METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR DETECTION OF AN UNAUTHORIZED SERVICE MESSAGE IN A NETWORK
First Claim
1. A method for detecting an unauthorized service message in a communications network, the method comprising the steps of:
- at a supplementary services network routing node, at least a portion of which is implemented in hardware;
receiving a signaling message associated with a supplementary service (SS) message or a unstructured supplementary service data (USSD) message identifying a first network node as a node serving a sender of the SS or USSD message, the signaling message comprising identification information of the sender of the SS or USSD message and first identification information of the first network node;
requesting, from a second network node, identification information identifying a network node serving the sender of the SS or USSD message; and
comparing the first identification information with the second identification information in order to determine whether the SS or USSD message is authorized or not.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is described for detecting an unauthorized service message in a communications network. The method comprising the steps of: receiving a signaling message associated with a supplementary service (SS) message and/or a unstructured supplementary service data (USSD) message from a first network node, the signaling message comprising identification information of the sender of the SS message and/or USSD message and first location information of the first network node; requesting second location information of the first network node from the a second network node serving the sender of the SS message and/or USSD message; and, comparing the first location information with the second location information in order to determine whether the SS message and/or USSD message is authorized or not.
-
Citations
20 Claims
-
1. A method for detecting an unauthorized service message in a communications network, the method comprising the steps of:
at a supplementary services network routing node, at least a portion of which is implemented in hardware; receiving a signaling message associated with a supplementary service (SS) message or a unstructured supplementary service data (USSD) message identifying a first network node as a node serving a sender of the SS or USSD message, the signaling message comprising identification information of the sender of the SS or USSD message and first identification information of the first network node; requesting, from a second network node, identification information identifying a network node serving the sender of the SS or USSD message; and comparing the first identification information with the second identification information in order to determine whether the SS or USSD message is authorized or not. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A network node comprising a router for routing supplementary service (SS) messages or unstructured supplementary service data (USSD) messages, the network node comprising:
-
a receiver for receiving a signaling message associated with an SS message or USSD message, the signaling message comprising identification information of the sender of the SS or USSD message and first identification information identifying a first network node as a node serving the sender of the SS or USSD message; a serving node request unit for requesting, from a second network node, second identification information identifying a network node serving the sender of the SS or USSD message; a comparator for comparing the first identification information with the second identification information in order to determine whether the SS or USSD message is authorized or not. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A network node for detecting spoofing of service messages, the network node comprising:
-
a receiver for receiving a signaling message associated with a service message, the signaling message including identification information of a sender of the service message and first identification information identifying a first network node as a node serving the sender of the service message; a serving node request unit for requesting, from a second network node, second identification information identifying a network node serving the sender of the service message; and a comparator for comparing the first identification information with a second identification information in order to determine whether the service message is authorized or not. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer readable medium having stored thereon executable instructions that when executed by the processor of a computer control the computer to perform the steps comprising:
-
receiving a signaling message associated with a supplementary service (SS) message or a unstructured supplementary service data (USSD) message identifying a first network node as a node serving a sender of the SS or USSD message, the signaling message comprising identification information of the sender of the SS or USSD message and first identification information of the first network node; requesting, from a second network node, identification information identifying a network node serving the sender of the SS or USSD message; and comparing the first identification information with the second identification information in order to determine whether the SS or USSD message is authorized or not.
-
Specification