WO2008040539A1 - A method for establishing a connection oriented communication after screening the call for desired characteristics - Google Patents

A method for establishing a connection oriented communication after screening the call for desired characteristics Download PDF

Info

Publication number
WO2008040539A1
WO2008040539A1 PCT/EP2007/008610 EP2007008610W WO2008040539A1 WO 2008040539 A1 WO2008040539 A1 WO 2008040539A1 EP 2007008610 W EP2007008610 W EP 2007008610W WO 2008040539 A1 WO2008040539 A1 WO 2008040539A1
Authority
WO
WIPO (PCT)
Prior art keywords
caller
request
connection
callee
establishing
Prior art date
Application number
PCT/EP2007/008610
Other languages
French (fr)
Inventor
Martin Stiemerling
Thomas Dietz
Sandra Tartarelli
Thilo Ewald
Enrico Giakas
Jürgen QUITTEK
Saverio Niccolini
Heinrich Stüttgen
Marcus Brunner
Original Assignee
Nec Europe Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Europe Ltd. filed Critical Nec Europe Ltd.
Publication of WO2008040539A1 publication Critical patent/WO2008040539A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention

Definitions

  • the invention relates to a method for establishing a connection oriented communication, preferably in the form of a telephone connection via the Internet, between a first communication partner as calling party, caller, and a second communication partner as called party, callee, wherein the caller directs a request for establishing a connection to the callee.
  • SPAM In the area of electronic mail unsolicited bulk email messages - so-called SPAM - have become very common and have turned into a severe problem. Not only companies that require email communication are impacted by SPAM messages, but also private users are very annoyed by SPAM. Many Internet users nowadays receive more SPAM messages than regular emails. For this reason, almost every server for incoming email uses SPAM filters which check incoming mails according to defined rules. They search, for example, actively for key words in the content of an email, they check specific configurations of the server used for sending the email or they search for senders that are often used for sending bulk emails. In case of a matching classification of an email as SPAM, it is marked and/or sorted out.
  • SPAM In the area of telephone communication, analog or digital, SPAM also occurs increasingly, which occurs there, for example, as unsolicited commercial calls, and which is generally designated as SPIT (SPAM over Internet Telephony). These calls are mostly placed by automated calling machines. Due to the currently and mainly employed switched telephone networks, such SPAM calls are very cumbersome and expensive which is the reason for a rather restricted number of SPAM calls. When Internet telephony will be used more commonly though, such SPAM calls will become much easier and cheaper, so a tremendous increase of SPAM calls will have to be assumed. Therefore, also here a respective filtering of the calls according to certain rules is necessary.
  • the aforementioned object is accomplished by a method comprising the features of claim 1.
  • a method comprising the features of claim 1.
  • such a method is characterized in that on the side of the callee, after receiving the request for establishing a connection, initially the origin of the request is checked, and based on the result of the analysis it is decided whether to establish a connection, or to decline the request temporarily.
  • the invention it has first been recognized that a method for avoiding undesired communication connections has to get involved already before the actual establishment of the connection.
  • initially the arrival of a request for a connection establishment is awaited.
  • the establishment of a connection is initially deferred and an analysis of the origin of the request is performed.
  • it is checked in the context of the analysis whether the caller is known to the callee. Requests for communication establishment from known parties can generally be classified as non critical. Accordingly, the connection can always be established for those callers already known in advance.
  • a list is maintained on the side of the callee, which could be designated as white list, and in which callers are listed, which are known to the callee, e.g. due to calls made in the past.
  • a temporary declining of the incoming request may be provided.
  • Bot-Networks a large set of network computers, which have been modified by spammers in an illegal manner. Spammers use security gaps of the network computers for this purpose to install SPAM software on them. This is typically performed without being noticed by the regular operator of the computer.
  • spammers use software, which performs an automatic penetration into the computers, thus generating Bot-networks, which can easily comprise several thousand computers. Since these computers are generally not known to the callee, a temporary declining of connection requests from unknown callers constitutes an efficient SPIT suppression.
  • a reverse DNS (domain name system) resolution can be attempted.
  • requests from unknown callers are not declined temporarily in general, but only when the DNS resolution proves to be unsuccessful.
  • the caller is informed about the temporary declining of its request.
  • the caller can furthermore be informed about the reason for being declined, i.e. it can be communicated to the caller that the request has been declined for the purpose of avoiding SPAM calls.
  • a waiting period and a subsequent time window for a second call of the caller can be set.
  • the length of the wait period as well as the length of the time window can be determined as freely configurable parameters. It may furthermore be provided, that the caller is asked to send a second request for establishing a connection within the predetermined time window.
  • a caller which performs a second request within the predetermined time window, is entered into a white list.
  • this party can thus be considered as known, and the connection can be directly established without further checks.
  • the signaling protocol for the connection oriented communication which, e.g., can be the Session Initiation Protocol (SIP), is extended by an explicit signal.
  • SIP Session Initiation Protocol
  • this signal is sent from the callee to the caller.
  • the signal can be sent to the caller by a signaling server on the signaling path of the respective connection, or by any other suitable network entity located on the signaling path.
  • the caller is informed about the temporary declining of its request.
  • the sender of the signal stores an identification of the caller.
  • this identification can be, e.g., the address of the caller.
  • an identification of one of the signaling servers, which have passed on the request for establishing a connection can be stored. On the side of the caller, it may be provided that it automatically sends a second request for establishing a connection within the predetermined time window, when receiving the signal.
  • the caller does not send a second request for establishing a connection within the predetermined time window, it may be provided that the stored identification of the caller is deleted. In other words, the caller is again listed in some kind of gray list. This means that in case of a new request the procedure of origin checking is performed again, before determining whether a connection is established.
  • a label is assigned to the caller, which is added to the signal.
  • the establishment of a connection upon the second request for establishing a connection can then be based on the fact of whether or not the caller uses its assigned label.
  • a challenge to the signal.
  • the establishment of the connection upon the second request for connection establishment can then be based on the fact of whether or not the caller has resolved the challenge.
  • the challenge can be performed e.g. as a mathematical puzzle, or as any other question, which is selected in such a way that it can be resolved by software used to generate SPIT only with a certain time effort.
  • the caller is initially asked with a recorded voice message to send another request for establishing a connection within the predetermined time window.
  • the recorded voice message can furthermore comprise the information that the refusal constitutes a measure for avoiding SPAM calls.
  • the voice message can be recorded in several different languages. If the request for establishing a connection comprises information with respect to the language preferred by the caller, which can e.g. be supported by the Session Initiation Protocol (SIP), the recorded message can be played in the respective language, in order to assure that the caller understands the message.
  • SIP Session Initiation Protocol
  • the callee can distribute number codes to potential calling parties as a precaution.
  • it can be checked if the caller has a valid number code. If this is the case, a connection is established, otherwise the call is declined.
  • a white list can be generated by the callee as a precaution, in which those callers are listed, whose calls are not to be identified as SIP.
  • an unknown caller is requested to leave a message on a voice mail box of the callee.
  • a rerouting of a call can be performed onto the voice mail box for each call of an unknown caller. It is also conceivable that a rerouting is only performed, when the caller has previously selected this option, e.g. through using dial tones.
  • a telecommunications service provider can provide the described functions in an advantageous manner to its customers as an added value service, or as a service to be billed separately, or together with other services.
  • Fig. 1 shows an embodiment of a method according to the invention for establishing an internet telephone communication between two communication partners
  • Fig. 2 shows an embodiment of a time structure for an identification of SPIT calls.
  • Fig. 1 schematically shows an embodiment of a method according to the invention for establishing an internet telephone connection between a caller 1 and a callee 2.
  • the entire functionality for avoiding the connection of SPIT calls is implemented in a signaling server 3, which is located in the signaling path between the communication partners 1 , 2, and in front of the terminal of the callee 2. It is appreciated that the functionality for avoiding SPIT can also be implemented directly in the terminal of the callee 2 in another embodiment.
  • the caller 1 initially sends a request A for establishing a connection to the callee 2. This can be performed e.g. based on the Session Initiation Protocol (SIP).
  • SIP Session Initiation Protocol
  • the SPIT defense system 3 checks the origin of the request, or by comparing the address of the caller 1 with the stored addresses of callers, known to the callee 2.
  • callers can e.g. be defined as known, when they have already previously successfully placed a call with the callee 2.
  • the callee 2 can define permitted callers also in the form of a white list.
  • a connection is immediately established. This means the call is connected to the callee 2.
  • the caller 1 is a caller, who has not been known so far.
  • the employed signaling protocol is expanded by a signal, which is transmitted by the SPIT defense system 3 (or alternatively by the terminal of the callee 2) to the terminal of the caller 1.
  • the signal designated with B in Fig. 1 , communicates to the caller 1 , that the call has been declined in a preliminary manner, and asks the caller to call again at a later point in time.
  • the request can furthermore comprise the specification of a time window and read accordingly: "Please call again within the next five minutes (within the next hour)".
  • the sender of the signal B stores an identifier of the caller 1 , or its terminal, or an identifier of one of the signaling servers, which have routed the request for establishing a connection. Storing an identifier serves for later identification of a second calling attempt.
  • the second call if it is performed within the specified time window, will pass the SPIT defense system and will cause that the terminal of the callee sends a ring tone.
  • the second call is designated in Fig. 1 with the designation C.
  • the successful establishment of a connection with the callee 2 is designated with a designation D.
  • the described approach requires a standardization of the signal B, which is sent from the callee 2 to the caller 1 , and an expansion of the user interface of the terminal of the caller 1 in order to show the received signal to the caller and possibly to provide a mechanism for automatic generation of a second calling attempt. According to an alternative approach, this is less convenient for the caller 1 , but does not require a standardization of signals.
  • the SPIT defense system is provided so that a call from an unknown caller is established, however, only for the purpose to transmit a recorded language message from the callee 2, asking the caller 1 to call again within a predetermined time window.
  • Fig. 2 shows a time axis in a schematic illustration, showing the time based operation of a SPIT defense system in an exemplary manner.
  • a first call attempt of a caller 1 comes in at the callee 2. Since the caller 1 is not known to the callee 2, the call is initially declined as described above in detail, and a waiting time and a subsequent time window for a second call attempt of the caller 1 is determined. In a practical application, a point time, t1 , and a point in time, t2, are determined. A new calling attempt of a caller within the time interval between the points in time to and t1 is finally declined.
  • the address of a party 1 calling again between the points in time t1 and t2 can, on the one hand, be stored on the side of the callee 2 in a white list, and future calls of this party can be connected with the callee 2 without further checking.
  • the time window has expired, this means after the point in time t2, the stored address of the caller 1 is deleted.
  • a second call occurring after the point in time t2 of the caller 1 is thus treated like a first call, and has to go through the SPIT check again.

Abstract

A method for establishing a connection oriented communication, preferably in the form of a telephone connection via the Internet, between a first communication partner as calling party, caller (1), and a second communication partner as called party, callee (2), wherein the caller (1) directs a request for establishing a connection to the callee (2), is characterized with respect to effectively suppressing SPAM calls with minimum interference of normal telephone operations in that on the side of the callee (2), after receiving the request for establishing a connection, initially the origin of the request is checked, and based on the result of the analysis it is decided whether to establish a connection, or to decline the request temporarily. Feature is known in the field of SPIT, SPAM over IP or more generally as an unsolicited multimedia call as Greylisting (or Graylisting).

Description

A METHOD FOR ESTABLISHING A CONNECTION ORIENTED
COMMUNICATION
The invention relates to a method for establishing a connection oriented communication, preferably in the form of a telephone connection via the Internet, between a first communication partner as calling party, caller, and a second communication partner as called party, callee, wherein the caller directs a request for establishing a connection to the callee.
In the area of electronic mail unsolicited bulk email messages - so-called SPAM - have become very common and have turned into a severe problem. Not only companies that require email communication are impacted by SPAM messages, but also private users are very annoyed by SPAM. Many Internet users nowadays receive more SPAM messages than regular emails. For this reason, almost every server for incoming email uses SPAM filters which check incoming mails according to defined rules. They search, for example, actively for key words in the content of an email, they check specific configurations of the server used for sending the email or they search for senders that are often used for sending bulk emails. In case of a matching classification of an email as SPAM, it is marked and/or sorted out.
In the area of telephone communication, analog or digital, SPAM also occurs increasingly, which occurs there, for example, as unsolicited commercial calls, and which is generally designated as SPIT (SPAM over Internet Telephony). These calls are mostly placed by automated calling machines. Due to the currently and mainly employed switched telephone networks, such SPAM calls are very cumbersome and expensive which is the reason for a rather restricted number of SPAM calls. When Internet telephony will be used more commonly though, such SPAM calls will become much easier and cheaper, so a tremendous increase of SPAM calls will have to be assumed. Therefore, also here a respective filtering of the calls according to certain rules is necessary.
Many methods, which are being used in the context of email SPAM filters, cannot be transferred to the area of telephone communications, or can only be transferred with significant modifications. The reason for this is the different nature of the two types of communication. While email uses an asynchronous data transfer, in which the entire content can be examined, and in which a delay in the transmission is acceptable, telephone calls and similar forms of communication require the establishment of real time communication sessions. Thus, neither the content can be examined, nor delays can be tolerated.
It is therefore an object of the present invention to improve and further develop a method of the initially described type for establishing a connection oriented communication in such a way, that unsolicited SPAM calls can be effectively prevented, wherein the regular telephone operation shall be influenced as little as possible and a disturbance of telephone communication participants shall be mostly avoided.
In accordance with the invention, the aforementioned object is accomplished by a method comprising the features of claim 1. According to this claim, such a method is characterized in that on the side of the callee, after receiving the request for establishing a connection, initially the origin of the request is checked, and based on the result of the analysis it is decided whether to establish a connection, or to decline the request temporarily.
According to the invention, it has first been recognized that a method for avoiding undesired communication connections has to get involved already before the actual establishment of the connection. According to the invention, initially the arrival of a request for a connection establishment is awaited. After receiving the request for a connection establishment, the establishment of a connection is initially deferred and an analysis of the origin of the request is performed. Then, based on the result of the analysis, a decision is made whether to establish a connection, or whether to decline the request on a temporary basis. Since an origin analysis can be performed rather quickly, there are no significant delays and the communication operation between the communication participants is only influenced minimally. A request for a communication establishment from a dubious origin, which raises the suspicion that it could be a SPIT call, is declined according to the invention only on a temporary basis, whereby - in contrast to the situation where it is declined ultimately - the opportunity for further handling is given. In an advantageous manner, it is checked in the context of the analysis whether the caller is known to the callee. Requests for communication establishment from known parties can generally be classified as non critical. Accordingly, the connection can always be established for those callers already known in advance.
With respect to an efficient and fast familiarity check, it may be provided that a list is maintained on the side of the callee, which could be designated as white list, and in which callers are listed, which are known to the callee, e.g. due to calls made in the past.
In particular for the case that the check yields that the request comes from a caller, which is not known to the callee, a temporary declining of the incoming request may be provided. In this context, the fact is being used, that a major percentage of SPIT calls is generated by so-called Bot-Networks. Typically, a Bot-Network is a large set of network computers, which have been modified by spammers in an illegal manner. Spammers use security gaps of the network computers for this purpose to install SPAM software on them. This is typically performed without being noticed by the regular operator of the computer. Generally, spammers use software, which performs an automatic penetration into the computers, thus generating Bot-networks, which can easily comprise several thousand computers. Since these computers are generally not known to the callee, a temporary declining of connection requests from unknown callers constitutes an efficient SPIT suppression.
Moreover, in the context of analyzing the origin of the request, a reverse DNS (domain name system) resolution can be attempted. Depending on requirements and individual wishes of the callee, it may then be provided that requests from unknown callers are not declined temporarily in general, but only when the DNS resolution proves to be unsuccessful.
In a particularly advantageous manner, the caller is informed about the temporary declining of its request. In this context, the caller can furthermore be informed about the reason for being declined, i.e. it can be communicated to the caller that the request has been declined for the purpose of avoiding SPAM calls. Furthermore, in case of a temporary declining of an incoming request, a waiting period and a subsequent time window for a second call of the caller can be set. The length of the wait period as well as the length of the time window can be determined as freely configurable parameters. It may furthermore be provided, that the caller is asked to send a second request for establishing a connection within the predetermined time window. In the case that a second request of the caller is performed within the predetermined time window, it may be provided, that the connection with the callee is established. This measure takes advantage of the fact, that spammers use single computers generally only for short periods of time in order to avoid to be discovered by the regular operator of the computer. A typical spammer behavior is that spammers attempt to place as many SPAM calls as possible during the time in which they use the computers. For this reason spammers like to use so- called "fire-and-forget" approaches for SPIT production. This means that the further fate of the placed calls, in particular their connection status, is generally not followed- up any further by the spammers. Accordingly, it is very unlikely that SPIT calls generated in this manner are being repeated within the predetermined time window, so that by employing the described measure an efficient suppression of undesired communication connections is realized.
With respect to a long term usage of information once generated, it may be provided that a caller, which performs a second request within the predetermined time window, is entered into a white list. In case of future requests, this party can thus be considered as known, and the connection can be directly established without further checks.
In the context of a particularly preferred embodiment the signaling protocol for the connection oriented communication, which, e.g., can be the Session Initiation Protocol (SIP), is extended by an explicit signal. In case of a request for establishing a connection from an unknown caller, this signal is sent from the callee to the caller. Alternatively, the signal can be sent to the caller by a signaling server on the signaling path of the respective connection, or by any other suitable network entity located on the signaling path. Via the signal, the caller is informed about the temporary declining of its request. With respect to an easy identification of a potential second calling attempt, it may be provided that the sender of the signal stores an identification of the caller. In particular, this identification can be, e.g., the address of the caller. Alternatively, or additionally, an identification of one of the signaling servers, which have passed on the request for establishing a connection, can be stored. On the side of the caller, it may be provided that it automatically sends a second request for establishing a connection within the predetermined time window, when receiving the signal.
If the caller does not send a second request for establishing a connection within the predetermined time window, it may be provided that the stored identification of the caller is deleted. In other words, the caller is again listed in some kind of gray list. This means that in case of a new request the procedure of origin checking is performed again, before determining whether a connection is established.
With respect to a particularly high level of security it may be provided that a label is assigned to the caller, which is added to the signal. The establishment of a connection upon the second request for establishing a connection can then be based on the fact of whether or not the caller uses its assigned label.
Alternatively or additionally, it is conceivable to append a challenge to the signal. The establishment of the connection upon the second request for connection establishment can then be based on the fact of whether or not the caller has resolved the challenge. The challenge can be performed e.g. as a mathematical puzzle, or as any other question, which is selected in such a way that it can be resolved by software used to generate SPIT only with a certain time effort.
With respect to an implementation that is as simple as possible and which does not require any additional signaling, it may be provided that the caller is initially asked with a recorded voice message to send another request for establishing a connection within the predetermined time window. The recorded voice message can furthermore comprise the information that the refusal constitutes a measure for avoiding SPAM calls. The voice message can be recorded in several different languages. If the request for establishing a connection comprises information with respect to the language preferred by the caller, which can e.g. be supported by the Session Initiation Protocol (SIP), the recorded message can be played in the respective language, in order to assure that the caller understands the message.
With respect to a further improvement of security, the callee can distribute number codes to potential calling parties as a precaution. In case of a request for establishing a connection, it can be checked if the caller has a valid number code. If this is the case, a connection is established, otherwise the call is declined. Alternatively, a white list can be generated by the callee as a precaution, in which those callers are listed, whose calls are not to be identified as SIP.
In the context of another preferred embodiment, it is provided, that an unknown caller is requested to leave a message on a voice mail box of the callee. Thus, a rerouting of a call can be performed onto the voice mail box for each call of an unknown caller. It is also conceivable that a rerouting is only performed, when the caller has previously selected this option, e.g. through using dial tones.
A telecommunications service provider can provide the described functions in an advantageous manner to its customers as an added value service, or as a service to be billed separately, or together with other services.
There are several ways how to design and further develop the teaching of the present invention in an advantageous way. To this end, it is to be referred to the patent claims subordinate to patent claim 1 on the one hand and to the following explanation of preferred embodiments of the invention by way of example, illustrated by the figure on the other hand. In connection with the explanation of the preferred embodiment of the invention by the aid of the figure, generally preferred embodiments and further developments of the teaching will we explained. In the drawing,
Fig. 1 shows an embodiment of a method according to the invention for establishing an internet telephone communication between two communication partners, and Fig. 2 shows an embodiment of a time structure for an identification of SPIT calls.
Fig. 1 schematically shows an embodiment of a method according to the invention for establishing an internet telephone connection between a caller 1 and a callee 2. In the illustrated embodiment, the entire functionality for avoiding the connection of SPIT calls is implemented in a signaling server 3, which is located in the signaling path between the communication partners 1 , 2, and in front of the terminal of the callee 2. It is appreciated that the functionality for avoiding SPIT can also be implemented directly in the terminal of the callee 2 in another embodiment.
As it is apparent in Fig. 1 , the caller 1 initially sends a request A for establishing a connection to the callee 2. This can be performed e.g. based on the Session Initiation Protocol (SIP). The SPIT defense system 3 checks the origin of the request, or by comparing the address of the caller 1 with the stored addresses of callers, known to the callee 2. Thus, callers can e.g. be defined as known, when they have already previously successfully placed a call with the callee 2. The callee 2, however, can define permitted callers also in the form of a white list.
In case the check yields, that the caller 1 is a known, and thus a permitted party, a connection is immediately established. This means the call is connected to the callee 2. In Fig. 1 , the case is shown, where the caller 1 is a caller, who has not been known so far. For handling such calls, the employed signaling protocol is expanded by a signal, which is transmitted by the SPIT defense system 3 (or alternatively by the terminal of the callee 2) to the terminal of the caller 1. The signal, designated with B in Fig. 1 , communicates to the caller 1 , that the call has been declined in a preliminary manner, and asks the caller to call again at a later point in time. The request can furthermore comprise the specification of a time window and read accordingly: "Please call again within the next five minutes (within the next hour)".
The sender of the signal B stores an identifier of the caller 1 , or its terminal, or an identifier of one of the signaling servers, which have routed the request for establishing a connection. Storing an identifier serves for later identification of a second calling attempt. The second call, if it is performed within the specified time window, will pass the SPIT defense system and will cause that the terminal of the callee sends a ring tone. The second call is designated in Fig. 1 with the designation C. The successful establishment of a connection with the callee 2 is designated with a designation D.
However, if the second call is not placed within the specified time window, the stored identifier of the caller 1 is deleted again. A new calling attempt is correspondingly treated like a first calling attempt, and again has to go through a check by the SPIT defense system as described above.
The described approach requires a standardization of the signal B, which is sent from the callee 2 to the caller 1 , and an expansion of the user interface of the terminal of the caller 1 in order to show the received signal to the caller and possibly to provide a mechanism for automatic generation of a second calling attempt. According to an alternative approach, this is less convenient for the caller 1 , but does not require a standardization of signals. The SPIT defense system is provided so that a call from an unknown caller is established, however, only for the purpose to transmit a recorded language message from the callee 2, asking the caller 1 to call again within a predetermined time window.
Fig. 2 shows a time axis in a schematic illustration, showing the time based operation of a SPIT defense system in an exemplary manner. At the point in time, designated to, a first call attempt of a caller 1 comes in at the callee 2. Since the caller 1 is not known to the callee 2, the call is initially declined as described above in detail, and a waiting time and a subsequent time window for a second call attempt of the caller 1 is determined. In a practical application, a point time, t1 , and a point in time, t2, are determined. A new calling attempt of a caller within the time interval between the points in time to and t1 is finally declined. Calls within the time window, defined by the points in time, t1 and t2, however, are accepted. The address of a party 1 calling again between the points in time t1 and t2 can, on the one hand, be stored on the side of the callee 2 in a white list, and future calls of this party can be connected with the callee 2 without further checking. After the time window has expired, this means after the point in time t2, the stored address of the caller 1 is deleted. A second call occurring after the point in time t2 of the caller 1 is thus treated like a first call, and has to go through the SPIT check again.
Many modifications and other embodiments of the invention set forth herein will come to mind the one skilled in the art to which the invention pertains having the benefit of the teachings presented in the foregoing description and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims

C l a i m s
1. Method for establishing a connection oriented communication, preferably in the form of a telephone connection via the Internet, between a first communication partner as calling party, caller (1), and a second communication partner as called party, callee (2), wherein the caller (1 ) directs a request for establishing a connection to the callee (2), c h a r a c t e r i z e d i n that on the side of the callee (2), after receiving the request for establishing a connection, initially the origin of the request is checked, and based on the result of the analysis it is decided whether to establish a connection, or to decline the request temporarily.
2. Method according to claim 1 , wherein it is checked in the context of the analysis, whether the caller (1 ) is known to the callee (2).
3. Method according to claim 2, wherein a list is maintained on the part of the callee (2), in which callers are listed, which are known to the callee (2).
4. Method according to claim 2 or 3, wherein a request received by the callee (2) is temporarily declined, if the request comes from a caller (1 ), which is not known to the callee (2).
5. Method according to any of claims 1 to 4, wherein a request received by the callee (2) is temporarily declined, if a reverse DNS (domain name system) resolution of the address of the caller (1 ) is not successful.
6. Method according to any of claims 1 to 5, wherein the caller (1) is informed about the temporary declining of its request.
7. Method according to any of claims 1 to 6, wherein in case of a temporary declining of an incoming request, a waiting period and a subsequent time window of predeterminable lengths are determined for a second call of the caller (1 ).
8. Method according to claim 7, wherein the caller (1 ) is requested to send a second request for establishing a connection within the predetermined time window.
9. Method according to claim 7 or 8, wherein in case of a second request of the caller (1 ) within the predetermined time window, the connection with the callee (2) is established.
10. Method according to any of claims 7 to 9, wherein the caller (1 ) is entered into a white list, in case of a second request within the predetermined time window.
11. Method according to any of claims 2 to 10, wherein in the context of the signaling protocol for the connection oriented communication, a signal is provided, which in case of a request for establishing a connection from the side of an unknown caller (1), is sent to the caller (1), either by the callee (2), or by a signaling server in the signaling path of the respective connection.
12. Method according to claim 11 , wherein the sender of the signal stores an identification of the caller (1 ), or an identification of one of the signaling servers, which have forwarded the request for establishing a connection.
13. Method according to claim 11 or 12, wherein on the side of the caller (1 ), when receiving the signal, a second request for establishing a connection is automatically sent within the predetermined time window.
14. Method according to claim 12 or 13, wherein the stored identification of the caller (1) is deleted in case no second request for establishing a connection is transmitted by the caller (1) within the predetermined time window.
15. Method according to any of claims 11 to 14, wherein a label assigned to the caller (1 ) is added to the signal, wherein the connection, upon the second request for establishing a connection, is established only in case the caller (1 ) uses the assigned label.
16. Method according to any of claims 11 to 15, wherein a challenge is added to the signal, wherein the connection, upon the second request for establishing a connection, is established only in case the caller (1) has resolved the challenge.
17. Method according to any of claims 1 to 16, wherein the caller (1 ) is requested by means of a recorded voice message to send a new request for establishing a connection within the predetermined time window.
18. Method according to claim 17, wherein the recorded voice message is provided in several different languages.
19. Method according to claim 18, wherein on the part of the caller (1 ) a preferred language is designated in the context of the request for establishing a connection, and wherein the recorded voice message is played in the preferred language.
20. Method according to any of claims 1 to 19, wherein on the part of the callee (2) number codes are distributed to potential calling parties in advance, and wherein in case of a request for establishing a connection, a connection is established, if the analysis of the origin of the request yields that the caller (1 ) has a valid number code.
21. Method according to any of claims 1 to 20, wherein on the part of the callee (2) a white list is established in advance, and wherein in case of a request for establishing a connection, a connection is established, if the analysis of the origin of the request yields that the caller (1 ) is listed in the white list.
22. Method according to any of claims 1 to 21 , wherein an unknown caller (1) is requested to leave a message on the voice mail box of the callee (2).
23. Method according to any of claims 1 to 22, wherein the functions are provided by a telecommunications service provider to customers as a value added service, or as an additional chargeable service separately or bundled with other services.
PCT/EP2007/008610 2006-10-04 2007-10-04 A method for establishing a connection oriented communication after screening the call for desired characteristics WO2008040539A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE200610047275 DE102006047275A1 (en) 2006-10-04 2006-10-04 Method for establishing a connection-oriented communication
DE102006047275.6 2006-10-04

Publications (1)

Publication Number Publication Date
WO2008040539A1 true WO2008040539A1 (en) 2008-04-10

Family

ID=38922685

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2007/008610 WO2008040539A1 (en) 2006-10-04 2007-10-04 A method for establishing a connection oriented communication after screening the call for desired characteristics

Country Status (2)

Country Link
DE (1) DE102006047275A1 (en)
WO (1) WO2008040539A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729512A (en) * 2008-10-27 2010-06-09 成都市华为赛门铁克科技有限公司 Method, device, proxy server and terminal for filtering junk telephones
WO2010125815A1 (en) 2009-04-30 2010-11-04 日本電気株式会社 Illegal call detection apparatus, illegal call detection method, and illegal call detection program

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020128033A1 (en) * 1998-11-30 2002-09-12 Burgess Shelia Jean Communications control method and apparatus
US7330721B2 (en) * 2002-05-07 2008-02-12 Cisco Technology, Inc. Method and system for supporting non-intrusive and effective voice communication among mobile users
ES2238553T3 (en) * 2002-09-16 2005-09-01 Alcatel SS7 SIGNALING SERVER WITH ADVANCED INTEGRATED SIGNALING SERVICES.
US7269731B2 (en) * 2003-01-29 2007-09-11 Hewlett-Packard Development Company, L.P. Message authorization system and method
US20050186974A1 (en) * 2004-02-05 2005-08-25 Yigang Cai Short message service (SMS), multimedia message service (MMS), call screening and filtering
US20060135132A1 (en) * 2004-12-21 2006-06-22 Lucent Technologies, Inc. Storing anti-spam black lists
GB0428097D0 (en) * 2004-12-22 2005-01-26 Symbian Software Ltd Method and device for a time zone based call handling system
US7912192B2 (en) * 2005-02-15 2011-03-22 At&T Intellectual Property Ii, L.P. Arrangement for managing voice over IP (VoIP) telephone calls, especially unsolicited or unwanted calls
DE102005046376B4 (en) * 2005-09-28 2007-07-05 Siemens Ag Method and apparatus for preventing the reception of unwanted messages in an IP communication network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
EVAN HARRIS: "The Next Step in the Spam Control War: Greylisting", INTERNET CITATION, 21 August 2003 (2003-08-21), XP002446302, Retrieved from the Internet <URL:http://projects.puremagic.com/greylisting/whitepaper.html> [retrieved on 20070809] *
ROHWER T ET AL: "TNG White Paper: Abwehr von Spam over Internet Telephony (SPIT-AL)", INTERNET CITATION, 31 January 2006 (2006-01-31), XP007902521, Retrieved from the Internet <URL:http://www.spit-abwehr.de/Whitepaper_SPITAL_20060310.pdf> [retrieved on 20070615] *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729512A (en) * 2008-10-27 2010-06-09 成都市华为赛门铁克科技有限公司 Method, device, proxy server and terminal for filtering junk telephones
WO2010125815A1 (en) 2009-04-30 2010-11-04 日本電気株式会社 Illegal call detection apparatus, illegal call detection method, and illegal call detection program
US9338196B2 (en) 2009-04-30 2016-05-10 Nec Corporation Malicious call detection apparatus, malicious call detecting method and computer program for detecting malicious calls

Also Published As

Publication number Publication date
DE102006047275A1 (en) 2008-04-10

Similar Documents

Publication Publication Date Title
US10038779B2 (en) Intercepting voice over IP communications and other data communications
US8150002B2 (en) Method and apparatus for controlling unsolicited messaging in real time messaging networks
US11172064B2 (en) Emergency assistance calling for voice over IP communications systems
US6185288B1 (en) Multimedia call signalling system and method
US8675832B2 (en) System and method for unified messaging in inter/intranet telephony
JP5166244B2 (en) System and method for identifying a sender
US8223751B2 (en) Method and apparatus for controlling unsolicited messaging
EP2661024A2 (en) Extensions to SIP signalling to indicate spam
EP1675334A1 (en) Storing anti-spam black lists
US20100034121A1 (en) Method for repelling unwanted speech advertising for packet-oriented communication networks
EP1364520B1 (en) Methods ans systems for automatically registering complaints against calling parties
EP1980091A1 (en) Call screening for voip calls at gateway
CA2916217A1 (en) Determining a time to permit a communications session to be conducted
WO2004032471A1 (en) Multimedia pickup service
US20080112390A1 (en) Apparatus to override the redirect or reject feature at an SIP end point
US6363430B1 (en) Methods and systems for providing an absent addressing service to customers in a communications network
WO2008040539A1 (en) A method for establishing a connection oriented communication after screening the call for desired characteristics
CN101622815B (en) Dynamic key exchange for call forking scenarios
JP7414215B1 (en) Telephone number investigation device, investigation method, investigation program, and information provision system
CA2340260C (en) A method and apparatus for determining whether a fee is to be charged to a party initiating a telephone call
CN101836419B (en) Method and arrangement for providing voip communication
KR20110050731A (en) Protection against unsolicited communication for internet protocol multimedia subsystem

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07818689

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 07818689

Country of ref document: EP

Kind code of ref document: A1