WO2011079461A1 - Method for filtering unsolicited voice calls - Google Patents
Method for filtering unsolicited voice calls Download PDFInfo
- Publication number
- WO2011079461A1 WO2011079461A1 PCT/CN2009/076350 CN2009076350W WO2011079461A1 WO 2011079461 A1 WO2011079461 A1 WO 2011079461A1 CN 2009076350 W CN2009076350 W CN 2009076350W WO 2011079461 A1 WO2011079461 A1 WO 2011079461A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- voice call
- unsolicited
- call
- filtering
- token
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
Definitions
- the present invention relates generally to a method for processing voice calls in communications devices, and more particularly to an incoming voice call management method in voice communication subscriber devices, for example, in wireless cellular communications devices, some of which include tokens such as removable subscriber identification modules (SIM), and corresponding methods in messaging service subscriber devices.
- SIM removable subscriber identification modules
- the present invention relates to a token for filtering an unsolicited voice calls.
- the present invention relates to a system for filtering an unsolicited voice calls.
- Spam written messages such as Short Message Service (SMS) messages, Enhanced Messaging Service (EMS) messages, and Multimedia Messaging Service (MMS) messages.
- SMS Short Message Service
- EMS Enhanced Messaging Service
- MMS Multimedia Messaging Service
- PLMNs Public Land Mobile Networks
- unsolicited messages which are considered by some subscribers to be inconvenient and annoying, these messages are generally not a threat to the user as the user usually deletes it just after having read it and takes no further action.
- the spammers take advantage of the habit of the users to call back the phone number displayed on their handset as a missed call, even when the phone number is unknown. This habit leads to an efficient revenue generator for the spammers because of the huge amount of user phone numbers that are called by the spammers. To avoid being caught, the spammers change the premium rate number as often as possible making it almost impossible to filter these unsolicited calls, at the network level.
- the present invention provides a method for filtering an unsolicited voice call received by a communication device terminal including a token, the method comprising the steps of detecting the start of an incoming voice call and measuring the duration of the incoming voice call ringing.
- the method can comprise the step of comparing the duration of the incoming voice call ringing with at least a predetermined value.
- a positive unsolicited voice call statement to indicate if the incoming voice call is an unsolicited voice call, such as a "one-ring call".
- the method can comprise the step of informing the user of the communication device terminal by displaying the duration of the incoming voice call ringing duration and/or the unsolicited voice call statement.
- Another aspect of the invention provide a further step to the method by preventing the user to make an outgoing voice call towards the incoming voice call number if the unsolicited voice call statement indicates the incoming voice call is an unsolicited voice call.
- the step of preventing the user to make a phone call can first display on the screen of communication device terminal a warning message to give the opportunity to the user to process with the call even when the unsolicited voice call statement indicates the incoming voice call is an unsolicited voice call.
- the phone number the user wants to call can be compared to a list of unsolicited incoming voice call phone numbers that have been stored in a non volatile memory of the token.
- a list of unsolicited incoming voice call phone numbers can be updated upon a positive unsolicited voice call statement, by adding the unsolicited voice call phone number to a list of phone numbers in a Short-Call Elementary File.
- a list of unsolicited incoming voice call phone numbers can be updated upon a positive unsolicited voice call statement, by adding the unsolicited voice call phone number to a list of phone numbers in a Barred Dialing Number Elementary File.
- the invention also related to a token for filtering an unsolicited voice call comprising a non volatile memory and an input/output communication port for communicating with a communication device terminal through an interface link wherein upon reception of an Envelope (EVENT DOWNLOAD - MT Call) command on the input/output communication port, the method according to the invention is run on processing means of said token.
- Envelope EVENT DOWNLOAD - MT Call
- the invention also related to a system for filtering an unsolicited voice call, the system comprising a token and a communication device terminal connected to the token by a interface link, characterized in that at least one of the token or the communication device terminal is adapted to detect the start of an incoming voice call; and measure the duration of the incoming voice call ringing.
- Figure 1 shows a simplified schematic drawing of a communication device terminal communicatively connected on one side to a communication network and on another side to a token;
- Figure 2 shows the connections between the communication device terminal with the token
- Figure 3 A shows the data flow occurring between the communication network, the communication device terminal and the token in a first embodiment of the invention
- Figure 3B shows the data flow occurring between the communication network, the communication device terminal and the token in a second embodiment of the invention
- Figure 3C shows the data flow occurring between the communication network, the communication device terminal and the token in a third embodiment of the invention.
- a token 10 is connected through a communication device terminal 12 and a communication network 14 to a communication server 16.
- the communication server 16 refers in the following specification, to an electronic device including at least one data processing and controlling means and at least one memory hosting at least one applicative software that is accessible from outside.
- the token 10 should be understood as an electronic device having data processing and controlling means and means for communicating in at least the outward direction for example towards the communication device terminal 12, such as a handset, housing the token 10.
- the server 16 processes and broadcasts the communication between communication device terminals.
- the calls made by a spammer are processed and broadcasted through the server 16 to the communication device terminal 12.
- This server 16 can be connected to the communication network 14 through a wire or a wireless link 15.
- the communication network 14 can be a private or a public network and can be connected to the communication device terminal 12 through a wire or wireless link 13.
- this link 13 is a radiofrequency wireless link.
- the communication device terminal 12 provides a screen 17 for displaying information to the user.
- the communication device terminal 12 and the token 10 are coupled by way of at least one contact or of a contactless communication interface link 11.
- the communication device terminal 12 can be a handset or cellular phone, a personal digital assistant (PDA) or a wireless enabled laptop or notebook computer, etc.
- the token 10 can be chosen amongst a GSM Subscriber Identity Module (SIM) card, or a Universal Subscriber Identity Module (USIM) card, or some other removable module on which user specific information is stored such as a dongle device, a USB (Universal Serial Bus), SD (Secure Digital), or MMC (Multi-Media Card) device.
- SIM Global System for Mobile Communications
- USB Universal Serial Bus
- SD Secure Digital
- MMC Multi-Media Card
- the communication device terminal 12 is a handset and the token 10 is a removable smart card of the SIM or USIM type. Further, the handset 12 comprises a smart card reader according to the ISO 7816 standard adapted to have a smart card 10 inserted therein, the interface link 11 being a contact communication interface.
- the exemplary SIM or USIM smart card removable token 10 includes tool kit applications, e.g., the SIM Toolkit Application, with commands that permit the card to initiate actions and perform operations or request information, etc... from the communication device terminal 12 through a input/output communication port means 20TM.
- tool kit applications e.g., the SIM Toolkit Application
- commands that permit the card to initiate actions and perform operations or request information, etc... from the communication device terminal 12 through a input/output communication port means 20TM.
- the smart card 10 comprises at least one non volatile memory 18, a data processing means 19 and input/ouput communication port means 20TK, each of these means being coupled to each other by a communication internal data bus 21.
- the application for filtering an unsolicited voice call received by the handset is stored in the non volatile memory 18 and transferred through the communication internal data bus 21 to the processing means 19 and run.
- the application on the smart card 10 uses SIM Toolkit Application features, such as Proactive Commands and Event Downloads, to communicate with the handset 12 through their respective input/output communication ports 20TK and 20TM.
- the spammers call users and minimize the duration of the ringing.
- the call duration is long enough for the handset 12 to detect the incoming voice call and inform the user that an incoming voice call occurred while not letting enough time for the user to pick up the incoming call.
- the handset 12 upon reception of this incoming voice call, informs the smart card 10 using the Envelope (EVENT DOWNLOAD - MT Call) command, and that the handset 12 is ringing to give notice to the user.
- Envelope EVENT DOWNLOAD - MT Call
- the smart card 10 runs on its data processing means 19, the application for filtering an unsolicited voice call received by the handset after the non volatile memory 18 is read through the communication internal data bus 21.
- the application could have been running before the Envelope (EVENT DOWNLOAD - MT Call) command reception, or could be activated by its reception, this command acting as an interruption.
- the smart card 10 Since the smart card 10 does not have any notion of time, the smart card 10 sends a Start Timer Proactive Command to the handset 12. Thus, the measurement of the duration of the incoming voice call is started.
- the network 14 broadcasts a voice call Hang Up signal to the handset 12.
- the handset 12 upon reception of this incoming voice call Hang Up signal, informs the smart card 10 using the Envelope (EVENT DOWNLOAD - Call Disconnected) command, and that the handset 12 is going to stop ringing to give notice to the user.
- Envelope EVENT DOWNLOAD - Call Disconnected
- the smart card 10 sends a Get Timer Value Proactive Command to the handset 12.
- the measurement of the duration of the incoming voice call is stopped and the handset 12 sends the value of the duration of the incoming call ringing to the smart card 10.
- the application for filtering an unsolicited voice call sends the value of the duration of the incoming voice call ringing Tcr to the handset for display on the screen 17.
- the handset then displays the missed phone call number together with the duration of the phone call ringing for the user to analyze if the call is an unsolicited voice call of the type "one-ring call".
- this particular simple method provides the user with a mean for detecting a "one-ring call" himself.
- the user can analyse whether he wants to call back or not.
- SECOND EMBODIMENT Displaying a statement on the incoming voice call, possibly together with the incoming voice call ringing duration.
- the application for filtering an unsolicited voice call compares the value of the duration of the incoming voice call ringing Tcr with a predetermined value.
- This predetermined value Tcr Thres can be a default value set within the application, or a user defined value for adaptation of this threshold at the level of security the user wants.
- a positive statement STMT is set in the smart card 10, it is forwarded to the handset 12.
- the handset 12 displays the missed phone call number together with a warning message informing the user of the positive statement STMT analysis.
- the user knows that the missed voice call is an unsolicited voice call, such as a "one-ring call", and is not tempted to call back the displayed missed call phone number.
- the second embodiment helps the user in making the decision on whether he is faced with a "one-ring call” or not.
- THIRD EMBODIMENT Preventing the user to make a phone call to the unsolicited voice call number if the statement is positive.
- the application for filtering an unsolicited voice call executes the same operations than in the second embodiment, in particular for the detection of unsolicited incoming voice calls, and in addition, it prevents the user to call back the displayed unsolicited incoming voice call phone number.
- the phone number the user wants to call is compared to a list of unsolicited incoming voice call phone numbers that have been stored in the non volatile memory 18 of the smart card 10.
- the smart card 10 prevents the user from being connected with this phone number.
- the smart card 10 makes the handset 12 display a warning message to the user on the screen 17, and gives him the opportunity to bypass the warning message and process with the phone call. Is the user wants to process with the phone call, then the user is asked to press a first key to continue or a second key to stop the call. Thus, even in case of a erroneous detection of a "one-ring call", the user can continue calling the number.
- an unsolicited incoming voice call when an unsolicited incoming voice call is detected, that is, a positive statement STMT is set in the smart card 10, then the unsolicited incoming voice call number is stored in a Short-Call Elementary File EF-Short-Call. Each time an unsolicited incoming voice call is received, then the list of phone numbers in the Short-Call Elementary File EF-Short-Call is updated.
- the handset 12 informs the smart card 10 using the Envelope (EVENT DOWNLOAD - CALL CONTROL) command.
- Envelope EVENT DOWNLOAD - CALL CONTROL
- This command contains the phone number to be called, in the field Called Party Number.
- the Called Party Number is compared with the list of phone numbers of the Short-Call Elementary File.
- BDN Barred Dialing Numbers
- an unsolicited incoming voice call when an unsolicited incoming voice call is detected, that is, a positive statement STMT is set in the smart card 10, then the unsolicited incoming voice call number is stored in a Barred Dialing Number Elementary File EF BDN. Each time an unsolicited incoming voice call is received, then the list of phone numbers in the Barred Dialing Number Elementary File EF BDN is updated.
- the handset 12 informs the smart card 10 using the Envelope (EVENT DOWNLOAD - CALL CONTROL) command.
- Envelope EVENT DOWNLOAD - CALL CONTROL
- This command contains the phone number to be called, in the field Called Party Number.
- the Called Party Number is compared with the list of phone numbers of the Barred Dialing Number Elementary File EF BDN. Then, further actions to prevent or allow the user to make a call following the comparison are processed as disclosed above.
- this third embodiment provides a user friendly way of providing a high level of protection against the "one- ring call" burden.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2009/076350 WO2011079461A1 (en) | 2009-12-31 | 2009-12-31 | Method for filtering unsolicited voice calls |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2009/076350 WO2011079461A1 (en) | 2009-12-31 | 2009-12-31 | Method for filtering unsolicited voice calls |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011079461A1 true WO2011079461A1 (en) | 2011-07-07 |
Family
ID=44226140
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/076350 WO2011079461A1 (en) | 2009-12-31 | 2009-12-31 | Method for filtering unsolicited voice calls |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2011079461A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005117383A (en) * | 2003-10-08 | 2005-04-28 | Matsushita Electric Ind Co Ltd | Line terminal device |
CN101052080A (en) * | 2007-05-15 | 2007-10-10 | 华为技术有限公司 | Processing method and device for unanswering incombing call ring |
CN101472009A (en) * | 2007-12-29 | 2009-07-01 | 乐金电子(中国)研究开发中心有限公司 | Ringing device and method of communication terminal |
CN101478591A (en) * | 2008-12-17 | 2009-07-08 | 康佳集团股份有限公司 | Method for preventing incoming call disturbance of mobile phone |
-
2009
- 2009-12-31 WO PCT/CN2009/076350 patent/WO2011079461A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005117383A (en) * | 2003-10-08 | 2005-04-28 | Matsushita Electric Ind Co Ltd | Line terminal device |
CN101052080A (en) * | 2007-05-15 | 2007-10-10 | 华为技术有限公司 | Processing method and device for unanswering incombing call ring |
CN101472009A (en) * | 2007-12-29 | 2009-07-01 | 乐金电子(中国)研究开发中心有限公司 | Ringing device and method of communication terminal |
CN101478591A (en) * | 2008-12-17 | 2009-07-08 | 康佳集团股份有限公司 | Method for preventing incoming call disturbance of mobile phone |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101426203B (en) | Method and equipment for recognizing vicious disturbance call | |
WO2016000636A1 (en) | Communications processing method and system | |
KR101059558B1 (en) | System for filtering voice-phishing | |
US20110021174A1 (en) | Method and apparatus for automatically damaging circuitry of a mobile device when one or more conditions are detected | |
CN103516859A (en) | Strange call processing method and terminal equipment | |
RU2429589C2 (en) | Method of detecting fraud during roaming connections in mobile communication networks | |
WO2011160328A1 (en) | Method and device for monitoring communications | |
KR100438454B1 (en) | Call connecting method by call forwarding in wire/wireless telecommunication network | |
CN103269402A (en) | System and method for protecting mobile phone privacy | |
US10104215B2 (en) | Blacklist management method and device | |
KR100480050B1 (en) | Short message store method for mobile communication device | |
CN101351000A (en) | Method for showing information and communication terminal | |
KR101306074B1 (en) | Method and system to prevent phishing | |
CN101572890A (en) | Method for detecting illegal group calling party and device thereof | |
CN100536612C (en) | A method and device to perfect the terminal authentication | |
US11108914B2 (en) | Method and system for revenue maximization in a communication network | |
KR20120001284A (en) | Preventing system and method for illegal call | |
WO2011079461A1 (en) | Method for filtering unsolicited voice calls | |
KR20150047378A (en) | Device of blocking voice phishing calls | |
EP1420600A1 (en) | Firewall system for mobile telecommunications devices | |
CN107483700A (en) | A kind of recognition methods of bad number and device | |
US6658246B1 (en) | System for and a method of controlling access to a service available via a telecommunications terminal connected to a telecommunications network | |
KR102459421B1 (en) | Apparatus, method, and application for processing spam call | |
KR101401931B1 (en) | Method of preventing voice phishing and server performing the same | |
KR100664119B1 (en) | Status informing service providing method of mobile communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09852746 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09852746 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/02/2013) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09852746 Country of ref document: EP Kind code of ref document: A1 |