摘要:
A method comprising a plurality of operations. An operation is provided for receiving an authentication certificate of a called party. Telephony apparatus of a party calling the called party performs receiving the authentication certificate. An operation is provided for facilitating authentication of the authentication certificate and called party identification information thereof in response to receiving the authentication certificate. An operation is provided for providing an authentication notification in response to facilitating the authentication of the authentication certificate and the called party identification information. The authentication notification indicates successful authentication in response to the authentication being successful and wherein the authentication notification indicates non-successful authentication in response to the authentication not being successful.
摘要:
A method comprises a plurality of operations. An operation is performed for requesting authentication of a target call session party during a call session between the target party and a call session party requesting said authentication. An operation is performed for receiving authentication information of the target call session party during the call session in response to requesting said authentication. An operation is performed for facilitating authentication of said authentication information during the call session in response to receiving said authentication information.
摘要:
Caller name is authenticated using authentication certificates issued by a registration authority that registers callers who wish to terminate calls to callers subscribed to the registration authority. In one embodiment, the authentication certificates are sent to a called device or a proxy for the called device via a path that is separate from the call setup path. An indication is conveyed to the called party to indicate whether the caller name was successfully authenticated.
摘要:
Caller name is authenticated using authentication certificates issued by a registration authority that registers callers who wish to terminate calls to callers subscribed to the registration authority. In one embodiment, the authentication certificates are sent to a called device or a proxy for the called device via a path that is separate from the call setup path. An indication is conveyed to the called party to indicate whether the caller name was successfully authenticated.
摘要:
Transparent caller name authentication is provided to authorized third parties by creating an Public Key Infrastructure (PKI) certificate chain. An owner of a registered caller name can authorize third parties to use the caller name by issuing a PKI sub-certificate to each authorized third party. An authenticated caller name displays the owner's name to the called party. Outsourcing and mobile employment is thereby facilitated, and called party confusion is reduced.
摘要:
Transparent caller name authentication is provided to authorized third parties by creating an Public Key Infrastructure (PKI) certificate chain. An owner of a registered caller name can authorize third parties to use the caller name by issuing a PKI sub-certificate to each authorized third party. An authenticated caller name displays the owner's name to the called party. Outsourcing and mobile employment is thereby facilitated, and called party confusion is reduced.
摘要:
A system, device and method for providing data availability for a portable communication device, including various combinations of the following steps: notifying an operator that the portable communication device is missing; triggering encryption of data on the portable communication device; sending a data retrieval command to the portable communication device; authenticating the data retrieval command; retrieving data from the portable communication device; identifying a portion of the data retrieved from the portable communication device that is confidential; encrypting the identified confidential data on the portable communication device; and erasing the identified confidential data from the portable communication device or recovering the portable communication device and decrypting the confidential data on the portable communication device.
摘要:
A technique for detecting SPAM calls in VoIP networks and taking responsive actions to such calls is described. Detection is based on recognizing abnormalities in signaling message statistics. For example, a device that persistently sends many more call setup requests then it receives and at the same time constantly receives too many, or too few, call terminations in a statistically determined period of time is assumed to be a spam source. This criteria is based on the principle that a Spammer originates many calls, which are consistently terminated by the Spammer or by the recipient. Responsive actions to the detection of VoIP spam may include displaying a call text warning to the recipient, using special ring tone, automated voice mail answer, rejecting the call, etc. The invention addresses an issue that will become more problematic for VoIP networks and their subscribers in the future, and to which a solution has not been proposed in the prior art.
摘要:
A method and system for filtering malicious packets received at the edge of a service provider (SP) domain is provided. A protocol aware border element identifies the protocol used by any ingress packet, and then determines which domain-specific information is used in the application payload of the packet to form the source identity. If this packet pretends to come from the SP domain, and no domain entity is allowed to roam, the packet is identified as illegitimate and is subjected to a given security policy. The border element also identifies as legitimate the SP domain entities that are allowed to roam, and legitimate sources outside said SP domain that communicates customary with entities in the SP domain.
摘要:
A technique for detecting SPAM calls in VoIP networks and taking responsive actions to such calls is described. Detection is based on recognizing abnormalities in signaling message statistics. For example, a device that persistently sends many more call setup requests then it receives and at the same time constantly receives too many, or too few, call terminations in a statistically determined period of time is assumed to be a spam source. This criteria is based on the principle that a Spammer originates many calls, which are consistently terminated by the Spammer or by the recipient. Responsive actions to the detection of VoIP spam may include displaying a call text warning to the recipient, using special ring tone, automated voice mail answer, rejecting the call, etc. The invention addresses an issue that will become more problematic for VoIP networks and their subscribers in the future, and to which a solution has not been proposed in the prior art.