[go: up one dir, main page]

WO2011154221A1 - System, method and computer program product for filtering telephone communications - Google Patents

System, method and computer program product for filtering telephone communications Download PDF

Info

Publication number
WO2011154221A1
WO2011154221A1 PCT/EP2011/057843 EP2011057843W WO2011154221A1 WO 2011154221 A1 WO2011154221 A1 WO 2011154221A1 EP 2011057843 W EP2011057843 W EP 2011057843W WO 2011154221 A1 WO2011154221 A1 WO 2011154221A1
Authority
WO
WIPO (PCT)
Prior art keywords
called device
calling
telephone
encrypted identifier
communications
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/EP2011/057843
Other languages
French (fr)
Inventor
Bernard Pucci
Jean-Christophe Mestres
Jean-Louis Veran
Christophe Palaysi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Compagnie IBM France SAS
International Business Machines Corp
Original Assignee
Compagnie IBM France SAS
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Compagnie IBM France SAS, International Business Machines Corp filed Critical Compagnie IBM France SAS
Publication of WO2011154221A1 publication Critical patent/WO2011154221A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/18Comparators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks

Definitions

  • anonymous caller identifies orally himself/herself thereby allowing the recipient to accept or not the incoming call.
  • a method for adding a lOcaller in a blocked list stored at a communication server includes receiving a call from the caller at a communication device and a set of inputs in response to the call.
  • the set of inputs includes a set of instructions to add the caller in the blocked list.
  • Transmission of the call termination request initiates addition of the caller in the blocked list at the communication server.
  • an object of the invention is to provide a system and a method allowing to filter calls from anonymous
  • a method for selectively filtering telephone lOcommunications comprises the steps of:
  • FIG.l illustrates typical phone firewall interfaces
  • FIG.2 depicts a general environment to operate the present invention
  • FIG.3 shows a call flow diagram according to an embodiment of lOthe present invention
  • FIG.4 is a flowchart illustrating the main steps operated at a provider edge according to an embodiment of the present
  • FIG.5a and 5b are flowcharts illustrating the main steps
  • a calling/called device may be any type of analog or digital telephone equipment compliant with the telecommunication network 204, such as a cordless telephone, a cellular telephone, a personal digital assistant (PDA) , a VoIP
  • a calling/called device comprises input and output means.
  • the input and output means may include a handset with a loudspeaker and a microphone, and a keypad with buttons for input to the telephone sets.
  • the keypad may be used for entering 5a call number, validating commands, initiating and terminating calls, and performing control operations.
  • the calling/called device could also include speech recognition capabilities in order to allow the calling/called party to enter information vocally.
  • the calling/called device may also include a display to lOprovide visual message to the user, as well as processing units for encoding and decoding control signals, performing call processing procedures and control operations.
  • the calling/called device is connected with wire-line or wireless connections to the network 204.
  • the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
  • the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
  • the telecommunication network may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
  • the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
  • the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
  • the telecommunication network may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called
  • 20204 may be a fixed wire-line network, a PSTN network (Public
  • the telecommunication network may be a mobile telecommunication or cellular phone network, for example according to GSM standard (Global System for Mobile communications), for example, GSM standard (Global System for Mobile communications), etc.
  • GSM Global System for Mobile communications
  • the telecommunication network 204 may also be an IP- based network implementing the Voice over Internet Protocol,
  • the telecommunication network 204 comprises a switching subsystem 206 for establishing connection and relaying speech information between the calling party 210 and one or more called 35parties 212.
  • the switching subsystem may be coupled to a service provider hub 208 providing services applicable to various communication scenario, such as preserving anonymity of the calling party by masking the calling device number for the receiving party or maintaining blacklists and white lists.
  • FIG. 3 a call flow diagram illustrating a sequence of events in accepting or rejecting a call from a calling party in accordance with a preferred embodiment of the present invention is now described.
  • the calling party initiates on event 310 a call request from a calling device (210) to lOestablish a communication with a called party in a hidden
  • the hidden calling number mode is requested either with the call emitted directly as an anonymous call with the caller dialing a prefix code hiding its number or the caller has a specific subscription with a communication service
  • the communication provider checks if the called party has subscribed to the filtering service covered by the present invention. If the called party has not subscribed to the 0service, the number of the calling party is hidden for the called party as regularly done by any known solution. In case, the called party has subscribed to the filtering service, the calling number is encrypted at the communications provider network. The call request is then transmitted to the called 5device (212) with the encrypted identifier in the transmitted flow. When received, the encrypted identifier number is
  • the called party is offered at event 340 the choice to blacklist the calling party for any further call and the choice is confirmed by storing or not on event 350 the encrypted identifier into the local memory 230.
  • the encrypted identifier is again generatedand transmitted to the called party (370) .
  • Figure 4 illustrates the main steps operated at a
  • Process 400 begins at step 402 when a call is initiated by a calling party with a calling device that requests a call to be established with a called party. Theprocess then proceeds with step 404 where it is determined if the calling party is willing to hide its calling number or not. If not, the process goes to step 410 to establish the connection between the parties with clear identification of the caller. If it is determined that the calling number is to be hidden, theprocess proceeds with step 406 where a determination is made if the called party is a subscriber to the blacklist service
  • the determination is made by checking the user's profile information available for the called party either in the Home Location Register (HLR) ofthe communication provider or in the Visitor Location Register (VLR) if the called party is a roaming user outside of the area covered by his/her home system.
  • HLR Home Location Register
  • VLR Visitor Location Register
  • step 408 the hidden callingnumber is further encrypted by the communication provider.
  • the encryption is done using an encryption key which is uniquely assigned by the communication service provider to the called device at time of subscription.
  • the encryption algorithm may be any kind of cipher algorithm such as the Advanced Encryption Standard (AES) one.
  • step 410 the process follows 5with step 410 to establish the connection between the parties.
  • the calling number is encrypted within the flow transmitted to the called party. Thereafter the process ends at step 412.
  • FIGS 5a and 5b illustrate the main steps operated at a 15called party edge according to a preferred embodiment of the present invention.
  • Process 500 begins at step 502 when a call request is received by a called party.
  • the encrypted identifier received is searched in the called party phone book to determine the identification (ID) of the caller. 20lf found, the calling party identification is displayed on step 506.
  • the caller ID is either clearly displayed if it has been previously stored in the phone book or the encrypted identifier is displayed marked with a special prefix (such as a '#' or a '*' for example) indicating that the caller ID has not been 25found not in the called party phone book.
  • a special prefix such as a '#' or a '*' for example
  • Next test 508 is used to determine if the caller's
  • step 508 proceeds with step 514 to accept the call.
  • test 520 (figure 5b) where the called party is offered to add the caller's identification to the blacklist. If the answer is NO, test 522 allows to determine if the caller's phone number is already in the called party phone book or not. If already stored in, the process ends on step 530otherwise the process continues with test 526.
  • step 524 the caller's number is blacklisted in the called party phone book.
  • step 526 the process continues with choice 526 to record the caller's name in the phone book. If the answer is NO the process ends on step 530, otherwise the process proceeds with the name recording on step 528. And the process ends on step 530.
  • the process allows to handle roaming calls received by a called party located outside its SIM card original country. The subscriber assigned key used by the operator to encrypt the phone number of the caller and stored on the Home Location Register, is transmitted to the Visitor
  • the present invention can take the form of a computer program product accessible from a computer-usable or computer- readable medium providing program code for use by, or in
  • a computer-usable or computer-readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by, or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM) , a read-only memory (ROM), a rigid magnetic disk and an optical disk.
  • Current examples of optical disks include compact disk - read only memory (CD-ROM), compact disk - read/write (CD-R/W) and DVD.
  • anonymous phone number would it be a phone call, a SMS, a MMS, Faxes, Voice Mail, or any other message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method for filtering anonymous telephone communications from a calling device to a called device is disclosed. The called device is communicatively connected to a communications service provider and the method comprises the steps of determining that a request, received from a calling device having a calling number, is for establishing a telephone communication with a called device in a hidden mode; generating an encrypted identifier, the encrypted identifier linking the calling number of a hidden mode request to an encryption key, wherein said encryption key being uniquely assigned to the called device; transmitting over the communication network for receipt by the called device the telephone communication request using said encrypted identifier; and in response to receiving from the called device an authorization for said encrypted identifier, establishing the telephone communication between the calling device and the called device.

Description

SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR FILTERING TELEPHONE COMMUNICATIONS
Field of the invention
The present invention relates generally to the field of
communication devices and more particularly to a system andmethod for filtering telephone communications from anonymous callers .
Background art
The growing volume of unwanted and unknown telephone
communications, mainly anonymous calls, is widely regarded as a serious problem for society and a serious irritation for
individuals who depend on the telephone. In certain cases, these anonymous calls may come from people or organisms the recipient doesn't want effectively to speak with, but there are cases of anonymous calls the recipient would not want to miss. There exist automated filtering techniques, providing "phone firewall" allowing users to define on their telephone device, blacklist, white list, to reject unknown callers, or to block unsolicited calls.
5 Figure 1 shows two typical phone firewall interfaces.
Some telephone providers offer services to have the
anonymous caller identifies orally himself/herself thereby allowing the recipient to accept or not the incoming call.
In WO 2009/067356 Al from Motorola, a method for adding a lOcaller in a blocked list stored at a communication server is disclosed. The method includes receiving a call from the caller at a communication device and a set of inputs in response to the call. The set of inputs includes a set of instructions to add the caller in the blocked list. A call termination request
15including the set of instructions is transmitted to the
communication server. Transmission of the call termination request initiates addition of the caller in the blocked list at the communication server.
The prior art solutions while easy-to-use can easily be 0defeated by the callers.
So, there is the need for a method and system to selectively filtering incoming calls from anonymous callers and rejecting those unwanted "anonymous calls" while accepting those wanted "anonymous calls". 5 Moreover, as only the recipient of an incoming call can really determine whether the caller is welcome or not, there is also the need to have blacklist or white list built on a
voluntary action of the recipient rather than based on a generic and global action.
30 The present invention offers a solution to this need. Summary of the invention
Accordingly, an object of the invention is to provide a system and a method allowing to filter calls from anonymous
5callers to accept or reject the call.
To achieve the foregoing object, a system and method, as further described in the appended independent claim 1, is provided .
In particular, a method for selectively filtering telephone lOcommunications comprises the steps of:
determining that a request, received from a calling device having a calling number, is for establishing a telephone communication with a called device in a hidden mode; generating an encrypted identifier, the encrypted identifier linking the calling number of a hidden mode request to an encryption key, wherein said encryption key being uniquely assigned to the called device; transmitting over the communication network for receipt by the called device the telephone communication request using said encrypted identifier; and in response to receiving from the called device an
authorization for said encrypted identifier, establishing the telephone communication between the calling device and the called device.
Further embodiments are described in the appended dependent claims .
Further aspects of the invention will now be described, by 30way of preferred implementation and examples, with reference to the accompanying figures. Brief description of the drawings
The above and other items, features and advantages of the invention will be better understood by reading the following more particular description of the invention in conjunction with 5the figures wherein:
FIG.l illustrates typical phone firewall interfaces;
FIG.2 depicts a general environment to operate the present invention ;
FIG.3 shows a call flow diagram according to an embodiment of lOthe present invention;
FIG.4 is a flowchart illustrating the main steps operated at a provider edge according to an embodiment of the present
invention ;
FIG.5a and 5b are flowcharts illustrating the main steps
15operated at a called party edge according to an embodiment of the present invention.
Detailed description of the invention
Embodiments of the invention are described herein after by 0way of examples with reference to the accompanying figures and drawings .
Going to figure 2, a preferred environment to operate the present invention is shown. A telecommunication system 200 including calling telecommunication devices 210 used for
5communication with called telecommunication devices 212 through a telecommunication network 204. A calling/called device may be any type of analog or digital telephone equipment compliant with the telecommunication network 204, such as a cordless telephone, a cellular telephone, a personal digital assistant (PDA) , a VoIP
30 (Voice over Internet Protocol) hardphone or softphone, or the like . A calling/called device comprises input and output means. The input and output means may include a handset with a loudspeaker and a microphone, and a keypad with buttons for input to the telephone sets. The keypad may be used for entering 5a call number, validating commands, initiating and terminating calls, and performing control operations. The calling/called device could also include speech recognition capabilities in order to allow the calling/called party to enter information vocally. The calling/called device may also include a display to lOprovide visual message to the user, as well as processing units for encoding and decoding control signals, performing call processing procedures and control operations. The calling/called device is connected with wire-line or wireless connections to the network 204.
15
The telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212. For example, the telecommunication network
20204 may be a fixed wire-line network, a PSTN network (Public
Switched Telephone Network) or an ISDN network (Integrated
Services Digital Network) . Alternatively, the telecommunication network may be a mobile telecommunication or cellular phone network, for example according to GSM standard (Global System
25for Mobile Communications) or UMTS standard (Universal Mobile
Telecommunications System) , thereby allowing a mobile telephone handset having 3G capability for calling over a cellular 3G network. The telecommunication network 204 may also be an IP- based network implementing the Voice over Internet Protocol,
30also called VoIP, for routing of voice conversations.
The telecommunication network 204 comprises a switching subsystem 206 for establishing connection and relaying speech information between the calling party 210 and one or more called 35parties 212. The switching subsystem may be coupled to a service provider hub 208 providing services applicable to various communication scenario, such as preserving anonymity of the calling party by masking the calling device number for the receiving party or maintaining blacklists and white lists.
5 Referring to figure 3 a call flow diagram illustrating a sequence of events in accepting or rejecting a call from a calling party in accordance with a preferred embodiment of the present invention is now described. The calling party initiates on event 310 a call request from a calling device (210) to lOestablish a communication with a called party in a hidden
calling number mode. The hidden calling number mode is requested either with the call emitted directly as an anonymous call with the caller dialing a prefix code hiding its number or the caller has a specific subscription with a communication service
15provider to have its number being further hidden in the flow transmitted to the called device (212) of the called party.
On event 312 the communication provider checks if the called party has subscribed to the filtering service covered by the present invention. If the called party has not subscribed to the 0service, the number of the calling party is hidden for the called party as regularly done by any known solution. In case, the called party has subscribed to the filtering service, the calling number is encrypted at the communications provider network. The call request is then transmitted to the called 5device (212) with the encrypted identifier in the transmitted flow. When received, the encrypted identifier number is
temporarily recorded at event 330 on a local memory (230) coupled to the receiving device.
The first time, a called party subscribing to the filtering 30service, receives a new anonymous call, the caller needs to accept the call to allow the activation of the accept/rej ect function on a further call.
At the end of the call, the called party is offered at event 340 the choice to blacklist the calling party for any further call and the choice is confirmed by storing or not on event 350 the encrypted identifier into the local memory 230.
On a further call of the same calling party (360) to the same called party, the encrypted identifier is again generatedand transmitted to the called party (370) . The encrypted
identifier is locally checked against the content of the black list or white list information available at the local database (203) on event 380. Then, the incoming call is accepted on event 390 or rejected on event 392. Figure 4 illustrates the main steps operated at a
communications provider edge according to a preferred embodiment of the present invention. Process 400 begins at step 402 when a call is initiated by a calling party with a calling device that requests a call to be established with a called party. Theprocess then proceeds with step 404 where it is determined if the calling party is willing to hide its calling number or not. If not, the process goes to step 410 to establish the connection between the parties with clear identification of the caller. If it is determined that the calling number is to be hidden, theprocess proceeds with step 406 where a determination is made if the called party is a subscriber to the blacklist service
covered by the present invention or not. The determination is made by checking the user's profile information available for the called party either in the Home Location Register (HLR) ofthe communication provider or in the Visitor Location Register (VLR) if the called party is a roaming user outside of the area covered by his/her home system.
If the called party has subscribed to the filtering service, the process proceeds with step 408 where the hidden callingnumber is further encrypted by the communication provider. The encryption is done using an encryption key which is uniquely assigned by the communication service provider to the called device at time of subscription. It is to be appreciated that the encryption algorithm may be any kind of cipher algorithm such as the Advanced Encryption Standard (AES) one.
Once the calling number is encrypted, the process follows 5with step 410 to establish the connection between the parties. As previously explained, the calling number is encrypted within the flow transmitted to the called party. Thereafter the process ends at step 412.
Furthermore, one would easily understand that the operator lOencryption key assigned to a user subscribing to the filtering service with a first operator would have to be transferred to the new operator in case of a new subscription with a new operator .
Figures 5a and 5b illustrate the main steps operated at a 15called party edge according to a preferred embodiment of the present invention. Process 500 begins at step 502 when a call request is received by a called party. On next step 504, the encrypted identifier received is searched in the called party phone book to determine the identification (ID) of the caller. 20lf found, the calling party identification is displayed on step 506. The caller ID is either clearly displayed if it has been previously stored in the phone book or the encrypted identifier is displayed marked with a special prefix (such as a '#' or a '*' for example) indicating that the caller ID has not been 25found not in the called party phone book.
Next test 508 is used to determine if the caller's
identification is already on the blacklist of the called party phone book. If the caller's identification is blacklisted, then the call is rejected on step 510 and the call is ended on step 30512. The process ends with step 530. If the caller's
identification is not on the blacklist, the process after step 508 proceeds with step 514 to accept the call. The call
continues on step 516. After the call is ended (518), the process proceeds with test 520 (figure 5b) where the called party is offered to add the caller's identification to the blacklist. If the answer is NO, test 522 allows to determine if the caller's phone number is already in the called party phone book or not. If already stored in, the process ends on step 530otherwise the process continues with test 526.
Going back to step 520, if the choice is to blacklist the caller's identification, the process continues with step 524 where the caller's number is blacklisted in the called party phone book. After step 524, the process continues with choice 526 to record the caller's name in the phone book. If the answer is NO the process ends on step 530, otherwise the process proceeds with the name recording on step 528. And the process ends on step 530. In another embodiment, the process allows to handle roaming calls received by a called party located outside its SIM card original country. The subscriber assigned key used by the operator to encrypt the phone number of the caller and stored on the Home Location Register, is transmitted to the Visitor
Location Register.
The present invention can take the form of a computer program product accessible from a computer-usable or computer- readable medium providing program code for use by, or in
connection with a computer or any instruction execution system.For the purposes of this description, a computer-usable or computer-readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by, or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM) , a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk - read only memory (CD-ROM), compact disk - read/write (CD-R/W) and DVD.
The description of the present invention has been presented 5for purposes of illustration and description, and is not
intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles lOof the invention, the practical application, and to enable
others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
It has to be appreciated that while the invention has been 15particularly shown and described with reference to a preferred embodiment, various changes in form and detail may be made therein without departing from the spirit, and scope of the invention. Specifically, the present invention is well suited and easily applicable by a person skilled in the art to any 0device that allows to transmit a communication under an
anonymous phone number, would it be a phone call, a SMS, a MMS, Faxes, Voice Mail, or any other message.

Claims

Claims
1. In a communications network, a method for selectively filtering telephone communications, the method comprising the steps of: determining that a request, received from a calling device having a calling number, is for establishing a telephone communication with a called device in a hidden mode; generating an encrypted identifier, the encrypted identifier linking the calling number of a hidden mode request to an encryption key, wherein said encryption key being uniquely assigned to the called device; transmitting over the communication network for receipt by the called device the telephone communication request using said encrypted identifier; and in response to receiving from the called device an
authorization for said encrypted identifier, establishing the telephone communication between the calling device and the called device.
2. The method of claim 1 wherein the called device is communicatively connected to a communications service provider, and the encrypted identifier is provided by the communications service provider.
3. The method of claim 1 wherein the encryption identifier generating step is operated by the operator of the communications network.
4. The method of any preceding claim wherein the communications service provider is a cellular communications service provider .
55 . The method of any preceding claim wherein the telephone communications request is one of a telephone call or a short message service (SMS) or a multimedia message service (MMS) .
6 . The method of any preceding claim further comprising the step 10 of rejecting the telephone communication request in response to receiving from the called device the encrypted identifier is denied.
7 . The method of any preceding claim wherein the encrypted 15 identifier is stored in a Home Location Register.
8 . The method of any preceding claim wherein the encrypted identifier is stored in a Visitor Location Register.
209. A system for selectively filtering telephone communications from a calling device to a called device, the system comprising means for implementing the steps of the method of any one of claims 1 to 8 .
2510 . A computer readable medium having a computer program product stored thereon, which when executed by a computing device, automatically operates the steps of the method of any one of claims 1 to 8 .
3011 . A computer readable medium having a computer program according to claim 10 encoded thereon.
PCT/EP2011/057843 2010-06-11 2011-05-16 System, method and computer program product for filtering telephone communications Ceased WO2011154221A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP10305623.0 2010-06-11
EP10305623 2010-06-11

Publications (1)

Publication Number Publication Date
WO2011154221A1 true WO2011154221A1 (en) 2011-12-15

Family

ID=44310379

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2011/057843 Ceased WO2011154221A1 (en) 2010-06-11 2011-05-16 System, method and computer program product for filtering telephone communications

Country Status (1)

Country Link
WO (1) WO2011154221A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2510378A (en) * 2013-02-01 2014-08-06 Ibm Simultaneously providing caller ID information and encrypted caller ID information for Telephony caller authentication
EP2785029A1 (en) * 2013-03-29 2014-10-01 Orange Method and apparatus for transmission of a hidden call, method and apparatus for receiving a hidden call, signal transmission of a hidden call and corresponding computer program
US9288062B2 (en) 2014-02-20 2016-03-15 International Business Machines Corporation Telephone caller authentication
CN113965648A (en) * 2020-07-21 2022-01-21 中国移动通信集团山东有限公司 An information hiding method, device and electronic device
US20220166751A1 (en) * 2020-11-20 2022-05-26 Charter Communications Operating, Llc Phone call endpoint security
CN115022024A (en) * 2022-05-31 2022-09-06 中国电信股份有限公司 Method and device for encrypted call, storage medium and electronic equipment
CN116095215A (en) * 2022-12-30 2023-05-09 中国联合网络通信集团有限公司 Network telephone dialing method and device and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060199572A1 (en) * 2005-03-03 2006-09-07 Lucent Technologies Inc. Anonymous call blocking in wireless networks
DE102006038141A1 (en) * 2006-08-16 2008-02-21 Nokia Siemens Networks Gmbh & Co.Kg Method for the computer-aided processing of calls between subscribers in a communications network
WO2009067356A1 (en) 2007-11-22 2009-05-28 Motorola, Inc. Method and system for adding a caller in a blocked list
EP2109325A1 (en) * 2007-03-20 2009-10-14 Huawei Technologies Co., Ltd. A message processing system,device and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060199572A1 (en) * 2005-03-03 2006-09-07 Lucent Technologies Inc. Anonymous call blocking in wireless networks
DE102006038141A1 (en) * 2006-08-16 2008-02-21 Nokia Siemens Networks Gmbh & Co.Kg Method for the computer-aided processing of calls between subscribers in a communications network
EP2109325A1 (en) * 2007-03-20 2009-10-14 Huawei Technologies Co., Ltd. A message processing system,device and method
WO2009067356A1 (en) 2007-11-22 2009-05-28 Motorola, Inc. Method and system for adding a caller in a blocked list

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2510378A (en) * 2013-02-01 2014-08-06 Ibm Simultaneously providing caller ID information and encrypted caller ID information for Telephony caller authentication
EP2785029A1 (en) * 2013-03-29 2014-10-01 Orange Method and apparatus for transmission of a hidden call, method and apparatus for receiving a hidden call, signal transmission of a hidden call and corresponding computer program
FR3004049A1 (en) * 2013-03-29 2014-10-03 France Telecom METHOD AND DEVICE FOR TRANSMITTING A MASK CALL, METHOD AND DEVICE FOR RECEIVING A MASK CALL, SIGNAL FOR TRANSMITTING A MASK CALL, AND CORRESPONDING COMPUTER PROGRAM.
US9288062B2 (en) 2014-02-20 2016-03-15 International Business Machines Corporation Telephone caller authentication
US9313031B2 (en) 2014-02-20 2016-04-12 International Business Machines Corporation Telephone caller authentication
US9654976B2 (en) 2014-02-20 2017-05-16 International Business Machines Corporation Telephone caller authentication
CN113965648A (en) * 2020-07-21 2022-01-21 中国移动通信集团山东有限公司 An information hiding method, device and electronic device
CN113965648B (en) * 2020-07-21 2024-05-07 中国移动通信集团山东有限公司 Information hiding method and device and electronic equipment
US20220166751A1 (en) * 2020-11-20 2022-05-26 Charter Communications Operating, Llc Phone call endpoint security
CN115022024A (en) * 2022-05-31 2022-09-06 中国电信股份有限公司 Method and device for encrypted call, storage medium and electronic equipment
CN115022024B (en) * 2022-05-31 2023-09-29 中国电信股份有限公司 Method and device for encrypting call, storage medium and electronic equipment
CN116095215A (en) * 2022-12-30 2023-05-09 中国联合网络通信集团有限公司 Network telephone dialing method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11917100B2 (en) Real-time voice paging voice augmented caller ID/ring tone alias
US9088645B2 (en) Intermediary device initiated caller identification
US8307402B2 (en) Method and apparatus for merging voice and data features with internet protocol television
US7793305B2 (en) Methods and systems for providing a communication manager for wireless wireline converged telecommunication services
US7486779B2 (en) Origin device based callee identification
WO2011154221A1 (en) System, method and computer program product for filtering telephone communications
US20060074685A1 (en) Destination device initiated caller identification
US20030108163A1 (en) Origin device based caller identification
US8654949B2 (en) Methods, systems and computer program products for providing access to personal profiles in communications systems
CN1859594B (en) Method and device for displaying communication number
US9106429B2 (en) Method and system for pre-accessing conference telephone and network side device
US10462302B2 (en) Method for establishing the routing, in particular forwarding of an object of a communications activity, and devices for carrying out said method
JP6368666B2 (en) Nuisance call countermeasure system and nuisance call countermeasure method
US20170208171A1 (en) Communication system having user selectable features
US8768296B2 (en) Method and apparatus for random access of voice mail messages
KR100544036B1 (en) Short service system and method of internet video telephone
US10154387B2 (en) Process of initiation of a conversation
US20040120503A1 (en) Methods, systems, and media to capture a redialing sequence and to redial
JP2005012658A (en) Caller telephone number converting method, apparatus and program
CN114979992B (en) Call state determining method and device
KR101211904B1 (en) System and method for providing caller notify service
KR20100060313A (en) System and method for processing caller by using voice message and program recording medium
KR20050006615A (en) Method for isolating call Selection of Wireless Telecommunication Terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11723360

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11723360

Country of ref document: EP

Kind code of ref document: A1