Assess method and system for completion of call to busy subscriber service based on identity identification

A technology for identification and service access, applied in transmission systems, subscriber special services, communication supplementary services, etc., can solve problems affecting normal users' normal calls, adverse call fairness, etc., to eliminate priority call access rights, reflect fairness effect

Active Publication Date: 2011-08-03
ZTE CORP
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this is very detrimental to call fairness, and in se

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Assess method and system for completion of call to busy subscriber service based on identity identification
  • Assess method and system for completion of call to busy subscriber service based on identity identification
  • Assess method and system for completion of call to busy subscriber service based on identity identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The basic idea of ​​the present invention is: set the identity verification mechanism to the calling user in the application server of the called side, verify the user identity carried in the call request of the call back initiated by the calling user, and the calling user who passes the identity verification Only when the incoming call is allowed, otherwise, the calling user will be denied the incoming call. The invention fully guarantees the call access sequence of the calling user to the called user, embodies the fairness of call access, and eliminates the preferential call access right of malicious users.

[0076] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail by citing the following embodiments and referring to the accompanying drawings.

[0077] image 3 It is a flow chart of Embodiment 1 of the method for accessing the busy callback service based on identi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses an assess method for a completion of call to a busy subscriber service based on identity identification, comprising the following step of: verifying the identity of a calling subscriber in a call request, after a called side application server receives a call request carrying an indication of call completion; if the verification is passed, allowing the calling subscriber to access; otherwise refusing the calling subscriber from accessing. The invention synchronously discloses an access system for a completion of call to a busy subscriber service based on identity identification, including: a receiving unit, a verifying unit, an access unit and a refusing unit, wherein the receiving unit is used for receiving the call request carrying the indication of call completion; the verifying unit is used for verifying the identity of the calling subscriber in the calling request, triggering the access unit if the verification is passed, otherwise triggering the refusing unit; the access unit is used for accessing the call for the calling subscriber; and the refusing unit is used for refusing the calling subscriber from accessing the call. The invention further discloses a call access apparatus. The invention sufficiently ensures the order of access to the called subscriber for the calling subscribers, reflects the impartiality of the call access, and eliminates the priority call access right of a malicious subscriber.

Description

technical field [0001] The present invention relates to a busy call back service (CCBS, Completion of Call to Busy Subscriber) processing technology, in particular to a called side application server (AS, Application Server) in the busy call back service based on identification of the busy call back service Access method and system. Background technique [0002] figure 1 It is a flow chart of the existing busy call back service, such as figure 1 As shown, the existing busy call back business process includes the following steps: [0003] In step 1, the calling user A calls the called user B, and the called user B rejects the call request of the calling user A because the line is busy. [0004] In step 2, the calling side application server O_AS sends a subscription message (SUBSCRIBE) to the called side application server T_AS, subscribing to the idle state of the called user. [0005] Step 3: After receiving the SUBSCRIBE sent by O_AS, T_AS returns a 202 OK message to c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/16H04W12/04H04W12/06H04W12/041
CPCH04L63/1466H04W4/16H04M3/42059H04W12/12H04M3/48H04W12/06H04L63/08H04W12/069H04W12/126
Inventor 高扬张少联邹明江
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products