The ability to selectively block mobile terminated (MT) calls is advantageous for certain situations. The selective prevention of mobile terminated calls would potentially be life-saving for use, for example, by law enforcement or intelligence personnel in situations where there is suspicion that criminals or terrorists may use a mobile communications device to detonate an explosive or other destructive devices.
The present disclosure is concerned with systems and methods for selectively preventing the completion of mobile terminated calls in a communications network, such as a global system of mobile communications (GSM) cellular network, an Interim standard 41 (IS-41) cellular network, a WiFi/802.11x, and a WiMAX/802.16 communications network. Selective prevention of mobile terminated (MT) calls is useful, for instance, in situations where there is concern that a criminal or terrorist may use a mobile communications device to detonate an explosive. More specifically, where there is concern that a criminal or terrorist may adapted a mobile communications device to detonate an explosive upon receipt of a call or call attempt by the communication device.
According to one aspect of the present invention, MT calls to subscribers located at or near a tunnel, on an airplane, or near a highly trafficked public area (e.g., sports stadium, public arena, concert hall, airport, shopping area, etc.) are selectively blocked, while still allowing these subscribers to originate phone calls.
According to yet another aspect of the present invention, MT calls to subscribers located at or near a tunnel, on an airplane, or near a highly trafficked public area (e.g., sports stadium, public arena, concert hall, airport, shopping area, etc.) are selectively blocked, except MT calls to authorized subscribers. Where, for example, an authorized subscriber may be a member of an emergency response team (e.g., police, firefighter, military, medical, etc.). Once again, those mobile subscribers that are not able to receive MT calls are still able to originate phone calls.
Aspects of the present disclosure are best understood from the following detailed description when read with the accompanying figures. It is emphasized that, in accordance with the standard practice in the industry, various features are not drawn to scale. In fact, the dimensions of the various features may be arbitrarily increased or reduced for clarity of discussion.
Illustrated in
It will be appreciated that although the examples presented herein are based on GSM /signaling system 7 (SS7) network implementations, the present invention is not limited to use in GSM/SS7 networks. Embodiments of the present invention may be deployed in a variety of communication network environments that employ a variety of signaling and communication protocols, such as Internet Engineering Task Force (IETF) SIGTRAN protocols (e.g., M3UA, SUA) and session initiation protocol (SIP).
In
Integrated MSC/VLR Embodiment
Illustrated in
In one embodiment, the MTCB function 42 may include or access a first database 46 that includes a listing of geographic location identifier values, such as location area code (LAC) and/or cell ID (CI) values wherein MT calls are prohibited or blocked. For the purposes of this disclosure, a MT call may include, but is not limited to, a MT voice call, a MT short message delivery, a voice mail waiting notification, a paging service message delivery, and any other wireless communication that may invoke an action (e.g., ringing, alert, alarm, etc.) in a mobile communications terminal that may be used to trigger a malicious event (e.g., detonate an explosive). Blocked LAC/CI rules may also include time/date information, which may be used to specify when a rule is to be enforced. Information may also be included that specifies when a blocked LAC/CI rule expires. Exemplary prohibited LAC/CI rules are presented in Table 1. The first entry in Table 1, for example, defines a prohibited LAC/CI rule, which states that MT calls are prohibited CI 15 associated with LAC 56. The second entry in Table 1 defines a prohibited LAC/CI rule, which states that MT calls are prohibited in all CI associated with LAC 23. The third entry in Table 1 defines a prohibited LAC/CI rule, which states that MT calls are prohibited in all CI associated with LAC 62 from the hours of 9 am to 12 pm, daily. The last entry in Table 1 defines a prohibited LAC/CI rule, which states that MT calls are prohibited in all CI associated with LAC 32 during the period from Dec. 31, 2005 to Jan. 1, 2005.
The MTCB function 42 may also include or access a second database 48 that contains a listing of mobile subscribers that are authorized to receive MT calls in prohibited LAC/CI areas. The mobile subscriber identifiers used to identify these allowed mobile subscribers may include, but are not limited to, an IMSI (International Mobile Station Identity), TMSI (Temporary Mobile Subscriber Identity), or MSISDN (Mobile Station International Integrated Services Digital Network Number). LAC/CI areas in which a MS is authorized to receive a MT call may also be specified. Authorized MS rules may include time/date information, which may be used to specify when a rule is to be enforced. Information may also be included that specifies when a rule expires. Exemplary authorized MT subscriber rules are presented in Table 2. The first entry in Table 2, for example, defines a MS MT authorization rule which states that MS identifier (919) 650-2252 is authorized to receive MT calls made to any LAC/CI, regardless of LAC/CI prohibit status defined in Table 1. The second entry in Table 2 defines a MS MT authorization rule, which states that MS identifier (919) 650-2253 is authorized to receive MT calls made to any CI associated with LAC 62. The last entry in Table 2 defines a MS MT authorization rule, which states that MS identifier (919) 650-2253 is authorized to receive MT calls made to CI 85 associated with LAC 32 during the period from Dec. 31, 2005 to Jan. 1, 2005.
The MTCB function 42 may also include or access a third database 50 that contains a mapping of mobile subscriber IMSI/TMSI identifiers to associated MSISDN identifiers and assigned roaming number (RN) identifiers. The MS identifier mapping/correlation information may include date/timestamp information, which may be used to determine the age of a MS identifier mapping entry. Sufficiently old entries may be periodically purged from the database 50. The MTCB function 42 associated with MSC/VLR may be adapted to capture and record MS identifier mapping/correlation information through access of routing information that is maintained by MSC/VLR, and/or through analysis of signaling messages that are received by MSC/VLR. Exemplary signaling messages include, but are not limited to, PRN, SRI and MAP InsertSubscriberData messages. The mobile subscriber identifier mapping information may be used to facilitate the application of authorized MS rules contained in the second database. Exemplary MS identifier mapping/correlation information is presented in Table 3.
In the example illustrated in
It will be appreciated that by using this approach, the MT call attempt is terminated without paging the called MS handset 56. In other words, the handset or phone of the called MS 56 does not ring, and the called MS is provided no indication that an MT call attempt was blocked. It will also be appreciated that the called MS is still permitted to originate outbound calls, and that only MT calls are blocked.
Illustrated in
With regard to authorized MT subscriber rules database, it will be appreciated that in the examples illustrated in
Call Blocking Example Using a Standalone Intrusive MTCB Embodiment
Illustrated in
The MTCB function 80 is adapted to monitor and intercept a base station subsystem mobile application part (BSSMAP) PAGING message 88 that is generated and transmitted by a MSC/VLR 90 to the BSC 92. The PAGING message 88 is received and analyzed by the MTCB function 80 to determine which, if any, MTCB rules apply. For example, in the scenario shown in
Illustrated in
It will be appreciated that by using these approaches, the MT call attempt is blocked/terminated even though the MSC/VLR 114 attempted to page the called MS handset 116. In other words, the handset or phone of the called MS 116 does not ring, and the called MS is provided no indication that an MT call attempt was blocked. It will also be appreciated once again that the called MS is still permitted to originate outbound calls, and that only MT calls are blocked.
Mobile Terminated Short Message Service Blocking
ETSI TS 100 942 v7.0.0 (1999-08) Digital Cellular Telecommunications System (Phase 2+); Point to Point (PP) Short Message Service (SMS) Support On Mobile Radio Interface (GSM 04.11 version 7.0.0 Release 1998), the disclosure of which is incorporated herein by reference in its entirety, describes procedures for delivering a MT SMS message in a GSM network. It will be appreciated that the MTCB function may be adapted to selectively block mobile terminated SMS messages to called parties/message recipients that are roaming in a prohibited LAC/CI using techniques and procedures that are similar to the integrated and standalone embodiments described above with respect to MT voice calls.
Illustrated in
In addition to checking against the data in the LAC/CI database 148, the MTCB 146 may also access data in an allowed subscriber database 156 and an IMSI/TMSI/MSISDN mapping database 158.
Illustrated in
The MTCB function 160 is adapted to monitor and intercept a base station subsystem mobile application part (BSSMAP) PAGING message 168 that is generated and transmitted by a MSC/VLR 170 to a BSC 172 in response to the receipt of a MT Forward SM message 174. The PAGING message 168 is received and analyzed by the MTCB function 160 to determine which, if any, MTCB rules apply. For example, in the scenario shown in
It will be appreciated that by using these approaches, the MT SMS delivery attempt is blocked/terminated even though the MSC/VLR 170 attempted to page the handset of the recipient MS. In other words, the handset or phone of the recipient MS 176 does not announce or alert the MS that an SMS message is being/has been delivered, and the recipient MS is provided no indication that an MT SMS delivery attempt was blocked. It will also be appreciated once again that the recipient MS is still permitted to originate SMS messages, and that only MT SMS delivery attempts are blocked.
Blocking WiFi Terminated Calls
Described in co-pending U.S. patent application Ser. No. ______, Methods, Systems, And Computer Program Products For Providing Wireless-Fidelity (Wi-Fi) Gateway Visitor Location Register (VLR) Functionality, are systems and methods for terminating calls and delivering messaging service messages in a hybrid cellular/WiFi networking environment. Illustrated in
Illustrated in
A Wi-Fi gateway VLR can include a Wi-Fi gateway VLR function for tracking and registering the communication devices roaming in the service area of a Wi-Fi network. More particularly, Wi-Fi gateway VLR function is adapted to track and register those subscribers that have been granted combined Wi-Fi/GSM network access rights. For example, a Wi-Fi gateway VLR function may track and process those subscribers that have been granted Wi-Fi/GSM service. A Wi-Fi gateway VLR function may include a database of provisioned dual network subscribers, such as the data shown in Tables 4 and 5 below. In the example shown in Table 4, dual network Wi-Fi/GSM subscribers are identified by a GSM IMSI value. In the example of Table 5, dual network Wi-Fi/GSM subscribers are identified by either a GSM IMSI value or a Wi-Fi identifier such as an IP address, a MAC address, or other network identifier.
The Wi-Fi gateway VLR function includes a database for storing information regarding a wireless subscriber to a GSM cellular network. The Wi-Fi gateway VLR function is also adapted to associate a temporary cellular network identifier, such as a GSM mobile subscriber roaming number (MSRN) with a dual network subscriber that has roamed into the service area of the Wi-Fi gateway VLR function.
A Wi-Fi gateway VLR function may maintain a subscriber Wi-Fi/GSM mapping table. Table 6 below shows data in an exemplary subscriber Wi-Fi/GSM mapping table.
While the subscriber is active in the Wi-Fi network and within the service area of Wi-Fi gateway VLR function, the subscriber's Wi-Fi reachability information (e.g., serving Access Point identifier) may be maintained at the Wi-Fi gateway VLR function. Each time that a subscriber roams from one Wi-Fi access point to another Wi-Fi access point, an HLR update is not required. An HLR update is only required if the subscriber roams into a service area controlled by a different Wi-Fi gateway VLR, or if the subscriber leaves the Wi-Fi network (roams out, or de-activates).
In the embodiment shown in
As such, upon receipt of the MAP ProvideRoamingNumber request 198 by the MGC/WiFi Gateway VLR function 186, the MTCB function 188 is adapted to examine call blocking rules, in a manner similar to that previously described, and determine if a MT call to the called WiFi MS is prohibited. In this case, instead of or in addition to maintaining a list of prohibited LAC/CI values in a prohibited LAC/CI database 200, the MTCB 188 is also adapted to store an identifier associated with a prohibited WiFi access point in a database 202. Exemplary WiFi access point identifiers include, but are not limited to, an Internet protocol (IP) address, a UDP/TCP port identifier, a URI, a URL, and a MAC address. Exemplary prohibited cellular-WiFi LAC/CI/AP rules are presented in Table 7.
It will be appreciated that, in the WiFi embodiment, the prohibited AP information is used in a manner that is analogous to LAC/CI use previously described. The MTCB 188 may also consult an authorized MS database 204 that includes a listing of cellular and WiFi mobile subscribers that are authorized to receive MT calls. Exemplary authorized MT cellular and WiFi subscriber rules are presented below in Table 8.
It will be appreciated that, in the WiFi embodiment, cellular and WiFi subscriber identifier mapping/correlation may be acquired, maintained in a database 206 and used in a manner similar to that described above with respect to a pure GSM cellular implementation. WiFi subscriber identifiers may include, but are not limited to, a domain—user name format (e.g., email address format), a Session Initiation Protocol (SIP) URI, or an IP address. Exemplary cellular-WiFi mobile subscriber identifier mapping/correlation data is presented in Table 9.
Returning again to the example scenario illustrated in
Blocking WiFi Terminated Calls With Standalone MTCB
Illustrated in
In this case, the standalone MTCB function 210 is adapted to monitor and intercept the SIP MT call setup message 214 before it reaches the serving WiFi AP 218. A signaling link probe 220 may also be used for monitoring additional signaling links in the network. The monitoring of additional signaling links enables the MTCB function 210 to obtain additional called WiFi subscriber identification information. For example, by monitoring MAP ProvideRoamingNumber messages 222, PRN Response messages 224, ISUP IAM 226, or other messages communicated to or from the MGC/WiFi Gateway VLR 212, the MTCB function 210 may obtain at least a portion of the information necessary to associate an IMSI identifier, a TMSI identifier, a MSISDN identifier, and a Roaming Number identifier related to the WiFi subscriber 216. The MTCB 210 is adapted to perform call blocking processing, similar to that previously described, and determine whether the MT call attempt is associated with a prohibited AP. The MTCB 210 may access a blocked 1 AC database 230, allowed subscriber database 232, IMSI/TMSI/MSISDN mapping database 234, and a blocked WiFi AP identifier database 236. In one embodiment, The MTCB 210 is adapted to examine IP address information associated with the SIP message 214 and determine if the IP address corresponds to the IP address of a prohibited WiFi AP. If the IP address does correspond to the IP address of a prohibited WiFi AP, then the SIP message is discarded, and MT call setup to the called WiFi subscriber is terminated. The MTCB 210 may optionally generate and transmit a SIP message that indicates that the attempted MT call setup was not successful, and may provide addition information to the calling party. Alternatively, in a manner similar to that described previously and illustrated in
The cellular-WiFi embodiments described herein may also be used to block the delivery of messaging service messages, such as SMS, multimedia messages, and instant messages, in a manner similar to that previously described with respect to SMS delivery blocking in a GSM cellular environment.
It will be appreciated that by using these approaches, the MT call attempt is blocked/terminated even though the MGC/WiFi gateway VLR function attempted route the SIP call setup message to the WiFi subscriber. In other words, the handset or phone of the called WiFi MS does not ring, and the called WiFi MS is provided no indication that a MT call attempt was blocked. It will also be appreciated once again that the called WiFi MS is still permitted to originate outbound calls, and that only MT calls are blocked. It will be appreciated that embodiments of the present disclosure may be deployed in WiFi network environments that do not include a MGC/WiFi gateway VLR function. Accordingly, MT calls to WiFi subscribers residing in a prohibited geographic are may be blocked regardless of the type of network from which the call is originated.
The embodiments shown above may also be adapted for present and future communication protocols or technologies such as WiMAX/802.16 and others.
In short, it will be appreciated that the MT call blocking systems and methods described above enable mobile terminated calls and communication attempts to be blocked to selected mobile subscribers that are roaming or receiving service in an geographic area that is designated as MT prohibited, without interfering with the subscriber's ability to place outgoing or mobile originated calls/communications. Further, the handset or phone of the called MS does not ring or other wise signal a call, and the called MS is provided no indication that a MT call attempt was blocked. This functionality is needed in communication networks, for example, to insure public safety in light of advancements in the sophistication of terrorist bombing techniques that use incoming calls, pages, or message service messages received by a mobile communication devices to trigger the detonation of explosive or otherwise destructive weapons.
It will be understood that various details of the invention may be changed without departing from the scope of the invention. Furthermore, the foregoing description is for the purpose of illustration only, and not for the purpose of limitation, as the invention is defined by the claims as set forth hereinafter.
This application claims the benefit of U.S. Provisional Patent Application No. 60/753,719 filed Dec. 23, 2005, entitled System and Method for Mobile Terminated Call Blocking.
Number | Date | Country | |
---|---|---|---|
60753719 | Dec 2005 | US |