Abstract: Methods, systems, and computer readable media for SMS forwarding are disclosed. A message service message routing information response message containing message service message routing information for a first destination may be received. The response message is modified to direct a mobile terminated message service message intended for the first destination to the message service message proxy. The mobile terminated message service message is received at the message service message proxy, which determines whether a message service message forwarding feature is enabled for the first destination. If a message service message forwarding feature is enabled for the first destination, it is determined whether the mobile terminated message service message is eligible for forwarding to a second destination. If the mobile terminated message service message is eligible for forwarding, signaling is initiated to forward the mobile terminated message service message to the second destination.
Abstract: Systems, methods, and computer readable media for detecting and mitigating address spoofing in messaging service transactions are disclosed. A messaging service firewall (MSF) separate from a short message service center (SMSC) receives a mobility management reply message (MMR) that is sent by a mobile location register element in response to an associated mobility management query (MMQ) and that includes a serving switch identifier. The MSF allocates a global title address (GTA) from a pool of GTAs and stores a correlation between the allocated GTA and the originating SMSC. The MSF replaces the serving switch identifier in the MMR with the allocated GTA and routes the modified MMR. The MSF then receives a messaging service message (MSM) that is addressed to the allocated GTA and that includes the purported originating SMSC. If the purported originating SMSC does not match the SMSC to which the GTA is correlated, the MSM is discarded.
Abstract: A method is described for extending a text message with content wherein the text message is sent by a mobile terminal via a Short Message Service Center (SMSC) of a communications system to a recipient and wherein the communications system further comprises a Content Service Center (CSC). The method comprises the steps of receiving at the CSC the text message originating from the SMSC; generating a content-extended text message by adding at least one piece of content to at least a part of the text message; and, sending the content-extended text message depending on the size of the content-extended text message in one or more mobile terminated short messages (MT/SM) to the recipient.
Abstract: Methods, systems, and computer readable media for SMS forwarding are disclosed. A message service message routing information response message containing message service message routing information for a first destination may be received. The response message is modified to direct a mobile terminated message service message intended for the first destination to the message service message proxy. The mobile terminated message service message is received at the message service message proxy, which determines whether a message service message forwarding feature is enabled for the first destination. If a message service message forwarding feature is enabled for the first destination, it is determined whether the mobile terminated message service message is eligible for forwarding to a second destination. If the mobile terminated message service message is eligible for forwarding, signaling is initiated to forward the mobile terminated message service message to the second destination.
Abstract: A method is described for detecting an unauthorized service message in a communications network. The method comprising the steps of: receiving a signaling message associated with a supplementary service (SS) message and/or a unstructured supplementary service data (USSD) message from a first network node, the signaling message comprising identification information of the sender of the SS message and/or USSD message and first location information of the first network node; requesting second location information of the first network node from the a second network node serving the sender of the SS message and/or USSD message; and, comparing the first location information with the second location information in order to determine whether the SS message and/or USSD message is authorized or not.