Device and method for processing a communication
10412216 · 2019-09-10
Assignee
Inventors
Cpc classification
H04M3/42008
ELECTRICITY
H04M3/436
ELECTRICITY
H04M1/57
ELECTRICITY
H04W4/16
ELECTRICITY
International classification
H04M3/436
ELECTRICITY
H04M3/42
ELECTRICITY
H04W4/16
ELECTRICITY
Abstract
One embodiment relates to a processing method for a communication intended for at least one receiving terminal. The method may comprise receiving a communication intended for the at least one receiving terminal and obtaining a certified identifier and an uncertified identifier of a sender of the communication, the identifiers being comprised in a signal message for the communication. The method may further comprise comparing the certified identifier with the uncertified identifier and processing the communication including a process for searching for the certified identifier in a list containing certified identifiers for senders associated with uncertified identifiers of those senders; the processing process being based on the results of the comparison process and the searching process.
Claims
1. A processing method for a communication intended for a receiving terminal, comprising: receiving, by the receiving terminal, a communication intended for the receiving terminal; obtaining, by the receiving terminal, from a signal message associated with the communication, a certified identifier and an uncertified identifier of a sender of the communication, the signal message indicating that a transmitting terminal wishes to establish a telephone call with the receiving terminal, wherein the certified identifier is an identifier of the sender whose value and integrity are guaranteed by an operator of a network through which the communication passes; comparing, by the receiving terminal, said certified identifier with said uncertified identifier; and processing, by the receiving terminal, said communication based on said comparing, wherein said processing comprises: if the value of the certified identifier is different than the value of the uncertified identifier, searching for the certified identifier in a list containing pairs of certified identifiers and associated uncertified identifiers and notifying a user of the receiving terminal of the communication unless the certified identifier is found in the list; and if the value of the certified identifier is identical to the value of the uncertified identifier, notifying the user of the receiving terminal of the communication.
2. The processing method according to claim 1, wherein said processing includes filtering said communication.
3. The processing method according to claim 1, wherein said processing includes: providing notification of at least one characteristic of said communication as a function of said comparing and/or said searching process.
4. The method according to claim 1, wherein said certified identifier is a P_Asserted_Id certified identifier according to the SIP (Session Initiation Protocol) protocol or an NDI (Installation Designation Number) identifier according to the ISDN (Integrated Services Digital Network) protocol.
5. The processing method according to claim 1, wherein the uncertified identifier is an identifier of the sender whose value and integrity are not guaranteed by an operator of a network through which the communication passes.
6. The processing method according to claim 1, wherein the uncertified identifier is a from identifier according to the SIP (Session Initiation Protocol) protocol.
7. The processing method according to claim 1, wherein the signal message is a SIP INVITE message or an ISUP call signaling message.
8. A method for updating a list for communications intended for a receiving terminal, said method comprising: receiving, by the receiving terminal, a communication intended for the receiving terminal; obtaining, by the receiving terminal, from a signal message associated with the communication, a certified identifier and an uncertified identifier of a sender of the communication, the signal message indicating that a transmitting terminal wishes to establish a telephone call with the receiving terminal, wherein the certified identifier is an identifier of the sender whose value and integrity are guaranteed by an operator of a network through which the communication passes; comparing, by the receiving terminal, the value of said certified identifier with the value of said uncertified identifier; processing said communication including searching for said certified identifier in a list containing pairs of certified identifiers and associated uncertified identifiers, said processing being based on the results of said comparing and said searching; and on a request by a user, adding or deleting from the list said certified identifier associated with said uncertified identifier.
9. The method according to claim 8, wherein said request follows a presentation of said uncertified identifier to the user.
10. The method according to claim 8, wherein said list includes: a white list containing pairs of uncertified identifiers and associated certified identifiers identifying senders whose communications intended for said receiving terminal must be sent to said receiving terminal; or a blacklist containing pairs of uncertified identifiers and associated certified identifiers identifying senders whose communications intended for said receiving terminal must be blocked.
11. The method according to claim 8, wherein said adding also comprises adding information on a type of said communication in association with said certified and uncertified identifiers.
12. The method according to claim 8, wherein said list is a blacklist and wherein said adding is only carried out if said certified identifier is different from said uncertified identifier.
13. A non-transitory computer-readable medium having stored thereon instructions which cause a computer to perform the method for updating a list according to claim 8 when said instructions are executed by said computer.
14. A non-transitory computer-readable medium having stored thereon instructions which cause a computer to perform the method for processing a communication according to claim 1 when said instructions are executed by said computer.
15. A receiving terminal comprising a processor configured to: receive a communication intended for the receiving terminal; obtain, from a signal message associated with the communication, a certified identifier and an uncertified identifier of a sender of said communication, the signal message indicating that a transmitting terminal wishes to establish a telephone call with the receiving terminal, wherein the certified identifier is an identifier of the sender whose value and integrity are guaranteed by an operator of a network through which the communication passes; compare said certified identifier with said uncertified identifier; if the value of the certified identifier is different than the value of the uncertified identifier, search for the certified identifier in a list containing pairs of certified identifiers and associated uncertified identifiers and notify a user of the receiving terminal of the communication unless the certified identifier is found in the list; and if the value of the certified identifier is identical to the value of the uncertified identifier, notify the user of the receiving terminal of the communication.
16. A user device comprising a receiving terminal according to claim 15.
17. A receiving terminal comprising a processor configured to: receive a communication intended for the receiving terminal; obtain, from a signal message associated with the communication, a certified identifier and an uncertified identifier of a sender at the source of said communication, the signal message indicating that a transmitting terminal wishes to establish a telephone call with the receiving terminal, wherein the certified identifier is an identifier of the sender whose value and integrity are guaranteed by an operator of a network through which the communication passes; comparing, by the receiving terminal, the value of said certified identifier with the value of said uncertified identifier; processing said communication including searching for said certified identifier in a list containing pairs of certified identifiers and associated uncertified identifiers, said processing being based on the results of said comparing and said searching; and add or delete from said list, on a request by a user, said certified identifier associated with said uncertified identifier.
18. A user device comprising a receiving terminal according to claim 17.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) Specific features and advantages of the embodiments exemplified herein will emerge from the detailed description done in reference to the figures, in which:
(2)
(3)
(4)
(5)
(6)
(7)
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
(8)
(9) In the embodiment described herein, the processing device makes it possible to filter communications and notify the user of a degree of certification of the communication.
(10) In the embodiment described herein, the reliability information is a certified identifier P_Asserted_Id (PAI) according to the SIP protocol (Session Initiation Protocol).
(11) In this embodiment, the filtering uses a blacklist L, this list gathering certified identifiers associated with noncertified identifiers and, for each of these pairs, the type of communications that must be blocked for each of the terminals 2 and 2 when the signal message for this communication includes the corresponding certified identifier.
(12) In the example considered herein, the blacklist L contains the certified identifier of the line connecting the terminal 9 of the user U4 to the network 4, this certified identifier being associated with SMS and instant messaging communications.
(13) The communication terminal 2 is, in the example illustrated in
(14) In this embodiment, the processing device 1 and the list L are incorporated in the terminal 2. Alternatively, they may be incorporated into the residential gateway 3 or a piece of equipment of the network 4.
(15) In the example illustrated in
(16) In other words, the user U1 has two communication terminals 2 and 2, called recipient terminals, that are connected to the residential gateway 3 and that are accessible by a same public identity, in the case at hand the number, of the telephone line to which the residential gateway 3 is connected.
(17) In particular, the user U1 may be informed simultaneously on the terminals 2 and 2 of telephone calls coming from the terminals 5, 9 and 10 of the users U2, U4 and U3. The communications network 4 may be a mobile network (e.g., UMTS (Universal Mobile Telecommunications System)) or a wired network (e.g., RTC, VoIP DSL, Fiber, Cable), wired or wireless (e.g., WLAN (Wireless Local Area Network)), private or public, etc.
(18) In the example considered herein, it is assumed that the architecture of the network 4 is an IMS (IP Multimedia Subsystem) architecture.
(19) It is further assumed that the user U2 is an employee of a call center who has a communication terminal 5 making it possible to establish telephone calls by using a call signal according to the SIP protocol as defined in IETF standards RFC 3261 and RFC 3325.
(20) Traditionally, the operator of the network 4 has assigned a section of call numbers to the call center. The first number in the section of numbers here corresponds to the number of the telephone switchboard for the call center and making it possible to identify the physical line connecting the call center to the communications network 4. The other numbers of the section of numbers assigned to the call center are assigned to the communication terminals, including the terminals 5 and 10, belonging to the call center.
(21) In the example described herein, it is assumed that the operator of the network 4 has assigned the section of one hundred numbers 01 23 45 00-01 23 45 99 to the call center. In other words, the number for the switchboard of the call center is 01 23 45 00 and the number for communication terminal 5 is 01 23 45 05.
(22) It is also assumed that the user U2 initiates, from his communication terminal 5, a telephone call intended for terminals 2 and 2 of the user U1 accessible by the telephone number associated with the telephone line to which the residential gateway 3 is connected.
(23) The communication terminal 5 then sends the residential gateway 3 a call signal message M1 of the SIP INVITE type including a field of the FROM type, the content and integrity of which are not certified by the network 4. This FROM-type field contains the telephone number of the extension (for example, 01 23 45 05) assigned to the communication terminal 5.
(24) The call signal message M1 is first received by a piece of PBX equipment 6 (Private Automatic Branch eXchange) located on the premises of the call center. The PBX equipment 6 allows the communication terminals 5 and 10 to access the network 4.
(25) It is assumed here that the PBX equipment 6 is configured to modify the FROM field of the message M1 such that this field contains a telephone number that does not belong to the section of consecutive numbers assigned to the call center.
(26) In other words, the PBX equipment 6 replaces the number 01 23 45 05 contained in the FROM field with another number, for example the number 03 45 67 89.
(27) The PBX equipment 6 may also configure the message M1 so that it contains a PAI (P_Asserted_Id) field according to the SIP protocol and in the field of which the value of the FROM field has been copied.
(28) Then, the piece of PBX equipment 6 sends the message M1 to a first piece of equipment 7 under the oversight of the operator of the communications network 4.
(29) In the example considered herein, the piece of equipment 7 is P-CSCF (Proxy Call/Session Control Function) equipment.
(30) This P-CSCF equipment 7 verifies whether the message M1 contains a PAI field. If applicable, the P-CSCF equipment 7 modifies the PAI field such that it contains the number of the physical line (i.e., the switchboard number) connecting the call center to the communication network 4. If the message M1 does not contain a PAI field, the P-CSCF equipment 7 creates one for it and assigns it the number of the physical line connecting the call center to the communication network 4.
(31) In other words, the P-CSCF equipment 7 configures the PAI field so that it contains a certified identifier whose value is the number 01 23 45 00 identifying the physical line connecting the call center to the communication network 4.
(32) According to the SIP protocol, the P-CSCF equipment 7 does not look at or modify the value contained in the FROM field.
(33) The message M1 is next sent by the P-CSCF equipment 7 to the recipient terminal 2 through the communication network 4 and the residential gateway 3.
(34) The communication network 4 also sends a signal message M2 of the call to the recipient terminal 2 through the residential gateway 3.
(35) During its transmission in the communication network 4 and through the residential gateway 3, the operator of the network 4 guarantees, according to the SIP standard, the integrity and value of the PAI field of the message M1 and the message M2. However, the operator of the network 4 does not guarantee the integrity of the FROM field. In other words, the PAI field of the message M1 is a certified identifier of the caller and the FROM field is a non-certified identifier of the caller.
(36) The terminals 2 and 2 may notify the user U2 of the degree of certification of the call when it is transmitted to them.
(37) We will now describe, in reference to
(38) Likewise, the smartphone 2 displays the communication (for example by ringing) to the user U1 upon receiving the call signal message M2.
(39) The device 1 analyzes the message M1 and obtains a certified identifier (process E200) and a non-certified identifier (process E300) of the caller at the source of the call by extracting the identifier contained in the PAI field and the identifier contained in the FROM field from the call signal message M1. The identifier contained in the PAI field constitutes, as previously emphasized, an identifier certified by the communication network 4.
(40) The device 1 next compares (process E400) the certified PAI identifier taken from the message M1 with the noncertified FROM identifier, and based on the result, performs a processing process (E500) comprising several sub-processes (E510 to E550).
(41) If the certified identifier is different from the noncertified identifier (yes response in process E400), then the device 1 compares (process E510) the certified PAI identifier taken from the message M1 with the certified identifiers listed in the blacklist L.
(42) If the PAI identifier corresponds to a certified identifier listed in the blacklist L (yes response in process E510), the device 1 blocks (process E530) the call intended for the terminal 2.
(43) Alternatively, during process E510, it is also verified whether the certified identifier listed in the blacklist L is also associated with the telephone call communication type. If so, the device 1 blocks (process E530) the call intended for the terminal 2. According to this alternative, if the certified identifier present in the blacklist L is associated with a communication type, for example text message, different from the type of the communication received in process E100 (in the case at hand, the type of communication is a telephone call), the device 1 does not block the call intended for the terminal 2.
(44) Alternatively, the device 1 blocks the call intended for the terminal 2 when the FROM and PAI identifiers are different, whether or not the PAI identifier corresponds to a certified identifier listed in the blacklist L, process E510 then not being carried out.
(45) In the embodiment described herein, when the device 1 blocks the call intended for the terminal 2, during a process E540, the device 1 sends a request to reject the telephone call.
(46) In the example described herein, the device 1 sends, via the communication network 4, a SIP request from series 6XX, typically a 603 DECLINE request, to the terminal 5. Upon receiving this 603 DECLINE request, the communication network 4 notifies the recipient terminal 2, via the residential gateway 3, that the communication sent by the terminal 5 of the user U2 has been rejected by the terminal 2 of the user U1. Upon receiving this notification, the terminal 2 ceases to display the communication to the user U1.
(47) Alternatively, the device 1 sends, via the communication network 4, a SIP request from series 4XX, typically a 406 BUSY HERE request, to the terminal 5.
(48) Upon receiving this 406 BUSY HERE request, the communication network 4 does not notify the recipient terminal 2, via the residential gateway 3, that the communication sent by the terminal 5 of the user U2 has been rejected by the user U1 In other words, the terminal 2 continues to display the communication to the user U1.
(49) If the PAI identifier does not correspond to a listed certified identifier associated with the telephone call communication type in the blacklist L (no response in process E510), the device 1 sends the message M1 (process E520) to the terminal 2 so that the call will be displayed to the user of the receiving terminal 2.
(50) If the PAI identifier is identical to the FROM identifier, the device 1 also sends the message M1 (process E520) to the terminal 2 so that the call will be displayed to the user.
(51) In both of these last two cases where the call is displayed to the user, the device 1 carries out a notification process (E550) making it possible to provide information to this user on the communication, and more particularly on its certification.
(52) This notification process (E550) is optional.
(53) This notification process can be broken down into a series of sub-processes (E600 to E960) shown in
(54) In this embodiment, three tests are carried out: it is verified whether the PAI and FROM identifiers are identical (E600). If they are different, it is verified whether their first digits are identical or whether the FROM is in accordance with the ARCEP (Autorit de Rgulation des Communications Electroniques et des Postes, i.e. Regulating Authority for Electronics Communications and Extensions) plan (E800).
(55) Lastly, it is verified whether the FROM identifier is present in an address book BOOK recorded in the terminal 2 (E730, E830, E930).
(56) Based on the result of these tests, the recipient terminal 2 can play a specific ring tone, display a likelihood that the calling number corresponding to the FROM identifier is certified, or display this number in a certain typography or color.
(57) For example, in this embodiment, a first test (E600) compares the noncertified FROM identifier and the certified PAI identifier.
(58) If these identifiers are identical, the terminal 2 plays a specific ring tone S1 (E710), then displays (E720) a likelihood P1 that the calling number is certified.
(59) Next, it is verified (E730) whether the FROM identifier is present in the address book BOOK of the terminal 2. If not, the FROM identifier is displayed (E750) in a specific color and typography showing that the latter is certified, for example green and with a first typography.
(60) If the FROM identifier is present in the address book, the contact associated with that identifier can be displayed (E740) directly, for example the last name and/or first name of the contact, but still in the same color and the same typography.
(61) If the FROM and PAI identifiers are different, their first digits are compared or it is verified whether the FROM identifier is according to the ARCEP plan (E800).
(62) If so or if the first digits are identical, a specific ring tone S2 is played (E810), then a likelihood P2 is displayed (E820) that the calling number is certified.
(63) Next, it is verified (E830) whether the FROM identifier is present in the address book BOOK of the terminal 2. If not, the FROM identifier is displayed (E850) in a specific color and typography showing that the latter is not certified but has a compliant format, for example orange and with a second typography.
(64) If the FROM identifier is present in the address book, the contact associated with that identifier can be displayed (E840) directly, for example the last name and/or first name of the contact, but still in the same color and the same typography.
(65) If the first digits are different or if the FROM identifier is not compliant with the ARCEP plan, a specific ring tone S3 is played (E910), then a likelihood P3 is displayed (E920) that the calling number is not certified.
(66) Next, it is verified (E930) whether the FROM identifier is present in the address book BOOK of the terminal 2. If not, the FROM identifier is displayed (E950) in a specific color and typography showing that the latter is not certified and does not have a compliant format, for example red and with a third typography.
(67) If the FROM identifier is present in the address book, the contact associated with that identifier can be displayed (E940) directly, for example the last name and/or first name of the contact, but still in the same color and the same typography.
(68) In one particular embodiment, the user U1 can enrich the address book BOOK of the device 1 from information in the incoming call log to store both the FROM identifier and the PAI identifier.
(69) Thus, in the case of a usurpation of identity for which the FROM identifier is in the ARCEP format and is present in the address book but is different from the PAI, the user U1 may be notified of this usurpation, for example by a specific ring tone or visual information.
(70) We will now describe, in reference to
(71) It will be recalled that this list, primarily used to filter the communication, may also be used as a parameter for notification to the user of the degree of certification of this communication.
(72) In this embodiment, the method is implemented, during the reception, by the device 8, of a telephone call emitted by the user U2.
(73) During a process F100, the update device 8 receives, via the filtering device 1, the call sent by the communication terminal 5 of the user U2 to the terminal 2 of the user U1.
(74) In other words, the signal message M1 has not been blocked by the filtering device 1.
(75) In the example considered here, the message M1 therefore includes:
(76) a PAI (P_Asserted_Id) field according to the SIP protocol, this field including an identifier certified by the operator of the network 4 whereof the value (01 23 45 00) corresponds to the number of the physical line (i.e., the switchboard number) connecting the call center to the communication network 4; and
(77) a FROM field including an identifier not certified by the operator of the network 4 and whereof the value 03 45 67 89 has been configured by the PBX equipment 6 of the call center.
(78) Upon reception of the message M1 (process F100), the device 8 extracts (process F200) the identifier contained in the FROM field from the message M1 and presents (process F300) this value to the user U1 by displaying it on a screen of the recipient terminal 2.
(79) The device 8 also extracts (process F400) the certified identifier contained in the PAI field from the message M1.
(80) The device 8 compares (process F500) the value of the certified identifier contained in the PAI field with the value of the non-certified identifier contained in the FROM field.
(81) If, as is the case in the example described here, the certified PAI identifier is different from the noncertified FROM identifier (yes response in process F500), the device 8 saves the certified identifier associated with the noncertified identifier (process F700) in the non-volatile memory 8D of the device 8.
(82) In the example described here, the user U1 decides to take the call and discovers that it is a call from a call center from which he no longer wishes to receive calls in the future.
(83) The user U1 then consults the log of calls from the terminal 2, selects the call he has just received from the FROM identifier displayed to him and sends a request RQ (for example, by selecting a menu in the user interface of the terminal 2) to the device 8 updating the blacklist L, this request RQ indicating that he no longer wishes to receive telephone calls from this caller.
(84) During a process F900, upon receiving the request RQ, the update device 8 adds the certified PAI identifier to the blacklist L, associated with the noncertified FROM identifier that was previously saved in process F700 in the nonvolatile memory 8D.
(85) Alternatively, during process F900, the update device 8 also adds, to the blacklist L, associated with the certified PAI identifier, an indication according to which the certified PAI identifier is used to filter communications of the telephone call type.
(86) The device 8 for updating the list L may be incorporated in the terminal 2, in the residential gateway 3 or in a piece of equipment of the communication network 4.
(87) In these embodiments, the filtering device 1 has the hardware architecture of a computer, as diagrammatically illustrated in
(88) Thus, the filtering device 1 in particular includes a processor 1A, a read-only memory 1B, a random-access memory 1C, a non-volatile memory 1D and communication means or components 1E. The processor 1A, the memories 1B-1D and the communication means or components 1E may optionally be shared with corresponding means or components of the communication terminal 2.
(89) The read-only memory 1B of the filtering device 1 constitutes a recording medium readable by the processor 1A and on which a computer program as described herein is recorded, including instructions for carrying out processes of a processing method as described herein, the processes of this processing method being described in reference to
(90) This computer program provides an equivalent definition of a functional processing module 1B 1 of the processing device 1. This module in particular makes it possible to perform filtering and/or notification functions, these functions being described in more detail in reference to the processes of the processing method illustrated in
(91) In these embodiments, the device 8 for updating a list (terminal, residential gateway 3 or server) has the hardware architecture of a computer, as diagrammatically illustrated in
(92) Thus, the list updating device 8 in particular includes a processor 8A, a read-only memory 8B, a random-access memory 8C, a non-volatile memory 8D and communication means or components 8E. The processor 8A, the memories 8B-8D and the communication means or components 8E may optionally be shared with corresponding means or components of the communication terminal 2.
(93) The read-only memory 8B of the list updating device constitutes a recording medium readable by the processor 8A and on which a computer program as described herein is recorded, including instructions for carrying out processes of a method for updating a filtering list as described herein, the processes of this list updating method being described later in reference to
(94) This computer program defines, in an equivalent manner, functional modules of the list updating device 8, in particular such as a module 8B1 for receiving a communication intended for the recipient terminal 2, a module 8B2 for obtaining at least a certified identifier and a noncertified identifier of the caller at the source of the communication from a signal message of the communication, a module 8B3 for saving said at least one certified identifier associated with a noncertified identifier of the caller present in the signal of the call, and a module 8B4 for adding said at least one certified identifier associated with the noncertified identifier to the list L. The addition module 8B4 is activated upon request by a user U1 of the recipient terminal 2. The receiving module 8131 in particular uses the communication means 8E. The functions of these modules are described in more detail in reference to the processes of the method for updating a list illustrated in
Other Embodiments
(95) Some embodiments seek to identify the communications to be filtered, i.e., those which must be conveyed to a given terminal and those which must be blocked, and to inform the user of the degree of certification of the calling number.
(96) The blocking and routing of communications are mechanisms known by those skilled in the art and which differ depending on the entity implementing them.
(97) In the embodiment previously described, the filtering is carried out within a terminal, this terminal being configured to cancel the presentation of the call to the terminals identified in the blacklist as not wishing to receive that call.
(98) Alternatively, some embodiments may be implemented in the residential gateway 3. In this case, the gateway may block the call for all of the terminals bearing the same identity connected behind the gateway and optionally authorize or not authorize other terminals sharing the same public identity used in roaming mode to continue to ring by sending a SIP 4XX or SIP 6XX rejection code.
(99) Alternatively, the filtering may be done by a piece of equipment of the network, for example an application server AS. In this case, the filtering applies to all of the terminals identically.
(100) To apply the filtering as a function of a terminal sharing a public identity with other terminals: The INVITE incoming call (FROM, PAI, TO) is sent from the S-CSCF to the application server AS, which manages the calls received by the shared public identity; The AS verifies the called terminals that have positioned a call filter for the pair of PAI/FROM certified/noncertified identifiers comprised in the INVITE message; The AS then returns a SIP INVITE message to the S-CSCF, the INVITE message being enriched with the SIP RejectContact header and leveraged with the AoC contact address (including the GRUU or IMEI of the terminal) of the terminal(s) having configured the certified identifier of the caller in their blacklist; The S-CSCF then initiates its forking mechanism only toward the terminals whereof the AoC is not present in the RejectContact of the INVITE received from the AS. If no RejectContact is positioned, all of the terminals receive a SIP INVITE message sent by the S-CSCF via the P-CSCF.
(101) To identify one terminal from among a set of terminals sharing the same SIP public identity, it is possible to use the IMEI (International Mobile Equipment Identifier) of the terminal, or when the terminal does not have a SIM card, a temporary identifier of the GRUU type as standardized at the IETF, generated by the S-CSCF and communicated to the terminal when it is registered in the network.
(102) This unique GRUU identifier must then be communicated to the network entity responsible for the filtering, for example using an HTTP request.
(103) According to a first alternative of this particular embodiment, a blacklist L is associated with each terminal and identified from an identifier of the terminal. The update of such a list may be done using the update method described in reference to
(104) This blacklist L may also be comprised in a network database that the terminal can access via an Internet IP link.
(105) According to a second alternative of this particular embodiment, the blacklist L is associated with the public identity shared by the terminals. Such a blacklist L comprises an identifier of the terminals associated with the certified identifiers for which the terminals wish to block the communications. The update of such a blacklist L may be done using the update method described in reference to
Detailed Description of Another Embodiment
(106) In this particular embodiment, the list L is a white list, such that only the calls whose certified identifiers are registered in the list L are presented to the user of the terminal 2.
(107) One embodiment of this method may be described by presenting its differences with respect to the blacklist-based filtering method described in reference to
(108) After receiving the call signal message M1 in process E100, extracting the certified identifier of the caller from the PAI field of the message M1 in process E200, the device 1 compares (process E510) this certified PAI identifier with the certified identifiers listed in the white list L.
(109) In this embodiment, the device 1 sends the message M1 to the terminal 2 so that the call will be displayed to the user of the receiving terminal 2 only if the PAI identifier corresponds to a certified identifier listed in the white list.
(110) In this embodiment, the white list may initially be built using a process other than the processes described herein. The user may also add or remove certified identifiers by using a menu of his terminal.
(111) Some embodiments also make it possible to offer a user the possibility of deleting a certified identifier from the white list on request after the call has been presented to him.
(112) Furthermore, in one embodiment, during the notification process, if the FROM and PAI identifiers are different, it is possible to use display and ring tone rules that are different depending on whether the pair of FROM and PAI identifiers is available in the white list.
(113) This in particular makes it possible to manage the communications sent from companies or call centers with whom one wishes to establish a relationship, but for which the FROM identifier is not necessarily identical to the PAI identifier.
Other Embodiments
(114) In the first two embodiments outlined above, the processing device carries out a filtering sub-process (E520, E530) based on the comparison (E400) of the certified PAI identifier with the noncertified FROM identifier and whether the PAI identifier belongs (E510) to a list containing certified identifiers of senders associated with noncertified identifiers of those senders.
(115) In another embodiment, the processing device does not perform a filtering sub-process, but only a notification process (E550) carried out based on the PAI and FROM identifiers making it possible to inform the user of the degree of certification of the communication to allow him the choice of whether to accept or reject the communication himself.
(116) In the first two embodiments outlined above, the reliability information is a certified identifier comprised in a signal message of the communication.
(117) In another embodiment, the certified PAI identifier is not presented at the time of the communication, for example when the equipment is of an old generation. In this case, the processing method may be identical to the case where the noncertified identifier is different from an identifier certified by the operator.
(118) When the mobile network is made using 2G/3G circuit technology, the PAI is not provided to the terminal.
(119) In an embodiment where the communication is under 4G coverage and switches temporarily to a 2G/3G mobile network, the processing process is interrupted. Alternatively, if this switch occurs, the reliability information used in the method comes from a reliability database of the previous communications done under 4G coverage and processed with their PAI identifiers.
(120) In another embodiment, the reliability information used during the processing method is provided by the network via a call signal field not yet used. The comparison of this reliability information with the noncertified FROM identifier is then executed by the MSC (Mobile Switch Center), and the terminal recovers the result of this comparison.
(121) In another embodiment, this reliability information is provided by the terminal by the telephone application server TAS of the backbone either via a call signal field that has not yet been used, or via a notification platform of the Apple APNS/Google C2M/Microsoft type.