Method for realizing calling authentication gateway

An authentication and gateway technology, applied in the field of call authentication gateway, can solve the problems of high risk, complex implementation and operation, and large investment

Inactive Publication Date: 2010-07-07
SHANGHAI LIANGJIANG COMM SYST
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires that multiple GWs in the network must have this function, but due to the limitation of the black and white list capacity of early equipment, or the GW does not have this function, and due to various combinations of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing calling authentication gateway
  • Method for realizing calling authentication gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] figure 1 It is a schematic diagram of the service flow realization of the call authentication gateway. The analysis processing steps are as follows:

[0010] First deploy the call authentication gateway system, and the MPM is serially connected to the relevant signaling links that require call authentication in a non-signaling point coding working mode. The system enters the working state:

[0011] The first step: detecting the signaling message in transmission, and when it is recognized that the type of the signaling message is a telephone call, then enter the call authentication analysis processing program of the second step, otherwise pass the signaling message;

[0012] Second step: detect the title code of the signaling message, if it is not the initial address message, then pass the signaling message; if it is the initial address message, then extract the calling number, and use the calling number as an index to query the black and white list data table, Divide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing a calling authentication gateway, wherein a system of the method consists of a plurality of signaling message detecting and processing device MPMs and a local service management server (LSMS), wherein the MPMs are connected with a relevant No.7 signaling link; the MPMs are used for detecting and processing a flowing-through signaling message and collecting a relevant message to the LSMS; the LSMS is used for leading a phone number or a number segment required to be controlled to generate a blacklist and synchronizing the blacklist to each MPM according to the calling authentication requirement; and the MPMs can realize the controlling and processing for subsequent calling according to a black and white list and the business rule. The method can be implemented independently without reforming the existing network equipment, thereby avoiding the problems of equipment update and data modification for the existing network element; the business control is flexible, and the deployment is convenient. The system can provide an effective means for implementing calling control and black and white list business for telecom operators.

Description

technical field [0001] The invention relates to a communication control and information security technology, in particular to a method for realizing a call authentication gateway. Specifically, on the premise of not needing to modify the existing network equipment, call authentication is implemented independently, so as to achieve the purpose of standardizing the calling number and restricting illegal calls in real time. Background technique [0002] In order to ensure smooth communication between networks, it is necessary to standardize the calling number and restrict unreasonable calls in real time. Unreasonable calls include illegal calls for the purpose of fraud, harassment, and billing evasion, and calls that should not occur in the Internet by using the caller authentication loophole of the Internet gateway GW. [0003] To control unreasonable calls, generally configure the black and white list function on the GW to control such calls. This method requires that multi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/66
Inventor 宋树成
Owner SHANGHAI LIANGJIANG COMM SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products