GB2448719A - Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID - Google Patents

Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID Download PDF

Info

Publication number
GB2448719A
GB2448719A GB0707970A GB0707970A GB2448719A GB 2448719 A GB2448719 A GB 2448719A GB 0707970 A GB0707970 A GB 0707970A GB 0707970 A GB0707970 A GB 0707970A GB 2448719 A GB2448719 A GB 2448719A
Authority
GB
United Kingdom
Prior art keywords
telephony
telephone number
call
code
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0707970A
Other versions
GB0707970D0 (en
Inventor
Nigel Barnes
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TELEMEDIA HUB Ltd
Original Assignee
TELEMEDIA HUB Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TELEMEDIA HUB Ltd filed Critical TELEMEDIA HUB Ltd
Priority to GB0707970A priority Critical patent/GB2448719A/en
Publication of GB0707970D0 publication Critical patent/GB0707970D0/en
Publication of GB2448719A publication Critical patent/GB2448719A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q3/00Selecting arrangements
    • H04Q3/72Finding out and indicating number of calling subscriber
    • H04L29/06639
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42008Systems for anonymous communication between parties, e.g. by use of disposal contact identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/57Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
    • H04M1/571Blocking transmission of caller identification to called party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1307Call setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13091CLI, identification of calling line
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/13339Ciphering, encryption, security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A telephony security system for location within a telecommunications network at a gateway between a telephony network and at least one telephony bureau, comprising a network node for routing traffic associated with a call from the telephony network to the or a destination one of the telephony bureau(s), which node comprises a processing unit, comprising means for correlating a telephone number Identification (ID) of telephony traffic associated with the call with a code for the telephone number; and means for replacing the telephone number ID in the telephony traffic associated with the call with the code before the telephony traffic is routed onwards from the network node. Aspects of the invention include replacing the code with the telephone number ID and wherein correlating and replacing comprises encrypting/decrypting the telephone number ID/code respectively.

Description

Telephony Security System The present invention relates to a telephony
security system for protecting telephone numbers against misuse.
A set of data including information about callers including the telephone numbers of the callers is open to misuse if it is transferred to unauthorised recipients. Telephony is commonly used for gathering such a set of data and/or for contacting the callers using the set of data. Where high volumes of callers are involved it is usual for a telephony bureau to gather the set of data on behalf of an authonsed recipient of the set of data. There is a risk of the * bureau, a sub-contractor of the bureau (which itself may be a different independent telephony bureau) or an employee of the bureau or sub-S...
: contractor misusing the set of data, for example, by using it for their own S...
* purposes, passing or offering it for sale to third parties, etc. **
S
S
S.....
* The present invention aims to overcome at least some of the problems set out S..... * S
above.
According to the present invention, there is provided a telephony security system for location within a telecommunications network at a gateway between a telephony network and at least one telephony bureau, comprising: a network node for routing traffic associated with a call from the telephony network to the or a destination one of the telephony bureau(s), which node comprises a processing unit, comprising: means for correlating a telephone number identification of telephony traffic associated with the call with a code for the telephone number; and means for replacing the telephone number identification in the telephony traffic associated with the call with the code before the telephony traffic is routed onwards from the network node.
In this way the telephone number identification is withheld from the telephony bureau. The telephony bureau is able to process the callers and then store any gathered set of data about a caller with the code associated with that caller. This prevents the telephony bureau from misusing telephone number information, while enabling them to process calls. The gathered information for a caller can be re-correlated with the telephone number information from the code, by authorised recipients of the set of data only. *.S * * S
* *. S The present invention also provides, in combination with or in addition to the aspect of the invention set out above, a telephony security system for location S..
S
within a telecommunications network at a gateway between at least one S.* SSS * telephony bureau and a telephony network, comprising: a network node for *... * S
routing traffic associated with a call from the or one of the telephony bureau(s) to the telephony network, which node comprises a processing unit, comprising: means for correlating a code from the telephony traffic associated with the call with a telephone number identification for the call; and means for replacing the code with the telephone number identification in the telephony traffic associated with the call before the telephony traffic is routed onwards from the network node.
This enables the telephony bureau to contact callers, without having access to their telephone numbers. Again this prevents misuse of telephone number information by the telephony bureaus. The network node processing means may include monitoring means to monitor the calls made by the telephony bureaus via the network node so as to ensure that the telephony bureaus are working within a remit set for them, ie. they are not misusing their telephony access to the callers. The network node processing means may also include monitoring means for checking that the telephony bureau is authorised for telephony access to the caller.
The means for correlating may comprise means for encrypting the telephone * number identification so as to generate the code and for decrypting the code :: so as to generate the telephone number identification. Alternatively, the * means for correlating may allocate an arbitrary code to the telephone number identification and includes means for storing a set of resulting telephone ** * number identification and associated code pairs, and means for retrieving the ** Sd*S * * telephone number information from the code.
* . S S * S Depending on where the replacement of the telephone number information with the code and/or the replacement of the code with the telephone number information takes place within the network node, the network node may comprise means for routing telephony traffic in accordance with the code and/or means for routing telephony traffic in accordance with the telephone number identification.
The system may additionally comprise a database of correlated pairs of telephone number identifications and codes. This database can be used by an authorised recipient of the set of data to recover the telephone number information from the code.
The present invention also provides a telephony security method for a telecommunications network for use at a gateway between a telephony network and at least one telephony bureau, comprising the steps of: receiving incoming telephony traffic associated with a call from the telephony network to a destination telephony bureau; correlating a telephony number identification of the telephony traffic associated with the call with a code for the telephone number; and replacing the telephony number identification in the telephony * ** traffic associated with the call with the code: and routing the telephony traffic I...
associated with the call to the destination telephony bureau. * *S d * S **** S.. *
In this way, as is described above, the telephone number identification is S.....
withheld from the telephony bureau. The telephony bureau is able to process *..S.* * S the callers and then store any gathered set of data about a caller with the code associated with that caller. This prevents the telephony bureau from misusing telephone number information, while enabling them to process calls.
The gathered information for a caller can be re-correlated with the telephone number information from the code, by authorised recipients of the set of data only.
The present invention also provides, either in combination with or in addition to the method described above, a method for a telecommunications network for use at a gateway between at least one telephony bureau and a telephony network, comprising the steps of: receiving incoming telephony traffic associated with a call from the or one of the telephony bureaus to the telephony network; correlating a code from the telephony traffic associated with the call with a telephone number identification for the call; replacing the code with the telephone number identification in the telephony traffic associated with the call; and routing the telephony traffic associated with the call to the telephony network.
This enables the telephony bureau to contact callers, without having access to their telephone numbers. Again this prevents misuse of telephone number information by the telephony bureaus. The network node processing means may include monitoring means to monitor the calls made by the telephony bureaus via the network node so as to ensure that the telephony bureaus are *.S.
S...,. working within a remit set for them, ie. they are not misusing their telephony : *". access to the callers. The network node processing means may also include monitoring means for checking that the telephony bureau is authonsed for telephony access to the caller. S..
S
The correlating step may comprise encrypting the telephone number identification so as to generate the code and/or decrypting the code so as to generate the telephone number identification. Alternatively, the step of correlating may comprise allocating an arbitrary code to the telephone number identification, storing a set of resulting telephone number identification and associated code pairs, and retrieving the telephone number information from the code using the stored pair.
Depending on where the replacement of the telephone number information with the code and/or the replacement of the code with the telephone number information takes place within the network node, the method may comprise the step of routing telephony traffic in accordance with the code and/or routing telephony traffic in accordance with the telephone number identification.
The method may additionally comprise the step of generating a database of associated pairs of telephone number identifications and codes.
According to the system and/or method according to the present invention described above, the telephony network may be a public network accessible *:*::* by the general public for making calls. * * S...
: ., The invention will now be described by way of example only and with
S
reference to the accompanying schematic drawings, wherein:
S
S..... S *
Figure 1 shows a telecommunications network within which the security system according to the present invention is employed; and Figure 2 shows a flow diagram of the operation of the security system according to the present invention.
An authorised recipient (2) carries a set of data about its clients (20, 22, 24) and for each client this may include the telephone number of the client. The authorised recipient of data (2) may contract a first independent telephony bureau (4) to process telephone calls from and/or to its clients. Generally, this would result in the first bureau (4) building up a set of data including details of clients in association with the telephone number of each client. If the first telephony bureau sub-contracts a second telephony bureau (6) to process the calls, then the second bureau would also build up a set of data. In addition, the authonsed recipient (2) may contract a third telephony bureau (8) to process telephone calls from and/or to its clients for other purposes, in which case the third bureau will also build up a set of data. The authonsed recipient of data (2) may contract a fourth independent telephony bureau (10) to process telephone calls to and/or from new callers. Generally, this would result in the fourth telephony bureau (10) building up a set of data including details of clients in association with the telephone number of each client.
*::::* Again, if the fourth telephony bureau (10) sub-contracts a fifth telephony : .. bureau (12) to process the calls, then the fifth bureau would also build up a setof data. e
S S
In addition, new callers might be directed to contact the authonsed recipient (2) via one of the telephony bureaus (4 to 12), resulting in the bureaus holding sets of data including details of clients in association with the telephone number of each client.
The clients (20, 22, 24) communicate with the telephony bureaus (4 to 12) by making calls to them via a telephony network (30), which may include a plurality of sub-networks, each of which are capable of carrying telephony traffic. Many such sub-networks are well known in the art of telecommunications and may include POTS, wireless, cable and satellite telecommunication networks and/or the public internet. Many types of telephony traffic are well known in the art of telecommunications and may include voice or text calls, data, video, multimedia calls, etc. Calls from the clients (20, 22, 24) intending to contact the authorised recipient (2) [Fig 2, Box A] are routed, based on the telephone number dialled by the client, to the relevant telephony bureau (4 to 12) from the network (30) via a network node (18) [Fig 2, Box B]. The method steps which may be carried out by the network node (18) are indicated by the dotted line in Figure 2.
The incoming telephony traffic received by the network node (18) from each of the clients (20, 22, 24) of the authonsed recipient (2) incorporates data : .. identifying the telephone number of the respective client [Tel. No. l.D. in Fig *S..
2]. For each call routed to the network node (18), data identifying the telephone number of the client originating the call is retrieved from the incoming telephony traffic for that call [Fig 2, Box C]. The retrieved data is retrieved from incoming traffic associated with the call by a processing unit (32) of the network node (18). The retrieved data is then encrypted by an encrypt/decrypt unit of the processing unit (32) [Fig 2, Box D]. The resulting encrypted data is then included in the outgoing telephony traffic for that call, in place of the data identifying the telephone number, by the processing unit (32) [Fig 2, Box El. The outgoing telephony traffic is then switched by the switching unit (34) of the network node (18) and onwardly transmitted towards the appropriate bureau (4 to 12) [Fig 2, Box F]. The resulting encrypted data in the outgoing traffic for a call replaces the data identifying the telephone number in the incoming traffic for that call. Accordingly, the telephony bureaus (4 to 12) cannot access the telephone numbers of the clients (20, 22, 24) and instead of a telephone number, the bureaus associate the encrypted data for that call, with any other information about the caller [Fig 2, Box G].
Then any data gathered by the telephony bureaus (4 to 12) about a caller can be forwarded to the authorised recipient along with the associated encrypted data [Fig 2, Box H].
The authorised recipient (2) has access to the encryption key utilised by the processing unit (32), or to a database which is set up to associate the encrypted data for a call with the telephone number for that call, and so is able *::,* to recover the data identifying the telephone number. * ** * * * ****
Where a telephony bureau (4 to 12) wishes to make a call to a client (20, 22, 24) of the authorised recipient (2) [Fig 2, Box I], the telephony traffic for that call incorporates the encrypted data relating to the telephone number of the client and is routed by the telephony bureau (4) to the network node (18) [Fig 2, Box J]. For each call routed to the network node (18), the encrypted data is retneved from incoming traffic associated with the call by the processing unit (32) of the network node (18) [Fig 2, Box K]. The retrieved encrypted data is then decrypted by an encrypt/decrypt unit of the processing unit (32) so as to recover the data identifying the telephone number [Fig 2, Box LI. The data identifying the telephone number is then included in the outgoing telephony traffic for that call, in place of the encrypted data, by the processing unit (32) [Fig 2, Box M]. The call is then authonsed by the processing unit (32) [Fig 2, Box NI. If the call receives a positive authorisation, the outgoing telephony traffic associated with the call is then onwardly transmitted by the network node towards the appropriate client (20, 22, 24) [Fig 2, Box P1.
The authonsation is carried out by the processing unit (32) [Fig 2, Box N], which checks whether the telephony bureau (4 to 12) from which the telephony traffic originated is authorised at that time by the authonsed recipient (2) to send telephony traffic to the client (20, 22, 24). To this end the processing unit (32) comprises or has access to a memory or database (36) recording for each telephony bureau (4 to 12) which clients (20, 22, 24) the *:::* bureau is authonsed to transmit calls via the network node (18). If the telephony bureau (4 to 12) is authorised for that client a positive authorisation : ***, results, otherwise a negative authonsation results which causes the call to be *e..
blocked by the network node (18) [Fig 2, Box 0]. The memory or database (36) can be updated remotely by the authonsed recipient (2) or a trusted agent thereof.

Claims (15)

1. A telephony security system for location within a telecommunications network at a gateway between a telephony network and at least one telephony bureau, comprising: a network node for routing traffic associated with a call from the telephony network to the or a destination one of the telephony bureau(s), which node comprises a processing unit, comprising: means for correlating a telephone number identification of telephony traffic associated with the call with a code for the telephone number; and means for replacing the telephone number identification in the telephony traffic associated with the call with the code before the telephony traffic is routed onwards from the network node.
2. A telephony security system for location within a telecommunications network at a gateway between at least one telephony bureau and a telephony : *" network, comprising: *S..
a network node for routing traffic associated with a call from the or one of the telephony bureau(s) to the telephony network, which node comprises a processing unit, comprising: means for correlating a code from the telephony traffic associated with the call with a telephone number identification for the call; and means for replacing the code with the telephone number identification in the telephony traffic associated with the call before the telephony traffic is routed onwards from the network node.
3. A telephony system according to claim 1 wherein the means for correlating comprises means for encrypting the telephone number identification so as to generate the code.
4. A telephony system according to claim 2 wherein the means for correlating comprises means for decrypting the code so as to generate the telephone number identification.
5. A telephony system according to claim 1 or claim 2 wherein the network node comprises means for routing telephony traffic in accordance with the code. * ** * S I * **
6. A telephony system according to claim I or claim 2 wherein the network : *. node comprises means for routing telephony traffic in accordance with the S...
telephone number identification.
S
S.....
7. A telephony system according to claim 1 and/or claim 2 or any one of claims 3 to 6 additionally comprising a database of correlated pairs of telephone number identifications and codes.
8. A telephony security method for a telecommunications network for use at a gateway between a telephony network and at least one telephony bureau, comprising the steps of: receiving incoming telephony traffic associated with a call from the telephony network to a destination telephony bureau; correlating a telephony number identification of the telephony traffic associated with the call with a code for the telephone number; and replacing the telephony number identification in the telephony traffic associated with the call with the code; and routing the telephony traffic associated with the call to the destination telephony bureau.
9. A telephony security method for a telecommunications network for use at a gateway between at least one telephony bureau and a telephony network, comprising the steps of: receiving incoming telephony traffic associated with a call from the or * *.
one of the telephony bureaus to the telephony network; : *, correlating a code from the telephony traffic associated with the call **..
with a telephone number identification for the call; replacing the code with the telephone number identification in the telephony traffic associated with the call; and routing the telephony traffic associated with the call to the telephony network.
10. A method according to claim 8 wherein the correlating step comprises encrypting the telephone number identification so as to generate the code.
11. A method according to claim 9 wherein the correlating step comprises decrypting the code so as to generate the telephone number identification.
12. A method according to claim 8 or claim 9 comprising the step of routing telephony traffic in accordance with the code.
13. A method according to claim 8 or claim 9 comprising the step of routing telephony traffic in accordance with the telephone number identification.
14. A method according to claim 8 and/or claim 9 or any one of claims 10 to 13 additionally comprising the step of generating a database of associated pairs of telephone number identifications and codes. * .* * * S * I. **.*
15. A system or method according to any one of the preceding claims : .. wherein the telephony network is a public network. S... a..
S
S. a... * .
S
S..... S 5
GB0707970A 2007-04-25 2007-04-25 Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID Withdrawn GB2448719A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0707970A GB2448719A (en) 2007-04-25 2007-04-25 Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0707970A GB2448719A (en) 2007-04-25 2007-04-25 Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID

Publications (2)

Publication Number Publication Date
GB0707970D0 GB0707970D0 (en) 2007-05-30
GB2448719A true GB2448719A (en) 2008-10-29

Family

ID=38135394

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0707970A Withdrawn GB2448719A (en) 2007-04-25 2007-04-25 Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID

Country Status (1)

Country Link
GB (1) GB2448719A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2524579A (en) * 2014-03-28 2015-09-30 Voxygen Ltd Caller identity

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997023983A1 (en) * 1995-12-22 1997-07-03 Mci Communications Corporation System and method for ensuring user privacy in network communications
WO2001026391A1 (en) * 1999-10-01 2001-04-12 Koninklijke Philips Electronics N.V. Selective telephone caller identification service
WO2002003213A1 (en) * 2000-06-30 2002-01-10 Plurimus Corporation Method and system for monitoring online behavior at a remote site and creating online behavior profiles
WO2002082838A1 (en) * 2001-04-04 2002-10-17 Telecom Italia S.P.A. Process for transmitting sms messages with protected identity
JP2003069695A (en) * 2001-08-24 2003-03-07 Kyocera Corp Portable telephone set
JP2004179915A (en) * 2002-11-26 2004-06-24 Sharp Corp Communication method, communication system, and communication terminal
US20040199789A1 (en) * 2002-12-30 2004-10-07 Shaw Terry D. Anonymizer data collection device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1997023983A1 (en) * 1995-12-22 1997-07-03 Mci Communications Corporation System and method for ensuring user privacy in network communications
WO2001026391A1 (en) * 1999-10-01 2001-04-12 Koninklijke Philips Electronics N.V. Selective telephone caller identification service
WO2002003213A1 (en) * 2000-06-30 2002-01-10 Plurimus Corporation Method and system for monitoring online behavior at a remote site and creating online behavior profiles
WO2002082838A1 (en) * 2001-04-04 2002-10-17 Telecom Italia S.P.A. Process for transmitting sms messages with protected identity
JP2003069695A (en) * 2001-08-24 2003-03-07 Kyocera Corp Portable telephone set
JP2004179915A (en) * 2002-11-26 2004-06-24 Sharp Corp Communication method, communication system, and communication terminal
US20040199789A1 (en) * 2002-12-30 2004-10-07 Shaw Terry D. Anonymizer data collection device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2524579A (en) * 2014-03-28 2015-09-30 Voxygen Ltd Caller identity

Also Published As

Publication number Publication date
GB0707970D0 (en) 2007-05-30

Similar Documents

Publication Publication Date Title
CA2670510C (en) Intercepting voice over ip communications and other data communications
US7231027B2 (en) Encapsulation, compression, and encryption of PCM data
US7769176B2 (en) Systems and methods for a secure recording environment
US20060010321A1 (en) Network system, data transmission device, session monitor system and packet monitor transmission device
US7330968B2 (en) Communication network system having secret concealment function, and communication method
US7853800B2 (en) Systems and methods for a secure recording environment
US20060129629A1 (en) Communication method, communication system, relay system, communication program, program for communication system, mail distribution system, mail distribution method, and mail distribution program
CN102202299A (en) Realization method of end-to-end voice encryption system based on 3G/B3G
US20080005568A1 (en) Systems and methods for a secure recording environment
KR20120027485A (en) Efficient key management system and method
CN103401949A (en) Personal data safety sharing system and method for mobile phone
JP4692776B2 (en) Method for protecting SIP-based applications
US20100177899A1 (en) Encrypted communication system
CN101252596A (en) Method and system for protecting number information privacy
US20060200666A1 (en) Methods, communication networks, and computer program products for monitoring communications of a network device using a secure digital certificate
US20080151873A1 (en) Virtual internet protocol interconnection service
JP4206106B2 (en) Call connection method, call connection system, and call connection program
CN102113301B (en) Access management for connection-accompanying data of telecommunication connections
GB2448719A (en) Telephony Security System correlating a telephone number ID with a code to prevent unauthorized use of the telephone number ID
US9131044B2 (en) Method for activation of at least one further eavesdropping measure in at least one communication network
CN105025176A (en) Telephone number secrecy method, system and equipment
WO2007080422A1 (en) Privacy system for telephone numbers
JP2008206093A (en) Signal transfer system and method
KR100458954B1 (en) Method for transmitting a encryption data
WO2005117373A1 (en) Cryptographic system with ip telephone units used as terminating terminals

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)