摘要:
The invention relates to a method and an arrangement against fraudulent use in a telecommunications network. The invention is based on the idea that at least one fraud profile identified by an identifier is created and the identifier is included in the subscriber data of some subscribers. Based on this identifier the fraud restriction parameters of the subscriber are retrieved from the subscriber's fraud profile, and these fraud restriction parameters are used in detecting and indicating possible fraudulent use. The fraud restriction parameters include values for different service limits, such as the maximum number of call forwarding re-quests and/or the maximum number of location updates during a certain period, and possibly at least for some features an action parameter related to a service limit and implemented when the service limit is reached.
摘要:
Authentication of a user of a communication system comprising a session control server and an authentication server, wherein the communication system supports at least two separate authentication schemes, comprising the steps of determining, at the session control server, that a registration request from the user to be authenticated leaves undefined the authentication scheme to be used for authenticating the user; and inquiring, from the authentication server, which authentication scheme is to be used for authenticating the user, said inquiring being based on an identity of the user and pre-stored information at the authentication server on a mapping between user identities and usable authentication schemes.
摘要:
A method, system and network element for tracing signaling messages related to a subscriber in a mobile communication system. In the solution according to the invention a functional entity of the mobile communication system receives a trace command which indicates the tracer and identifies at least one subscriber whose signaling messages are to be traced, and tracing is started, tracing comprising the steps of: copying the signaling message in response to reception or transmission of a signaling message related to the subscriber to be traced, and sending a copy to the tracer.
摘要:
A distributed database system returns a token which an application may use in consecutive requests to the distributed database system to by-pass a fragmentation layer or distribution functionality of the distributed database system.