if the criterion is met.
  • the blocking criterion and / or the further criteria are determined individually for each called subscriber, wherein the criteria are preferably defined by the called subscriber himself. In this way, it is taken into account that for each participant or for the operators of the participants there are different circumstances which result in that calls which a participant classifies as unwanted are regarded by other participants as quite desirable.
  • step b) in the event that a call with a call signal without identifier is transmitted to the called subscriber and / or that no match is found for the identifier of the calling subscriber in step b) above, one of the following processing steps is executed : the call is blocked; the call is subjected to a checking test, in which it is determined whether the calling subscriber meets predetermined criteria, wherein the call is passed to the called subscriber in the fulfillment of the criteria;
  • test tests can be configured as desired. In particular, already known from the prior art test tests be used, such.
  • Turing test according to which it can be distinguished whether a call is made by a human person or automatically by a computer.
  • a call signal is generated with a second identifier in an exchange, namely in that the first identifier of an incoming call in the exchange with an encryption method, which is for example the above hash algorithm, in the second identifier is converted and the first identifier is replaced in the call signal by the second identifier.
  • a call signal with a second identifier is generated, in particular, when an identifier or telephone number suppression function is activated by the calling subscriber.
  • the method according to the invention can be carried out in any communication network, in particular also in a communication network, which at least partially comprises a packet-based network, e.g. An IP network, and / or a circuit-based telephone network.
  • a packet-based network e.g. An IP network
  • a circuit-based telephone network e.g.
  • the invention further relates to a communication network having a plurality of subscribers, in which each subscriber is assigned a unique identifier for switching a call in the network, wherein for one or more of the calling subscribers
  • FIG. 2 shows a flowchart which clarifies the sequence of the method according to the invention.
  • VoIP Voice over IP
  • a conversion between the packet-based transmission and the line-based transmission in the public network takes place at the corresponding gateways.
  • the participants of the communication network can also be associated with smaller network units, such.
  • B. local area networks in the form of LANs (LAN Local Area Network).
  • a scenario is shown, in which the communication network K is a packet-based network, in the IP telephony via VoIP between two participants Tl and T2 to be carried out.
  • a call establishment must first take place via an appropriate signaling between the subscribers.
  • SIP Session Initiation Protocol
  • Each subscriber in the network is assigned a unique identifier for unique identification of the subscriber.
  • the unique identifier of a caller is transmitted to the subscriber to be called when establishing the call.
  • the call setup between a calling party Tl back to a called party T2 is shown schematically.
  • CLIR Calling Line Identification Restriction
  • the identifier of the subscriber eg the subscriber's telephone number
  • a message is output which indicates that the subscriber is not known.
  • the CLIR function is ensured in the communication network K of FIG. 1 via the exchange V.
  • the exchange V When establishing the call, the exchange V first receives from the calling party Tl a SIP Invite message containing the identifier IDl from the subscriber Tl. This message is designated Sl in FIG.
  • the SIP Invite message S1 is processed in the switching center V in such a way that the identity ID1 is converted into an anonymized identity CID1 with the aid of an algorithm.
  • This is represented in FIG. 1 by a relation represented by a double arrow.
  • the conversion preferably takes place with a hash algorithm, for example with the MD5 algorithm well known from the prior art. Any other hash Algorithms, such.
  • the purpose of the method according to the invention is to enable identification, even in the case of anonymized transmission of identifiers, as to whether the call is desired to the called subscriber or whether it is a so-called SPIT call.
  • SPIT is an unwanted call (spam) that is transmitted via IP telephony.
  • the subscriber T1 has the whitelist WL1 and the blacklist BL1.
  • the whitelist WL2 and the blacklist BL2 are stored in the subscriber T2.
  • the unencrypted identifiers are stored by other subscribers whose calls are desired. The calls from subscribers to the whitelists should therefore be accepted by the called party or put through to it.
  • the whitelists can be created in any way. For example, all identifiers of subscribers that the respective subscriber has already contacted in the past can be automatically recorded.
  • the identifiers can be deposited, which are located in the address book of the subscriber. On the blacklists are again participants, with those on no case a contact is desired. These lists can also be generated in any manner, for example, unwanted identifiers can be manually stored. Likewise, databases can be accessed automatically, in which identifiers are deposited by subscribers who usually make SPIT calls. These may be, for example, subscribers known to make calls for promotional purposes.
  • the called party can check, by comparing the identifier in the SIP Invite message with its identifiers in the whitelists or blacklists, whether the caller is on a the list is located. If the caller is on the whitelist, he will definitely be accepted by the subscriber. If the caller is on the blacklist, he will definitely be rejected by the participant. If the case now arises that the caller is not included in any list, predetermined further processing steps can be initiated in the called subscriber. For example, an unknown calling party can generally be rejected, or the call of an unknown party can generally be accepted.
  • SPIT probability indicates how likely the call is to be spam.
  • the SPIT probability can be calculated, for example, by the methods described in German patent applications DE 102005046375.4 and DE 102006010153.7.
  • Another test might be to check that the calling party has deposited a deposit. In the event that a deposit has actually been deposited, it is assumed that the call is not spam.
  • the blacklists or whitelists with the anonymized identifiers are processed in the same way as the blacklists or whitelists with unencrypted identifiers in plain text. If a call with an anonymous encrypted identifier arrives at a subscriber, it is checked whether it is on a blacklist or whitelist with encrypted identifiers. If this is the case, the call is accepted (if the identifier is on the whitelist) or the call is blocked (if the identifier is on the blacklist). In the event that the identifier is not found in a corresponding whitelist or blacklist, the procedure is analogous, as described above with respect to the blacklists or whitelists with unencrypted identifiers. In particular, further tests for identifying the subscriber can be carried out or the SPIT probability of the subscriber can be checked.
  • the generation of the anonymized whitelists CWL1, CWL2 or the anonymized blacklists CBL1, CBL2 can take place in any desired manner.
  • all entries in the non-anonymized whitelists WL1, WL2 and in the non-anonymized blacklists BL1, BL2 are anonymized using the same algorithm used in the exchange V for anonymization.
  • a correspondingly anonymized whitelist or blacklist is thus generated for each whitelist or blacklist.
  • all subscribers who are treated as desired or undesirable when the telephone number suppression is deactivated can also be treated in the same way when activating the telephone number suppression.
  • the anonymized blacklists or whitelists may, if appropriate, also be generated differently or else by further anonymized ones
  • Identifiers are added, which are communicated in another way to the appropriate participant. For example, two people who use different participants They want to have their calls mutually classified as wanted calls, but they always want to have the phone number suppression enabled. In such a case, the persons transmit their anonymized telephone numbers on other communication channels than via telephone and include them in their whitelists. If necessary, the anonymized identifiers can also be communicated by the network operator to persons known to one another. Thus, it is not essential for a subscriber to know the encryption algorithm for creating anonymized identifiers in order to keep lists of encrypted identifiers.
  • an option can be integrated with which it is determined how to deal with subscribers who do not transmit any identifiers at all.
  • Possible alternatives are that such calls without identifiers are generally blocked.
  • a band announcement can be activated in which it is communicated that callers without identifiers are not put through.
  • the participant without qualifier could be subjected to a proof test, as described above for participants with unknown identifiers.
  • the call can be put through or blocked.
  • FIG. 2 shows a flow chart which again reproduces the essential method steps of the method according to the invention.
  • SIOL a SIP Invite message arrives in the form of a call signal at a called party.
  • step S106 is entered.
  • the SPIT check described above is performed using SPIT probabilities. If the SPIT check reveals that the call is not SPIT (arrow NOSPIT), it is accepted by the subscriber (step S107). Optionally, the identifier of this subscriber may also be included in a corresponding anonymized whitelist (step S108). However, if the check in step S106 shows that the call is SPIT, the call is blocked or rejected by the subscriber in step S109 and optionally added to a corresponding blacklist in step SI10.
  • step S111 it is checked in step S111 whether the subscriber is on a non-anonymized whitelist or a non-anonymized blacklist. If it is on a whitelist (arrow WL), it goes to step S104, that is, the call is accepted. If the call is on a blacklist (arrow BL), step S105 is entered. and the call is rejected or blocked. If the subscriber is neither on a non-anonymized whitelist nor on a non-anonymized blacklist, then move to step S106, which has already been described above. In this step, a SPIT check with the help of SPIT probabilities is again carried out with the non-anonymized identifier.
  • the call is accepted in step S107 and the identifier may be whitelisted. If, on the other hand, the call is SPIT, it is rejected in step S109 and optionally added to a corresponding blacklist in step S110.
  • the control over which calls are blocked or accepted and, if appropriate, forwarded to a mailbox is preferably carried out exclusively by the users themselves. It is hereby avoided that a desired caller is inadvertently classified by a third party as SPIT, since the whitelists with the desired callers are managed by the subscriber himself. Due to the independent management of the blacklists and whitelists by the participants, the inventive method also works when roaming in mobile networks, and even a change to another network operator is very simple, since a participant deposited with him SPIT filters in the form of blacklists and Whitelists can take. In a variant of the invention, it is also possible that the address book of a subscriber is always used as a standard whitelist.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé de traitement assisté par ordinateur d'appels entre des abonnés (T1, T2) dans un réseau de communication (K) dans lequel un identifiant univoque est associé à chaque abonné (T1, T2) pour l'établissement d'un appel dans le réseau, l'identifiant pouvant être transmis pour un ou plusieurs des abonnés appelants (T1) dans le signal d'appel en tant que premier identifiant (ID1) sous forme non codée à l'abonné appelé (T2), et l'identifiant pouvant être transmis pour un ou plusieurs des abonnés appelants (T1) dans le signal d'appel en tant que second identifiant (CID1) rendu anonyme, sous forme codée à l'abonné appelé (T2). Selon l'invention : a) à un ou plusieurs des abonnés (T1, T2) sont associées respectivement plusieurs listes qui comprennent une ou plusieurs premières listes ou une ou plusieurs secondes listes (WL1, BL1, CWL1, CBL1, WL2, BL2, CWL2, CBL2), les premières listes (WL1, BL1, WL2, BL2) contenant de premiers identifiants (ID1) d'autres abonnés et les secondes listes (CWL1, CBL1, CWL2, CBL2) contenant de seconds identifiants (CID1) d'autres abonnés; b) lors de l'établissement de l'appel, il est vérifié si l'identifiant (ID1, CID1) contenu dans le signal d'appel concorde avec un identifiant (ID1, CID1) contenu dans les listes (WL1, BL1, CWL1, CBL1, WL2, BL2, CWL2, CBL2) de l'abonné appelé (T2); c) au cas où l'étape b) indique une concordance, l'appel est traité en fonction de la liste dans laquelle figure la concordance.
PCT/EP2007/058192 2006-08-16 2007-08-07 Procédé de traitement assisté par ordinateur d'appels entre des abonnés dans un réseau de communication WO2008019972A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE200610038141 DE102006038141A1 (de) 2006-08-16 2006-08-16 Verfahren zur rechnergestützten Verarbeitung von Anrufen zwischen Teilnehmern in einem Kommunikationsnetz
DE102006038141.6 2006-08-16

Publications (1)

Publication Number Publication Date
WO2008019972A1 true WO2008019972A1 (fr) 2008-02-21

Family

ID=38754641

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/058192 WO2008019972A1 (fr) 2006-08-16 2007-08-07 Procédé de traitement assisté par ordinateur d'appels entre des abonnés dans un réseau de communication

Country Status (2)

Country Link
DE (1) DE102006038141A1 (fr)
WO (1) WO2008019972A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011154221A1 (fr) * 2010-06-11 2011-12-15 International Business Machines Corporation Système, procédé et produit programme d'ordinateur destinés à filtrer des communications téléphoniques

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040208304A1 (en) * 2003-04-18 2004-10-21 Larry Miller Telephone call control system and methods

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7269731B2 (en) * 2003-01-29 2007-09-11 Hewlett-Packard Development Company, L.P. Message authorization system and method
US20050004881A1 (en) * 2003-03-05 2005-01-06 Klug John R. Method and apparatus for identifying, managing, and controlling communications

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040208304A1 (en) * 2003-04-18 2004-10-21 Larry Miller Telephone call control system and methods

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
PETERSON NEUSTAR C JENNINGS CISCO SYSTEMS J: "Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP); draft-ietf-sip-identity-06.txt", IETF STANDARD-WORKING-DRAFT, INTERNET ENGINEERING TASK FORCE, IETF, CH, vol. sip, no. 6, 24 October 2005 (2005-10-24), XP015042702, ISSN: 0000-0004 *
ROSENBERG C JENNINGS CISCO J PETERSON NEUSTAR J: "The Session Initiation Protocol (SIP) and Spam; draft-ietf-sipping-spam-01.txt", IETF STANDARD-WORKING-DRAFT, INTERNET ENGINEERING TASK FORCE, IETF, CH, vol. sipping, no. 1, 17 July 2005 (2005-07-17), XP015040689, ISSN: 0000-0004 *

Also Published As

Publication number Publication date
DE102006038141A1 (de) 2008-02-21

Similar Documents

Publication Publication Date Title
DE102005029287A1 (de) Verfahren zum Unterbinden einer Vermittlung von unerwünschten Telefonanrufen
DE102006023924A1 (de) Verfahren zur Identifizierung von unerwünschten Telefonanrufen
DE102006004202B4 (de) Verfahren zum Schutz von SIP basierten Anwendungen
EP3211873B1 (fr) Procédé d'établissement d'un appel
EP1929758B1 (fr) Procede d'actionnement d'au moins une mesure d'ecoute supplementaire dans au moins un reseau de communication
WO2007036400A1 (fr) Procede et dispositifs pour empecher la reception de messages indesirables dans un reseau de communication sur ip
EP3629567A1 (fr) Procédé de suppression automatisée des appels téléphoniques pourriels
DE102006054284A1 (de) Verfahren und System für ein Erreichbarkeitsmanagement
WO2008019972A1 (fr) Procédé de traitement assisté par ordinateur d'appels entre des abonnés dans un réseau de communication
EP1848188A1 (fr) Procédé permettant l'écoute d'une conversation dans un réseau point à point
DE102004055494B4 (de) Verfahren zur Weiterleitung eines Rufes in einem der direkt kommunizierenden Kommunikationsnetzwerk und Kommunikationskomponente für ein direkt kommunizierendes Kommunikationsnetzwerk
DE19739981C2 (de) Verfahren zur Abwicklung von Fernmeldeverbindungen über eine öffentliche Vermittlungsstelle
DE60316229T2 (de) Verfahren und Vorrichtung zur Verbindung von Teilnehmern einer Gruppe von Kommunikationsendgerätebenutzern
DE10254620B4 (de) Mehrfachregistrierung in Telefonsystemen
DE102006012658A1 (de) Verfahren und Vorrichtung zur Erkennung von Spam over Internet Telephony-Nachrichten versendenden Teilnehmern, abgekürzt SPIT-Versender, in einem IP-Kommunikationsnetzwerk
EP1892939A1 (fr) Procédé et système destinés à la réalisation d'un réseau de communication
EP2198580B1 (fr) Procédé et dispositif pour établir une communication voix sur ip
WO2007118851A1 (fr) Procédé de détermination d'appels téléphoniques indésirés
WO2007039350A1 (fr) Procede et dispositifs pour empecher la reception de messages indesirables dans un reseau de communication ip
DE10235833B4 (de) Betriebsverfahren und TK-Anlage
DE102006029013A1 (de) Verfahren zum automatisierten Aufnehmen von Adressen in eine Liste akzeptierter Sender in einem Kommunikationssystem
DE102008058344A1 (de) Individuelle netzbasierte Kommunikationssteuerung
DE102008052948A1 (de) Verfahren zur Kommunikation mittels einer Vermittlungseinrichtung sowie Vermittlungseinrichtung
DE102007033046A1 (de) System und Verfahren zum Kontaktieren eines Teilnehmers in einem Telekommunikationsnetz
DE102005055100A1 (de) Verfahren zur Behandlung einer Kommunikationsanforderung

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07788291

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: RU

122 Ep: pct application non-entry in european phase

Ref document number: 07788291

Country of ref document: EP

Kind code of ref document: A1