WO2011154221A1 - Système, procédé et produit programme d'ordinateur destinés à filtrer des communications téléphoniques - Google Patents
Système, procédé et produit programme d'ordinateur destinés à filtrer des communications téléphoniques Download PDFInfo
- Publication number
- WO2011154221A1 WO2011154221A1 PCT/EP2011/057843 EP2011057843W WO2011154221A1 WO 2011154221 A1 WO2011154221 A1 WO 2011154221A1 EP 2011057843 W EP2011057843 W EP 2011057843W WO 2011154221 A1 WO2011154221 A1 WO 2011154221A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- called device
- calling
- telephone
- encrypted identifier
- communications
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
Definitions
- anonymous caller identifies orally himself/herself thereby allowing the recipient to accept or not the incoming call.
- a method for adding a lOcaller in a blocked list stored at a communication server includes receiving a call from the caller at a communication device and a set of inputs in response to the call.
- the set of inputs includes a set of instructions to add the caller in the blocked list.
- Transmission of the call termination request initiates addition of the caller in the blocked list at the communication server.
- an object of the invention is to provide a system and a method allowing to filter calls from anonymous
- a method for selectively filtering telephone lOcommunications comprises the steps of:
- FIG.l illustrates typical phone firewall interfaces
- FIG.2 depicts a general environment to operate the present invention
- FIG.3 shows a call flow diagram according to an embodiment of lOthe present invention
- FIG.4 is a flowchart illustrating the main steps operated at a provider edge according to an embodiment of the present
- FIG.5a and 5b are flowcharts illustrating the main steps
- a calling/called device may be any type of analog or digital telephone equipment compliant with the telecommunication network 204, such as a cordless telephone, a cellular telephone, a personal digital assistant (PDA) , a VoIP
- a calling/called device comprises input and output means.
- the input and output means may include a handset with a loudspeaker and a microphone, and a keypad with buttons for input to the telephone sets.
- the keypad may be used for entering 5a call number, validating commands, initiating and terminating calls, and performing control operations.
- the calling/called device could also include speech recognition capabilities in order to allow the calling/called party to enter information vocally.
- the calling/called device may also include a display to lOprovide visual message to the user, as well as processing units for encoding and decoding control signals, performing call processing procedures and control operations.
- the calling/called device is connected with wire-line or wireless connections to the network 204.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called
- 20204 may be a fixed wire-line network, a PSTN network (Public
- the telecommunication network may be a mobile telecommunication or cellular phone network, for example according to GSM standard (Global System for Mobile communications), for example, GSM standard (Global System for Mobile communications), etc.
- GSM Global System for Mobile communications
- the telecommunication network 204 may also be an IP- based network implementing the Voice over Internet Protocol,
- the telecommunication network 204 comprises a switching subsystem 206 for establishing connection and relaying speech information between the calling party 210 and one or more called 35parties 212.
- the switching subsystem may be coupled to a service provider hub 208 providing services applicable to various communication scenario, such as preserving anonymity of the calling party by masking the calling device number for the receiving party or maintaining blacklists and white lists.
- FIG. 3 a call flow diagram illustrating a sequence of events in accepting or rejecting a call from a calling party in accordance with a preferred embodiment of the present invention is now described.
- the calling party initiates on event 310 a call request from a calling device (210) to lOestablish a communication with a called party in a hidden
- the hidden calling number mode is requested either with the call emitted directly as an anonymous call with the caller dialing a prefix code hiding its number or the caller has a specific subscription with a communication service
- the communication provider checks if the called party has subscribed to the filtering service covered by the present invention. If the called party has not subscribed to the 0service, the number of the calling party is hidden for the called party as regularly done by any known solution. In case, the called party has subscribed to the filtering service, the calling number is encrypted at the communications provider network. The call request is then transmitted to the called 5device (212) with the encrypted identifier in the transmitted flow. When received, the encrypted identifier number is
- the called party is offered at event 340 the choice to blacklist the calling party for any further call and the choice is confirmed by storing or not on event 350 the encrypted identifier into the local memory 230.
- the encrypted identifier is again generatedand transmitted to the called party (370) .
- Figure 4 illustrates the main steps operated at a
- Process 400 begins at step 402 when a call is initiated by a calling party with a calling device that requests a call to be established with a called party. Theprocess then proceeds with step 404 where it is determined if the calling party is willing to hide its calling number or not. If not, the process goes to step 410 to establish the connection between the parties with clear identification of the caller. If it is determined that the calling number is to be hidden, theprocess proceeds with step 406 where a determination is made if the called party is a subscriber to the blacklist service
- the determination is made by checking the user's profile information available for the called party either in the Home Location Register (HLR) ofthe communication provider or in the Visitor Location Register (VLR) if the called party is a roaming user outside of the area covered by his/her home system.
- HLR Home Location Register
- VLR Visitor Location Register
- step 408 the hidden callingnumber is further encrypted by the communication provider.
- the encryption is done using an encryption key which is uniquely assigned by the communication service provider to the called device at time of subscription.
- the encryption algorithm may be any kind of cipher algorithm such as the Advanced Encryption Standard (AES) one.
- step 410 the process follows 5with step 410 to establish the connection between the parties.
- the calling number is encrypted within the flow transmitted to the called party. Thereafter the process ends at step 412.
- FIGS 5a and 5b illustrate the main steps operated at a 15called party edge according to a preferred embodiment of the present invention.
- Process 500 begins at step 502 when a call request is received by a called party.
- the encrypted identifier received is searched in the called party phone book to determine the identification (ID) of the caller. 20lf found, the calling party identification is displayed on step 506.
- the caller ID is either clearly displayed if it has been previously stored in the phone book or the encrypted identifier is displayed marked with a special prefix (such as a '#' or a '*' for example) indicating that the caller ID has not been 25found not in the called party phone book.
- a special prefix such as a '#' or a '*' for example
- Next test 508 is used to determine if the caller's
- step 508 proceeds with step 514 to accept the call.
- test 520 (figure 5b) where the called party is offered to add the caller's identification to the blacklist. If the answer is NO, test 522 allows to determine if the caller's phone number is already in the called party phone book or not. If already stored in, the process ends on step 530otherwise the process continues with test 526.
- step 524 the caller's number is blacklisted in the called party phone book.
- step 526 the process continues with choice 526 to record the caller's name in the phone book. If the answer is NO the process ends on step 530, otherwise the process proceeds with the name recording on step 528. And the process ends on step 530.
- the process allows to handle roaming calls received by a called party located outside its SIM card original country. The subscriber assigned key used by the operator to encrypt the phone number of the caller and stored on the Home Location Register, is transmitted to the Visitor
- the present invention can take the form of a computer program product accessible from a computer-usable or computer- readable medium providing program code for use by, or in
- a computer-usable or computer-readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by, or in connection with the instruction execution system, apparatus, or device.
- the medium can be an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM) , a read-only memory (ROM), a rigid magnetic disk and an optical disk.
- Current examples of optical disks include compact disk - read only memory (CD-ROM), compact disk - read/write (CD-R/W) and DVD.
- anonymous phone number would it be a phone call, a SMS, a MMS, Faxes, Voice Mail, or any other message.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention se rapporte à un procédé destiné à filtrer des communications téléphoniques entre un dispositif appelant et un dispositif appelé. Le dispositif appelé est connecté pour une communication à un fournisseur de services de communication. Le procédé selon l'invention comprend les étapes consistant : à déterminer qu'une demande, reçue d'un dispositif appelant ayant un numéro d'appelant, a pour fonction d'établir une communication téléphonique avec un dispositif appelé dans un mode caché ; à générer un identifiant chiffré, l'identifiant chiffré reliant le numéro d'appelant d'une demande en mode caché à une clé de chiffrement, ladite clé de chiffrement étant attribuée de façon unique au dispositif appelé ; à transmettre la demande de communication téléphonique sur le réseau en vue de sa réception par le dispositif appelé au moyen dudit identifiant chiffré ; et à établir la communication téléphonique entre le dispositif appelant et le dispositif appelé en réponse à la réception, depuis le dispositif appelé, d'une autorisation pour ledit identifiant chiffré.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP10305623.0 | 2010-06-11 | ||
EP10305623 | 2010-06-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011154221A1 true WO2011154221A1 (fr) | 2011-12-15 |
Family
ID=44310379
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2011/057843 WO2011154221A1 (fr) | 2010-06-11 | 2011-05-16 | Système, procédé et produit programme d'ordinateur destinés à filtrer des communications téléphoniques |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2011154221A1 (fr) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2510378A (en) * | 2013-02-01 | 2014-08-06 | Ibm | Simultaneously providing caller ID information and encrypted caller ID information for Telephony caller authentication |
EP2785029A1 (fr) * | 2013-03-29 | 2014-10-01 | Orange | Procédé et dispositif de transmission d'un appel masqué, procédé et dispositif de réception d'un appel masqué, signal de transmission d'un appel masqué, et programme d'ordinateur correspondant |
US9288062B2 (en) | 2014-02-20 | 2016-03-15 | International Business Machines Corporation | Telephone caller authentication |
CN113965648A (zh) * | 2020-07-21 | 2022-01-21 | 中国移动通信集团山东有限公司 | 一种信息隐藏方法、装置和电子设备 |
CN115022024A (zh) * | 2022-05-31 | 2022-09-06 | 中国电信股份有限公司 | 用于加密通话的方法及装置、存储介质及电子设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060199572A1 (en) * | 2005-03-03 | 2006-09-07 | Lucent Technologies Inc. | Anonymous call blocking in wireless networks |
DE102006038141A1 (de) * | 2006-08-16 | 2008-02-21 | Nokia Siemens Networks Gmbh & Co.Kg | Verfahren zur rechnergestützten Verarbeitung von Anrufen zwischen Teilnehmern in einem Kommunikationsnetz |
WO2009067356A1 (fr) | 2007-11-22 | 2009-05-28 | Motorola, Inc. | Procédé et système permettant d'ajouter un appelant à une liste bloquée |
EP2109325A1 (fr) * | 2007-03-20 | 2009-10-14 | Huawei Technologies Co., Ltd. | Système, dispositif et procédé de traitement de messages |
-
2011
- 2011-05-16 WO PCT/EP2011/057843 patent/WO2011154221A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060199572A1 (en) * | 2005-03-03 | 2006-09-07 | Lucent Technologies Inc. | Anonymous call blocking in wireless networks |
DE102006038141A1 (de) * | 2006-08-16 | 2008-02-21 | Nokia Siemens Networks Gmbh & Co.Kg | Verfahren zur rechnergestützten Verarbeitung von Anrufen zwischen Teilnehmern in einem Kommunikationsnetz |
EP2109325A1 (fr) * | 2007-03-20 | 2009-10-14 | Huawei Technologies Co., Ltd. | Système, dispositif et procédé de traitement de messages |
WO2009067356A1 (fr) | 2007-11-22 | 2009-05-28 | Motorola, Inc. | Procédé et système permettant d'ajouter un appelant à une liste bloquée |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2510378A (en) * | 2013-02-01 | 2014-08-06 | Ibm | Simultaneously providing caller ID information and encrypted caller ID information for Telephony caller authentication |
EP2785029A1 (fr) * | 2013-03-29 | 2014-10-01 | Orange | Procédé et dispositif de transmission d'un appel masqué, procédé et dispositif de réception d'un appel masqué, signal de transmission d'un appel masqué, et programme d'ordinateur correspondant |
FR3004049A1 (fr) * | 2013-03-29 | 2014-10-03 | France Telecom | Procede et dispositif de transmission d'un appel masque, procede et dispositif de reception d'un appel masque, signal de transmission d'un appel masque, et programme d'ordinateur correspondant. |
US9288062B2 (en) | 2014-02-20 | 2016-03-15 | International Business Machines Corporation | Telephone caller authentication |
US9313031B2 (en) | 2014-02-20 | 2016-04-12 | International Business Machines Corporation | Telephone caller authentication |
US9654976B2 (en) | 2014-02-20 | 2017-05-16 | International Business Machines Corporation | Telephone caller authentication |
CN113965648A (zh) * | 2020-07-21 | 2022-01-21 | 中国移动通信集团山东有限公司 | 一种信息隐藏方法、装置和电子设备 |
CN113965648B (zh) * | 2020-07-21 | 2024-05-07 | 中国移动通信集团山东有限公司 | 一种信息隐藏方法、装置和电子设备 |
CN115022024A (zh) * | 2022-05-31 | 2022-09-06 | 中国电信股份有限公司 | 用于加密通话的方法及装置、存储介质及电子设备 |
CN115022024B (zh) * | 2022-05-31 | 2023-09-29 | 中国电信股份有限公司 | 用于加密通话的方法及装置、存储介质及电子设备 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11272052B2 (en) | Real-time voice paging voice augmented caller ID/ring tone alias | |
US8307402B2 (en) | Method and apparatus for merging voice and data features with internet protocol television | |
US7793305B2 (en) | Methods and systems for providing a communication manager for wireless wireline converged telecommunication services | |
US7813481B1 (en) | Conversation recording with real-time notification for users of communication terminals | |
US20030108160A1 (en) | Intermediary device initiated caller identification | |
US7486779B2 (en) | Origin device based callee identification | |
JP5351787B2 (ja) | 通信処理システム及びプログラム | |
US20060074685A1 (en) | Destination device initiated caller identification | |
US20030108163A1 (en) | Origin device based caller identification | |
US20160255194A1 (en) | Systems and methods for controlling telephony communications | |
WO2011154221A1 (fr) | Système, procédé et produit programme d'ordinateur destinés à filtrer des communications téléphoniques | |
US8654949B2 (en) | Methods, systems and computer program products for providing access to personal profiles in communications systems | |
US9106429B2 (en) | Method and system for pre-accessing conference telephone and network side device | |
US20170208171A1 (en) | Communication system having user selectable features | |
US8768296B2 (en) | Method and apparatus for random access of voice mail messages | |
US10462302B2 (en) | Method for establishing the routing, in particular forwarding of an object of a communications activity, and devices for carrying out said method | |
KR100544036B1 (ko) | 인터넷 영상전화기의 단문 서비스시스템 및 방법 | |
JP6368666B2 (ja) | 迷惑電話対策システム、および、迷惑電話対策方法 | |
US10154387B2 (en) | Process of initiation of a conversation | |
US20040120503A1 (en) | Methods, systems, and media to capture a redialing sequence and to redial | |
RU2453065C2 (ru) | Способ персонального вызова пользователя телефонной сети связи | |
JP2023173488A (ja) | 情報処理装置、通信端末、通信システム、情報処理方法およびプログラム | |
WO2024009008A1 (fr) | Plateforme de service de téléphonie fournissant des services à valeur ajoutée | |
KR20100060313A (ko) | 음성 메시지를 이용한 발신자 처리방법 및 시스템과 이를 위한 기록매체 | |
KR20040083957A (ko) | 증거자료를 확보하기 위한 3자 통화 녹취 서비스 제공방법 및 그 시스템 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11723360 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11723360 Country of ref document: EP Kind code of ref document: A1 |