Recherche Images Maps Play YouTube Actualités Gmail Drive Plus »
Connexion
Les utilisateurs de lecteurs d'écran peuvent cliquer sur ce lien pour activer le mode d'accessibilité. Celui-ci propose les mêmes fonctionnalités principales, mais il est optimisé pour votre lecteur d'écran.

Brevets

  1. Recherche avancée dans les brevets
Numéro de publicationUS20060286978 A1
Type de publicationDemande
Numéro de demandeUS 11/508,194
Date de publication21 déc. 2006
Date de dépôt23 août 2006
Date de priorité5 août 2002
Autre référence de publicationUS7590417, US20060246897
Numéro de publication11508194, 508194, US 2006/0286978 A1, US 2006/286978 A1, US 20060286978 A1, US 20060286978A1, US 2006286978 A1, US 2006286978A1, US-A1-20060286978, US-A1-2006286978, US2006/0286978A1, US2006/286978A1, US20060286978 A1, US20060286978A1, US2006286978 A1, US2006286978A1
InventeursJohn Jiang
Cessionnaire d'origineJiang John Y J
Exporter la citationBiBTeX, EndNote, RefMan
Liens externes: USPTO, Cession USPTO, Espacenet
Method and system for cellular network traffic redirection
US 20060286978 A1
Résumé
A method and system for countering anti-traffic redirection of a roaming mobile station is provided. Observing registration messages exchanged between the visiting network and the home network, the disclosed invention detects if the visiting network has deployed an anti-traffic-redirection mechanism as aimed at fooling the home network into permitting connection with a non-preferred network. The invention also provides for a way to steer the roamer to reattempt connection with a preferred network.
Images(6)
Previous page
Next page
Revendications(26)
1-50. (canceled)
51. A method for controlling wireless network traffic, the method comprising:
determining when a roaming mobile station initiates a registration attempt with a non-preferred network, wherein initiating comprises the mobile station sending a message to a Home Public Mobile Network (HPMN) to update its location; and
receiving a response at the mobile station indicating that the registration attempt is terminated, wherein the response comprises an error message.
52. The method of claim 51, wherein determining when a roaming mobile station initiates a registration attempt with a non-preferred network comprises reading a location update request from the mobile station.
53. The method of claim 52, wherein the error message comprises a message that an update location transaction is aborted.
54. The method of claim 52, wherein the error message comprises timing out a response to the location update request.
55. The method of claim 51, wherein determining when a roaming mobile station initiates a registration attempt with a non-preferred network comprises sending an authentication request from a visited network.
56. The method of claim 55, wherein the error message comprises a message that a send authentication information transaction is aborted.
57. The method of claim 55, wherein the error message comprises timing out a response to the authentication request.
58. The method of claim 52, wherein the error message comprises a message that roaming is restricted.
59. The method of claim 51, further comprising:
the mobile station sending a subsequent registration attempt with a subsequent network;
if the subsequent network is determined to be a non-preferred network, receiving the response at the mobile station indicating that the registration attempt is terminated; and
if the subsequent network is determined to be a preferred network, proceeding with the registration attempt, wherein the mobile station is not otherwise aware of which networks are preferred and which networks are non-preferred.
60. A system for directing roaming network traffic, the system comprising:
a communications relationship with Home Public Mobile Network (HPMN) that is a home network of a mobile station;
a Visiting Public Mobile Network (VPMN) configured to communicate with the HPMN via a signaling network, wherein the mobile station is roaming when in the VPMN; and
a traffic redirection node configured to monitor signaling between the HPMN and the VPMN, including determining when the mobile station is roaming in the VPMN and whether the VPMN is a preferred network, wherein if the VPMN is not a preferred network, receiving a message from the HPMN at the mobile station to terminate a current transaction between the VPMN and the HPMN.
61. The system of claim 60, wherein the transaction is selected from a group consisting of
an update location transaction;
a request for authentication information; and
a message indicating that the current transaction is timed out.
62. The system of claim 60, wherein:
the mobile station is configured to receive the message and in response, attempt to register with a subsequent VPMN, wherein the mobile station is not aware of which networks are preferred and which networks are non-preferred; and
the traffic redirection node is further configured to monitor signaling between the HPMN and the subsequent VPMN, including determining whether the subsequent VPMN is a preferred network, wherein if the subsequent VPMN is not a preferred network, the HPMN sends a message to the mobile station to terminate a current transaction between the subsequent VPMN and the HPMN.
63. A method for directing a network entity to a particular network, the method comprising:
detecting a roaming network entity is registering with a visited network;
detecting the visited network is a non-preferred network; and
initiating a redirection message to the network entity that causes the network entity to search for a preferred network.
64. The method of claim 63, wherein detecting the roaming network entity is registering with a visited network includes tapping a message and determining at least a Mobile Country Code (MCC) and a Mobile Network Code (MNC).
65. The method of claim 64, wherein the message is an Update Location message.
66. The method of claim 63, further comprising:
receiving the redirection message at an over-the-air (OTA) server;
encrypting the message; and
forwarding the message to a short message service center (SMSC)>
67. The method of claim 63, further comprising:
determining whether the network entity includes a Subscriber Identity Module (SIM) toolkit application (STK); and
if the network identity includes an STK, initiating redirection with the STK.
68. The method of claim 63, further comprising:
if the network identity includes an STK, determining whether a Public Land Mobile Network (PLMN) list is on the SIM; and
if not, forwarding a PLMN list to the SIM.
69. The method of claim 63, further comprising:
in response to the message, initiating redirection procedures; and
updating information on the SIM, including:
a home PLMN search time period;
a PLMN selector file; and
a location information file.
70. The method of claim 63, further comprising:
in response to the message, issuing a RUN AT+COPS command to select a specific network.
71. A system for directing wireless network traffic, the system comprising:
a network operator backend, including an OTA interface; and
a traffic redirection network entity, wherein the traffic redirection network entity communicates with a mobile station to direct registration with a particular network when the mobile station attempts registration with a non-preferred network.
72. The system of claim 71, wherein the traffic redirection network entity comprises a traffic redirection node, a traffic redirection roaming probe, and a traffic redirection application.
73. The system of claim 72, wherein, in a passive mode, the traffic redirection network entity monitors a signaling link between a home network and an SS7 signaling network to determine a network the mobile station is currently registered with.
74. The system of claim 72, wherein, in an active mode, the traffic redirection node is in a signaling path between a visited location register in a visited network and a home location register in a home network that determines a network the mobile station is currently registered with.
75. The system of claim 72, wherein, in an active mode, the traffic redirection node is in a signaling path between a visited location register in a visited network and a home location register in a home network.
Description
    RELATED APPLICATIONS
  • [0001]
    This application claims priority from U.S. Provisional Patent Application Ser. No. 60/662,031 entitled “Method and Apparatus for Defense Against Defense Against Network Traffic Redirection”, filed Mar. 14, 2005 and is a continuation-in-part of United States patent application entitled “Method And System For Cellular Network Traffic Redirection” application Ser. No. 10/635,804 filed on Aug. 05, 2003, claiming priority from Aug. 05, 2002. Both of those patent applications in their entirety are incorporated herein by this reference.
  • BACKGROUND
  • [0002]
    1. Field of the Invention
  • [0003]
    The present invention relates to traffic redirection in a wireless network. More particularly the invention discloses a method, system and program product to counter anti-traffic redirection mechanisms.
  • [0004]
    2. Background of the Technology
  • [0005]
    Wireless communication networks have become an integral part of today's digital lifestyle. The necessity and the desire to remain connected at all points of time has resulted in wireless operators expanding their networks to almost all conceivable parts of the world.
  • [0006]
    Different standards and protocols have been adopted in the industry, depending upon the users' requirement and the preference of the operators in a particular geographical location. Some of the popular technologies that are present in this domain include GSM, GPRS, 3G, CDMA, WCDMA, TDMA, WLL, WiFi, WiMax and VoIP. All of these technologies have their merits and shortcomings and provide a gamut of voice based and data based services. A network operator may be providing one or more of voice/data service using one or a combination of the aforementioned technologies.
  • [0007]
    In order to prevent monopoly of a service provider, various geographical zones are allotted to one or more network operators. These operators usually provide competitive services in their zone. A particular network operator may be present in more than one geographical zone. In order to provide seamless service to a subscriber, the network operators not only cater to the subscribers directly registered with them but also to their subscribers from other zones and/or the subscribers of other network operators with whom they have a “roaming” agreement. Often, those roaming arrangements are bilateral, such that the subscribers of each geographically diverse operator are enabled to receive roaming service within the zone of the other operator. The network with which the subscriber has a direct relationship is called the subscriber's Home Network. Any other network in which the user may roam is called the Visiting Network. The subscriber is referred to as an outbound roamer from the perspective of the Home Network and an inbound roamer from the perspective of the Visited Network.
  • [0008]
    As mentioned above, at any given geographical location, there maybe more than one network operator providing one or more kinds of service. The home network of the roaming user may prefer one visited network over another, or may want to allocate varying percentages of their outbound roamers' traffic to different operators. Various factors such as commercial terms, quality of service, range of service and the like would dictate such a preference or roaming distribution. Under ideal scenario the home network would make all possible efforts to ensure that its outbound roamers register to the visited network operator that it prefers in that case.
  • [0009]
    Traffic Redirection (TR) or Steering of Roaming (SoR) is a method by which the home network operators use the messages exchanged in a Mobile Application Part (MAP) based signaling scheme so as to steer their subscribers to attempt connection with the preferred network/s according to some logics or distribution. The term preferred network is used herein, to refer either static preferences of one network over another or dynamic preference of one network over another based on some logics or distribution (e.g. subscriber profiles, the visiting country, current distribution of outbound roamers in the country).
  • [0010]
    Due to the magnitude of revenues generated through inbound roaming, operators are always motivated to capture the maximum amount possible of inbound roaming traffic. Billboards and advertisements at airports and borders, and the competition among operators to install the most powerful transmitters at those locations bear witness to that. With the advent of Steering of Roaming, operators today are motivated to disrupt traffic redirection attempts and try to cause inbound roamers to register automatically with their networks. This not only results in loss of revenues to the home network operator but also may not provide the subscriber the best quality and range of services as desired by the home network operator.
  • [0011]
    There is a need in the art for a method and system that counters the anti-traffic redirection attempts and steers roamers back to the preferred networks.
  • BRIEF DESCRIPTION OF THE FIGURES
  • [0012]
    In the drawings, the same or similar reference numbers identify similar elements or acts.
  • [0013]
    FIG. 1 is a block diagram of an embodiment of the anti-anti-Traffic Redirection system.
  • [0014]
    FIG. 2 is a flowchart illustrating the method for countering an anti-TR approach, as per some embodiments of the invention.
  • [0015]
    FIG. 3 shows the signal flow for countering an anti-TR approach that fakes manual mode of the handset or fakes the scenario of being the only network available.
  • [0016]
    FIG. 4 shows the signal flow for countering an anti-TR approach that fakes the presence of a special handset.
  • [0017]
    FIG. 5 shows the signal flow for countering a GLR based anti-TR.
  • DETAILED DESCRIPTION
  • [0018]
    A method for detecting the anti-TR mechanism and redirecting the roamer to a preferred network is disclosed. The method detects the presence of an anti-TR solution by observing one or more registration messages exchanged by a visiting network and a home network. The method includes steps to steer the roamer to reattempt connection with the preferred networks by sending appropriate registration response messages in response to the observed registration messages.
  • [0019]
    The invention also discloses a system for detecting the anti-TR mechanism and redirecting the roamer to a preferred network. The system includes a probing block to observe the registration messages exchanged between the Home Network and the Visiting Network. The system further includes a detection block to detect the presence of an anti-TR mechanism deployed at the visiting network, based on the registration messages as observed by the probing block. The invention also provides for a redirection module that attempts to redirect the roamer to attempt reconnection with a preferred visiting network.
  • [0020]
    Various embodiments are disclosed herein, which counter the various approaches that an anti-TR mechanism may take so as to fail the TR mechanism of the home network.
  • [0021]
    A computer program product for realising the aforementioned method is also claimed herein.
  • [0022]
    The following description provides specific details for a thorough understanding and an enabling description for various embodiments of Anti-Traffic Redirection Countering System (ATRCS). However, one skilled in the art will understand that the ATRCS may be practiced without these details. In other instances, well-known structures and functions have not been shown or described in detail to avoid unnecessarily obscuring the description of the embodiments of the ATRCS. The headings provided herein are for illustrative purposes only and do not affect the scope or meaning of the claimed invention. An Appendix includes an explanation of numerous acronyms used herein and is included below for reference. Therefore, the acronyms used may not be spelled out in the body of the document.
  • [0023]
    The invention would now be described with reference to the accompanying figures. Although the invention is being described with GSM as the underlying technology and focus, the inventive concept is equally applicable in other wireless technologies such as CDMA, WCDMA, WiFi, WiFiMax, VoIP etc. In context of a cell-based GSM network, the home network has been referred to as Home Public Mobile Network (HPMN) and the visiting network has been referred to as Visiting Public Mobile Network (VPMN). Furthermore the HPMN and VPMN may both have more than one network operators wherein the HPMN may prefer certain VPMN network operators to the others. The terms HPMN/HPMN network/HPMN network operator and VPMN/VPMN network/VPMN network operator have been used interchangeably throughout this specification and their intended meaning is driven by the context in which they have been used. The term subscriber is used herein to indicate a user that registers with a network. The subscriber that registers with a network can be any combination of hardware and software capable of registering on a wireless network, e.g., a personal digital assistant (PDA) or a personal computer (PC).
  • [0024]
    The methods and system disclosed herein use the Mobile Application Part (MAP)-signaling messages exchanged between the VPMN and the HPMN to detect any anti-TR solutions deployed by the visiting network and thereafter steer the roamer to attempt reconnection with the preferred network.
  • [0025]
    FIG. 1 illustrates a block diagram of a system in accordance with an embodiment of the present invention. System comprises a HPMN 102 communicating with VPMNs 104 and 106 via a SS7 interface 108. Although the embodiment is described illustrating communication between one HPMN and two VPMNs, a number of VPMNs may be communicating with HPMN 102. Out of these VPMNs, some may be the preferred VPMNs of HPMN. In this illustrative embodiment, VPMN 106 is the preferred VPMN and VPMN 104 is the non-preferred VPMN that has deployed an anti-TR solution. HPMN 102 comprises an anti-anti-TR block 110, an HPMN Roaming Signal Transfer Point (STP) 112, and an HPMN HLR 114. Anti-anti-TR block 110 and HPMN HLR 114 are coupled to HPMN Roaming STP 112. Anti-anti-TR block comprises of three modules, a probing block 110 a, a detecting block 110 b and a redirecting block 110 c. The functions of these blocks has been discussed in detail below. These blocks are logical blocks and may be present as one single entity or may be formed by one or more logical/physical entities. System further comprises an international STP 116, corresponding with HPMN 102, to route the signals to another international STP 118 that corresponds with VPMNs 104 and 106. VPMN 104 comprises a VPMN STP 120 coupled to a VPMN VLR/VMSC 122. VPMN 106 and other VPMNs would also have a similar structure (not shown in this diagram). HPMN Roaming STP 112 communicates with VPMN STP 120 and VPMN STP 124 via international STP 116, SS7 interface 106 and international STP 118. The aforesaid embodiment is described using the blocks pertinent to the invention, however various other blocks may be present in HPMN and VPMNs.
  • [0026]
    In accordance with one embodiment of the invention, the HPMN 102 may deploy a TR solution so as to steer its outbound roamers to its preferred VPMNs 106. In order to counter this TR, the non-preferred VPMNs 104 may deploy anti-TR solutions that would try to pull the inbound roamers on to their networks. The anti-TR solution is deployed in the VPMN 104 network either by monitoring the roaming MAP transactions and injecting spurious messages or by intercepting the roaming MAP transactions and faking interactions as if from the roaming handset or the real VPMN VLR.
  • [0027]
    The invention discloses two possible modes of operation of the anti-anti-TR solution i.e. the monitoring approach and the in-signaling approach.
  • [0000]
    Monitoring Approach
  • [0028]
    In an embodiment of the invention, anti-anti-TR module 110 detects the anti-TR attempt by monitoring passively the exchange of at least one registration message between HPMN 102 and VPMN 104. In one embodiment of the invention, probing block 110 a observes the registration messages exchanged between HPMN 102 and VPMN 104. The detecting block 110 b detects an anti-TR attempt, by observing the type and frequency (explained in detail below) of messages exchanged between HPMN 102 and VPMN 104. In one embodiment of the invention, at least one registration message is a Location Update (LUP) message.
  • [0000]
    In-signaling Approach
  • [0029]
    In another embodiment of the invention, anti-anti-TR module 110 detects an anti-TR attempt by actively monitoring the signaling between HPMN 102 and VPMN 104. The anti-anti-TR block actively monitors the exchange of at least one registration message between HPMN 102 and VPMN 104. Active monitoring is hereinafter referred interchangeably as in-signaling mode. In the in-signaling mode the anti-anti-TR block 110 is deployed on roaming SS7 path by configuring HPMN's 102 roaming STP 112 to route roaming SCCP traffic through anti-anti-TR module 110.
  • [0030]
    It will apparent to a person skilled in the art, that different routing methods can be used without affecting the working of the system or method as disclosed herein.
  • [0031]
    FIG. 1 depicts both the monitoring based and in-signaling path based anti-anti-TR architecture. In the case of monitoring-based anti-anti-TR solution, there will be an additional tapping of international roaming links between HPMN and international signal carriers. In the case of in-signaling path based anti-anti-TR solution, roaming SS7 messages from any VPMN are redirected thru the anti-anti-TR block 110 by the HPMN Roaming STP 112. Whatever deployment option is chosen, the anti-anti-TR detection mechanism will receive an outbound roamer's Location update transaction between VPMN 104, 106 and HPMN 102. In both cases however, the anti-anti-TR block 110 will inject or modify MAP transactions on outbound roamers.
  • [0032]
    If the roamer still succeeded to register on the non-preferred VPMN network after a HPMN anti-anti-TR solution, then HPMN 102 can deduce the failure of the HPMN TR/anti-anti-TR solution and the success of the VPMN anti-TR solution. If the roamer failed to register on the VPMN network 104 after the anti-anti-TR solution, then HPMN 102 can deduce the success of the HPMN TR/anti-anti-TR solution and the failure of the VPMN anti-TR solution.
  • [0033]
    Based on these deductions and subsequent success or failure of HPMN TR/anti-anti-TR, HPMN 102 can produce all kinds of reports such as signaling load overhead, TR/anti-anti-TR success/failure, percentage of redirected outbound roaming traffic etc.
  • [0034]
    The anti-TR solution deployed by VPMN 104, may take one or more approaches. We now explain each of these approaches and how the instant invention's anti-anti-TR solution counters each of these approaches.
  • [0000]
    Fake Manual Mode or No-Coverage Detection Defense
  • [0035]
    A basic idea for implementing an anti-TR solution at a VPMN is to fool the HPMN TR to think that the handset is operating in manual mode or the VPMN is the only network in coverage. This is achieved by repeatedly sending a location update on the same network location despite more than 4 location update rejections from the HPMN TR already.
  • [0036]
    Since TR should not try to reject registration of devices in a manual selection or if the VPMN is the only network in coverage, recognition of this mode of an outbound roaming device is important. To avoid bad customer experience, the current TR solution deduces the manual mode or VPMN-only coverage if the outbound roamer's location update from the same VMSC/VLR of the VPMN comes back the fifth time despite rejected the previous 4 times consecutively. This makes it easier for the anti-TR solution of a VPMN operator to fake the manual mode or VPMN-only coverage on behalf of the inbound roaming device.
  • [0037]
    However the anti-TR solution generally cannot hold for a long time to respond to the registration of an inbound roaming device. This is because the handset might move to another network or try another registration anyway if its registration attempt is timed out. The anti-TR solution also cannot easily select some random or configurable intervals to fake new location update since inter-location update intervals are very unpredictable. These intervals not only vary among different handset types, but also can have a small range even for the same handset type. It is also possible that inter network location update intervals can vary between different operators/networks. Furthermore, inter network location update intervals might also vary among different handset types but also can have a small range even for the same handset type. The most likely scenario for an anti-TR solution to do by a VPMN, after suspecting the response to the first location update from the device is a TR attempt, is to fairly rapidly fire one or more location update in succession, on the same VMSC/VLR on behalf of the inbound roaming device at the VPMN.
  • [0038]
    For example, if the anti-TR solution fires 3 more location updates after the first TR reject, then the total TR rejects will be 4. The handset will then try another location update on the same location; the HPMN TR solution will allow the location update. For another example, if the anti-TR solution fires one more location update after the first reject, then the total TR rejects will be 2 at the moment. The handset will then try 3 more location updates on the same location. The HPMN TR solution will allow the last location update normally.
  • [0039]
    To counter such a tactic, the anti-anti-TR solution keeps the original TR mechanism of deducing the manual mode or VPMN-only coverage but does not count a location update that comes within a configurable threshold time interval, for example within 15 seconds, after a previous location update is rejected.
  • [0040]
    FIG. 2 illustrates some countering approaches for an anti-TR solution deployed by non-preferred VPMN 104. FIG. 2 shows these approaches in conjunction with each other. However these individual approaches may be implemented in isolation or in any combination along with other approaches for anti-anti-TR.
  • [0041]
    As mentioned before the anti-anti-TR block 110 receives LUP messages by either monitoring the SS7 link between the Roaming STP 112 and International STP 116 or by the redirected messages from roaming STP 112. The LUP messages from a particular IMSI are received at step 201. At 202 it is checked if the LUP message for the same IMSI from the same VMSC/VLR 122 is received within a configurable threshold time interval. If it is found so 203 then HPMN 102 does not increment the LUP reject counter 204 but sends a LUP reject 205. If the LUP is received after the threshold time either HPMN 102 may acknowledge the same or may opt to check for other anti-TR approaches 206.
  • [0042]
    The anti-anti-TR block 110 can detect if the interval between location updates of the same outbound IMSI is shorter than the configurable threshold time interval. When a new location update comes within such a configurable threshold time interval, the TR rejection to the location update is not counted in the rejection counter. In this way, even though the anti-anti-TR enhanced HPMN TR might have received 5 consecutive Location Update attempts from the same IMSI on the same VMSC/VLR 122, it will not treat the roaming device in manual mode and will continue to reject the LUP when some of the inter-LUP attempts come within the configurable threshold time interval.
  • [0043]
    In an exemplary embodiment of the invention, the configurable threshold time interval may be changed periodically.
  • [0044]
    In a further embodiment of the invention, anti-anti-TR block 110 may statistically change the configurable threshold time interval over a period of time. This statistical calculation may be based on the frequency of LUPs received from various VMSC/VLR. Such a solution provides robustness against anti-TR solution detecting the configurable threshold time interval.
  • [0045]
    FIG. 3 shows the exchange of signals for the aforementioned scenario. At 301 a mobile station/handset initiates registration with a non-preferred VPMN 104. Thereafter VPMN 104 sends a LUP 302 to HPMN 102. Since HPMN has deployed a TR solution, it refuses the update and sends a LUP reject message 303. The anti-TR solution of VPMN 104 detects the TR 304 and sends 3 more LUP messages 305 from same IMSI/VLR or may set the Calling Party Address (CgPA) as VLR. The number of LUP messages sent would depend upon the threshold number after which HPMN 102 would accept the LUP. However, since VPMN 104 cannot hold on to the mobile station for long as the roamer may initiate a new location LUP manually in the mean time, therefore VPMN 104 sends further LUP messages in quick succession. Upon receipt of a consecutive LUP message from same VMSC/VLR, anti-anti-TR block 110 would check if it has come within the configurable threshold time interval. If it has, then anti-TR would be detected 306 and LUP rejection error would be sent 307, without incrementing the LUP rejection counter. This way the mobile station would effectively be reinitiating the registration process in a normal manner 308 despite of anti-TR solution intercepting in between.
  • [0046]
    This anti-anti-TR solution works in both the in-signaling path mode of TR and the monitoring mode of TR.
  • [0000]
    Special Handset Detection and Defense
  • [0047]
    Another approach taken by an anti-TR solution is to fool HPMN 102 to think that the handset/mobile station is special, by extending the interval between location updates on the same VPMN 104 VLR/VMSC 122 of the same network or by extending the interval between location updates between networks. Normally to avoid bad customer experience, the HPMN 102 will allow subsequent location update to succeed.
  • [0048]
    To defend against this anti-TR tactic, the HPMN 102 anti-anti-TR block 110 on receipt of an LUP from an IMSI/VLR 201, would check if it is received after a threshold time period after the last LUP 207. This threshold time period is a configurable extended time period up to which HPMN 102 would wait without assuming the mobile station to be a special handset and therefore issue an LUP ack. For example this configurable extended time period may be about 2 (or more) times of the normal interval (e.g. 30 secs, configured by the anti-anti-TR solution) between location updates. If the LUP is received within the extended time period, anti-anti-TR 110 would still reject the LUP. However to avoid bad customer experience, HPMN 102 will only wait for this extended interval for a configurable number (e.g. 1) of times, in general, less than 2 times. Therefore once it is determined 208 that the LUP is received within the configurable extended time interval, it is checked if the extended time interval has been exercised more than the configurable number of times 209. If yes 211, then a LUP ack is sent 212 to VPMN 104. If no 210, then a LUP reject is sent 205 and the extended time interval counter is incremented by one (not shown in figure).
  • [0049]
    FIG. 4 shows the exchange of signals for the aforementioned scenario. At 401 the mobile station initiates registration with VPMN 104 and VPMN 104 sends LUP (with IMSI and VLR information) message 402 to HPMN 102. Since HPMN 102 deploys TR, it rejects the LUP received 403 from a non-preferred VPMN 104. This way VPMN 104 detects the presence of a TR solution 404. Thereafter anti-TR block of VPMN 104 drops LUP messages from same IMSI for ‘n’ number of times 405 and follows it up by sending a LUP message 406 thereby extending the period between two consecutive LUPs so as to fool HPMN 102 to treat the mobile station as special handset. However because of the aforementioned algorithm HPMN 102 still sends a reject message 408 to VPMN 104. This way the mobile station would effectively be reinitiating the registration process in a normal manner 409 despite of anti-TR solution intercepting in between.
  • [0050]
    This anti-anti-TR solution works in both the in-signaling path mode of TR and the monitoring mode of TR.
  • [0000]
    Detect and Defense Against a GLR-Based Anti-TR Solution
  • [0051]
    Another basic idea of anti-TR is to avoid subsequent location update between VPMN 104 and HPMN 102 by using a Global Location Register (GLR) to store the first location update profile in the VPMN network. In this way, if by any chance that the roamer succeeded in registering at VPMN 104 despite the HPMN's TR attempt, the GLR can avoid the onslaught of HPMN 102 TR in subsequent location update by the roamer at the same VPMN 104.
  • [0052]
    In order to detect the use of GLR as an anti-TR solution, HPMN's 102 anti-anti-TR solution 110 would check if a first successful location update of an outbound roamer on VPMN 104 is followed by a subsequent location update for the same IMSI on same VPMN 104 or any other VPMN, within a configurable time interval 213, for example 10 minutes. HPMN 102 also checks if similar non-receipt of LUPs has been happening for many subscribers 216 on a particular VPMN 104. The number of subscribers for checking this condition may either be a fixed number, which in a very watchful mode maybe 1 i.e. even if one subscriber does not update the location within the configurable time interval then a corrective action would be taken. However a more rational approach may be more calculative, in which the number of subscribers to be checked maybe a ratio of the total number of subscribers registered with the particular VPMN 104. If the above two conditions are not satisfied i.e. subsequent LUPs have been received 214 and even if they have not been received from few IMSI 217, then HPMN 102 assumes no GLR based anti-TR solution deployed. However, if it is found that subsequent LUPs have not been received within the configurable time 215 and the same has been happening for a number of subscribers 219 then HPMN 102 would send a Cancel Location message 219 to IMSI.
  • [0053]
    After the detection of GLR based anti-TR solution, the anti-anti-TR solution will wait for a configurable interval (for example 10 minutes) to issue a MAP Cancel-Location each time a location update at the VPMN (found out to be deploying GLR based anti-TR) from an outbound roaming device is successful. Note that the Home Location Register (HLR) of the roaming device still has the real VPMN VLR/VMSC entry. In this way, for any Mobile Originated (MO)-activity with the VPMN, the handset will be forced to make a new location update on the VPMN. For any Mobile Terminate (MT) call to an outbound roamer, the HPMN HLR will issue MAP PRN to the outbound roamer's real VLR, which returns the MSRN. If the VPMN VLR entry of the roamer is empty, the VPMN VLR will issue a MAP RestoreData to HPMN HLR. The anti-anti-TR solution will wait for a configurable interval to issue another MAP Cancel-Location on the outbound roamer to the VPMN VLR after the RestoreData. For any MT SMS to an outbound roamer, the HPMN HLR will return the outbound roamer's real VPMN VMSC to the originating SMSC. The originating SMSC will then send the message to the real VPMN VMSC. If the VPMN VLR entry is empty, the SMSC will receive an error ack and can then report the delivery status to the roamer's HPMN HLR for future delivery.
  • [0054]
    FIG. 5 shows the exchange of signals for the aforementioned scenario. At 501 a roaming mobile station registers with VPMN 104. VPMN 104 sends a LUP message 501 to HPMN 102. The location Update profile of the roamer sent by HPMN 102 is stored by VPMN at GLR 503. Thereafter for very subsequent LUP from IMSI, VPMN 104 would use the stored profile to acknowledge. Upon discovering that no subsequent LUPs have been received from an IMSI after a successful LUP and a similar occurrence for a number of IMSIs on same VPMN 104, HPMN 102 deduces that a GLR based anti-TR solution has been deployed 504. It then sends a Cancel Location message 505, 506 to the IMSI who have not been updated for a long period of time on VPMN 104 having GLR based anti-TR solution.
  • [0055]
    This anti-anti-TR solution works in both the in-signaling path mode of TR and the monitoring mode of TR.
  • [0056]
    We would now explain certain approaches to anti-TR that would work in the in-signaling mode only:
  • [0000]
    Roaming Restricted
  • [0057]
    In a TR mechanism employing in-signaling approach, a Roaming Restricted error code can also be used is response to a LUP message. Although this temporarily, puts the network location area as forbidden in the handset, it results in a faster network reselection. To defend against this TR, the anti-TR solution can perform just TCAP abort or just TCAP reject the Roaming Restricted in the MAP ISD message with unexpected data value or unsupported service etc in ISD ACK.
  • [0058]
    To counter against this anti-TR tactic, whenever the ISD RR is not honored due to a suspecting anti-TR attempt, the anti-anti-TR solution will continue to attempt ISD (RR) for a configurable number of times before trying an alternative TR tactic unless the VPMN is genuinely recognized as a RR non-supporting network. If it is detected that some of the ISD ack messages from the same VPMN contain RR whereas others do not, then in may be inferred that an anti-TR solution is deployed by the VPMN.
  • [0000]
    Roaming Not Allowed
  • [0059]
    In a TR mechanism employing in-signaling approach, a Roaming Not Allowed error code can also be used in response to a LUP message. Although this puts the network as forbidden in the SIM of a handset, it results in a faster network reselection. To defend against this TR, the anti-TR solution can just drop the LUP ack/error message and immediately issues another LUP message on the same transaction of the first LUP message that got the LUP error of Roaming Not Allowed. In this way, the HPMN TR may deduce that the handset has manually selected the same not allowed network again and could have allowed the registration to be successful.
  • [0060]
    To counter against this anti-TR tactic, the in-signal-path anti-anti-TR solution will continue to issue RNA to a location update if it comes back within a configurable interval (for example 20 seconds) of the previous location update that got rejected with the RNA error.
  • [0000]
    Defense Against an Anti-TR Solution to OTA/SIM Approach
  • [0061]
    In order to defend against a HPMN 102 deploying OTA based TR mechanism, a VPMN 104 simplistically blocks all the OTA messages from HPMN 102 to its outbound roamers.
  • [0062]
    So as to counter the above, in one embodiment of the invention, HPMN 102 would respond by sending RNA error code in the LUP response to a LUP request from an outbound roamer registered/attempting registration with VPMN 104 deploying anti-TR solution to OTA/SIM approach. Once the roamer registers with an alternate network, HPMN 102 can then send OTA messages, steering it to the preferred VPMN 106.
  • [0063]
    The methods discussed above have the advantage that they are robust against the anti-TR solutions deployed by the VPMN. Since the anti-anti-TR solution as explained herein works by observing the type and frequency of the registration messages exchanged between the HPMN and the VPMN, and is not focused on countering any particular approach/logic that may have been implemented by the anti-TR solution, therefore it would be difficult to apply a logic to counter the anti-anti-TR mechanism as disclosed herein.
  • [0064]
    A computer usable medium claimed herein includes computer usable program code, which when executed counters the anti-TR solution as deployed by the VPMN. The anti-TR attempt is detected by observing exchange of at least one registration message between the VPMN and the HPMN. The computer usable medium further includes computer usable program code for redirecting the roamer to attempt reconnection with a preferred network.
  • [0065]
    The components of Anti-Traffic Redirection Countering System (ATRCS) described above include any combination of computing components and devices operating together. The components of the ATRCS can also be components or subsystems within a larger computer system or network. The ATRCS components can also be coupled with any number of other components (not shown), for example other buses, controllers, memory devices, and data input/output devices, in any number of combinations. In addition any number or combination of other processor-based components may be carrying out the functions of the ATRCS.
  • [0066]
    It should be noted that the various components disclosed herein may be described using computer aided design tools and/or expressed (or represented), as data and/or instructions embodied in various computer-readable media, in terms of their behavioral, register transfer, logic component, transistor, layout geometries, and/or other characteristics. Computer-readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) and carrier waves that may be used to transfer such formatted data and/or instructions through wireless, optical, or wired signaling media or any combination thereof.
  • [0067]
    Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of “including, but not limited to.” Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words “herein,” “hereunder,” “above,” “below,” and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word “or” is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list.
  • [0068]
    The above description of illustrated embodiments of the ATRCS is not intended to be exhaustive or to limit the ATRCS to the precise form disclosed. While specific embodiments of, and examples for, the ATRCS are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the ATRCS, as those skilled in the art will recognize. The teachings of the ATRCS provided herein can be applied to other processing systems and methods. They may not be limited to the systems and methods described above.
  • [0069]
    The elements and acts of the various embodiments described above can be combined to provide further embodiments. These and other changes can be made to the ATRCS in light of the above detailed description.
  • [0000]
    Other Variations
  • [0070]
    Provided above for the edification of those of ordinary skill in the art, and not as a limitation on the scope of the invention, are detailed illustrations of a scheme for countering anti-TR between VPMN and HPMN of the roaming mobile station. Numerous variations and modifications within the spirit of the present invention will of course occur to those of ordinary skill in the art in view of the embodiments that have been disclosed. For example the present invention is implemented primarily from the point of view of GSM mobile networks as described in the embodiments. However, notwithstanding, the present invention may also be effectively implemented on CDMA, 3G, WCDMA, GPRS, WiFi, WiMAX, VOIP etc., or any other network of common carrier telecommunications in which end users are normally configured to operate within a “home” network to which they normally subscribe, but have the capability of also operating on other neighboring networks, which may even be across international borders.
  • [0071]
    The examples under the present invention Anti-Traffic Redirection Countering System (ATRCS) detailed in the illustrative examples contained herein are described using terms and constructs drawn largely from GSM mobile telephony infrastructure. But use of these examples should not be interpreted to limiting the invention to those media. Anti-Traffic Redirection Countering System—a method for countering anti-TR between VPMN and HPMN of the roaming mobile station in a manner that is agnostic to the capabilities of the visited or non-accustomed network can be of use and provided through any type of telecommunications medium, including without limitation: (i) any mobile telephony network including without limitation GSM, 3GSM, 3G, CDMA, WCDMA or GPRS, satellite phones or other mobile telephone networks or systems; (ii) any so-called WiFi apparatus normally used in a home or subscribed network, but also configured for use on a visited or non-home or non-accustomed network, including apparatus not dedicated to telecommunications such as personal computers, Palm-type or Windows Mobile devices,; (iii) an entertainment console platform such as Sony Playstation, PSP or other apparatus that are capable of sending and receiving telecommunications over home or non-home networks, or even (iv) fixed-line devices made for receiving communications, but capable of deployment in numerous locations while preserving a persistent subscriber id such as the eye2eye devices from Dlink; or telecommunications equipment meant for voice over IP communications such as those provided by Vonage or Packet8.
  • [0072]
    In describing certain embodiments of the ATRCS under the present invention, this specification follows the path of a telecommunications call from a calling party to a called party. For the avoidance of doubt, that call can be for a normal voice call, in which the subscriber telecommunications equipment is also capable of visual, audiovisual or motion-picture display. Alternatively, those devices or calls can be for text, video, pictures or other communicated data.
  • TECHNICAL REFERENCES
  • [0000]
    • GSM 902 on MAP specification
    • Digital cellular telecommunications system (Phase 2+)
    • Mobile Application Part (MAP) Specification
    • (3GPP TS 09.02 version 7.9.0 Release 1998)
    • Q71X SCCP
    • Q70X MTP
    • Q77X TCAP
    • GSM 1111 SIM and Mobile Interface
    • GSM 1114 SIM Toolkit
    • IR 7320 Steering of Roaming
    • GSM 348 Security and OTA,
    • GSM 31048 Security and OTA,
    • GSM 23119 Gateway Location Register,
    • GSM 408 Mobile Radio Interface Network Layer
    • GSM 23122 Mobile Station Procedure
    • GSM 24008 Mobile Radio Interface Network Layer
    • GSM22011 Service Accessibility
    • GSM25304 Idle Mode Selection
    • GSM29010 Error Network Mapping
  • [0092]
    GSM 29002 MAP Protocol
    Acronym Description
    3G Third generation of mobile
    BSC Base Station Controller
    BCSM Basic Call State Model
    CAMEL Customized Application for Mobile Enhanced Logic
    CDMA Code Division Multiplexed Access
    CLI Calling Line Identification
    CAP Camel Application Part
    CSI Camel Subscription Information
    GMSC Gateway MSC
    GLR Gateway Location Register
    GPRS General Packet Radio System
    GSM Global System for Mobile
    GSM SSF GSM Service Switching Function
    HLR Home Location Register
    HPLMN Home Public Land Mobile Network
    HPMN Home Public Mobile Network
    IMSI International Mobile Subscriber Identity
    IN Intelligent Network
    INAP Intelligent Network Application Part
    IDP Initial DP IN/CAP message
    ISUP ISDN User Part
    MAP Mobile Application Part
    MCC Mobile Country Code
    MCC Mobile Country Code
    MNC Mobile Network Code
    MO Mobile Originated
    MSC Mobile Switching Center
    MSISDN Mobile Subscriber ISDN Number
    MSRN Mobile Subscriber Roaming Number
    MT Mobile Terminated
    NDC National Dialing Code
    ODB Operator Determined Barring
    OTA Over The Air
    O-CSI Originating CAMEL Subscription Information
    PRN Provide Roaming Number
    RNA Roaming Not Available
    RR Roaming Restricted
    SIM Subscriber Identification Module
    SRI Send Routing Information
    SS Supplementary Services
    SS7 Signaling System 7
    STP Signal Transfer Point
    TCAP Transaction Capabilities Application Part
    T-CSI Terminating CAMEL Service Information
    VAS Value Added Service
    VLR Visited Location Register
    VMSC Visited Mobile Switching Center
    VPLMN Visited Public Land Mobile Network
    VPMN Visited Public Mobile Network
Citations de brevets
Brevet cité Date de dépôt Date de publication Déposant Titre
US5353328 *3 févr. 19934 oct. 1994Nokia Mobile Phones Ltd.Data adapter for a radiotelephone
US5742910 *23 mai 199521 avr. 1998Mci CorporationTeleadministration of subscriber ID modules
US5764730 *5 oct. 19949 juin 1998MotorolaRadiotelephone having a plurality of subscriber identities and method for operating the same
US5818824 *30 août 19966 oct. 1998Interwave Communications International, Ltd.Private multiplexing cellular network
US5901359 *3 janv. 19974 mai 1999U S West, Inc.System and method for a wireline-wireless network interface
US5903832 *21 déc. 199511 mai 1999Nokia Mobile Phones LlimitedMobile terminal having enhanced system selection capability
US5930701 *17 oct. 199627 juil. 1999Telefonaktiebolaget L M Ericsson (Publ)Providing caller ID within a mobile telecommunications network
US5940490 *23 août 199517 août 1999Stratus Computer CorporationCall processing to provide number portability
US5943620 *9 déc. 199624 août 1999Ericsson Inc.Method for associating one directory number with two mobile stations within a mobile telecommunications network
US5953653 *28 janv. 199714 sept. 1999Mediaone Group, Inc.Method and system for preventing mobile roaming fraud
US6014561 *6 mai 199611 janv. 2000Ericsson Inc.Method and apparatus for over the air activation of a multiple mode/band radio telephone handset
US6052604 *3 oct. 199718 avr. 2000Motorola, Inc.Exchange which controls M SIMs and N transceivers and method therefor
US6058309 *9 août 19962 mai 2000Nortel Networks CorporationNetwork directed system selection for cellular and PCS enhanced roaming
US6075855 *9 févr. 199813 juin 2000Ag Communication Systems CorporationMethod of accessing a SCP in an ISUP network with partial release
US6085084 *24 sept. 19974 juil. 2000Christmas; ChristianAutomated creation of a list of disallowed network points for use in connection blocking
US6185295 *18 févr. 19986 févr. 2001Nokia Mobile Phones LimitedPhone number database for a phone
US6185436 *27 mars 19976 févr. 2001Siemens Information And Communication Networks, Inc.Wireless communication system
US6192255 *15 déc. 199220 févr. 2001Texas Instruments IncorporatedCommunication system and methods for enhanced information transfer
US6195532 *28 juin 199627 févr. 2001At&T Wireless Srcs. Inc.Method for categorization of multiple providers in a wireless communications service environment
US6208864 *30 déc. 199827 mars 2001Telcordia Technologies, Inc.Establishing calls and processing on-going calls in fixes and cellular networks
US6212372 *9 janv. 19973 avr. 2001Comvik Gsm AbMethod in mobile telephone systems in which a subscriber identity module (SIM) is allocated at least two identities which are selectively activated by the user
US6356756 *26 août 199812 mars 2002Bellsouth CorporationMethod and system for routing calls to a wireless telecommunications services platform
US6438369 *14 déc. 199920 août 2002Nortel Networks Ltd.Network directed system selection for cellular and PCS enhanced roaming
US6456845 *27 oct. 200024 sept. 2002TekelecMethods and systems for observing, analyzing and correlating multi-protocol signaling message traffic in a mobile telecommunications network
US6456859 *2 mars 199424 sept. 2002Alcatel RadiotelephoneMethod of delivering a telephone number associated with a telephone subscription, and telephone sets and mobile telephones implementing the method
US6505050 *12 oct. 20007 janv. 2003Lucent Technologies Inc.Method and apparatus for suppressing route request messages for wireless gateway applications
US6515974 *16 juin 19994 févr. 2003Kabushiki Kaisha ToshibaMobile computer communication scheme supporting moving among networks of different address systems
US6560455 *17 janv. 20026 mai 2003At&T Wireless Services, Inc.Roaming authorization system
US6574481 *11 juil. 20003 juin 2003Alcatel Usa Sourcing, L.P.System and method for application location register routing in a telecommunications network
US6603761 *7 janv. 20005 août 2003Lucent Technologies Inc.Using internet and internet protocols to bypass PSTN, GSM map, and ANSI-41 networks for wireless telephone call delivery
US6603968 *22 juin 20015 août 2003Level Z, L.L.C.Roaming in wireless networks with dynamic modification of subscriber identification
US6611516 *21 juin 199926 août 2003Nokia Telecommunications OyjShort message service support over a packet-switched telephony network
US6628934 *12 juil. 200130 sept. 2003Earthlink, Inc.Systems and methods for automatically provisioning wireless services on a wireless device
US6684073 *31 août 199927 janv. 2004Swisscom Mobile AgSignalling method and conversion device for telecommunications networks
US6693586 *10 août 200217 févr. 2004Garmin Ltd.Navigation apparatus for coupling with an expansion slot of a portable, handheld computing device
US6738622 *29 mars 199918 mai 2004Swisscom AgRoaming method and devices appropriate therefor
US6738636 *12 avr. 200118 mai 2004Microsoft CorporationMethod for providing access to data
US6764003 *9 mai 200020 juil. 2004Swisscom Mobile AgTransaction method and selling system
US6782264 *18 juil. 200124 août 2004Trueposition, Inc.Monitoring of call information in a wireless location system
US6795444 *26 oct. 199921 sept. 2004Telefonaktiebolaget L M Ericsson (Publ)System and method for providing wireless telephony over a packet-switched network
US6856818 *19 janv. 199815 févr. 2005Orange Personal Communications Services Ltd.Data store for mobile radio station
US6876860 *6 sept. 20005 avr. 2005Siemens AktiengesellschaftMethod for implementing a call-back service in a mobile radio network
US6920487 *20 déc. 200019 juil. 2005Starhome GmbhSystem and methods for global access to services for mobile telephone subscribers
US6925299 *5 mai 19992 août 2005Starhome GmbhSystem and method for providing access to value added services for roaming users of mobile telephones
US7020479 *14 mai 200228 mars 2006Swisscom Mobile AgMethod and system for preparing and transmitting SMS messages in a mobile radio network
US7089001 *11 sept. 20018 août 2006Hong Kong Csl LimitedMobile communications
US7184764 *7 févr. 200227 févr. 2007Starhome GmbhMethod and apparatus for supporting cellular data communication to roaming mobile telephony devices
US7231431 *4 avr. 200512 juin 2007Starhome GmbhSystem and methods for global access to services for mobile telephone subscribers
US20020009199 *29 juin 200124 janv. 2002Juha Ala-LaurilaArranging data ciphering in a wireless telecommunication system
US20020012351 *20 déc. 200031 janv. 2002Carmel SoferSystem and methods for global access to services for mobile telephone subscribers
US20020037708 *24 sept. 200128 mars 2002Roke Manor Research LimitedAccess authentication system
US20020087631 *2 janv. 20024 juil. 2002Vikrant SharmaEmail-based advertising system
US20020101858 *31 janv. 20011 août 2002Stuart Thro W.Communication services through multiple service providers
US20020101859 *1 févr. 20011 août 2002Maclean Ian B.Communicating between nodes in different wireless networks
US20020119774 *4 mai 200129 août 2002Regina JohannessonMethod for PLMN selection
US20030017843 *27 déc. 200023 janv. 2003Gerard NoblinsMethod for multple use of a radiotelephone, and radiotelephone system corresponding subscriber identification module and presence detecting device
US20030050047 *12 sept. 200213 mars 2003Sonera OyjChanging a first subscriber identifier to a second identifier
US20030051041 *6 août 200213 mars 2003Tatara Systems, Inc.Method and apparatus for integrating billing and authentication functions in local area and wide area wireless data networks
US20030064723 *2 oct. 20013 avr. 2003Kaushal ThakkerLocal subscriber number and services for non-local wireless subscribers
US20030069922 *23 mai 200110 avr. 2003Lakshmi ArunachalamNetwork transaction portal to control multi-service provider transactions
US20030091020 *11 oct. 200115 mai 2003Apirux BantukulMethods and systems for off-loading a-interface short message service (SMS) message traffic in a wireless communications network
US20030123437 *28 déc. 20013 juil. 2003Mikko NevalainenProviding data via a communication network to a mobile subscriber
US20030129979 *10 janv. 200210 juil. 2003Rotem CooperMethod and apparatus for efficient selection and acquisition of a wireless communications system
US20030129991 *10 janv. 200210 juil. 2003Allison Rick L.Methods and systems for providing mobile location management services in a network routing node
US20030133421 *17 janv. 200217 juil. 2003Rangamani SundarMethod, system and apparatus for providing WWAN services to a mobile station serviced by a WLAN
US20030139180 *19 avr. 200224 juil. 2003Mcintosh Chris P.Private cellular network with a public network interface and a wireless local area network extension
US20040019539 *17 déc. 200229 janv. 20043Com CorporationPrepaid billing system for wireless data networks
US20040053610 *4 sept. 200318 mars 2004Lg Electronics Inc.Method and system for mobile number portability service
US20040082346 *29 mai 200329 avr. 2004Telefonaktiebolaget Lm Ericsson (Publ)Enhanced-service provision
US20040087305 *5 août 20036 mai 2004Jiang Yue Jun JohnMethod and system for cellular network traffic redirection
US20040120552 *19 déc. 200224 juin 2004Frank BorngraberMobile communication terminal with built-in camera
US20040131023 *3 janv. 20038 juil. 2004Otso AuterinenCommunications system and method
US20040132449 *6 juin 20018 juil. 2004Benjamin KowarschMethod and apparatus for permitting a mobile station to operate in a visited network
US20040148400 *14 nov. 200329 juil. 2004Miraj MostafaData transmission
US20050002834 *3 juil. 20036 janv. 2005Kishen GohilApparatus for positioning a wick in a dispenser for a volatile liquid
US20050047378 *17 mai 20023 mars 2005Martin WuschkeMethod, device,and software programs for correlating data sets
US20050064883 *22 sept. 200324 mars 2005Heck John FrederickUnified messaging server and method bridges multimedia messaging service functions with legacy handsets
US20050070278 *13 août 200431 mars 2005Jiang Yue JunSignaling gateway with multiple IMSI with multiple MSISDN (MIMM) service in a single SIM for multiple roaming partners
US20050186939 *14 févr. 200525 août 2005Alon BarneaMonitoring and management of roaming users
US20050186960 *23 févr. 200525 août 2005Jiang Yue J.Integrated cellular VoIP for call rerouting
US20050186979 *22 avr. 200525 août 2005TekelecMethods and systems for providing short message gateway functionality in a telecommunications network
US20050192036 *25 févr. 20051 sept. 2005Jeremy GreenwoodDriver assistance system
US20050215250 *26 mai 200529 sept. 2005Venkatesh ChavaIntermediary network system and method for facilitating message exchange between wireless networks
US20060003775 *10 juin 20055 janv. 2006Bull Jeffrey FAdvanced triggers for location-based service applications in a wireless location system
US20060009204 *2 nov. 200412 janv. 2006Starhome GmbhTelephone functionality for generic applications in a mobile handset
US20060025129 *28 juil. 20052 févr. 2006Shlomo WolfmanCellular network infrastructure as support for inbound roaming users
US20060052113 *10 août 20059 mars 2006Shai OphirRoaming presence and context management
US20060068778 *15 sept. 200530 mars 2006Starhome GmbhBlocking network selection redirection attempts in roaming
US20060068786 *17 oct. 200530 mars 2006Shahar FlorenceDialing services on a mobile handset and remote provisioning therefor
US20060079225 *15 sept. 200513 avr. 2006Shlomo WolfmanVLR roaming statistics for IPN (intelligent preferred network)
US20060079236 *20 sept. 200513 avr. 2006Siemens Communications, Inc.Pseudo number portability in fixed-mobile convergence with one number
US20060148459 *20 déc. 20056 juil. 2006Shlomo WolfmanApparatus and method for pre-call notification
US20060205404 *16 févr. 200614 sept. 2006Shmuel GonenLocal number solution for roaming mobile telephony users
US20060211420 *15 mars 200621 sept. 2006Shai OphirApparatus and method for distribution of roaming users over preferred networks
US20070021118 *25 juil. 200625 janv. 2007Starhome GmbhMethod and a system for providing fix-line local numbers to mobile roaming subscribers
US20070049269 *13 oct. 20061 mars 2007Shai OphirDialing services via SIM toolkit
US20070054665 *13 oct. 20068 mars 2007Shany ElkaratApparatus and method for limiting accidental roaming activity in border areas
US20070072587 *28 sept. 200629 mars 2007Starhome GmbhTracking roaming cellular telephony calls for anti-fraud and other purposes
US20070178885 *28 nov. 20062 août 2007Starhome GmbhTwo-phase SIM authentication
Référencé par
Brevet citant Date de dépôt Date de publication Déposant Titre
US859976730 avr. 20093 déc. 2013Netgear, Inc.Method and apparatus for scanning multi-mode wireless communication environments
US874443616 juil. 20073 juin 2014At&T Mobility Ii LlcRoaming selection services
US90948982 déc. 201328 juil. 2015Netgear, Inc.Method and apparatus for scanning multi-mode wireless communication environments
US20090323609 *30 avr. 200931 déc. 2009Kevin WaltonMethod and apparatus for scanning multi-mode wireless communication environments
US20100289932 *8 déc. 200618 nov. 2010Omron CorporationSolid-state imaging device
CN101304558B10 juin 200830 avr. 2014中兴通讯股份有限公司Mobile terminal and orientation method thereof
EP2469899A3 *13 déc. 201121 janv. 2015Tektronix, Inc.Detection of anti-steering of roaming activity on visited networks
Classifications
Classification aux États-Unis455/432.1
Classification internationaleH04W60/04, H04W8/12, H04W84/04, H04W8/18, H04W28/10, H04W36/00, H04W8/06, H04W28/04, H04W60/00
Classification coopérativeH04W60/04, H04W8/12, H04W8/06, H04W8/18, H04W84/042, H04W60/00, H04W28/10
Classification européenneH04W8/12, H04W8/06