CN101026885A - Calling authorization realizing method and system and gate keeper - Google Patents

Calling authorization realizing method and system and gate keeper Download PDF

Info

Publication number
CN101026885A
CN101026885A CNA2007100729825A CN200710072982A CN101026885A CN 101026885 A CN101026885 A CN 101026885A CN A2007100729825 A CNA2007100729825 A CN A2007100729825A CN 200710072982 A CN200710072982 A CN 200710072982A CN 101026885 A CN101026885 A CN 101026885A
Authority
CN
China
Prior art keywords
address
game
local exchange
iplist
subordinate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2007100729825A
Other languages
Chinese (zh)
Other versions
CN100486371C (en
Inventor
周舰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB2007100729825A priority Critical patent/CN100486371C/en
Publication of CN101026885A publication Critical patent/CN101026885A/en
Application granted granted Critical
Publication of CN100486371C publication Critical patent/CN100486371C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

When receiving call initiated by gateway GW belonging to opposite office gate keeper (GK), this office GK compares IP address of the GW with IP address configured by this GK so as to accomplish authentication for the call. When implementing intercommunication between a H.323 network and other multiple H323 networks under GK-GK H323 in repeat mode, the invention can authenticate call from GW under opposite office GK by this office GK to make call continuous. The invention also meets requirement that multiple gateways in same operation manager are corresponding to a relay cluster in this office, and also call ticket shows the operation mode.

Description

Realize the method and system and the gatekeeper of calling authorization
Technical field
The invention belongs to communication technical field, relate in particular under the relay networking mode H.323 technology calling authorization.
Background technology
Along with development of Communication Technique and the H.323 extensive employing of agreement in Softswitch technology, in the H.323 relay networking mode of agreement H.323 also being applied on the existing network more and more widely.
Mainly comprise following four kinds of patterns in the H.323 relay networking mode of agreement H.323:
1, peer-type relaying H.323, the type relaying are only applicable to local exchange and the opposite end office application scenario when being soft switch.
2, GW (GateWay gateway) type relaying H.323, the type relaying be applicable to soft switch as GK (GateKeeper gatekeeper) use, application scenario when opposite end office is GW in the same H.323 network.
3, GK type relaying H.323, the type relaying be applicable to soft switch as GK use, opposite end office is other GK in the same H.323 network or be other application scenario the during GK in the network H.323.
4, outside GK type relaying H.323, the type relaying are applicable to that soft switch uses as GW, the application scenario when opposite end office is outside GK.
Being used in combination of above-mentioned 4 kinds of relayings in existing network formed complicated H.323 network, also becomes more and more important based on the calling authorization technology of agreement H.323 in the Xiang Guan soft switch therewith.
In existing soft switch realizes, H.323 agreement to the method for authenticating that incoming call or local exchange make a call is: after the local exchange gatekeeper receives Setup (setting up call request) message, H.323, whether the IP address of at first judging the initiation end points that is comprised in (strategy 1) Setup message exists in the office direction table, seeing if there is the corresponding IP address and the corresponding relation of office direction, is incoming call if having then show; Otherwise (strategy 2) sends query messages to RAS (Registration, the agreement of using between Admission and Status end points and the gatekeeper) protocol process module, see whether be that local exchange makes a call, make a call if not local exchange, (strategy 3) judges whether to be registered to outside GK again and gone up, if be registered on the outside GK, then send ARQ (Admission Request call admission request) and give outside GK, carry out authentication by outside GK.If the three is not, think illegal calling, refuse this calling.
As mentioned above, after receiving Setup message, at first whether be incoming call by strategy 1 if can judge calling, if incoming call, can be again judges H.323 relaying or GK type relaying H.323 of peer-type according to relaying type identification position of institute's recorded information from Trk Group Data table, IP address; If the 1 pair of calling is carried out authentication and is judged and be not incoming call through strategy, whether can judge according to strategy 2 is that local exchange makes a call, herein can to the GW type H.323 the calling of relaying carry out authentication, because the GW type H.323 calling of relaying also need be registered earlier on GK before calling, there is log-on message the registration back in the RAS protocol process module, so to the GW type H.323 the judgement of junction call also handle in 2 at strategy, can distinguish GW type H.323 relaying or other callings of local exchange by the terminal type identification position in the log-on message; Whether if still can't carry out authentication to calling through strategy 1 and 2, just can judge by strategy 3 is H.323 relaying of outside GK type again, and the calling that still can't carry out authentication through these 3 strategies is rejected with regard to being considered to illegal the calling.
Under existing calling authorization method, when one H.323 network and other a plurality of H323 networks are with the intercommunication of GK-GK H323 trunking scheme, gateway under the GK that plays a game directly sends Setup message to local exchange GK, when the local exchange gatekeeper carries out calling authorization, because the IP address of this gateway is not in office direction table H.323, so can't carry out authentication by strategy 1; Because the gateway under the GK that plays a game is registered on the GK that plays a game, in the RAS of local exchange GK protocol process module, there is not log-on message again, so can't carry out authentication by strategy 2 yet; The gateway of on the GK that plays a game, having registered simultaneously, can not register to outside GK again, so strategy 3 is also unworkable, this has just caused local exchange GK can't realize the authentication from gateway call under the GK that plays a game, because can't authentication, certainly also just can't match trunk group and charge, can't satisfy trunk group of the corresponding local exchanges of a plurality of gateways of the same operator of playing a game, and the requirement that in ticket, embodies.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of method and system and gatekeeper who realizes calling authorization, and the gateway that is intended to solve the gatekeeper subordinate that plays a game who exists in the prior art directly makes a call to the local exchange gatekeeper, the problem that the local exchange gatekeeper can't authentication.
The embodiment of the invention is achieved in that a kind of method of calling authorization, and described method comprises following step:
When a, local exchange gatekeeper GK receive the calling that the GK subordinate's that plays a game gateway GW initiates, IP address and the IP address that described local exchange GK disposes of described GW compared, finish authentication described calling.
The embodiment of the invention also provides a kind of communication system, be used for calling authorization, described system comprises play a game GK and subordinate's thereof GW and local exchange GK, described local exchange GK also comprises memory cell and calling authorization unit, described cell stores has the IP address of the described GK of playing a game subordinate's GW, and the described IP address that the GW that described calling authorization unit is used for the described GK of playing a game subordinate stores in according to described memory cell when local exchange GK makes a call is carried out calling authorization and handled.
The embodiment of the invention also provides a kind of gatekeeper GK, described GK also comprises memory cell and calling authorization unit, described cell stores has the IP address of the GK subordinate's that plays a game GW, and the described IP address that the GW that described calling authorization unit is used for the described GK of playing a game subordinate stores in according to described memory cell when described GK makes a call is carried out calling authorization and handled.
The embodiment of the invention overcomes the deficiencies in the prior art, the IP address of employing gateway under GK is played a game in configuration on the local exchange GK, when local exchange GK receives the calling of the gateway initiation under the GK that plays a game, the local exchange gatekeeper compares the source IP address of calling and the IP address of configuration, if can mate, then think legal incoming call, finish technical scheme to the authentication of calling out, in the time of can realizing that one H.323 network and other a plurality of H323 networks are with the intercommunication of GK-GK H323 trunking scheme, local exchange GK can continue calling to the authentication from gateway call under the GK that plays a game.
Description of drawings
Fig. 1 is an embodiment of the invention networking schematic diagram;
Fig. 2 is an embodiment of the invention method flow diagram;
Fig. 3 is the system construction drawing of the embodiment of the invention;
Fig. 4 is the block diagram of the described GK of the embodiment of the invention.
Embodiment
The basic principle of the embodiment of the invention is the IP address of gateway under GK is played a game in configuration on the local exchange GK, when local exchange GK receives the calling of the gateway initiation under the GK that plays a game, the local exchange gatekeeper compares the source IP address of calling and the IP address of configuration, if can mate, then think legal incoming call, finish authentication to calling out, while has also been disposed IPLIST sequence number and the corresponding virtual MSC route thereof under the GK that plays a game in local exchange GK, determine virtual trunk group number according to the IPLIST sequence number, determine virtual trunk then, the call property and the charging property of the gatekeeper subordinate's gateway of playing a game all calculated on this virtual trunk.
For the purpose, technical scheme and the advantage that make the embodiment of the invention is clearer,, the present invention is further elaborated below in conjunction with drawings and Examples.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
The embodiment of the invention has increased IP address configuration function newly in local exchange GK, be used for increasing the IP address date of the GK that plays a game at configuration database, configuration parameter is the IPLIST sequence number, IP address and subnet mask, and permission a plurality of different IP addresses of configuration under same IPLIST sequence number, the play a game a plurality of different gateway of same operator of correspondence, for the ease of gatekeeper 2 distinguish the calling of initiating from gateway be local exchange or the gatekeeper 1 that plays a game under gateway, also on gatekeeper 2, disposed a H.323 virtual trunk in the embodiment of the invention, and in configuration data, be associated with the IPLIST sequence number of above-mentioned configuration, be associated with a MSC route that the overall situation is unique simultaneously, by virtual trunk the IPLIST sequence number is associated with the unique MSC route of the overall situation, when gatekeeper 2 receives when calling out from the SETUP of 1 time gateway of gatekeeper, by the IP address that comprises under the IP address of gateway and the IPLIST sequence number compare judge be legal calling after, will be associated with this virtual trunk by the IPLIST sequence number, and be associated with on the MSC route of configuration, the attributes such as subsequent charging that will call out all count on the unique MSC route of this overall situation again.
When local exchange GK carries out authentication to calling, on the basis of 3 authentication policies of prior art, having increased (strategy 4) newly decides reception or refusal to call out by the IP the address whether source IP address of judging calling can mate configuration, if can mate, then think legal incoming call, find the corresponding virtual MSC route according to the source IP address of calling out, the incoming call attribute is calculated on this virtual trunk; Otherwise, think illegal calling, refuse this calling.
The networking schematic diagram of the embodiment of the invention as shown in Figure 1, wherein:
(1) in gatekeeper 2, disposed the IP address date of 1 time gateway of gatekeeper, configuration parameter is IPLIST sequence number, IP address and subnet mask, under same IPLIST sequence number, disposed the IP address of a plurality of gateways (gateway 1, gateway 2), the IP address configuration of a plurality of gateways that is about to same operator is under same IPLIST sequence number, as configuration of IP LIST=1 on gatekeeper 2, IP address be: 192.168.200.100, subnet mask are: 255.255.255.255 data, the gateway 1 under the corresponding gatekeeper 1; IPLIST=1, IP address are: 192.168.200.200, subnet mask are: the data of 255.255.222.255, the gateway 2 under the corresponding gatekeeper 1;
(2) be configured to gatekeeper's 2 (192.168.1.2) H.323GK relay data on gatekeeper 1 (192.168.1.1), MSC route is 2, and indicates H.323GK that the IP address of relaying opposite end is 192.168.1.2; When the gateway under the gatekeeper 1 to the gatekeeper 1 when making a call authentication request message (ARQ), gatekeeper 1 can navigate to gatekeeper 2 by endpoint location message (LRQ), and the IP address information in the response LCF message that gatekeeper 2 is beamed back is transmitted to following gateway, allows gateway directly to make a call to this IP address and sets up request Setup message;
(3) H.323 virtual trunk data on gatekeeper 2, have been disposed, configuration parameter is MSC route and IPLIST sequence number, MSC route is used for identifying this virtual trunk, the IPLIST sequence number indicates this virtual trunk and refers to which group IPLIST, for example according to above-mentioned example, MSC route is 1, and the IPLIST sequence number is 1; Compare authentication in the IP address information that comprises under follow-up this IPLIST sequence number of arriving when carrying out calling authorization;
(4) when the gateway under the gatekeeper 1 to the gatekeeper 2 when making a call, gatekeeper 2 carries out the incoming call authentication, is the IP address date of configuration in (1) step in the foundation of authentication on the gatekeeper 2.
Finish after the above-mentioned data configuration, the gateway 1 under gatekeeper 1, gateway 2, gateway 3 be 2 requests of making a call to the gatekeeper respectively, and the flow process that authentication is carried out in 2 pairs of callings of gatekeeper specifically comprises following step as shown in Figure 2:
(1) gateway 1 under the gatekeeper 1, gateway 2, gateway 31 send the ARQ request respectively to the gatekeeper, comprise called number information in the request;
(2) gatekeeper 1 judges called number information in the ARQ message not in the scope of self-management, and just 2 transmitting terminal point location request (LRQ) message to the gatekeeper comprise called number information in the message;
(3) gatekeeper 2 judges called number information in the LRQ message in the scope of self-management, and 1 time end points is confirmed response LCF message to the gatekeeper, comprises gatekeeper's 2 IP address information itself in the message;
(4) gatekeeper 1 confirms (ACF) message to gateway 1, gateway 2, gateway 3 difference callbacks initiating, and includes the gatekeeper's 2 who has in the 3rd step LCF message IP address information in the message;
(5) gateway 1, gateway 2, gateway 3 according in the ACF message with the IP address information, 2 send the Setup message to the gatekeeper respectively, comprise called number and information of self IP address in the message;
(6) the Setup message of 2 pairs of gateways 1 of gatekeeper, gateway 2, gateway 3 is carried out calling authorization, gatekeeper 2 judges at first H.323 whether the IP address of (strategy 1) gateway 1, gateway 2, gateway 3 exist in the office direction table, do not exist, then (strategy 2) sends query messages to the RAS protocol process module, judge whether it is that local exchange makes a call, be not that local exchange makes a call, (strategy 3) judges whether to be registered to outside GK again and gone up, and also is not registered on the outside GK; Adopt the present invention program's strategy 4 to carry out authentication this moment, respectively according to gateway 1, gateway 2, the IP address that is comprised under the IPLIST sequence number of the IP address of gateway 3 with configuration among the gatekeeper 2 compares, judge whether to exist the record data of same IP address, because of IPLIST the IP address that comprises gateway 1 under 1 the sequence number: the IP address 192.168.200.200 of 192.168.200.100 and gateway 2, so can the match is successful, it is the authentication success, obtaining corresponding IPLIST sequence number simultaneously is 1, and the IP address of gateway 3 is not included under the IPLIST sequence number, so failed authentication; Be 1 because obtain the IPLIST sequence number of gateway 1 and gateway 2 again, determine that according to the IPLIST sequence number of configuration and virtual trunk group's number corresponding relation the MSC route of gateway 1 and gateway 2 corresponding virtual relayings is 1 again, it is on 1 the virtual trunk that the associated call attribute of gateway 1 and gateway 2 and charging property are all calculated MSC route, thereby satisfied demand, can carry out subsequent treatment, and the IPLIST of gateway 3 is not configured on the virtual trunk, do not comprise this IP address of 192.168.200.150 (the IP address of gateway 3) in the IP address information that under the IPLIST of IPLIST=1, is comprised, failed authentication.
Newly-increased virtual trunk is used to handle incoming call, can not influence outbound call.After having increased the virtual trunk authentication newly, by in the local exchange IP address list, disposing the IP address information of a plurality of gateways under the GK that plays a game, in the time of just can realizing a H323 network and a plurality of H323 network with the intercommunication of GK-GK H323 trunking scheme, local exchange GK is to the authentication from gateway call under the GK that plays a game, also can satisfy simultaneously trunk group of the corresponding local exchanges of a plurality of gateways of the same operator of playing a game, and the requirement that in ticket, embodies of the calling of a plurality of gateways of the same operator of will playing a game.
Inventive embodiments is described be used for calling authorization communication system system construction drawing as shown in Figure 3, the GW and the local exchange GK that comprise play a game GK and subordinate thereof, wherein, local exchange GK also comprises memory cell and calling authorization unit, in memory cell, dispose the IP address of the GK subordinate's that plays a game GW, when the GK subordinate's that plays a game GW when local exchange GK makes a call, the IP address information that comprises called number and GW in the Setup message, local exchange GK compares the IP address of carrying in the Setup message and the IP address of memory cell arrangements, if exist in the IP address of configuration with Setup message in consistent IP address, then authentication is passed through, otherwise failed authentication.
Specifically, the content of storing in the memory cell of local exchange GK is:
(1) the IP address date of 1 time gateway of gatekeeper of configuration in gatekeeper 2, configuration parameter is IPLIST sequence number, IP address and subnet mask, under same IPLIST sequence number, disposed the IP address of a plurality of gateways (gateway 1, gateway 2), the IP address configuration of a plurality of gateways that is about to same operator is under same IPLIST sequence number, as configuration of IP LIST=1 on gatekeeper 2, IP address be: 192.168.200.100, subnet mask are: 255.255.255.255 data, the gateway 1 under the corresponding gatekeeper 1; IPLIST=1, IP address are: 192.168.200.200, subnet mask are: the data of 255.255.222.255, the gateway 2 under the corresponding gatekeeper 1;
(2) go up the gatekeeper's 2 (192.168.1.2) of configuration H.323GK relay data gatekeeper 1 (192.168.1.1), MSC route is 2, and indicates H.323GK that the IP address of relaying opposite end is 192.168.1.2; When the gateway under the gatekeeper 1 to the gatekeeper 1 when making a call authentication request message (ARQ), gatekeeper 1 can navigate to gatekeeper 2 by endpoint location message (LRQ), and the IP address information in the response LCF message that gatekeeper 2 is beamed back is transmitted to following gateway, allows gateway directly to make a call to this IP address and sets up request Setup message;
(3) the H.323 virtual trunk data of configuration on gatekeeper 2, configuration parameter is MSC route and IPLIST sequence number, MSC route is used for identifying this virtual trunk, the IPLIST sequence number indicates this virtual trunk and refers to which group IPLIST, for example according to above-mentioned example, MSC route is 1, and the IPLIST sequence number is 1.
When gateway 1, gateway 2 and gateway 3 are to respectively to the gatekeeper 2 when initiating the Setup message, calling authorization unit among the gatekeeper 2 is with gateway 1, gateway 2, the IP address that the IPLIST sequence number of storing in the memory cell of IP address with gatekeeper 2 of gateway 3 is comprised down compares, judge whether to exist the record data of same IP address, because of IPLIST the IP address that comprises gateway 1 under 1 the sequence number: the IP address 192.168.200.200 of 192.168.200.100 and gateway 2, so can the match is successful, it is the authentication success, obtaining corresponding IPLIST sequence number simultaneously is 1, and the IP address of gateway 3 is not included under the IPLIST sequence number, so failed authentication; Be 1 because obtain the IPLIST sequence number of gateway 1 and gateway 2 again, determine that according to the IPLIST sequence number of storing in the memory cell and virtual trunk group's number corresponding relation the MSC route of gateway 1 and gateway 2 corresponding virtual relayings is 1 again, it is on 1 the virtual trunk that the associated call attribute of gateway 1 and gateway 2 and charging property are all calculated MSC route.
Gatekeeper in the embodiment of the invention comprises memory cell and calling authorization unit, as shown in Figure 4, the detailed process that data of storing in the memory cell and calling authorization unit carry out authentication identical with described in the above-mentioned system, this does not give unnecessary details.
As mentioned above, the embodiment of the invention adopts the IP address of gateway under GK is played a game in configuration on the local exchange GK, when local exchange GK receives the calling of the gateway initiation under the GK that plays a game, the local exchange gatekeeper compares the source IP address of calling and the IP address of configuration, if can mate, then think legal incoming call, finish technical scheme to the authentication of calling out, in the time of can realizing that one H.323 network and other a plurality of H323 networks are with the intercommunication of GK-GK H323 trunking scheme, local exchange GK can continue calling to the authentication from gateway call under the GK that plays a game; In addition, IPLIST sequence number and described IPLIST sequence number corresponding virtual relaying and MSC route under the IP address of the GW that disposes the GK subordinate that plays a game on the local exchange GK, and be stored in the memory cell, when the GK subordinate's that plays a game GW when local exchange GK makes a call, local exchange GK determines IPLIST sequence number under this GW according to the IP address of this GW, and determine corresponding virtual relaying and MSC route according to described IPLIST sequence number, the call property that this GW is relevant is all calculated on the related virtual trunk of MSC route with charging property, satisfied trunk group of the corresponding local exchanges of a plurality of gateways of the same operator of playing a game, and the requirement that in ticket, embodies of the calling of a plurality of gateways of the same operator of will playing a game.
The above only is preferred embodiment of the present invention, not in order to restriction the present invention, all any modifications of being done within the spirit and principles in the present invention, is equal to and replaces and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1, a kind of method that realizes calling authorization is characterized in that, described method comprises following step:
When a, local exchange gatekeeper GK receive the calling that the GK subordinate's that plays a game gateway GW initiates, IP address and the IP address that described local exchange GK disposes of described GW compared, finish authentication described calling.
2, method according to claim 1 is characterized in that, wherein also comprises before the step a:
A0, the IP address that on described local exchange GK, disposes the GK subordinate's that plays a game GW.
3, method according to claim 2 is characterized in that, wherein step a specifically comprises:
A1, described local exchange GK receive that the GK subordinate's that plays a game GW sends when setting up call request Setup message, judge whether the IP address that disposes in described local exchange gatekeeper comprises the IP address of described GW, if, then authentication success, otherwise failed authentication.
4, method according to claim 3 is characterized in that, wherein also comprises before the step a1:
After a01, the described GK of playing a game receive the call admission request ARQ message that its subordinate's GW sends, to described local exchange GK transmitting terminal point location request LRQ message, described local exchange GK returns end points to the GK that plays a game and confirms response LCF message, and the described GK of playing a game subordinate's GW sends Setup message according to the IP address of the local exchange GK that carries in the described LCF message to local exchange GK.
5, method according to claim 3 is characterized in that, wherein step a1 also comprises:
Described local exchange GK receives that the GK subordinate's that plays a game GW sends when setting up call request Setup message, determine IPLIST sequence number under the described GW according to the IPLIST sequence number that disposes among the IP address of described GW and the described local exchange GK, determine virtual trunk group number and virtual trunk according to the IPLIST sequence number under the described GW then.
6, method according to claim 5 is characterized in that, same described IPLIST sequence number comprises a plurality of different IP addresses, a plurality of GW of the corresponding described same operator of playing a game.
7, a kind of communication system, be used for calling authorization, described system comprises play a game GK and subordinate's thereof GW and local exchange GK, it is characterized in that, described local exchange GK also comprises memory cell and calling authorization unit, described cell stores has the IP address of the described GK of playing a game subordinate's GW, and the described IP address that the GW that described calling authorization unit is used for the described GK of playing a game subordinate stores in according to described memory cell when local exchange GK makes a call is carried out calling authorization and handled.
8, system according to claim 7, it is characterized in that, also store affiliated IPLIST sequence number and described IPLIST sequence number corresponding virtual relaying and the MSC route in IP address of the described GK of playing a game subordinate's GW in the described memory cell, the GW that is used for the described GK of playing a game subordinate is when local exchange GK makes a call, described local exchange GK determines IPLIST sequence number under the described GW according to the IP address of described GW, and determines corresponding virtual relaying and MSC route according to described IPLIST sequence number.
9, a kind of gatekeeper GK, it is characterized in that, described GK also comprises memory cell and calling authorization unit, described cell stores has the IP address of the GK subordinate's that plays a game GW, and the described IP address that the GW that described calling authorization unit is used for the described GK of playing a game subordinate stores in according to described memory cell when described GK makes a call is carried out calling authorization and handled.
10, GK according to claim 9, it is characterized in that, also store affiliated IPLIST sequence number and described IPLIST sequence number corresponding virtual relaying and the MSC route in IP address of the described GK of playing a game subordinate's GW in the described memory cell, the GW that is used for the described GK of playing a game subordinate is when local exchange GK makes a call, described local exchange GK determines IPLIST sequence number under the described GW according to the IP address of described GW, and determines corresponding virtual relaying and MSC route according to described IPLIST sequence number.
CNB2007100729825A 2007-01-17 2007-01-17 Calling authorization realizing method and system, and gate keeper Expired - Fee Related CN100486371C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007100729825A CN100486371C (en) 2007-01-17 2007-01-17 Calling authorization realizing method and system, and gate keeper

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007100729825A CN100486371C (en) 2007-01-17 2007-01-17 Calling authorization realizing method and system, and gate keeper

Publications (2)

Publication Number Publication Date
CN101026885A true CN101026885A (en) 2007-08-29
CN100486371C CN100486371C (en) 2009-05-06

Family

ID=38744682

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007100729825A Expired - Fee Related CN100486371C (en) 2007-01-17 2007-01-17 Calling authorization realizing method and system, and gate keeper

Country Status (1)

Country Link
CN (1) CN100486371C (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112543181A (en) * 2020-11-03 2021-03-23 开放智能机器(上海)有限公司 System and method for authenticating safety certification equipment through network authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112543181A (en) * 2020-11-03 2021-03-23 开放智能机器(上海)有限公司 System and method for authenticating safety certification equipment through network authentication

Also Published As

Publication number Publication date
CN100486371C (en) 2009-05-06

Similar Documents

Publication Publication Date Title
US6829232B1 (en) Communication method for terminals connected to IP networks to receive services provided by intelligent networks
US6421339B1 (en) Methods and systems for call forwarding
US7739196B2 (en) Policy control and billing support for call transfer in a session initiation protocol (SIP) network
CN1316796C (en) Providing position independent information bag routing select and secure network access for short-range wireless network environment
JP4833995B2 (en) Mobile online game system and communication method between mobile game terminals
US6237037B1 (en) Method and arrangement relating to communications systems
EP1137238A2 (en) System and method for integrated communications over a local IP network
US20030137976A1 (en) Method and apparatus for IP based metered service on demands network
BRPI0719682B1 (en) INTERCEPTING VOICE COMMUNICATIONS VIA IP AND OTHER DATA COMMUNICATIONS
JP2001285476A (en) Method for housing ip terminal, its gateway device, gatekeeper device and ip terminal
US20070171851A1 (en) Method for the control and evaluation of a message traffic of a communication unit by means of a first network unit within a mobile radio system, pertaining communication unit and first network unit
JP2003501891A (en) Method and apparatus for communicating securely
WO2004008715A1 (en) Eap telecommunication protocol extension
MXPA05001665A (en) Mobile terminal identity protection through home location register modification.
CN100486371C (en) Calling authorization realizing method and system, and gate keeper
JP2002344531A (en) Method for requesting securing and release of communication band
JP3514279B2 (en) Opponent selection type address resolution method and apparatus
JPH0759154A (en) Inter-network authentication key generating method
CN1859518B (en) Cross-gate keeper call processing method
CN1180605C (en) IP telephone system and its communication method
KR101001210B1 (en) Prepaid-card communication method and system of private mobilecommunication service system
CN100584083C (en) The system and method for realizing the roam control of the terminal
JP3833932B2 (en) IP network that can use IP address as terminal identity
CN100495966C (en) Marking and carrying method for subnetwork information in internet
CN103686731B (en) New DIAMETER signaling for mobile IPV4

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090506

Termination date: 20130117

CF01 Termination of patent right due to non-payment of annual fee