Method and system for preventing charge cheat and medium route controller

A routing and media technology, applied in the field of information security, can solve the problems of delay loss, signaling flow attack, multi-resource, etc., and achieve the effect of preventing billing fraud

Inactive Publication Date: 2010-01-13
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method processes all traffic entering and exiting the network, and the processing of the signaling flow is relatively fragile, and is extremely vulnerable to attacks from the signaling flow; the session border controller SBC consumes more resources in processing because it processes more traffic , when the traffic is large, delay and loss may occur; and not all network environments can deploy session border controller SBC, in the case of signaling encryption, SBC will be completely invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing charge cheat and medium route controller
  • Method and system for preventing charge cheat and medium route controller
  • Method and system for preventing charge cheat and medium route controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention is a billing method, system and media routing control device. In order to make the purpose, technical solution and advantages of the present invention clearer, the following describes the present invention in detail with reference to the accompanying drawings and examples.

[0021] see figure 1 , is a flowchart of the present invention, specifically including:

[0022] 101: The first user and the second user terminal perform session negotiation through the core switching control device, the first media routing device, and the second media routing device;

[0023] 102: After the session negotiation is completed, the core switching control device sends terminal address mapping information to the first media routing device and the second media routing device, and notifies the first media routing device and the second media routing device to open the route of the corresponding port of the corresponding address;

[0024] 103: The first user terminal an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a method, a system and a media route control device, in which, the method includes: a core exchange control device informs a media route device to open the route of related port of the IP address of the session both parties after it finishes the session negotiation, a media route device transfers media flows to the two parties setting up the session, when it receives the ending information of the session, it sends out an order of stopping route media flow to the route device, which stops the route between ports of the two terminals.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method, system and media routing control device for preventing billing fraud. Background technique [0002] The rapid development of the next generation network NGN and VoIP services has brought great challenges to the traditional telephone services. However, in the next generation network NGN based on the network protocol IP technology, due to the separation of control and bearer, signaling flow and media flow are separated from each other. A malicious terminal may still communicate with media streams after initiating a signaling to terminate a session. For example, in VoIP and NGN, after the terminal sends a session establishment request, the two parties negotiate the session capability, and then both parties agree to establish a connection, and the billing system starts charging. When one party sends a request to terminate the session, the If the two parties i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L9/00H04L12/14H04L29/06H04L12/24
Inventor 刘利锋郑志彬朱洪亮赵凯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products