IDENTIFICATION OF SOURCES OF MEDIA TRAFFIC THROUGH A NETWORK
20180013705 · 2018-01-11
Inventors
- Peter Neal (Belrose, AU)
- Owen Mark Davies (Thornleigh, AU)
- Richard David Cochrane Dodds (Bondi Beach, AU)
Cpc classification
H04W4/14
ELECTRICITY
International classification
Abstract
A method for identifying one or more unauthorised routes used for the termination of application-to-person (A2P) short message service (SMS) messages to a mobile telecommunications network, and a system for use in performing the method. An application service is stimulated to generate an A2P SMS message, and to send it to a collection point. The message is processed to obtain an identifier identifying a source of the message, and it is determined whether the identifier corresponds to an authorised source of A2P traffic to the network.
Claims
1.-31. (canceled)
32. A method for identifying one or more unauthorised routes used for the termination of application-to-person (A2P) short message service (SMS) messages to a mobile telecommunications network, the method comprising: providing a collection point arranged to receive SMS messages terminated to the network; stimulating an application service to send an SMS message to the collection point; after receiving the SMS message at the collection point, processing the message to obtain an identifier identifying a source of the SMS message; and determining whether the identifier corresponds to an authorised source of A2P SMS traffic to the network.
33. The method of claim 32 further comprising, if the identifier does not identify an authorised source of A2P SMS traffic to the network, determining that the identifier identifies an unauthorised source of A2P SMS traffic to the network.
34. The method of claim 32, wherein stimulating the application service to send an SMS message comprises steps of: authenticating to the application service; entering a functional element within the service that requires delivery of an SMS message to an end user; identifying the collection point to the service; and executing the service function.
35. The method of claim 32, wherein processing the message to obtain an identifier identifying a source of the SMS message comprises determining a unique network address associated with a network element used to route the message to the mobile telecommunications network.
36. The method of claim 35, wherein determining the unique address comprises extracting a global title for the source network element from the SMS message.
37. The method of claim 32, comprising identifying the source network used to route the message to the mobile telecommunications network.
38. The method of claim 32, further comprising providing a list of authorised sources of A2P SMS messages.
39. The method of claim 38, wherein determining whether the identifier corresponds to an authorised source of A2P SMS messages comprises determining whether the identifier corresponds to any of the sources included in the list.
40. The method of claim 32, further comprising notifying an operator for the telecommunications network of whether the source of the SMS message is an authorised source of A2P SMS traffic to the network.
41. The method of claim 32 further comprising, if the identifier does not correspond to an authorised source of A2P SMS traffic, notifying an operator for the telecommunications network that an unauthorised source has terminated an A2P SMS message to the telecommunications network.
42. The method of claim 32 further comprising a step of, if the identifier does not correspond to an authorised source of A2P SMS traffic to the telecommunications network, preventing A2P SMS messages from the identified source from terminating to the telecommunications network.
43. A system for use in a method of identifying one or more unauthorised sources of application-to-person (A2P) short message service (SMS) messages terminating to a mobile telecommunications network, the system comprising: a collection point arranged to receive SMS messages terminated to the network; a stimulus generator configured to stimulate an application service to send an SMS message to the collection point; and means for processing the message to obtain an identifier identifying a source of the SMS message.
44. The system of claim 43, further comprising computing means arranged to determine whether the identifier corresponds to an authorised source of A2P SMS traffic to the network and, if the identifier does not correspond to an authorised source of A2P SMS traffic, to designate the source as an unauthorised source of A2P SMS traffic to the network.
45. The system of claim 43, wherein the stimulus generator is configured to authenticate to the application service; enter a functional element within the service that requires the delivery of an SMS message to an end user; identify the collection point to the service; and execute the service function.
46. The system of claim 43, wherein the means for processing the message to obtain an identifier identifying a source of the SMS message is configured to determine a unique address associated with the source.
47. The system of claim 43, wherein the collection point comprises GSM-enabled hardware attached to the mobile telecommunications network.
48. The system of claim 44, wherein the computing means is configured to notify an operator for the telecommunications network of whether the source of the SMS message is an authorised source of A2P SMS traffic to the network.
49. The system of claim 44 wherein the computing means is configured to, if the identifier does not correspond to an authorised source of A2P SMS traffic, notify an operator for the telecommunications network that an unauthorised source has terminated an A2P SMS message to the telecommunications network.
50. The system of claim 43, wherein the stimulus generator is configured to stimulate a plurality of application services to send respective SMS messages to the collection point.
51. The system of claim 43, comprising a plurality of collection points each arranged to receive SMS messages terminated to a respective mobile telecommunications network, wherein the stimulus generator is configured to stimulate one or more application services to send an SMS message to each collection point.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0031] Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings in which:
[0032]
[0033]
[0034]
[0035]
DETAILED DESCRIPTION OF THE INVENTION
[0036] Embodiments of the invention may be applied wherever an HPLMN becomes aware that a given application service is making use of A2P SMS as a means of communication with its subscriber(s). For example, a user may register for an account with an Internet service and notice that he receives an SMS message as part of the registration process, causing him to investigate how that SMS was delivered. The or each application service may then be subjected to the procedure shown in
[0037] As illustrated, in a first step 210 of method 200 the application service is stimulated to generate an A2P SMS message. As will be appreciated by those of skill in the art, the exact interactions with the application service that are required to cause an SMS message to be generated are specific to the application service in question. Indeed, some application services may routinely generate a variety of SMS messages, the content of which may depend on the intended recipient of the message (for example, whether that recipient is already a registered user of the application service), on the nature and extent of any interaction with the service by the user, or on one or more other factors. It is to be stressed that neither the nature of the interaction with the application service, nor the precise content of the SMS message caused to be generated, is material to the present invention. All that is required is that a message is created that is addressed to a suitable collection point attached to the HPLMN. The collection point will be discussed in further detail below.
[0038] Typically, stimulation step 210 of the method 200 may include the actions of authenticating to the application service and, subsequently, entering a functional element within the service that requires the delivery of an SMS message to an end user. The functional element chosen will depend on the application service under test but may be, for example, the page within an Internet banking application that initiates transfer to another account, generating an SMS message as part of the process. This is just one example, and appropriate functional elements of other application services will be readily apparent to those of skill in the art. The stimulation step may be completed by providing an identifier (such as a Mobile Station International Subscriber Directory Number, or MSISDN) to the service of the intended recipient of the message (the collection point), and executing the service function.
[0039] To give a concrete example: the HPLMN operator in this specific embodiment wishes to identify the source APLMNs used by a social media application to terminate SMS messages to those of its users that are also subscribers to the home network. Accordingly, the application is stimulated to generate an SMS message that includes content suitable for facilitating download of its mobile app to a user's handset, by executing the following steps: [0040] 1) browse to the appropriate area of the service's website; [0041] 2) indicate to the website that download of the app is desired, for example by clicking a button provided for this purpose; [0042] 3) when prompted, enter the country code and mobile telephone number (MSISDN) of the intended collection point; [0043] 4) click again to prompt the application to send the download instructions to the telephone number provided.
[0044] The interaction with the application service that is required to cause an SMS message to be generated could be performed manually by, for example, the home network operator, using a suitable device such as a mobile terminal or a personal computer connected to the application service. In this example, however, the steps just described are instead carried out in an automated fashion by suitably programmed hardware. This aspect of the invention, which is not essential, will be described in more detail below.
[0045] Returning now to the method illustrated in
[0046] Following receipt of the message at the collection point (step 220), the source APLMN used to deliver it is identified at step 230. In this example, this is done by extracting the GT associated with the SMSC of the source network from the received SMS message. In some embodiments, this is done by the collection point itself, though other methods in accordance with the invention may include a further step of forwarding the message from the collection point to dedicated hardware for processing. In still further embodiments, any other suitable identifier or network address that can be considered to identify the SMSC used to source the message, or the APLMN to which it belongs, could be used. For example, some networks are known to intercept incoming messages, directing them to an SMS router for the application of advanced services such as archiving and spam filtering before delivery to the ultimate recipient. The source GT changes to an ‘alias’ in this process; however, there is still a one-to-one correspondence to the source APLMN used to send the message, such that source can nevertheless be determined from the network address extracted from the message.
[0047] In the present embodiment, the SMSC GT extracted from the received SMS message is stored, together with the message content, in a database that is communicatively coupled to the collection point (step 232) and is later retrieved (step 234) for further use in method 200. This is not essential, and in other examples the method may pass directly from processing step 230 to comparison step 240, as indicated by the dashed line bypassing steps 232 and 234. In further examples still, the data may be used directly in decision step 240, but may additionally be stored (step 232) for further uses such as those detailed below.
[0048] In step 240, the SMSC GT extracted at step 230 is then read from the database and is examined to determine whether it is corresponds to an APLMN from which the HPLMN is prepared to receive A2P SMS messages. In the present embodiment, this determination is effected by performing a lookup against a list of GTs that are known to identify such allowed sources. Similarly to the stimulation step 210, this determination may in some examples be performed manually. Here, however, it is automated by programming suitable computing means, as will be discussed further below.
[0049] Thus, in the present example, the GT that is found to have sourced the test SMS message to the collection point is compared against a list of GTs that are known to correspond to allowed sources. As a purely numerical one, this comparison may have the advantage of being particularly easy to implement. The adoption throughout of GTs to refer to network entities may also make the method as a whole particularly simple, as well as facilitating any future action that is taken to block unauthorised sources according to the methods outlined in the IR.31 standard introduced above. However, a number of alternatives will be apparent to the skilled person. For example, if it is preferred to identify the source used to deliver the SMS message using an alternative form of identifier, it may be desirable to list the allowed sources according to the same format. Again, this may simplify the comparison step. In yet further examples, the allowed list may simply be a list of network names. The identity of the source network may in this case be determined from the GT extracted from the received message, for example, using the Global Title translation procedure familiar to those of skill in the art, for comparison against the list.
[0050] The allowed list used in step 240 of the present embodiment is populated in advance and stored in a data store ready for use in the inventive method. For instance, when authorising an APLMN to terminate A2P SMS traffic to its subscribers, the operator of the HPLMN may request that source network to name all of the GTs that it will use to do so. It may also request to be informed of any future changes to that information so that the allowed list may be kept current and relevant. Alternatively, the GTs corresponding to an authorised source may be read into the list from the GSM standard document known as IR.21, in which network operators specify their active SMSC GTs. In other embodiments, the list may have been populated through previous iterations of the method shown in
[0051] According to the present embodiment, if the GT extracted from the SMS message is identified as being one in the allowed list, the process ends. If, conversely, the GT is not identified in the list, it is concluded that the corresponding source network is an unauthorised one (step 250) and the method then ends.
[0052] Thus, the method outlined in
[0053] As mentioned above, in the embodiment of
[0054] In this particular example, the third party performs the steps described above with reference to
[0055] The report according to this specific embodiment takes the form of an e-mail that is sent directly to the operator and includes the following exemplary information: [0056] the name of the application service tested; [0057] the content of the SMS message received at the collection point (in this case, read from the database in which it is stored at step 232, described above); [0058] the time of receipt of the SMS message at the collection point; [0059] the (unauthorised) source GT of the SMS message; and [0060] an identification of the APLMN associated with the source GT, such as the network name.
[0061] In further examples, the report may also include additional information useful to the HPLMN carrier in responding to the unauthorised use of their network, such as contact details of the operator of the identified APLMN; any other GTs known to be used by the APLMN for A2P SMS delivery; and/or the type of the source network. Preferably, the operator is given the opportunity to indicate that the identified source should in fact be recognised as a legitimate source of A2P SMS messages to their home network. In this case, the source GT may be added to the list of allowed sources so as not to be brought to the attention of the operator in any future iterations of the method.
[0062] It is stressed that the report described above is given by way of example only. In other embodiments, the third party may communicate the result of the investigation to the home network operator in any event, for example, identifying the APLMN found to have sourced the message and indicating to the operator whether or not that source is an authorised one. In still further embodiments, the third party may omit decision step 240 of method 200, generating instead a report that simply includes its factual findings as to the source GT used by the application service under test to terminate its message to the collection point. This information may then be communicated to the home network operator, which may then complete the determination as to the allowability of the identified use of its network.
[0063] Report e-mails such as those described above may be communicated to the HPLMN operator as soon as the investigation is complete or, alternatively, may be sent on an agreed periodic basis (for example, daily or weekly). As an alternative to e-mail, the results of the third-party's analysis may be uploaded to a dedicated reporting interface that the HPLMN operator can access whenever is most convenient.
[0064] Turning now to
[0065] Also shown in
[0066] In this example, stimulus generator 310 takes the form of an interface engine connected to application 32 within an interface environment, and is programmed to perform a pre-defined series of interactions with the application service to cause an SMS message to be generated Specifically, the stimulus generator is a processor configured to appear to an application service as a smartphone. The stimulus steps that the simulator must take are programmed into a library of scripts that take the form of detailed instructions to the processor to carry out the steps that a user operating the service would perform on his smartphone.
[0067] In this specific example, server 32 belongs to the social media site given by way of example earlier, and engine 310 is configured to automate the interaction, described above, that a user of that site would normally execute to download the relevant mobile application to his handset. Of course, stimulus generator 310 may be programmed to interact, in appropriate ways, with any number of application services of interest. This may be advantageous because operators for individual HPLMNs commonly wish to investigate the source networks through which not just one, but perhaps a dozen or more application services are terminating A2P SMS messages to their subscribers. By extension, it is also preferable for the stimulus generator to be configured for use in applying the methods of the present invention in relation to a plurality of independent home networks, as will be discussed further below.
[0068] Interface 312, though not essential, is provided in this particular example to facilitate any desired revision to the pre-determined programming.
[0069] Turning now to the collection point, this is shown in
[0070] Thus, referring again to the discussion made above of the stimulation step 210 of
[0071] In the present and other preferred examples, the processing and determination steps 230 to 250 of
[0072] The collection point 320 illustrated in
[0073] Report service 330 is shown in
[0074] As mentioned above with reference to
[0075] Thus, according to preferred embodiments, the system of the invention may be employed to investigate the source networks used by any application service to deliver A2P SMS messages to any one home network, and to report to the operator of the home network in each case. In especially preferred embodiments, the stimulus generator 310 includes functionality enabling a number of such investigations to be scheduled, thus further automating the process as applied to a plurality of home networks in succession. This scheduling will now be described with reference to
[0076]
[0077] The scheduled investigation for each operator may be executed in relation to all application services that that operator has identified as being of interest. In some examples, the sequence shown in
[0078] Thus, methods and systems are provided that provides a simple and effective way for a home network operator to identify APLMNs, and their individual network elements, used to terminate A2P SMS traffic to subscribers to his subscribers, allowing the operator to take corrective action against those sources that are doing so without his prior approval or agreement.