System and method for implementing call authentication gateway

An authentication and gateway technology, applied in telephone communication, supervision/control of auxiliary connections, electrical components, etc., can solve the problems of complex implementation and operation, high risk, and large investment.

Inactive Publication Date: 2009-06-10
SHANGHAI LIANGJIANG COMM SYST
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires that multiple GWs in the network must have this function, but due to the limitation of the black and white list capacity of early equipment, or the GW does not have this function, and due to various combinations of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for implementing call authentication gateway
  • System and method for implementing call authentication gateway
  • System and method for implementing call authentication gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Fig. 1 is a schematic diagram of the system networking of the call authentication gateway, which consists of several mobile switching centers (MSCs), soft switches (SSs), tandem offices (MSs), and gateway offices (GWs) connected on the No. 7 signaling network 3. ), a local office (LS) or a toll office (TS), etc., the system also includes a number of signaling message detection processing devices (MPM) 1—and a local service management server (LSMS) 2, wherein:

[0019] Each MPM is connected to the No. 7 signaling link between MSC / MS / SS / GW / TS and the signaling network, and is connected to the LSMS. The MPM is used to analyze the signaling message and detect and identify the call message that has been included in the black and white list. The call source is used to control calls to blacklisted and blacklisted numbers; it is used to execute synchronous modification commands of business rules and blacklisted and blacklisted numbers from LSMS, and report working status to LSMS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a system and a method for realizing a call authentication gateway. The system consists of a plurality of signaling message detection and processing modules MPM which are connected with related No. 7 signaling links, and a local service management server LSMS, wherein the MPMs detect and process passed signaling messages and transmit related messages to the LSMS; the LSMS generates a black list with telephone numbers or number segments required for control according to a call authentication requirement, and synchronizes the black list in various MPMs; and the MPMs realize control processing of subsequent call according to the black list and service rules. The system and the method can be independently implemented without modifying the prior network equipment, avoid the problems of equipment upgrade and data modification of the prior net elements, and are flexible to control services and convenient to deploy. The system provides an effective means for telecom operators to implement call barring service and black and white list service.

Description

technical field [0001] The invention relates to a communication control and information security technology, in particular to a system and method for realizing a call authentication gateway. Specifically, on the premise of not needing to modify the existing network equipment, call authentication is implemented independently, so as to achieve the purpose of standardizing the calling number and restricting illegal calls in real time. Background technique [0002] In order to ensure smooth communication between networks, it is necessary to standardize the calling number and restrict unreasonable calls in real time. Unreasonable calls include illegal calls for the purpose of fraud, harassment, and billing evasion, and calls that should not occur in the Internet by using the caller authentication loophole of the Internet gateway GW. [0003] To control unreasonable calls, generally configure the black and white list function on the GW to control such calls. This method requires...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M7/00H04M7/06
Inventor 宋树成郭学鹏
Owner SHANGHAI LIANGJIANG COMM SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products