EP2676425A1 - A bypass detection system resembling human behaviour - Google Patents
A bypass detection system resembling human behaviourInfo
- Publication number
- EP2676425A1 EP2676425A1 EP11808658.6A EP11808658A EP2676425A1 EP 2676425 A1 EP2676425 A1 EP 2676425A1 EP 11808658 A EP11808658 A EP 11808658A EP 2676425 A1 EP2676425 A1 EP 2676425A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- test
- bypass
- call
- control system
- receiver probe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 57
- 238000012360 testing method Methods 0.000 claims abstract description 246
- 239000000523 sample Substances 0.000 claims abstract description 72
- 238000004458 analytical method Methods 0.000 claims abstract description 26
- 238000000034 method Methods 0.000 claims description 14
- 230000000977 initiatory effect Effects 0.000 claims description 7
- 230000011664 signaling Effects 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 10
- 238000005259 measurement Methods 0.000 description 8
- 206010010904 Convulsion Diseases 0.000 description 7
- 239000000969 carrier Substances 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 230000003213 activating effect Effects 0.000 description 1
- 230000033228 biological regulation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/26—Arrangements for supervision, monitoring or testing with means for applying test signals or for measuring
- H04M3/28—Automatic routine testing ; Fault testing; Installation testing; Test methods, test equipment or test arrangements therefor
- H04M3/32—Automatic routine testing ; Fault testing; Installation testing; Test methods, test equipment or test arrangements therefor for lines between exchanges
- H04M3/323—Automatic routine testing ; Fault testing; Installation testing; Test methods, test equipment or test arrangements therefor for lines between exchanges for the arrangements providing the connection (test connection, test call, call simulation)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/06—Testing, supervising or monitoring using simulated traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42059—Making use of the calling party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
Definitions
- the present invention generally relates to a system for detection of an interconnect bypass in telecommunication networks, especially in wireless telecommunication networks such as for example of the type GSM, UMTS or similar, but also in wired telecommunication networks.
- a system for setting up test calls in a telecommunication network is known from for example WO99/01974 and WO2008/071857.
- These call charge verification systems generate a series of calls between different sites on one or more networks to enable the network operator to check the billing procedure of the network.
- These systems however rely on collection of billing data produced by the operator in order to extract data, such as for example the CLI for analysis. Therefor these systems require access to sensitive data of the telecommunication network operator. This data is sensitive because it is related to the calling behaviour of its customers which might be subjected to privacy regulations or because it relates to billing information which is considered as commercial know how of the telecommunication network operator.
- This system for detection of a bypass of an interconnect to a telecommunication network under test comprises means adapted to originate a test call to said telecommunication network under test from outside the telecommunication network under test and at least one receiver probe with a subscription for terminating said test call. Further this system comprises a control system configured to initiate the test call; receive from the receiver probe call information comprising a received calling line identification (CLI) of the test call; and analyse the received calling line identification (CLI) such that presence of the bypass can be detected.
- CLI calling line identification
- the Meucci system does not require an interface with the billing system. Usage of the CLI for detection of a bypass based on a test call system is also mentioned in the prior art section of US2010/0087191 . Test call systems in general are for example known from WO2010/144020 and EP0661859.
- EP0661859 describes traffic route testers which check transmission quality such as for example voice or data transmission quality and generate random traffic in a system which corresponds to subscriber traffic. However, in order to check the transmission quality a connection has to be established.
- ASR answer/seizure ratio
- transmission quality check systems when used as a bypass detection system, would lead to unacceptable costs and a serious reduction of efficiency when applying this technology in the technical context of the current invention because of the requirement to establish a connection in order to complete the quality check.
- transmission quality check system would result in an easily identifiable calling pattern as the ASR would be approaching 100%, because of the tendency to seize all test calls in order to perform the quality check.
- Such an ASR is clearly different from normal, predominantly human, calling patterns and thus easier to identify. For example a telephone number that receives one hundred calls per day and always picks up is equally suspicious.
- test call systems are computer driven and may show a fixed or easy to identify calling pattern of start time, ringing duration, number of rings, etc. This makes it easy for the bypass operators to detect and identify the means for originating the test calls and/or the subscriptions used in the receiver probes for receiving the test call. These bypass operators can then subsequently blacklist these specific means and/or subscriptions in order to avoid detection.
- control system for a system for detection of a bypass of an interconnect to a telecommunication network , said control system configured to:
- control system is configured to instruct said receiver probe to pick up a number of said test calls for avoiding counter-detection by a bypass operator while limiting costs.
- control system is configured to instruct said receiver probe to pick up only a number of test calls on suspect routes, which are routes for test calls for which said control system:
- ⁇ is provided with information that the probability of detecting a bypass is higher than a predetermined bypass probability threshold
- route is used for all means on a specific telecom operator or telecom provider that guide a specific test call from where it was originated to a specific receiving subscription or operator, subject to routing rules through various telecommunication networks.
- a suspect route is a route for a specific test call for which the control system has previously detected or is in the process of detecting a bypass, or for which there is information that the probability of detecting a bypass is expected to be higher than a predetermined bypass probability threshold. The probability of detecting a bypass can be based on information, such as for example the results of previous tests or pricing information.
- bypass probability threshold could be set by an operator of the bypass detection system, but could alternatively also be calculated from for example the average bypass detection rate of the bypass detection system.
- the probability of detecting a bypass and the corresponding bypass probability threshold can be derived from the time that has elapsed since the detection of a bypass, and as such if a bypass was detected on a route more recently than the time period defined by the predetermined bypass probability threshold, the this route would qualify as a suspect route.
- the probability of detecting a bypass can be derived from pricing or revenue information.
- the predetermined bypass probability threshold could relate to a specific pricing or revenue level and a route would qualify as a suspect route if the pricing or revenue level is lower than the one set by this threshold.
- suspect routes could be routes which are reported to contain sim boxes, for example by another bypass detection system, or a bypass detection system fitted for other telecommunication networks than the telecommunication network under test. It is clear that the bypass probability threshold could for example also be set to 0%, which means that as soon as for example a bypass was detected by another bypass detection system on a route, this route will qualify as a suspect route.
- control system is configured to instruct said receiver probe to pick up only between 20% to 70%, preferably 40% of test calls on suspect routes.
- These answer/seizure ratios should be based on normal industry ratio's, such that there is little difference between what is artificially created by the test system and what would be the expected normal behaviour for the body managing or operating the route. In general the ASR varies between 50 and 70%.
- control system (40) is configured to instruct said receiver probe (20) to pick up the test call on suspect routes based on said analysis of the received calling line identification (CLI).
- the received CLI is transmitted just before or after the first ring.
- the analysis of the CLI which leads to the detection of the presence of a bypass can thus be performed while the test call is ringing and on the basis of the outcome it can be decided whether to pick up the test call or not. This allows for an efficient, real time system with capabilities to avoid counter detection by the bypass operator.
- control system is further configured to instruct said means and/or said receiver probe to randomize one or more test call parameters, such as one or more of the following:
- control system is further configured to instruct said means and/or said receiver probe to inject content in said test calls, such as one or more of the following:
- control system at least partly is comprised within said receiver probe.
- control system can thus optionally be implemented in a distributed way, for example in order to speed up processing.
- a system for detection of a bypass of an interconnect to a telecommunication network comprising a control system according to any of the preceding claims, said system further comprising:
- said subscription for terminating said test call is configured with calling line identification restriction override (CLIRO).
- CLIRO calling line identification restriction override
- a third aspect of the invention there is provided a method for detecting a bypass of an interconnect to a telecommunication network under test, said method comprising the steps of:
- the method comprises the further step of the control system instructing the receiver probe to pick up a number of said test calls for avoiding counter-detection by a bypass operator while limiting costs.
- FIG. 1 illustrates an embodiment according to the invention without the presence of a bypass
- FIG. 2 illustrates the embodiment according to Figure 1 with the presence of a bypass.
- Figure 1 shows a system 1 for detection of a bypass of an interconnect 530 to a telecommunication network 50 under test.
- the system 1 according to the invention comprises a means 10 to originate a test call to said telecommunication network 50 under test from outside the telecommunication network 50 under test.
- This means 10 can be a suitable sender probe such as for example a GSM mobile phone or any other type of device capable of initiating a call on a predetermined outside telecommunication network other than the telecommunication network 50 of the network operator that is undertaking the investigation regarding the presence of a bypass of an interconnect 530, such as for example calling cards, a telephone number providing access to voip systems, call back mechanisms, any type of pc originating calls, a suitable subscription to mobile networks such as for example a SIM card, wireline networks or call generators directly connected to telecommunication network equipment.
- a suitable sender probe such as for example a GSM mobile phone or any other type of device capable of initiating a call on a predetermined outside telecommunication network other than the telecommunication network 50 of the network operator that is undertaking the investigation regarding the presence of a bypass of an interconnect 530, such as for example calling cards, a telephone number providing access to voip systems, call back mechanisms, any type of pc originating calls, a suitable subscription to mobile networks such as for example
- the means 10 can comprise for example a fixed line subscription in the UK "+44 20 1234 5678" and the telecommunication network 50 under test can for example be a telecommunication network of a Belgian mobile operator with a numbering plan with a 474 prefix, this means "+32 474 xxx xxx”.
- the means 10 is for this purpose connected to a suitable control system 40 which enables to initiate the test call according to instructions received from this control system 40.
- the control system 40 is for example a suitably programmed computer that is directly connected to the means 10, but it might also be a remote computer system that is connected to the means 10 by means of a suitable network interface, such as for example a LAN or the internet, to enable exchange of instructions and/or data through this networks.
- system 1 for detection of a bypass is not limited to a system with only one means 10, it can however comprise any suitable number of means 10 dispersed among any suitable number of outside telecommunication networks, such as for example eight means 10 for different telecommunication networks in France and three means 10 for roaming telecommunication network partners in Ghana.
- the bypass detection system 1 also comprises a receiver probe 20.
- This receiver probe 20 can for example also be a GSM mobile phone or any other type of device with a subscription for terminating the test call.
- the receiver probe 20 can for example comprise a subscription to the telecommunication network 50 under test "+32 474 123 456".
- the receiver probe 20 is also connected to a suitable control system 40.
- the control system 40 receives from the receiver probe 20 call information comprising a received calling line identification (CLI) of the test call.
- CLI calling line identification
- the system 1 is also not limited to a system with only one receiver probe 20. It can comprise any suitable number of receiver probes 20 with a subscription for terminating test calls.
- the call information comprises a received CLI of the test call and optionally other data relating to the call such as for example the time and date the test call was exactly received, the time and date at which the test call started ringing, the time and date at which the test call was terminated, an indicator for whether the test call was picked up, the phone number associated with the means 20, the presentation indicator, ... .
- the control system 40 initiates the test call by activating the means 10 which subsequently originates the test call by calling the subscription to the telecommunication network 50 under test in the receiver probe 20.
- the test call is then sent to the telecommunication network 50 under test, for example optionally via one or more carriers 60.
- the test call passes interconnect 530 of the telecommunication network 50 under test who routes the test call to the receiver probe 20.
- the receiver probe 20 receives the incoming test call. It is not required for the receiver probe 20 to actually answer the test call.
- the control system 40 could for example be configured in such a way that it instructs means 10 to initiate the test call to the receiver probe 20 and to automatically disconnect the test call after allowing three rings.
- the control system 40 then receives from the predetermined receiver probe 20 call information that comprises a received CLI, which is transmitted just before or after the first ring, and optionally other data concerning the test call. This could be done for example by downloading the call information from the receiver probe 20 to the control system 40 or by transmitting it to the control system 40 in any suitable way, by for example a wired or wireless connection means.
- the control system 40 then analyses the received CLI. [37] This analysis can be executed as a simple comparison with the calling party number associated with means 10 that the control system 40 instructed to initiate the test call.
- this received CLI for example "+44 20 1234 5678”
- the analysis can be done with even more reduced complexity and increased reliability. It can be determined whether the received CLI is a call that originated from within the telecommunication network 50 under test, this means an on net call, by for example analysing whether the prefix of the received CLI differs from the prefix associated with the numbering plan of the telecommunication network 50 under test.
- this analysis of the received CLI indicates the calling party of the test call is not from within the telecommunication network under test, no bypass was detected. Thus as soon as the analysis is able to ascertain that the received CLI does not belong to the numbering plan associated with the telecommunication network 50 under test, no bypass within the network under test was detected. In order to also take into account number portability the analysis could comprise a check if the received CLI comprises a number which is comprised in the number database of the telecommunication network 50 under test. If this is not the case, no bypass within the network under test was detected. In general, because the means 10 originates the test call from outside the telecommunication network 50 under test, the presence of a bypass can be detected if the received CLI belongs to a subscription to the telecommunication network 50 under test.
- FIG. 39 Another possibility for analysis is to check if the received CLI comprises the same country code as the country code associated the telecommunication network 50 under test.
- the means 10 in many cases originates a test call from a country other than the one from the telecommunication network 50 under test this provides a tool for determining whether a bypass is present.
- Figure 2 shows the same system 1 according to Figure 1 in operation, but now there is a bypass 540 in place and this bypass 540 reroutes the test call.
- the control system 40 now initiates a test call between means 10 and receiver probe 20 and the call is rerouted optionally via one or more carriers 60 to the bypass 540 a detection of the bypass 540 is possible as explained below.
- Such a bypass 540 also known as for example a GSM gateway or SIM box when it concerns a wireless telecommunication network or a leaky PBX when it concerns a wired telecommunication network, is operated by interconnection bypass operators that route part of the traffic to the telecommunication network 50 under test from outside telecommunication network 50 via for example a suitable internet interface with one of the carriers 60 towards a bypass 540 which normally makes use of a plurality of subscriptions, for example "+32 474 1 1 1 222", that operate within the telecommunication network 50 under test and which convert the incoming test call into a new call originating from a subscription to the telecommunication network 50, "+32 474 1 1 1 222", and to the same destination and as such bypass the interconnect 530.
- the control system 40 now receives the receiver call information from the receiver probe 20 that received the test call initiated from means 10, the received CLI, "+32 474 1 1 1 222" will not match the calling party number, "+44 20 1234 5678", associated with means 10. This is because instead of the calling party number of means 10, the calling party number of one of the subscriptions in the bypass 540, "+32 474 1 1 1 222", will be in the CLI received by receiver probe 20. The control system 40 is then able to assess that a bypass 530 is present. [42] As explained above because the means 10 originates the test call from outside the telecommunication network 50 under test, the presence of a bypass 540 can be detected if the received CLI belongs to a subscription to the telecommunication network 50 under test.
- test call results in an identifiable call pattern. The test call after initiation allows for a few rings and is then ended without being picked up.
- this identifiable call pattern would enable the bypass operator to easily identify each of those means 10 and/or the subscriptions 201 , 202 for terminating the test call used in the receiver probes 20 as the test calls from these means 10 to the these terminating subscriptions 201 , 202 are usually not picked up as explained above.
- the bypass operator or carrier 60 could then blacklist the means 10 and/or the subscriptions 201 , 202 for terminating the test call used in the receiver probes 20 and stop routing calls from or to the bypass 540 in order to avoid detection by the system 1 .
- the system 1 therefor implements counter measures to avoid discovery.
- the common concept behind these countermeasures is that the system 1 tries to more closely align with normal human calling patterns instead of the calling pattern associated with prior art systems for identifying a bypass 540.
- system 1 In a first embodiment according to the invention this is implemented by configuring system 1 , generally by means of its control system 40, to pick up a number of the test calls that are originated by one or more means 10. This will make it more difficult for the bypass operators, or carriers 60 up front involved with routing call traffic to the bypass operators, to detect, by analysing the calling behaviour towards the respective receiver probes 20, the subscriptions 201 , 202 used for terminating the respective test calls and also the respective means 10 used as calling parties to originate the respective test calls. It is not essential to pick up all the test calls. If for example ten test calls are initiated by the system 1 , four of them could be picked up and the remaining six could still be left unanswered.
- control system 40 for deciding whether to pick up a call could be implemented in the receiver probe 20 itself, but it is equally possible to let the receiver probe 20 be instructed by a separate control system 40 to pick up a specific test call.
- any suitable combination is possible such as for example a distributed control system 40 comprised at least partly within at least one receiver probe 20 and optionally also comprising a separate device forming part of this control system 40.
- a number of test calls is only picked up by the receiver probe 20 if they originated from a suspect route.
- the receiver probe 20 could determine based on information from the control system 40 or optionally provided by means 10 or the time at which the test call was scheduled when exactly a test call on a specific suspect route was received. By limiting the receiver probe 20 to only pick up test calls along this suspect route the cost associated with picking up test calls is further minimized while not unnecessary increasing the risk for counter detection.
- the Answer/Seizure ratio (ASR) of these test calls which is the number of picked up calls divided by the total number of calls attempted multiplied by 100, must not necessarily be as high as that associated with normal human behaviour which is normally higher than 50%. The ASR should however be closer to that of normal human behaviour then not picking up any test calls at all. In this respect the ASR of these test calls could vary in the range of 20% to 70%, such as for example 40%.
- determination of a suspect route is made in real time by analysis of the received CLI during the test call.
- the analysis of the CLI which leads to the detection of the presence of a bypass can thus be performed while the test call is ringing.
- the control system 40 instructs the receiver probe 20 to pick up the test call or not on the basis of the outcome of this analysis of the CLI.
- test call parameters such as the test the start time of a test call, duration of a test call, ringing duration of a test call, etc. or any suitable combination of these parameters could be randomized or could be provided with a pattern that resembles human behaviour. For example instead of a fixed calling pattern for initiating ten test calls every five minutes, the interval between these test calls could be randomized to select random intervals between the initiation of the respective test calls for example in a range between one and ten minutes.
- a randomized amount of rings could be set up, for example allowing between two and seven rings before picking up or closing ending the test call.
- the call duration could be randomized, for example between thirty seconds and five minutes.
- call parameter randomisations allow to decrease the risk of counter detection because they avoid the availability of a fixed calling pattern that could be detected by the bypass 540 operators in an attempt to counter detect system
- system is optionally further configured to randomize the timing of one or more signalling messages, such as for example: SS7 Initial Address Message (IAM); Address Complete Message (ACM); Answer Message (ANM), and similar signalling messages; or SIP Invite, Progress, OK, Ack, Bye, and similar signalling messages.
- IAM SS7 Initial Address Message
- ACM Address Complete Message
- ANM Answer Message
- SIP Invite Progress, OK, Ack, Bye, and similar signalling messages.
- the signals exchanged between telecommunication networks namely comprise two fields, a CLI field which contains the calling party telephone number and a presentation indicator (PI) which indicates whether the CLI can be shown or not.
- the PI has three states: “available” means that there is a CLI and it can be shown, “unavailable” means that there is no CLI present and “restricted” means that there is a CLI present, but it cannot be shown.
- bypass 540 When the operator of bypass 540 enables the CLIR function for the subscriptions the bypass 540 makes use of, the last switch in the path will not pass on the CLI to the terminating subscription used in the receiver probe 20.
- CLIR function can for example be found in the ITU CCITT 1.251 .4 specification or the 3GPP TS 24.081 specification.
- the system according to the invention makes use of a receiver probe 20 that comprises a subscription configured with a calling line identification restriction override (CLIRO) function.
- CLIRO calling line identification restriction override
- This is a feature implemented in the equipment of the telecommunication network 50. The feature will instruct the final switch in the path of the test call to ignore the PI if it is set to "restricted” and still pas on the CLI to the terminating subscription of the receiver probe 20. Then, even if the bypass 540 makes use of a CLIR function the receiver probe 20 will always be able to detect the CLI of the incoming test call. This will enable the system 1 to detect and/or subsequently disable the specific subscriptions that are in use in the bypass 540.
- CLIR calling line identification restriction override
- the method for detecting the bypass 540 of the interconnect 530 to a telecommunication network 50 under test thus comprises the following steps: • the means 10 originate one or more tests call to said telecommunication network 50 under test from outside the telecommunication network 50 under test;
- the at least one receiver probe 20 terminates said test calls and picks up a number of these test calls;
- control system 40 initiates the test calls; receives from the receiver probe 20 call information comprising a received CLI of the test call; and analyses the received CLI in order to detect the presence of the bypass 540 when the bypass 540 is present during the test call.
- top, bottom, over, under, and the like are introduced for descriptive purposes and not necessarily to denote relative positions. It is to be understood that the terms so used are interchangeable under appropriate circumstances and embodiments of the invention are capable of operating according to the present invention in other sequences, or in orientations different from the one(s) described or illustrated above.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11808658.6A EP2676425A1 (en) | 2011-02-15 | 2011-12-29 | A bypass detection system resembling human behaviour |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11154568A EP2490423A1 (en) | 2011-02-15 | 2011-02-15 | A bypass detection system resembling human behaviour |
PCT/EP2011/074233 WO2012110161A1 (en) | 2011-02-15 | 2011-12-29 | A bypass detection system resembling human behaviour |
EP11808658.6A EP2676425A1 (en) | 2011-02-15 | 2011-12-29 | A bypass detection system resembling human behaviour |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2676425A1 true EP2676425A1 (en) | 2013-12-25 |
Family
ID=45491567
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11154568A Withdrawn EP2490423A1 (en) | 2011-02-15 | 2011-02-15 | A bypass detection system resembling human behaviour |
EP11808658.6A Withdrawn EP2676425A1 (en) | 2011-02-15 | 2011-12-29 | A bypass detection system resembling human behaviour |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP11154568A Withdrawn EP2490423A1 (en) | 2011-02-15 | 2011-02-15 | A bypass detection system resembling human behaviour |
Country Status (4)
Country | Link |
---|---|
EP (2) | EP2490423A1 (en) |
EA (1) | EA201391101A1 (en) |
WO (1) | WO2012110161A1 (en) |
ZA (1) | ZA201306851B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3016761B1 (en) * | 2014-01-23 | 2016-01-22 | Araxxe | METHOD AND SYSTEM FOR DETECTING BYPASS OF A MOBILE TELEPHONY NETWORK DURING NON-SYNCHRONIZED COMMUNICATIONS |
EP3122678B1 (en) * | 2014-03-28 | 2020-05-06 | KONE Corporation | Processing test calls from elevator emergency telephones |
FR3052948B1 (en) * | 2016-06-16 | 2018-07-06 | Araxxe | METHOD AND SYSTEM FOR BYPASS DETECTION IN A MOBILE TELEPHONY NETWORK |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SE9303440L (en) * | 1993-10-19 | 1995-04-20 | Telia Ab | Device for digital communication network |
GB9714227D0 (en) | 1997-07-04 | 1997-09-10 | British Telecomm | A method of scheduling calls |
FR2908572B1 (en) | 2006-11-09 | 2009-03-13 | Araxxe Soc Par Actions Simplif | "METHOD AND SYSTEM FOR GENERATING PLANNED COMMUNICATION OPERATIONS ON NETWORKS AND INFORMATION SYSTEMS, AND IMPLEMENTING SUCH METHOD IN A CHARGING VERIFICATION PROCESS" |
GB2464261A (en) * | 2008-10-03 | 2010-04-14 | Vodafone Plc | Mobile Telecommunications Network Roaming |
SE533821C2 (en) * | 2009-06-12 | 2011-01-25 | Peter Olov Lager | Systems for measuring telecommunication quality with operator-common test equipment |
-
2011
- 2011-02-15 EP EP11154568A patent/EP2490423A1/en not_active Withdrawn
- 2011-12-29 EA EA201391101A patent/EA201391101A1/en unknown
- 2011-12-29 WO PCT/EP2011/074233 patent/WO2012110161A1/en active Application Filing
- 2011-12-29 EP EP11808658.6A patent/EP2676425A1/en not_active Withdrawn
-
2013
- 2013-09-11 ZA ZA2013/06851A patent/ZA201306851B/en unknown
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2012110161A1 * |
Also Published As
Publication number | Publication date |
---|---|
EP2490423A1 (en) | 2012-08-22 |
ZA201306851B (en) | 2014-11-26 |
EA201391101A1 (en) | 2014-03-31 |
WO2012110161A1 (en) | 2012-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8031849B1 (en) | Telephony system and method with enhanced fraud control | |
US7570743B2 (en) | Method and apparatus for surveillance of voice over internet protocol communications | |
KR101129752B1 (en) | Detection of spam/telemarketing phone campaigns with impersonated caller identities in converged networks | |
US20050094623A1 (en) | Apparatus and method for voice over IP traffic separation and factor determination | |
EP3809683A1 (en) | Method and apparatus for threat identification through analysis of communications signaling, events, and participants | |
CN104735272B (en) | The hold-up interception method and system of a kind of harassing call | |
EP3226528A1 (en) | Method and system for detection of interconnect bypass using test calls to real subscribers | |
US20090041205A1 (en) | Methods, systems, and computer program products for detecting and mitigating ping call events in a communications network | |
EP2509294B1 (en) | A telecommunication network bypass detection system with reduced counter detection risk | |
EP2671372B1 (en) | A system for detection of a bypass of an interconnect to a telecommunication network | |
WO2005039203B1 (en) | Methods and systems for detecting and mitigating call routing arbitrage in a telecommunications network | |
CN102438243A (en) | Method for identifying harassing phone call by analyzing frequency of phone call | |
EP2676425A1 (en) | A bypass detection system resembling human behaviour | |
CN107968731B (en) | The aobvious number method for detecting abnormality of one kind and server | |
EP2732610B1 (en) | A bypass detection system with false positive avoidance | |
WO2019190438A2 (en) | Ott bypass fraud detection by using call detail record and voice quality analytics | |
US7945037B1 (en) | System and method for remote call forward detection using signaling | |
EP1936933A1 (en) | Method of performing call progress analysis, call progress analyzer and caller for handling call progress analysis result | |
OA16534A (en) | A bypass detection system resembling human behaviour. | |
KR20100034289A (en) | System for blocking ars and one ring spam telephone and method therefor | |
EP2536113A1 (en) | Shadow network for bypass detection | |
OA16695A (en) | ||
OA18756A (en) | A System for Detection of a Bypass of an Interconnect to a Telecommunication Network. | |
KR20200003350A (en) | Apparatus and method for detecting illegal call | |
Wu et al. | International Caller ID Spoofing Fraud Prevention for IP Multimedia Subsystem Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20130916 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
RAX | Requested extension states of the european patent have changed |
Extension state: BA Extension state: ME |
|
RAX | Requested extension states of the european patent have changed |
Extension state: ME Payment date: 20130916 Extension state: BA Payment date: 20130916 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIGOS NV |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20180808 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20181219 |