110 likes | 129 Views
ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014). Analysis of Caller ID delivery in China. Hexian Huang CATR, China huanghexian@catr.cn. Service about caller ID delivery. Connected line identification presentation (COLP) is a service provided to the user.
E N D
ITU Workshop on “Caller ID Spoofing” (Geneva, Switzerland, 2 June 2014) Analysis of Caller ID delivery in China Hexian Huang CATR, China huanghexian@catr.cn
Service about caller ID delivery Connected line identification presentation (COLP) is a service provided to the user. This service should identify the caller ID accurately, and call back conveniently, which is also a requirement in China.
The Condition of Caller ID delivery for traditional Network in China • China have strict requirements for caller ID delivery in the traditional network. • There are standards about caller ID delivery inter- operations’ networks, which include the caller ID format, bit length, etc. • All the standards are on service level.
The Condition of Caller ID Modification for Traditional Network To satisfy the needs of user privacy, some services of changing the caller is allowed in China. While such operations are strictly controlled and these change must be traceable, so that we can find the real caller.
The Fraud Cases Caused by Caller ID Spoofing In recent years, the telephone fraud cases appear frequently. A large part of them use the caller ID which make the called user misunderstanding and fooled easily.
The Fraud Cases Caused by Caller ID Spoofing • The spoofing caller ID includes: • Police department telephone number • State organs telephone number • Notary departments telephone number • Impersonate any international numbers, etc.
The Fraud Cases Caused by Caller ID Spoofing The fraud by internet calls have made a lot of users suffered economic loss in China. Most of these fraud calls are from the international, which increases the difficulty for investigative.
Interworking between the Internet and traditional network Scenario 1: Identify the source of the call No unauthorized modification of caller ID Unique caller ID Scenario 2: There are two scenarios:
Proposal • We hope that we can work together on reducing the caller ID spoofing and protect the interests of users from two sides: • Developing more complete standards • Strengthen the supervision on it