A method for distributing private network user numbers based on call forwarding service

A technology of call forwarding and user number, applied in communication supplementary services, network data management, electrical components, etc., can solve the problems of number segment or number leakage, number leakage, security threats, etc.

Active Publication Date: 2019-04-26
THE PLA INFORMATION ENG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The present invention aims at the existing technology that once a user number in the private network is leaked, all numbers in the same number segment will be leaked. For users with security and confidentiality requirements, the number segment or number leak will bring serious security threats and other problems, a method for distributing private network user numbers based on call forwarding service is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for distributing private network user numbers based on call forwarding service
  • A method for distributing private network user numbers based on call forwarding service
  • A method for distributing private network user numbers based on call forwarding service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment 1, combining Figure 1-Figure 3 , a method for breaking up private network user numbers based on call forwarding service, the method for breaking up private network user numbers based on call forwarding service comprises the following steps:

[0032] Step 1: Assign two MSISDN number resources and two IMSI resources to each mobile private network user, wherein, the MSISDN number resources include the private network MSISDN number and the public network MSISDN number, and the IMSI resources include the private network IMSI and the public network IMSI; The network MSISDN number is not disclosed to all users, and the public network MSISDN number is disclosed to the public as the mobile phone number assigned to the mobile private network user;

[0033] Step 2: In the mobile private network, establish the association relationship between the private network MSISDN number of the mobile private network user and the public network MSISDN number, and the association re...

Embodiment 2

[0047] Example 2, combined with Figure 1-Figure 3 , the present invention is based on the embodiment of the method for breaking up private network user numbers based on the call forwarding service, which specifically includes the following steps:

[0048] Step 100: Each mobile private network user occupies two MSISDN number resources and two IMSI resources. The two MSISDN numbers include a private network MSISDN number (hereinafter referred to as the private network number), and a public network MSISDN number (hereinafter referred to as the public network number); the two IMSIs include a private network IMSI and a public network IMSI. Among them, the private network number has a fixed number segment (such as 160xxxxxxxx), which is allocated and managed by the mobile private network operation department, and the private network number belongs to a certain HLR of the private network (called the private network HLR); the public network number has no fixed number segment , alloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of protection of numbers of private mobile communication network subscribers, and in particular relates to a method for disrupting numbers of private mobile communication network subscribers. The method for disrupting the numbers of private network subscribers based on a call forwarding service comprises the following steps of: (1), distributing two MSISDN resources and two IMSI resources to each mobile private network subscriber; (2), setting a private network MSISDN to a fixed number segment, wherein a public network MSISDN does not have a fixed number segment; (3), establishing the association relationship between the private network MSISDN and the public network MSISDN; (4), binding the private network MSISDN with a private network IMSI, and binding the public network MSISDN with a public network IMSI; and (5), setting unconditional call forwarding. By means of the method for disrupting the numbers of the private network subscribers based on the call forwarding service disclosed by the invention, the security problem that numbers of group subscribers are leaked due to the fact that special number segments of mobile private network subscribers are leaked can be solved; therefore, the number segments of the mobile private network subscribers also cannot be externally exposed while a mobile private network performs independent management of private network subscribers; and thus, the security communication purpose by construction of the mobile private network is realized.

Description

technical field [0001] The invention belongs to the technical field of user number protection of a special mobile communication network, and in particular relates to a method for breaking up user numbers of a private network based on a call transfer service. Background technique [0002] At present, mobile communication has become the most important means of communication for the public. Just like the PSTN network, the mobile communication network was originally designed to meet the communication needs of ordinary public users, without considering special user groups (such as the party, government, military, business, etc.) etc.) the need for secure and confidential communications. The secure and confidential communication here includes the confidentiality of communication content, communication behavior and user sensitive data. Therefore, the current public mobile communication network cannot guarantee the security requirements of special user groups. [0003] Building a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/16H04W8/18H04W8/20H04W12/02
CPCH04W4/16H04W8/183H04W8/205H04W12/02
Inventor 刘彩霞季新生汤红波彭建华张汝云朱可云马宏俞定玖许明艳柏溢王晓雷陈萌萌詹旭杨梅樾
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products