US20120327817A1 - Method for the interception of gtp-c messages - Google Patents

Method for the interception of gtp-c messages Download PDF

Info

Publication number
US20120327817A1
US20120327817A1 US13/601,021 US201213601021A US2012327817A1 US 20120327817 A1 US20120327817 A1 US 20120327817A1 US 201213601021 A US201213601021 A US 201213601021A US 2012327817 A1 US2012327817 A1 US 2012327817A1
Authority
US
United States
Prior art keywords
control module
subscriber device
wireless subscriber
gtp
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/601,021
Inventor
Bohdan Zabawskyj
Rubens Rahim
Karthik Ramakrishnan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Redknee Inc
Original Assignee
Redknee Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Redknee Inc filed Critical Redknee Inc
Priority to US13/601,021 priority Critical patent/US20120327817A1/en
Assigned to REDKNEE INC. reassignment REDKNEE INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: RAMAKRISHNAN, KARTHIK, ZABAWSKYJ, BODHAN, RAHIM, RUBENS
Publication of US20120327817A1 publication Critical patent/US20120327817A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • H04L12/1453Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network
    • H04L12/1467Methods or systems for payment or settlement of the charges for data transmission involving significant interaction with the data transmission network involving prepayment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/40Bus networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/16Interfaces between hierarchically similar devices
    • H04W92/24Interfaces between hierarchically similar devices between backbone network devices

Definitions

  • GTP Data packets whereas our invention of present seeking the protection of Letters Patent, is largely directed at proxying and filtering GTP Control packet(s), which are on a separate User Datagram Protocol (UDP) port number and perform a different set of business operations.
  • UDP User Datagram Protocol
  • WIPO Patent Application (WO) 03067830 by Camunas et al. entitled a system to obtain value-added services in real-time, based on the General Packet Radio Service (GPRS)-network, discloses a system to obtain value-added services in real-time based on the General Packet Radio Service (GPRS) network, which comprises Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) nodes to enable the access from a mobile station to different data networks, using the radio access of a Global System for Mobile Communications (GSM) or Universal Mobile Telecommunications Service (UMTS) network; wherein between the SGSN and GGSN nodes the invention comprises means to handle GTP protocol data packets, and wherein the GTP messages traffic, which would have otherwise flowed directly between the SGSN and the GGSN nodes, is diverted through said means.
  • GPRS General Packet Radio Service
  • GSM Global System for Mobile Communications
  • UMTS Universal Mobile Telecommunications Service
  • said means When said means detect a GTP message from an SGSN asking a GGSN for the establishment of a GTP tunnel for a Packet Data Protocol (PDP) context, said means establish instead two GTP tunnels: one between the Camunas et al.'s invention and the SGSN and the other between Camunas et al.'s invention and the GGSN (once established, the user data packets will arrive through one of the two tunnels associated to their PDP Context and will be transferred to the other tunnel).
  • PDP Packet Data Protocol
  • the present invention relates generally to wireless telecommunications and gateway/intercept services; and more specifically, to a method for the interception of GTP messages.
  • control-message intercept method which includes a passive monitoring approach whereby the relevant control packets are inspected for the purpose of providing additional information for the further additional purpose of facilitating the operation of some primary or ‘master’ Internet Protocol (IP) charging/rating middleware platform/gateway system (intended to equip network operators with the ability to rate and bill IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are injected for the purpose of altering the state of a given data session in an more aggressive fashion (e.g. to drop a data session when the subscriber runs out of money in his/her prepaid account).
  • IP Internet Protocol
  • GTP-C control
  • An aspect of the specification provides a method for the interception of general packet radio service tunneling protocol control (GTP-C) messages.
  • GTP-C general packet radio service tunneling protocol control
  • the method can be part of a computer program product (GTP-C Control Module), comprising:
  • the computer program product can intermediates said telecommunications traffic between the Gateway GPRS Serving/Support Node (GGSN) and the Serving GPRS Support Node (SGSN).
  • GGSN Gateway GPRS Serving/Support Node
  • SGSN Serving GPRS Support Node
  • the computer program product can be articulated to intercept GTP-C messages with given fields, states, addresses, contexts and so forth.
  • the computer program product can be articulated to ignore and/or simply not process GTP-C messages (generally) or those with given fields, states, addresses, contexts and so forth.
  • the computer program product can interface with additional network components to provide further functionality as packet/date rating and classification, balance query and so forth.
  • Another aspect of the specification provides a control-message intercept method which exists, and is implemented as part of a computer program product, whereby control packets are passively monitored for the purpose of providing additional information for the further additional purpose of facilitating the operation of some primary or master Internet Protocol (IP) charging/rating middleware platform/gateway system (intended to equip network operators with the ability to rate, charge, and intermediate IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are modified, injected, or deleted for the purpose of altering the state of a given data session in an more aggressive fashion (including, where for instance, a data session need be dropped when the subscriber runs out of money in his/her prepaid account).
  • IP Internet Protocol
  • GTP-C control
  • FIG. 1 illustrates a typical, non-limiting embodiment of the system level architecture employed in the disclosure of present.
  • the method for the interception of GTP messages disclosed herewith is implemented as part of a computer program product, hereinafter, the GTP-C Control Module.
  • FIG. 1 represents the preferred illustrative embodiment of the invention's architecture and, as such, depicts a fault redundant GTP-C Control Module pair 30 A, 30 B surrounded by Load Balancers 20 A, 20 B (one Load Balancer 20 A on the side of the SGSN 10 , the other Load Balancer 20 B on the side of the GGSN 50 ).
  • FIG. 1 also depicts a wireless subscriber handset 60 that connects to SGSN 10 via a wireless antenna 70 and a base station sub-system (BSS) 80 .
  • the architecture in FIG. 1 is configured to carry telecommunication traffic GTP messages between wireless subscriber handset 60 and GGSN 50 via SSGN 10 .
  • the method for the interception of GTP messages may also be co-articulated and implemented with the method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system as detailed in patent application Ser. No. 10/348972, to enhance the packet/data rating and classification mechanisms inherent in the invention disclosed hereto.
  • IP Internet Protocol
  • Technicians skilled in the art will recognize that the invention of present need not be limited to the aforementioned method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system and other similar network implementations may be employed without diluting the intent and scope as such.
  • IP Internet Protocol
  • rating middleware platform and gateway system 40 A 40 B as detailed in patent application Ser. No. 10/348972
  • IP Internet Protocol
  • the message is then forwarded on to the GGSN 50 for context creation and the response forwarded back to the SGSN 10 by the GTP-C Control Module 30 A 30 B.
  • the method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system 40 A, 40 B will initiate the delete request to the GTP-C Control Module 30 A, 30 B.
  • the GTP-C Control Module 30 A 30 B will in turn send delete requests to both the GGSN 50 and SGSN 10 using spoofed packets.
  • IP Internet Protocol
  • said deletePDPContext message can also initiate by the SGSN 10 or GGSN 50 where the GTP-C Control Module 30 A 30 B intercepts the message, and further triggers the session deletion to IP charging and rating middleware platform and gateway system 40 A 40 B.
  • the deletePDPContext may then be simply forwarded by the GTP-C Control Module 30 A 30 B to the GGSN 50 or SGSN 10 depending on the initiator of the deletePDPContext message.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed is a species of control-message intercept method which includes a passive monitoring approach whereby the relevant control packets are inspected for the purpose of providing additional information for the purpose of facilitating the operation of some primary or ‘master’ Internet Protocol (IP) charging/rating middleware platform/ gateway system (intended to equip network operators with the ability to rate and bill IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are injected for the purpose of altering the state of a given data session in an more aggressive fashion (e.g. to drop a data session when the subscriber runs out of money in his/her prepaid account).

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application is a continuation of U.S. patent application Ser. No. 12/066022, filed Mar. 6, 2008, which is a national phase entry of PCT Patent Application No. PCT/CA2005/001346, filed Sep. 6, 2005. The entire contents of the above-referenced documents are incorporated herein by reference.
  • BACKGROUND
  • Related teachings in the state of the art as U.S. Patent Application 20030081607 by Kavanagh, entitled general packet radio service tunneling protocol (GTP) packet filter, discloses a method of filtering data packets in General Packet Radio Service (GPRS) Tunneling Protocol (GTP) signaling messages, whereby selected messages from GTP Path Management, GTP Tunnel Management, GTP Mobility Management, and GTP Location Management messages are analyzed against a plurality of filtering criteria, and data packets that do not meet such filtering criteria are dropped while data packets that meet the criteria are passed. However, the application by Kavanagh speaks to a module for selective filtering of
  • GTP Data packets, whereas our invention of present seeking the protection of Letters Patent, is largely directed at proxying and filtering GTP Control packet(s), which are on a separate User Datagram Protocol (UDP) port number and perform a different set of business operations.
  • WIPO Patent Application (WO) 03067830 by Camunas et al., entitled a system to obtain value-added services in real-time, based on the General Packet Radio Service (GPRS)-network, discloses a system to obtain value-added services in real-time based on the General Packet Radio Service (GPRS) network, which comprises Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) nodes to enable the access from a mobile station to different data networks, using the radio access of a Global System for Mobile Communications (GSM) or Universal Mobile Telecommunications Service (UMTS) network; wherein between the SGSN and GGSN nodes the invention comprises means to handle GTP protocol data packets, and wherein the GTP messages traffic, which would have otherwise flowed directly between the SGSN and the GGSN nodes, is diverted through said means. When said means detect a GTP message from an SGSN asking a GGSN for the establishment of a GTP tunnel for a Packet Data Protocol (PDP) context, said means establish instead two GTP tunnels: one between the Camunas et al.'s invention and the SGSN and the other between Camunas et al.'s invention and the GGSN (once established, the user data packets will arrive through one of the two tunnels associated to their PDP Context and will be transferred to the other tunnel). However, Camunas et al.'s invention requires all GTP packets to be intercepted, whereas the invention disclosed herewith only requires and speaks to the intermediation of GTP-C (GPRS Tunneling Protocol-Control plane) (the control) packets which remains a more resourceful approach to advancing the practice of the art. Furthermore, our invention may monitor the GTP-U (GPRS Tunneling Protocol-User plane) packets or alternatively rely on the packet intermediations of the method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system as detailed in patent application Ser. No. 10/348972, for the purpose of providing the data intermediation and intercept functionality on the data plane. (Technicians skilled in the art will recognize that the invention of present need not be limited to the aforementioned method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system and other similar network implementations may be employed without diluting the intent and scope as such).
  • REFERENCES CITED
  • U.S. Patent Application 20030081607 dated May, 2003, to Kavanagh, A. in class 370/392.
  • Foreign Patent Document WO 03067830 dated August, 2003.
  • TECHNICAL FIELD
  • The present invention relates generally to wireless telecommunications and gateway/intercept services; and more specifically, to a method for the interception of GTP messages.
  • SUMMARY
  • Disclosed is a species of control-message intercept method which includes a passive monitoring approach whereby the relevant control packets are inspected for the purpose of providing additional information for the further additional purpose of facilitating the operation of some primary or ‘master’ Internet Protocol (IP) charging/rating middleware platform/gateway system (intended to equip network operators with the ability to rate and bill IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are injected for the purpose of altering the state of a given data session in an more aggressive fashion (e.g. to drop a data session when the subscriber runs out of money in his/her prepaid account).
  • An aspect of the specification provides a method for the interception of general packet radio service tunneling protocol control (GTP-C) messages.
  • The method can be part of a computer program product (GTP-C Control Module), comprising:
  • a) a computer readable memory medium; and
  • b) a computer program.
  • The computer program product can intermediates said telecommunications traffic between the Gateway GPRS Serving/Support Node (GGSN) and the Serving GPRS Support Node (SGSN).
  • The computer program product can be articulated to intercept GTP-C messages with given fields, states, addresses, contexts and so forth.
  • The computer program product can be articulated to ignore and/or simply not process GTP-C messages (generally) or those with given fields, states, addresses, contexts and so forth.
  • The computer program product can interface with additional network components to provide further functionality as packet/date rating and classification, balance query and so forth.
  • Another aspect of the specification provides a control-message intercept method which exists, and is implemented as part of a computer program product, whereby control packets are passively monitored for the purpose of providing additional information for the further additional purpose of facilitating the operation of some primary or master Internet Protocol (IP) charging/rating middleware platform/gateway system (intended to equip network operators with the ability to rate, charge, and intermediate IP traffic), and secondly, an invasive technique whereby control (GTP-C) messages are modified, injected, or deleted for the purpose of altering the state of a given data session in an more aggressive fashion (including, where for instance, a data session need be dropped when the subscriber runs out of money in his/her prepaid account).
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a typical, non-limiting embodiment of the system level architecture employed in the disclosure of present.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS:
  • Members skilled in the art will recognize that the ensuing represents an illustrative recital of the preferred embodiments of the invention of present and other embodiments may be articulated, gleaned and articulated from such while still remaining within its spirit and scope. Indeed equivalents found within the state of the art, and those which may reasonably and effectively be deemed equivalent in the future should also be understood as being incorporated by reference hereto and such. Furthermore, much of the language has been illustrative and is to be construed as expressly for pedagogical purposes in helping elucidate the art as concisely and beneficially as practical.
  • The method for the interception of GTP messages disclosed herewith is implemented as part of a computer program product, hereinafter, the GTP-C Control Module.
  • FIG. 1 represents the preferred illustrative embodiment of the invention's architecture and, as such, depicts a fault redundant GTP-C Control Module pair 30A, 30B surrounded by Load Balancers 20A, 20B (one Load Balancer 20A on the side of the SGSN 10, the other Load Balancer 20B on the side of the GGSN 50). FIG. 1 also depicts a wireless subscriber handset 60 that connects to SGSN 10 via a wireless antenna 70 and a base station sub-system (BSS) 80. The architecture in FIG. 1 is configured to carry telecommunication traffic GTP messages between wireless subscriber handset 60 and GGSN 50 via SSGN 10.
  • In alternative embodiments, only a partial GTP-C stack need be articulated and developed when only handling a fraction of the totality of the messages. (These operations are CreateContextRequest/Response, UpdateContextRequest/Response and DeleteContextRequest/Response, although practitioners may well realize that other iterations and operations may be articulated). In this alternative embodiment, for the remainder of the messages, we need only be able to identify them as GTP-C messages and forward them on. (Indeed, this art is not intended to represent a proxy design. The GTP-C connection is generally not terminated at the GTP-C Control Module 30A 30B).
  • The method for the interception of GTP messages, in the preferred embodiment (though of course not necessarily), may also be co-articulated and implemented with the method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system as detailed in patent application Ser. No. 10/348972, to enhance the packet/data rating and classification mechanisms inherent in the invention disclosed hereto. Technicians skilled in the art will recognize that the invention of present need not be limited to the aforementioned method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system and other similar network implementations may be employed without diluting the intent and scope as such.
  • Now, in continuing with reference to FIG. 1, upon detection of a CreateContextRequest (for instance), said message will be delayed while the method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system 40A 40B (as detailed in patent application Ser. No. 10/348972) is contacted for balance query. (Technicians skilled in the art will recognize that the invention of present need not be limited to the aforementioned method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system and other similar network implementations may be employed without diluting the intent and scope as such). The message is then forwarded on to the GGSN 50 for context creation and the response forwarded back to the SGSN 10 by the GTP-C Control Module 30A 30B. For deleting a context (as, when a subscriber has run out of balance), the method for implementing an Internet Protocol (IP) charging and rating middleware platform and gateway system 40A, 40B, will initiate the delete request to the GTP-C Control Module 30A, 30B. The GTP-C Control Module 30A 30B will in turn send delete requests to both the GGSN 50 and SGSN 10 using spoofed packets.
  • In alternative embodiments, said deletePDPContext message can also initiate by the SGSN 10 or GGSN 50 where the GTP-C Control Module30A 30B intercepts the message, and further triggers the session deletion to IP charging and rating middleware platform and gateway system 40A 40B. The deletePDPContext may then be simply forwarded by the GTP-C Control Module30A 30B to the GGSN 50 or SGSN 10 depending on the initiator of the deletePDPContext message.

Claims (20)

1. A method, comprising:
intercepting a General Packet Radio Service (GPRS) tunneling protocol control (GTP-C) message at a control module residing between a Serving GPRS Support Node (SGSN) and a Gateway GPRS Support Node (GGSN), the GTP-C message associated with a data session of a wireless subscriber device;
responsive to intercepting the message, determining if the wireless subscriber device has a sufficient balance;
when the wireless subscriber device has a sufficient balance, forwarding the message from the control module; and,
when the wireless subscriber device has an insufficient balance, sending spoofed delete requests from the control module to the SGSN and the GGSN.
2. The method of claim 1 wherein the determining comprises sending a balance query to an additional network component.
3. The method of claim 2 wherein the additional network component is a charging and rating middleware platform and gateway system.
4. The method of claim 3 wherein the determining further comprises receiving a response to the balance query from the charging and rating middleware platform and gateway system.
5. The method of claim 4 wherein the response includes an indication of whether the wireless subscriber device has a sufficient balance, and rating and classification information for the data session.
6. The method of claim 2, further comprising:
prior to sending the spoofed delete requests from the control module, receiving a delete instruction at the control module from the charging and rating middleware platform and gateway system.
7. A control module, comprising:
a first interface for connecting to a Gateway GPRS Support Node (GGSN);
a second interface for connecting to a Serving GPRS Support Node (SGSN);
the control module configured to intercept a GTP-C message at one of the first and second interfaces, the GTP-C message associated with a data session of a wireless subscriber device;
the control module further configured, responsive to intercepting the message, to determine if the wireless subscriber device has a sufficient balance;
the control module further configured, when the wireless subscriber device has a sufficient balance, to forward the message from the other of the first and second interfaces;
the control module further configured, when the wireless subscriber device has an insufficient balance, to send spoofed delete requests from the first and second interfaces.
8. The control module of claim 7, further comprising:
a third interface for connecting to an additional network component;
the control module being configured to make the determination by sending a balance query to the additional network component.
9. The control module of claim 8 wherein the additional network component is a charging and rating middleware platform and gateway system.
10. The control module of claim 9, the control module further configured to receive a response to the balance query at the third interface.
11. The control module of claim 10 wherein the response includes an indication of whether the wireless subscriber device has a sufficient balance, and rating and classification information for the data session.
12. The control module of claim 8, the control module further configured to receive, prior to sending the spoofed delete requests, a delete instruction at the third interface.
13. A system, comprising:
a first control module according to claim 7; and
at least one charging and rating middleware platform and gateway system connected to the third interface of the at least one control module.
14. The system of claim 13, further comprising:
a second control module according to claim 7;
a first load balancer connected to the first interfaces of the first and second control modules; and
a second load balancer connected to the second interfaces of the first and second control modules.
15. A non-transitory computer-readable medium storing a plurality of programming instructions executable at a control module for implementing a method comprising:
intercepting a General Packet Radio Service (GPRS) tunneling protocol control (GTP-C) message at a control module residing between a Serving GPRS Support Node (SGSN) and a Gateway GPRS Support Node (GGSN), the GTP-C message associated with a data session of a wireless subscriber device;
responsive to intercepting the message, determining if the wireless subscriber device has a sufficient balance;
when the wireless subscriber device has a sufficient balance, forwarding the message from the control module; and,
when the wireless subscriber device has an insufficient balance, sending spoofed delete requests from the control module to the SGSN and the GGSN.
16. The non-transitory computer-readable medium of claim 15 wherein the determining comprises sending a balance query to an additional network component.
17. The non-transitory computer-readable medium of claim 16 wherein the additional network component is a charging and rating middleware platform and gateway system.
18. The non-transitory computer-readable medium of claim 17 wherein the determining further comprises receiving a response to the balance query from the charging and rating middleware platform and gateway system.
19. The non-transitory computer-readable medium of claim 18 wherein the response includes an indication of whether the wireless subscriber device has a sufficient balance, and rating and classification information for the data session.
20. The non-transitory computer-readable medium of claim 16, the method further comprising:
prior to sending the spoofed delete requests from the control module, receiving a delete instruction at the control module from the charging and rating middleware platform and gateway system.
US13/601,021 2005-09-06 2012-08-31 Method for the interception of gtp-c messages Abandoned US20120327817A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/601,021 US20120327817A1 (en) 2005-09-06 2012-08-31 Method for the interception of gtp-c messages

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CAPCT/CA2005/001346 2005-09-06
PCT/CA2005/001346 WO2007028225A1 (en) 2005-09-06 2005-09-06 Method for the interception of gtp-c messages
US12/066,022 US8270942B2 (en) 2005-09-06 2005-09-06 Method for the interception of GTP-C messages
US13/601,021 US20120327817A1 (en) 2005-09-06 2012-08-31 Method for the interception of gtp-c messages

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/066,022 Continuation US8270942B2 (en) 2005-09-06 2005-09-06 Method for the interception of GTP-C messages

Publications (1)

Publication Number Publication Date
US20120327817A1 true US20120327817A1 (en) 2012-12-27

Family

ID=37835322

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/066,022 Expired - Fee Related US8270942B2 (en) 2005-09-06 2005-09-06 Method for the interception of GTP-C messages
US13/601,021 Abandoned US20120327817A1 (en) 2005-09-06 2012-08-31 Method for the interception of gtp-c messages

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/066,022 Expired - Fee Related US8270942B2 (en) 2005-09-06 2005-09-06 Method for the interception of GTP-C messages

Country Status (4)

Country Link
US (2) US8270942B2 (en)
EP (2) EP1922840A4 (en)
CN (1) CN101273578B (en)
WO (1) WO2007028225A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2329631B1 (en) * 2008-07-24 2017-09-06 Telefonaktiebolaget LM Ericsson (publ) Lawful interception for 2g/3g equipment interworking with evolved packet system
CN102083112A (en) * 2009-11-27 2011-06-01 华为技术有限公司 Method, network equipment and user equipment for guaranteeing service connection
US9788188B2 (en) 2012-12-14 2017-10-10 Ibasis, Inc. Method and system for hub breakout roaming
US8929356B2 (en) 2013-02-05 2015-01-06 Anue Systems, Inc. Mobile user identification and tracking for load balancing in packet processing systems
US9380002B2 (en) 2013-12-17 2016-06-28 Anue Systems, Inc. Pre-sorter systems and methods for distributing GTP packets
US10003537B2 (en) 2015-10-01 2018-06-19 Keysight Technologies Singapore (Holding) Pte Ltd Egress port overload protection for network packet forwarding systems
US10470031B2 (en) 2016-05-20 2019-11-05 Ibasis, Inc. Voice over IMS roaming gateway
US10148614B2 (en) * 2016-07-27 2018-12-04 Oracle International Corporation Methods, systems, and computer readable media for applying a subscriber based policy to a network service data flow
US10855694B2 (en) 2017-05-30 2020-12-01 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for monitoring encrypted packet flows within a virtual network environment
US10992652B2 (en) 2017-08-25 2021-04-27 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for monitoring encrypted network traffic flows
US10903985B2 (en) 2017-08-25 2021-01-26 Keysight Technologies Singapore (Sales) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
US10404597B2 (en) 2017-11-30 2019-09-03 Keysight Technologies, Inc. Virtual horizontally-scalable packet broker systems and methods for distribution of session-based network traffic
US10893030B2 (en) 2018-08-10 2021-01-12 Keysight Technologies, Inc. Methods, systems, and computer readable media for implementing bandwidth limitations on specific application traffic at a proxy element
US11190417B2 (en) 2020-02-04 2021-11-30 Keysight Technologies, Inc. Methods, systems, and computer readable media for processing network flow metadata at a network packet broker

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5650994A (en) * 1995-05-16 1997-07-22 Bell Atlantic Network Services, Inc. Operation support system for service creation and network provisioning for video dial tone networks
US6031904A (en) * 1996-10-23 2000-02-29 Nortel Networks Corporation Service order mechanism for telephone subscriber
US6067347A (en) * 1997-04-01 2000-05-23 Bell Atlantic Network Services, Inc. Providing enhanced services through double SIV and personal dial tone
FI105986B (en) * 1997-11-26 2000-10-31 Nokia Networks Oy Subscriber Service Profiles in a Telecommunication System
US6133912A (en) * 1998-05-04 2000-10-17 Montero; Frank J. Method of delivering information over a communication network
US6584312B1 (en) * 1998-08-31 2003-06-24 Telefonaktiebolaget Lm Ericsson (Publ) Adaptive subscriber service allocation
US6731932B1 (en) * 1999-08-24 2004-05-04 Telefonaktiebolaget Lm Ericsson (Publ) Methods and systems for handling subscriber data
US6628954B1 (en) * 1999-09-07 2003-09-30 Nortel Networks Limited System, method, and program for controlling access to data services by a subscriber unit in a wireless network
US6804716B1 (en) * 1999-12-22 2004-10-12 Bellsouth Intellectual Property Corporation Network and method for call management
EP1130869B1 (en) * 2000-03-01 2005-06-01 Sony International (Europe) GmbH Management of user profile data
US6781972B1 (en) * 2000-03-31 2004-08-24 Lucent Technologies Inc. Method and system for subscriber-configurable communications service
US7110749B2 (en) * 2000-12-19 2006-09-19 Bellsouth Intellectual Property Corporation Identity blocking service from a wireless service provider
US7203752B2 (en) * 2001-02-16 2007-04-10 Openwave Systems Inc. Method and system for managing location information for wireless communications devices
US20020115453A1 (en) * 2001-02-16 2002-08-22 Poulin Ronald Leon Method and system for location based wireless communication services
CN1129280C (en) * 2001-05-29 2003-11-26 华为技术有限公司 Transmition method and device backing up node data package in general grouped radio service
US7269249B2 (en) * 2001-09-28 2007-09-11 At&T Bls Intellectual Property, Inc. Systems and methods for providing user profile information in conjunction with an enhanced caller information system
US20030081607A1 (en) * 2001-10-30 2003-05-01 Alan Kavanagh General packet radio service tunneling protocol (GTP) packet filter
US20030115203A1 (en) * 2001-12-19 2003-06-19 Wendell Brown Subscriber data page for augmenting a subscriber connection with another party
CN1177446C (en) * 2002-01-23 2004-11-24 华为技术有限公司 Method for realizing grouping business from single information source to multiple receive point
ES2198200B1 (en) * 2002-02-04 2005-01-01 Airtel Movil, S.A SYSTEM FOR OBTAINING VALUE ADDED SERVICES IN REAL TIME BASED ON THE RADIO PACKAGE GENERAL SERVICE NETWORK (GPRS).
US7116985B2 (en) * 2002-06-14 2006-10-03 Cingular Wireless Ii, Llc Method for providing location-based services in a wireless network, such as varying levels of services
US20040068502A1 (en) * 2002-10-02 2004-04-08 Jerome Vogedes Context information management in a communication device
US7801171B2 (en) * 2002-12-02 2010-09-21 Redknee Inc. Method for implementing an Open Charging (OC) middleware platform and gateway system
US7457865B2 (en) * 2003-01-23 2008-11-25 Redknee Inc. Method for implementing an internet protocol (IP) charging and rating middleware platform and gateway system
US7215754B1 (en) * 2003-02-25 2007-05-08 Sprint Spectrum L.P. Method and system for user selection from multiple predefined service profile sets
US7493125B2 (en) * 2005-06-10 2009-02-17 Alcatel-Lucent Usa Inc. Methods and apparatus for providing location enabled ring tones or ring backs
US20080119203A1 (en) * 2006-11-17 2008-05-22 Yoram Shalmon Method and system for providing location based services

Also Published As

Publication number Publication date
US20090168697A1 (en) 2009-07-02
CN101273578A (en) 2008-09-24
EP1922840A1 (en) 2008-05-21
WO2007028225A1 (en) 2007-03-15
EP1922840A4 (en) 2010-05-05
EP2515476A1 (en) 2012-10-24
US8270942B2 (en) 2012-09-18
CN101273578B (en) 2010-12-29

Similar Documents

Publication Publication Date Title
US8270942B2 (en) Method for the interception of GTP-C messages
US8032168B2 (en) Method, apparatus and computer program product for monitoring data transmission connections
EP2314128B1 (en) Method and system for bypassing 3gpp packet switched core network when accessing internet from 3gpp ues using 3gpp radio access network
US8363665B2 (en) Method and system for bypassing 3GPP packet switched core network when accessing internet from 3GPP UEs using IP-BTS, femto cell, or LTE access network
US9204474B2 (en) Destination learning and mobility detection in transit network device in LTE and UMTS radio access networks
US8477718B2 (en) System and method of serving gateway having mobile packet protocol application-aware packet management
JP3745737B2 (en) Method and apparatus for adding user equipment to a telephone communication network
US20110116499A1 (en) Method and system for selectively bypassing packet core network within a session based on traffic type
CN104412628A (en) Method; apparatuses and computer program product for providing application service platform with access to core network information comprising context data
US9998909B2 (en) 3rd generation direct tunnel (3GDT) optimization
US8804716B2 (en) Methods, systems, and computer readable media for evolved general packet radio service (GPRS) tunneling protocol (eGTP) indirect tunneling in a voice over LTE (VoLTE) simulation
US20200213886A1 (en) Selective user plane monitoring multiple monitoring probes when a serving gateway has multiple ip addresses
US11540175B2 (en) Smart session load balancer and throttle
US20140075538A1 (en) Ip spoofing detection apparatus
EP2763451B1 (en) Monitoring 3g/4g handovers in telecommunications networks
EP2887614A1 (en) Telecommunications networks
CN106712989A (en) QoS management method and device
Mendoza et al. Experimental proof of concept of an SDN‐based traffic engineering solution for hybrid satellite‐terrestrial mobile backhauling
CN103428888A (en) Method and system for establishing direct tunnel
CN101925038A (en) Data transmission method, communication device and network system
US20100046362A1 (en) Method for dealing with the packet domain gateway support node errors
US10757025B2 (en) Smart load balancer and throttle
US8503434B2 (en) Method and system for inserting a new node into a communications path between two existing nodes without disruption
EP2724589B1 (en) 3rd generation direct tunnel (3gdt) optimization
WO2015172338A1 (en) Access point selection method and related device

Legal Events

Date Code Title Description
AS Assignment

Owner name: REDKNEE INC., ONTARIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZABAWSKYJ, BODHAN;RAHIM, RUBENS;RAMAKRISHNAN, KARTHIK;SIGNING DATES FROM 20080313 TO 20080317;REEL/FRAME:028883/0092

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION