Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for processing verification faailure/refusing user by intelligent metwork

A technology of verification failure and intelligent network, applied in the direction of radio/inductive link selection arrangement, electrical components, transmission system, etc., can solve problems such as disconnection, difficulty in judging terminal legitimacy, and failure to identify users

Inactive Publication Date: 2005-02-16
ERICSSON-LG
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0042] As mentioned above, in the existing mobile communication network, the authentication and authorization are analyzed for the terminal attempting to originate the call. Unconditionally disconnected, resulting in the problem of not identifying the corresponding user, making it difficult to judge the legitimacy of the corresponding terminal, and unable to take appropriate measures for the corresponding terminal
[0043] In addition, the unconditional disconnection of the service disadvantageously leads to the failure of efforts to induce the user who is in arrears to pay the service fee and promote him to become a regular user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing verification faailure/refusing user by intelligent metwork
  • Method for processing verification faailure/refusing user by intelligent metwork
  • Method for processing verification faailure/refusing user by intelligent metwork

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings.

[0065] Figure 5 is a flow chart of a method for handling a user whose authentication fails or authorization is rejected in a communication network service according to the present invention.

[0066] The present invention includes a detection point, which is used to notify the verification failure or authorization rejection of the originating call when it occurs in the intelligent network standard of BCSM, collects and analyzes information about the origination call according to the instructions of the SCP , select a route for establishing a call, and define an authorization failure trigger type to notify the SCP of the situation in the event of an authentication failure or authorization rejection for a user attempting to initiate a call, and execute a processing routine according to the instructions of the SCP.

[0067] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An intelligent network processing method of authentication failure / authorization denied party is provided including following steps: Origination_Attempt_unauthorized. When the authentication of a subscriber attempting a call origination is failed or the authorization of the subscriber is denied, the facts are detected and then reported to SCP. A call origination of SCP is connected to the prescribed position. According to the indicative guide call authentication failure / authorization denied party of SCP, the subscriber obtains the normal service.

Description

technical field [0001] The present invention relates to a method for handling authentication-failed / authorization-denied users by an intelligent network. Background technique [0002] Generally, a communication service network uses an authentication function to confirm the legitimacy of a user, and an authorization function for a user when it is necessary to suspend the user's authorization for a service in the case of using a lost terminal or delaying payment of a service fee. [0003] In particular, in the mobile communication service network, due to the physical isolation of the terminal and the service network, the following behaviors are prone to occur: the terminal is lost or stolen, or a stranger illegally copies a legitimate user's terminal for illegal use. [0004] In an effort to solve these problems, an authentication function and an authorization rejection function have been definitely and actively introduced for a user when the user requests an origination call ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04Q7/38H04L29/06H04Q3/00
CPCH04Q3/0029H04L63/08
Inventor 郑允泽朴晟均
Owner ERICSSON-LG