WO2011079461A1 - Method for filtering unsolicited voice calls - Google Patents

Method for filtering unsolicited voice calls Download PDF

Info

Publication number
WO2011079461A1
WO2011079461A1 PCT/CN2009/076350 CN2009076350W WO2011079461A1 WO 2011079461 A1 WO2011079461 A1 WO 2011079461A1 CN 2009076350 W CN2009076350 W CN 2009076350W WO 2011079461 A1 WO2011079461 A1 WO 2011079461A1
Authority
WO
WIPO (PCT)
Prior art keywords
voice call
unsolicited
call
filtering
token
Prior art date
Application number
PCT/CN2009/076350
Other languages
French (fr)
Inventor
Ren Liu
Original Assignee
Axalto Smart Cards Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Axalto Smart Cards Technology Co., Ltd. filed Critical Axalto Smart Cards Technology Co., Ltd.
Priority to PCT/CN2009/076350 priority Critical patent/WO2011079461A1/en
Publication of WO2011079461A1 publication Critical patent/WO2011079461A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set

Definitions

  • the present invention relates generally to a method for processing voice calls in communications devices, and more particularly to an incoming voice call management method in voice communication subscriber devices, for example, in wireless cellular communications devices, some of which include tokens such as removable subscriber identification modules (SIM), and corresponding methods in messaging service subscriber devices.
  • SIM removable subscriber identification modules
  • the present invention relates to a token for filtering an unsolicited voice calls.
  • the present invention relates to a system for filtering an unsolicited voice calls.
  • Spam written messages such as Short Message Service (SMS) messages, Enhanced Messaging Service (EMS) messages, and Multimedia Messaging Service (MMS) messages.
  • SMS Short Message Service
  • EMS Enhanced Messaging Service
  • MMS Multimedia Messaging Service
  • PLMNs Public Land Mobile Networks
  • unsolicited messages which are considered by some subscribers to be inconvenient and annoying, these messages are generally not a threat to the user as the user usually deletes it just after having read it and takes no further action.
  • the spammers take advantage of the habit of the users to call back the phone number displayed on their handset as a missed call, even when the phone number is unknown. This habit leads to an efficient revenue generator for the spammers because of the huge amount of user phone numbers that are called by the spammers. To avoid being caught, the spammers change the premium rate number as often as possible making it almost impossible to filter these unsolicited calls, at the network level.
  • the present invention provides a method for filtering an unsolicited voice call received by a communication device terminal including a token, the method comprising the steps of detecting the start of an incoming voice call and measuring the duration of the incoming voice call ringing.
  • the method can comprise the step of comparing the duration of the incoming voice call ringing with at least a predetermined value.
  • a positive unsolicited voice call statement to indicate if the incoming voice call is an unsolicited voice call, such as a "one-ring call".
  • the method can comprise the step of informing the user of the communication device terminal by displaying the duration of the incoming voice call ringing duration and/or the unsolicited voice call statement.
  • Another aspect of the invention provide a further step to the method by preventing the user to make an outgoing voice call towards the incoming voice call number if the unsolicited voice call statement indicates the incoming voice call is an unsolicited voice call.
  • the step of preventing the user to make a phone call can first display on the screen of communication device terminal a warning message to give the opportunity to the user to process with the call even when the unsolicited voice call statement indicates the incoming voice call is an unsolicited voice call.
  • the phone number the user wants to call can be compared to a list of unsolicited incoming voice call phone numbers that have been stored in a non volatile memory of the token.
  • a list of unsolicited incoming voice call phone numbers can be updated upon a positive unsolicited voice call statement, by adding the unsolicited voice call phone number to a list of phone numbers in a Short-Call Elementary File.
  • a list of unsolicited incoming voice call phone numbers can be updated upon a positive unsolicited voice call statement, by adding the unsolicited voice call phone number to a list of phone numbers in a Barred Dialing Number Elementary File.
  • the invention also related to a token for filtering an unsolicited voice call comprising a non volatile memory and an input/output communication port for communicating with a communication device terminal through an interface link wherein upon reception of an Envelope (EVENT DOWNLOAD - MT Call) command on the input/output communication port, the method according to the invention is run on processing means of said token.
  • Envelope EVENT DOWNLOAD - MT Call
  • the invention also related to a system for filtering an unsolicited voice call, the system comprising a token and a communication device terminal connected to the token by a interface link, characterized in that at least one of the token or the communication device terminal is adapted to detect the start of an incoming voice call; and measure the duration of the incoming voice call ringing.
  • Figure 1 shows a simplified schematic drawing of a communication device terminal communicatively connected on one side to a communication network and on another side to a token;
  • Figure 2 shows the connections between the communication device terminal with the token
  • Figure 3 A shows the data flow occurring between the communication network, the communication device terminal and the token in a first embodiment of the invention
  • Figure 3B shows the data flow occurring between the communication network, the communication device terminal and the token in a second embodiment of the invention
  • Figure 3C shows the data flow occurring between the communication network, the communication device terminal and the token in a third embodiment of the invention.
  • a token 10 is connected through a communication device terminal 12 and a communication network 14 to a communication server 16.
  • the communication server 16 refers in the following specification, to an electronic device including at least one data processing and controlling means and at least one memory hosting at least one applicative software that is accessible from outside.
  • the token 10 should be understood as an electronic device having data processing and controlling means and means for communicating in at least the outward direction for example towards the communication device terminal 12, such as a handset, housing the token 10.
  • the server 16 processes and broadcasts the communication between communication device terminals.
  • the calls made by a spammer are processed and broadcasted through the server 16 to the communication device terminal 12.
  • This server 16 can be connected to the communication network 14 through a wire or a wireless link 15.
  • the communication network 14 can be a private or a public network and can be connected to the communication device terminal 12 through a wire or wireless link 13.
  • this link 13 is a radiofrequency wireless link.
  • the communication device terminal 12 provides a screen 17 for displaying information to the user.
  • the communication device terminal 12 and the token 10 are coupled by way of at least one contact or of a contactless communication interface link 11.
  • the communication device terminal 12 can be a handset or cellular phone, a personal digital assistant (PDA) or a wireless enabled laptop or notebook computer, etc.
  • the token 10 can be chosen amongst a GSM Subscriber Identity Module (SIM) card, or a Universal Subscriber Identity Module (USIM) card, or some other removable module on which user specific information is stored such as a dongle device, a USB (Universal Serial Bus), SD (Secure Digital), or MMC (Multi-Media Card) device.
  • SIM Global System for Mobile Communications
  • USB Universal Serial Bus
  • SD Secure Digital
  • MMC Multi-Media Card
  • the communication device terminal 12 is a handset and the token 10 is a removable smart card of the SIM or USIM type. Further, the handset 12 comprises a smart card reader according to the ISO 7816 standard adapted to have a smart card 10 inserted therein, the interface link 11 being a contact communication interface.
  • the exemplary SIM or USIM smart card removable token 10 includes tool kit applications, e.g., the SIM Toolkit Application, with commands that permit the card to initiate actions and perform operations or request information, etc... from the communication device terminal 12 through a input/output communication port means 20TM.
  • tool kit applications e.g., the SIM Toolkit Application
  • commands that permit the card to initiate actions and perform operations or request information, etc... from the communication device terminal 12 through a input/output communication port means 20TM.
  • the smart card 10 comprises at least one non volatile memory 18, a data processing means 19 and input/ouput communication port means 20TK, each of these means being coupled to each other by a communication internal data bus 21.
  • the application for filtering an unsolicited voice call received by the handset is stored in the non volatile memory 18 and transferred through the communication internal data bus 21 to the processing means 19 and run.
  • the application on the smart card 10 uses SIM Toolkit Application features, such as Proactive Commands and Event Downloads, to communicate with the handset 12 through their respective input/output communication ports 20TK and 20TM.
  • the spammers call users and minimize the duration of the ringing.
  • the call duration is long enough for the handset 12 to detect the incoming voice call and inform the user that an incoming voice call occurred while not letting enough time for the user to pick up the incoming call.
  • the handset 12 upon reception of this incoming voice call, informs the smart card 10 using the Envelope (EVENT DOWNLOAD - MT Call) command, and that the handset 12 is ringing to give notice to the user.
  • Envelope EVENT DOWNLOAD - MT Call
  • the smart card 10 runs on its data processing means 19, the application for filtering an unsolicited voice call received by the handset after the non volatile memory 18 is read through the communication internal data bus 21.
  • the application could have been running before the Envelope (EVENT DOWNLOAD - MT Call) command reception, or could be activated by its reception, this command acting as an interruption.
  • the smart card 10 Since the smart card 10 does not have any notion of time, the smart card 10 sends a Start Timer Proactive Command to the handset 12. Thus, the measurement of the duration of the incoming voice call is started.
  • the network 14 broadcasts a voice call Hang Up signal to the handset 12.
  • the handset 12 upon reception of this incoming voice call Hang Up signal, informs the smart card 10 using the Envelope (EVENT DOWNLOAD - Call Disconnected) command, and that the handset 12 is going to stop ringing to give notice to the user.
  • Envelope EVENT DOWNLOAD - Call Disconnected
  • the smart card 10 sends a Get Timer Value Proactive Command to the handset 12.
  • the measurement of the duration of the incoming voice call is stopped and the handset 12 sends the value of the duration of the incoming call ringing to the smart card 10.
  • the application for filtering an unsolicited voice call sends the value of the duration of the incoming voice call ringing Tcr to the handset for display on the screen 17.
  • the handset then displays the missed phone call number together with the duration of the phone call ringing for the user to analyze if the call is an unsolicited voice call of the type "one-ring call".
  • this particular simple method provides the user with a mean for detecting a "one-ring call" himself.
  • the user can analyse whether he wants to call back or not.
  • SECOND EMBODIMENT Displaying a statement on the incoming voice call, possibly together with the incoming voice call ringing duration.
  • the application for filtering an unsolicited voice call compares the value of the duration of the incoming voice call ringing Tcr with a predetermined value.
  • This predetermined value Tcr Thres can be a default value set within the application, or a user defined value for adaptation of this threshold at the level of security the user wants.
  • a positive statement STMT is set in the smart card 10, it is forwarded to the handset 12.
  • the handset 12 displays the missed phone call number together with a warning message informing the user of the positive statement STMT analysis.
  • the user knows that the missed voice call is an unsolicited voice call, such as a "one-ring call", and is not tempted to call back the displayed missed call phone number.
  • the second embodiment helps the user in making the decision on whether he is faced with a "one-ring call” or not.
  • THIRD EMBODIMENT Preventing the user to make a phone call to the unsolicited voice call number if the statement is positive.
  • the application for filtering an unsolicited voice call executes the same operations than in the second embodiment, in particular for the detection of unsolicited incoming voice calls, and in addition, it prevents the user to call back the displayed unsolicited incoming voice call phone number.
  • the phone number the user wants to call is compared to a list of unsolicited incoming voice call phone numbers that have been stored in the non volatile memory 18 of the smart card 10.
  • the smart card 10 prevents the user from being connected with this phone number.
  • the smart card 10 makes the handset 12 display a warning message to the user on the screen 17, and gives him the opportunity to bypass the warning message and process with the phone call. Is the user wants to process with the phone call, then the user is asked to press a first key to continue or a second key to stop the call. Thus, even in case of a erroneous detection of a "one-ring call", the user can continue calling the number.
  • an unsolicited incoming voice call when an unsolicited incoming voice call is detected, that is, a positive statement STMT is set in the smart card 10, then the unsolicited incoming voice call number is stored in a Short-Call Elementary File EF-Short-Call. Each time an unsolicited incoming voice call is received, then the list of phone numbers in the Short-Call Elementary File EF-Short-Call is updated.
  • the handset 12 informs the smart card 10 using the Envelope (EVENT DOWNLOAD - CALL CONTROL) command.
  • Envelope EVENT DOWNLOAD - CALL CONTROL
  • This command contains the phone number to be called, in the field Called Party Number.
  • the Called Party Number is compared with the list of phone numbers of the Short-Call Elementary File.
  • BDN Barred Dialing Numbers
  • an unsolicited incoming voice call when an unsolicited incoming voice call is detected, that is, a positive statement STMT is set in the smart card 10, then the unsolicited incoming voice call number is stored in a Barred Dialing Number Elementary File EF BDN. Each time an unsolicited incoming voice call is received, then the list of phone numbers in the Barred Dialing Number Elementary File EF BDN is updated.
  • the handset 12 informs the smart card 10 using the Envelope (EVENT DOWNLOAD - CALL CONTROL) command.
  • Envelope EVENT DOWNLOAD - CALL CONTROL
  • This command contains the phone number to be called, in the field Called Party Number.
  • the Called Party Number is compared with the list of phone numbers of the Barred Dialing Number Elementary File EF BDN. Then, further actions to prevent or allow the user to make a call following the comparison are processed as disclosed above.
  • this third embodiment provides a user friendly way of providing a high level of protection against the "one- ring call" burden.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to a method for filtering an unsolicited voice call received by a communication device terminal (12) including a token (10), characterized in that the method comprises the steps of detecting the start of an incoming voice call and 5 measuring the duration of the incoming voice call ringing (Tcr).

Description

METHOD FOR FILTERING UNSOLICITED VOICE CALLS
Field of the Invention
The present invention relates generally to a method for processing voice calls in communications devices, and more particularly to an incoming voice call management method in voice communication subscriber devices, for example, in wireless cellular communications devices, some of which include tokens such as removable subscriber identification modules (SIM), and corresponding methods in messaging service subscriber devices.
Further, the present invention relates to a token for filtering an unsolicited voice calls.
Moreover, the present invention relates to a system for filtering an unsolicited voice calls.
Background of the Invention
Users of mobile communication services have grown substantially. It is well known, that the users receive Spam written messages, such as Short Message Service (SMS) messages, Enhanced Messaging Service (EMS) messages, and Multimedia Messaging Service (MMS) messages. These spam written messages usually are filtered out by the Public Land Mobile Networks (PLMNs) so their number is low. Although, these spam written messages are unsolicited messages, which are considered by some subscribers to be inconvenient and annoying, these messages are generally not a threat to the user as the user usually deletes it just after having read it and takes no further action.
Recently, spam messaging is following another trend that is more harmful to the users. The spammers are now trying to get money directly from the users of the mobile communication services.
A particular technique, called a "one-ring call", is used to make a user call a premium rate number, in order to get the benefits of the premium rate call. The spammers take advantage of the habit of the users to call back the phone number displayed on their handset as a missed call, even when the phone number is unknown. This habit leads to an efficient revenue generator for the spammers because of the huge amount of user phone numbers that are called by the spammers. To avoid being caught, the spammers change the premium rate number as often as possible making it almost impossible to filter these unsolicited calls, at the network level. Summary of the Invention
It is an object of the invention to provide a method for detecting unsolicited calls such as "one-ring calls", for the users not to call back the spammers.
Thereto, the present invention provides a method for filtering an unsolicited voice call received by a communication device terminal including a token, the method comprising the steps of detecting the start of an incoming voice call and measuring the duration of the incoming voice call ringing.
According to one aspect of the invention, the method can comprise the step of comparing the duration of the incoming voice call ringing with at least a predetermined value.
According to a further aspect, upon the result of the step of comparison, providing a positive unsolicited voice call statement to indicate if the incoming voice call is an unsolicited voice call, such as a "one-ring call".
Further, the method can comprise the step of informing the user of the communication device terminal by displaying the duration of the incoming voice call ringing duration and/or the unsolicited voice call statement.
Another aspect of the invention provide a further step to the method by preventing the user to make an outgoing voice call towards the incoming voice call number if the unsolicited voice call statement indicates the incoming voice call is an unsolicited voice call.
Further, the step of preventing the user to make a phone call can first display on the screen of communication device terminal a warning message to give the opportunity to the user to process with the call even when the unsolicited voice call statement indicates the incoming voice call is an unsolicited voice call.
According to the invention, during the step of preventing the user to make an outgoing voice call, the phone number the user wants to call can be compared to a list of unsolicited incoming voice call phone numbers that have been stored in a non volatile memory of the token. According to the invention, a list of unsolicited incoming voice call phone numbers can be updated upon a positive unsolicited voice call statement, by adding the unsolicited voice call phone number to a list of phone numbers in a Short-Call Elementary File.
According to another aspect of the invention, a list of unsolicited incoming voice call phone numbers can be updated upon a positive unsolicited voice call statement, by adding the unsolicited voice call phone number to a list of phone numbers in a Barred Dialing Number Elementary File.
The invention also related to a token for filtering an unsolicited voice call comprising a non volatile memory and an input/output communication port for communicating with a communication device terminal through an interface link wherein upon reception of an Envelope (EVENT DOWNLOAD - MT Call) command on the input/output communication port, the method according to the invention is run on processing means of said token.
The invention also related to a system for filtering an unsolicited voice call, the system comprising a token and a communication device terminal connected to the token by a interface link, characterized in that at least one of the token or the communication device terminal is adapted to detect the start of an incoming voice call; and measure the duration of the incoming voice call ringing.
Brief Description of the Drawings
The various aspects, features and advantages of the invention will become more fully apparent to those having ordinary skill in the art upon careful consideration of the following Detailed Description, given by way of example thereof, with the accompanying drawings described below:
Figure 1 shows a simplified schematic drawing of a communication device terminal communicatively connected on one side to a communication network and on another side to a token;
Figure 2 shows the connections between the communication device terminal with the token;
Figure 3 A shows the data flow occurring between the communication network, the communication device terminal and the token in a first embodiment of the invention; Figure 3B shows the data flow occurring between the communication network, the communication device terminal and the token in a second embodiment of the invention;
Figure 3C shows the data flow occurring between the communication network, the communication device terminal and the token in a third embodiment of the invention.
Detailed Description of the Preferred Embodiment
Referring to the figures and for the moment in particular to Figure 1, a token 10 is connected through a communication device terminal 12 and a communication network 14 to a communication server 16.
The communication server 16 refers in the following specification, to an electronic device including at least one data processing and controlling means and at least one memory hosting at least one applicative software that is accessible from outside. Further, in the following invention, the token 10 should be understood as an electronic device having data processing and controlling means and means for communicating in at least the outward direction for example towards the communication device terminal 12, such as a handset, housing the token 10.
The server 16 processes and broadcasts the communication between communication device terminals. The calls made by a spammer are processed and broadcasted through the server 16 to the communication device terminal 12. This server 16 can be connected to the communication network 14 through a wire or a wireless link 15.
The communication network 14 can be a private or a public network and can be connected to the communication device terminal 12 through a wire or wireless link 13. In the following, we will assume that this link 13 is a radiofrequency wireless link.
The communication device terminal 12 provides a screen 17 for displaying information to the user. The communication device terminal 12 and the token 10 are coupled by way of at least one contact or of a contactless communication interface link 11. The communication device terminal 12 can be a handset or cellular phone, a personal digital assistant (PDA) or a wireless enabled laptop or notebook computer, etc. The token 10 can be chosen amongst a GSM Subscriber Identity Module (SIM) card, or a Universal Subscriber Identity Module (USIM) card, or some other removable module on which user specific information is stored such as a dongle device, a USB (Universal Serial Bus), SD (Secure Digital), or MMC (Multi-Media Card) device.
In the following illustrative embodiments, the communication device terminal 12 is a handset and the token 10 is a removable smart card of the SIM or USIM type. Further, the handset 12 comprises a smart card reader according to the ISO 7816 standard adapted to have a smart card 10 inserted therein, the interface link 11 being a contact communication interface.
In the following described embodiments, the exemplary SIM or USIM smart card removable token 10 includes tool kit applications, e.g., the SIM Toolkit Application, with commands that permit the card to initiate actions and perform operations or request information, etc... from the communication device terminal 12 through a input/output communication port means 20TM.
Referring now to figure 2, the smart card 10 comprises at least one non volatile memory 18, a data processing means 19 and input/ouput communication port means 20TK, each of these means being coupled to each other by a communication internal data bus 21.
Thus, the application for filtering an unsolicited voice call received by the handset is stored in the non volatile memory 18 and transferred through the communication internal data bus 21 to the processing means 19 and run. Upon execution, the application on the smart card 10 uses SIM Toolkit Application features, such as Proactive Commands and Event Downloads, to communicate with the handset 12 through their respective input/output communication ports 20TK and 20TM.
The spammers call users and minimize the duration of the ringing. The call duration is long enough for the handset 12 to detect the incoming voice call and inform the user that an incoming voice call occurred while not letting enough time for the user to pick up the incoming call.
According to the invention, described in figures 3A to 3C, when an incoming voice call is detected, the duration of the voice call ringing is measured.
Once the network 14 broadcasts a voice call to the handset 12, the handset 12 upon reception of this incoming voice call, informs the smart card 10 using the Envelope (EVENT DOWNLOAD - MT Call) command, and that the handset 12 is ringing to give notice to the user.
In response, the smart card 10 runs on its data processing means 19, the application for filtering an unsolicited voice call received by the handset after the non volatile memory 18 is read through the communication internal data bus 21. The application could have been running before the Envelope (EVENT DOWNLOAD - MT Call) command reception, or could be activated by its reception, this command acting as an interruption.
Since the smart card 10 does not have any notion of time, the smart card 10 sends a Start Timer Proactive Command to the handset 12. Thus, the measurement of the duration of the incoming voice call is started.
When, the spammer hangs up, the network 14 broadcasts a voice call Hang Up signal to the handset 12. The handset 12 upon reception of this incoming voice call Hang Up signal, informs the smart card 10 using the Envelope (EVENT DOWNLOAD - Call Disconnected) command, and that the handset 12 is going to stop ringing to give notice to the user.
In response, the smart card 10 sends a Get Timer Value Proactive Command to the handset 12. Thus, the measurement of the duration of the incoming voice call is stopped and the handset 12 sends the value of the duration of the incoming call ringing to the smart card 10.
FIRST EMBODIMENT: Displaying the duration of the incoming voice call ringing to the user together with the incoming voice call phone number.
In a first embodiment, the application for filtering an unsolicited voice call sends the value of the duration of the incoming voice call ringing Tcr to the handset for display on the screen 17.
The handset then displays the missed phone call number together with the duration of the phone call ringing for the user to analyze if the call is an unsolicited voice call of the type "one-ring call".
Thus, this particular simple method provides the user with a mean for detecting a "one-ring call" himself. The user can analyse whether he wants to call back or not. SECOND EMBODIMENT: Displaying a statement on the incoming voice call, possibly together with the incoming voice call ringing duration.
In a second embodiment, the application for filtering an unsolicited voice call compares the value of the duration of the incoming voice call ringing Tcr with a predetermined value.
This predetermined value Tcr Thres can be a default value set within the application, or a user defined value for adaptation of this threshold at the level of security the user wants.
If the result of the comparison is that the duration of the incoming voice call ringing Tcr is smaller than the predetermined value Tcr Thres, then a statement STMT is set to indicate that the incoming voice call is an unsolicited voice call, such as a "one-ring call". We will refer to this kind of statement as a positive statement STMT.
If the result of the comparison is that the duration of the incoming voice call Tcr is greater than the predetermined value Tcr Thres, then no statement STMT is set.
If a positive statement STMT is set in the smart card 10, it is forwarded to the handset 12. The handset 12 then displays the missed phone call number together with a warning message informing the user of the positive statement STMT analysis.
Thus, the user knows that the missed voice call is an unsolicited voice call, such as a "one-ring call", and is not tempted to call back the displayed missed call phone number. As compared to the first embodiment, the second embodiment helps the user in making the decision on whether he is faced with a "one-ring call" or not.
THIRD EMBODIMENT: Preventing the user to make a phone call to the unsolicited voice call number if the statement is positive.
In a third embodiment, the application for filtering an unsolicited voice call executes the same operations than in the second embodiment, in particular for the detection of unsolicited incoming voice calls, and in addition, it prevents the user to call back the displayed unsolicited incoming voice call phone number.
In this embodiment, the phone number the user wants to call is compared to a list of unsolicited incoming voice call phone numbers that have been stored in the non volatile memory 18 of the smart card 10.
If the phone numbers match, the smart card 10 prevents the user from being connected with this phone number. Preferably, the smart card 10 makes the handset 12 display a warning message to the user on the screen 17, and gives him the opportunity to bypass the warning message and process with the phone call. Is the user wants to process with the phone call, then the user is asked to press a first key to continue or a second key to stop the call. Thus, even in case of a erroneous detection of a "one-ring call", the user can continue calling the number.
If the phone numbers do not match, then the user gets connected with the phone number.
Two variants of particular methods of blocking the call back operations will now be disclosed.
First variant: Using a Short-Call Elementary File (EF- Short-Call)
In a first variant, when an unsolicited incoming voice call is detected, that is, a positive statement STMT is set in the smart card 10, then the unsolicited incoming voice call number is stored in a Short-Call Elementary File EF-Short-Call. Each time an unsolicited incoming voice call is received, then the list of phone numbers in the Short-Call Elementary File EF-Short-Call is updated.
When a user attempts to make a call, then the handset 12 informs the smart card 10 using the Envelope (EVENT DOWNLOAD - CALL CONTROL) command. This command contains the phone number to be called, in the field Called Party Number. The Called Party Number is compared with the list of phone numbers of the Short-Call Elementary File.
Then, further actions to prevent or allow the user to make a call following the comparison are processed as disclosed above.
Second Variant: Using a Barred Dialing Numbers (BDN) mechanism (see GSM 11.14 Technical Specification):
In a second variant, when an unsolicited incoming voice call is detected, that is, a positive statement STMT is set in the smart card 10, then the unsolicited incoming voice call number is stored in a Barred Dialing Number Elementary File EF BDN. Each time an unsolicited incoming voice call is received, then the list of phone numbers in the Barred Dialing Number Elementary File EF BDN is updated.
When a user attempts to make a call, then the handset 12 informs the smart card 10 using the Envelope (EVENT DOWNLOAD - CALL CONTROL) command. This command contains the phone number to be called, in the field Called Party Number. The Called Party Number is compared with the list of phone numbers of the Barred Dialing Number Elementary File EF BDN. Then, further actions to prevent or allow the user to make a call following the comparison are processed as disclosed above.
Thus, as compared to the two first embodiments, this third embodiment provides a user friendly way of providing a high level of protection against the "one- ring call" burden.
While the present invention and the best modes thereof have been described in a manner establishing possession by the inventors and enabling those of ordinary skill to make and use the same, it will be understood and appreciated that there are equivalents to the exemplary embodiments disclosed herein and that modifications and variations may be made thereto without departing from the scope and spirit of the invention, which is to be limited not by the exemplary embodiments but by the appended claims.
Thus in particular, although the application was stored and run on the token 10 in the exemplary embodiments, it should be apparent for those of ordinary skill that the application could be stored and run entirely or in part on the communication device terminal 12.

Claims

Claims
1. A method for filtering an unsolicited voice call received by a communication device terminal (12) including a token (10), characterized in that the method comprises the steps of :
detecting the start of an incoming voice call;
measuring the duration of the incoming voice call ringing (Tcr).
2. A method for filtering an unsolicited voice call according to claim 1, characterized in that the method further comprises the step of :
comparing the duration of the incoming voice call ringing (Tcr) with at least a predetermined value (Tcr Thres).
3. A method for filtering an unsolicited voice call according to claim 2, characterized in that the method further comprises the step of :
upon the result of the step of comparison, providing a positive unsolicited voice call statement (STMT) to indicate if the incoming voice call is an unsolicited voice call, such as a "one-ring call".
4. A method for filtering an unsolicited voice call according to any one of claim
1 to 3, characterized in that the method further comprises the step of :
informing a user of the communication device terminal by displaying the duration of the incoming voice call ringing duration (Tcr) and/or the unsolicited voice call statement (STMT).
5. A method for filtering an unsolicited voice call according to any one of claim 3 and 4, characterized in that the method further comprises the step of :
preventing the user to make an outgoing voice call towards the incoming voice call number if the unsolicited voice call statement (STMT) indicates the incoming voice call is an unsolicited voice call.
6. A method for filtering an unsolicited voice call according to the preceding claim, characterized in that the step of preventing the user to make a phone call first displays on the screen (17) of communication device terminal (12) a warning message to give the opportunity to the user to process with the call even when the unsolicited voice call statement (STMT) indicates the incoming voice call is an unsolicited voice call.
7. A method for filtering an unsolicited voice mail according to claim 5 or 6, characterized in that the phone number the user wants to call is compared to a list of unsolicited incoming voice call phone numbers that have been stored in a non volatile memory (18) of the token (10).
8. A method for filtering an unsolicited voice mail according to the preceding claim, characterized in that upon a positive unsolicited voice call statement (STMT), the unsolicited voice call phone number is added to a list of phone numbers in a Short-Call Elementary File (EF- Short-Call).
9. A method for filtering an unsolicited voice mail according to claim 7, characterized in that upon a positive unsolicited voice call statement (STMT), the unsolicited voice call phone number is added to a list of phone numbers in a Barred Dialing Number Elementary File (EF BDN).
10. Token (10) for filtering an unsolicited voice call comprising a non volatile memory (18) and an input/output communication port (20TK) for communicating with a communication device terminal (12) through an interface link (11) wherein upon reception of an Envelope (EVENT DOWNLOAD - MT Call) command on the input/output communication port (20TK), the method according to any one of the claims 1 to 9 is run on processing means (19) of said token (10).
11. System (10, 12) for filtering an unsolicited voice call, the system comprising a token (10) and a communication device terminal (12) connected to the token by a interface link (11), characterized in that at least one of the token (10) or the communication device terminal (12) is adapted to:
detect the start of an incoming voice call;
measure the duration of the incoming voice call ringing (Tcr).
PCT/CN2009/076350 2009-12-31 2009-12-31 Method for filtering unsolicited voice calls WO2011079461A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/076350 WO2011079461A1 (en) 2009-12-31 2009-12-31 Method for filtering unsolicited voice calls

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2009/076350 WO2011079461A1 (en) 2009-12-31 2009-12-31 Method for filtering unsolicited voice calls

Publications (1)

Publication Number Publication Date
WO2011079461A1 true WO2011079461A1 (en) 2011-07-07

Family

ID=44226140

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/076350 WO2011079461A1 (en) 2009-12-31 2009-12-31 Method for filtering unsolicited voice calls

Country Status (1)

Country Link
WO (1) WO2011079461A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005117383A (en) * 2003-10-08 2005-04-28 Matsushita Electric Ind Co Ltd Line terminal device
CN101052080A (en) * 2007-05-15 2007-10-10 华为技术有限公司 Processing method and device for unanswering incombing call ring
CN101472009A (en) * 2007-12-29 2009-07-01 乐金电子(中国)研究开发中心有限公司 Ringing device and method of communication terminal
CN101478591A (en) * 2008-12-17 2009-07-08 康佳集团股份有限公司 Method for preventing incoming call disturbance of mobile phone

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005117383A (en) * 2003-10-08 2005-04-28 Matsushita Electric Ind Co Ltd Line terminal device
CN101052080A (en) * 2007-05-15 2007-10-10 华为技术有限公司 Processing method and device for unanswering incombing call ring
CN101472009A (en) * 2007-12-29 2009-07-01 乐金电子(中国)研究开发中心有限公司 Ringing device and method of communication terminal
CN101478591A (en) * 2008-12-17 2009-07-08 康佳集团股份有限公司 Method for preventing incoming call disturbance of mobile phone

Similar Documents

Publication Publication Date Title
CN101426203B (en) Method and equipment for recognizing vicious disturbance call
WO2016000636A1 (en) Communications processing method and system
KR101059558B1 (en) System for filtering voice-phishing
US20110021174A1 (en) Method and apparatus for automatically damaging circuitry of a mobile device when one or more conditions are detected
CN103516859A (en) Strange call processing method and terminal equipment
RU2429589C2 (en) Method of detecting fraud during roaming connections in mobile communication networks
WO2011160328A1 (en) Method and device for monitoring communications
KR100438454B1 (en) Call connecting method by call forwarding in wire/wireless telecommunication network
CN103269402A (en) System and method for protecting mobile phone privacy
US10104215B2 (en) Blacklist management method and device
KR100480050B1 (en) Short message store method for mobile communication device
CN101351000A (en) Method for showing information and communication terminal
KR101306074B1 (en) Method and system to prevent phishing
CN101572890A (en) Method for detecting illegal group calling party and device thereof
CN100536612C (en) A method and device to perfect the terminal authentication
US11108914B2 (en) Method and system for revenue maximization in a communication network
KR20120001284A (en) Preventing system and method for illegal call
WO2011079461A1 (en) Method for filtering unsolicited voice calls
KR20150047378A (en) Device of blocking voice phishing calls
EP1420600A1 (en) Firewall system for mobile telecommunications devices
CN107483700A (en) A kind of recognition methods of bad number and device
US6658246B1 (en) System for and a method of controlling access to a service available via a telecommunications terminal connected to a telecommunications network
KR102459421B1 (en) Apparatus, method, and application for processing spam call
KR101401931B1 (en) Method of preventing voice phishing and server performing the same
KR100664119B1 (en) Status informing service providing method of mobile communication terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09852746

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09852746

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/02/2013)

122 Ep: pct application non-entry in european phase

Ref document number: 09852746

Country of ref document: EP

Kind code of ref document: A1