WO2016048203A1 - Fourniture d'un texte transcrit à partir d'une identification vocale d'un appelant inconnu - Google Patents

Fourniture d'un texte transcrit à partir d'une identification vocale d'un appelant inconnu Download PDF

Info

Publication number
WO2016048203A1
WO2016048203A1 PCT/SE2014/051091 SE2014051091W WO2016048203A1 WO 2016048203 A1 WO2016048203 A1 WO 2016048203A1 SE 2014051091 W SE2014051091 W SE 2014051091W WO 2016048203 A1 WO2016048203 A1 WO 2016048203A1
Authority
WO
WIPO (PCT)
Prior art keywords
calling party
party
unknown
call
called
Prior art date
Application number
PCT/SE2014/051091
Other languages
English (en)
Inventor
Keven WANG
Konstantinos Vandikas
Vlasios Tsiatsis
Original Assignee
Telefonaktiebolaget L M Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget L M Ericsson (Publ) filed Critical Telefonaktiebolaget L M Ericsson (Publ)
Priority to PCT/SE2014/051091 priority Critical patent/WO2016048203A1/fr
Publication of WO2016048203A1 publication Critical patent/WO2016048203A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
    • H04M7/0078Security; Fraud detection; Fraud prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6027Fraud preventions

Definitions

  • the invention relates generally to communication networks, and in particular to the detection of calls from devices that are associated with unknown callers and e.g. a network device that obtains spoken identification information from a device of an unknown caller and provides transcribed text of the information to a called party device.
  • a network device that obtains spoken identification information from a device of an unknown caller and provides transcribed text of the information to a called party device.
  • caller ID caller identification
  • VoIP Voice over IP
  • This information may comprise attributes of each specific, individual call (e.g., voice call, SMS message, multimedia session, or other
  • Metadata is information about the call, and is distinct from the data that makes up the call itself, such as VoIP data, the text of an SMS message, or the like. Metadata may relate to the type or character of a call, such as an emergency E-112 or E-911 call; it may be used for the generation of telephone bills to subscribers; or it may identify and/or include information about the called and calling parties.
  • a terminal may index a local or network-based address book or contacts list using the calling party number, and retrieve a name, company, and even photograph of the calling party, which are displayed on the screen when the phone "rings.”
  • a calling party device may provide metadata indicating the purpose or context of the call.
  • U.S. Application Publication No. 2007/0047726 describes a dialing application used by a calling party device to place a call to a called party device. The calling party is prompted to enter a text or voice annotation describing the nature of the desired conversation. This information is delivered to the called party device upon the phone ringing. The called party may then accept the call, or defer it to voicemail, in response to the information about the nature of the call.
  • a device associated with a calling party i.e., in the form of a brief text or voice message
  • an enhanced identification service classifies a calling party as a known or unknown party, such as by analysis of metadata (e.g., CDR) or consulting other network functionality, such as a network address book. If the calling party is classified as unknown, he or she is prompted to provide a brief spoken identification. This voice response is transcribed to text using voice recognition technology. The transcribed text is provided to a device of the called party when it is "rung," such as by including it in the "From" field of a SIP message header (from which it may be displayed in a Caller I D notice to the device of the called party).
  • information relating to the reliability of the transcribed text as an identification of the calling party is maintained, and a recommendation is provided prior to ringing the device of the called party as to whether the calling party has a reputation for truthful/helpful identification via the voice response.
  • the network device handling the call may update the database after each unknown call by indicating the accuracy of the transcribed text, based on feedback from the called party.
  • One embodiment relates to a method, performed by a network device, of detecting a potentially unknown calling party and providing identifying information about the calling party.
  • a call is received from a device associated with a calling party and that was initiated by the calling party.
  • the calling party is classified as being a known or unknown party.
  • An unknown calling party is prompted to provide spoken identifying information. Text transcribed from the unknown calling party's spoken identification is provided to the device of the called party.
  • the device includes a network communication interface operative to send and receive messages to and from other devices in the network, memory, and a controller operatively connected to the network communication interface and the memory.
  • the controller is operative to receive a call indication from the device of a calling party directed to the device of a called party; classify the calling party as being a known or unknown party; prompt an unknown calling party to provide spoken identifying information; and provide text transcribed from the unknown calling party's spoken identification to the device of the called party.
  • the network includes a network device hosting one or more Call Session Control Functions (CSCF) for a called party, a network device hosting a Media Resource Function (MRF), and one or more network devices hosting application servers.
  • the CSCF is operative to receive an indication of a call from the device of a calling party directed to the device of a called party.
  • the CSCF or one or more application servers is operative to classify the calling party as being a known or unknown party; if the calling party is classified as unknown, direct the MRF to prompt the calling party to provide spoken identifying information; and receive from the M RF text transcribed from the unknown calling party's spoken identification.
  • the CSCF is further operative to provide the device of the called party with the transcribed text upon alerting the called party of the call.
  • the MRF is operative to receive information identifying the called party from the CSCF; play a voice prompt to the calling party requesting a brief voice identification; receive a voice response from the calling party; transcribe the voice response to text using speech recognition technology; and send the transcribed text to the CSCF.
  • Still another embodiment relates to a non-transitory computer readable medium having stored thereon a computer program product for detecting a potentially unknown calling party and providing identifying information about the calling party, the computer program product comprising program instructions operative to cause a computing device to perform the steps of: receiving a call indication from a device associated with a calling party and initiated by the calling party; classifying the calling party as being a known or unknown party; prompting an unknown calling party to provide spoken identifying information; and providing text transcribed from the unknown calling party's spoken identification to the device of the called party.
  • a still further embodiment relates to a network device hosting one or more functional modules operative to provide call handling support to a called party in a communication network.
  • the functional modules include a call receiving module for receiving a call from a device associated with a calling party and initiated by the calling party; a known party determination module determining whether the calling party is known or unknown; a prompting module for prompting an unknown calling party to provide spoken identifying information; a call modification module for inserting text transcribed from the unknown calling party's spoken identification into a header field associated with the call; and a call forwarding module for forwarding the call to the device of the called party.
  • Another disclosed embodiment is a computer program for detecting a potentially unknown calling party, and providing identifying information about the calling party to the device of a called party.
  • the computer program comprising program instructions which when run on a network device causes the network device to receive a call indication from a device associated with a calling party. The call is initiated by the calling party.
  • the program instructions are also , when run on the network device, causing the network device to classify the calling party as being a known or unknown party, prompt an unknown calling party to provide spoken identifying information, and provide text transcribed from the unknown calling party's spoken identification to the device of the called party.
  • Figure 1 is a functional block diagram of relevant portions of interworking
  • Figures 2A and 2B are call diagrams of a method of enhanced identification.
  • Figure 3 is a sequence diagram of a method of detecting a potentially unknown caller and providing identifying information about the caller.
  • Figure 4 is a functional block diagram of a network device according to one embodiment.
  • Figure 5 is a functional module diagram of a network device according to one
  • FIG. 1 depicts a network 100, in which only relevant nodes and functions are depicted, for the purpose of discussion herein.
  • the network 100 includes network devices 102 hosting functions that comprise a core network and peripheral services of a wireless communication network, such as UMTS.
  • the wireless network devices 102 communicate via a Radio Access Network (RAN) 104, such as Long Term Evolution (LTE), to a plurality of subscriber User
  • RAN Radio Access Network
  • LTE Long Term Evolution
  • the RAN 104 includes various radio frequency (RF) devices (not shown) required to effect communication with mobile UE 106.
  • RF radio frequency
  • the network devices 102 also communicate via one or more telecommunication networks 108, and possibly through subsequent networks such as the Public Switched
  • PSTN Public Switched Telephone Network
  • the Internet not shown
  • PSTN Public Switched Telephone Network
  • this particular network configuration 100 is representative only.
  • the numerous network devices 102 that comprise the core network and associated peripheral devices and functions may implement the function of an IP Multimedia Subsystem (IMS), which is a general-purpose, open industry standard for voice and multimedia communications over packet-based IP networks. Communications between devices hosting functions within the IMS network utilize the Session Initiation Protocol (SI P). SI P is a signaling protocol for Internet conferencing, telephony, presence, events notification, instant messaging, and the like.
  • IMS IP Multimedia Subsystem
  • An IMS network implements multimedia sessions - referred to generically as "calls" - via Call Session Control Functions (CSCF), represented in Figure 1 by a single network device 1 14 hosting CSCF functionality.
  • the CSCF function may comprise a number of functions, which may be implemented on different network devices.
  • Such CSCF functions may comprise a Serving CSCF (S-CSCF) that initiates, manages, and terminates multimedia sessions; an optional Interrogating-CSCF (l-CSCF), which is a SIP proxy located at the edge of an administrative domain; and an l-CSCF, which may be connected to a Proxy- CSCF (P-CSCF), which is a SI P proxy that is the first point of contact to the IMS.
  • S-CSCF Serving CSCF
  • l-CSCF Interrogating-CSCF
  • P-CSCF Proxy- CSCF
  • CSCF functionality is represented as being hosted on network device 1 14.
  • the CSCF functionality on the network device 1 14 may perform other functions than call handling, such as maintaining Call Data Records, ascertaining whether a called party is unknown, prompting a calling party to provide spoken identification information, and the like.
  • the CSCF function on network device 1 14 performs these functions; however, in an IMS system, such functionality may be distributed.
  • one or more application servers 1 16 may perform one, some, or all of these functions.
  • Additional network devices host functions useful to the communication network 102.
  • Various application servers (AS) hosted by network devices 1 16a, 1 16b, 1 16c provide services such as email, file sharing, media services, location services, and the like. Additionally or alternatively, such application servers may provide telephony related functionality to augment the functions provided by the CSCF.
  • AS application servers
  • MRF Media Resource Function
  • the MRF is a service, defined in IMS, that provides media related functions such as media manipulation (e.g., voice stream mixing) and playing of tones and announcements.
  • Another AS function of relevance is a Policy Management function, hosted by network device 120.
  • the Policy Management provides guidance, in some cases, to a CSCF function as to how to handing an incoming call.
  • the Policy Management function may access a Home Subscriber Server (HSS) database, hosted by network device 122.
  • HSS Home Subscriber Server
  • the HSS is a database that contains user-related and subscriber-related information. It also provides support functions in mobility management, call and session setup, user authentication and access authorization, and the like.
  • Another network device 1 15 hosts one or more functions that maintain address books 1 19 for subscribers.
  • the network device 1 15 may host a Presence and Group Management (PGM) function 1 17, which tracks and conveys the availability of subscribers for communication services.
  • PGM Presence and Group Management
  • different functions hosted on the network device 1 15 may maintain subscriber network address books 1 19.
  • Network devices 102 may host numerous functions necessary or ancillary to the network devices 102.
  • an appropriate network function upon receiving a call, determines whether the calling party is known or unknown.
  • a CSCF hosted on network device 1 14 determines whether the calling party is known or unknown.
  • One straightforward way to make this determination is to inspect metadata associated with the incoming call. For example, if the calling party number or identifier (e.g., the From filed of a SI P header) is empty or contains null data, the calling party may be classified as unknown.
  • geographical information may be extracted, such as by accessing a location service hosted on a network device 1 16a-c.
  • the geographical information about the calling party may be used in various ways to determine whether the calling party is unknown. For example the calling party may be classified as unknown if the call originated from greater than a predetermined geographical distance from the called party's office, region, home network, or similar geographical classification. As another example, all calls from certain countries or regions may be deemed to originate from the device of an unknown calling party. As yet another example, an historic call list may be maintained for each called party, including the geographic location of the origin of the calls.
  • a calling party calling from a country or region a predetermined distance from the called party's home area, that is additionally from a country or region from which the called party has not received a call in a predetermined duration may be deemed of unknown origin.
  • Those of skill in the art may readily define other rules using geographical information that may indicate an unknown calling party.
  • the CSCF consults an historical contact list for an identifier of the device associated with the called party, and classifies the calling party as known or unknown.
  • the historical contact list may be constructed from Call Data Records (CDR).
  • CDR Call Data Records
  • Metadata associated with the call which is necessary or useful in billing, is recorded. This metadata is maintained in one or more network devices, such as at each CSCF, in CDRs (also known as Charging Data Records).
  • CDR information is a product of the operation of telephony exchange equipment, and is normally used for generating telephone bills to subscribers.
  • CDR information contains attributes of each specific, individual call, such as the identity of calling party, the identity of called party, the time and duration of the call, and the like.
  • the metadata stored in CDRs may include:
  • Phone number associated with the device of the subscriber originating the call (calling party)
  • the CSCF builds an historical contact list from CDRs.
  • the historical contact list is a list comprising metadata regarding all calls that the subscriber has made, and all calls placed to the subscriber.
  • an historical contact list may be constructed "on the fly" by dynamically searching the CDRs and extracting metadata for the calls from or to a particular subscriber.
  • the CSCF analyzes the historical call list to discover a
  • One representative communication pattern may be the history of prior communication with the called party. For example, if the called party has had no calls to or from the calling party device (as well as can be ascertained from the available metadata) within a predetermined call history duration, it may be deemed unknown. As another example, if the called party has had no communication with any party in the calling party's country or other geographic region with a predetermined call history duration, the calling party may be deemed unknown. In both cases, the predetermined call history duration may be three months. As yet another example, a communication pattern may be the duration of past calls between the called and calling party.
  • the calling party may be assumed to be a salesperson or the like, and may be deemed an unknown party for the purpose of obtaining further identification information according to embodiments of the invention.
  • the CSCF classifies the calling party as known or unknown by accessing a network address book 1 19 associated with the called party.
  • the CSCF may access a called party's network address book from a function hosted on network device 1 15 that maintains the address book 1 19.
  • a function may comprise a PGM function 1 17.
  • metadata may be obtained from such a network address book 1 19 associated with the called party, which may be analyzed similarly to metadata from an historical call list, as described above.
  • classifying a calling party is, in one embodiment, a binary decision: the calling party is known or unknown.
  • the classification takes the form of a probability, for example, expressed as a number from 0 to 1 indicating a confidence level of the classification as a known or unknown party.
  • the CSCF forwards the call to the device of the called party.
  • the calling party is prompted to provide additional identifying information.
  • the prompt is a voice prompt (e.g., prerecorded or synthesized), and the calling party is prompted to speak its identifying information. This information is transcribed to text using speech recognition technology.
  • a voice prompt and spoken reply is a natural interface in the context of a voice telephone. Its only significant limitation is language, and it is well known in the art that both voice synthesis and speech recognition may be tailored to different languages.
  • Speech recognition is the automated (machine) understanding of human speech.
  • One speech recognition technology of particular relevance is Speech-To-Text (STT), which is the translation of spoken words into text.
  • STT Speech-To-Text
  • Speech recognition is a very complex problem, and is an area of active research and technology development.
  • the accuracy of speech recognition varies with the following factors:
  • the vocabulary can be limited to only a subset of nouns and proper nouns (i.e., people names).
  • telephones including mobile phones, typically have very good isolation from surrounding ambient noise.
  • the duration of speech is necessarily very short (i.e., 2-5 words) so that it will fit into a SIP header, and can be displayed on a small screen. Additionally, the speech is continuous.
  • a number of speech recognition algorithms have been developed, and products are available that implement them. Examples include Hidden Markov models, Dynamic time warping (DTW)-based speech recognition, and neural networks. Given the teachings of the present disclosure, those of skill in the art may select and implement a particular speech recognition approach, as required or desired for any particular implementation. Accordingly, further details of speech recognition are not germane to explication of embodiments of the invention, and are not discussed further herein.
  • an individuals' caller ID information can be blocked by means beyond their control (e.g., company-wide systems), it is clear that others deliberately hide or spoof the calling party information that attempts to identify them. It can be easily predicted that some individuals will simply speak a lie when prompted for identifying information, effectively misrepresenting themselves as someone else. While this cannot be prevented, in one embodiment, a reputation system attempts to identify such individuals, and provide for future calls an indication of their reputation for truthfully identifying themselves. The reputation system collects feedback from the called party following each call for which an unknown calling party was prompted to provide identifying information. The called party can indicate whether, or to what extent, the additional identifying information was truthful and accurate.
  • a mobile application on the called party phone prompts the called party, after the call terminates, to add the calling party to local address book.
  • the application may automatically populate the calling party number, and rather than ask the called party for the caller's name (as may comprise current state of the art) the calling party's name may be populated from the text that was transcribed from the calling party's speech.
  • the mobile application may also prompt the called party to provide feedback indicating whether identifying information spoken by the calling party aligned with that party's actual identity. Such feedback may be forwarded to, e.g., the Policy Management function hosted on network device 120, or directly to a reputation database, such as may form part of HSS on network device 122.
  • the Policy Management function hosted on network device 120 is consulted during call setup.
  • the Policy Management function is responsible for proposing an action by utilizing the unknown calling party's reputation data, in addition to information such as the called party's predefined preferences.
  • the Policy Management function accesses the calling party's reputation data from a reputation database, which may form part of the HSS hosted on network device 122.
  • the reputation database may be maintained by an AS function hosted on another network device 1 16a-c, or the Policy
  • Management function may maintain the reputation database directly on the network device 120.
  • the reputation database may be implemented using any known database
  • the reputation database should maintain, for each calling party, a calling party ID and called-party- provided feedback as to the calling party's truthfulness in identifying himself or herself prior to the call. For example, if the reputation of a calling party is low - meaning the individual's identification speech did not align closely with the called party's assessment of his identity - then the function handling call setup, such as CSCF, may block the call.
  • CSCF function handling call setup
  • Figure 2 depicts a representative call flow in one embodiment of the invention.
  • This example is presented in the context of an IMS network, and some of the messages sent between network entities are SIP messages. Other messages may utilize other known network messaging protocols, such as Diameter, an authentication, authorization, and accounting (AAA) protocol.
  • AAA authentication, authorization, and accounting
  • This example is for illustrative purposes only; the invention is not limited to this environment, and may be mapped to any communication network by those of skill in the art.
  • the called party registers for an enhanced identification service (event 1), and the CSCF updates the user's subscription (event 2), for example in the Home Subscriber Server (HSS).
  • event 1 the called party registers for an enhanced identification service
  • event 2 the user's subscription
  • HSS Home Subscriber Server
  • these steps may be omitted.
  • a calling party places a call towards the device of the called party, which may for example comprise a SIP Invite message (event 3), and the CSCF responds with a SIP 100 Trying message (event 4).
  • the CSCF classifies the calling party as being a known or unknown party (event 5). As discussed above, in one embodiment this comprises accessing an historical database of metadata related to calls to and by the called party device. The database may be constructed from metadata stored as CDR. In another embodiment, the classification may comprise accessing a network address book 1 19 associated with the called party. Such access may be performed using well-known messaging formats, e.g., SIP in an IMS network.
  • the call is forwarded to the device of the called party, using standard SIP messaging well known in the art.
  • the CSCF checks to ascertain if the called party subscribes to the enhanced identification service
  • Event 6 for example accessing the HSS. If the called party does not subscribe to the service, the call may be refused, routed to voicemail, or otherwise handled per predetermined preferences of the called party.
  • a reputation database may comprise any suitable database functionality. For example, it may be
  • the reputation database may comprise a simple key-value storage structure, such as a hash table.
  • the database should store calling party identifying information and one or more historical evaluations as to the veracity of his or her spoken identity responses.
  • the CSCF accomplishes this by sending a message to a Policy Manager identifying the unknown caller (to the extent possible by the metadata available), and requesting a recommendation based on the calling party's
  • Figure 1 depicts an embodiment in which the CSCF prompts the calling party by use of the MRF.
  • the CSCF prepares and sends to the MRF a message identifying the calling party, including a prompt to be voice synthesized, and instructing the MRF to capture and transcribe to text a voice response spoken by the calling party (event 1 1).
  • This message may comprise a SIP Invite message, with the address of the calling party in the To field of the SIP header.
  • the MRF then synthesizes a voice prompt, or retrieves a prerecorded one (event 12), and acknowledges the CSCF with a SIP 200 OK message (event 13).
  • the CSCF then sends a SIP 200 OK message to the device of the calling party, which includes the Session Description Protocol (SDP) information identifying the MRF (event 14).
  • SDP Session Description Protocol
  • the MRF transcribes the spoken response to text using voice recognition (step 17), and sends the transcribed text to the CSCF in a SIP BYE message (event 18).
  • the method of including the transcribed text in the SIP BYE message is similar to a method described in the IETF RFC 5552, "SIP interface to VoiceXML Media Services.”
  • the CSCF acknowledges with a SIP 200 OK message (event 19).
  • the CSCF then inserts the transcribed text from the unknown calling party's spoken identification into the From header of a SIP Invite message, and sends it to the device of the called party (event 20).
  • the called party device responds with a SIP 180 Ringing message (event 21), and a SIP 200 OK message when the called party answers (event 22).
  • the CSCF then sends a SIP Invite message to the calling party device, including the SDP of the called party (event 23).
  • the calling party device acknowledges with a SIP 200 OK message (event 24), and the called and calling party devices are then connected by the call (event 25).
  • the called party device at the termination of the call, provides feedback as to the accuracy of the identification information (event 26).
  • the CSCF sends this information to the reputation database, such as may be maintained by the HSS (event 23).
  • Figure 3 depicts a method 200, performed by a network device 1 14 hosting a function for handling calls for a called party, such as a CSCF in an IMS network, of detecting potentially unknown callers and providing identifying information about the callers.
  • the CSCF receives a call indication from a calling party device (block 202).
  • the CSCF classifies the calling party as being a known or unknown party (block 204).
  • the CSCF may perform this classification by consulting CDR data, a network address book, or the like. If the calling party is classified as being known (block 204), the CSCF forwards the call to the called party device (block 206).
  • the CSCF classifies the calling party as being unknown (block 204), it prompts the unknown calling party to provide spoken identifying information (block 208).
  • the network device may do this directly, or may engage a media function, such as a MRF.
  • the CSCF inserts the text transcribed from the unknown calling party's spoken identification to the call, such as the From field of a SIP header (block 210).
  • the CSCF then forwards the call, including the transcribed text identification information, to the called party device (block 206).
  • the CSCF may, upon classifying the calling party as unknown, consult a reputation database to determine how to proceed. In one embodiment, it may delegate such analysis to a Policy Manager, as described above with respect to Figure 2.
  • a Policy Manager as described above with respect to Figure 2.
  • FIG. 4 depicts a network device 114 hosting a function operative to implement the method 200 and enhanced identification service described above.
  • the network device 114 comprises a network communication interface 12, a controller 14 operatively connected to a computer program storage product 16 in the form of a memory storing a computer program 18, and a wireless communication interface 20 operatively connected to one or more antennas 22.
  • the network communication interface 12 may comprise a receiver and transmitter interface used to communicate with one or more other network devices, such as an HSS, MRF, or AS implementing a Policy Management function, over a communication network according to one or more communication protocols known in the art or that may be developed, such as IMS/SIP, Diameter, HTTP, RTP, RTCP, HTTPs, SRTP, CAP, DCCP, Ethernet, TCP/I P, SONET, ATM, or the like.
  • the network communication interface 12 implements receiver and transmitter functionality appropriate to the communication network links (e.g., optical, electrical, and the like).
  • the transmitter and receiver functions may share circuit components and/or software, or alternatively may be implemented separately.
  • the controller 14 may comprise any sequential state machine operative to execute machine instructions stored as one or more machine-readable computer programs 18 in the memory 16, such as one or more hardware-implemented state machines (e.g., in discrete logic, FPGA, ASIC, etc.); programmable logic together with appropriate firmware; one or more stored- program, general-purpose processors, such as a microprocessor or Digital Signal Processor (DSP), together with appropriate software; or any combination of the above.
  • hardware-implemented state machines e.g., in discrete logic, FPGA, ASIC, etc.
  • DSP Digital Signal Processor
  • the memory 16 may comprise any non-transitory machine-readable media known in the art or that may be developed, including but not limited to magnetic media (e.g., floppy disc, hard disc drive, etc.), optical media (e.g., CD-ROM , DVD-ROM, etc.), solid state media (e.g., SRAM, DRAM, DDRAM, ROM, PROM , EPROM, Flash memory, solid state disc, etc.), or the like.
  • the memory 16 is operative to store, and the controller 14 is operative to execute, computer program 18. When executed, the computer program 18 is operative to implement the enhanced identification function described herein, such as the method 200.
  • the memory 16 may store, and the controller 14 may execute, other computer programs, such as operating system functions and computer programs implementing other network server functions.
  • the memory 16 may also store metadata, such as CDR.
  • the network device 1 14 is primarily contemplated as residing in the core network, for example hosting a CSCF.
  • the network device 1 14 providing the enhanced identification functionality may comprise a base station (referred to as NodeB or eNodeB in the LTE network) in the RAN 104, operative to communicate with User Equipment (UE) 106 within its geographic area, or cell.
  • the device 1 14 may include a transceiver 20 operatively connected to one or more antennas 22.
  • the transceiver 20 is operative to communicate with one or more other transceivers via a Radio Access Network 104 according to one or more communication protocols known in the art or that may be developed, such as I EEE 802.xx, CDMA, WCDMA, GSM, LTE, UTRAN, WiMax, or the like.
  • a Radio Access Network 104 such as I EEE 802.xx, CDMA, WCDMA, GSM, LTE, UTRAN, WiMax, or the like.
  • transceiver 20 implements transmitter and receiver functionality appropriate to the Radio Access Network 104 links (e.g., (de)coding, (de)modulation, amplification, interference reduction, and the like).
  • the transmitter and receiver functions may share circuit components and/or software, or alternatively may be implemented separately.
  • FIG. 5 depicts in one embodiment a hardware functional module diagram of the network device 1 14.
  • Each module 130-138 comprises in this embodiment dedicated hardware, programmable hardware together with appropriate firmware.
  • Fig 5 depicts functional modules implemented as one or more processors together with one or more appropriate computer programs, such as computer program 18.
  • the functional modules include at least a call receiving module 130, a known party determination module 132, a prompting module 134, a call modification module 136, and a call forwarding module 138.
  • the call receiving module 130 is operative to receive a call from a calling party device, according to known networking protocols, such as for example SIP over IMS.
  • the known party determination module 132 is operative to determine whether a calling party is known or unknown to the called party.
  • the known party determination module 132 may employ numerous strategies to make this determination, as described herein, for example considering any information in a From field of the call header, metadata such as geographical information, CDR information, information from network address books, and the like.
  • the prompting module 134 is operative, in the event a call is determined to originate from the device of an unknown calling party, to prompt the calling party to provide spoken identifying information.
  • the prompting module 134 may execute this function by preparing and sending network messages to other functional modules (including those hosted on other network devices) which implement the prompting on behalf of the prompting module 134.
  • the other functional module e.g. , a MRF hosted on network device 1 15
  • the other functional module in response to messages from the prompting module 134, may play to the calling party a synthesized or recorded prompt for identifying information, receive a spoken response, perform speech to text transcription of the spoken response, and return the transcribed text to the prompting module 134.
  • the call modification module 136 is operative to insert text transcribed from the unknown calling party's spoken identification (which may, for example, be received by the prompting module 134 from another network functional module) into a header field associated with the call, prior to delivering the call to the device of the called party.
  • the call forwarding module 138 is operative to forward the call to the called party device, with the transcribed text in the header. In this manner, the called party may view the transcribed text upon being notified of the call, and may use information gleaned from the transcribed text to decide whether to take the call.
  • the modules 130-138 are implemented with the help of software, the modules may be software modules, but they may also be seen as instructions (in dependence of computer language being used for e.g.
  • the enhanced identification service of the invention presents numerous advantages over the prior art.
  • a reputation database and analysis system provides additional guidance in handling the call, based on the particular unknown calling party's past history of truthfulness and helpfulness regarding its spoken identifier.
  • network functions such as CSCF, PGM, HSS, Policy Management, MRF, and the like, are understood to be implemented in network devices 1 14, 115, 116, 118, 120, 122 operative to communicate in the IMS network 102.
  • Some such devices 116a, 1 16b, 1 16c may host application servers (AS) implementing one or more such functions.
  • AS application servers
  • Such network devices 115, 116, 120, 122 may substantially resemble the network device of Figure 3.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Un service d'identification amélioré classe (204) un appelant en tant que partie connue ou inconnue, soit par une analyse de métadonnées (par exemple, CDR), soit par une consultation d'un annuaire de réseau (119). Si l'appelant est classé (204) en tant que partie inconnue, il est prié (208) de fournir une brève identification vocale. Cette réponse vocale est transcrite en un texte à l'aide d'une technologie de reconnaissance de la parole. Le texte transcrit est fourni (210) à un dispositif associé à l'appelé lorsque la « sonnerie retentit » (206) par exemple en l'incluant dans le champ « De » d'un en-tête de message SIP (à partir duquel il peut être montré à l'appelé dans une note d'identifiant d'appelant). Dans un mode de réalisation, des informations liées à la fiabilité du texte transcrit en tant qu'identification de l'appelant sont conservées et une recommandation est fournie avant la sonnerie du dispositif associé à l'appelé si l'appelant a la réputation pour une identification véridique/utile via la réponse vocale. L'appelé peut mettre à jour la base de données après chaque appel inconnu en indiquant la précision du texte transcrit.
PCT/SE2014/051091 2014-09-24 2014-09-24 Fourniture d'un texte transcrit à partir d'une identification vocale d'un appelant inconnu WO2016048203A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SE2014/051091 WO2016048203A1 (fr) 2014-09-24 2014-09-24 Fourniture d'un texte transcrit à partir d'une identification vocale d'un appelant inconnu

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2014/051091 WO2016048203A1 (fr) 2014-09-24 2014-09-24 Fourniture d'un texte transcrit à partir d'une identification vocale d'un appelant inconnu

Publications (1)

Publication Number Publication Date
WO2016048203A1 true WO2016048203A1 (fr) 2016-03-31

Family

ID=55581563

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2014/051091 WO2016048203A1 (fr) 2014-09-24 2014-09-24 Fourniture d'un texte transcrit à partir d'une identification vocale d'un appelant inconnu

Country Status (1)

Country Link
WO (1) WO2016048203A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018118993A1 (fr) * 2016-12-20 2018-06-28 Hiya, Inc. Utilisation d'une injection de cnam pour délivrer des informations d'appelant

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000005860A1 (fr) * 1998-07-24 2000-02-03 Ameritech Corporation Procede et systeme assurant une identification amelioree d'appelant
EP1755324A1 (fr) * 2005-08-19 2007-02-21 AT&T Corp. Système de messagerie unifiée avec transcription des messages vocaux
US20070047532A1 (en) * 2005-08-29 2007-03-01 Sbc Knowledge Ventures, L.P. System and method of managing telephone calls within a voice over internet protocol telephone system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000005860A1 (fr) * 1998-07-24 2000-02-03 Ameritech Corporation Procede et systeme assurant une identification amelioree d'appelant
EP1755324A1 (fr) * 2005-08-19 2007-02-21 AT&T Corp. Système de messagerie unifiée avec transcription des messages vocaux
US20070047532A1 (en) * 2005-08-29 2007-03-01 Sbc Knowledge Ventures, L.P. System and method of managing telephone calls within a voice over internet protocol telephone system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Digital cellular telecommunications system (Phanse 2+); Universal Mobile Telecommunications System (UMTS); LTE; IP Multimedia Subsystem (IMS); Stage 2 Release 12", 3GPP TS 23.228 VERSION 12.6.0, 22 September 2014 (2014-09-22), Retrieved from the Internet <URL:http://www.3gpp.org/DynaReport/23228.htm> *
"Preventing Spam For SIP-based Instant Messages and Sessions; Kumar Srivastava and Henning Schulzrinne;", 28 October 2004 (2004-10-28), Retrieved from the Internet <URL:http://www.cs.columbia.edu/techreports/cucs-042-04.pdf> *
MUHAMMAD AJMAL AZAD ET AL.: "Caller-REP: Detecting unwanted calls with caller social strength;", COMPUTERS & SECURITY #39, November 2013 (2013-11-01) *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018118993A1 (fr) * 2016-12-20 2018-06-28 Hiya, Inc. Utilisation d'une injection de cnam pour délivrer des informations d'appelant
US10135973B2 (en) 2016-12-20 2018-11-20 Hiya, Inc. Using CNAM injection to deliver caller information

Similar Documents

Publication Publication Date Title
US10116792B2 (en) Adding additional information to caller ID information
US8374328B2 (en) Method and system for adding a caller in a blocked list
US8977229B2 (en) Emergency call notification for network services
US20180324299A1 (en) Network-controlled robocall and scam call handling
US20100015991A1 (en) System and method for calling a geosoc
US20090274284A1 (en) Method and appartus for conveying a calling party identifier
US11223955B2 (en) Mitigation of spoof communications within a telecommunications network
US7916842B2 (en) Systems and methods for providing voicemail services including caller identification
EP3891971B1 (fr) Détection d&#39;appels mystifiés utilisant l&#39;en-tête d&#39;appel
US10506102B2 (en) Voice messaging and calling system for inmates
US20160255194A1 (en) Systems and methods for controlling telephony communications
US20160134750A1 (en) Incoming call identification
WO2020134291A1 (fr) Procédé de traitement d&#39;appel entrant, dispositif, système de blocage d&#39;appel de nuisance et support d&#39;informations lisible
US10154145B1 (en) Virtual telephony assistant
US11909782B2 (en) Systems and methods for using machine learning techniques for network-implemented spam call detection
KR101573585B1 (ko) 오퍼레이터 정보를 관리하기 위한 장치 및 방법들
WO2024038346A1 (fr) Vérification en temps réel d&#39;une identification (id) d&#39;appelant
US20140105073A1 (en) Mmtel network call logging
WO2016048203A1 (fr) Fourniture d&#39;un texte transcrit à partir d&#39;une identification vocale d&#39;un appelant inconnu
US20130121212A1 (en) Method and apparatus for supporting location-aware services
US20210281678A1 (en) Method and system for screening voice calls
US10462286B2 (en) Systems and methods for deriving contact names
US20110300839A1 (en) System for recording a telephone call
US8964965B1 (en) Smart capture
US9179302B2 (en) System and method for communication terminal surveillance based on speaker recognition

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14902833

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14902833

Country of ref document: EP

Kind code of ref document: A1