WO2009098289A1 - Subscriber identity module (sim)-based filtering of incoming/outgoing calls /text messages - Google Patents

Subscriber identity module (sim)-based filtering of incoming/outgoing calls /text messages Download PDF

Info

Publication number
WO2009098289A1
WO2009098289A1 PCT/EP2009/051375 EP2009051375W WO2009098289A1 WO 2009098289 A1 WO2009098289 A1 WO 2009098289A1 EP 2009051375 W EP2009051375 W EP 2009051375W WO 2009098289 A1 WO2009098289 A1 WO 2009098289A1
Authority
WO
WIPO (PCT)
Prior art keywords
identifier number
sim
text message
identifier
module
Prior art date
Application number
PCT/EP2009/051375
Other languages
French (fr)
Inventor
Ciaran John Bradley
Brendan Eoin Bradley
Original Assignee
Ciaran John Bradley
Brendan Eoin Bradley
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ciaran John Bradley, Brendan Eoin Bradley filed Critical Ciaran John Bradley
Publication of WO2009098289A1 publication Critical patent/WO2009098289A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to improvements in firewalls, which are based on subscriber identity modules (SIMs) of mobile telecommunication devices.
  • SIMs subscriber identity modules
  • SIMs used primarily to identify the person using the device.
  • SIMs can also be used to provide firewall-type services, for example filtering of incoming and
  • Firewall-type services can be used in both these areas to control the events which a mobile telephone processes. In particular, there is a need to be able to disconnect certain events, such as certain incoming calls.
  • a firewall system based on a SIM of a mobile telecommunication device, the system comprising an incoming call filtering module, which comprises a notification module which receives notification that the device has received an incoming call from a telecommunication network, an interrogation module which causes interrogation of the incoming call to search for an identifier number of the call, and, if an identifier number is found, receives the identifier number of the incoming call, a comparison module which compares the identifier number of the incoming call with one or more approved identifier numbers, and a termination module which, if the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the incoming call to terminate.
  • an incoming call filtering module which comprises a notification module which receives notification that the device has received an incoming call from a telecommunication network, an interrogation module which causes
  • the firewall system carries out the above- described functions in a sufficiently short time such that a user of the device is not able to access the incoming call.
  • the firewall system filters incoming calls to the device, disconnecting certain calls and allowing other calls to continue, i.e. be processed by the device.
  • the interrogation module may receive notification that no identifier number has been found, and that the incoming call is an unidentified incoming call.
  • the termination module may then instruct the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the unidentified incoming call to terminate.
  • the command which the termination module instructs the SIM to send to the device may activate a global system for mobile communications (GSM) session termination procedure. Carrying out such a procedure causes the device to be disconnected from the telecommunication network.
  • the command which the termination module instructs the SIM to send to the device may cause the device to be reconnected to the telecommunication network.
  • the command which the termination module instructs the SIM to send to the device may cause the device to be reconnected to the telecommunication network, by activating a GSM session start-up procedure. Although the device is reconnected to the telecommunication network, it will not be reconnected to the incoming call, as disconnecting the device from the network has caused the call to terminate.
  • the command which the termination module instructs the SIM to send to the device may cause deactivation of the SIM.
  • the command which the termination module instructs the SIM to send to the device may cause reactivation of the SIM by the device.
  • the command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause the device to be disconnected from the telecommunication network.
  • the command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause the device to be reconnected to the telecommunication network.
  • the command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause deactivation of the SIM.
  • the command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause reactivation of the SIM by the device.
  • the command which the termination module instructs the SIM to send to the device may comprise a refresh command provided as part of a SIM application toolkit application, and which has parameters which are set to cause the device to be disconnected from the telecommunication network, to cause the device to be reconnected to the telecommunication network, and to cause deactivation of the SIM and to cause reactivation of the SIM.
  • SIM application toolkit applications are provided as standard on SIMs, and are used to govern how non-standard applications, such as those provided by parties other than the SIM manufacturer, interact with the device. Use of a command provided by the SIM application toolkit application, can therefore allow the firewall system of the invention to interact with the device.
  • the firewall system may comprise an advice module which instructs the device to send a message to a display of the device, which message informs a user of the device that an incoming call has been terminated.
  • the notification module may receive notification that the device has received an incoming call from the SIM.
  • the SIM may comprise a SIM application toolkit application, and may use a function of this to detect receipt of an incoming call, and may use a function of this to notify the notification module of receipt of the incoming call.
  • the interrogation module may cause interrogation of the incoming call to search for an identifier number of the call by instructing the SIM to interrogate the call.
  • the SIM may comprise a SIM application toolkit application, and may use a function of this to interrogate the incoming call to search for an identifier number of the call.
  • the SIM may comprise a SIM application toolkit application, and may use a function of this to send an identifier number of the incoming call to the interrogation module.
  • the SIM may comprise a SIM application toolkit application, and may use a function of this to notify the interrogation module that no identifier number of the incoming call has been found.
  • the firewall system may comprise a firewall identifier number database. This may be located on the SIM of the device.
  • the firewall identifier number database may comprise one or more entries, the or each of which comprises an identifier number and one or more rules for the identifier number. At least one of the rules may be used to determine that the identifier number is an approved identifier number or is not an approved identifier number. Thus, for the or each identifier number, it can be determined whether or not to terminate incoming calls having the identifier number.
  • the firewall system may control access to the firewall identifier number database. This will allow prevention of access to the firewall identifier number database by an unauthorised person via only the SIM.
  • the firewall identifier number database may be accessible without using the firewall system. Such access may be restricted to authorised persons only.
  • the firewall identifier number database may be password-protected, to restrict access to the database to a password holder or holders.
  • the firewall system may comprise an approved identifier number creation module.
  • the approved identifier number creation module may create an approved identifier number by entering an identifier number into an entry of the firewall identifier number database and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. Additionally or alternatively, the approved identifier number creation module may create an approved identifier number by accessing an entry of the firewall identifier number database in which an identifier number has already been stored, and entering one or more rules into the entry which determine that the identifier number is an approved identifier number.
  • the SIM of the device may comprise a SIM identifier number database in which a user of the device has stored one or more contact identifier numbers.
  • the approved identifier number creation module may create an approved identifier number by copying one or more of the contact identifier numbers into one or more entries of the firewall identifier number database, accessing an entry of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the entry which determine that the contact identifier number is an approved identifier number.
  • the approved identifier number creation module creates one or more approved identifier numbers by copying the or each contact identifier number into one or more entries of the firewall identifier number database, accessing one or more entries of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the or each entry which determine that the contact identifier number is an approved identifier number.
  • the comparison module may compare an identifier number of the incoming call with one or more approved identifier numbers which are stored in the firewall identifier number database.
  • the comparison module may access the or each entry in the firewall identifier number database, interrogate the one or more rules of each entry which determine if the identifier number of the entry is an approved identifier number or is not an approved identifier number, and, if the identifier number is an approved identifier number, compare the identifier number of the incoming call with the approved identifier number, or, if the identifier number is not an approved identifier number, end its comparison function.
  • the firewall system may comprise a recording module which records identifier numbers of the or each incoming call which has been terminated.
  • the recording module may record the identifier numbers of the or each terminated call in an entry of a firewall terminated identifier number database.
  • the recording module may record the identifier numbers of a number of terminated calls in entries of the firewall terminated identifier number database, for example the identifier numbers of the last ten calls which have been terminated.
  • the recording module may record data comprising the date and time of termination of a call in the entry of the identifier number of the call.
  • the firewall system may comprise an outgoing call filtering module. This may comprise a notification module which receives notification that the device is making an outgoing call, an interrogation module which causes interrogation of the outgoing call to search for an identifier number of the call and receives the identifier number of the outgoing call, a comparison module which compares the identifier number of the outgoing call with one or more approved identifier numbers, and a blocking module which, if the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to discontinue the outgoing call.
  • the firewall system may comprise an incoming text message filtering module.
  • This may comprise a notification module which receives notification that the device has received an incoming text message, an interrogation module which causes interrogation of the text message to search for an identifier number of the text message and, if an identifier number is found, receives the identifier number of the text message, a comparison module which compares the identifier number of the text message with one or more approved identifier numbers, and a blocking module which, if the identifier number of the text message does not match at least one of the one or more approved identifier numbers, instructs the SIM to delete the text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the text message from the device.
  • a notification module which receives notification that the device has received an incoming text message
  • an interrogation module which causes interrogation of the text message to search for an identifier number of the text message and,
  • the interrogation module may receive notification that no identifier number has been found, and that the incoming text message is an unidentified incoming text message.
  • the blocking module may then instruct the SIM to delete the unidentified text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the unidentified text message from the device.
  • the firewall system may comprise an outgoing text message filtering module.
  • This may comprise a notification module which receives notification that the device is sending an outgoing text message, an interrogation module which causes interrogation of the outgoing text message to search for an identifier number of the text message and receives the identifier number of the outgoing text message, a comparison module which compares the identifier number of the outgoing text message with one or more approved identifier numbers, and a blocking module which, if the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to discontinue sending of the outgoing text message.
  • the firewall system may comprise a set-up module which activates and deactivates the firewall system.
  • the set-up module may password-protect the firewall system, to restrict access to the system to a password holder or holders.
  • the set-up module may allow setting of one or more operation parameters of the firewall system.
  • a method of filtering incoming calls to a mobile telecommunication device comprising the steps of receiving notification that the device has received an incoming call from a telecommunication network, interrogating the incoming call to search for an identifier number of the call, and, if an identifier number is found, receiving the identifier number of the incoming call, comparing the identifier number of the incoming call with one or more approved identifier numbers, and if the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, instructing a SIM of the device to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the incoming call to terminate.
  • the method may comprise receiving notification that no identifier number has been found and that the incoming call is an unidentified incoming call, and instructing the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the unidentified incoming call to terminate.
  • the command which the SIM is instructed to send to the device may activate a global system for mobile communications (GSM) session termination procedure. Carrying out such a procedure causes the device to be disconnected from the telecommunication network.
  • the command which the SIM is instructed to send to the device may cause the device to be reconnected to the telecommunication network.
  • the command which the termination module instructs the SIM to send to the device may cause the device to be reconnected to the telecommunication network, by activating a GSM session start-up procedure. Although the device is reconnected to the telecommunication network, it will not be reconnected to the incoming call, as disconnecting the device from the network has caused the call to terminate.
  • the command which the SIM is instructed to send to the device may cause deactivation of the SIM.
  • the command which the SIM is instructed to send to the device may cause reactivation of the SIM.
  • the command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause the device to be disconnected from the telecommunication network.
  • the command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause the device to be reconnected to the telecommunication network.
  • the command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause deactivation of the SIM.
  • the command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause reactivation of the SIM.
  • the command which the SIM is instructed to send to the device may comprise a refresh command provided as part of an application toolkit application of the SIM, and which has parameters which are set to cause the device to be disconnected from the telecommunication network, to cause the device to be reconnected to the telecommunication network, to cause deactivation of the SIM and to cause reactivation of the SIM.
  • SIM application toolkit applications are provided as standard on SIMs, and are used to govern how non-standard applications, such as those provided by parties other than the SIM manufacturer, interact with the device. Use of a command provided by the SIM application toolkit application, can therefore allow the firewall system of the invention to interact with the device.
  • the method may comprise instructing the device to send a message to a display of the device, which message informs a user of the device that an incoming call has been terminated.
  • Notification that the device has received an incoming call may be received from the SIM.
  • the SIM may comprise a SIM application toolkit application, and the method may comprise using a function of this to detect receipt of an incoming call, and may use a function of this to notify the notification module of receipt of the incoming call.
  • Interrogation of the incoming call to search for an identifier number of the call may comprise instructing the SIM to interrogate the call.
  • the SIM may comprise a SIM application toolkit application, and may use a function of this to interrogate the incoming call to search for an identifier number of the call.
  • the method may comprise using a firewall identifier number database. This may be located on the SIM of the device.
  • the firewall identifier number database may comprise one or more entries, the or each of which comprises an identifier number and one or more rules for the identifier number. At least one of the rules may be used to determine that the identifier number is an approved identifier number or is not an approved identifier number. Thus, for the or each identifier number, it can be determined whether or not to terminate incoming calls having the identifier number.
  • the method may comprise creating an approved identifier number by entering an identifier number into an entry of the firewall identifier number database and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. Additionally or alternatively, the method may comprise creating an approved identifier number by accessing an entry of the firewall identifier number database in which an identifier number has already been stored, and entering one or more rules into the entry which determine that the identifier number is an approved identifier number.
  • the SIM of the device may comprise a SIM identifier number database in which a user of the device has stored one or more contact identifier numbers.
  • the method may comprise creating an approved identifier number by copying one or more of the contact identifier numbers into one or more entries of the firewall identifier number database, accessing an entry of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the entry which determine that the contact identifier number is an approved identifier number.
  • the method comprises creating one or more approved identifier numbers by copying the or each contact identifier number into one or more entries of the firewall identifier number database, accessing one or more entries of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the or each entry which determine that the contact identifier number is an approved identifier number.
  • Comparing an identifier number of the incoming call with one or more approved identifier numbers may comprise comparing the incoming call identifier number with one or more approved identifier numbers stored in the firewall identifier number database. This may comprise accessing the or each entry in the firewall identifier number database, interrogating the one or more rules of each entry which determine if the identifier number of the entry is an approved identifier number or is not an approved identifier number, and, if the identifier number is an approved identifier number, comparing the identifier number of the incoming call with the approved identifier number, or, if the identifier number is not an approved identifier number, ending the comparison step.
  • the method may comprise recording identifier numbers of the or each incoming call which has been terminated.
  • the or each identifier number may be recorded in an entry of a firewall terminated identifier number database.
  • the identifier numbers of a number of terminated calls may be recorded in entries of the firewall terminated identifier number database, for example the identifier numbers of the last ten calls which have been terminated.
  • Data comprising the date and time of termination of a call may be recorded in the entry of the identifier number of the call.
  • the method may comprise filtering outgoing calls. This may comprise receiving notification that the device is making an outgoing call, interrogating the outgoing call to search for an identifier number of the call and receiving the identifier number of the outgoing call, comparing the identifier number of the outgoing call with one or more approved identifier numbers, and if the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, instructing the SIM to send a command to the device which causes the device to discontinue the outgoing call.
  • the method may comprise filtering incoming text messages. This may comprise receiving notification that the device has received an incoming text message, interrogating the text message to search for an identifier number of the text message and, if an identifier number is found, receiving the identifier number of the text message, comparing the identifier number of the text message with one or more approved identifier numbers, and if the identifier number of the text message does not match at least one of the one or more approved identifier numbers, instructing the SIM to delete the text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the text message from the device.
  • the method may comprise receiving notification that no identifier number has been found that the incoming text message is an unidentified incoming text message, and instructing the SIM to delete the unidentified text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the unidentified text message from the device.
  • the method may comprise filtering outgoing text messages. This may comprise receiving notification that the device is sending an outgoing text message, interrogating the outgoing text message to search for an identifier number of the text message and receiving the identifier number of the outgoing text message, comparing the identifier number of the outgoing text message with one or more approved identifier numbers, and if the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, instructing the SIM to send a command to the device which causes the device to discontinue sending of the outgoing text message.
  • the firewall system may comprise a set-up module which activates and deactivates the firewall system.
  • the set-up module may password-protect the firewall system, to restrict access to the system to a password holder or holders.
  • the set-up module may allow setting of one or more operation parameters of the firewall system.
  • a computer program product stored in a medium readable by a computer, the product comprising computer-readable program means which cause the computer to perform the method according to the second aspect of the invention.
  • a mobile telecommunication device comprising a firewall system according to the first aspect of the invention.
  • the mobile telecommunication device may comprise any of a mobile telephone, a PDA, a Blackberry (RTM) device.
  • Figure 1 is a schematic representation of a mobile telecommunication device comprising a SIM-based firewall system according to the first aspect of the invention
  • Figure 2 is a schematic representation of the firewall system of Figure 1 ;
  • Figure 3 is a flow diagram illustrating setting-up of the firewall system of Figures 1 and 2;
  • Figure 4 is a flow diagram illustrating a method of filtering incoming calls carried out by the firewall system of Figures 1 and 2;
  • Figure 5 is a flow diagram illustrating a method of filtering outgoing calls carried out by the firewall system of Figures 1 and 2;
  • Figure 6 is a flow diagram illustrating a method of filtering incoming text messages carried out by the firewall system of Figures 1 and 2, and
  • Figure 7 is a flow diagram illustrating a method of filtering outgoing text messages carried out by the firewall system of Figures 1 and 2.
  • FIG. 1 shows a schematic representation of a mobile telecommunication device which is a mobile telephone 1 , and comprises a SIM 3, a firewall system 5 which is based on the SIM, and a telephone operating system 7.
  • the SIM 3 comprises a SIM application toolkit application 9, a SIM identifier number database 11 and a SIM text message database 13.
  • the SIM identifier number database 11 is used to store one or more telephone numbers of a user of the telephone 1.
  • the SIM text message database 13 is used to store one or more text messages received by the mobile telephone 1.
  • the phone operating system 7 comprises a phone text message database 15, in which one or more text messages received by the mobile telephone 1 are stored.
  • the phone operating system 7, the SIM application toolkit application 9 and the firewall system 5 are in communication with each other.
  • the firewall system 5 can communicate with the phone operating system 7 directly, or via the SIM 3 using the SIM application toolkit application 9.
  • SIM application toolkit applications are provided as standard on SIMs, and are used to govern how non-standard applications, such as those provided by parties other than the SIM manufacturer, interact with the SIM and the mobile telecommunication device.
  • the firewall system 5 must comply with the standard defined for the SIM application toolkit application 9, in order to be able to communicate with the SIM 3 and the phone operating system 7 via the SIM 3.
  • FIG. 2 is a schematic representation of the firewall system 5 of Figure 1.
  • the firewall system 5 comprises an incoming call filtering module 20, an outgoing call filtering module 22, an incoming text message filtering module 24, and an outgoing text message filtering module 26.
  • the firewall system 5 further comprises a set-up module 28, an approved identifier number creation module 30, an advice module 32, a recording module 34, a firewall identifier number database 36, and a firewall terminated identifier number database 38.
  • Each of the modules may be in communication with one or more of the other modules and may be in communication with the or each database, as required.
  • Each of the incoming call filtering module 20, the outgoing call filtering module 22, the incoming text message filtering module 24, and the outgoing text message filtering module 26, comprises a number of modules as will be referred to later, but which, for clarity, are not shown in Figure 2.
  • the firewall system 5 can be implemented in software, hardware, or a combination of software and hardware. It will be appreciated that although the firewall system 5 is shown as comprising a number of separate modules, these need not be physically separate modules in hardware, or separate modules in software.
  • the firewall system 5 is installed on the SIM 3 of the mobile telephone 1. This may done by a manufacturer or a retailer of the SIM 3.
  • Figure 3 is a flow diagram illustrating setting-up of the firewall system 5.
  • a person such as a parent or a business manager who wishes to control usage of the telephone 1 , accesses the firewall system 5, step 300. Access may be via an application menu provided on the telephone 1 using a keypad of the telephone 1 , or the firewall system may be accessed remotely.
  • the set-up module 28 of the firewall system 5 acts to password -protect the firewall system 5, step 302, by asking the person to enter a password on the keypad of the telephone 1 , and to confirm the password.
  • the password may comprise letters, numbers or a combination of both. Once the password has been established, it is stored by the set-up module 28, for future use when the firewall system 5 is to be accessed.
  • the approved identifier number creation module 30 then acts to password- protect the firewall identifier number database 36, step 304, by asking the person to enter a password on the keypad of the telephone 1 , and to confirm the password.
  • the password may again comprise letters, numbers or a combination of both.
  • the approved identifier number creation module 30 then prompts the person to generate one or more approved identifier numbers, in the firewall identifier number database 36, step 306. This can be done in a number of different ways.
  • the person may use the approved identifier number creation module 30 to create an approved identifier number, by entering an identifier number into an entry of the firewall identifier number database 36 and entering one or more rules into the entry which determine that the identifier number is an approved identifier number.
  • the person may use the approved identifier number creation module 30 to create an approved identifier number by accessing an entry of the firewall identifier number database 36 in which an identifier number has already been stored, and entering one or more rules into the entry which determine that the identifier number is an approved identifier number.
  • the SIM identifier number database 11 may be used by a user of the telephone 1 to store contact identifier numbers.
  • the person may use the approved identifier number creation module 30 to copy the contact identifier numbers from the SIM identifier number database 11 into entries of the firewall identifier number database 36.
  • the person may then use the approved identifier number creation module 30 to create approved identifier numbers by accessing the entries of the firewall identifier number database 36 in which a contact identifier number has been stored, and entering one or more rules into the entries which determine that the contact identifier number is an approved identifier number.
  • the firewall system 5 With the firewall system 5 activated and with one or more approved identifier numbers stored in the firewall identifier number database 36 (or no approved identifier numbers stored in the database), the firewall system 5 can operate to carry out the methods of filtering incoming calls, filtering outgoing calls, filtering incoming text messages and filtering outgoing text messages. (When no approved identifier numbers are stored in the firewall identifier number database 36, the firewall system 5 will act to terminate all incoming calls). The methods are illustrated in Figures 4 to 6.
  • FIG. 4 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering incoming calls to the device comprising the mobile telephone 1.
  • the firewall system 5 uses the incoming call filtering module 20 to filter incoming calls.
  • a notification module of the incoming call filtering module 20 receives notification that the telephone 1 has received an incoming call from a telecommunication network, step 400.
  • the notification module receives the notification from the SIM 3, which uses a function of the SIM application toolkit application 9 to detect receipt of the incoming call, and uses a function of the SIM application toolkit application 9 to notify the notification module of receipt of the incoming call.
  • An interrogation module of the module 20 then causes interrogation of the incoming call to search for an identifier number of the call, step 402.
  • the interrogation module causes interrogation of the incoming call by instructing the SIM 3 to interrogate the call, which uses a function of the SIM application toolkit application 9 to interrogate the incoming call to search for the identifier number of the call.
  • the notification module receives the identifier number of the incoming call, step 404.
  • the SIM 3 uses a function of the SIM application toolkit application 9 to send the identifier number of the incoming call to the interrogation module.
  • a comparison module of the incoming call filtering module 20 compares the identifier number of the incoming call with one or more approved identifier numbers, step 406.
  • the comparison module accesses the or each entry in the firewall identifier number database 36, and interrogates the one or more rules of each entry which determine if the identifier number of the entry is an approved identifier number or is not an approved identifier number. If the identifier number of an entry is an approved identifier number, the comparison module compares the identifier number of the incoming call with the approved identifier number. If the identifier number of an entry is not an approved identifier number, the comparison module ends its comparison function. If the identifier number of the incoming call matches at least one of the one or more approved identifier numbers, the incoming call is continued, step 408.
  • a termination module of the incoming call filtering module 20 instructs the SIM 3 to send a command to the telephone 1 which causes it to be disconnected from the telecommunication network, step 410.
  • the command which the termination module instructs the SIM 3 to send to the telephone 1 comprises a refresh command provided as part of the SIM application toolkit application 9.
  • the parameters of the refresh command are set to cause the telephone 1 to be disconnected from the telecommunication network, to cause the telephone 1 to be reconnected to the telecommunication network, to cause deactivation of the SIM 3 and to cause reactivation of the SIM 3.
  • Disconnection of the telephone 1 from the network is caused by activation of a GSM session termination procedure, and causes the incoming call to terminate.
  • SIM application toolkit applications have no function which allow termination of an incoming call, but do have the refresh command, which is designed to enable a telephone to receive notification of changes to the contents of the SIM of the telephone.
  • the refresh command may achieve this by deactivation and then reactivation of the SIM, which causes the (changed) contents of the SIM to be copied to the telephone. Deactivation of the SIM cannot take place if the telephone is connected to a network, so termination of any network connection is carried out before deactivation of the SIM.
  • the advice module 32 of the firewall system 5 then instructs the telephone 1 to send a message to a display of the telephone, which message informs a user of the telephone 1 that the incoming call has been terminated, step 412.
  • the interrogation module receives notification that no identifier number has been found, and that the incoming call is an unidentified incoming call, step 414.
  • the SIM 3 uses a function of the SIM application toolkit application 9 to notify the interrogation module that no identifier number of the incoming call has been found.
  • the termination module then instructs the SIM 3 to send a command to the telephone 1 which causes the telephone 1 to be disconnected from the telecommunication network by activation of a GSM session termination procedure, which, in turn, causes the unidentified incoming call to terminate, step 410.
  • the advice module 32 then instructs the telephone 1 to send a message to a display of the telephone, which message informs a user of the telephone 1 that the incoming call has been terminated, step 412.
  • the recording module 34 records identifier numbers of the or each incoming call which has been terminated in an entry of the firewall terminated identifier number database 38. Identifier numbers of the last ten terminated calls may be recorded, along with data comprising the date and time of termination of a call.
  • Figure 5 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering outgoing calls to the device comprising the mobile telephone 1.
  • the firewall system 5 uses the outgoing call filtering module 22 to filter outgoing calls.
  • a notification module of the outgoing call filtering module 22 receives notification that the telephone 1 is making an outgoing call, step 500.
  • An interrogation module of the outgoing call filtering module 22 then causes interrogation of the outgoing call to search for an identifier number of the call and receives the identifier number of the outgoing call, step 502.
  • a comparison module of the outgoing call filtering module 22 then compares the identifier number of the outgoing call with one or more approved identifier numbers, step 504. If the identifier number of the outgoing call matches at least one of the one or more approved identifier numbers, the outgoing call is continued, step 506.
  • a blocking module of the outgoing call filtering module 22 instructs the SIM 3 to send a command to the telephone 1 which causes the telephone to discontinue the outgoing call, step 508.
  • Figure 6 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering incoming text messages to the device comprising the mobile telephone 1.
  • the firewall system 5 uses the incoming text message filtering module 24 to filter incoming text messages.
  • a notification module of the incoming text message filtering module 24 receives notification that the device has received an incoming text message, step 600.
  • An interrogation module of the incoming text message filtering module 24 then causes interrogation of the text message to search for an identifier number of the text message, step 602. If an identifier number is found, the interrogation module receives the identifier number of the text message, step 604.
  • a comparison module of the incoming text message filtering module 24 compares the identifier number of the text message with one or more approved identifier numbers, step 606. If the identifier number of the text message matches at least one of the one or more approved identifier numbers, the text message is kept by the telephone 1. If the identifier number of the text message does not match at least one of the one or more approved identifier numbers, a blocking module of the incoming text message filtering module 24 instructs the SIM 3 to delete the text message from a SIM text message database 13 and to send a command to the telephone 1 which causes the telephone 1 to update the telephone text message database 15 by copying contents of the SIM text message database 13 into the device text message database 15. This in turn, results in deletion of the text message from the telephone 1.
  • the interrogation module receives notification that no identifier number has been found, and that the incoming text message is an unidentified incoming text message, step 612.
  • the blocking module then instructs the SIM 3 to delete the unidentified text message from a SIM text message database 13 and to send a command to the telephone 1 which causes the telephone 1 to update the device text message database 15 by copying contents of the SIM text message database 13 into the device text message database 15. This, in turn, results in deletion of the unidentified text message from the telephone 1.
  • FIG. 7 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering outgoing text messages to the device comprising the mobile telephone 1.
  • the firewall system 5 uses the outgoing text message filtering module 26 to filter outgoing text messages.
  • a notification module of the outgoing text message filtering module 26 receives notification that the telephone 1 is sending an outgoing text message, step 700.
  • An interrogation module of the outgoing text message filtering module 26 then causes interrogation of the outgoing text message to search for an identifier number of the text message and receives the identifier number of the outgoing text message, step 702.
  • a comparison module of the outgoing text message filtering module 26 compares the identifier number of the outgoing text message with one or more approved identifier numbers, step 704.
  • a blocking module of the outgoing text message filtering module 26 instructs the SIM 3 to send a command to the telephone 1 which causes the telephone to discontinue sending of the outgoing text message, step 708.
  • notification modules, the interrogation modules and the comparison modules of the outgoing call filtering module 22, the incoming text message filtering module 24, and the outgoing text message filtering module 26 may operate in similar fashion to the notification module, the interrogation module and the comparison module of the incoming call filtering module 20.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to filtering of incoming and outgoing events such as calls, texts or e-mails. Filtering is performed by a so-called firewall system which is based on a SIM which comprises the SIM application toolkit. The firewall system (5) comprises an incoming call filtering module (20), an outgoing call filtering module (22), an incoming text message filtering module (24), and an outgoing text message filtering module (2S). The firewall system (5) uses the incoming call filtering module (20) to filter incoming calls. A comparison module of the incoming call filtering module (20) compares the identifier number of an incoming call with one or more approved identifier numbers (406). If the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, a termination module of the incoming call filtering module (20) instructs the SIM (3) to send a command to the telephone (1) which causes it to be disconnected from the telecommunication network (410). In this embodiment of the invention, the command which the termination module instructs the SIM (3) to send to the telephone (1) comprises a REFRESH command provided as part of the SIM application toolkit application (9).The parameters of the REFRESH command are set to cause the telephone 1 to be disconnected from the telecommunication network.

Description

SUBSCRIBER IDENTITY MODULE (SIM)-BASED FILTERING OF INCOMING/OUTGOING CALLS /TEXT MESSAGES
Field of the invention:
5 The present invention relates to improvements in firewalls, which are based on subscriber identity modules (SIMs) of mobile telecommunication devices.
Background to the invention:
10
Various mobile telecommunication devices, such as mobile telephones, PDAs, and Blackberry (RTM) devices, are provided with SIMs, used primarily to identify the person using the device. SIMs can also be used to provide firewall-type services, for example filtering of incoming and
15 outgoing events such as calls, texts or e mails. Such services are desirable in a number of areas.
Today many children and teenagers use mobile telephones. Parents can have little control over the calls their children make and receive, and the 20 text messages their children send and receive. The safety of children and teenagers is jeopardised by this potential open access, which allows strangers to contact the child or teenager.
It is common in business for an employee to use a business mobile 25 telephone provided by the employer. The employer usually pays for the calls the employee makes and receives using the business mobile telephone. Often the use of the business mobile telephone is restricted in the employee's employment contract to work-related matters, however, many employees nevertheless use their business mobile telephone to 30 make and receive personal calls. Firewall-type services can be used in both these areas to control the events which a mobile telephone processes. In particular, there is a need to be able to disconnect certain events, such as certain incoming calls.
Summary of the invention:
According to a first aspect of the invention there is provided a firewall system based on a SIM of a mobile telecommunication device, the system comprising an incoming call filtering module, which comprises a notification module which receives notification that the device has received an incoming call from a telecommunication network, an interrogation module which causes interrogation of the incoming call to search for an identifier number of the call, and, if an identifier number is found, receives the identifier number of the incoming call, a comparison module which compares the identifier number of the incoming call with one or more approved identifier numbers, and a termination module which, if the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the incoming call to terminate.
It will be appreciated that the firewall system carries out the above- described functions in a sufficiently short time such that a user of the device is not able to access the incoming call. Thus the firewall system filters incoming calls to the device, disconnecting certain calls and allowing other calls to continue, i.e. be processed by the device.
If an identifier number of the incoming call is not found, the interrogation module may receive notification that no identifier number has been found, and that the incoming call is an unidentified incoming call. The termination module may then instruct the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the unidentified incoming call to terminate.
The command which the termination module instructs the SIM to send to the device may activate a global system for mobile communications (GSM) session termination procedure. Carrying out such a procedure causes the device to be disconnected from the telecommunication network. The command which the termination module instructs the SIM to send to the device may cause the device to be reconnected to the telecommunication network. The command which the termination module instructs the SIM to send to the device may cause the device to be reconnected to the telecommunication network, by activating a GSM session start-up procedure. Although the device is reconnected to the telecommunication network, it will not be reconnected to the incoming call, as disconnecting the device from the network has caused the call to terminate. The command which the termination module instructs the SIM to send to the device may cause deactivation of the SIM. The command which the termination module instructs the SIM to send to the device may cause reactivation of the SIM by the device.
The command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause the device to be disconnected from the telecommunication network. The command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause the device to be reconnected to the telecommunication network. The command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause deactivation of the SIM. The command which the termination module instructs the SIM to send to the device may comprise a refresh command having parameters which are set to cause reactivation of the SIM by the device.
In one embodiment of the invention, the command which the termination module instructs the SIM to send to the device may comprise a refresh command provided as part of a SIM application toolkit application, and which has parameters which are set to cause the device to be disconnected from the telecommunication network, to cause the device to be reconnected to the telecommunication network, and to cause deactivation of the SIM and to cause reactivation of the SIM. SIM application toolkit applications are provided as standard on SIMs, and are used to govern how non-standard applications, such as those provided by parties other than the SIM manufacturer, interact with the device. Use of a command provided by the SIM application toolkit application, can therefore allow the firewall system of the invention to interact with the device.
The firewall system may comprise an advice module which instructs the device to send a message to a display of the device, which message informs a user of the device that an incoming call has been terminated.
The notification module may receive notification that the device has received an incoming call from the SIM. The SIM may comprise a SIM application toolkit application, and may use a function of this to detect receipt of an incoming call, and may use a function of this to notify the notification module of receipt of the incoming call.
The interrogation module may cause interrogation of the incoming call to search for an identifier number of the call by instructing the SIM to interrogate the call. The SIM may comprise a SIM application toolkit application, and may use a function of this to interrogate the incoming call to search for an identifier number of the call. The SIM may comprise a SIM application toolkit application, and may use a function of this to send an identifier number of the incoming call to the interrogation module. The SIM may comprise a SIM application toolkit application, and may use a function of this to notify the interrogation module that no identifier number of the incoming call has been found.
The firewall system may comprise a firewall identifier number database. This may be located on the SIM of the device. The firewall identifier number database may comprise one or more entries, the or each of which comprises an identifier number and one or more rules for the identifier number. At least one of the rules may be used to determine that the identifier number is an approved identifier number or is not an approved identifier number. Thus, for the or each identifier number, it can be determined whether or not to terminate incoming calls having the identifier number.
The firewall system may control access to the firewall identifier number database. This will allow prevention of access to the firewall identifier number database by an unauthorised person via only the SIM. The firewall identifier number database may be accessible without using the firewall system. Such access may be restricted to authorised persons only. The firewall identifier number database may be password-protected, to restrict access to the database to a password holder or holders.
The firewall system may comprise an approved identifier number creation module. The approved identifier number creation module may create an approved identifier number by entering an identifier number into an entry of the firewall identifier number database and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. Additionally or alternatively, the approved identifier number creation module may create an approved identifier number by accessing an entry of the firewall identifier number database in which an identifier number has already been stored, and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. The SIM of the device may comprise a SIM identifier number database in which a user of the device has stored one or more contact identifier numbers. The approved identifier number creation module may create an approved identifier number by copying one or more of the contact identifier numbers into one or more entries of the firewall identifier number database, accessing an entry of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the entry which determine that the contact identifier number is an approved identifier number. In one embodiment of the invention, the approved identifier number creation module creates one or more approved identifier numbers by copying the or each contact identifier number into one or more entries of the firewall identifier number database, accessing one or more entries of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the or each entry which determine that the contact identifier number is an approved identifier number.
The comparison module may compare an identifier number of the incoming call with one or more approved identifier numbers which are stored in the firewall identifier number database. The comparison module may access the or each entry in the firewall identifier number database, interrogate the one or more rules of each entry which determine if the identifier number of the entry is an approved identifier number or is not an approved identifier number, and, if the identifier number is an approved identifier number, compare the identifier number of the incoming call with the approved identifier number, or, if the identifier number is not an approved identifier number, end its comparison function.
The firewall system may comprise a recording module which records identifier numbers of the or each incoming call which has been terminated. The recording module may record the identifier numbers of the or each terminated call in an entry of a firewall terminated identifier number database. Alternatively, the recording module may record the identifier numbers of a number of terminated calls in entries of the firewall terminated identifier number database, for example the identifier numbers of the last ten calls which have been terminated. The recording module may record data comprising the date and time of termination of a call in the entry of the identifier number of the call.
The firewall system may comprise an outgoing call filtering module. This may comprise a notification module which receives notification that the device is making an outgoing call, an interrogation module which causes interrogation of the outgoing call to search for an identifier number of the call and receives the identifier number of the outgoing call, a comparison module which compares the identifier number of the outgoing call with one or more approved identifier numbers, and a blocking module which, if the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to discontinue the outgoing call. The firewall system may comprise an incoming text message filtering module. This may comprise a notification module which receives notification that the device has received an incoming text message, an interrogation module which causes interrogation of the text message to search for an identifier number of the text message and, if an identifier number is found, receives the identifier number of the text message, a comparison module which compares the identifier number of the text message with one or more approved identifier numbers, and a blocking module which, if the identifier number of the text message does not match at least one of the one or more approved identifier numbers, instructs the SIM to delete the text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the text message from the device.
If an identifier number of the incoming text message is not found, the interrogation module may receive notification that no identifier number has been found, and that the incoming text message is an unidentified incoming text message. The blocking module may then instruct the SIM to delete the unidentified text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the unidentified text message from the device.
The firewall system may comprise an outgoing text message filtering module. This may comprise a notification module which receives notification that the device is sending an outgoing text message, an interrogation module which causes interrogation of the outgoing text message to search for an identifier number of the text message and receives the identifier number of the outgoing text message, a comparison module which compares the identifier number of the outgoing text message with one or more approved identifier numbers, and a blocking module which, if the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to discontinue sending of the outgoing text message.
The firewall system may comprise a set-up module which activates and deactivates the firewall system. The set-up module may password-protect the firewall system, to restrict access to the system to a password holder or holders. Thus the firewall system can be accessed by, for example, only a parent or a business manager, and activated by these persons. Children and employees can therefore be denied access to the firewall system, and cannot deactivate the system. The set-up module may allow setting of one or more operation parameters of the firewall system.
According to a second aspect of the invention there is provided a method of filtering incoming calls to a mobile telecommunication device, the method comprising the steps of receiving notification that the device has received an incoming call from a telecommunication network, interrogating the incoming call to search for an identifier number of the call, and, if an identifier number is found, receiving the identifier number of the incoming call, comparing the identifier number of the incoming call with one or more approved identifier numbers, and if the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, instructing a SIM of the device to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the incoming call to terminate.
If an identifier number of the incoming call is not found, the method may comprise receiving notification that no identifier number has been found and that the incoming call is an unidentified incoming call, and instructing the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the unidentified incoming call to terminate.
The command which the SIM is instructed to send to the device may activate a global system for mobile communications (GSM) session termination procedure. Carrying out such a procedure causes the device to be disconnected from the telecommunication network. The command which the SIM is instructed to send to the device may cause the device to be reconnected to the telecommunication network. The command which the termination module instructs the SIM to send to the device may cause the device to be reconnected to the telecommunication network, by activating a GSM session start-up procedure. Although the device is reconnected to the telecommunication network, it will not be reconnected to the incoming call, as disconnecting the device from the network has caused the call to terminate. The command which the SIM is instructed to send to the device may cause deactivation of the SIM. The command which the SIM is instructed to send to the device may cause reactivation of the SIM.
The command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause the device to be disconnected from the telecommunication network. The command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause the device to be reconnected to the telecommunication network. The command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause deactivation of the SIM. The command which the SIM is instructed to send to the device may comprise a refresh command having parameters which are set to cause reactivation of the SIM.
In one embodiment of the invention, the command which the SIM is instructed to send to the device may comprise a refresh command provided as part of an application toolkit application of the SIM, and which has parameters which are set to cause the device to be disconnected from the telecommunication network, to cause the device to be reconnected to the telecommunication network, to cause deactivation of the SIM and to cause reactivation of the SIM. SIM application toolkit applications are provided as standard on SIMs, and are used to govern how non-standard applications, such as those provided by parties other than the SIM manufacturer, interact with the device. Use of a command provided by the SIM application toolkit application, can therefore allow the firewall system of the invention to interact with the device.
The method may comprise instructing the device to send a message to a display of the device, which message informs a user of the device that an incoming call has been terminated.
Notification that the device has received an incoming call may be received from the SIM. The SIM may comprise a SIM application toolkit application, and the method may comprise using a function of this to detect receipt of an incoming call, and may use a function of this to notify the notification module of receipt of the incoming call. Interrogation of the incoming call to search for an identifier number of the call may comprise instructing the SIM to interrogate the call. The SIM may comprise a SIM application toolkit application, and may use a function of this to interrogate the incoming call to search for an identifier number of the call.
The method may comprise using a firewall identifier number database. This may be located on the SIM of the device. The firewall identifier number database may comprise one or more entries, the or each of which comprises an identifier number and one or more rules for the identifier number. At least one of the rules may be used to determine that the identifier number is an approved identifier number or is not an approved identifier number. Thus, for the or each identifier number, it can be determined whether or not to terminate incoming calls having the identifier number.
The method may comprise creating an approved identifier number by entering an identifier number into an entry of the firewall identifier number database and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. Additionally or alternatively, the method may comprise creating an approved identifier number by accessing an entry of the firewall identifier number database in which an identifier number has already been stored, and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. The SIM of the device may comprise a SIM identifier number database in which a user of the device has stored one or more contact identifier numbers. The method may comprise creating an approved identifier number by copying one or more of the contact identifier numbers into one or more entries of the firewall identifier number database, accessing an entry of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the entry which determine that the contact identifier number is an approved identifier number. In one embodiment of the invention, the method comprises creating one or more approved identifier numbers by copying the or each contact identifier number into one or more entries of the firewall identifier number database, accessing one or more entries of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the or each entry which determine that the contact identifier number is an approved identifier number.
Comparing an identifier number of the incoming call with one or more approved identifier numbers may comprise comparing the incoming call identifier number with one or more approved identifier numbers stored in the firewall identifier number database. This may comprise accessing the or each entry in the firewall identifier number database, interrogating the one or more rules of each entry which determine if the identifier number of the entry is an approved identifier number or is not an approved identifier number, and, if the identifier number is an approved identifier number, comparing the identifier number of the incoming call with the approved identifier number, or, if the identifier number is not an approved identifier number, ending the comparison step.
The method may comprise recording identifier numbers of the or each incoming call which has been terminated. The or each identifier number may be recorded in an entry of a firewall terminated identifier number database. Alternatively, the identifier numbers of a number of terminated calls may be recorded in entries of the firewall terminated identifier number database, for example the identifier numbers of the last ten calls which have been terminated. Data comprising the date and time of termination of a call may be recorded in the entry of the identifier number of the call.
The method may comprise filtering outgoing calls. This may comprise receiving notification that the device is making an outgoing call, interrogating the outgoing call to search for an identifier number of the call and receiving the identifier number of the outgoing call, comparing the identifier number of the outgoing call with one or more approved identifier numbers, and if the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, instructing the SIM to send a command to the device which causes the device to discontinue the outgoing call.
The method may comprise filtering incoming text messages. This may comprise receiving notification that the device has received an incoming text message, interrogating the text message to search for an identifier number of the text message and, if an identifier number is found, receiving the identifier number of the text message, comparing the identifier number of the text message with one or more approved identifier numbers, and if the identifier number of the text message does not match at least one of the one or more approved identifier numbers, instructing the SIM to delete the text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the text message from the device.
If an identifier number of the incoming text message is not found, the method may comprise receiving notification that no identifier number has been found that the incoming text message is an unidentified incoming text message, and instructing the SIM to delete the unidentified text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the unidentified text message from the device.
The method may comprise filtering outgoing text messages. This may comprise receiving notification that the device is sending an outgoing text message, interrogating the outgoing text message to search for an identifier number of the text message and receiving the identifier number of the outgoing text message, comparing the identifier number of the outgoing text message with one or more approved identifier numbers, and if the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, instructing the SIM to send a command to the device which causes the device to discontinue sending of the outgoing text message.
The firewall system may comprise a set-up module which activates and deactivates the firewall system. The set-up module may password-protect the firewall system, to restrict access to the system to a password holder or holders. Thus the firewall system can be accessed by, for example, only a parent or a business manager, and activated by these individuals. Children and employees can therefore be denied access to the firewall system, and cannot deactivate the system. The set-up module may allow setting of one or more operation parameters of the firewall system.
According to a third aspect of the invention there is provided a computer program product stored in a medium readable by a computer, the product comprising computer-readable program means which cause the computer to perform the method according to the second aspect of the invention.
According to a fourth aspect of the invention there is provided a mobile telecommunication device comprising a firewall system according to the first aspect of the invention.
The mobile telecommunication device may comprise any of a mobile telephone, a PDA, a Blackberry (RTM) device.
Brief description of the drawings:
Embodiments of the invention will now be described by way of example only, with reference to the accompanying drawings in which:
Figure 1 is a schematic representation of a mobile telecommunication device comprising a SIM-based firewall system according to the first aspect of the invention;
Figure 2 is a schematic representation of the firewall system of Figure 1 ;
Figure 3 is a flow diagram illustrating setting-up of the firewall system of Figures 1 and 2;
Figure 4 is a flow diagram illustrating a method of filtering incoming calls carried out by the firewall system of Figures 1 and 2;
Figure 5 is a flow diagram illustrating a method of filtering outgoing calls carried out by the firewall system of Figures 1 and 2; Figure 6 is a flow diagram illustrating a method of filtering incoming text messages carried out by the firewall system of Figures 1 and 2, and
Figure 7 is a flow diagram illustrating a method of filtering outgoing text messages carried out by the firewall system of Figures 1 and 2.
Detailed description of the drawings:
Figure 1 shows a schematic representation of a mobile telecommunication device which is a mobile telephone 1 , and comprises a SIM 3, a firewall system 5 which is based on the SIM, and a telephone operating system 7. The SIM 3 comprises a SIM application toolkit application 9, a SIM identifier number database 11 and a SIM text message database 13. The SIM identifier number database 11 is used to store one or more telephone numbers of a user of the telephone 1. The SIM text message database 13 is used to store one or more text messages received by the mobile telephone 1. The phone operating system 7 comprises a phone text message database 15, in which one or more text messages received by the mobile telephone 1 are stored.
The phone operating system 7, the SIM application toolkit application 9 and the firewall system 5 are in communication with each other. The firewall system 5 can communicate with the phone operating system 7 directly, or via the SIM 3 using the SIM application toolkit application 9. SIM application toolkit applications are provided as standard on SIMs, and are used to govern how non-standard applications, such as those provided by parties other than the SIM manufacturer, interact with the SIM and the mobile telecommunication device. The firewall system 5 must comply with the standard defined for the SIM application toolkit application 9, in order to be able to communicate with the SIM 3 and the phone operating system 7 via the SIM 3.
Figure 2 is a schematic representation of the firewall system 5 of Figure 1. The firewall system 5 comprises an incoming call filtering module 20, an outgoing call filtering module 22, an incoming text message filtering module 24, and an outgoing text message filtering module 26. The firewall system 5 further comprises a set-up module 28, an approved identifier number creation module 30, an advice module 32, a recording module 34, a firewall identifier number database 36, and a firewall terminated identifier number database 38. Each of the modules may be in communication with one or more of the other modules and may be in communication with the or each database, as required. Each of the incoming call filtering module 20, the outgoing call filtering module 22, the incoming text message filtering module 24, and the outgoing text message filtering module 26, comprises a number of modules as will be referred to later, but which, for clarity, are not shown in Figure 2.
The firewall system 5 can be implemented in software, hardware, or a combination of software and hardware. It will be appreciated that although the firewall system 5 is shown as comprising a number of separate modules, these need not be physically separate modules in hardware, or separate modules in software.
The firewall system 5 is installed on the SIM 3 of the mobile telephone 1. This may done by a manufacturer or a retailer of the SIM 3. Figure 3 is a flow diagram illustrating setting-up of the firewall system 5. A person such as a parent or a business manager who wishes to control usage of the telephone 1 , accesses the firewall system 5, step 300. Access may be via an application menu provided on the telephone 1 using a keypad of the telephone 1 , or the firewall system may be accessed remotely. The set-up module 28 of the firewall system 5 acts to password -protect the firewall system 5, step 302, by asking the person to enter a password on the keypad of the telephone 1 , and to confirm the password. The password may comprise letters, numbers or a combination of both. Once the password has been established, it is stored by the set-up module 28, for future use when the firewall system 5 is to be accessed.
The approved identifier number creation module 30 then acts to password- protect the firewall identifier number database 36, step 304, by asking the person to enter a password on the keypad of the telephone 1 , and to confirm the password. The password may again comprise letters, numbers or a combination of both. Once the password has been established, it is stored by the approved identifier number creation module 30, for future use when the firewall identifier number database 36 is to be accessed.
The approved identifier number creation module 30 then prompts the person to generate one or more approved identifier numbers, in the firewall identifier number database 36, step 306. This can be done in a number of different ways. The person may use the approved identifier number creation module 30 to create an approved identifier number, by entering an identifier number into an entry of the firewall identifier number database 36 and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. Additionally or alternatively, the person may use the approved identifier number creation module 30 to create an approved identifier number by accessing an entry of the firewall identifier number database 36 in which an identifier number has already been stored, and entering one or more rules into the entry which determine that the identifier number is an approved identifier number. The SIM identifier number database 11 may be used by a user of the telephone 1 to store contact identifier numbers. The person may use the approved identifier number creation module 30 to copy the contact identifier numbers from the SIM identifier number database 11 into entries of the firewall identifier number database 36. The person may then use the approved identifier number creation module 30 to create approved identifier numbers by accessing the entries of the firewall identifier number database 36 in which a contact identifier number has been stored, and entering one or more rules into the entries which determine that the contact identifier number is an approved identifier number.
With the firewall system 5 activated and with one or more approved identifier numbers stored in the firewall identifier number database 36 (or no approved identifier numbers stored in the database), the firewall system 5 can operate to carry out the methods of filtering incoming calls, filtering outgoing calls, filtering incoming text messages and filtering outgoing text messages. (When no approved identifier numbers are stored in the firewall identifier number database 36, the firewall system 5 will act to terminate all incoming calls). The methods are illustrated in Figures 4 to 6.
Figure 4 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering incoming calls to the device comprising the mobile telephone 1. The firewall system 5 uses the incoming call filtering module 20 to filter incoming calls. A notification module of the incoming call filtering module 20 receives notification that the telephone 1 has received an incoming call from a telecommunication network, step 400. The notification module receives the notification from the SIM 3, which uses a function of the SIM application toolkit application 9 to detect receipt of the incoming call, and uses a function of the SIM application toolkit application 9 to notify the notification module of receipt of the incoming call.
An interrogation module of the module 20 then causes interrogation of the incoming call to search for an identifier number of the call, step 402. The interrogation module causes interrogation of the incoming call by instructing the SIM 3 to interrogate the call, which uses a function of the SIM application toolkit application 9 to interrogate the incoming call to search for the identifier number of the call.
If an identifier number is found, the notification module receives the identifier number of the incoming call, step 404. The SIM 3 uses a function of the SIM application toolkit application 9 to send the identifier number of the incoming call to the interrogation module.
A comparison module of the incoming call filtering module 20 then compares the identifier number of the incoming call with one or more approved identifier numbers, step 406. The comparison module accesses the or each entry in the firewall identifier number database 36, and interrogates the one or more rules of each entry which determine if the identifier number of the entry is an approved identifier number or is not an approved identifier number. If the identifier number of an entry is an approved identifier number, the comparison module compares the identifier number of the incoming call with the approved identifier number. If the identifier number of an entry is not an approved identifier number, the comparison module ends its comparison function. If the identifier number of the incoming call matches at least one of the one or more approved identifier numbers, the incoming call is continued, step 408.
If the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, a termination module of the incoming call filtering module 20 instructs the SIM 3 to send a command to the telephone 1 which causes it to be disconnected from the telecommunication network, step 410. In this embodiment of the invention, the command which the termination module instructs the SIM 3 to send to the telephone 1 comprises a refresh command provided as part of the SIM application toolkit application 9. The parameters of the refresh command are set to cause the telephone 1 to be disconnected from the telecommunication network, to cause the telephone 1 to be reconnected to the telecommunication network, to cause deactivation of the SIM 3 and to cause reactivation of the SIM 3. Disconnection of the telephone 1 from the network is caused by activation of a GSM session termination procedure, and causes the incoming call to terminate. SIM application toolkit applications have no function which allow termination of an incoming call, but do have the refresh command, which is designed to enable a telephone to receive notification of changes to the contents of the SIM of the telephone. The refresh command may achieve this by deactivation and then reactivation of the SIM, which causes the (changed) contents of the SIM to be copied to the telephone. Deactivation of the SIM cannot take place if the telephone is connected to a network, so termination of any network connection is carried out before deactivation of the SIM. The applicant has realised that if this refresh command is used, and hence network connection termination is initiated, it has the heretofore unrecognised effect of disconnecting an incoming call. What a user of the telephone 1 experiences when the telephone 1 is disconnected from and then reconnected to the network and when the SIM 3 deactivates and then reactivates, will depend on the type of the telephone. The telephone may, for example, send a message to its display to indicate to the user that the SIM 3 is refreshing, or the telephone 1 may momentarily switch off and then switch back on again.
The advice module 32 of the firewall system 5 then instructs the telephone 1 to send a message to a display of the telephone, which message informs a user of the telephone 1 that the incoming call has been terminated, step 412.
If an identifier number of the incoming call is not found, the interrogation module receives notification that no identifier number has been found, and that the incoming call is an unidentified incoming call, step 414. The SIM 3 uses a function of the SIM application toolkit application 9 to notify the interrogation module that no identifier number of the incoming call has been found. The termination module then instructs the SIM 3 to send a command to the telephone 1 which causes the telephone 1 to be disconnected from the telecommunication network by activation of a GSM session termination procedure, which, in turn, causes the unidentified incoming call to terminate, step 410. The advice module 32 then instructs the telephone 1 to send a message to a display of the telephone, which message informs a user of the telephone 1 that the incoming call has been terminated, step 412.
The recording module 34 records identifier numbers of the or each incoming call which has been terminated in an entry of the firewall terminated identifier number database 38. Identifier numbers of the last ten terminated calls may be recorded, along with data comprising the date and time of termination of a call. Figure 5 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering outgoing calls to the device comprising the mobile telephone 1. The firewall system 5 uses the outgoing call filtering module 22 to filter outgoing calls. A notification module of the outgoing call filtering module 22 receives notification that the telephone 1 is making an outgoing call, step 500. An interrogation module of the outgoing call filtering module 22 then causes interrogation of the outgoing call to search for an identifier number of the call and receives the identifier number of the outgoing call, step 502. A comparison module of the outgoing call filtering module 22 then compares the identifier number of the outgoing call with one or more approved identifier numbers, step 504. If the identifier number of the outgoing call matches at least one of the one or more approved identifier numbers, the outgoing call is continued, step 506. If the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, a blocking module of the outgoing call filtering module 22 instructs the SIM 3 to send a command to the telephone 1 which causes the telephone to discontinue the outgoing call, step 508.
Figure 6 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering incoming text messages to the device comprising the mobile telephone 1. The firewall system 5 uses the incoming text message filtering module 24 to filter incoming text messages. A notification module of the incoming text message filtering module 24 receives notification that the device has received an incoming text message, step 600. An interrogation module of the incoming text message filtering module 24 then causes interrogation of the text message to search for an identifier number of the text message, step 602. If an identifier number is found, the interrogation module receives the identifier number of the text message, step 604. A comparison module of the incoming text message filtering module 24 then compares the identifier number of the text message with one or more approved identifier numbers, step 606. If the identifier number of the text message matches at least one of the one or more approved identifier numbers, the text message is kept by the telephone 1. If the identifier number of the text message does not match at least one of the one or more approved identifier numbers, a blocking module of the incoming text message filtering module 24 instructs the SIM 3 to delete the text message from a SIM text message database 13 and to send a command to the telephone 1 which causes the telephone 1 to update the telephone text message database 15 by copying contents of the SIM text message database 13 into the device text message database 15. This in turn, results in deletion of the text message from the telephone 1.
If an identifier number of the incoming text message is not found, the interrogation module receives notification that no identifier number has been found, and that the incoming text message is an unidentified incoming text message, step 612. The blocking module then instructs the SIM 3 to delete the unidentified text message from a SIM text message database 13 and to send a command to the telephone 1 which causes the telephone 1 to update the device text message database 15 by copying contents of the SIM text message database 13 into the device text message database 15. This, in turn, results in deletion of the unidentified text message from the telephone 1.
Figure 7 is a flow diagram that illustrates the steps taken by the firewall system 5 in the method of filtering outgoing text messages to the device comprising the mobile telephone 1. The firewall system 5 uses the outgoing text message filtering module 26 to filter outgoing text messages. A notification module of the outgoing text message filtering module 26 receives notification that the telephone 1 is sending an outgoing text message, step 700. An interrogation module of the outgoing text message filtering module 26 then causes interrogation of the outgoing text message to search for an identifier number of the text message and receives the identifier number of the outgoing text message, step 702. A comparison module of the outgoing text message filtering module 26 then compares the identifier number of the outgoing text message with one or more approved identifier numbers, step 704. If the identifier number of the outgoing text message matches at least one of the one or more approved identifier numbers, the text message is sent, step 706. If the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, a blocking module of the outgoing text message filtering module 26 instructs the SIM 3 to send a command to the telephone 1 which causes the telephone to discontinue sending of the outgoing text message, step 708.
It will be understood that the notification modules, the interrogation modules and the comparison modules of the outgoing call filtering module 22, the incoming text message filtering module 24, and the outgoing text message filtering module 26, may operate in similar fashion to the notification module, the interrogation module and the comparison module of the incoming call filtering module 20.

Claims

1. A firewall system based on a SIM of a mobile telecommunication device, the system comprising an incoming call filtering module, which comprises a notification module which receives notification that the device has received an incoming call from a telecommunication network, an interrogation module which causes interrogation of the incoming call to search for an identifier number of the call, and, if an identifier number is found, receives the identifier number of the incoming call, a comparison module which compares the identifier number of the incoming call with one or more approved identifier numbers, and a termination module which, if the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the incoming call to terminate.
2. A firewall system according to claim 1 , in which if an identifier number of the incoming call is not found, the interrogation module receives notification that no identifier number has been found, and that the incoming call is an unidentified incoming call, and the termination module instructs the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the unidentified incoming call to terminate.
3. A firewall system according to any preceding claim, in which the command which the termination module instructs the SIM to send to the device activates a global system for mobile communications (GSM) session termination procedure.
4. A firewall system according to any preceding claim, in which the command which the termination module instructs the SIM to send to the device comprises a refresh command having parameters which are set to cause the device to be disconnected from the telecommunication network.
5. A firewall system according any preceding claim, in which the command which the termination module instructs the SIM to send to the device comprises a refresh command provided as part of an application toolkit application of the SIM, and which has parameters which are set to cause the device to be disconnected from the telecommunication network, to cause the device to be reconnected to the telecommunication network, to cause deactivation of the SIM and to cause reactivation of the SIM.
6. A firewall system according to any preceding claim, which comprises a firewall identifier number database which comprises one or more entries, the or each of which comprises an identifier number and one or more rules for the identifier number, at least one of which is used to determine that the identifier number is an approved identifier number or is not an approved identifier number.
7. A firewall system according to claim 6, which comprises an approved identifier number creation module which creates an approved identifier number by copying one or more contact identifier numbers stored on a SIM identifier number database into one or more entries of the firewall identifier number database, accessing an entry of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the entry which determine that the contact identifier number is an approved identifier number.
8. A firewall system according to any preceding claim which comprises an outgoing call filtering module, which comprises a notification module which receives notification that the device is making an outgoing call, an interrogation module which causes interrogation of the outgoing call to search for an identifier number of the call and receives the identifier number of the outgoing call, a comparison module which compares the identifier number of the outgoing call with one or more approved identifier numbers, and a blocking module which, if the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to discontinue the outgoing call.
9. A firewall system according to any preceding claim which comprises an incoming text message filtering module, which comprises a notification module which receives notification that the device has received an incoming text message, an interrogation module which causes interrogation of the text message to search for an identifier number of the text message and, if an identifier number is found, receives the identifier number of the text message, a comparison module which compares the identifier number of the text message with one or more approved identifier numbers, and a blocking module which, if the identifier number of the text message does not match at least one of the one or more approved identifier numbers, instructs the SIM to delete the text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the text message from the device.
10. A firewall system according to any preceding claim which comprises an outgoing text message filtering module, which comprises a notification module which receives notification that the device is sending an outgoing text message, an interrogation module which causes interrogation of the outgoing text message to search for an identifier number of the text message and receives the identifier number of the outgoing text message, a comparison module which compares the identifier number of the outgoing text message with one or more approved identifier numbers, and a blocking module which, if the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, instructs the SIM to send a command to the device which causes the device to discontinue sending of the outgoing text message.
11. A method of filtering incoming calls to a mobile telecommunication device, the method comprising the steps of receiving notification that the device has received an incoming call from a telecommunication network, interrogating the incoming call to search for an identifier number of the call, and, if an identifier number is found, receiving the identifier number of the incoming call, comparing the identifier number of the incoming call with one or more approved identifier numbers, and if the identifier number of the incoming call does not match at least one of the one or more approved identifier numbers, instructing a SIM of the device to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the incoming call to terminate.
12. A method according to claim 11 , in which if an identifier number of the incoming call is not found, the method comprises receiving notification that no identifier number has been found and that the incoming call is an unidentified incoming call, and instructing the SIM to send a command to the device which causes the device to be disconnected from the telecommunication network which, in turn, causes the unidentified incoming call to terminate.
13. A method according to claim 11 or claim 12, in which the command which the SIM is instructed to send to the device activates a global system for mobile communications (GSM) session termination procedure.
14. A method according to any of claims 11 to 13, in which the command which the SIM is instructed to send to the device comprises a refresh command having parameters which are set to cause the device to be disconnected from the telecommunication network.
15. A method according to any of claims 11 to 14, in which the command which the SIM is instructed to send to the device comprises a refresh command provided as part of an application toolkit application of the SIM, and which has parameters which are set to cause the device to be disconnected from the telecommunication network, to cause the device to be reconnected to the telecommunication network, to cause deactivation of the SIM and to cause reactivation of the SIM.
16. A method according to any of claims 11 to 15 which comprises using a firewall identifier number database which comprises one or more entries, the or each of which comprises an identifier number and one or more rules for the identifier number, at least one of which is used to determine that the identifier number is an approved identifier number or is not an approved identifier number.
17. A method according to any of claims 11 to 16 which comprises creating an approved identifier number by copying one or more of the contact identifier numbers from a SIM identifier number database into one or more entries of the firewall identifier number database, accessing an entry of the firewall identifier number database in which a contact identifier number has been stored, and entering one or more rules into the entry which determine that the contact identifier number is an approved identifier number.
18. A method according to any of claims 11 to 17 which comprises filtering outgoing calls by receiving notification that the device is making an outgoing call, interrogating the outgoing call to search for an identifier number of the call and receiving the identifier number of the outgoing call, comparing the identifier number of the outgoing call with one or more approved identifier numbers, and if the identifier number of the outgoing call does not match at least one of the one or more approved identifier numbers, instructing the SIM to send a command to the device which causes the device to discontinue the outgoing call.
19. A method according to any of claims 11 to 18 which comprises filtering incoming text messages by receiving notification that the device has received an incoming text message, interrogating the text message to search for an identifier number of the text message and, if an identifier number is found, receiving the identifier number of the text message, comparing the identifier number of the text message with one or more approved identifier numbers, and if the identifier number of the text message does not match at least one of the one or more approved identifier numbers, instructing the SIM to delete the text message from a SIM text message database and to send a command to the device which causes the device to update a device text message database by copying contents of the SIM text message database into the device text message database, which, in turn, results in deletion of the text message from the device.
20. A method according to any of claims 11 to 19 which comprises filtering outgoing text messages by receiving notification that the device is sending an outgoing text message, interrogating the outgoing text message to search for an identifier number of the text message and receiving the identifier number of the outgoing text message, comparing the identifier number of the outgoing text message with one or more approved identifier numbers, and if the identifier number of the outgoing text message does not match at least one of the one or more approved identifier numbers, instructing the SIM to send a command to the device which causes the device to discontinue sending of the outgoing text message.
21. A computer program product stored in a medium readable by a computer, the product comprising computer-readable program means which cause the computer to perform the method according to any or claims 11 to 20.
22. A mobile telecommunication device comprising a firewall system according to any of claims 1 to 10.
PCT/EP2009/051375 2008-02-08 2009-02-06 Subscriber identity module (sim)-based filtering of incoming/outgoing calls /text messages WO2009098289A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0802487.9A GB0802487D0 (en) 2008-02-08 2008-02-08 Improvement relating to firewalls
GB0802487.9 2008-02-08

Publications (1)

Publication Number Publication Date
WO2009098289A1 true WO2009098289A1 (en) 2009-08-13

Family

ID=39247447

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2009/051375 WO2009098289A1 (en) 2008-02-08 2009-02-06 Subscriber identity module (sim)-based filtering of incoming/outgoing calls /text messages

Country Status (3)

Country Link
GB (1) GB0802487D0 (en)
IE (1) IES20090109A2 (en)
WO (1) WO2009098289A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2478943A (en) * 2010-03-24 2011-09-28 Nec Corp Mobile originating call control
WO2012097898A1 (en) 2011-01-20 2012-07-26 Max Hilz Apparatus for discreet communication for a mobile communication appliance
FR2978004A1 (en) * 2011-07-12 2013-01-18 Oberthur Technologies Method for controlling outgoing calls in response to incoming calls in mobile phone, involves providing request for validation of outgoing call based on comparison of identifier with identifier in list of suspected identifiers
CN114827361A (en) * 2022-04-08 2022-07-29 马上消费金融股份有限公司 Outbound processing method and device
US11611655B2 (en) 2021-07-08 2023-03-21 Comcast Cable Communications, Llc Systems and methods for processing calls

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999018704A2 (en) * 1997-10-02 1999-04-15 Ericsson Inc. System and method for providing restrictions on mobile-originated calls
EP1420600A1 (en) * 2002-11-15 2004-05-19 SCHLUMBERGER Systèmes Firewall system for mobile telecommunications devices
US20060040642A1 (en) * 2004-08-20 2006-02-23 Adam Boris Service detail record application and system
WO2007141607A2 (en) * 2006-06-08 2007-12-13 Ciaran Bradley Methods and apparatus for a sim-based firewall

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999018704A2 (en) * 1997-10-02 1999-04-15 Ericsson Inc. System and method for providing restrictions on mobile-originated calls
EP1420600A1 (en) * 2002-11-15 2004-05-19 SCHLUMBERGER Systèmes Firewall system for mobile telecommunications devices
US20060040642A1 (en) * 2004-08-20 2006-02-23 Adam Boris Service detail record application and system
WO2007141607A2 (en) * 2006-06-08 2007-12-13 Ciaran Bradley Methods and apparatus for a sim-based firewall

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Smart Cards; Card Application Toolkit (CAT) (Release 7); ETSI TS 102 223", ETSI STANDARDS, LIS, SOPHIA ANTIPOLIS CEDEX, FRANCE, vol. SCP-WG3, no. V7.10.0, 1 February 2008 (2008-02-01), XP014041612, ISSN: 0000-0001 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2478943A (en) * 2010-03-24 2011-09-28 Nec Corp Mobile originating call control
GB2478943B (en) * 2010-03-24 2012-02-29 Nec Corp Mobile originating call control
WO2012097898A1 (en) 2011-01-20 2012-07-26 Max Hilz Apparatus for discreet communication for a mobile communication appliance
FR2978004A1 (en) * 2011-07-12 2013-01-18 Oberthur Technologies Method for controlling outgoing calls in response to incoming calls in mobile phone, involves providing request for validation of outgoing call based on comparison of identifier with identifier in list of suspected identifiers
US11611655B2 (en) 2021-07-08 2023-03-21 Comcast Cable Communications, Llc Systems and methods for processing calls
CN114827361A (en) * 2022-04-08 2022-07-29 马上消费金融股份有限公司 Outbound processing method and device

Also Published As

Publication number Publication date
GB0802487D0 (en) 2008-03-19
IES20090109A2 (en) 2009-05-27

Similar Documents

Publication Publication Date Title
CN102739868B (en) The loss processing method of mobile terminal and system
US11689656B2 (en) Computing device and system for rendering contact information that is retrieved from a network service
US6442257B1 (en) Configuration for charging in a telephone network and method for operating such a configuration
US8566599B2 (en) System and method for controlling access to a portable device
US20060281407A1 (en) Methods for controlling contact information and corresponding electronic devices and program products
US20060212482A1 (en) Wireless data exchange
US20080192918A1 (en) Method and system for establishing a telephone connection
CN103220637A (en) Mobile phone anti-theft protection method and mobile phone anti-theft protection device
CN108781237A (en) The detection of arrearage mobile device
EP1058465B1 (en) Multiple uniquely distinguishable wireless handsets using a single mobile identification number
CN101502146A (en) Methods and apparatus for a sim-based firewall
JP3994033B2 (en) Mobile device, call control method, and call control method
GB2398707A (en) Authentication method for enabling a user of a mobile station to access private data or services
CN101384048A (en) Information managing method and mobile terminal
US20120258689A1 (en) Method, Device and System for Partially Locking Functions of Terminal
CN107708078A (en) Mobile terminal and its call transferring method, storage device
EP1866792A2 (en) Wireless data exchange
WO2009098289A1 (en) Subscriber identity module (sim)-based filtering of incoming/outgoing calls /text messages
US7945235B2 (en) Network-based subscriber calling restrictions
WO2002069657A1 (en) A method to realize invisible automatic dial up to report the loss for handset
CN113329130B (en) Pseudo virtual telephone number using method, device and server based on Internet
GB2406749A (en) Mobile communication control system
US20080159305A1 (en) Virtual private communication devices and techniques
JP2000349887A (en) Telephone terminal, removable data medium provided with means to delete common function and corresponding function menu management process
KR20040106956A (en) Selective reception denial method of Rx signal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09708001

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009708001

Country of ref document: EP

122 Ep: pct application non-entry in european phase

Ref document number: 09708001

Country of ref document: EP

Kind code of ref document: A1