Enhancing ENUM security
First Claim
1. A method of providing telecommunication services, comprising:
- generating fictitious contact information univocally associated with a telephone number assigned to a subscriber;
storing the fictitious contact information in a database;
receiving, from a requester, a request for contact information corresponding to said telephone number, wherein the contact information is configured to allow the requester to contact, via the Internet, the subscriber assigned said telephone number;
in response to receiving the request, providing, from the database, said fictitious contact information to the requester;
receiving, from the requester, said fictitious contact information;
based on the received fictitious contact information, determining whether properties of at least one of said requester and said request satisfy at least one security rule; and
if properties of at least one of said requester and said request satisfy said at least one security rule, providing the contact information to the requester.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing telecommunication services includes generating fictitious contact information univocally associated with a telephone number assigned to a subscriber; and storing the fictitious contact information in a database, like an ENUM database. Responsive to a request, received from a requester, of a contact information corresponding to the telephone number and adapted to allow contacting over the Internet the subscriber assignee of the telephone number, the method includes having the database providing the fictitious contact information; and conditioning a resolution of the fictitious contact information for the provisioning of the contact information to the satisfaction of at least one security rule adapted to assess properties of at least one among the requester and the request. In a case that the request from the requester satisfies the at least one security rule, the method resolves the fictitious contact information and provides the requester with the contact information.
-
Citations
19 Claims
-
1. A method of providing telecommunication services, comprising:
-
generating fictitious contact information univocally associated with a telephone number assigned to a subscriber; storing the fictitious contact information in a database; receiving, from a requester, a request for contact information corresponding to said telephone number, wherein the contact information is configured to allow the requester to contact, via the Internet, the subscriber assigned said telephone number; in response to receiving the request, providing, from the database, said fictitious contact information to the requester; receiving, from the requester, said fictitious contact information; based on the received fictitious contact information, determining whether properties of at least one of said requester and said request satisfy at least one security rule; and if properties of at least one of said requester and said request satisfy said at least one security rule, providing the contact information to the requester. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for providing telecommunication services, comprising:
-
one or more processors; and memory storing computer-readable instructions that, when executed by the one or more processors, cause the system to; generate fictitious contact information univocally associated with a telephone number assigned to a subscriber, and to cause the fictitious contact information to be stored in a database; receive, from a requester, a request for contact information corresponding to said telephone number, wherein the contact information is configured to allow the requester to contact, via the Internet, the subscriber assigned said telephone number; and in response to receiving the request, provide, from the database, said fictitious contact information to the requester; receiving, from the requester, said fictitious contact information; based on the received fictitious contact information, determining whether properties of at least one of said requester and said request satisfy at least one security rule; and if properties of at least one of said requester and said request satisfy said at least one security rule, providing the contact information to the requester. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification