draft-rocky-sipping-calling-party-category-01 Report

Slides:



Advertisements
Similar presentations
August 2, 2005SIPPING WG IETF 63 ETSI TISPAN ISDN simulation services Roland Jesske Denis Alexeitsev Miguel Garcia-Martin.
Advertisements

SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
Service flows for overriding barring services Rocky Wang -- draft-rocky-sipping-override-barring-00.txt.
XP Processor Intermediary XP Processor Intermediary XP Processor Application Message (Application Headers+ Application Bodies) XP Layer Entity XP Layer.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
July 13, 2006SIPPING WG IETF 66Slide # 1 ETSI TISPAN call completion services (draft-poetzl-sipping-call-completion-00) Roland
Early Media Authorization Under what conditions should negotiated media flow prior to 200 OK (INVITE)? Richard Ejzak.
Authentication in SIP Jon Peterson NeuStar, Inc Internet2 Member Meeting Los Angeles, CA - Nov 2002.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
1 5 th SDO Emergency Services Workshop October 2008 “sos” URI parameter for marking emergency requests Milan Patel 5 th SDO Emergency Services Workshop.
Signalling Flows for the IP Multimedia Call Control in 3G Wireless Network Master’s Project By Sanjeev Kayath.
IETF 91 DISPATCH draft-jesske-dispatch-forking- answer-correlation-02 Roland Jesske.
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
What is a SIP Trunk Anyway?!? Jonathan Rosenberg Cisco.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
Page 1 SIP header reduction for supporting delay sensitive applications draft-akhtar-sipping-header-reduction-00.txt draft-akhtar-sipping-3g-static-dictionary-00.txt.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Hemant Sengar, George Mason University
Draft-khan-ip-serv-peer-arch-03.txt SPEERMINT Peering Architecture IETF-66, Montreal, Canada Sohel Khan, Ph.D. Technology Strategist.
SIP Extensions for Enhanced Location Based Services in 3G Networks International SIP 2004, Paris Pavitra Krishnaswamy Application-Ready.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Presented by : Suparna Vadlamudi Vineela Solipuram Archana Paaka Presentation on IS-41.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
Draft-ietf-abfab-aaa-saml Josh Howlett IETF 90. Remaining issues (recap from IETF 89) SAML naming of AAA entities The focus of this presentation Alejandro.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Alec Brusilovsky, Zhibi Wang Alcatel-Lucent, July 24, 2007.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-01 David Hancock, Daryl Malas.
SIP INFO Event Framework (draft-kaplan-sip-info-events-00) Hadriel Kaplan Christer Holmberg 70th IETF, Vancouver, Canada.
SIP working group IETF#70 Essential corrections Keith Drage.
Andrew Allen Communication Service Identifier.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Zhibi Wang January, 2007.
Draft-ono-sipping-end2middle-security-00 1 End-to-middle Security in SIP Kumiko Ono NTT Corporation July 17, 2003.
Communication Protocol Engineering Lab.
Diameter NAPT Control Application: Discussion on naming of involved entities Frank Brockners.
SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan,
Service flows for overriding barring services Rocky Wang -- draft-rocky-sipping-override-barring-00.txt.
SAML for SIP Hannes Tschofenig, Jon Peterson, James Polk, Douglas Sicker, Marcus Tegnander.
Using SAML for SIP H. Tschofenig, J. Peterson, J. Polk, D. Sicker, M. Tegnander.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
March 20th, 2001 SIP WG meeting 50th IETF SIP WG meeting Overlap signalling handling
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
1 Notice (c) ZTE CORPORATION. ZTE Corporation, grants a free, irrevocable license to 3GPP2 and its Organizational Partners to incorporate text or other.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
سمینار تخصصی What is PSTN ? (public switched telephone network) تیرماه 1395.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
End-to-middle Security in SIP
IP Telephony (VoIP).
SIP for Grid networks Franco Callegati, Aldo Campi, Walter Cerroni
IP-NNI Joint Task Force Status Update
Jonathan Rosenberg dynamicsoft
ECRIT Interim: SIP Location Conveyance
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
Federated IdM Across Heterogeneous Clouding Environment
PSAP Callback Identifier
Interconnection & migration functions
Session Initiation Protocol (SIP)
IP-NNI Joint Task Force Status Update
Verstat Related Best Practices
Reference Architecture and Call Flow Example for SIP RPH Signing
Debashish Purkayastha, Dirk Trossen, Akbar Rahman
SIP RPH and TN Signing Cross Relationship
call completion services
TDR Signalling Interface for PSTN
OMA PoC Overview and draft-allen-sipping-poc-p-headers
網際網路電話系統 期中考重點整理.
SIP Session Timer Glare Handling
TDR authentication requirements
János Farkas, Balázs Varga, Rodney Cummings, Jiang Yuanlong
Presentation transcript:

draft-rocky-sipping-calling-party-category-01 Report Rocky Wang Rocky.wang@huawei.com

Background information SS7 ISUP defines a Calling Party's Category (CPC) parameter that characterizes the station used to originate a call and carries other important state that can describe the originating party. Based on the CPC parameter from the calling network, the called network can do some special processes related to the calling party category, just like override the calee's DND and some other barring services.

Two typical services The Do Not Disturb (DND) supplementary service allows the served user to instruct the network to automatically reject incoming calls because he does not want to be disturbed. The Anonymous Call Rejection (ACR) supplementary service allows the served user to reject incoming calls from users or subscribers who have restricted the presentation of their calling party identifier. But in some cases, the call should be forward to the callee even though the call should be rejected as the service feature. For an instance, the call is from a police station, emergency call center or from an operator who has the rights to override the served user's services.

A typical interconnect diagram NS1 NS2 Calling Network Called Network LEC2 LEC1 UE1 UE2 NS: Network Server LEC: Local Exchange Carriera UE: User Endpoint

Related Solution The draft, draft-mahy-iptel-cpc-02, defines a URI parameter, "cpc", to deliver the CPC parameter and it can deliver the same thing as this SS7 ISUP. But: Calling party category is sensitive information and it should be provided by the network but not by the endpoint. If it is created by the endpoint, the network server must assert it. If it is wrong, the proxy can only reject the request and have no change to correct it. If the request is forwarded to an untrusted node, the proxy server still have no chance to hide it from the From header.

Proposed Solution Define a new SIP header to deliver the essential information. The calling network entity is responsible for create the header and issues it towards to the callee by the outgoing request message. The intermediary entities forward the request to the callee without change the header.

Proposed Solution (Cont’d) If needed, any entity can get the calling party category from the request message and do some special process related to it. The intermediary entities should remove the CPC header before forward the request message if the next hop is not trusted. E.g. the next hop is the callee subscriber.

Any Comments?

Thanks!