WO2013091377A1 - 用户合法性判断方法、装置及用户接入信箱的系统 - Google Patents

用户合法性判断方法、装置及用户接入信箱的系统 Download PDF

Info

Publication number
WO2013091377A1
WO2013091377A1 PCT/CN2012/078958 CN2012078958W WO2013091377A1 WO 2013091377 A1 WO2013091377 A1 WO 2013091377A1 CN 2012078958 W CN2012078958 W CN 2012078958W WO 2013091377 A1 WO2013091377 A1 WO 2013091377A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
location information
status information
trigger message
Prior art date
Application number
PCT/CN2012/078958
Other languages
English (en)
French (fr)
Inventor
任传铭
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013091377A1 publication Critical patent/WO2013091377A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the present invention relates to the field of mobile data communications, and in particular, to a method for judging user legitimacy, a device, and a system for a user to access a mailbox.
  • the voice/video mailbox service is generally provided by the intelligent network service system, and the forwarding is triggered to the voice/video mailbox system by signing the contract on the core network element (Voice/Video Mail) System, VMS ).
  • VMS Voice/Video Mail
  • the authentication of the voice/video mailbox mainly uses the prompting user to input an account number and a password to authenticate the user's identity.
  • the authentication method actively participated by the person has the following disadvantages:
  • the dual-tone multi-frequency (DTMF) signals that can be input are mainly composed of 0 ⁇ 9, *,
  • the voice/video mailbox can usually be used to determine whether the calling number of the user is a number used by the user for registration (authorization), thereby authenticating the user's identity.
  • This method provides convenience for the user, but, in recent years, Because in the field of data communication, especially in the core network element/intelligent network signaling, there is no strict authentication process. By masquerading the calling number, a malicious user can enter another person's voice/video mailbox and eavesdrop on other important voice/video messages. . Therefore, the related art has a poor security of the voice/video mailbox system and a poor user experience. Summary of the invention
  • the main purpose of the embodiments of the present invention is to provide a method and device for judging user legality and a system for a user to access a mailbox, which can improve system security, reduce operation complexity, and improve user experience.
  • a method for judging user legality including:
  • the voice/video mailbox system receives the user's trigger message, and the trigger message carries at least the location information and/or status information of the user when the trigger message is initiated.
  • the VMS determines whether the user is legal according to the location information and/or status information of the user when the trigger message is initiated, and the real location information and/or status information of the user.
  • a user legality judging device includes: a receiving module, a first obtaining module, a second acquiring module, and a judging module; wherein
  • the receiving module is configured to: receive a trigger message of the user, where the trigger message carries at least the location information and/or status information of the user when the trigger message is initiated;
  • the first acquiring module is configured to: obtain, by using a trigger message received by the receiving module, location information and/or status information when the user initiates the trigger message;
  • the second obtaining module is configured to: after receiving the trigger message, the receiving module obtains real location information and/or status information of the user from the core network element;
  • the determining module is configured to: according to the location information and/or status information of the user acquired by the first acquiring module when the trigger message is initiated, and the real location information of the user acquired by the second acquiring module, and/or Status information, determining whether the user is legal.
  • a voice/video mailbox system comprising the above-mentioned user legality judging device and an execution module;
  • the execution module is configured to: when the user legality judging device determines that the user is legal, allow the user to access the voice/video mailbox; and when the user legality judging device determines that the user is illegal, the user is denied access to the voice/ Video mailbox.
  • the VMS receives the trigger message of the user, and the trigger message carries at least the location information where the user initiates the trigger message and/or Or the status information; the VMS obtains the location information and/or status information of the user when the trigger message is initiated, and the slave network Obtaining real location information and/or status information of the user by the network element; the VMS is based on the location information and/or status information of the user when the trigger message is initiated, and the real location information of the user. / or status information, to determine whether the user is legal.
  • the invention can effectively prevent others from using the network vulnerability to disguise the calling number, thereby entering another person's voice/video mailbox system, eavesdropping and stealing important voice information of others, thereby greatly enhancing the fraud prevention capability of the voice/video mailbox system. Improve system security. In addition, users can access the voice/video mailbox system without entering an account and password, which can reduce the complexity of the operation and enhance the user experience. BRIEF abstract
  • FIG. 1 is a schematic flowchart of a method for judging user legality according to an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a principle for controlling a user to access a voice/video mailbox according to an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a related art for controlling a user to access a voice/video mailbox
  • FIG. 4 is a schematic flowchart of controlling a user to access a voice/video mailbox according to Embodiment 1 of the present invention
  • FIG. 5 is a schematic flowchart of controlling a user to access a voice/video mailbox according to Embodiment 2 of the present invention.
  • the VMS receives the trigger message of the user, obtains the location information and/or status information of the user when the trigger message is initiated, and obtains the reality of the user from the core network element. Location information and/or status information; the VMS determines the user according to the location information and/or status information of the user when the trigger message is initiated, and the real location information and/or status information of the user. is it legal.
  • FIG. 1 is a schematic flowchart of a method for judging user legality according to an embodiment of the present invention. As shown in FIG. 1, the method includes: Step 101: The VMS receives a trigger message of the user, where the trigger message carries at least the location information and/or status information of the user when the trigger message is initiated.
  • the trigger message may be a trigger message initiated by the user by dialing an access code of the voice/video mailbox service, and the user dials an access code of the voice/video mailbox service, and the access code is routed to the voice through the core network element/ Videomail system, triggering voice/video mailbox service.
  • Step 102 The VMS obtains location information and/or status information of the user when the trigger message is initiated, and obtains real location information and/or status of the user from the core network element. information.
  • the VMS may acquire real location information of the user from a core network element such as a Visitor Location Register (VLR), a Home Location Register (HLR), or a Gateway Mobile Location Center (GMLC). / or status information.
  • a core network element such as a Visitor Location Register (VLR), a Home Location Register (HLR), or a Gateway Mobile Location Center (GMLC). / or status information.
  • VLR Visitor Location Register
  • HLR Home Location Register
  • GMLC Gateway Mobile Location Center
  • Step 103 The VMS determines whether the user is legal according to the location information and/or status information of the user when the trigger message is initiated, and the real location information and/or status information of the user.
  • the VMS determining whether the user is legal may be: the location information and/or status information of the user when the trigger message is initiated is consistent with the real location information and/or status information of the user, and determining the user.
  • the user may be allowed to access a voice/video mailbox, guide the user to enter his/her own voice/video mailbox, listen to voice/video mail, etc.; if not, determine that the user is illegal, preferably It can be considered that there is a disguised calling party, and the user is denied access to the voice/video mailbox, and is processed according to the trespassing process (the call can be directly released, and the trespass can be recorded and the user is prompted).
  • the above judgment process may include the following two cases:
  • the real state information fed back by the core network element is that the user is out of service, unreachable, idle, or shut down, and the call state of the current user is inconsistent.
  • the user is considered to be illegal, and the identity is forged and denied access.
  • the user provides an account to the VMS if the VMS determines whether the user is legitimate And the password information, the VMS determining whether the user is legal may be: the location information and/or status information of the user when the trigger message is initiated is consistent with the real location information and/or status information of the user, and If the account and password information provided by the user is correct, the user is determined to be legal; if the account is inconsistent or the account and password information is incorrect, it is determined that the user is illegal.
  • FIG. 2 it can be seen that the principle of controlling the user accessing the voice/video mailbox is compared with the related art shown in FIG. 3, and the method of the embodiment of the present invention is used to effectively prevent others from using the network vulnerability to disguise the calling number, thereby entering Other people's voicemail system, eavesdropping and stealing important voice information of others greatly enhances the anti-fraud ability of the voice/video mailbox system.
  • the user without changing the user's operating habits and user experience, the user does not need to input the account/password operation, and does not add any complexity to the user's use.
  • the embodiment of the present invention further discloses a user legality judging device, where the user legality judging device includes: a receiving module, a first obtaining module, a second obtaining module, and a judging module; wherein, the receiving module is configured to: Receiving a trigger message of the user, where the trigger message carries at least the location information and/or status information of the user when the trigger message is initiated;
  • the first acquiring module is configured to: obtain, by using a trigger message received by the receiving module, location information and/or status information when the user initiates the trigger message;
  • the second obtaining module is configured to: after receiving the trigger message, the receiving module obtains real location information and/or status information of the user from the core network element;
  • the determining module is configured to: according to the location information and/or status information of the user acquired by the first acquiring module when the trigger message is initiated, and the real location information of the user acquired by the second acquiring module, and/or Status information, determining whether the user is legal.
  • the second acquiring module And acquiring, by the second acquiring module, the real location information and/or status information of the user from the core network element: obtaining real location information and/or status information of the user from the VLR, the HLR, or the GMLC.
  • the determining module determines whether the user is legal:
  • the receiving module is further configured to receive the account and password information provided by the user, and the determining module determines whether the user is legal:
  • the location information and/or status information of the user when the trigger message is initiated is consistent with the real location information and/or status information of the user, and if the account and password information provided by the user is correct, the user is determined to be legal; If the inconsistency or the account and password information is incorrect, it is determined that the user is illegal.
  • the embodiment of the present invention further provides a voice/video mailbox system, which includes the above-mentioned user legality judging device and an execution module;
  • the execution module is configured to: when the user legality judging device determines that the user is legal, allow the user to access the voice/video mailbox; and when the user legality judging device determines that the user is illegal, the user is denied access to the voice. /Videomail.
  • VLR is a database that stores the incoming calls of MSs (collectively referred to as customers) in the jurisdiction, the information retrieved by the outgoing call, and the information about the subscriber's subscription and additional services, such as the customer's number, the location area. Identification, parameters such as services provided to customers.
  • MSC Mobile Switching Center
  • PSTN public switched telephone networks
  • ISDN integrated services digital networks
  • Visit-MSC Visit-MSC, VMSC.
  • HLR The database responsible for mobile user management.
  • the subscription data of the user under the jurisdiction and the location information of the mobile user can be used to provide routing information for calls to an MS.
  • the HLR registers the user's subscription information, such as supplementary services, authentication parameters, and also MS location information and IMSI, ISDN codes, and so on.
  • SIU System interface unit
  • VMS Vehicle management system
  • the user needs to register the VMS service and register the voice/video mailbox logical number (also known as the normal mobile number) and the real physical number.
  • FIG. 4 is a schematic flowchart of controlling a user to access a voice/video mailbox according to Embodiment 1 of the present invention. As shown in FIG. 4, the process includes:
  • Step 401 The user dials a voice/video mailbox system access code to initiate a call to the network; the wireless network initiates a call request to the VMSC/VLR via the core network element;
  • Step 402 The VMSC/VLR routes to the service trigger end office MSC/HLR in the network according to the access code information;
  • Step 403 The MSC/HLR triggers a message to the signaling interface unit SIU of the VMS according to the access code information; the SIU forwards the message to the VMS;
  • Step 404 The VMS analyzes the message triggering the service, and proposes location information of the originating call location, and records the user status, and the default is the call;
  • Step 405 The voice/video mailbox system actively constructs query signaling, and requests user information (provide Subscriber Info) to the MSC/HLR according to the user voice/video mailbox number, and the information includes the current location information of the user (Location information), the real state. Information (Subscriber state);
  • Step 406 The MSC/HLR forwards the request to the VMSC/VLR.
  • Step 407 The VMSC/VLR feeds back the response message to the MSC/HLR according to the current location and the real state information of the current user.
  • Step 408 The MSC/HLR sends the current user's real location and real state information to the SIU; the SIU forwards the message to the VMS;
  • Step 409 The user location in the voice/video mailbox system comparison triggering signaling message is consistent with the current real location of the user; the real state of the user is consistent with the recorded state; thereby confirming that the authentication is successful.
  • Step 410 After the authentication succeeds, the VMS responds to the ANM and ACM signals to the core network element, and then connects the media to the VMS to guide the user to enter his own voice/video mailbox and listen to voice/video mail.
  • Step 409 is further as follows: when the location of the user in the voice/video mailbox system comparison trigger signaling message is inconsistent with the current location of the user, the user trigger is confirmed to be a fake caller trigger; or When the real state of the user is inconsistent with the recorded state, the user trigger is confirmed to be a fake caller trigger.
  • step 410 may be: after the authentication fails, the VMS responds to the core network element with the ANM and ACM signals, and continues the media. Go to the VMS, prompting it to be an illegal access, releasing the call.
  • step 410 after the authentication fails, the VMS may directly release the call, or notify the real caller that the masquerading caller has invaded its voice/video mailbox system behavior, has been intercepted, and records its trigger point. .
  • FIG. 5 is a schematic diagram of a process for controlling a user to access a voice/video mailbox according to Embodiment 2 of the present invention. As shown in FIG. 5, the process includes:
  • Step 501 The user dials a voice/video mailbox system access code, initiates a call to the network, and the wireless network initiates a call request to the VLR/VMSC via the core network;
  • Step 502 The VLR/VMSC routes to the service triggering end office MSC/HLR in the network according to the access code information;
  • Step 503 The MSC/HLR triggers a message to the signaling interface unit SIU of the VMS according to the access code information.
  • Step 504 The SIU forwards the message to the VMS system.
  • Step 505 The VMS system analyzes the message triggering the service, and proposes the location information of the originating call location, and records the user status, and the default is the call;
  • Step 506 The voice/video mailbox system (identity authentication module) actively constructs query signaling, and requests user information (provide Subscriber Info) to the SIU according to the user voice/video mailbox number, and the information includes the current location information of the user (Location information). , the actual state information (Subscriber state);
  • Step 50 7 The SIU forwards the message to the MSC/HLR;
  • Step 508 The MSC/HLR forwards the request to the VLR/VMSC.
  • Step 509 The VLR/VMSC feeds back the response message to the MSC/HLR according to the current location and the real state information of the current user.
  • Step 510 The MSC/HLR sends the current user's real location and real status information to the feedback response. Message to SIU;
  • Step 511 The SIU forwards to the VMS system
  • Step 512 The voice/video mailbox system (identity authentication module) compares the user location in the triggering signaling message with the current real location of the user; compares the real state of the user with the recorded state; thereby confirming that the authentication is successful;
  • Step 513 After the authentication succeeds, the VMS system responds to the SIU with an ANM signal;
  • Step 514 The SIU forwards the message to the MSC/HLR.
  • Step 515 The MSC/HLR forwards the request to the VLR/VMSC.
  • Step 516 After the authentication succeeds, the VMS system responds to the SIU with the ACM signal;
  • Step 517 The SIU forwards the message to the MSC/HLR.
  • Step 518 The MSC/HLR forwards the request to the VLR/VMSC.
  • Step 519 The VMS system guides the user into his own voice/video mailbox and listens to voice/video mail.
  • the voice/video mailbox system identity authentication module
  • the voice/video mailbox system identity authentication module
  • the embodiment of the present invention can effectively prevent others from using the mobile network vulnerability to disguise the calling number, thereby entering another person's voice/video mailbox system, eavesdropping and stealing important voice information of others, which is extremely Enhance the fraud prevention capabilities of voice/video mailbox systems.
  • the embodiment of the present invention does not need to change the user's operating habits and user experience, and does not require the user to input an account or password operation, and does not add any operational complexity to the user.
  • the embodiment of the present invention does not require a voice/video mail service provider, and does not add any hardware investment, and only needs to be based on existing hardware to implement intrusion detection of the masquerading caller.
  • the core network element has a strong encryption mode for the air interface, the core network element itself can be identified in the same network location, and multiple identical numbers are simultaneously registered. In this case, it is not necessary to consider the case where the real mobile phone is used in the masquerading, and the masquerading user is located in the same area as the real user, and the same logical number is simultaneously registered.
  • each module/unit in the foregoing embodiment may be implemented in the form of hardware, or may use software functions.
  • the form of the module is implemented. The invention is not limited to any specific form of combination of hardware and software.
  • the embodiment of the present invention it is possible to effectively prevent others from using the network vulnerability to disguise the calling number, thereby entering another person's voice/video mailbox system, eavesdropping and stealing important voice information of others, thereby greatly enhancing the fraud prevention of the voice/video mailbox system.
  • Ability to improve system security users can access the voice/video mailbox system without entering an account and password, which can reduce the complexity of the operation and enhance the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例公开了一种用户合法性判断方法,包括:VMS接收用户的触发消息;所述VMS从所述触发消息中获取所述用户发起所述触发消息时所在的位置信息和/或状态信息,并从核心网网元获取所述用户真实的位置信息和/或状态信息;所述VMS根据所述用户发起所述触发消息时所在的位置信息和/或状态信息,以及所述用户真实的位置信息和/或状态信息,判断所述用户是否合法,并可进一步决策是否允许所述用户接入语音/视频信箱,之后执行决策结果。本发明实施例还相应地公开了一种用户合法性判断装置和用户接入信箱的系统。

Description

用户合法性判断方法、 装置及用户接入信箱的系统
技术领域
本发明涉及移动数据通信领域, 尤其涉及一种用户合法性判断方法、 装 置及用户接入信箱的系统。
背景技术
在目前的数据通讯领域, 为了实现语音信箱服务, 一般由智能网业务系 统提供语音 /视频信箱服务, 通过在核心网网元签约前转, 前转触发到语音 / 视频信箱系统( Voice/Video Mail system, VMS ) 。
相关技术中, 对于语音 /视频信箱的认证主要釆用提示用户输入账号及密 码来认证用户的身份, 这种由人主动参与的认证方法存在以下缺点:
1 )需要用户输入账号及密码, 对于用户而言, 需要更多的操作步骤, 操 作繁瑣, 从而会造成用户使用上的不方便。
2 )在通讯网络中, 能够输入的双音多频(DTMF )信号主要由 0~9、 *、
#等 12个符号组成, 因此构成密码的密码串密码强度不高, 易于被破解。
为了避免以上问题, 语音 /视频信箱通常可以釆用判断用户的主叫号码是 否是用户经过注册(授权)使用的号码, 从而认证用户的身份, 这种方法为 用户提供了方便, 但是, 近年来, 由于数据通讯领域中, 尤其在核心网网元 / 智能网间信令无严格认证流程, 恶意用户通过伪装主叫号码, 可以进入他人 语音 /视频信箱, 偷听他人重要语音 /视频留言的事件。 因此, 相关技术中语音 /视频信箱系统安全性较差, 用户体验不佳。 发明内容
有鉴于此, 本发明实施例的主要目的在于提供一种用户合法性判断方法 及装置、 用户接入信箱的系统, 能够提高系统安全性, 减低操作复杂度, 提 升用户体验。
为达到上述目的, 本发明的实施例是这样实现的: 一种用户合法性判断方法, 包括:
语音 /视频信箱系统 VMS接收用户的触发消息, 所述触发消息至少携带 所述用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述 VMS从所述触发消息中获取所述用户发起所述触发消息时所在的 位置信息和 /或状态信息, 并从核心网网元获取所述用户真实的位置信息和 / 或状态信息;
所述 VMS根据所述用户发起所述触发消息时所在的位置信息和 /或状态 信息,以及所述用户真实的位置信息和 /或状态信息,判断所述用户是否合法。
一种用户合法性判断装置, 包括: 接收模块、 第一获取模块、 第二获取 模块和判断模块; 其中,
所述接收模块设置为: 接收用户的触发消息, 所述触发消息至少携带所 述用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述第一获取模块设置为: 从所述接收模块接收的触发消息中获取所述 用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述第二获取模块设置为: 在接收模块收到触发消息后, 从核心网网元 获取所述用户真实的位置信息和 /或状态信息;
所述判断模块设置为: 根据所述第一获取模块获取的用户发起所述触发 消息时所在的位置信息和 /或状态信息, 以及所述第二获取模块获取的用户真 实的位置信息和 /或状态信息, 判断所述用户是否合法。
一种语音 /视频信箱系统, 该系统包括上述用户合法性判断装置和执行模 块; 其中,
所述执行模块设置为: 在用户合法性判断装置判定用户合法时, 允许所 述用户接入语音 /视频信箱; 以及在用户合法性判断装置判定用户不合法时, 拒绝所述用户接入语音 /视频信箱。
本发明实施例的用户合法性判断方法及装置、 用户接入信箱的方法和系 统, VMS接收用户的触发消息, 所述触发消息至少携带所述用户发起所述 触发消息时所在的位置信息和 /或状态信息; 所述 VMS从所述触发消息中获 取所述用户发起所述触发消息时所在的位置信息和 /或状态信息, 并从核心网 网元获取所述用户真实的位置信息和 /或状态信息; 所述 VMS才艮据所述用户 发起所述触发消息时所在的位置信息和 /或状态信息, 以及所述用户真实的位 置信息和 /或状态信息, 判断所述用户是否合法。 通过本发明, 能够有效防止 他人利用网络漏洞伪装主叫号码,从而进入他人的语音 /视频信箱系统,偷听、 窃取他人重要语音信息, 从而极大的增强语音 /视频信箱系统的防欺诈能力, 提高系统安全性, 另外, 用户在访问语音 /视频信箱系统是还可以不需要输入 帐号及密码, 从而能够减低操作复杂度, 提升用户体验。 附图概述
图 1为本发明实施例的用户合法性判断方法流程示意图;
图 2为本发明实施例的控制用户接入语音 /视频信箱的原理示意图; 图 3为相关技术控制用户接入语音 /视频信箱的原理示意图;
图 4为本发明实施例 1控制用户接入语音 /视频信箱的流程示意图; 图 5为本发明实施例 2控制用户接入语音 /视频信箱的流程示意图。
本发明的较佳实施方式
下文中将结合附图对本发明的实施例进行详细说明。 需要说明的是, 在 不冲突的情况下, 本申请中的实施例及实施例中的特征可以相互任意组合。
本发明实施例中, VMS接收用户的触发消息, 从所述触发消息中获取 所述用户发起所述触发消息时所在的位置信息和 /或状态信息, 并从核心网网 元获取所述用户真实的位置信息和 /或状态信息; 所述 VMS根据所述用户发 起所述触发消息时所在的位置信息和 /或状态信息, 以及所述用户真实的位置 信息和 /或状态信息, 判断所述用户是否合法。
本发明实施例的目的是通过基于智能网的应用, 提供一种用户合法性判 断方法及装置、 用户接入信箱的方法和系统, 在投入很低的情况下, 有效提 高用户感受, 减低操作复杂度, 并且有效的防止在网间通过伪装用户主叫号 码, 进入他人语音 /视频信箱, 从而窃取非法信息的问题。 图 1为本发明实施 例用户合法性判断方法流程示意图, 如图 1所示, 该方法包括: 步骤 101 : VMS接收用户的触发消息,所述触发消息至少携带所述用户 发起所述触发消息时所在的位置信息和 /或状态信息。
这里, 所述触发消息可以为用户通过拨打语音 /视频信箱业务的接入码所 发起的触发消息, 用户拨打语音 /视频信箱业务的接入码, 接入码经过核心网 网元路由至语音 /视频信箱系统, 触发语音 /视频信箱业务。
步骤 102: 所述 VMS从所述触发消息中获取所述用户发起所述触发消息 时所在的位置信息和 /或状态信息, 并从核心网网元获取所述用户真实的位置 信息和 /或状态信息。
这里,所述 VMS可以从拜访位置寄存器( Visitor Location Register, VLR )、 归属位置寄存器( Home Location Register, HLR )或网关移动位置中心( GMLC ) 等核心网网元获取所述用户真实的位置信息和 /或状态信息。
步骤 103: 所述 VMS根据所述用户发起所述触发消息时所在的位置信息 和 /或状态信息, 以及所述用户真实的位置信息和 /或状态信息, 判断所述用户 是否合法。
这里, VMS判断所述用户是否合法可以为: 所述用户发起所述触发消息 时所在的位置信息和 /或状态信息与所述用户真实的位置信息和 /或状态信息 一致, 则判定所述用户合法,较佳的, 可以允许所述用户接入语音 /视频信箱, 引导用户进入其自己的语音 /视频信箱 ,收听语音 /视频邮件等操作;若不一致, 则判定所述用户不合法, 较佳的, 可以认为存在伪装主叫, 拒绝所述用户接 入语音 /视频信箱, 按照非法侵入流程处理(可以直接释放呼叫, 也可以记录 非法侵入并提示用户) 。
上述判断过程可以包括以下两种情况:
1 )核心网网元反馈的真实位置信息与业务触发地信息不一致, 认为该用 户不合法, 其身份为伪造, 拒绝接入;
2 )核心网网元反馈的真实状态信息为用户不在服务区、 不可达、 空闲或 关机, 则与当前用户的通话状态不一致, 认为该用户不合法, 其身份为伪造, 拒绝接入。
如果 VMS判断所述用户是否合法之前, 所述用户向所述 VMS提供了账 号及密码信息,则 VMS判断所述用户是否合法可以为: 所述用户发起所述触 发消息时所在的位置信息和 /或状态信息与所述用户真实的位置信息和 /或状 态信息一致, 且用户提供的账号及密码信息正确, 则判定所述用户合法; 若 不一致或者账号及密码信息不正确, 判定所述用户不合法。
根据以上描述, 本发明实施例的控制用户接入语音 /视频信箱的原理如图
2所示, 可以看出, 相比于图 3所示的相关技术控制用户接入语音 /视频信箱 的原理, 利用本发明实施例的方法, 有效防止他人利用网络漏洞伪装主叫号 码, 从而进入他人的语音信箱系统, 偷听、 窃取他人重要语音信息, 极大的 增强语音 /视频信箱系统的防欺诈能力。 同时不改变用户的操作习惯和用户体 验,可以不需要用户输入帐号 /密码的操作,不为用户使用增加任何的复杂度。
本发明实施例还相应地公开了一种用户合法性判断装置, 该用户合法性 判断装置包括: 接收模块、 第一获取模块、 第二获取模块和判断模块; 其中, 所述接收模块设置为: 接收用户的触发消息, 所述触发消息至少携带所 述用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述第一获取模块设置为: 从所述接收模块接收的触发消息中获取所述 用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述第二获取模块设置为: 在接收模块收到触发消息后, 从核心网网元 获取所述用户真实的位置信息和 /或状态信息;
所述判断模块设置为: 根据所述第一获取模块获取的用户发起所述触发 消息时所在的位置信息和 /或状态信息, 以及所述第二获取模块获取的用户真 实的位置信息和 /或状态信息, 判断所述用户是否合法。
所述第二获取模块从核心网网元获取所述用户真实的位置信息和 /或状 态信息为: 从 VLR、 HLR或 GMLC获取所述用户真实的位置信息和 /或状态 信息。
所述判断模块判断所述用户是否合法为:
所述用户发起所述触发消息时所在的位置信息和 /或状态信息与所述用 户真实的位置信息和 /或状态信息一致, 则判定所述用户合法; 若不一致, 则 判定所述用户不合法。 所述接收模块, 还设置为接收用户提供的账号及密码信息, 所述判断模块判断所述用户是否合法为:
所述用户发起所述触发消息时所在的位置信息和 /或状态信息与所述用 户真实的位置信息和 /或状态信息一致, 且用户提供的账号及密码信息正确, 则判定所述用户合法; 若不一致或者账号及密码信息不正确, 则判定所述用 户不合法。
本发明实施例还相应地提出了一种语音 /视频信箱系统, 该系统包括上述 的用户合法性判断装置和执行模块; 其中,
所述执行模块, 设置为: 在用户合法性判断装置判定用户合法时, 允许 所述用户接入语音 /视频信箱; 以及在用户合法性判断装置判定用户不合法 时, 拒绝所述用户接入语音 /视频信箱。
实施例 1
本实施例实施过程中主要涉及到的移动通讯网络设备有:
VLR:是一个数据库,是存储所管辖区域中 MS (统称拜访客户)的来话、 去话呼叫所需检索的信息以及用户签约业务和附加业务的信息, 例如客户的 号码, 所处位置区域的识别, 向客户提供的服务等参数.
移动交换中心 ( Mobile Switching Center, MSC ) :是 2G通信系统的核心 网网元元之一,是在电话和数据系统之间提供呼叫转换服务和呼叫控制的地 方。 MSC 转换所有的在移动电话和 PSTN 和其他移动电话之间的呼叫。 MSC移动网络完成呼叫连接、 过区切换控制、 无线信道管理等功能的设备, 同时也是移动网与公用电话交换网 (PSTN)、 综合业务数字网 (ISDN)等固定网 的接口设备。
拜访移动交换中心 (Visit-MSC, VMSC ) 。
HLR: 负责移动用户管理的数据库。 存储所管辖用户的签约数据及移动 用户的位置信息, 可为至某 MS的呼叫提供路由信息。 存放原始用户信息; 根据访问的 VLR, 记录用户所在 MSC/VLR。 HLR寄存用户的鉴约信息, 如 补充业务、 鉴权参数, 此外还有 MS的位置信息和 IMSI, ISDN码等。
系统接口单元( System interface unit, SIU )及 VMS。 首先, 用户需要注册 VMS服务, 并登记了语音 /视频信箱逻辑号码(也 即普通手机号码)和真实物理号码。
图 4为本发明实施例 1控制用户接入语音 /视频信箱的流程示意图, 如图 4所示, 该流程包括:
步骤 401: 用户拨打语音 /视频信箱系统接入码, 向网络发起呼叫; 无线 网络经由核心网网元向 VMSC/VLR发起呼叫申请;
步骤 402:VMSC/VLR依据接入码信息, 路由至网络中的业务触发端局 MSC/HLR;
步骤 403: MSC/HLR依据接入码信息,触发消息到 VMS的信令接口单元 SIU;SIU转发该消息到 VMS;
步骤 404: VMS分析触发业务的消息, 并从中提出获得发起呼叫地的位 置信息, 并记录用户状态, 默认为通话中;
步骤 405: 语音 /视频信箱系统主动构造查询信令, 依据用户语音 /视频信 箱号码, 向 MSC/HLR请求用户信息( Provide Subscriber Info ) , 这些信息包 括用户当前真实位置信息 (Location information ) , 真实状态信息 (Subscriber state);
步骤 406: MSC/HLR转发请求到 VMSC/VLR;
步骤 407: VMSC/VLR依据当前用户真实位置、 真实状态信息, 反馈应 答消息给 MSC/HLR;
步骤 408: MSC/HLR将当前用户真实位置、 真实状态信息, 反馈应答消 息给 SIU; SIU转发给 VMS;
步骤 409: 语音 /视频信箱系统对比触发信令消息中的用户位置与用户当 前真实位置一致; 对比用户真实状态与记录状态一致; 从而确认鉴权成功。
步骤 410: 鉴权成功后, VMS向核心网网元应答 ANM和 ACM信号, 并接续媒体到 VMS, 引导用户进入其自己的语音 /视频信箱, 收听语音 /视频 邮件等操作。
步骤 409还可以为: 语音 /视频信箱系统对比触发信令消息中的用户位置 与用户当前真实位置发现位置不一致时, 确认用户触发为伪造主叫触发; 或 者, 对比用户真实状态与记录状态不一致时, 确认用户触发为伪造主叫触发; 相应得,步骤 410还可以为:鉴权失败后, VMS向核心网网元应答 ANM 和 ACM信号, 并接续媒体到 VMS, 提示其为非法接入, 释放呼叫。
需要说明的是, 步骤 410中, 鉴权失败后, VMS还可以直接释放呼叫, 或者,向真实主叫通知有伪装主叫侵入其语音 /视频信箱系统行为, 已被拦截, 并记录其触发点。
实施例 2
图 5为本发明实施例 2控制用户接入语音 /视频信箱的流程示意图, 如图 5所示, 该流程包括:
步骤 501 : 用户拨打语音 /视频信箱系统接入码, 向网络发起呼叫, 无线 网络经由核心网向 VLR/VMSC发起呼叫申请;
步骤 502: VLR/VMSC依据接入码信息, 路由至网络中的业务触发端局 MSC/HLR;
步骤 503: MSC/HLR依据接入码信息,触发消息到 VMS的信令接口单元 SIU;
步骤 504: SIU转发该消息到 VMS 系统;
步骤 505 : VMS系统分析触发业务的消息,并从中提出获得发起呼叫地 的位置信息, 并记录用户状态, 默认为通话中;
步骤 506: 语音 /视频信箱系统(身份认证模块)主动构造查询信令, 依 据用户语音 /视频信箱号码, 向 SIU请求用户信息( Provide Subscriber Info ) , 这些信息包括 用户当前真实位置信息 (Location information ) , 真实状态信 息 (Subscriber state);
步骤 50 7: SIU转发该消息到 MSC/HLR;
步骤 508: MSC/HLR转发请求到 VLR/VMSC;
步骤 509: VLR/VMSC依据当前用户真实位置、 真实状态信息, 反馈应 答消息给 MSC/HLR;
步骤 510 : MSC/HLR将当前用户真实位置、 真实状态信息, 反馈应答 消息给 SIU;
步骤 511 : SIU转发给 VMS系统;
步骤 512: 语音 /视频信箱系统(身份认证模块) , 对比触发信令消息中 的用户位置与用户当前真实位置是一致;对比用户真实状态与记录状态一致; 从而确认鉴权成功;
步骤 513 : 鉴权成功后, VMS系统向 SIU应答 ANM信号;
步骤 514: SIU转发该消息到 MSC/HLR;
步骤 515: MSC/HLR转发请求到 VLR/VMSC;
步骤 516 : 鉴权成功后, VMS系统向 SIU应答 ACM信号;
步骤 517: SIU转发该消息到 MSC/HLR;
步骤 518: MSC/HLR转发请求到 VLR/VMSC;
至此, 用于与 VMS系统间建立并接续媒体。
步骤 519: VMS 系统, 引导用户进入其自己的语音 /视频信箱, 收听语 音 /视频邮件等操作。
在以上步骤 512中, 还包括语音 /视频信箱系统(身份认证模块) , 对 比触发信令消息中的用户位置与用户当前真实位置发现位置不一致时, 确认 用户触发为伪造主叫触发; 对比用户真实状态与记录状态不一致时, 确认用 户触发为伪造主叫触发; 直接释放呼叫。
可以看出,使用本发明实施例所釆用的技术, 能有效防止他人利用移动 网络漏洞伪装主叫号码, 从而进入他人的语音 /视频信箱系统, 偷听、 窃取他 人重要语音信息, 极大的增强语音 /视频信箱系统的防欺诈能力。 并且, 本发 明实施例不需要改变用户的操作习惯和用户体验, 可以不需要用户输入帐号 即密码的操作, 不为用户使用增加任何的操作复杂度。 另外, 本发明实施例 不需要语音 /视频信箱服务提供商, 不增加任何硬件投资, 只需要基于现有的 硬件, 即可实现伪装主叫的侵入检测。
需要说明的是, 由于核心网网元对空中接口具有较强的加密方式, 核心 网网元本身即可甄别在同一网络位置中, 同时存在多个相同号码同时注册的 情况, 因此, 不需要考虑伪装时釆用真实手机, 且伪装用户与真实用户位于 同一区域, 通过相同的逻辑号码同时注册的情况。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现, 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。
需要说明的是, 本发明还可有其他多种实施例, 在不背离本发明精神及 的改变和变形, 但这些相应的改变和变形都应属于本发明所附的权利要求的 保护范围。
工业实用性
通过本发明实施例, 能够有效防止他人利用网络漏洞伪装主叫号码, 从 而进入他人的语音 /视频信箱系统, 偷听、 窃取他人重要语音信息, 从而极大 的增强语音 /视频信箱系统的防欺诈能力, 提高系统安全性, 另外, 用户在访 问语音 /视频信箱系统是还可以不需要输入帐号及密码, 从而能够减低操作复 杂度, 提升用户体验。

Claims

权 利 要 求 书
1、 一种用户合法性判断方法, 该方法包括:
语音 /视频信箱系统 (VMS )接收用户的触发消息, 所述触发消息携带所 述用户发起所述触发消息时的位置信息和 /或状态信息;
所述 VMS从所述触发消息中获取所述用户发起所述触发消息时的位置 信息和 /或状态信息,并从核心网网元获取所述用户真实的位置信息和 /或状态 信息;
所述 VMS根据所述用户发起所述触发消息时所在的位置信息和 /或状态 信息,以及所述用户真实的位置信息和 /或状态信息,判断所述用户是否合法。
2、 根据权利要求 1所述的方法, 其中, 所述 VMS从核心网网元获取所 述用户真实的位置信息和 /或状态信息的步骤包括: 所述 VMS从拜访位置寄 存器 (VLR ) 、 归属位置寄存器 (HLR )或网关移动位置中心 (GMLC )获 取所述用户真实的位置信息和 /或状态信息。
3、 根据权利要求 1或 2所述的方法, 其中, 所述 VMS根据所述用户发 起所述触发消息时所在的位置信息和 /或状态信息, 以及所述用户真实的位置 信息和 /或状态信息, 判断所述用户是否合法的步骤包括:
所述用户发起所述触发消息时所在的位置信息和 /或状态信息与所述用 户真实的位置信息和 /或状态信息一致, 则判定所述用户合法; 若不一致, 则 判定所述用户不合法。
4、 根据权利要求 1或 2所述的方法, 其中, 所述 VMS判断所述用户是 否合法之前, 该方法还包括: 所述用户向所述 VMS提供账号及密码信息, 所述 VMS根据所述用户发起所述触发消息时所在的位置信息和 /或状态 信息, 以及所述用户真实的位置信息和 /或状态信息, 判断所述用户是否合法 的步骤包括:
所述用户发起所述触发消息时所在的位置信息和 /或状态信息与所述用 户真实的位置信息和 /或状态信息一致, 且用户提供的账号及密码信息正确, 则判定所述用户合法; 若不一致或者用户提供的账号及密码信息不正确, 则 判定所述用户不合法。
5、 根据权利要求 1至 4任一项所述的方法, 该方法还包括: 当判定用户 合法时, 允许所述用户接入语音 /视频信箱; 当判定用户不合法时, 则拒绝所 述用户接入语音 /视频信箱。
6、 一种用户合法性判断装置, 其包括: 接收模块、 第一获取模块、 第二 获取模块和判断模块; 其中,
所述接收模块设置为: 接收用户的触发消息, 所述触发消息至少携带所 述用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述第一获取模块设置为: 从所述接收模块接收的触发消息中获取所述 用户发起所述触发消息时所在的位置信息和 /或状态信息;
所述第二获取模块设置为: 在接收模块收到触发消息后, 从核心网网元 获取所述用户真实的位置信息和 /或状态信息;
所述判断模块设置为: 根据所述第一获取模块获取的用户发起所述触发 消息时所在的位置信息和 /或状态信息, 以及所述第二获取模块获取的用户真 实的位置信息和 /或状态信息, 判断所述用户是否合法。
7、 根据权利要求 6所述的用户合法性判断装置, 其中, 所述第二获取模 块是设置为: 从拜访位置寄存器 (VLR ) 、 归属位置寄存器(HLR )或网关 移动位置中心 (GMLC )获取所述用户真实的位置信息和 /或状态信息。
8、 根据权利要求 6或 7所述的用户合法性判断装置, 其中, 所述判断模 块是设置为:
所述用户发起所述触发消息时所在的位置信息和 /或状态信息与所述用 户真实的位置信息和 /或状态信息一致, 则判定所述用户合法; 若不一致, 则 判定所述用户不合法。
9、 根据权利要求 6或 7所述的用户合法性判断装置, 其中, 所述接收模 块, 还设置为接收用户提供的账号及密码信息, 所述判断模块是设置为:
所述用户发起所述触发消息时所在的位置信息和 /或状态信息与所述用 户真实的位置信息和 /或状态信息一致, 且用户提供的账号及密码信息正确, 则判定所述用户合法; 若不一致或用户提供的账号及密码信息不正确, 则判 定所述用户不合法。
10、 一种语音 /视频信箱系统, 其特征在于, 该系统包括: 执行模块换和 权利要求 6至 9任一项所述的用户合法性判断装置; 其中,
所述执行模块设置为: 在用户合法性判断装置判定用户合法时, 允许所 述用户接入语音 /视频信箱; 以及在用户合法性判断装置判定用户不合法时, 拒绝所述用户接入语音 /视频信箱。
PCT/CN2012/078958 2011-12-23 2012-07-20 用户合法性判断方法、装置及用户接入信箱的系统 WO2013091377A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110438683.5A CN103179504B (zh) 2011-12-23 2011-12-23 用户合法性判断方法及装置、用户接入信箱的方法和系统
CN201110438683.5 2011-12-23

Publications (1)

Publication Number Publication Date
WO2013091377A1 true WO2013091377A1 (zh) 2013-06-27

Family

ID=48639068

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/078958 WO2013091377A1 (zh) 2011-12-23 2012-07-20 用户合法性判断方法、装置及用户接入信箱的系统

Country Status (2)

Country Link
CN (1) CN103179504B (zh)
WO (1) WO2013091377A1 (zh)

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10212538B2 (en) * 2017-06-28 2019-02-19 Oracle International Corporation Methods, systems, and computer readable media for validating user equipment (UE) location
CN107734461A (zh) * 2017-09-26 2018-02-23 上海欣方智能系统有限公司 一种基于位置判定的新型电话诈骗检测与防范方法
CN109788471A (zh) * 2017-11-10 2019-05-21 中兴通讯股份有限公司 一种信息防窃取方法、服务器和计算机可读存储介质
CN110312305B (zh) 2018-03-27 2021-12-31 华为技术有限公司 终端设备的位置确定方法和设备
US10931668B2 (en) 2018-06-29 2021-02-23 Oracle International Corporation Methods, systems, and computer readable media for network node validation
US10952063B2 (en) 2019-04-09 2021-03-16 Oracle International Corporation Methods, systems, and computer readable media for dynamically learning and using foreign telecommunications network mobility management node information for security screening
US11411925B2 (en) 2019-12-31 2022-08-09 Oracle International Corporation Methods, systems, and computer readable media for implementing indirect general packet radio service (GPRS) tunneling protocol (GTP) firewall filtering using diameter agent and signal transfer point (STP)
US11553342B2 (en) 2020-07-14 2023-01-10 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming security attacks using security edge protection proxy (SEPP)
US11751056B2 (en) 2020-08-31 2023-09-05 Oracle International Corporation Methods, systems, and computer readable media for 5G user equipment (UE) historical mobility tracking and security screening using mobility patterns
US11825310B2 (en) 2020-09-25 2023-11-21 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming spoofing attacks
US11832172B2 (en) 2020-09-25 2023-11-28 Oracle International Corporation Methods, systems, and computer readable media for mitigating spoofing attacks on security edge protection proxy (SEPP) inter-public land mobile network (inter-PLMN) forwarding interface
US11622255B2 (en) 2020-10-21 2023-04-04 Oracle International Corporation Methods, systems, and computer readable media for validating a session management function (SMF) registration request
US11528251B2 (en) 2020-11-06 2022-12-13 Oracle International Corporation Methods, systems, and computer readable media for ingress message rate limiting
US11770694B2 (en) 2020-11-16 2023-09-26 Oracle International Corporation Methods, systems, and computer readable media for validating location update messages
US11818570B2 (en) 2020-12-15 2023-11-14 Oracle International Corporation Methods, systems, and computer readable media for message validation in fifth generation (5G) communications networks
US11812271B2 (en) 2020-12-17 2023-11-07 Oracle International Corporation Methods, systems, and computer readable media for mitigating 5G roaming attacks for internet of things (IoT) devices based on expected user equipment (UE) behavior patterns
US11700510B2 (en) 2021-02-12 2023-07-11 Oracle International Corporation Methods, systems, and computer readable media for short message delivery status report validation
US11516671B2 (en) 2021-02-25 2022-11-29 Oracle International Corporation Methods, systems, and computer readable media for mitigating location tracking and denial of service (DoS) attacks that utilize access and mobility management function (AMF) location service
US11689912B2 (en) 2021-05-12 2023-06-27 Oracle International Corporation Methods, systems, and computer readable media for conducting a velocity check for outbound subscribers roaming to neighboring countries

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006122445A1 (fr) * 2005-05-18 2006-11-23 Zte Corporation Procede d'identification de la validation d'un terminal mobile
CN101321068A (zh) * 2008-07-23 2008-12-10 北京握奇数据系统有限公司 实现双重身份认证的方法及装置
CN101374050A (zh) * 2008-10-23 2009-02-25 普天信息技术研究院有限公司 一种实现身份认证的装置、系统及方法

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917698B (zh) * 2010-08-20 2013-03-27 北京瑞格特软件技术有限公司 与3gpp协议兼容的提供移动设备用户信息的方法及系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006122445A1 (fr) * 2005-05-18 2006-11-23 Zte Corporation Procede d'identification de la validation d'un terminal mobile
CN101321068A (zh) * 2008-07-23 2008-12-10 北京握奇数据系统有限公司 实现双重身份认证的方法及装置
CN101374050A (zh) * 2008-10-23 2009-02-25 普天信息技术研究院有限公司 一种实现身份认证的装置、系统及方法

Also Published As

Publication number Publication date
CN103179504B (zh) 2015-10-21
CN103179504A (zh) 2013-06-26

Similar Documents

Publication Publication Date Title
WO2013091377A1 (zh) 用户合法性判断方法、装置及用户接入信箱的系统
US9961197B2 (en) System, method and apparatus for authenticating calls
US9515850B2 (en) Non-validated emergency calls for all-IP 3GPP IMS networks
US8526426B2 (en) Configuring guest users for a VoIP device of a primary user
US8249554B2 (en) Methods for provisioning mobile stations and wireless communications with mobile stations located within femtocells
US7974395B2 (en) Detection of telephone number spoofing
US6198823B1 (en) Method for improved authentication for cellular phone transmissions
US8150005B1 (en) Method, architectures and technique for authentication of telephone calls
US8611859B2 (en) System and method for providing secure network access in fixed mobile converged telecommunications networks
KR20080069210A (ko) 사용자 인터페이스 엑세스 컨트롤을 위한 시스템 및 방법
JPH08500950A (ja) 通信システムにおける効率的なリアルタイムの認証および暗号化のための方法および装置
KR20070007373A (ko) 비승인 모바일 액세스 시그널링에 대한 개선된 가입자 인증
CN102415119A (zh) 管理网络中不期望的服务请求
Mustafa et al. End-to-end detection of caller ID spoofing attacks
JP4897864B2 (ja) 移動体ネットワークにおけるサービスのcliなりすましに対する保護
US20190356782A1 (en) Call authentication using call forwarding
JP4280235B2 (ja) 移動体無線端末の識別方法
WO2012177287A2 (en) Usage authentication via intercept and challenge for network services
CN101925027A (zh) 基于被叫用户签约信息的电话免打扰方法
KR101088321B1 (ko) 이동국들 및 펨토셀들 내에 위치된 이동국들과의 무선 통신들을 프로비저닝하기 위한 방법들
JPH10304446A (ja) 通信システム
JP4433895B2 (ja) 通知番号検証システム
WO2015180324A1 (zh) 主叫用户认证方法、装置及系统
KR101408590B1 (ko) Sip 통신 시스템 및 그 제어방법과, sip 통신 시스템에 포함되는 통신 접속 장치 및 그 제어방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12860236

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12860236

Country of ref document: EP

Kind code of ref document: A1