WO2011154221A1 - System, method and computer program product for filtering telephone communications - Google Patents
System, method and computer program product for filtering telephone communications Download PDFInfo
- Publication number
- WO2011154221A1 WO2011154221A1 PCT/EP2011/057843 EP2011057843W WO2011154221A1 WO 2011154221 A1 WO2011154221 A1 WO 2011154221A1 EP 2011057843 W EP2011057843 W EP 2011057843W WO 2011154221 A1 WO2011154221 A1 WO 2011154221A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- called device
- calling
- telephone
- encrypted identifier
- communications
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42008—Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/18—Comparators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
Definitions
- anonymous caller identifies orally himself/herself thereby allowing the recipient to accept or not the incoming call.
- a method for adding a lOcaller in a blocked list stored at a communication server includes receiving a call from the caller at a communication device and a set of inputs in response to the call.
- the set of inputs includes a set of instructions to add the caller in the blocked list.
- Transmission of the call termination request initiates addition of the caller in the blocked list at the communication server.
- an object of the invention is to provide a system and a method allowing to filter calls from anonymous
- a method for selectively filtering telephone lOcommunications comprises the steps of:
- FIG.l illustrates typical phone firewall interfaces
- FIG.2 depicts a general environment to operate the present invention
- FIG.3 shows a call flow diagram according to an embodiment of lOthe present invention
- FIG.4 is a flowchart illustrating the main steps operated at a provider edge according to an embodiment of the present
- FIG.5a and 5b are flowcharts illustrating the main steps
- a calling/called device may be any type of analog or digital telephone equipment compliant with the telecommunication network 204, such as a cordless telephone, a cellular telephone, a personal digital assistant (PDA) , a VoIP
- a calling/called device comprises input and output means.
- the input and output means may include a handset with a loudspeaker and a microphone, and a keypad with buttons for input to the telephone sets.
- the keypad may be used for entering 5a call number, validating commands, initiating and terminating calls, and performing control operations.
- the calling/called device could also include speech recognition capabilities in order to allow the calling/called party to enter information vocally.
- the calling/called device may also include a display to lOprovide visual message to the user, as well as processing units for encoding and decoding control signals, performing call processing procedures and control operations.
- the calling/called device is connected with wire-line or wireless connections to the network 204.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212.
- the telecommunication network may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called
- 20204 may be a fixed wire-line network, a PSTN network (Public
- the telecommunication network may be a mobile telecommunication or cellular phone network, for example according to GSM standard (Global System for Mobile communications), for example, GSM standard (Global System for Mobile communications), etc.
- GSM Global System for Mobile communications
- the telecommunication network 204 may also be an IP- based network implementing the Voice over Internet Protocol,
- the telecommunication network 204 comprises a switching subsystem 206 for establishing connection and relaying speech information between the calling party 210 and one or more called 35parties 212.
- the switching subsystem may be coupled to a service provider hub 208 providing services applicable to various communication scenario, such as preserving anonymity of the calling party by masking the calling device number for the receiving party or maintaining blacklists and white lists.
- FIG. 3 a call flow diagram illustrating a sequence of events in accepting or rejecting a call from a calling party in accordance with a preferred embodiment of the present invention is now described.
- the calling party initiates on event 310 a call request from a calling device (210) to lOestablish a communication with a called party in a hidden
- the hidden calling number mode is requested either with the call emitted directly as an anonymous call with the caller dialing a prefix code hiding its number or the caller has a specific subscription with a communication service
- the communication provider checks if the called party has subscribed to the filtering service covered by the present invention. If the called party has not subscribed to the 0service, the number of the calling party is hidden for the called party as regularly done by any known solution. In case, the called party has subscribed to the filtering service, the calling number is encrypted at the communications provider network. The call request is then transmitted to the called 5device (212) with the encrypted identifier in the transmitted flow. When received, the encrypted identifier number is
- the called party is offered at event 340 the choice to blacklist the calling party for any further call and the choice is confirmed by storing or not on event 350 the encrypted identifier into the local memory 230.
- the encrypted identifier is again generatedand transmitted to the called party (370) .
- Figure 4 illustrates the main steps operated at a
- Process 400 begins at step 402 when a call is initiated by a calling party with a calling device that requests a call to be established with a called party. Theprocess then proceeds with step 404 where it is determined if the calling party is willing to hide its calling number or not. If not, the process goes to step 410 to establish the connection between the parties with clear identification of the caller. If it is determined that the calling number is to be hidden, theprocess proceeds with step 406 where a determination is made if the called party is a subscriber to the blacklist service
- the determination is made by checking the user's profile information available for the called party either in the Home Location Register (HLR) ofthe communication provider or in the Visitor Location Register (VLR) if the called party is a roaming user outside of the area covered by his/her home system.
- HLR Home Location Register
- VLR Visitor Location Register
- step 408 the hidden callingnumber is further encrypted by the communication provider.
- the encryption is done using an encryption key which is uniquely assigned by the communication service provider to the called device at time of subscription.
- the encryption algorithm may be any kind of cipher algorithm such as the Advanced Encryption Standard (AES) one.
- step 410 the process follows 5with step 410 to establish the connection between the parties.
- the calling number is encrypted within the flow transmitted to the called party. Thereafter the process ends at step 412.
- FIGS 5a and 5b illustrate the main steps operated at a 15called party edge according to a preferred embodiment of the present invention.
- Process 500 begins at step 502 when a call request is received by a called party.
- the encrypted identifier received is searched in the called party phone book to determine the identification (ID) of the caller. 20lf found, the calling party identification is displayed on step 506.
- the caller ID is either clearly displayed if it has been previously stored in the phone book or the encrypted identifier is displayed marked with a special prefix (such as a '#' or a '*' for example) indicating that the caller ID has not been 25found not in the called party phone book.
- a special prefix such as a '#' or a '*' for example
- Next test 508 is used to determine if the caller's
- step 508 proceeds with step 514 to accept the call.
- test 520 (figure 5b) where the called party is offered to add the caller's identification to the blacklist. If the answer is NO, test 522 allows to determine if the caller's phone number is already in the called party phone book or not. If already stored in, the process ends on step 530otherwise the process continues with test 526.
- step 524 the caller's number is blacklisted in the called party phone book.
- step 526 the process continues with choice 526 to record the caller's name in the phone book. If the answer is NO the process ends on step 530, otherwise the process proceeds with the name recording on step 528. And the process ends on step 530.
- the process allows to handle roaming calls received by a called party located outside its SIM card original country. The subscriber assigned key used by the operator to encrypt the phone number of the caller and stored on the Home Location Register, is transmitted to the Visitor
- the present invention can take the form of a computer program product accessible from a computer-usable or computer- readable medium providing program code for use by, or in
- a computer-usable or computer-readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by, or in connection with the instruction execution system, apparatus, or device.
- the medium can be an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
- Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM) , a read-only memory (ROM), a rigid magnetic disk and an optical disk.
- Current examples of optical disks include compact disk - read only memory (CD-ROM), compact disk - read/write (CD-R/W) and DVD.
- anonymous phone number would it be a phone call, a SMS, a MMS, Faxes, Voice Mail, or any other message.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
Abstract
A method for filtering anonymous telephone communications from a calling device to a called device is disclosed. The called device is communicatively connected to a communications service provider and the method comprises the steps of determining that a request, received from a calling device having a calling number, is for establishing a telephone communication with a called device in a hidden mode; generating an encrypted identifier, the encrypted identifier linking the calling number of a hidden mode request to an encryption key, wherein said encryption key being uniquely assigned to the called device; transmitting over the communication network for receipt by the called device the telephone communication request using said encrypted identifier; and in response to receiving from the called device an authorization for said encrypted identifier, establishing the telephone communication between the calling device and the called device.
Description
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR FILTERING TELEPHONE COMMUNICATIONS
Field of the invention
The present invention relates generally to the field of
communication devices and more particularly to a system andmethod for filtering telephone communications from anonymous callers .
Background art
The growing volume of unwanted and unknown telephone
communications, mainly anonymous calls, is widely regarded as a serious problem for society and a serious irritation for
individuals who depend on the telephone. In certain cases, these anonymous calls may come from people or organisms the recipient doesn't want effectively to speak with, but there are cases of anonymous calls the recipient would not want to miss.
There exist automated filtering techniques, providing "phone firewall" allowing users to define on their telephone device, blacklist, white list, to reject unknown callers, or to block unsolicited calls.
5 Figure 1 shows two typical phone firewall interfaces.
Some telephone providers offer services to have the
anonymous caller identifies orally himself/herself thereby allowing the recipient to accept or not the incoming call.
In WO 2009/067356 Al from Motorola, a method for adding a lOcaller in a blocked list stored at a communication server is disclosed. The method includes receiving a call from the caller at a communication device and a set of inputs in response to the call. The set of inputs includes a set of instructions to add the caller in the blocked list. A call termination request
15including the set of instructions is transmitted to the
communication server. Transmission of the call termination request initiates addition of the caller in the blocked list at the communication server.
The prior art solutions while easy-to-use can easily be 0defeated by the callers.
So, there is the need for a method and system to selectively filtering incoming calls from anonymous callers and rejecting those unwanted "anonymous calls" while accepting those wanted "anonymous calls". 5 Moreover, as only the recipient of an incoming call can really determine whether the caller is welcome or not, there is also the need to have blacklist or white list built on a
voluntary action of the recipient rather than based on a generic and global action.
30 The present invention offers a solution to this need.
Summary of the invention
Accordingly, an object of the invention is to provide a system and a method allowing to filter calls from anonymous
5callers to accept or reject the call.
To achieve the foregoing object, a system and method, as further described in the appended independent claim 1, is provided .
In particular, a method for selectively filtering telephone lOcommunications comprises the steps of:
determining that a request, received from a calling device having a calling number, is for establishing a telephone communication with a called device in a hidden mode; generating an encrypted identifier, the encrypted identifier linking the calling number of a hidden mode request to an encryption key, wherein said encryption key being uniquely assigned to the called device; transmitting over the communication network for receipt by the called device the telephone communication request using said encrypted identifier; and in response to receiving from the called device an
authorization for said encrypted identifier, establishing the telephone communication between the calling device and the called device.
Further embodiments are described in the appended dependent claims .
Further aspects of the invention will now be described, by 30way of preferred implementation and examples, with reference to the accompanying figures.
Brief description of the drawings
The above and other items, features and advantages of the invention will be better understood by reading the following more particular description of the invention in conjunction with 5the figures wherein:
FIG.l illustrates typical phone firewall interfaces;
FIG.2 depicts a general environment to operate the present invention ;
FIG.3 shows a call flow diagram according to an embodiment of lOthe present invention;
FIG.4 is a flowchart illustrating the main steps operated at a provider edge according to an embodiment of the present
invention ;
FIG.5a and 5b are flowcharts illustrating the main steps
15operated at a called party edge according to an embodiment of the present invention.
Detailed description of the invention
Embodiments of the invention are described herein after by 0way of examples with reference to the accompanying figures and drawings .
Going to figure 2, a preferred environment to operate the present invention is shown. A telecommunication system 200 including calling telecommunication devices 210 used for
5communication with called telecommunication devices 212 through a telecommunication network 204. A calling/called device may be any type of analog or digital telephone equipment compliant with the telecommunication network 204, such as a cordless telephone, a cellular telephone, a personal digital assistant (PDA) , a VoIP
30 (Voice over Internet Protocol) hardphone or softphone, or the like .
A calling/called device comprises input and output means. The input and output means may include a handset with a loudspeaker and a microphone, and a keypad with buttons for input to the telephone sets. The keypad may be used for entering 5a call number, validating commands, initiating and terminating calls, and performing control operations. The calling/called device could also include speech recognition capabilities in order to allow the calling/called party to enter information vocally. The calling/called device may also include a display to lOprovide visual message to the user, as well as processing units for encoding and decoding control signals, performing call processing procedures and control operations. The calling/called device is connected with wire-line or wireless connections to the network 204.
15
The telecommunication network 204 may be any type of telecommunication network enabling a synchronous or asynchronous communication between calling devices 210, and one or more called devices 212. For example, the telecommunication network
20204 may be a fixed wire-line network, a PSTN network (Public
Switched Telephone Network) or an ISDN network (Integrated
Services Digital Network) . Alternatively, the telecommunication network may be a mobile telecommunication or cellular phone network, for example according to GSM standard (Global System
25for Mobile Communications) or UMTS standard (Universal Mobile
Telecommunications System) , thereby allowing a mobile telephone handset having 3G capability for calling over a cellular 3G network. The telecommunication network 204 may also be an IP- based network implementing the Voice over Internet Protocol,
30also called VoIP, for routing of voice conversations.
The telecommunication network 204 comprises a switching subsystem 206 for establishing connection and relaying speech information between the calling party 210 and one or more called 35parties 212. The switching subsystem may be coupled to a service provider hub 208 providing services applicable to various
communication scenario, such as preserving anonymity of the calling party by masking the calling device number for the receiving party or maintaining blacklists and white lists.
5 Referring to figure 3 a call flow diagram illustrating a sequence of events in accepting or rejecting a call from a calling party in accordance with a preferred embodiment of the present invention is now described. The calling party initiates on event 310 a call request from a calling device (210) to lOestablish a communication with a called party in a hidden
calling number mode. The hidden calling number mode is requested either with the call emitted directly as an anonymous call with the caller dialing a prefix code hiding its number or the caller has a specific subscription with a communication service
15provider to have its number being further hidden in the flow transmitted to the called device (212) of the called party.
On event 312 the communication provider checks if the called party has subscribed to the filtering service covered by the present invention. If the called party has not subscribed to the 0service, the number of the calling party is hidden for the called party as regularly done by any known solution. In case, the called party has subscribed to the filtering service, the calling number is encrypted at the communications provider network. The call request is then transmitted to the called 5device (212) with the encrypted identifier in the transmitted flow. When received, the encrypted identifier number is
temporarily recorded at event 330 on a local memory (230) coupled to the receiving device.
The first time, a called party subscribing to the filtering 30service, receives a new anonymous call, the caller needs to accept the call to allow the activation of the accept/rej ect function on a further call.
At the end of the call, the called party is offered at event 340 the choice to blacklist the calling party for any further
call and the choice is confirmed by storing or not on event 350 the encrypted identifier into the local memory 230.
On a further call of the same calling party (360) to the same called party, the encrypted identifier is again generatedand transmitted to the called party (370) . The encrypted
identifier is locally checked against the content of the black list or white list information available at the local database (203) on event 380. Then, the incoming call is accepted on event 390 or rejected on event 392. Figure 4 illustrates the main steps operated at a
communications provider edge according to a preferred embodiment of the present invention. Process 400 begins at step 402 when a call is initiated by a calling party with a calling device that requests a call to be established with a called party. Theprocess then proceeds with step 404 where it is determined if the calling party is willing to hide its calling number or not. If not, the process goes to step 410 to establish the connection between the parties with clear identification of the caller. If it is determined that the calling number is to be hidden, theprocess proceeds with step 406 where a determination is made if the called party is a subscriber to the blacklist service
covered by the present invention or not. The determination is made by checking the user's profile information available for the called party either in the Home Location Register (HLR) ofthe communication provider or in the Visitor Location Register (VLR) if the called party is a roaming user outside of the area covered by his/her home system.
If the called party has subscribed to the filtering service, the process proceeds with step 408 where the hidden callingnumber is further encrypted by the communication provider. The encryption is done using an encryption key which is uniquely assigned by the communication service provider to the called device at time of subscription.
It is to be appreciated that the encryption algorithm may be any kind of cipher algorithm such as the Advanced Encryption Standard (AES) one.
Once the calling number is encrypted, the process follows 5with step 410 to establish the connection between the parties. As previously explained, the calling number is encrypted within the flow transmitted to the called party. Thereafter the process ends at step 412.
Furthermore, one would easily understand that the operator lOencryption key assigned to a user subscribing to the filtering service with a first operator would have to be transferred to the new operator in case of a new subscription with a new operator .
Figures 5a and 5b illustrate the main steps operated at a 15called party edge according to a preferred embodiment of the present invention. Process 500 begins at step 502 when a call request is received by a called party. On next step 504, the encrypted identifier received is searched in the called party phone book to determine the identification (ID) of the caller. 20lf found, the calling party identification is displayed on step 506. The caller ID is either clearly displayed if it has been previously stored in the phone book or the encrypted identifier is displayed marked with a special prefix (such as a '#' or a '*' for example) indicating that the caller ID has not been 25found not in the called party phone book.
Next test 508 is used to determine if the caller's
identification is already on the blacklist of the called party phone book. If the caller's identification is blacklisted, then the call is rejected on step 510 and the call is ended on step 30512. The process ends with step 530. If the caller's
identification is not on the blacklist, the process after step 508 proceeds with step 514 to accept the call. The call
continues on step 516. After the call is ended (518), the process proceeds with test 520 (figure 5b) where the called
party is offered to add the caller's identification to the blacklist. If the answer is NO, test 522 allows to determine if the caller's phone number is already in the called party phone book or not. If already stored in, the process ends on step 530otherwise the process continues with test 526.
Going back to step 520, if the choice is to blacklist the caller's identification, the process continues with step 524 where the caller's number is blacklisted in the called party phone book. After step 524, the process continues with choice 526 to record the caller's name in the phone book. If the answer is NO the process ends on step 530, otherwise the process proceeds with the name recording on step 528. And the process ends on step 530. In another embodiment, the process allows to handle roaming calls received by a called party located outside its SIM card original country. The subscriber assigned key used by the operator to encrypt the phone number of the caller and stored on the Home Location Register, is transmitted to the Visitor
Location Register.
The present invention can take the form of a computer program product accessible from a computer-usable or computer- readable medium providing program code for use by, or in
connection with a computer or any instruction execution system.For the purposes of this description, a computer-usable or computer-readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by, or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM) , a read-only memory
(ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk - read only memory (CD-ROM), compact disk - read/write (CD-R/W) and DVD.
The description of the present invention has been presented 5for purposes of illustration and description, and is not
intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles lOof the invention, the practical application, and to enable
others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
It has to be appreciated that while the invention has been 15particularly shown and described with reference to a preferred embodiment, various changes in form and detail may be made therein without departing from the spirit, and scope of the invention. Specifically, the present invention is well suited and easily applicable by a person skilled in the art to any 0device that allows to transmit a communication under an
anonymous phone number, would it be a phone call, a SMS, a MMS, Faxes, Voice Mail, or any other message.
Claims
Claims
1. In a communications network, a method for selectively filtering telephone communications, the method comprising the steps of: determining that a request, received from a calling device having a calling number, is for establishing a telephone communication with a called device in a hidden mode; generating an encrypted identifier, the encrypted identifier linking the calling number of a hidden mode request to an encryption key, wherein said encryption key being uniquely assigned to the called device; transmitting over the communication network for receipt by the called device the telephone communication request using said encrypted identifier; and in response to receiving from the called device an
authorization for said encrypted identifier, establishing the telephone communication between the calling device and the called device.
2. The method of claim 1 wherein the called device is communicatively connected to a communications service provider, and the encrypted identifier is provided by the communications service provider.
3. The method of claim 1 wherein the encryption identifier generating step is operated by the operator of the communications network.
4. The method of any preceding claim wherein the communications service provider is a cellular communications service provider .
55 . The method of any preceding claim wherein the telephone communications request is one of a telephone call or a short message service (SMS) or a multimedia message service (MMS) .
6 . The method of any preceding claim further comprising the step 10 of rejecting the telephone communication request in response to receiving from the called device the encrypted identifier is denied.
7 . The method of any preceding claim wherein the encrypted 15 identifier is stored in a Home Location Register.
8 . The method of any preceding claim wherein the encrypted identifier is stored in a Visitor Location Register.
209. A system for selectively filtering telephone communications from a calling device to a called device, the system comprising means for implementing the steps of the method of any one of claims 1 to 8 .
2510 . A computer readable medium having a computer program product stored thereon, which when executed by a computing device, automatically operates the steps of the method of any one of claims 1 to 8 .
3011 . A computer readable medium having a computer program according to claim 10 encoded thereon.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP10305623.0 | 2010-06-11 | ||
| EP10305623 | 2010-06-11 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2011154221A1 true WO2011154221A1 (en) | 2011-12-15 |
Family
ID=44310379
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2011/057843 Ceased WO2011154221A1 (en) | 2010-06-11 | 2011-05-16 | System, method and computer program product for filtering telephone communications |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2011154221A1 (en) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2510378A (en) * | 2013-02-01 | 2014-08-06 | Ibm | Simultaneously providing caller ID information and encrypted caller ID information for Telephony caller authentication |
| EP2785029A1 (en) * | 2013-03-29 | 2014-10-01 | Orange | Method and apparatus for transmission of a hidden call, method and apparatus for receiving a hidden call, signal transmission of a hidden call and corresponding computer program |
| US9288062B2 (en) | 2014-02-20 | 2016-03-15 | International Business Machines Corporation | Telephone caller authentication |
| CN113965648A (en) * | 2020-07-21 | 2022-01-21 | 中国移动通信集团山东有限公司 | An information hiding method, device and electronic device |
| US20220166751A1 (en) * | 2020-11-20 | 2022-05-26 | Charter Communications Operating, Llc | Phone call endpoint security |
| CN115022024A (en) * | 2022-05-31 | 2022-09-06 | 中国电信股份有限公司 | Method and device for encrypted call, storage medium and electronic equipment |
| CN116095215A (en) * | 2022-12-30 | 2023-05-09 | 中国联合网络通信集团有限公司 | Network telephone dialing method and device and computer readable storage medium |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060199572A1 (en) * | 2005-03-03 | 2006-09-07 | Lucent Technologies Inc. | Anonymous call blocking in wireless networks |
| DE102006038141A1 (en) * | 2006-08-16 | 2008-02-21 | Nokia Siemens Networks Gmbh & Co.Kg | Method for the computer-aided processing of calls between subscribers in a communications network |
| WO2009067356A1 (en) | 2007-11-22 | 2009-05-28 | Motorola, Inc. | Method and system for adding a caller in a blocked list |
| EP2109325A1 (en) * | 2007-03-20 | 2009-10-14 | Huawei Technologies Co., Ltd. | A message processing system,device and method |
-
2011
- 2011-05-16 WO PCT/EP2011/057843 patent/WO2011154221A1/en not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20060199572A1 (en) * | 2005-03-03 | 2006-09-07 | Lucent Technologies Inc. | Anonymous call blocking in wireless networks |
| DE102006038141A1 (en) * | 2006-08-16 | 2008-02-21 | Nokia Siemens Networks Gmbh & Co.Kg | Method for the computer-aided processing of calls between subscribers in a communications network |
| EP2109325A1 (en) * | 2007-03-20 | 2009-10-14 | Huawei Technologies Co., Ltd. | A message processing system,device and method |
| WO2009067356A1 (en) | 2007-11-22 | 2009-05-28 | Motorola, Inc. | Method and system for adding a caller in a blocked list |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2510378A (en) * | 2013-02-01 | 2014-08-06 | Ibm | Simultaneously providing caller ID information and encrypted caller ID information for Telephony caller authentication |
| EP2785029A1 (en) * | 2013-03-29 | 2014-10-01 | Orange | Method and apparatus for transmission of a hidden call, method and apparatus for receiving a hidden call, signal transmission of a hidden call and corresponding computer program |
| FR3004049A1 (en) * | 2013-03-29 | 2014-10-03 | France Telecom | METHOD AND DEVICE FOR TRANSMITTING A MASK CALL, METHOD AND DEVICE FOR RECEIVING A MASK CALL, SIGNAL FOR TRANSMITTING A MASK CALL, AND CORRESPONDING COMPUTER PROGRAM. |
| US9288062B2 (en) | 2014-02-20 | 2016-03-15 | International Business Machines Corporation | Telephone caller authentication |
| US9313031B2 (en) | 2014-02-20 | 2016-04-12 | International Business Machines Corporation | Telephone caller authentication |
| US9654976B2 (en) | 2014-02-20 | 2017-05-16 | International Business Machines Corporation | Telephone caller authentication |
| CN113965648A (en) * | 2020-07-21 | 2022-01-21 | 中国移动通信集团山东有限公司 | An information hiding method, device and electronic device |
| CN113965648B (en) * | 2020-07-21 | 2024-05-07 | 中国移动通信集团山东有限公司 | Information hiding method and device and electronic equipment |
| US20220166751A1 (en) * | 2020-11-20 | 2022-05-26 | Charter Communications Operating, Llc | Phone call endpoint security |
| CN115022024A (en) * | 2022-05-31 | 2022-09-06 | 中国电信股份有限公司 | Method and device for encrypted call, storage medium and electronic equipment |
| CN115022024B (en) * | 2022-05-31 | 2023-09-29 | 中国电信股份有限公司 | Method and device for encrypting call, storage medium and electronic equipment |
| CN116095215A (en) * | 2022-12-30 | 2023-05-09 | 中国联合网络通信集团有限公司 | Network telephone dialing method and device and computer readable storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11917100B2 (en) | Real-time voice paging voice augmented caller ID/ring tone alias | |
| US9088645B2 (en) | Intermediary device initiated caller identification | |
| US8307402B2 (en) | Method and apparatus for merging voice and data features with internet protocol television | |
| US7793305B2 (en) | Methods and systems for providing a communication manager for wireless wireline converged telecommunication services | |
| US7486779B2 (en) | Origin device based callee identification | |
| WO2011154221A1 (en) | System, method and computer program product for filtering telephone communications | |
| US20060074685A1 (en) | Destination device initiated caller identification | |
| US20030108163A1 (en) | Origin device based caller identification | |
| US8654949B2 (en) | Methods, systems and computer program products for providing access to personal profiles in communications systems | |
| CN1859594B (en) | Method and device for displaying communication number | |
| US9106429B2 (en) | Method and system for pre-accessing conference telephone and network side device | |
| US10462302B2 (en) | Method for establishing the routing, in particular forwarding of an object of a communications activity, and devices for carrying out said method | |
| JP6368666B2 (en) | Nuisance call countermeasure system and nuisance call countermeasure method | |
| US20170208171A1 (en) | Communication system having user selectable features | |
| US8768296B2 (en) | Method and apparatus for random access of voice mail messages | |
| KR100544036B1 (en) | Short service system and method of internet video telephone | |
| US10154387B2 (en) | Process of initiation of a conversation | |
| US20040120503A1 (en) | Methods, systems, and media to capture a redialing sequence and to redial | |
| JP2005012658A (en) | Caller telephone number converting method, apparatus and program | |
| CN114979992B (en) | Call state determining method and device | |
| KR101211904B1 (en) | System and method for providing caller notify service | |
| KR20100060313A (en) | System and method for processing caller by using voice message and program recording medium | |
| KR20050006615A (en) | Method for isolating call Selection of Wireless Telecommunication Terminal |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11723360 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 11723360 Country of ref document: EP Kind code of ref document: A1 |