Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method of call authentication and VOIP (voice over internet phone) system

A technology of authentication information and authentication request, applied in the field of communication, can solve the problem of user authentication that cannot be called party, and achieve the effect of satisfying the needs of authentication

Inactive Publication Date: 2011-05-11
NEW H3C TECH CO LTD
View PDF2 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because in the whole process of call establishment, the called party's phone sends a response message to the proxy server without a request message, so the proxy server has no chance to use a wrong response to notify the called party's phone to carry the authentication information to complete the call. The process of call establishment, therefore, the existing call authentication scheme cannot authenticate the user of the called party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of call authentication and VOIP (voice over internet phone) system
  • Method of call authentication and VOIP (voice over internet phone) system
  • Method of call authentication and VOIP (voice over internet phone) system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Embodiment 1 of the present invention provides a method for call authentication, such as figure 2 As shown, the method includes:

[0048] Step 201, the phone of the calling party sends an Invite message carrying authentication service information to the proxy server.

[0049] Specifically, the authentication service information is used to instruct the proxy server to authenticate the called party user. The way of carrying the authentication service information in the Invite message includes but not limited to: extending a SIP header field carrying the authentication service information, or adding the authentication service information to the number in the TO header field. The following takes adding authentication service information to the number in the TO header field as an example to illustrate how to carry the authentication service information in the Invite message:

[0050] To: (1)

[0051] As shown in (1), the called number in the To header field has changed fr...

Embodiment 2

[0065] Embodiment 2 of the present invention provides a method for call authentication, such as image 3 shown, including:

[0066] Step 301, the phone of the calling party sends an Invite message to the proxy server.

[0067] Different from step 201, the Invite message does not carry authentication service information.

[0068] Step 302, the proxy server searches the stored authentication number list according to the number of the called party's phone, and if the number of the called party's phone is found in the authentication number list, step 303 is executed.

[0069] For example, for some important phone numbers, the user of the called party using the phone number can be pre-set in the proxy server for authentication. After the proxy server receives the call, it first judges whether the number of the called party's phone is a number that needs to be authenticated, if yes, execute step 303, if not, refer to figure 1 As shown in , the proxy server sends an invitation mes...

Embodiment 3

[0074] Embodiment 3 of the present invention provides a method for call authentication, and figure 2 and image 3 As shown, before the called party's phone sends a 200 OK message carrying authentication information to the proxy server, the called party's phone first authenticates the authentication information input by the user. by figure 2 The scenario shown is taken as an example, the method provided in the third embodiment is as follows Figure 4 shown, including:

[0075] Steps 401-403, and figure 2 Steps 201 to 203 in the illustrated embodiment are the same and will not be repeated here.

[0076] In step 404, the called party's phone performs authentication according to the authentication information input by the user. If the authentication is passed, step 407 is executed; if the authentication fails, step 405 is executed.

[0077] Wherein, at least two ways for the called party's phone to perform authentication according to the authentication information input by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of call authentication and a VOIP (voice over internet phone) system, and the method comprises the following steps: calling a called party phone according to a calling party phone by an agency server, and carrying an authentication request in an inviting message sent by the called party phone; prompting a user to input authentication information by the called party phone according to the authentication request carried in the inviting massage; and receiving a response message carrying the authentication information sent by the called party phone by the agency server, carrying out authentication on the authentication information, terminating the calling if the authentication is failed, and allowing the calling if the authentication is passed. In the invention, the agency server ensures that the inviting massage sent by the called party phone carries authentication request, the called party phone reminds the user of inputting the authentication information according to the authentication request, and the identity authentication of the called party is realized through the authentication information, thereby satisfying the demand of the authentication of the user of the called party in the existing VOIP system.

Description

technical field [0001] The invention relates to the field of communication, in particular to a call authentication method and a VOIP system. Background technique [0002] In the VoIP (Voice over Internet Protocol, which digitizes the analog voice signal and transmits it in real time on the IP data network in the form of data packets) system, when the server receives a request from the phone to initiate a call, it can force the caller to call. After authentication, the call request will be accepted and subsequent processing will be performed after the authentication is passed. The specific process of this authentication mechanism is as follows: figure 1 shown. From figure 1 As can be seen from the figure, SIP (Session Initiation Protocol, Session Initiation Protocol) is to realize the caller's user by replying a 407 response to the Invite request of the calling party's phone and requesting the calling party's phone to resend the Invite request carrying authentication infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04M7/00
Inventor 吴国华
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products