MX2008001796A - Network support for restricting wireline call terminations in a security risk area - Google Patents

Network support for restricting wireline call terminations in a security risk area

Info

Publication number
MX2008001796A
MX2008001796A MX/A/2008/001796A MX2008001796A MX2008001796A MX 2008001796 A MX2008001796 A MX 2008001796A MX 2008001796 A MX2008001796 A MX 2008001796A MX 2008001796 A MX2008001796 A MX 2008001796A
Authority
MX
Mexico
Prior art keywords
call
security risk
called party
area
risk area
Prior art date
Application number
MX/A/2008/001796A
Other languages
Spanish (es)
Inventor
Owen Goldman Stuart
E Krock Richard
F Rauscher Karl
Philip Runyon James
Original Assignee
Lucent Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lucent Technologies Inc filed Critical Lucent Technologies Inc
Publication of MX2008001796A publication Critical patent/MX2008001796A/en

Links

Abstract

A precautionary measure against wireline-device triggered bombs is described that restricts call terminations within a designated security risk area without shutting down an entire telephone office switch serving the affected area. Embodiments described herein provide for restricting wireline call terminations directed to a designated security risk area that are originated from non-privileged users, i.e., the general public, yet authorizing call terminations directed to the security risk area that are originated from privileged government users (e.g., GETSAVPS users). Call originations are permitted within the security risk area from both privileged and non- privileged users.

Description

NETWORK SUPPORT TO RESTRICT FINALIZATIONS OF CALLS ORIGINATED FROM A WIRE LINE IN A RISK AREA OF SECURITY FIELD OF THE INVENTION This invention generally refers to the field of telecommunication system and, more particularly, to a system and methods for restricting call terminations in certain areas of security risk. BACKGROUND OF THE INVENTION Communication systems are well known where people can receive incoming calls (using, for example, a cordless or cordless telephone) from other people or devices that call the called party's telephone. Typically, the called party's telephone includes a "ringer" to play a ring or melody sequence to alert the called party of the incoming call. Sadly, it is a well-known tactic of terrorist organizations to activate bombs with cordless phones so that the telephone ring bursts the bomb. U.S. Patent Application Serial No. 11/187232, filed July 22, 2005, describes precautionary measures to respond to such threats. However, it is a concern that terrorists also try to activate bombs through wireline devices. It is conceivable that terrorists can occupy any wired device Ref. 188962 which includes, without limitation, traditional POTS telephones or voice over IP (VoIP) telephones to activate a bomb upon receiving the call. This includes public telephones, subscriber lines, Centrex lines and telephones behind Private Telephone Switch (PBX, for its acronym in English). Accordingly, there is an additional need for precautionary measures to protect against the threat of wired telephone-activated pumps. Most particularly, the need for precautionary measures applies to certain areas of security risk and are at high risk of attack. For example, there are often threats against individual structures such as buildings, bridges or historical monuments that reside in a particular geographical area. A challenge faced by governmental and police authorities is to provide a level of protection for such areas that is efficient, even not exaggerated so as not to unduly affect the public. As an example of an exaggerated approach, it is possible that one can close a central office telephone switch that serves a particular security risk area to avoid wireline terminations, and from there avoid wireline activated bombs in the area. However, central office switches generally serve large geographical areas and from here closing the central office will cause significant damage and confusion to the public. In addition, closing the central office will effectively disable certain privileged users of the network such as police, fire or emergency personnel and / or government users to identify and receive emergency calls to deal with the actual threat or disaster situation. In the United States, a Wireless Priority Service (WPS) throughout the country provides priority treatment for privileged users in wireless networks. A complementary system, known as the Government Emergency Telecommunications Service (GETS), provides priority treatment for privileged users in selected landline networks. SUMMARY OF THE INVENTION The present invention provides systems and methods for protection against wired telephone activated bombs while minimizing the affectation to the general public as well as authorized government callers. The embodiments of the invention provide a termination switch of a network originating from a wired line that restricts call terminations originating from a wired line directed to a designated security risk area originating from non-privileged users., that is, the general public, which even authorizes call terminations originated from a wire line in the area of security risk originated from privileged government users. The completion switch may comprise, for example and without limitation, a central office switch of the Public Switching Telephone Network (PSTN) or a VoIP switch. In one embodiment, upon receiving a call originating from an incoming wire line directed to a called party device, an end switch determines a location of the called party's device in relation to the security risk area and determines whether the party's Llama is a privileged user (for example, a GPS or GETS user). The completion switch determines the location of the called party's device based on its directory number, optionally by consulting an intelligent network service control point (SCP) or by independently consulting a database, such as a database used to determine the location of callers at 9-1-1. If the called party device is within the security risk area and the calling party is not a privileged user, the terminating switch prevents the incoming call from being completed thereby preventing the call from activating a pump. The end switch completes the call if the calling party is a privileged user or if the called party is not within the security risk area. In another modality, in response to a finalization that an emergency situation is present or imminent within a critical area that defines an area of security risk, a network operations center sends indications of the emergency situation to one or more end switches to restrict call terminations originated from a wire line in the security risk area for non-privileged users but does not restrict call endings by privileged users. Even in another embodiment, a system comprising means for identifying a security threat condition corresponding to a security risk area and alerting one or more switching elements of the threat condition is provided.; the one or more operable switching elements is in response to the threat condition to avoid call terminations originating from a wire line in the security risk area originating from non-privileged users but allowing call terminations originating from privileged users. In yet another embodiment, an article comprising one or more computer-readable signal support means is provided. The means include means to avoid call terminations originated from a wireline directed to a designated security risk area of non-privileged users and allows call terminations originated from a wireline directed to the security risk area of privileged users. BRIEF DESCRIPTION OF THE FIGURES The above and other advantages of the invention will be apparent from the reading of the following detailed description and with reference to the figures in which: Figure 1 is a block diagram of a communication system that defines an Intelligent Network architecture in which an end switch is attached to an SCP; Figure 2 is a block diagram of a communication system that includes a switch that is not based on an SCP; and Figure 3 is a flow diagram of a method exerted by an end switch in embodiments of the present invention for restricting call endings directed to a designated security risk area. DETAILED DESCRIPTION OF THE INVENTION Figure 1 illustrates the basic architecture of a communication system 100 in which the present invention can be implemented. A plurality of user stations 102, 104 communicate with switching elements 106 receiving, for example, the telephone or central VoIP network offices. Switching elements 106 may comprise, for example, 5ESS or AUTPOPLEX switching systems, available from Licent Technologies, Inc. A network 108 comprising, for example and without limitation, the Public Switched Telephone Network (PSTN) or network Internet Protocol (IP) functionally connects the switching elements 106. For purposes of illustration, it is presumed that the user station 102 ("calling station") initiated a call to one of the user stations 104. The switching elements 106 on the source and end side of the call are known as the source and end switches, respectively. It is noted, however, that calls directed to any of the user stations may be initiated and terminated on the same switch, as was the case for a call from one user station 104 to another station 104. The present invention may be implemented in any scenario. The calling station 102 may comprise any type of wired or wireless telephone or VoIP terminal. As is well known, the calling station dials or types in a directory number of a station of the called party 104 to initiate a call. It is presumed that the called party station 104 comprises a wire terminal such as, for example and without limitation, a traditional POTS telephone, an IP voice telephone (VoIP), public telephone, Centrex line, PBX line, fax or similar.
The called party station 104 may reside within or outside of a designated security risk area 110. Security risk area 1110 defines a geographic area that is at high risk of attack, as may be determined from actual or intelligence reports or similar. To better illustrate the principles of the present invention, a plurality of stations of the so-called probable part 104 are shown, which includes two stations denoted "T" and "G" residing in a designated security risk area 110 and another station denoted " A "which resides outside the security risk area 110. The station" T "defines a terminal called by a non-privileged user and the terminal" G "defines a terminal called by a government authorized user. Among the stations residing in the area of security risk 110, station T is presumed to be equipped for precautionary purposes to detonate a bomb (or at least presents a risk of detonating a bomb) when it receives an incoming call since a non-privileged user originated the call, while station G is presumed to be secure since the authorized governmental user originated the call and presumably knows that station G is not equipped to detonate a bomb. Station A is presumed to be safe since it resides outside the area of security risk 110. When a responsible authority such as, for example, the local or state police, the FDI, or another governmental agency has reason to believe that a bomb is within a security risk area 110 that can possibly be remotely detonated by calling a called party station 104, a representative of such authority informs a network operations center 112 associated with the communication system 100. The network operations center 112 may comprise, for example, a regional command center operated by a service provider for the purpose of administering the network 100. The network operations center 112 by asserting the identity of The authority and legitimacy of the information received determines one or more completion switches that have a service area that covers or extends above the risk area. go security 102 and so on. inform the affected switches. In one embodiment, the act of reporting to an affected switch is accomplished by communicating an emergency condition flag from the network operations center 112 to the switch coincident with the normal call processing. In one embodiment, the emergency condition indicator identifies in some way a geographical boundary or location of the security risk area 110. As will be appreciated, a variety of techniques can be used to identify the security risk area. For example, without limitation, the security risk area 110 may be defined corresponding to the area of an area code of the particular telephone number and / or office code, postal code, civic address or X and Y coordinates. As will be appreciated, the Emergency condition indicator can also be augmented with instructions or additional information that the completion switch can use to determine how to process the incoming call. For example, the emergency condition indicator can identify codes of particular areas and / or office codes of the called stations for which the completion switch does not need to restrict incoming calls or determine the location. The termination switch 106 includes a processor 114 and memory 116 for executing and storing software routines for processing and switching calls directed to the stations of the likely called party 104. The completion switch 106 communicates through the link 118 comprising, for example, a signaling system link 7 (SS7) with an attached platform known as a Service Control Point (SCP) 120. The SCP 120 includes a processor 122 and memory 124 to perform various processing and call switching services. as may be requested by the termination switch 106. This type of network configuration is known as an Intelligent Network and allows it to be performed for at least one call processing portion by the SCP 120 and from there decentralize the switch 106. In a modality, the termination switch 106 operates in conjunction with the SCP 120 to restrict all call endings in the security risk area 110 originated by non-privileged users (for example, directing it to station T), including authorizing user call endings. privileged governments (for example, directed to station G). In that way, station T is prevented from sounding and detonating a pump, even the reliable station G (as well as station A that resides outside the security risk area 110) is allowed to originate and terminate calls. In one embodiment, if an emergency condition is indicated for a particular completion switch, the termination switch 106 upon receiving an incoming call directed to a station called 104 consults the SCP to determine the location of the called station. In response to the query, the SCP consults a network database 126 to determine the location of the called station. In one embodiment, the database 126 comprises a mapping of several directory numbers of the called party to a geographical location and thereafter, the location of a particular called party can be determined based on its number of directories. For example, the database may comprise an adapted existing database that determines the location of callers to 9-1-1, and a reverse review may be made by using this existing data to determine the location of several called stations. When determining the location of the called party, the completion switch or SSP can determine if the location is not within a security risk area 110. Thereafter, during the time the emergency condition is in effect, the termination switch operates to restrict call terminations from the security risk area, as noted, the embodiments of the present invention are provided to avoid call endings from unprivileged users (eg, directed to mobile station T), including updating privileged governmental user call completions (e.g., directed to station G) in the security risk area 110. In a mode, the completion switch determines that the incoming call is from a privileged user (e.g., a call of WPS or GETS) of signaling information in the call request. The signaling information may comprise, for example, a GETS NS / EP indication in an incoming SS7 message or the WPS priority level. As will be appreciated, when the emergency condition is passed and the threat of impending bombs is sufficiently diminished, and the network operations center 112 is informed in this way by a responsible authority, the network operations center 112 can send a command of network management to the completion switch that specifies that the affected area is no longer a security risk area and the call completions can be reactivated. The security area can also be expanded, reduced, or moved as necessary. Figure 2 illustrates a communication system 200 in which the present invention can alternatively be implemented. The communication system 200 is substantially identical to the communication system, with the exception that the completion switch is not based on an SSP to determine the location of the station called 104. Similar reference numbers are used to identify similar elements in the Figure 1 and Figure 2. In the embodiment of Figure 2, if an emergency condition is indicated for the terminating switch 106, the completion switch upon receiving an incoming call directed to a station called 104 independently queries a database 126 to determine the location of the called station. The network database comprises a mapping of several directory numbers of the called party to the geographical location, substantially as described in relation to Figure 1. From here, the location of a particular called station can be determined based on its number of directories. When determining the location of the called party, the completion switch may determine whether the location is within a security risk area 110 and restricts call endings in the security risk area as may be appropriate. Figure 3 is a flow diagram of a method exerted by an end switch 106 for restricting call endings within the designated security risk area 110. In one embodiment, the steps in Figure 3 are implemented, where applicable , by software routine executed within the completion switch 106 and / or SSP 120 as described in relation to Figure 1. Alternatively, a completion switch may be implemented in the steps of Figure 3 without relying on an SSP, such as it was described in relation to Figure 2. Generally, the steps of Figure 3 can be implemented in any computer-readable signal support medium that resides within or away from the completion switch. The computer-readable signal support means may comprise, for example and without limitation, floppy disks, magnetic tapes, CD-ROMs, DVD-ROMs, hard disk drives. or electronic memory. The computer-readable signal support medium storage software, firm programming and / or assembly language to perform one or more functions that relate to the steps of Figure 3. In step 302, the completion switch receives an incoming call from a calling station addressed to a directory number of a station called 104, whose called station receives service by the terminating switch and may receive inside or outside a designated security risk area 110. The completion switch it can also serve the calling station, in which case the terminating switch is both a source and end switch; or the calling station and the call may be covered by different switches. The incoming call may include, without limitation, a voice, video and / or data call, email, page or SMS message. The source of the incoming call may include, without limitation, a wired or wireless telephone, fax machine, personal digital assistant (PDA), computer and the like; and the called party may comprise, without limitation, a traditional POTS telephone, an IP voice telephone (VoIP), public telephone, fax or the like. Depending on the relative location of the calling and called station, the directory number typically comprises 7 or more digits sufficient to identify the station called 104. For example, when both the calling station and the call are within an area covered by the same area code (ie, a local call), a group of seven dialed digits comprising a 3-digit office code and a four-digit line code will suffice to identify the called station. As another example, when the calling station and the call are not in the same area code but are within the same LATA limit (ie, an intra-LATA call), a group of 10 marked digits comprising a three-digit area code, three-digit office code and a four-digit line code it is necessary to identify the calling station. Even as another example, when the called party and the calling party reside in different LATA and reside in different area codes or countries, a DN (for its acronym in English) greater than 10 digits must be marked. In such a case, the DN comprises a country code of 1-3 digits, followed by a three-digit area code, a three-digit office code and a four-digit line code. In step 304, the completion switch determines whether a security risk is indicated within its service area. In one embodiment, the completion switch is reported if a security risk is indicated by the presence or absence of an emergency condition indicator communicated from the network operations center 112. The emergency condition indicator may be communicated separately or coincident with the processing of the incoming call. The completion switch makes a threshold decision about how to process the incoming call based on whether or not a security risk is indicated. If a security risk is not indicated, the completion switch in step 306 completes the call to the called station as normal. If a security risk is indicated, the completion switch proceeds to step 308. In step 308, the completion switch determines the location of the called party. In one embodiment, as described in relation to the Figure, the completion switch 106 queries an SCP 120 to determine the location of the called station. In response to the inquiry, the SSP consults a network database 126, such as a 9-1-1 database, to determine the location of the called station and thus informs the completion switch. Alternatively, as described in relation to Figure 2, the completion switch 106 independently queries the network database 126 to determine the location of the called station. In any case, the location of the called station is determined based on its directory number by identifying a location of the called party number indicated to the directory number in the database 126. In step 310, after determining the location from the called station, the end switch (or alternatively, the end switch in conjunction with the SSP) determines whether the location of the called station corresponds to a cell within the designated security risk area 110. The end switch takes a decision on how to process the incoming call based on whether or not the called station is within the security risk area 110. If the called station is not within the security risk area, the completion switch proceeds to step 306 and completes the call to the called station as is normal. If the called station is in the security risk area 110, the completion switch in step 312 determines whether the calling party is a privileged user. For example, the calling party may comprise a GETS or WPS user. If the calling party is a privileged user, the terminating switch proceeds to step 306 and completes the call to the called station (eg, gestation "G") even though the called station is on the security risk side. However, if the calling party is not a privileged user, the completion switch in step 314 prevents the call to the called station (eg, "T" gestation) from being completed to prevent the possibility of the call being used. to detonate a bomb Optionally, in step 316, if the call is not completed because the call goes to the security risk area and the calling party is a privileged user, the completion switch can play an announcement to the caller that mentions that calls can not be completed at this time. Alternatively, rather than playing an announcement, the end switch may cause the incoming call to be redirected to the called party's voice mail. However, such an operation is usually followed by a message to the called party indicating that it has a message waiting. There is a risk that such message waiting indication may activate a pump. Accordingly, in one embodiment, the completion switch suppresses the message waiting indication while indicating an emergency condition covering the called station location. It is noted that while the embodiments of the present invention operate to restrict call terminations directed to a designated security risk area that originate from non-privileged users, the invention contemplates allowing call origins from unprivileged users (as well as privileged users). within the area of security risk. In this way, the threat of activating a pump with minimal impact on the general population is minimized. Citizens will still be able to use their wireline terminals to call wired destinations such as 9-1-1 or their homes or, through an access, they can call mobile terminals located outside the affected area. As an additional benefit, since the terminating switch is closed, the wire terminals (for example, station "A" that resides outside the affected area remain in operation.) The present invention can be represented in other specific ways without departing from its spirit or essential features The described modalities are to be considered in all respects only as illustrative and not restrictive For example, although described in connection with a bomb threat, the embodiments of the present invention may be applied to other emergency situations that may occur in which a wired terminal that sounds can harmfully impact the situations either through the activation of another device, or the ringing sound of the same terminal, as, for example, in a hostage situation. is indicated by the appended claims more than by the above description. they are within the meaning and scale of equivalence of the claims to be covered within their scope. It is noted that in relation to this date, the best method known to the applicant to carry out the aforementioned invention is that which is clear from the present description of the invention.

Claims (10)

  1. CLAIMS Having described the invention as above, the content of the following claims is claimed as property: 1. A method characterized in that it comprises: receiving a call originating from an incoming wire line of a calling party directed to a called party; determine a location of the called party in relation to an area of security risk; determine if the calling party is a privileged user; and avoid the termination of the call if the called party is within the security risk area and the calling party is not a privileged user.
  2. 2. - The method according to claim 1, characterized in that it also comprises a step of completing the call if the calling party is a privileged user.
  3. 3. - The method according to claim 1, characterized in that it comprises a step of completing the call if the called party is not within the security risk area.
  4. 4. - The method according to claim 1, characterized in that the step of receiving a call originating from an incoming wireline comprises receiving dialed digits that define a number of directories of the wired device of the called party, the step is to determine a location of the called party in relation to the security risk area comprising: determining, based on the number of directories, a location of the device of the called party; compare the location of the device of the called party with a designated security risk area.
  5. 5. The method according to claim 4, characterized in that it was performed by an end switch operatively connected to an intelligent network service control point (SSP), the completion switch that consults the SSP to determine a Device location of the called party.
  6. 6.- The method according to the claim 4, characterized in that it is performed by an end switch that queries a database to determine a location of the device of the called party.
  7. 7. - The method according to claim 1, characterized in that the step of determining whether the calling party is a privileged user comprises determining whether the calling party is a user of WPS or GETS.
  8. 8. - An article characterized in that it comprises: one or more computer readable signal support means; and means in one or more means to avoid call terminations originating from a wireline directed to an area of security risk designated from non-privileged users and allows call terminations originated from a wireline directed to the security risk area from privileged users .
  9. 9. - The article according to claim 8, characterized in that the means in one or more means for preventing call terminations originating from a wireline includes: means for determining that an incoming call originating from a calling party is addressed to a device of the called party within the area of security risk; means to determine if the calling party is a privileged user; and means to avoid ending the call if the called party is within the security risk area and the calling party is not a privileged user.
  10. 10. - The article according to claim 8, characterized in that it also includes means to complete the call if the calling party is a privileged user.
MX/A/2008/001796A 2005-08-12 2008-02-06 Network support for restricting wireline call terminations in a security risk area MX2008001796A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11202617 2005-08-12

Publications (1)

Publication Number Publication Date
MX2008001796A true MX2008001796A (en) 2008-10-03

Family

ID=

Similar Documents

Publication Publication Date Title
US20070036322A1 (en) Network support for restricting wireline call terminations in a security risk area
US9084100B2 (en) System and method for routing a call to a landline communication unit or a wireless communication unit
US7218925B2 (en) Method of initiating a telematics service
US5999613A (en) Method and system for processing incoming calls during calls-in-progress
US7194080B2 (en) Automatically sequentially ringing alternative telephone numbers
US20070022481A1 (en) Network support for restricting call terminations in a security risk area
US5633921A (en) Providing special services to a caller configured as a virtual called party
US8036356B1 (en) System and method of identifying geographic location for the source of a call
US20060210032A1 (en) Multilevel dynamic call screening
AU6357090A (en) Call completion system
CA2541287C (en) E-911 managed call routing
US20190037394A1 (en) Method for call setup
US7239690B2 (en) System and method for identifying redirected calls
US7480374B2 (en) Emergency service call back to a ported number
MX2008001796A (en) Network support for restricting wireline call terminations in a security risk area
RU2345499C2 (en) Phone subscriber call limitation mode (versions)
KR100463848B1 (en) Special Call Processing Method For Original Barrier Subscriber In Exchange System
WO2011119968A2 (en) Systems and methods for diverting inbound telephone calls