CN105049442B - A kind of method for switching network and terminal - Google Patents
A kind of method for switching network and terminal Download PDFInfo
- Publication number
- CN105049442B CN105049442B CN201510489642.7A CN201510489642A CN105049442B CN 105049442 B CN105049442 B CN 105049442B CN 201510489642 A CN201510489642 A CN 201510489642A CN 105049442 B CN105049442 B CN 105049442B
- Authority
- CN
- China
- Prior art keywords
- network
- terminal
- identification log
- message
- media subsystem
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 72
- 238000012795 verification Methods 0.000 claims abstract description 134
- 238000004891 communication Methods 0.000 claims abstract description 95
- 238000012790 confirmation Methods 0.000 claims abstract description 38
- 239000000284 extract Substances 0.000 claims abstract description 8
- 230000004044 response Effects 0.000 claims description 134
- 238000000605 extraction Methods 0.000 claims description 19
- 230000011664 signaling Effects 0.000 abstract description 11
- 238000011017 operating method Methods 0.000 abstract description 8
- 230000006870 function Effects 0.000 description 20
- 230000008569 process Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 11
- 230000005540 biological transmission Effects 0.000 description 10
- 238000010295 mobile communication Methods 0.000 description 8
- 238000013475 authorization Methods 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 206010048669 Terminal state Diseases 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
- H04W36/144—Reselecting a network or an air interface over a different radio air interface technology
- H04W36/1446—Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed
Abstract
The embodiment of the invention discloses a kind of method for switching network and terminal, the method, including:Extract identification log message when being registered under first network connection status;If the terminal switches to the second network connection state from the first network connection status, authentication verification is sent to the multi-media subsystem network using the identification log message and asked;If the authentication verification passes through, the confirmation message that the multi-media subsystem network is sent is received, and ask the multi-media subsystem network that the communication link information of the terminal is updated to the second network from first network.The embodiment of the present invention by be stored under first network connection status register when identification log message, during so as to be registered under the second network connection state directly identification log is carried out using the identification log message, the step of eliminating initial registration, operating procedure greatly simplifies, and also reduces the signaling traffic load registered during network switching.
Description
Technical field
The present invention relates to the communications fields, and in particular to a kind of method for switching network and terminal.
Background technology
IMS (IP Multimedia Subsystem, IP multimedia subsystem) is a kind of completely new multimedia service shape
Formula, it disclosure satisfy that the demand of more novel, the more diversified multimedia service of present terminal client, VoLTE (Voice over
Long Term Evolution, the speech business based on IMS) finger speech sound business framework is on carrier network, so as to run
Quotient can provide the control and management of higher level for VoLTE, and (Voice over Wireless Fidelity lead to VoWiFi
Cross Wi-Fi accesses IMS) refer to net access IMS using WiFi as access so as to fulfill IMS business.
With the development of the communication technology, wireless Wi-Fi using its cover more and more extensive and signal quality it is good the advantages of as
Everybody is favored, so VoWiFi accesses the generally access shape for another IMS networks that IMS becomes other than VoLTE by Wi-Fi
Formula.And currently in order to realizing the switching between VoLTE and VoWiFi, such as from VoLTE network switchings to VoWiFi networks, usually
Using being nullified on VoLTE first, then re-registered on VoWiFi networks again, and since IMS network registration includes
Two flows of initial registration and identification log, registration process is complicated, larger so as to be caused using such switching register method
Signaling traffic load, complex steps when switching is registered.
Invention content
An embodiment of the present invention provides a kind of method for switching network and terminals, to terminal in network switching, reduce note
The step of volume is to IMS network reduces signaling traffic load.
First aspect of the embodiment of the present invention provides a kind of method for switching network, including:
Identification log message when being registered under first network connection status is extracted, the identification log message is used for terminal
Identification log is carried out to multi-media subsystem network;
If the terminal switches to the second network connection state from the first network connection status, the authentication is utilized
Registration message sends authentication verification request to the multi-media subsystem network, and the authentication verification request is described more for asking
Media subsystem network carries out authentication verification to the identification log message;
If the authentication verification passes through, the confirmation message that the multi-media subsystem network is sent is received, and ask institute
It states multi-media subsystem network and the communication link information of the terminal is updated to the second network from first network.
Second aspect of the embodiment of the present invention provides a kind of terminal, including:
Extraction module, for extracting identification log message when being registered under first network connection status, the authentication note
Volume message carries out identification log for terminal to multi-media subsystem network;
Sending module, if switching to the second network connection state from the first network connection status for the terminal,
It then sends authentication verification to the multi-media subsystem network using the identification log message to ask, the authentication verification request
For the multi-media subsystem network to be asked to carry out authentication verification to the identification log message;
First request module if the authentication verification passes through, receives the confirmation that the multi-media subsystem network is sent
Message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to the second net from first network
Network.
As can be seen that in technical solution provided in an embodiment of the present invention, terminal is extracted under first network connection status
Identification log message during registration, the identification log message carry out identification log for terminal to multi-media subsystem network;
If the terminal switches to the second network connection state from the first network connection status, the identification log message is utilized
Authentication verification request is sent to the multi-media subsystem network, the authentication verification asks to ask the multimedia subsystem
Network of uniting carries out authentication verification to the identification log message;If the authentication verification passes through, the multimedia subsystem is received
It unites the confirmation message that network is sent, and asks the multi-media subsystem network by the communication link information of the terminal from first
Network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, so as to the
Identification log directly is carried out using the identification log message when being registered under two network connection states, eliminates the step of initial registration
Suddenly, operating procedure greatly simplifies, and also reduces the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with
Other attached drawings are obtained according to these attached drawings.
Fig. 1-a are a kind of flow diagrams for method for switching network that first embodiment of the invention provides;
Fig. 1-b are the interaction flow signals of endpoint registration IMS network in method for switching network provided in an embodiment of the present invention
Figure;
Fig. 1-c are network architecture diagrams provided in an embodiment of the present invention;
Fig. 2 is that second embodiment of the invention provides a kind of flow diagram of method for switching network;
Fig. 3 is a kind of flow diagram for method for switching network that third embodiment of the invention provides;
Fig. 4 is a kind of structure diagram for terminal that fourth embodiment of the invention provides;
Fig. 5 is a kind of structure diagram for terminal that fifth embodiment of the invention provides;
Fig. 6 is a kind of structure diagram for terminal that sixth embodiment of the invention provides.
Specific embodiment
An embodiment of the present invention provides a kind of method for switching network and terminals, to terminal in network switching, reduce note
The step of volume is to IMS network reduces signaling traffic load.
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention
The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only
The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects
It encloses.
Term " first ", " second " and " third " in description and claims of this specification and above-mentioned attached drawing etc. is
For distinguishing different objects, not for description particular order.In addition, term " comprising " and their any deformations, it is intended that
It non-exclusive is included in covering.Such as process, method, system, product or the equipment for containing series of steps or unit do not have
The step of having listed or unit are defined in, but optionally further includes the step of not listing or unit or optionally further includes
For the intrinsic other steps of these processes, method, product or equipment or unit.
A kind of method for switching network of the embodiment of the present invention, a kind of method for switching network include:Extraction connects in first network
Identification log message when being registered under state is connect, the identification log message is reflected for terminal to multi-media subsystem network
Power registration;If the terminal switches to the second network connection state from the first network connection status, the authentication is utilized
Registration message sends authentication verification request to the multi-media subsystem network, and the authentication verification request is described more for asking
Media subsystem network carries out authentication verification to the identification log message;If the authentication verification passes through, receive described more
The confirmation message that media subsystem network is sent, and the multi-media subsystem network is asked to believe the communication link of the terminal
Breath is updated to the second network from first network.
It is a kind of method for switching network that first embodiment of the invention provides referring first to Fig. 1-a and Fig. 1-b, Fig. 1-a
Flow diagram, Fig. 1-b are the interaction flows of endpoint registration IMS networks in method for switching network provided in an embodiment of the present invention
Schematic diagram, Fig. 1-c are network architecture diagrams provided in an embodiment of the present invention.Wherein, as shown in Fig. 1-a, first embodiment of the invention
A kind of method for switching network provided can include:
The identification log message of S101, extraction under first network connection status during registration, the identification log message are used
In terminal identification log is carried out to multi-media subsystem network.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to
Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network
Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G
(the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into
During row network connection, then user mobile phone is in 4G network connection states.
Wherein, referring to Fig. 1-b and Fig. 1-c, it is to be appreciated that under normal circumstances, such as when the first registered ims network of terminal,
Flow during endpoint registration IMS network includes initial registration and identification log.Initial registration procedure is sent out from terminal to IMS network
The registration process risen, registration message will pass sequentially through eNodeB (Evolved Node B, base station), P-CSCF (Proxy Call
Session Control Function, Proxy Call Session Control Function), I-CSCF (Interrogating CSCF, inquiry
CSCF) retransmit to S-CSCF (Serving CSCF, serving CSCF), and pass through HSS (Home Subscriber Server,
Home signature user server) authentication is carried out to it.Thus when terminal initiates registration request to IMS network, IMS network
401 unauthorizeds can be sent to respond and carry authentication verification parameter (RAND, AUTH) to terminal initiation challenge, terminal receives the sound
Response and authentication key is calculated according to response progress Authentication Response parameter in Ying Houhui, initiates authentication note again later
Volume flow;Identification log flow is that response and authentication key are sent to IMS network by terminal, completes to authenticate by IMS network
And the process of key agreement, and return to the confirmation message 200 (OK) to succeed in registration.
Wherein, terminal sends the information that private user identity mark is carried in initial registration request message.Generally for
For VoLTE user, private user identity mark is:Username@reaml, wherein, usename is the IMSI of user
(International Mobile Subscriber Identification Number, international mobile subscriber identity) number
Code, reaml is home network domain name.Such as:When the IMSI numbers of certain user:234150999999999, then privately owned user's body
Part mark form be:234150999999999@ims.mnc015.mcc234.3gppnetwork.org, although terminal and
It can (Authentication and Key Agreement, third generation mobile network be recognized by AKA between S-CSCF
Card and key agreement protocol) security key negotiated of mechanism notes transmission being encrypted property of information and integrity protection
Volume request message that is to say and be sent when security key is not yet negotiated due to being that terminal and S-CSCF do not communicate and send before
, so what the message was sent not by any safeguard protection but with plaintext.
Wherein, identification log information refer to after initial registration, identification log it is previously stored for identification log
Average information.
Optionally, the present invention other possible embodiments in, identification log information can be using 401 not
Authorization response and its authentication verification parameter (RAND, AUTH) of carrying carry out the calculating of Authentication Response parameter according to certain rule
The authentication key and response obtained afterwards, so as to after initial registration later identification log information is extracted, then in next time
It can not need to carry out initial authentication to terminal again when registration, can directly carry out identification log.
It is appreciated that by extracting identification log information, then identification log information can be directly utilized in handover network
Identification log is carried out, the step of so as to eliminate initial registration.
If S102, the terminal switch to the second network connection state from the first network connection status, institute is utilized
It states identification log message and sends authentication verification request to the multi-media subsystem network, the authentication verification asks to ask
The multi-media subsystem network carries out authentication verification to the identification log message.
Wherein, terminal switches to the second network connection state from first network connection status and refers to terminal from using the first net
Network communication link carries out switching to the state for carrying out network communication using the second network communication link in the state of network communication, such as
Communicated using 4G networks before terminal, then after the range of wireless Wi-Fi coverings is entered, terminal from original 4G nets
Network communication switchs to carry out network communication using wireless Wi-Fi.
Optionally, in some possible embodiments of the present invention, identification log that terminal is sent to IP multimedia subsystem, IMS
Information responds unauthorized response and the authentication key and response calculated using authentication verification parameter for terminal.
Wherein, authentication verification request refers to that terminal is asked in identification log to the authentication verification that IMS network is sent, request
IMS network carries out authentication verification to the identification log information that terminal is sent.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network
During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone gets in wireless Wi-Fi coverings point, hand
The connection network of machine switchs to Wi-Fi network from LTE network, for the access point using Wi-Fi network as IMS network, then sharp
Authentication verification is sent with identification log message to IMS network to ask, request carries out authentication verification.
If S103, the authentication verification pass through, the confirmation message that the multi-media subsystem network is sent is received, and please
Ask the multi-media subsystem network that the communication link information of the terminal is updated to the second network from first network.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal
The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed;
Communication link information refers to the network link to communicate between terminal and IMS network, can be mobile operator
The network of offer can be accessed speech business namely the VoLTE that IMS network provides by LTE network, can also pass through Wi- at this time
The speech business namely VoWiFi, the communication link information that Fi access IMS networks provide can also be other network links.
Optionally, in some possible embodiments of the present invention, when multi-media subsystem network is by the communication of terminal
Link information is after first network is updated to the second network, then IMS network business is based on the second real-time performance.
Optionally, in some possible embodiments of the present invention, after communication link changes, IMS network update is eventually
The IP address at end etc. and the relevant information of communication link.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network
During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone is got in, the connection network of mobile phone from
LTE network switchs to Wi-Fi network, in order to as the access point of IMS networks, then utilize identification log message using Wi-Fi network
To IMS network send authentication verification request, request carry out authentication verification, when authentication verification by after, IMS network to terminal send
200 confirmation messages illustrate the identification log success based on wireless Wi-Fi, and the IMS network of terminal can be based on wireless Wi-Fi and carry out,
So as to which IMS networks are by IP address of more new terminal etc. and the relevant information of communication link, such as by the IP address of terminal from LTE nets
The IP address of network is updated to the IP address of wireless Wi-Fi.
As can be seen that in the scheme of the present embodiment, authentication note when terminal extraction is registered under first network connection status
Volume message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal is from institute
It states first network connection status and switches to the second network connection state, then it is sub to the multimedia using the identification log message
Grid sends authentication verification request, and the authentication verification asks to ask the multi-media subsystem network to the mirror
It weighs registration message and carries out authentication verification;If the authentication verification passes through, receive the multi-media subsystem network and send really
Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network
Network.By the identification log message being stored in when being registered under first network connection status, so as in the second network connection state
The step of directly carrying out identification log using the identification log message during lower registration, eliminating initial registration, operating procedure is significantly
Simplify, also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
Optionally, it is described to bet in the first network connection status in some possible embodiments of the present invention
Volume, including:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message
The certificate parameter carried including unauthorized response and unauthorized response;
Identification log message is generated using the unauthorized response message, the identification log message includes response;
Identification log is carried out using the identification log message.Optionally, in some possible embodiments of the present invention
In, the identification log message when extraction is registered under first network connection status, including:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this
Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated
It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two
Parameter.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode
, judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response
The authentication key of carrying.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with
And Integrity Key (IK).
Above-mentioned register flow path is that is, when terminal is registered under first network connection status to IMS network, first to IMS nets
Network sends initial registration request, comprising terminal private user identity identification information in the registration request, due to IMS at this time not yet
The identity of terminal is authenticated, so IMS network responds initial registration request, returns to unauthorized response message to eventually
End, it is desirable that terminal carries out further authentication verification, after terminal receives the unauthorized response message, is responded using the unauthorized
Identification log message is generated, the response in the identification log message is recycled to be authenticated, then it is appreciated that can be direct
Identification log message is preserved, so as to carry out further identification log using identification log message, the step of initial registration can be saved
Suddenly, unauthorized response message can be also preserved, unauthorized response message generation identification log message is recycled, can equally save initial
The step of registration.
Optionally, in some possible embodiments of the present invention, if the authentication verification passes through, institute is received
The confirmation message of multi-media subsystem network transmission is stated, and asks the multi-media subsystem network by the communication chain of the terminal
After first network is updated to the second network, the method further includes road information:
Suspend the work of the terminal first network AM access module, and ask described in the multi-media subsystem network release
First network communication link resources.
It is appreciated that when in terminal, under first network state switches to the second network state, terminal-pair IMS networks are noted
After volume success, terminal accesses IMS network using the second network communication link, can stop all of first network communication link
Work namely the work of pause terminal first network AM access module and IMS networks release first network communication link resources,
So as to save power consumption.
For example, after mobile phone switches to Wi-Fi network from LTE network, and mobile phone by Wi-Fi networks to IMS
Network registry success carries out, then mobile phone can suspend the access of its LTE network so as to which the IMS network of mobile phone can be based on Wi-Fi network
The work of module, and IMS network release LET network communication link resources, so as to economize on resources and power consumption.
Optionally, in some possible embodiments of the present invention, if the authentication verification passes through, institute is received
The confirmation message of multi-media subsystem network transmission is stated, and asks the multi-media subsystem network by the communication chain of the terminal
After first network is updated to the second network, the method further includes road information:
Ask the multi-media subsystem network switching core net associated session control resource.
It is appreciated that when terminal is switched to from first network state under the second network state, terminal-pair IMS network is registered
After work(, terminal accesses IMS network using the second network communication link, and IMS network is by itself and the relevant session control of IMS business
Resource switch processed carries out IMS business to the second network communication link so as to be based on the second network.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I-
CSCF, S-CSCF and the other and relevant resource of IMS business.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service
Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language
The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks
Switching.
Optionally, in some possible embodiments of the present invention, when first network is LTE, the second network can be
Wi-Fi or Wlan, so as to realize from VoLTE to VoWiFi or the switching of VoWlan.
Optionally, in other possible embodiments of the present invention, when first network is Wi-Fi, the second network
Can be LTE, so as to realize the switching from VoWiFi to VoLTE.
Optionally, in other possible embodiments of the present invention, when switching to VoWiFi from VoLTE, and can be with
VoLTE is switched to from VoWiFi in the same way, identification log message can also be to be carried out initially in VoLTE for the first time at this time
The identification log message preserved when registration and identification log.
For the ease of being best understood from and implementing the said program of the embodiment of the present invention, with reference to some specific applied fields
Scape is illustrated.
Fig. 2 is referred to, Fig. 2 is that second embodiment of the invention provides a kind of flow diagram of method for switching network, wherein,
It can include as shown in Fig. 2, second embodiment of the invention provides a kind of method for switching network:
S201, under first network connection status, terminal to multi-media subsystem network send initial registration request.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to
Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network
Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G
(the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into
During row network connection, then user mobile phone is in 4G network connection states.
Wherein, referring to Fig. 1-b, it is to be appreciated that under normal circumstances, such as when the first registered ims network of terminal, endpoint registration
Flow during IMS network includes initial registration and identification log.Initial registration procedure is the registration initiated from terminal to IMS network
Process, registration message will pass sequentially through eNodeB (Evolved Node B, base station), P-CSCF (Proxy Call Session
Control Function, Proxy Call Session Control Function), I-CSCF (Interrogating CSCF, inquire CSCF) again
Be sent to S-CSCF (Serving CSCF, serving CSCF), due at this time there are no carry out authentication, so when terminal to
When IMS network initiates registration request, IMS network can send 401 unauthorizeds and respond and carry authentication verification parameter (RAND, AUTH)
It initiates to challenge to terminal, terminal can be rung after receiving the response according to the response that is calculated of response progress Authentication Response parameter
Should and authentication key, initiate identification log flow again later;Identification log flow is that terminal sends out response and authentication key
IMS network is given, authentication and the process of key agreement are completed, and return to the confirmation message 200 to succeed in registration by IMS network
(OK)。
Wherein, initial registration request refers to carry privately owned user to what IMS network was sent when terminal carries out initial registration
The information of identity.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network
VoLTE then sends initial registration request to IMS network.
S202, the unauthorized response message that multi-media subsystem network returns is received, wherein, unauthorized response message includes
The certificate parameter that unauthorized responds and unauthorized response carries.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this
Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated
It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two
Parameter.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network
VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time,
So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that terminal carries out further
Authentication verification.
S203, identification log message is generated using unauthorized response message, identification log message includes response.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode
, judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response
The authentication key of carrying
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with
And Integrity Key (IK).
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network
VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time,
So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that terminal carries out further
Authentication verification, so as to terminal using unauthorized response message generate identification log message.
S204, identification log is carried out using identification log message.
Optionally, in some possible embodiments of the present invention, terminal carries out authentication note using identification log message
During volume, terminal sends identification log message to IMS network, and IMS network carries out authentication verification to the identification log message, works as verification
Pass through, IMS returns to confirmation message, and identification log is completed.
It is appreciated that after identification log message is generated, then identification log can be carried out using the identification log message, from
And complete registration of the terminal to IMS network.
The identification log message of S205, extraction under first network connection status during registration.
Wherein, identification log message carries out identification log for terminal to multi-media subsystem network.
Wherein, identification log information refer to after initial registration, identification log it is previously stored for identification log
Average information.
Optionally, the present invention other possible embodiments in, identification log message can be using 401 not
Authorization response and its authentication verification parameter (RAND, AUTH) of carrying carry out the calculating of Authentication Response parameter according to certain rule
The authentication key and response obtained afterwards, so as to after initial registration later identification log information is extracted, then in next time
It can not need to carry out initial authentication to terminal again when registration, can directly carry out identification log.
Optionally, it in some possible embodiments of the present invention, extracts when being registered under first network connection status
Identification log message, including:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
It is appreciated that by extracting identification log information, then identification log information can be directly utilized in handover network
Identification log is carried out, the step of so as to eliminate initial registration.
If S206, terminal switch to the second network connection state from the first network connection status, authentication note is utilized
Volume message sends authentication verification request to multi-media subsystem network, and the authentication verification asks to ask IP multimedia subsystem, IMS
Network carries out authentication verification to identification log message.
Wherein, terminal switches to the second network connection state from first network connection status and refers to terminal from using the first net
Network communication link carries out switching to the state for carrying out network communication using the second network communication link in the state of network communication, such as
Communicated using 4G networks before terminal, then after the range of wireless Wi-Fi coverings is entered, terminal from original 4G nets
Network communication switchs to carry out network communication using wireless Wi-Fi.
Wherein, authentication verification request refers to that terminal is asked in identification log to the authentication verification that IMS network is sent, request
IMS network carries out authentication verification to the identification log information that terminal is sent.
Optionally, in some possible embodiments of the present invention, identification log that terminal is sent to IP multimedia subsystem, IMS
Information responds unauthorized response and the authentication key and response calculated using authentication verification parameter for terminal.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service
Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language
The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks
Switching.
Optionally, in some possible embodiments of the present invention, when first network is LTE, the second network can be
Wi-Fi or Wlan, so as to realize from VoLTE to VoWiFi or the switching of VoWlan.
Optionally, in other possible embodiments of the present invention, when first network is Wi-Fi, the second network
Can be LTE, so as to realize the switching from VoWiFi to VoLTE.
Optionally, in other possible embodiments of the present invention, when switching to VoWiFi from VoLTE, and can be with
VoLTE is switched to from VoWiFi in the same way, identification log message can also be to be carried out initially in VoLTE for the first time at this time
The identification log message preserved when registration and identification log.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network
During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone gets in wireless Wi-Fi coverings point, hand
The connection network of machine switchs to Wi-Fi network from LTE network, for the access point using Wi-Fi network as IMS network, then sharp
Authentication verification is sent with identification log message to IMS network to ask, request carries out authentication verification.
If S207, authentication verification pass through, the confirmation message of multi-media subsystem network transmission is received, and asks multimedia
The communication link information of terminal is updated to the second network by subsystem network from first network.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal
The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed;
Communication link information refers to the network link to communicate between terminal and IMS network, can be mobile operator
The network of offer can be accessed speech business namely the VoLTE that IMS network provides by LTE network, can also pass through Wi- at this time
The speech business namely VoWiFi, the communication link information that Fi access IMS networks provide can also be other network links.
Optionally, in some possible embodiments of the present invention, when multi-media subsystem network is by the communication of terminal
Link information is after first network is updated to the second network, then IMS network business is based on the second real-time performance.
Optionally, in some possible embodiments of the present invention, after communication link changes, IMS network update is eventually
The IP address at end etc. and the relevant information of communication link.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network
During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone is got in, the connection network of mobile phone from
LTE network switchs to Wi-Fi network, in order to as the access point of IMS networks, then utilize identification log message using Wi-Fi network
To IMS network send authentication verification request, request carry out authentication verification, when authentication verification by after, IMS network to terminal send
200 confirmation messages illustrate the identification log success based on wireless Wi-Fi, and the IMS network of terminal can be based on wireless Wi-Fi and carry out,
So as to which IMS networks are by IP address of more new terminal etc. and the relevant information of communication link, such as by the IP address of terminal from LTE nets
The IP address of network is updated to the IP address of wireless Wi-Fi.
S208, request multi-media subsystem network switching core net associated session control resource.
It is appreciated that when terminal is switched to from first network state under the second network state, terminal-pair IMS network is registered
After work(, terminal accesses IMS network using the second network communication link, and IMS network is by itself and the relevant session control of IMS business
Resource switch processed carries out IMS business to the second network communication link so as to be based on the second network.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I-
CSCF, S-CSCF and the other and relevant resource of IMS business.
S209, the work for suspending terminal first network AM access module, and multi-media subsystem network is asked to discharge the first net
Network communication link resources.
It is appreciated that when in terminal, under first network state switches to the second network state, terminal-pair IMS networks are noted
After volume success, terminal accesses IMS network using the second network communication link, can stop all of first network communication link
Work namely the work of pause terminal first network AM access module and IMS networks release first network communication link resources,
So as to save power consumption.
For example, after mobile phone switches to Wi-Fi network from LTE network, and mobile phone by Wi-Fi networks to IMS
Network registry success carries out, then mobile phone can suspend the access of its LTE network so as to which the IMS network of mobile phone can be based on Wi-Fi network
The work of module, and IMS network release LET network communication link resources, so as to economize on resources and power consumption.
As can be seen that in the scheme of the present embodiment, authentication note when terminal extraction is registered under first network connection status
Volume message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal is from institute
It states first network connection status and switches to the second network connection state, then it is sub to the multimedia using the identification log message
Grid sends authentication verification request, and the authentication verification asks to ask the multi-media subsystem network to the mirror
It weighs registration message and carries out authentication verification;If the authentication verification passes through, receive the multi-media subsystem network and send really
Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network
Network.By the identification log message being stored in when being registered under first network connection status, so as in the second network connection state
The step of directly carrying out identification log using the identification log message during lower registration, eliminating initial registration, operating procedure is significantly
Simplify, also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
For a better understanding of the present invention with the said program of the implementation embodiment of the present invention, lifted in a manner of interactive again below
Embodiment illustrates, and refers to Fig. 3, and Fig. 3 is that a kind of flow for method for switching network that third embodiment of the invention provides is shown
It is intended to, wherein, as shown in figure 3, a kind of network switching that the third embodiment of the present invention provides can include:
S301, under first network connection status, terminal to multi-media subsystem network send initial registration request.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network
VoLTE, then mobile phone terminal to IMS network send initial registration request.
S302, terminal receive the unauthorized response message that multi-media subsystem network returns.
Wherein, unauthorized response message includes the certificate parameter that unauthorized responds and unauthorized response carries.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this
Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated
It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two
Parameter.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network
VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time,
So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that mobile phone terminal is into traveling
The authentication verification of one step.
S303, terminal generate identification log message using unauthorized response message.
Wherein, identification log message includes the authentication key that response and response carry.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response
The authentication key of carrying.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode
, judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with
And Integrity Key (IK).
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network
VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time,
So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that mobile phone terminal is into traveling
The authentication verification of one step, so as to which mobile phone terminal generates identification log message using unauthorized response message.
S304, terminal carry out identification log using identification log message.
Optionally, in some possible embodiments of the present invention, terminal carries out authentication note using identification log message
During volume, terminal sends identification log message to IMS network, and IMS network carries out authentication verification to the identification log message, works as verification
Pass through, IMS returns to confirmation message, and identification log is completed.
For example, in some possible embodiments of the present invention, when mobile phone terminal utilizes unauthorized response generation
After identification log message, which is sent to IMS network by LTE, IMS network to the identification log message into
Row authentication verification, when being verified, IMS returns to confirmation message, and identification log is completed, that is, realizes VoLTE.
The identification log message of S305, terminal extraction under first network connection status during registration.
Wherein, identification log message carries out identification log for terminal to multi-media subsystem network.
Optionally, it in some possible embodiments of the present invention, extracts when being registered under first network connection status
Identification log message, including:
Unauthorized response message is preserved, and the identification log message is generated using unauthorized response message;
Or, preserve identification log message.
For example, in some possible embodiments of the present invention, it is other in order to be switched in next network from LTE
Initial registration step is saved during network, mobile phone terminal extracts the identification log message during aforementioned registration step, so as to rear
After continuous network switching directly identification log can be carried out using the identification log message.
If S306, terminal switch to the second network connection state from first network connection status, disappeared using identification log
It ceases to multi-media subsystem network and sends authentication verification request.
Wherein, authentication verification asks that multi-media subsystem network is asked to carry out authentication verification to identification log message.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service
Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language
The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
For example, in some possible embodiments of the present invention, when mobile phone switches to Wi- from LTE network connection
During Fi network connections, mobile phone is sent to IMS network using the identification log message extracted by Wi-Fi network, asks IMS
Network is to its authentication verification.
If S307, authentication verification pass through, terminal receives the confirmation message that multi-media subsystem network is sent.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal
The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed.
For example, in some possible embodiments of the present invention, mobile phone utilizes the identification log message extracted
IMS network is sent to by Wi-Fi network, request IMS network is to its authentication verification, so as to which IMS networks believe the identification log
Breath carries out authentication verification, and after being verified, IMS network sends confirmation message to mobile phone, so as to which mobile phone receives IMS network hair
The confirmation message sent, so as to complete identification log.
The communication link information of terminal is updated to the second network by S308, multi-media subsystem network from first network.
For example, in some possible embodiments of the present invention, when authentication verification of the mobile phone based on Wi-Fi network
By rear, then illustrate that the IMS business of mobile phone can be based on Wi-Fi network and realize, so as to which IMS network is by the communication link of more new terminal
Information, such as the IP address of terminal and the relevant information of communication link, such as by the IP address of terminal from the IP address of LTE network more
Newly to the IP address of wireless Wi-Fi, so as to ensure that VoWiFi business works normally.
S309, multi-media subsystem network switching core net associated session control resource.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I-
CSCF, S-CSCF and the other and relevant resource of IMS business.
For example, in some possible embodiments of the present invention, after mobile phone switches to VoWiFi from VoLTE,
IMS network switches core net session control resource with network-related resources from LTE cables to wireless Wi-Fi network, so as to ensure
VoWiFi business works normally.
S310, multi-media subsystem network release first network communication link resources.
For example, in some possible embodiments of the present invention, after mobile phone switches to VoWiFi from VoLTE,
IMS network discharges LTE network communication link resources, so as to save power consumption.
It is to be appreciated that step S309 and step S310 do not have stringent priority to perform sequence.
S311, the work of terminal pause first network AM access module.
For example, in some possible embodiments of the present invention, after mobile phone switches to VoWiFi from VoLTE,
Mobile phone suspends the work of LTE network AM access module, thus so as to save mobile telephone power consumption.
As can be seen that in the scheme of the present embodiment, authentication note when terminal extraction is registered under first network connection status
Volume message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal is from institute
It states first network connection status and switches to the second network connection state, then it is sub to the multimedia using the identification log message
Grid sends authentication verification request, and the authentication verification asks to ask the multi-media subsystem network to the mirror
It weighs registration message and carries out authentication verification;If the authentication verification passes through, receive the multi-media subsystem network and send really
Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network
Network.By the identification log message being stored in when being registered under first network connection status, so as in the second network connection state
The step of directly carrying out identification log using the identification log message during lower registration, eliminating initial registration, operating procedure is significantly
Simplify, also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
The embodiment of the present invention also provides terminal, which includes:
Extraction module, for extracting identification log message when being registered under first network connection status, the authentication note
Volume message carries out identification log for terminal to multi-media subsystem network;
Sending module, if switching to the second network connection state from the first network connection status for the terminal,
It then sends authentication verification to the multi-media subsystem network using the identification log message to ask, the authentication verification request
For the multi-media subsystem network to be asked to carry out authentication verification to the identification log message;
First request module if the authentication verification passes through, receives the confirmation that the multi-media subsystem network is sent
Message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to the second net from first network
Network.
Specifically, referring to Fig. 4, Fig. 4 is a kind of structure diagram for terminal that fourth embodiment of the invention provides,
In, as shown in figure 4, a kind of terminal 400 that fourth embodiment of the invention provides can include:
Extraction module 410,420 and first request module 430 of sending module.
Wherein, extraction module 410, for extracting identification log message when being registered under first network connection status, institute
It states identification log message and carries out identification log to multi-media subsystem network for terminal.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to
Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network
Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G
(the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into
During row network connection, then user mobile phone is in 4G network connection states.
Wherein, referring to Fig. 1-b, it is to be appreciated that under normal circumstances, such as when the first registered ims network of terminal, endpoint registration
Flow during IMS network includes initial registration and identification log.Initial registration procedure is the registration initiated from terminal to IMS network
Process, registration message will pass sequentially through eNodeB (Evolved Node B, base station), P-CSCF (Proxy Call Session
Control Function, Proxy Call Session Control Function), I-CSCF (Interrogating CSCF, inquire CSCF) again
S-CSCF (Serving CSCF, serving CSCF) is sent to, and passes through HSS (Home Subscriber Server, ownership signing
Client server) authentication is carried out to it.So as to which when terminal initiates registration request to IMS network, IMS network can be sent
401 unauthorizeds respond and carry authentication verification parameter (RAND, AUTH) and initiate to challenge to terminal, after terminal receives the response
Authentication Response parameter can be carried out according to the response is calculated response and authentication key, initiates identification log stream again later
Journey;Identification log flow is that response and authentication key are sent to IMS network by terminal, completes to authenticate by IMS network and close
The process that key is negotiated, and return to the confirmation message 200 (OK) to succeed in registration.
Wherein, terminal sends the information that private user identity mark is carried in initial registration request message.Generally for
For VoLTE user, private user identity mark is:Username@reaml, wherein, usename is the IMSI of user
(International Mobile Subscriber Identification Number, international mobile subscriber identity) number
Code, reaml is home network domain name.Such as:When the IMSI numbers of certain user:234150999999999, then privately owned user's body
Part mark form be:234150999999999@ims.mnc015.mcc234.3gppnetwork.org, although terminal and
It can (Authentication and Key Agreement, third generation mobile network be recognized by AKA between S-CSCF
Card and key agreement protocol) security key negotiated of mechanism notes transmission being encrypted property of information and integrity protection
Volume request message that is to say and be sent when security key is not yet negotiated due to being that terminal and S-CSCF do not communicate and send before
, so what the message was sent not by any safeguard protection but with plaintext.
Wherein, identification log information refer to after initial registration, identification log it is previously stored for identification log
Average information.
Optionally, the present invention other possible embodiments in, identification log information can be using 401 not
Authorization response and its authentication verification parameter (RAND, AUTH) of carrying carry out the calculating of Authentication Response parameter according to certain rule
The authentication key and response obtained afterwards, so as to after initial registration later identification log information is extracted, then in next time
It can not need to carry out initial authentication to terminal again when registration, can directly carry out identification log.
It is appreciated that by extracting identification log information, then identification log information can be directly utilized in handover network
Identification log is carried out, the step of so as to eliminate initial registration.
Sending module 420, if switching to the second network connection shape from the first network connection status for the terminal
State then sends authentication verification to the multi-media subsystem network using the identification log message and asks, the authentication verification
It asks that the multi-media subsystem network is asked to carry out authentication verification to the identification log message.
Wherein, terminal switches to the second network connection state from first network connection status and refers to terminal from using the first net
Network communication link carries out switching to the state for carrying out network communication using the second network communication link in the state of network communication, such as
Communicated using 4G networks before terminal, then after the range of wireless Wi-Fi coverings is entered, terminal from original 4G nets
Network communication switchs to carry out network communication using wireless Wi-Fi.
Optionally, in some possible embodiments of the present invention, identification log that terminal is sent to IP multimedia subsystem, IMS
Information responds unauthorized response and the authentication key and response calculated using authentication verification parameter for terminal.
Wherein, authentication verification request refers to that terminal is asked in identification log to the authentication verification that IMS network is sent, request
IMS network carries out authentication verification to the identification log information that terminal is sent.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network
During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone gets in wireless Wi-Fi coverings point, hand
The connection network of machine switchs to Wi-Fi network from LTE network, for the access point using Wi-Fi network as IMS network, then sharp
Authentication verification is sent with identification log message to IMS network to ask, request carries out authentication verification.
First request module 430 if the authentication verification passes through, receives the multi-media subsystem network and sends really
Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network
Network.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal
The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed;
Communication link information refers to the network link to communicate between terminal and IMS network, can be mobile operator
The network of offer can be accessed speech business namely the VoLTE that IMS network provides by LTE network, can also pass through Wi- at this time
The speech business namely VoWiFi, the communication link information that Fi access IMS networks provide can also be other network links.
Optionally, in some possible embodiments of the present invention, when multi-media subsystem network is by the communication of terminal
Link information is after first network is updated to the second network, then IMS network business is based on the second real-time performance.
Optionally, in some possible embodiments of the present invention, after communication link changes, IMS network update is eventually
The IP address at end etc. and the relevant information of communication link.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network
During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone is got in, the connection network of mobile phone from
LTE network switchs to Wi-Fi network, in order to as the access point of IMS networks, then utilize identification log message using Wi-Fi network
To IMS network send authentication verification request, request carry out authentication verification, when authentication verification by after, IMS network to terminal send
200 confirmation messages illustrate the identification log success based on wireless Wi-Fi, and the IMS network of terminal can be based on wireless Wi-Fi and carry out,
So as to which IMS networks are by IP address of more new terminal etc. and the relevant information of communication link, such as by the IP address of terminal from LTE nets
The IP address of network is updated to the IP address of wireless Wi-Fi.
It is understood that the function of each function module of the terminal 400 of the present embodiment can be according to above method embodiment
In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
As can be seen that in the scheme of the present embodiment, terminal 400 extracts authentication when being registered under first network connection status
Registration message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal 400
Switch to the second network connection state from the first network connection status, then terminal 400 using the identification log message to
The multi-media subsystem network sends authentication verification request, and the authentication verification asks to ask the IP multimedia subsystem, IMS
Network carries out authentication verification to the identification log message;If the authentication verification passes through, terminal 400 receives the multimedia
Subsystem network send confirmation message, and ask the multi-media subsystem network by the communication link information of the terminal from
First network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, thus
Identification log directly is carried out using the identification log message when being registered under the second network connection state, eliminates initial registration
Step, operating procedure greatly simplify, and also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
Fig. 5 is referred to, Fig. 5 is a kind of structure diagram for terminal that fifth embodiment of the invention provides, wherein, such as Fig. 5
Shown, a kind of terminal 500 that fifth embodiment of the invention provides can include:
Extraction module 510,520 and first request module 530 of sending module.
Wherein, extraction module 510, the partial function of 520 and first request module 530 of sending module and the present invention the 4th are real
Apply example offer extraction module 410, sending module 420 as 430 function of the first request module, with fourth embodiment of the invention
Details are not described herein for identical function, in addition, the wearable device 500 of fifth embodiment of the invention is in fourth embodiment of the invention
Wearable device 400 on the basis of supplemented, details are as follows.
Optionally, in some possible embodiments of the present invention, the terminal 500 is additionally operable to:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message
It is responded including unauthorized;
Using the unauthorized response message generate identification log message, the identification log message include response and
The authentication key that the response carries;
Identification log is carried out using the identification log message.
Optionally, in some possible embodiments of the present invention, the extraction module 510 is specifically used for:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this
Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated
It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two
Parameter.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode
, judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response
The authentication key of carrying.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with
And Integrity Key (IK).
Above-mentioned register flow path is that is, when terminal is registered under first network connection status to IMS network, first to IMS nets
Network sends initial registration request, comprising terminal private user identity identification information in the registration request, due to IMS at this time not yet
The identity of terminal is authenticated, so IMS network responds initial registration request, returns to unauthorized response message to eventually
End, it is desirable that terminal carries out further authentication verification, after terminal receives the unauthorized response message, is responded using the unauthorized
Identification log message is generated, the response in the identification log message is recycled to be authenticated, then it is appreciated that can be direct
Identification log message is preserved, so as to carry out further identification log using identification log message, the step of initial registration can be saved
Suddenly, unauthorized response message can be also preserved, unauthorized response message generation identification log message is recycled, can equally save initial
The step of registration.
Optionally, in some possible embodiments of the present invention, the terminal further includes:
Suspend module 540, for suspending the work of the terminal first network AM access module, and ask multimedia
Grid discharges the first network communication link resources.
It is appreciated that when in terminal, under first network state switches to the second network state, terminal-pair IMS networks are noted
After volume success, terminal accesses IMS network using the second network communication link, can stop all of first network communication link
Work namely the work of pause terminal first network AM access module and IMS networks release first network communication link resources,
So as to save power consumption.
For example, after mobile phone switches to Wi-Fi network from LTE network, and mobile phone by Wi-Fi networks to IMS
Network registry success carries out, then mobile phone can suspend the access of its LTE network so as to which the IMS network of mobile phone can be based on Wi-Fi network
The work of module, and IMS network release LET network communication link resources, so as to economize on resources and power consumption.
Optionally, in some possible embodiments of the present invention, the terminal further includes:
Second request module 550, for asking the multi-media subsystem network switching core net associated session control money
Source.
It is appreciated that when terminal is switched to from first network state under the second network state, terminal-pair IMS network is registered
After work(, terminal accesses IMS network using the second network communication link, and IMS network is by itself and the relevant session control of IMS business
Resource switch processed carries out IMS business to the second network communication link so as to be based on the second network.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I-
CSCF, S-CSCF and the other and relevant resource of IMS business.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service
Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language
The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks
Switching.
Optionally, in some possible embodiments of the present invention, when first network is LTE, the second network can be
Wi-Fi or Wlan, so as to realize from VoLTE to VoWiFi or the switching of VoWlan.
Optionally, in other possible embodiments of the present invention, when first network is Wi-Fi, the second network
Can be LTE, so as to realize the switching from VoWiFi to VoLTE.
Optionally, in other possible embodiments of the present invention, when switching to VoWiFi from VoLTE, and can be with
VoLTE is switched to from VoWiFi in the same way, identification log message can also be to be carried out initially in VoLTE for the first time at this time
The identification log message preserved when registration and identification log.
It is understood that the function of each function module of the terminal 500 of the present embodiment can be according to above method embodiment
In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
As can be seen that in the scheme of the present embodiment, terminal 500 extracts authentication when being registered under first network connection status
Registration message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal 500
Switch to the second network connection state from the first network connection status, then terminal 500 using the identification log message to
The multi-media subsystem network sends authentication verification request, and the authentication verification asks to ask the IP multimedia subsystem, IMS
Network carries out authentication verification to the identification log message;If the authentication verification passes through, terminal 500 receives the multimedia
Subsystem network send confirmation message, and ask the multi-media subsystem network by the communication link information of the terminal from
First network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, thus
Identification log directly is carried out using the identification log message when being registered under the second network connection state, eliminates initial registration
Step, operating procedure greatly simplify, and also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
Referring to Fig. 6, Fig. 6 is a kind of structure diagram for terminal that sixth embodiment of the invention provides.As shown in Fig. 6, this
A kind of terminal 600 that invention sixth embodiment provides can include:At least one bus 601, be connected with bus it is at least one
Processor 602 and at least one processor 603 being connected with bus.
Wherein, processor 602 calls the code stored in memory 603 for extracting in the first net by bus 601
Under network connection status register when identification log message, the identification log message for terminal to multi-media subsystem network into
Row identification log;If the terminal switches to the second network connection state from the first network connection status, described in
Identification log message sends authentication verification request to the multi-media subsystem network, and the authentication verification request is for asking
It states multi-media subsystem network and authentication verification is carried out to the identification log message;If the authentication verification passes through, institute is received
The confirmation message of multi-media subsystem network transmission is stated, and asks the multi-media subsystem network by the communication chain of the terminal
Road information is updated to the second network from first network.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to
Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network
Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G
(the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into
During row network connection, then user mobile phone is in 4G network connection states.
Optionally, it is described to bet in the first network connection status in some possible embodiments of the present invention
During volume, the processor 602 is used for:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message
It is responded including unauthorized;
Using the unauthorized response message generate identification log message, the identification log message include response and
The authentication key that the response carries;
Identification log is carried out using the identification log message;
Identification log message when the extraction is registered under first network connection status, the processor 602 are used for:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this
Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated
It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two
Parameter.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode
, judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response
The authentication key of carrying.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with
And Integrity Key (IK).
Optionally, in some possible embodiments of the present invention, the processor 602 is additionally operable to:
Suspend the work of the terminal first network AM access module, and ask described in the multi-media subsystem network release
First network communication link resources.
Optionally, in some possible embodiments of the present invention, the processor 602 is additionally operable to:
Ask the multi-media subsystem network switching core net associated session control resource.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service
Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language
The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks
Switching.
It is understood that the function of each function module of the terminal 600 of the present embodiment can be according to above method embodiment
In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
As can be seen that in the scheme of the present embodiment, terminal 600 extracts authentication when being registered under first network connection status
Registration message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal 600
Switch to the second network connection state from the first network connection status, then terminal 600 using the identification log message to
The multi-media subsystem network sends authentication verification request, and the authentication verification asks to ask the IP multimedia subsystem, IMS
Network carries out authentication verification to the identification log message;If the authentication verification passes through, terminal 600 receives the multimedia
Subsystem network send confirmation message, and ask the multi-media subsystem network by the communication link information of the terminal from
First network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, thus
Identification log directly is carried out using the identification log message when being registered under the second network connection state, eliminates initial registration
Step, operating procedure greatly simplify, and also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching
The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process
Safety.
The embodiment of the present invention also provides a kind of computer storage media, wherein, which can be stored with journey
Sequence, the part or all of step including the method for switching network described in above method embodiment when which performs.
It should be noted that for aforementioned each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art should also know
It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of
Division of logic function, can there is an other dividing mode in actual implementation, such as multiple units or component can combine or can
To be integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit,
Can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit
The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing unit, also may be used
To be that each unit is individually physically present, can also two or more units integrate in a unit.It is above-mentioned integrated
The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially
The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products
It embodies, which is stored in a storage medium, is used including some instructions so that a computer
Equipment (can be personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or
Part steps.And aforementioned storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code
Medium.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before
Embodiment is stated the present invention is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding
The technical solution recorded in each embodiment is stated to modify or carry out equivalent replacement to which part technical characteristic;And these
Modification is replaced, the range for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of method for switching network, which is characterized in that the method includes:
Identification log message when being registered under first network connection status is extracted, the identification log message is for terminal to more
Media subsystem network carries out identification log, and the identification log message includes the authentication key that response carries;
If the terminal switches to the second network connection state from the first network connection status, the identification log is utilized
Message sends authentication verification request to the multi-media subsystem network, and the authentication verification asks to ask the multimedia
Subsystem network carries out authentication verification to the identification log message;
If the authentication verification passes through, the confirmation message that the multi-media subsystem network is sent is received, and ask described more
The communication link information of the terminal is updated to the second network by media subsystem network from first network.
2. according to the method described in claim 1, it is characterized in that, described register under the first network connection status, packet
It includes:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message includes
The certificate parameter that unauthorized responds and unauthorized response carries;
Identification log message is generated using the unauthorized response message, the identification log message includes response;
Identification log is carried out using the identification log message.
3. according to the method described in claim 2, it is characterized in that, described extract when being registered under first network connection status
Identification log message, including:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
4. according to any methods of claim 1-3, which is characterized in that if the authentication verification passes through, receive
The confirmation message that the multi-media subsystem network is sent, and ask communication of the multi-media subsystem network by the terminal
After first network is updated to the second network, the method further includes link information:
Suspend the work of the terminal first network AM access module, and ask the multi-media subsystem network release described first
Network communication link resource.
5. if according to the method described in claim 4, it is characterized in that, the authentication verification passes through, receive described more
The confirmation message that media subsystem network is sent, and the multi-media subsystem network is asked to believe the communication link of the terminal
After first network is updated to the second network, the method further includes breath:
Ask the multi-media subsystem network switching core net associated session control resource.
6. a kind of terminal, which is characterized in that the terminal includes:
Extraction module, for extracting identification log message when being registered under first network connection status, the identification log disappears
Breath carries out identification log for terminal to multi-media subsystem network, and the identification log message includes the mirror that response carries
Weigh key;
Sending module, if switching to the second network connection state from the first network connection status for the terminal, profit
Authentication verification is sent with the identification log message to the multi-media subsystem network to ask, the authentication verification request is used for
The multi-media subsystem network is asked to carry out authentication verification to the identification log message;
First request module if the authentication verification passes through, receives the confirmation message that the multi-media subsystem network is sent,
And ask the multi-media subsystem network that the communication link information of the terminal is updated to the second network from first network.
7. terminal according to claim 6, which is characterized in that the terminal is additionally operable to:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message includes
The certificate parameter that unauthorized responds and unauthorized response carries;
Identification log message is generated using the unauthorized response message, the identification log message includes response;
Identification log is carried out using the identification log message.
8. terminal according to claim 7, which is characterized in that the extraction module is used for:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
9. according to any terminals of claim 6-8, which is characterized in that the terminal further includes:
Suspend module, for suspending the work of the terminal first network AM access module, and ask the IP multimedia subsystem, IMS net
Network discharges the first network communication link resources.
10. terminal according to claim 9, which is characterized in that the terminal further includes:
Second request module, for asking the multi-media subsystem network switching core net associated session control resource.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510489642.7A CN105049442B (en) | 2015-08-11 | 2015-08-11 | A kind of method for switching network and terminal |
PCT/CN2015/091374 WO2017024671A1 (en) | 2015-08-11 | 2015-09-30 | Network switching method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510489642.7A CN105049442B (en) | 2015-08-11 | 2015-08-11 | A kind of method for switching network and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105049442A CN105049442A (en) | 2015-11-11 |
CN105049442B true CN105049442B (en) | 2018-06-15 |
Family
ID=54455653
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510489642.7A Active CN105049442B (en) | 2015-08-11 | 2015-08-11 | A kind of method for switching network and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105049442B (en) |
WO (1) | WO2017024671A1 (en) |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231332B (en) * | 2016-03-24 | 2020-09-25 | 华为技术有限公司 | Security policy determination method and device |
CN107529200B (en) * | 2016-06-21 | 2021-02-23 | 中兴通讯股份有限公司 | Method and device for releasing resources after network switching of terminal in VoLTE (Voice over Long term evolution) |
CN107529160B (en) * | 2016-06-21 | 2022-07-15 | 中兴通讯股份有限公司 | VoWiFi network access method and system, terminal and wireless access point equipment |
CN106658630B (en) * | 2016-06-30 | 2021-01-26 | 努比亚技术有限公司 | Communication terminal, base station, system and method |
CN107786975B (en) * | 2016-08-30 | 2022-05-13 | 中兴通讯股份有限公司 | Voice service registration method and device and mobile terminal |
WO2018152961A1 (en) * | 2017-02-22 | 2018-08-30 | 华为技术有限公司 | Information transmission method and device |
CN109104397A (en) * | 2017-06-21 | 2018-12-28 | 中兴通讯股份有限公司 | A kind of implementation method and terminal of adaptive access network |
CN109302728B (en) * | 2017-07-24 | 2020-10-20 | 展讯通信(上海)有限公司 | Call switching method and device, storage medium, base station and terminal |
CN110800334B (en) * | 2017-10-26 | 2022-11-15 | 深圳市欢太科技有限公司 | User equipment call detection method and related product |
US10791154B2 (en) * | 2018-02-01 | 2020-09-29 | Edgewater Networks, Inc. | Holding registration messages during communication session switching |
CN111314922B (en) * | 2020-02-21 | 2023-09-15 | 宇龙计算机通信科技(深圳)有限公司 | Method for releasing spectrum resources and related device |
CN111565388B (en) * | 2020-04-02 | 2023-09-19 | 维沃移动通信有限公司 | Network registration method and electronic equipment |
CN111669818B (en) * | 2020-06-03 | 2022-08-02 | 维沃移动通信有限公司 | Wi-Fi control method and device and electronic equipment |
CN112601224B (en) * | 2020-12-03 | 2023-02-10 | 海能达通信股份有限公司 | Call switching method, device and system |
CN112911554A (en) * | 2021-01-29 | 2021-06-04 | 中国联合网络通信集团有限公司 | Method, device and terminal for service fulfillment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175329A (en) * | 2007-11-02 | 2008-05-07 | 华为技术有限公司 | Cross-grouping domain switching method, system and device based on IP multimedia subsystem |
CN102056251A (en) * | 2009-11-04 | 2011-05-11 | 中国移动通信集团公司 | Network switching method and system and equipment adopting same |
CN101932057B (en) * | 2009-06-22 | 2013-08-28 | 华为技术有限公司 | Method, communication device and communication system of switching processing |
CN103458450A (en) * | 2009-06-22 | 2013-12-18 | 华为技术有限公司 | Switchover processing method, switchover processing communication device and communication system |
CN104038974A (en) * | 2014-06-11 | 2014-09-10 | 中国联合网络通信集团有限公司 | Method and device for processing voice service |
CN104185220A (en) * | 2013-05-22 | 2014-12-03 | 中国电信股份有限公司 | IMS (IP Multimedia Subsystem) core network equipment failure switching method and border access controller |
CN104519537A (en) * | 2014-12-31 | 2015-04-15 | 华为技术有限公司 | Communication method, user equipment and communication device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009009519A1 (en) * | 2007-07-09 | 2009-01-15 | Interdigital Technology Corporation | Method and apparatus for handover and session continuity using pre-registration tunneling procedure |
CN101478796B (en) * | 2009-01-20 | 2011-01-05 | 中国科学院计算技术研究所 | Hierarchical switching control signaling system for heterogeneous network and switching method thereof |
-
2015
- 2015-08-11 CN CN201510489642.7A patent/CN105049442B/en active Active
- 2015-09-30 WO PCT/CN2015/091374 patent/WO2017024671A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101175329A (en) * | 2007-11-02 | 2008-05-07 | 华为技术有限公司 | Cross-grouping domain switching method, system and device based on IP multimedia subsystem |
CN101932057B (en) * | 2009-06-22 | 2013-08-28 | 华为技术有限公司 | Method, communication device and communication system of switching processing |
CN103458450A (en) * | 2009-06-22 | 2013-12-18 | 华为技术有限公司 | Switchover processing method, switchover processing communication device and communication system |
CN102056251A (en) * | 2009-11-04 | 2011-05-11 | 中国移动通信集团公司 | Network switching method and system and equipment adopting same |
CN104185220A (en) * | 2013-05-22 | 2014-12-03 | 中国电信股份有限公司 | IMS (IP Multimedia Subsystem) core network equipment failure switching method and border access controller |
CN104038974A (en) * | 2014-06-11 | 2014-09-10 | 中国联合网络通信集团有限公司 | Method and device for processing voice service |
CN104519537A (en) * | 2014-12-31 | 2015-04-15 | 华为技术有限公司 | Communication method, user equipment and communication device |
Also Published As
Publication number | Publication date |
---|---|
CN105049442A (en) | 2015-11-11 |
WO2017024671A1 (en) | 2017-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105049442B (en) | A kind of method for switching network and terminal | |
JP5588017B2 (en) | Evolved packet system and emergency call attachment processing method | |
US10142305B2 (en) | Local security key generation | |
CN109561430A (en) | A kind of implementation method and equipment of public network user access private network | |
US11063990B2 (en) | Originating caller verification via insertion of an attestation parameter | |
CN105519028B (en) | A kind of wireless system connection control method and device | |
CN102111759A (en) | Authentication method, system and device | |
CN108901018A (en) | A kind of mobile communication system user identity hiding method that terminal is initiated | |
CN103987037A (en) | Secret communication implementation method and device | |
CN105100071B (en) | A kind of login method, apparatus and system | |
CN108683690A (en) | Method for authenticating, user equipment, authentication device, authentication server and storage medium | |
CN107104932A (en) | Key updating method, apparatus and system | |
CN108476212A (en) | Dynamic wlan connections | |
CN109691156A (en) | The enhanced gathering re-authentication of wireless device | |
CN103517383A (en) | A method and a device for the access of a mobile terminal to a household network | |
CN108616805A (en) | A kind of configuration of emergency numbers, acquisition methods and device | |
CN103155511A (en) | Connection control with b2bua located behind nat gateway | |
CN104753872A (en) | Authentication method, authentication platform, service platform, network elements and system | |
CN109982319A (en) | User authentication method, device, system, node, server and storage medium | |
CN100571130C (en) | A kind of general safety grade arranging method | |
CN105577634B (en) | A kind of processing method and user terminal of the failure of encrypted word connection setup | |
CN112788738A (en) | Code number processing method and device for public and private network convergence system | |
CN106210148A (en) | Real time phone call processing method and processing device | |
CN107343285A (en) | Management equipment and equipment management method | |
CN108668274A (en) | A kind of method and device for realizing VoLTE IMS registrations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |