Enhancing ENUM Security
First Claim
1. A method of providing telecommunication services, comprising:
- generating a fictitious contact information univocally associated with a telephone number assigned to a subscriber;
storing the fictitious contact information in a database;
responsive to a request, received from a requester, of a contact information corresponding to said telephone number and adapted to allow contacting over the Internet the subscriber assignee of said telephone number, having the database providing said fictitious contact information;
conditioning a resolution of the fictitious contact information for the provisioning of the contact information to the satisfaction of at least one security rule adapted to assess properties of at least one among said requester and said request, andin case the request from the requester satisfies said at least one security rule, resolving the fictitious contact information and providing to the requester the contact information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing telecommunication services includes generating a fictitious contact information univocally associated with a telephone number assigned to a subscriber; and storing the fictitious contact information in a database, like an ENUM database. Responsive to a request, received from a requester, of a contact information corresponding to the telephone number and adapted to allow contacting over the Internet the subscriber assignee of the telephone number, the method includes having the database providing the fictitious contact information; and conditioning a resolution of the fictitious contact information for the provisioning of the contact information to the satisfaction of at least one security rule adapted to assess properties of at least one among the requester and the request. In a case that the request from the requester satisfies the at least one security rule, the method resolves the fictitious contact information and provides the requester with the contact information.
-
Citations
19 Claims
-
1. A method of providing telecommunication services, comprising:
-
generating a fictitious contact information univocally associated with a telephone number assigned to a subscriber; storing the fictitious contact information in a database; responsive to a request, received from a requester, of a contact information corresponding to said telephone number and adapted to allow contacting over the Internet the subscriber assignee of said telephone number, having the database providing said fictitious contact information; conditioning a resolution of the fictitious contact information for the provisioning of the contact information to the satisfaction of at least one security rule adapted to assess properties of at least one among said requester and said request, and in case the request from the requester satisfies said at least one security rule, resolving the fictitious contact information and providing to the requester the contact information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing telecommunication services, comprising:
-
a generator adapted to generate fictitious contact information univocally associated with a telephone number assigned to a subscriber, and to cause the fictitious contact information to be stored in a database as a contact information of said subscriber; a security policy rules enforcer adapted to; receive from a requester a request of resolution of said fictitious contact information for obtaining a contact information corresponding to said telephone number, said contact information being adapted to allow contacting over the Internet of a subscriber having said telephone number; and
tocondition a resolution of the fictitious contact information and the provision to the requester of the contact information to at least one security rule adapted to assess properties of at least one among said requester and said request. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification