Method and device for filtering a communication

11659084 · 2023-05-23

Assignee

Inventors

Cpc classification

International classification

Abstract

A method for filtering an original communication, being generated by a caller device toward a called device, and identified by an uncertified caller identity and by at least one certified caller identity. The method includes: verifying a condition satisfied if the uncertified caller identity and the at least one certified caller identity are different; and if the condition is satisfied, detecting expiry of a waiting duration following the verification, this duration being equivalent to the duration of at least one ring; and following the expiry and if no message is detected indicating the end of the original communication, presenting to the called device the original communication with at least one caller identity from among the uncertified caller identity and the at least one certified caller identity, the original communication not being presented to the called device before the detection.

Claims

1. A method for filtering an original communication generated by a caller device toward a called device, and identified by an uncertified caller identity and by at least one certified caller identity, said method comprising: in response to said uncertified caller identity and said at least one certified caller identity being different: at an expiry of a duration of at least one ring, in response to detecting that no message has been received indicating an end of said original communication, presenting to said called device said original communication with at least one caller identity from among said uncertified caller identity and said at least one certified caller identity, said original communication not being presented to the called device before said expiry; and presenting to said called device, before said expiry, an anonymized temporary communication corresponding to said original communication but in which none of said certified and uncertified caller identities are presented, at least one of said caller identities being replaced by a masked caller identity of a same type, or presented as an unavailable identity of the same type.

2. The filtering method as claimed in claim 1 wherein said method includes, sending to said caller device a message indicating that said called device has rung without the called device ringing.

3. The filtering method as claimed in claim 1 wherein presenting said original communication includes an updating of said anonymized temporary communication, by replacing said at least one caller identity which is masked or presented as unavailable with said caller identity of the same type.

4. The filtering method as claimed in claim 1 wherein presenting said original communication comprises: cancelling the anonymized temporary communication; and generating and presenting a new communication with at least one of said stored caller identities.

5. The filtering method as claimed in claim 1 including deleting a trace of the anonymized temporary communication from a communications log of said called device.

6. The filtering method as claimed in claim 5 wherein said deleting includes, on detecting a message indicating an end of said original communication and in response to no expiry being detected: inserting into said message indicating the end of the original communication, an item of information used to signify to the called device that said anonymized temporary communication presented to said called device is classified as an unwanted communication; and sending, to said called device, of said message indicating the end of the original communication.

7. The filtering method as claimed in claim 1 wherein, on detecting a message indicating an end of said original communication before said expiry, classifying said original communication as unwanted.

8. The filtering method as claimed in claim 7 including recording, in response to said original communication being classified as unwanted, at least one caller identity from among said at least one certified caller identity and said uncertified caller identity in a list of caller identities generating unwanted communications, if this recording has not already been carried out.

9. The filtering method claimed in claim 1 comprising a verification of at least one of the following conditions: a condition satisfied if said original communication must not be forwarded; a condition satisfied if at least one of said caller identities has been recorded in said list of caller identities generating unwanted communications; and a condition satisfied if the original communication has transited via an international-national interconnection and if the uncertified caller identity comprises a national fixed-line prefix.

10. A filtering device for filtering an original communication generated by a caller device toward a called device, and identified by an uncertified caller identity and by at least one certified caller identity, said device comprising: a processor; and a non-transitory computer-readable medium comprising instructions stored thereon which when executed by the processor configure the filtering device to: in response to said uncertified caller identity and said at least one certified caller identify being different: at an expiry of a duration of at least one ring, in response to detecting that no message has been received indicating an end of said original communication, present to said called device said original communication with at least one caller identity from among said uncertified caller identity and said at least one certified caller identify, said original communication not being presented to the called device before said expiry; and present to said called device, before said expiry, an anonymized temporary communication corresponding to said original communication but in which none of said certified and uncertified caller identities are presented, at least one of said caller identities being replaced by a masked caller identity of the same type, or presented as an unavailable identity of the same type.

11. The filtering device as claimed in claim 10, wherein the filtering device is further configured to send said caller device a message indicating that said called device has rung without the called device ringing.

12. The filtering device as claimed in claim 10, wherein the filtering device is further configured to record a list of caller identities generating unwanted communications.

13. The filtering device as claimed in claim 10, being implemented in a device from among: a network server managing said called device; an item of network termination equipment; a messaging server associated with said called device; an item of network interconnection equipment; a telephone switch; a platform of SCP service control point type; or a network server managing said caller device.

14. A non-transitory computer-readable data medium having stored thereon instructions which, when executed by a processor of a filtering device, cause the processor to perform the method of claim 1.

15. The filtering method as claimed in claim 4 including deleting a trace of the anonymized temporary communication from a communications log of said called device.

16. A method for filtering an original communication generated by a caller device toward a called device, and identified by an uncertified caller identity and by at least one certified caller identity, said method comprising: in response to said uncertified caller identity and said at least one certified caller identity being different: at an expiry of a duration of at least one ring, in response to detecting that no message has been received indicating an end of said original communication, presenting to said called device said original communication with at least one caller identity from among said uncertified caller identity and said at least one certified caller identity, said original communication not being presented to the called device before said expiry, in response to detecting a message indicating an end of said original communication before said expiry, updating said duration of at least one ring as a function of a duration of said original communication.

17. The filtering method as claimed in claim 16 wherein, on detecting a message indicating an end of said original communication before said expiry, classifying said original communication as unwanted.

18. The filtering method as claimed in claim 17 including recording, in response to said original communication being classified as unwanted, at least one caller identity from among said at least one certified caller identity and said uncertified caller identity from a list of caller identities generating unwanted communications, if this recording has not already been carried out.

19. The filtering method claimed in claim 16 comprising a verification of at least one of the following conditions: a condition satisfied if said original communication must not be forwarded; a condition satisfied if at least one of said caller identities has been recorded in said list of caller identities generating unwanted communications; and a condition satisfied if the original communication has transited via an international-national interconnection and if the uncertified caller identity comprises a national fixed-line prefix.

20. A non-transitory computer-readable data medium having stored thereon instructions which, when executed by a processor of a filtering device, cause the processor to perform the method of claim 16.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) Other features and advantages of the present invention will become apparent from the description below, with reference to the appended drawings which illustrate an exemplary embodiment thereof devoid of any limitation. In the figures:

(2) FIG. 1 is a block diagram showing the general steps of a filtering method in accordance with the invention;

(3) FIG. 2 is a block diagram showing the steps of a filtering method in accordance with a first embodiment of the invention;

(4) FIG. 3 illustrates the functional architecture of a filtering device according to the first embodiment;

(5) FIG. 4 is a block diagram showing the steps of a filtering method in accordance with a second embodiment of the invention;

(6) FIG. 5 is a block diagram showing the steps of a filtering method in accordance with a variant of the second embodiment of the invention;

(7) FIG. 6 illustrates the functional architecture of a filtering device according to the second embodiment;

(8) FIG. 7 is a block diagram showing the steps of a filtering method, in accordance with an embodiment inherited from the second embodiment; and

(9) FIG. 8 illustrates the hardware architecture of a filtering device according to an embodiment of the invention.

DETAILED DESCRIPTION

(10) FIG. 1 is a block diagram showing the general steps of a method for filtering an original communication, the method being in accordance with the invention.

(11) The method is implemented by a filtering device in accordance with the invention. This filtering device is included in a network consisting of at least one caller device DA and one called device DB.

(12) During a step E001, the filtering device receives an original communication C transmitted by the caller device DA and intended for the called device DB. The original communication is identified by at least one certified caller identity NDI and by an uncertified caller identity NDS.

(13) During a step E002, the filtering device verifies a condition satisfied if the uncertified caller identity NDS is different from the certified caller identity NDI, if there is a single identity NDI, or from all the certified caller identities NDI if there are several identities NDI.

(14) If this condition is not satisfied, the filtering device presents this original communication to the called device DB during a step E005 in accordance with the prior art.

(15) Otherwise, the filtering device estimates that the original communication C may represent un unwanted original communication, for example of ping call type.

(16) In this case, during a step E003, the filtering device obtains a waiting duration Tg during which it does not present the original communication C with its certified NDI and uncertified NDS caller identities to the called device DB.

(17) During a step E004, the filtering device detects the expiry of the waiting duration Tg.

(18) If no message is detected indicating the end of the original communication C on the expiry of the waiting duration Tg, the filtering device presents to the called device DB the original communication C with its certified NDI and uncertified NDS caller identities during a step E005.

(19) Two particular embodiments will now be described in detail.

Detailed Description of a First Embodiment

(20) FIG. 2 is a block diagram showing the steps of a method for filtering an original communication, in accordance with a first embodiment of the invention.

(21) In this embodiment, the original communication is a phone call C. The caller DA and called DB devices communicate according to the SIP protocol.

(22) In this embodiment, the method of the invention is implemented, with reference to the steps E001, E002, E003, E120, E004, E005 and E006 described below, by a network server D1 managing the called device DB, for example a switch of the called device DB in STN (Switched Telephone Network) fixed-line or 2G or 3G mobile circuit technology or else an application server.

(23) During a step E001, the network server D1 receives the original call C intended for the called device DB.

(24) The original call C is identified by a certified caller identity NDI and an uncertified caller identity NDS. In this embodiment, the caller device DA is a device capable of inserting the uncertified caller identity into the original call C.

(25) The certified caller identity NDI is certified by an entity managing the network of the caller device DA, for example the operator of the caller device DA. This identity NDI, transported by the network all the way to the network server D1, corresponds to the telephone number associated with the actual phone line of the caller device DA.

(26) The certified caller identity NDI is transmitted to a PAI field in a SIP INVITE call presentation message.

(27) The uncertified caller identity NDS is transported in a transparent manner from end to end from the caller device DA all the way to the server D1 without any control from the caller operator, this uncertified caller identity NDS being inserted by the telephone installation of the caller device DA.

(28) The uncertified caller identity NDS is transmitted in a SIP FROM field in the SIP INVITE call presentation message.

(29) During a step E002, the server D1 verifies certain conditions allowing it to estimate whether or not the original call C is unwanted.

(30) In this example, the server D1 verifies a condition Cond1 satisfied if the original call C must not be redirected to a different number of a voicemail service associated with the called device DB, for example because the called device DB is engaged or because of an unconditional call forwarding, or else because of unavailability of the called device DB. If the original call C must be redirected to a number different from that of the voicemail service, the server D1 processes the original call in accordance with a method of the prior art as the original call will not, in the end, be presented to the called device DB.

(31) Otherwise (Cond1 is satisfied) the server D1 continues to implement other steps of the method of the invention.

(32) In this example, the condition Cond1 is satisfied.

(33) The server D1 also verifies the following conditions: a condition Cond2 satisfied if the certified NDI and uncertified NDS caller identities are different; and a condition Cond3 satisfied if at least one caller identity among the caller identities NDI and NDS has been recorded in a list LIST of caller identities generating unwanted calls; the list LIST being managed by the server D1.

(34) If at least one of these conditions Cond2 or Cond3 is satisfied, the server D1 estimates that the original call C is liable to be a call of ping call type and thus continues to implement the method of the invention. Otherwise, the server D1 handles the original call C in accordance with a method of the prior art.

(35) In this example, all the conditions Cond1, Cond2 and Cond3 are satisfied.

(36) During a step E003, the server D1 obtains a waiting duration Tg. In this example, this waiting duration Tg is sufficient to filter ping calls of a duration equivalent to the duration of one ring on the called device DB. The waiting duration Tg has a value of 7 seconds.

(37) The server D1 can obtain the waiting duration Tg from the called device DB or from its own memory or from another item of network equipment.

(38) During a step E120, the server D1 sends the caller device DA a message msg_Ring simulating that the called device DB is notified of the original call C, for example a SIP 180 Ringing ring message.

(39) Thus, when the caller device DA receives the message msg_Ring, it can trigger a counter of a maximum time of presentation of the original call C transmitted to the called device DB, so that this original call C is of short duration (of ping call type).

(40) During a step E004, the server D1 detects the expiry of the waiting duration Tg and verifies if the original call C is still maintained by the caller device DA. To do this, the server D1 verifies if it has received, before the expiry of the waiting duration Tg, a SIP CANCEL message ending the original call C.

(41) In a first case where the original call C is not maintained on the expiry of the waiting duration Tg, the server D1 records during a step E006 at least one identity from among NDI and NDS in the list LIST if it is not already recorded.

(42) In a second case where the original call is still maintained on the expiry of the waiting duration Tg, during a step E005, the server D1 presents the original call C to the caller device DB, with its certified NDI and uncertified NDS caller identities. With respect to the call presentation methods of the prior art, the call set-up time is lengthened by the value of the waiting duration Tg. This lengthening will be undergone by the caller device DA but will have no impact on the experience of the called device DB.

(43) FIG. 3 presents a functional architecture of a device D1 for filtering a communication C, in accordance with the first embodiment of the invention, as well as its interactions with the caller DA and called DB devices.

(44) In this example, the filtering device is the network server D1 managing the called device DB.

(45) The filtering device D1 includes: a verification module VERIF configured to verify at least one of the conditions Cond1, Cond2 and Cond3 described with reference to FIG. 2, a communication presentation module DISP configured to present the original call C with at least one of the certified NDI and uncertified NDS caller identities to the called device DB if no message is detected indicating the end of the original call C and following the expiry of the waiting duration Tg after the verification of the conditions Cond1, Cond2 and Cond3; a ringing module RG configured to send the caller device DA the message msg_Ring indicating the ringing of the called device DB; a reputation module m_LIST configured to record the list LIST of caller identities generating unwanted calls; and a countdown timer TIM configured to obtain the waiting duration Tg and to monitor the waiting.

(46) The filtering device D1, and more precisely its verification module VERIF, receives, from the caller device DA, the original call C with its caller identities NDI and NDS. In particular, to verify the condition Cond3, the module VERIF consults the reputation module m_LIST. At the end of the verifications, the verification module VERIF sends the results RCond of these verifications to the communication presentation module DISP and presents the original call C to it.

(47) The dummy ringing module RG sends the message msg_Ring to the caller device DA, as long as the original call C is maintained by the caller device DA, without, however, the called device DB ringing before the expiry of the waiting duration Tg.

(48) The communication presentation module DISP obtains the waiting duration Tg from the countdown timer TIM and does not present the original call C with its caller identities NDI and NDS to the called device DB until the expiry of the waiting duration Tg if the original call C is still maintained by the caller device DA.

(49) If the original call C is not maintained on the expiry of the waiting duration Tg, the communication presentation module DISP sends at least one from among the caller identities NDI and NDS to the reputation module m_LIST for the updating of the list LIST.

(50) The countdown timer TIM can obtain the waiting duration Tg from the called device DB.

Detailed Description of a Second Embodiment

(51) FIG. 4 is a block diagram showing the steps of a method for filtering an original communication, in accordance with a second embodiment of the invention.

(52) In this embodiment, the original communication C is a phone call transmitted by a caller device DA and intended for a called device DB. The caller DA and called DB devices communicate according to the SIP protocol.

(53) In this embodiment, the method of the invention is implemented, with reference to the steps E001, E002, E003, E220, E240, E004, E005, E006 and E260 described below, by a network server D2 managing the called device DB, for example a switch of the network of the called device DB in STN fixed-line or mobile 2G or 3G circuit technology or by an application server.

(54) During a step E001, the server D2 receives the original call C intended for the called device DB.

(55) The original call C is identified by a certified caller identity NDI and an uncertified caller identity NDS. The certified NDI and uncertified NDS caller identities are respectively transmitted in a SIP PAI field and in a SIP FROM field in a SIP INVITE call presentation message.

(56) During a step E002 similar to step E002 described with reference to FIG. 2, the server D2 verifies certain conditions allowing it to estimate whether or not the original call C is an unwanted call.

(57) In this example, the server D2 verifies the conditions Cond1, Cond2 and Cond3 described with reference to FIG. 2.

(58) During a step E003 similar to step E003 described with reference to FIG. 2, the server D2 obtains a waiting duration Tg.

(59) During a step E220, the server D2 records in a memory the caller identities NDI and NDS.

(60) During a step E240, the server D2 presents an anonymized temporary communication Cp to the called device DB. This call Cp corresponds to the original call C but adding to the SIP INVITE call presentation message an SIP Privacy field equal to “id, header” used to specify that the certified caller identity NDI included in the SIP PAI field must not be presented on the called device DB, and replacing, in the SIP FROM field, the uncertified caller identity NDS with a masked uncertified caller identity NDS_m, for example a SIP FROM field: “Anonymous” sip:anonymous@anonymous. invalid.

(61) The presentation time of the anonymized temporary communication Cp is at the most equal to the waiting duration Tg.

(62) The called device DB then receives the call Cp in anonymous mode. Hence, it will know that this call Cp is liable to be an unwanted call. We suppose in this example that the called device DB does not answer the call Cp.

(63) During a step E004 similar to the step E004 described with reference to FIG. 2, the server D2 detects the expiry of the waiting duration Tg and verifies if the original call C is still maintained by the caller device DA.

(64) In a first case where the original call C is not maintained on the expiry of the waiting duration Tg, during a step E006 similar to the step E006 described with reference to FIG. 2, the server D2 records at least one identity from among NDI and NDS in the list LIST if it is not already recorded.

(65) During a step E260, the server D2 sends a command to the called device DB to delete the trace of the anonymized temporary communication Cp from the communications log of the called device DB, so that this log is not polluted. This step E260 is optional but it is preferred.

(66) In this embodiment, the server D2 sends during the step E260, a SIP DELETE message repeating all the information contained in the SIP INVITE message used to present the anonymized temporary communication Cp to the called device DB during the step E240 in such a way that the called device DB makes the link with the call Cp to be erased. These items of information contain SIP dialogue technical identifiers, for example of Call-Id, From-Tag and/or To-Tag type. In a further step, the server D2 will receive from the called device DB a SIP 200 OK acknowledgement message.

(67) The SIP DELETE message is new with respect to the state of the art concerning the SIP protocol.

(68) In a second case where the original call C is still maintained, during a step E005, the server D2 restores the caller identities NDI and NDS stored in the memory and presents to the caller device DB a call corresponding to the original call C with its caller identities NDI and NDS.

(69) We will now describe two variants relating to the step E005 of this second embodiment.

(70) In the first variant, the server D2 updates the anonymized temporary communication Cp presented to the called device DB during the step E240, replacing the masked identities NDI_m and NDS_m with the saved identities NDI and NDS respectively. To do this, the server D2 sends a SIP UPDATE message (RFC 3311 standard) to the called device DB. Thus, a single trace of the updated call, corresponding to the original call C with at least one of its identities NDI and NDS, appears on the communications log of the called device DB.

(71) In this first variant, the called device DB supports the SIP UPDATE message. In the second variant, illustrated by FIG. 5, the server D2 cancels, during a step E250, the anonymized temporary communication Cp(NDI_m, NDS_m) presented to the called device DB during step E240, generates a new call Cn(NDI, NDS) with the saved caller identities NDI and NDS and presents this new call Cn(NDI, NDS) to the called device DB during a step E270. The new call Cn(NDI, NDS), identical to the original call C, presents a restoration thereof.

(72) This second variant has the advantage of operating in a sure way on the called device DB since it uses the basic SIP INVITE and SIP CANCEL methods. Two call traces are generated on the communications log of the called device DB corresponding to the anonymized temporary communication Cp(NDI_m, NDS_m) and to the new call Cn(NDI, NDS). The server D2 can implement a step E290 similar to the step E260 to delete the trace of the anonymized temporary communication Cp (NDI_m, NDS_m) presented during the step E240.

(73) FIG. 6 shows a functional architecture of a device D2 for filtering an original communication C, in accordance with the second embodiment of the invention, as well as its interactions with the caller DA and called DB devices.

(74) In this example, the filtering device is the network server D2 managing the called device DB.

(75) The filtering device D2 includes: a verification module VERIF, similar to the module VERIF described with reference to FIG. 3; a communication presentation module DISP configured to present to the called device DB: the anonymized temporary communication Cp with masked caller identities NDI_m and NDS_m as a replacement for the certified NDI and uncertified NDS caller identities before the expiry of the waiting duration Tg, and the new communication Cn with at least one of the certified NDI and uncertified NDS caller identities if the original communication C is still maintained by the caller device DA on the expiry of the waiting duration; a reputation module m_LIST similar to the module m_LIST described with reference to FIG. 3; a countdown timer TIM similar to the counter TIM described with reference to FIG. 3; and a recording module SAUV configured to store in the memory the certified NDI and uncertified NDS caller identities.

(76) If the call C is not maintained by the caller device DA on the expiry of the waiting duration Tg, the communication presentation module DISP obtains at least the saved caller identities NDI and NDS from the recording module SAUV and sends it to the reputation module m_LIST for the updating of the list LIST.

Other Embodiments

(77) In an embodiment, the caller DA and called DB devices communicate according to a fixed-line circuit protocol, for example the ISUP (ISDN User Part Signaling) protocol for a Switched Telephone Network STN or an Integrated Services Digital Network ISDN, or according to a mobile circuit protocol, for example the BICC (Bearer-Independent Call Control) protocol for a 2.sup.nd or 3.sup.rd generation mobile network. In this embodiment, the certified caller identity NDI is a signaling field “Calling Party Number”, whereas the uncertified caller identity NDS is a signaling field “Generic Number” or “Additional Calling Party Number”.

(78) In an embodiment, the called device DB includes several terminals.

(79) In an embodiment, the waiting duration Tg is configured to filter ping calls of a maximum duration corresponding to a duration of two rings on the called device DB. This waiting duration is for example of 12 seconds.

(80) In an embodiment, the verification step E002 also includes the verification of a condition satisfied if the original communication C has transited over an international-national interconnection and if the uncertified caller identity NDS comprises a national fixed-line prefix.

(81) To verify if the original communication C has transited over an international-national interconnection, it is possible to test a value of a location information field containing, for example, a unique dedicated code indicating the international origin of the communication, this value being inserted by an item of interconnection equipment managed by a national operator. In France for example, the code 99 is inserted for incoming communications to the national territory.

(82) In an embodiment wherein the original communication C must be redirected to a voice message of the called device DB, the server D1 or D2 presents the original communication C to the voicemail services during the step E005 (steps E240 or E005 respectively).

(83) In an embodiment, the anonymized temporary communication Cp, presented by the server D2 to the called device DB during the step E240, is a communication without any caller identity. The server D2 deletes the SIP PAI field so that the certified caller identity NDI is presented as an unavailable identity NDI_d, and in the SIP FROM field replaces the uncertified caller identity NDS by an unavailable uncertified caller identity NDS_d, for example a SIP FROM field: “Unavailable” sip:unavailable@unknown.invalid).

(84) In an embodiment, the anonymized temporary communication Cp is identified solely by a single masked or unavailable caller identity NDI_m or NDS_m.

(85) In an embodiment, the anonymized temporary communication Cp is identified by a masked caller identity of a first type and an unavailable caller identity of a second type, for example a masked certified caller identity NDI_m and an unavailable uncertified caller identity NDS_d.

(86) In an embodiment wherein the original communication C must be redirected to a voicemail service of the called device DB, the server D2 sends a command to delete a trace of the anonymized temporary communication Cp from the voicemail service during the step E260 or the step E290.

(87) In an embodiment, the reputation list LIST is managed by a network device other than the device that implements the method of the invention.

(88) In an embodiment inherited from the second embodiment described with reference to FIG. 4, if the uncertified caller identity NDS of the original communication C is already masked or unavailable, this identity is presented to the called device DB before the expiry of the waiting duration Tg, without being replaced by another masked or unavailable identity of the same type.

(89) In an embodiment inherited from the second embodiment described with reference to FIG. 4, following the sending of the SIP DELETE message to the called device DB during the step E260 or the step E290 to delete the trace of the temporary call Cp, the server D2 receives from the called device DB an error code, for example: a 404 Not Found code if the trace of the call Cp does not exist, for example if the called has already himself deleted the trace of this call Cp; or a 405 Method Not allowed code if the called device DB does not support the SIP DELETE message.

(90) In an embodiment inherited from the second embodiment described with reference to FIG. 4, the server D2 sends to the called device DB the SIP DELETE message in order to delete the trace of the anonymized temporary communication Cp before relaying to the called device DB the SIP CANCEL message indicating the end of the original call C.

(91) In an embodiment inherited from the second embodiment described with reference to FIG. 4, the step E260 of deleting the trace of the anonymized temporary communication Cp precedes the step E006 of recording at least one of the caller identities NDI and NDS in the reputation list LIST.

(92) In an embodiment inherited from the second embodiment described with reference to FIG. 4, the step E260 of deleting the trace of the anonymized temporary communication Cp even precedes the step E004 of detecting the expiry of the waiting duration Tg. The step E260 is implemented after the step E240 of presenting the anonymized temporary communication Cp, and on detection of a message C_end indicating the end of the original communication C.

(93) FIG. 7 is a block diagram representing the steps of a method for filtering an original communication, in accordance with an embodiment inherited from the second embodiment described with reference to FIG. 4. The filtering device D2 detects a message C_end, of SIP CANCEL type, indicating the end of the original call C. The expiry of the waiting duration Tg is not yet detected. To delete (E260) the trace of the anonymized temporary communication Cp presented to the called device DB during the step E240, the filtering device D2 inserts, during a step E262, in a reason code SIP header (IETF RFC 3326 standard) of the SIP CANCEL message, a new code RC indicating that the original call C, and thus the anonymized temporary communication Cp presented to the called device DB, is an unwanted call of one-ring call type. The reason code SIP header of the SIP CANCEL message can for example contain a new code “Ping_Call”. This new code is to be added to the IETF RFC 3326 standard. Next, during a step E264, the filtering device D2 sends the message C_end to the called device DB. On receiving this message, the called device DB ends the presentation of the anonymized temporary communication Cp and becomes aware that this call Cp is of one-ring call type. It can then decide to delete its trace from its communications log.

(94) In an embodiment inherited from the second embodiment described with reference to FIGS. 4 and 5, to delete (E290) the trace of the anonymized temporary communication Cp canceled during the step E250, the deletion step E290 includes, following the cancellation of the anonymized temporary communication Cp, the sub-steps of: inserting into a SIP CANCEL message indicating the cancellation of the call Cp an item of information used to signify to the called device DB that a trace of this call Cp should be deleted, for example a new code in the reason code SIP header; and sending to the called device DB the SIP CANCEL message indicating the cancellation of the anonymized temporary communication Cp.

(95) In an embodiment, following the detection of a message indicating the end of the original communication C, for example a SIP CANCEL message, before the expiry of the waiting duration Tg, the filtering device D1, D2 records (E006) at least an NDI or NDS identity from the list LIST, without waiting for the detection (E004) of the expiry of the waiting duration Tg.

(96) Description of a Device for Filtering a Communication in Accordance with the Invention

(97) Two examples of functional architecture of the filtering device D1, D2, have already been described with reference to FIGS. 3 and 6.

(98) In the embodiments described here, the filtering device D1, D2 in accordance with the invention has the architecture of a computer, as illustrated in FIG. 8. It comprises in particular a processor 7, a random access memory 8, a read-only memory 9, a non-volatile flash memory 10 in a particular embodiment of the invention, as well as communicating means 11. Such means are known per se and are not described in more detail here.

(99) The read-only memory 9 of the filtering device D1, D2 according to the invention constitutes a recording medium in accordance with the invention, readable by the processor 7 and on which is recorded, here, a computer program Prog in accordance with the invention.

(100) The memory 10 of the filtering device D1, D2 is used to record variables used for executing the steps of the invention, such as the value of the countdown timer TIM, the waiting duration Tg, the caller identities NDI and NDS and the reputation list LIST.

(101) The computer program Prog defines functional and software modules here, configured to filter an original communication C. These functional modules rely on on and/or control the hardware elements 7-11 of the filtering device D1, D2 mentioned previously.

(102) The device for filtering an original communication C, in accordance with the invention, can be implemented in an item of network equipment such as for example: a network server managing the called device, such as the servers D1 and D2 described previously; an item of network termination equipment; a messaging server associated with the called device DB; an item of network interconnection equipment; a telephone switch; a platform of SCP service control point type; or a network server managing the caller device DA.

(103) In a variant, the filtering device can be implemented in the called device DB.