CN105049442B - A kind of method for switching network and terminal - Google Patents

A kind of method for switching network and terminal Download PDF

Info

Publication number
CN105049442B
CN105049442B CN201510489642.7A CN201510489642A CN105049442B CN 105049442 B CN105049442 B CN 105049442B CN 201510489642 A CN201510489642 A CN 201510489642A CN 105049442 B CN105049442 B CN 105049442B
Authority
CN
China
Prior art keywords
network
terminal
identification log
message
media subsystem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510489642.7A
Other languages
Chinese (zh)
Other versions
CN105049442A (en
Inventor
张子敬
张晴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510489642.7A priority Critical patent/CN105049442B/en
Priority to PCT/CN2015/091374 priority patent/WO2017024671A1/en
Publication of CN105049442A publication Critical patent/CN105049442A/en
Application granted granted Critical
Publication of CN105049442B publication Critical patent/CN105049442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/14Reselecting a network or an air interface
    • H04W36/144Reselecting a network or an air interface over a different radio air interface technology
    • H04W36/1446Reselecting a network or an air interface over a different radio air interface technology wherein at least one of the networks is unlicensed

Abstract

The embodiment of the invention discloses a kind of method for switching network and terminal, the method, including:Extract identification log message when being registered under first network connection status;If the terminal switches to the second network connection state from the first network connection status, authentication verification is sent to the multi-media subsystem network using the identification log message and asked;If the authentication verification passes through, the confirmation message that the multi-media subsystem network is sent is received, and ask the multi-media subsystem network that the communication link information of the terminal is updated to the second network from first network.The embodiment of the present invention by be stored under first network connection status register when identification log message, during so as to be registered under the second network connection state directly identification log is carried out using the identification log message, the step of eliminating initial registration, operating procedure greatly simplifies, and also reduces the signaling traffic load registered during network switching.

Description

A kind of method for switching network and terminal
Technical field
The present invention relates to the communications fields, and in particular to a kind of method for switching network and terminal.
Background technology
IMS (IP Multimedia Subsystem, IP multimedia subsystem) is a kind of completely new multimedia service shape Formula, it disclosure satisfy that the demand of more novel, the more diversified multimedia service of present terminal client, VoLTE (Voice over Long Term Evolution, the speech business based on IMS) finger speech sound business framework is on carrier network, so as to run Quotient can provide the control and management of higher level for VoLTE, and (Voice over Wireless Fidelity lead to VoWiFi Cross Wi-Fi accesses IMS) refer to net access IMS using WiFi as access so as to fulfill IMS business.
With the development of the communication technology, wireless Wi-Fi using its cover more and more extensive and signal quality it is good the advantages of as Everybody is favored, so VoWiFi accesses the generally access shape for another IMS networks that IMS becomes other than VoLTE by Wi-Fi Formula.And currently in order to realizing the switching between VoLTE and VoWiFi, such as from VoLTE network switchings to VoWiFi networks, usually Using being nullified on VoLTE first, then re-registered on VoWiFi networks again, and since IMS network registration includes Two flows of initial registration and identification log, registration process is complicated, larger so as to be caused using such switching register method Signaling traffic load, complex steps when switching is registered.
Invention content
An embodiment of the present invention provides a kind of method for switching network and terminals, to terminal in network switching, reduce note The step of volume is to IMS network reduces signaling traffic load.
First aspect of the embodiment of the present invention provides a kind of method for switching network, including:
Identification log message when being registered under first network connection status is extracted, the identification log message is used for terminal Identification log is carried out to multi-media subsystem network;
If the terminal switches to the second network connection state from the first network connection status, the authentication is utilized Registration message sends authentication verification request to the multi-media subsystem network, and the authentication verification request is described more for asking Media subsystem network carries out authentication verification to the identification log message;
If the authentication verification passes through, the confirmation message that the multi-media subsystem network is sent is received, and ask institute It states multi-media subsystem network and the communication link information of the terminal is updated to the second network from first network.
Second aspect of the embodiment of the present invention provides a kind of terminal, including:
Extraction module, for extracting identification log message when being registered under first network connection status, the authentication note Volume message carries out identification log for terminal to multi-media subsystem network;
Sending module, if switching to the second network connection state from the first network connection status for the terminal, It then sends authentication verification to the multi-media subsystem network using the identification log message to ask, the authentication verification request For the multi-media subsystem network to be asked to carry out authentication verification to the identification log message;
First request module if the authentication verification passes through, receives the confirmation that the multi-media subsystem network is sent Message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to the second net from first network Network.
As can be seen that in technical solution provided in an embodiment of the present invention, terminal is extracted under first network connection status Identification log message during registration, the identification log message carry out identification log for terminal to multi-media subsystem network; If the terminal switches to the second network connection state from the first network connection status, the identification log message is utilized Authentication verification request is sent to the multi-media subsystem network, the authentication verification asks to ask the multimedia subsystem Network of uniting carries out authentication verification to the identification log message;If the authentication verification passes through, the multimedia subsystem is received It unites the confirmation message that network is sent, and asks the multi-media subsystem network by the communication link information of the terminal from first Network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, so as to the Identification log directly is carried out using the identification log message when being registered under two network connection states, eliminates the step of initial registration Suddenly, operating procedure greatly simplifies, and also reduces the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1-a are a kind of flow diagrams for method for switching network that first embodiment of the invention provides;
Fig. 1-b are the interaction flow signals of endpoint registration IMS network in method for switching network provided in an embodiment of the present invention Figure;
Fig. 1-c are network architecture diagrams provided in an embodiment of the present invention;
Fig. 2 is that second embodiment of the invention provides a kind of flow diagram of method for switching network;
Fig. 3 is a kind of flow diagram for method for switching network that third embodiment of the invention provides;
Fig. 4 is a kind of structure diagram for terminal that fourth embodiment of the invention provides;
Fig. 5 is a kind of structure diagram for terminal that fifth embodiment of the invention provides;
Fig. 6 is a kind of structure diagram for terminal that sixth embodiment of the invention provides.
Specific embodiment
An embodiment of the present invention provides a kind of method for switching network and terminals, to terminal in network switching, reduce note The step of volume is to IMS network reduces signaling traffic load.
In order to which those skilled in the art is made to more fully understand the present invention program, below in conjunction in the embodiment of the present invention The technical solution in the embodiment of the present invention is clearly and completely described in attached drawing, it is clear that described embodiment is only The embodiment of a part of the invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people Member's all other embodiments obtained without making creative work should all belong to the model that the present invention protects It encloses.
Term " first ", " second " and " third " in description and claims of this specification and above-mentioned attached drawing etc. is For distinguishing different objects, not for description particular order.In addition, term " comprising " and their any deformations, it is intended that It non-exclusive is included in covering.Such as process, method, system, product or the equipment for containing series of steps or unit do not have The step of having listed or unit are defined in, but optionally further includes the step of not listing or unit or optionally further includes For the intrinsic other steps of these processes, method, product or equipment or unit.
A kind of method for switching network of the embodiment of the present invention, a kind of method for switching network include:Extraction connects in first network Identification log message when being registered under state is connect, the identification log message is reflected for terminal to multi-media subsystem network Power registration;If the terminal switches to the second network connection state from the first network connection status, the authentication is utilized Registration message sends authentication verification request to the multi-media subsystem network, and the authentication verification request is described more for asking Media subsystem network carries out authentication verification to the identification log message;If the authentication verification passes through, receive described more The confirmation message that media subsystem network is sent, and the multi-media subsystem network is asked to believe the communication link of the terminal Breath is updated to the second network from first network.
It is a kind of method for switching network that first embodiment of the invention provides referring first to Fig. 1-a and Fig. 1-b, Fig. 1-a Flow diagram, Fig. 1-b are the interaction flows of endpoint registration IMS networks in method for switching network provided in an embodiment of the present invention Schematic diagram, Fig. 1-c are network architecture diagrams provided in an embodiment of the present invention.Wherein, as shown in Fig. 1-a, first embodiment of the invention A kind of method for switching network provided can include:
The identification log message of S101, extraction under first network connection status during registration, the identification log message are used In terminal identification log is carried out to multi-media subsystem network.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G (the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into During row network connection, then user mobile phone is in 4G network connection states.
Wherein, referring to Fig. 1-b and Fig. 1-c, it is to be appreciated that under normal circumstances, such as when the first registered ims network of terminal, Flow during endpoint registration IMS network includes initial registration and identification log.Initial registration procedure is sent out from terminal to IMS network The registration process risen, registration message will pass sequentially through eNodeB (Evolved Node B, base station), P-CSCF (Proxy Call Session Control Function, Proxy Call Session Control Function), I-CSCF (Interrogating CSCF, inquiry CSCF) retransmit to S-CSCF (Serving CSCF, serving CSCF), and pass through HSS (Home Subscriber Server, Home signature user server) authentication is carried out to it.Thus when terminal initiates registration request to IMS network, IMS network 401 unauthorizeds can be sent to respond and carry authentication verification parameter (RAND, AUTH) to terminal initiation challenge, terminal receives the sound Response and authentication key is calculated according to response progress Authentication Response parameter in Ying Houhui, initiates authentication note again later Volume flow;Identification log flow is that response and authentication key are sent to IMS network by terminal, completes to authenticate by IMS network And the process of key agreement, and return to the confirmation message 200 (OK) to succeed in registration.
Wherein, terminal sends the information that private user identity mark is carried in initial registration request message.Generally for For VoLTE user, private user identity mark is:Username@reaml, wherein, usename is the IMSI of user (International Mobile Subscriber Identification Number, international mobile subscriber identity) number Code, reaml is home network domain name.Such as:When the IMSI numbers of certain user:234150999999999, then privately owned user's body Part mark form be:234150999999999@ims.mnc015.mcc234.3gppnetwork.org, although terminal and It can (Authentication and Key Agreement, third generation mobile network be recognized by AKA between S-CSCF Card and key agreement protocol) security key negotiated of mechanism notes transmission being encrypted property of information and integrity protection Volume request message that is to say and be sent when security key is not yet negotiated due to being that terminal and S-CSCF do not communicate and send before , so what the message was sent not by any safeguard protection but with plaintext.
Wherein, identification log information refer to after initial registration, identification log it is previously stored for identification log Average information.
Optionally, the present invention other possible embodiments in, identification log information can be using 401 not Authorization response and its authentication verification parameter (RAND, AUTH) of carrying carry out the calculating of Authentication Response parameter according to certain rule The authentication key and response obtained afterwards, so as to after initial registration later identification log information is extracted, then in next time It can not need to carry out initial authentication to terminal again when registration, can directly carry out identification log.
It is appreciated that by extracting identification log information, then identification log information can be directly utilized in handover network Identification log is carried out, the step of so as to eliminate initial registration.
If S102, the terminal switch to the second network connection state from the first network connection status, institute is utilized It states identification log message and sends authentication verification request to the multi-media subsystem network, the authentication verification asks to ask The multi-media subsystem network carries out authentication verification to the identification log message.
Wherein, terminal switches to the second network connection state from first network connection status and refers to terminal from using the first net Network communication link carries out switching to the state for carrying out network communication using the second network communication link in the state of network communication, such as Communicated using 4G networks before terminal, then after the range of wireless Wi-Fi coverings is entered, terminal from original 4G nets Network communication switchs to carry out network communication using wireless Wi-Fi.
Optionally, in some possible embodiments of the present invention, identification log that terminal is sent to IP multimedia subsystem, IMS Information responds unauthorized response and the authentication key and response calculated using authentication verification parameter for terminal.
Wherein, authentication verification request refers to that terminal is asked in identification log to the authentication verification that IMS network is sent, request IMS network carries out authentication verification to the identification log information that terminal is sent.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone gets in wireless Wi-Fi coverings point, hand The connection network of machine switchs to Wi-Fi network from LTE network, for the access point using Wi-Fi network as IMS network, then sharp Authentication verification is sent with identification log message to IMS network to ask, request carries out authentication verification.
If S103, the authentication verification pass through, the confirmation message that the multi-media subsystem network is sent is received, and please Ask the multi-media subsystem network that the communication link information of the terminal is updated to the second network from first network.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed;
Communication link information refers to the network link to communicate between terminal and IMS network, can be mobile operator The network of offer can be accessed speech business namely the VoLTE that IMS network provides by LTE network, can also pass through Wi- at this time The speech business namely VoWiFi, the communication link information that Fi access IMS networks provide can also be other network links.
Optionally, in some possible embodiments of the present invention, when multi-media subsystem network is by the communication of terminal Link information is after first network is updated to the second network, then IMS network business is based on the second real-time performance.
Optionally, in some possible embodiments of the present invention, after communication link changes, IMS network update is eventually The IP address at end etc. and the relevant information of communication link.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone is got in, the connection network of mobile phone from LTE network switchs to Wi-Fi network, in order to as the access point of IMS networks, then utilize identification log message using Wi-Fi network To IMS network send authentication verification request, request carry out authentication verification, when authentication verification by after, IMS network to terminal send 200 confirmation messages illustrate the identification log success based on wireless Wi-Fi, and the IMS network of terminal can be based on wireless Wi-Fi and carry out, So as to which IMS networks are by IP address of more new terminal etc. and the relevant information of communication link, such as by the IP address of terminal from LTE nets The IP address of network is updated to the IP address of wireless Wi-Fi.
As can be seen that in the scheme of the present embodiment, authentication note when terminal extraction is registered under first network connection status Volume message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal is from institute It states first network connection status and switches to the second network connection state, then it is sub to the multimedia using the identification log message Grid sends authentication verification request, and the authentication verification asks to ask the multi-media subsystem network to the mirror It weighs registration message and carries out authentication verification;If the authentication verification passes through, receive the multi-media subsystem network and send really Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network Network.By the identification log message being stored in when being registered under first network connection status, so as in the second network connection state The step of directly carrying out identification log using the identification log message during lower registration, eliminating initial registration, operating procedure is significantly Simplify, also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
Optionally, it is described to bet in the first network connection status in some possible embodiments of the present invention Volume, including:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message The certificate parameter carried including unauthorized response and unauthorized response;
Identification log message is generated using the unauthorized response message, the identification log message includes response;
Identification log is carried out using the identification log message.Optionally, in some possible embodiments of the present invention In, the identification log message when extraction is registered under first network connection status, including:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two Parameter.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode , judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response The authentication key of carrying.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with And Integrity Key (IK).
Above-mentioned register flow path is that is, when terminal is registered under first network connection status to IMS network, first to IMS nets Network sends initial registration request, comprising terminal private user identity identification information in the registration request, due to IMS at this time not yet The identity of terminal is authenticated, so IMS network responds initial registration request, returns to unauthorized response message to eventually End, it is desirable that terminal carries out further authentication verification, after terminal receives the unauthorized response message, is responded using the unauthorized Identification log message is generated, the response in the identification log message is recycled to be authenticated, then it is appreciated that can be direct Identification log message is preserved, so as to carry out further identification log using identification log message, the step of initial registration can be saved Suddenly, unauthorized response message can be also preserved, unauthorized response message generation identification log message is recycled, can equally save initial The step of registration.
Optionally, in some possible embodiments of the present invention, if the authentication verification passes through, institute is received The confirmation message of multi-media subsystem network transmission is stated, and asks the multi-media subsystem network by the communication chain of the terminal After first network is updated to the second network, the method further includes road information:
Suspend the work of the terminal first network AM access module, and ask described in the multi-media subsystem network release First network communication link resources.
It is appreciated that when in terminal, under first network state switches to the second network state, terminal-pair IMS networks are noted After volume success, terminal accesses IMS network using the second network communication link, can stop all of first network communication link Work namely the work of pause terminal first network AM access module and IMS networks release first network communication link resources, So as to save power consumption.
For example, after mobile phone switches to Wi-Fi network from LTE network, and mobile phone by Wi-Fi networks to IMS Network registry success carries out, then mobile phone can suspend the access of its LTE network so as to which the IMS network of mobile phone can be based on Wi-Fi network The work of module, and IMS network release LET network communication link resources, so as to economize on resources and power consumption.
Optionally, in some possible embodiments of the present invention, if the authentication verification passes through, institute is received The confirmation message of multi-media subsystem network transmission is stated, and asks the multi-media subsystem network by the communication chain of the terminal After first network is updated to the second network, the method further includes road information:
Ask the multi-media subsystem network switching core net associated session control resource.
It is appreciated that when terminal is switched to from first network state under the second network state, terminal-pair IMS network is registered After work(, terminal accesses IMS network using the second network communication link, and IMS network is by itself and the relevant session control of IMS business Resource switch processed carries out IMS business to the second network communication link so as to be based on the second network.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I- CSCF, S-CSCF and the other and relevant resource of IMS business.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks Switching.
Optionally, in some possible embodiments of the present invention, when first network is LTE, the second network can be Wi-Fi or Wlan, so as to realize from VoLTE to VoWiFi or the switching of VoWlan.
Optionally, in other possible embodiments of the present invention, when first network is Wi-Fi, the second network Can be LTE, so as to realize the switching from VoWiFi to VoLTE.
Optionally, in other possible embodiments of the present invention, when switching to VoWiFi from VoLTE, and can be with VoLTE is switched to from VoWiFi in the same way, identification log message can also be to be carried out initially in VoLTE for the first time at this time The identification log message preserved when registration and identification log.
For the ease of being best understood from and implementing the said program of the embodiment of the present invention, with reference to some specific applied fields Scape is illustrated.
Fig. 2 is referred to, Fig. 2 is that second embodiment of the invention provides a kind of flow diagram of method for switching network, wherein, It can include as shown in Fig. 2, second embodiment of the invention provides a kind of method for switching network:
S201, under first network connection status, terminal to multi-media subsystem network send initial registration request.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G (the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into During row network connection, then user mobile phone is in 4G network connection states.
Wherein, referring to Fig. 1-b, it is to be appreciated that under normal circumstances, such as when the first registered ims network of terminal, endpoint registration Flow during IMS network includes initial registration and identification log.Initial registration procedure is the registration initiated from terminal to IMS network Process, registration message will pass sequentially through eNodeB (Evolved Node B, base station), P-CSCF (Proxy Call Session Control Function, Proxy Call Session Control Function), I-CSCF (Interrogating CSCF, inquire CSCF) again Be sent to S-CSCF (Serving CSCF, serving CSCF), due at this time there are no carry out authentication, so when terminal to When IMS network initiates registration request, IMS network can send 401 unauthorizeds and respond and carry authentication verification parameter (RAND, AUTH) It initiates to challenge to terminal, terminal can be rung after receiving the response according to the response that is calculated of response progress Authentication Response parameter Should and authentication key, initiate identification log flow again later;Identification log flow is that terminal sends out response and authentication key IMS network is given, authentication and the process of key agreement are completed, and return to the confirmation message 200 to succeed in registration by IMS network (OK)。
Wherein, initial registration request refers to carry privately owned user to what IMS network was sent when terminal carries out initial registration The information of identity.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network VoLTE then sends initial registration request to IMS network.
S202, the unauthorized response message that multi-media subsystem network returns is received, wherein, unauthorized response message includes The certificate parameter that unauthorized responds and unauthorized response carries.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two Parameter.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time, So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that terminal carries out further Authentication verification.
S203, identification log message is generated using unauthorized response message, identification log message includes response.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode , judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response The authentication key of carrying
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with And Integrity Key (IK).
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time, So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that terminal carries out further Authentication verification, so as to terminal using unauthorized response message generate identification log message.
S204, identification log is carried out using identification log message.
Optionally, in some possible embodiments of the present invention, terminal carries out authentication note using identification log message During volume, terminal sends identification log message to IMS network, and IMS network carries out authentication verification to the identification log message, works as verification Pass through, IMS returns to confirmation message, and identification log is completed.
It is appreciated that after identification log message is generated, then identification log can be carried out using the identification log message, from And complete registration of the terminal to IMS network.
The identification log message of S205, extraction under first network connection status during registration.
Wherein, identification log message carries out identification log for terminal to multi-media subsystem network.
Wherein, identification log information refer to after initial registration, identification log it is previously stored for identification log Average information.
Optionally, the present invention other possible embodiments in, identification log message can be using 401 not Authorization response and its authentication verification parameter (RAND, AUTH) of carrying carry out the calculating of Authentication Response parameter according to certain rule The authentication key and response obtained afterwards, so as to after initial registration later identification log information is extracted, then in next time It can not need to carry out initial authentication to terminal again when registration, can directly carry out identification log.
Optionally, it in some possible embodiments of the present invention, extracts when being registered under first network connection status Identification log message, including:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
It is appreciated that by extracting identification log information, then identification log information can be directly utilized in handover network Identification log is carried out, the step of so as to eliminate initial registration.
If S206, terminal switch to the second network connection state from the first network connection status, authentication note is utilized Volume message sends authentication verification request to multi-media subsystem network, and the authentication verification asks to ask IP multimedia subsystem, IMS Network carries out authentication verification to identification log message.
Wherein, terminal switches to the second network connection state from first network connection status and refers to terminal from using the first net Network communication link carries out switching to the state for carrying out network communication using the second network communication link in the state of network communication, such as Communicated using 4G networks before terminal, then after the range of wireless Wi-Fi coverings is entered, terminal from original 4G nets Network communication switchs to carry out network communication using wireless Wi-Fi.
Wherein, authentication verification request refers to that terminal is asked in identification log to the authentication verification that IMS network is sent, request IMS network carries out authentication verification to the identification log information that terminal is sent.
Optionally, in some possible embodiments of the present invention, identification log that terminal is sent to IP multimedia subsystem, IMS Information responds unauthorized response and the authentication key and response calculated using authentication verification parameter for terminal.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks Switching.
Optionally, in some possible embodiments of the present invention, when first network is LTE, the second network can be Wi-Fi or Wlan, so as to realize from VoLTE to VoWiFi or the switching of VoWlan.
Optionally, in other possible embodiments of the present invention, when first network is Wi-Fi, the second network Can be LTE, so as to realize the switching from VoWiFi to VoLTE.
Optionally, in other possible embodiments of the present invention, when switching to VoWiFi from VoLTE, and can be with VoLTE is switched to from VoWiFi in the same way, identification log message can also be to be carried out initially in VoLTE for the first time at this time The identification log message preserved when registration and identification log.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone gets in wireless Wi-Fi coverings point, hand The connection network of machine switchs to Wi-Fi network from LTE network, for the access point using Wi-Fi network as IMS network, then sharp Authentication verification is sent with identification log message to IMS network to ask, request carries out authentication verification.
If S207, authentication verification pass through, the confirmation message of multi-media subsystem network transmission is received, and asks multimedia The communication link information of terminal is updated to the second network by subsystem network from first network.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed;
Communication link information refers to the network link to communicate between terminal and IMS network, can be mobile operator The network of offer can be accessed speech business namely the VoLTE that IMS network provides by LTE network, can also pass through Wi- at this time The speech business namely VoWiFi, the communication link information that Fi access IMS networks provide can also be other network links.
Optionally, in some possible embodiments of the present invention, when multi-media subsystem network is by the communication of terminal Link information is after first network is updated to the second network, then IMS network business is based on the second real-time performance.
Optionally, in some possible embodiments of the present invention, after communication link changes, IMS network update is eventually The IP address at end etc. and the relevant information of communication link.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone is got in, the connection network of mobile phone from LTE network switchs to Wi-Fi network, in order to as the access point of IMS networks, then utilize identification log message using Wi-Fi network To IMS network send authentication verification request, request carry out authentication verification, when authentication verification by after, IMS network to terminal send 200 confirmation messages illustrate the identification log success based on wireless Wi-Fi, and the IMS network of terminal can be based on wireless Wi-Fi and carry out, So as to which IMS networks are by IP address of more new terminal etc. and the relevant information of communication link, such as by the IP address of terminal from LTE nets The IP address of network is updated to the IP address of wireless Wi-Fi.
S208, request multi-media subsystem network switching core net associated session control resource.
It is appreciated that when terminal is switched to from first network state under the second network state, terminal-pair IMS network is registered After work(, terminal accesses IMS network using the second network communication link, and IMS network is by itself and the relevant session control of IMS business Resource switch processed carries out IMS business to the second network communication link so as to be based on the second network.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I- CSCF, S-CSCF and the other and relevant resource of IMS business.
S209, the work for suspending terminal first network AM access module, and multi-media subsystem network is asked to discharge the first net Network communication link resources.
It is appreciated that when in terminal, under first network state switches to the second network state, terminal-pair IMS networks are noted After volume success, terminal accesses IMS network using the second network communication link, can stop all of first network communication link Work namely the work of pause terminal first network AM access module and IMS networks release first network communication link resources, So as to save power consumption.
For example, after mobile phone switches to Wi-Fi network from LTE network, and mobile phone by Wi-Fi networks to IMS Network registry success carries out, then mobile phone can suspend the access of its LTE network so as to which the IMS network of mobile phone can be based on Wi-Fi network The work of module, and IMS network release LET network communication link resources, so as to economize on resources and power consumption.
As can be seen that in the scheme of the present embodiment, authentication note when terminal extraction is registered under first network connection status Volume message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal is from institute It states first network connection status and switches to the second network connection state, then it is sub to the multimedia using the identification log message Grid sends authentication verification request, and the authentication verification asks to ask the multi-media subsystem network to the mirror It weighs registration message and carries out authentication verification;If the authentication verification passes through, receive the multi-media subsystem network and send really Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network Network.By the identification log message being stored in when being registered under first network connection status, so as in the second network connection state The step of directly carrying out identification log using the identification log message during lower registration, eliminating initial registration, operating procedure is significantly Simplify, also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
For a better understanding of the present invention with the said program of the implementation embodiment of the present invention, lifted in a manner of interactive again below Embodiment illustrates, and refers to Fig. 3, and Fig. 3 is that a kind of flow for method for switching network that third embodiment of the invention provides is shown It is intended to, wherein, as shown in figure 3, a kind of network switching that the third embodiment of the present invention provides can include:
S301, under first network connection status, terminal to multi-media subsystem network send initial registration request.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network VoLTE, then mobile phone terminal to IMS network send initial registration request.
S302, terminal receive the unauthorized response message that multi-media subsystem network returns.
Wherein, unauthorized response message includes the certificate parameter that unauthorized responds and unauthorized response carries.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two Parameter.
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time, So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that mobile phone terminal is into traveling The authentication verification of one step.
S303, terminal generate identification log message using unauthorized response message.
Wherein, identification log message includes the authentication key that response and response carry.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response The authentication key of carrying.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode , judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with And Integrity Key (IK).
For example, in some possible embodiments of the present invention, when user mobile phone needs to register under LTE network VoLTE then sends initial registration request to IMS network, since IMS network is not yet authenticated the identity of terminal at this time, So IMS network responds initial registration request, unauthorized response message is returned to terminal, it is desirable that mobile phone terminal is into traveling The authentication verification of one step, so as to which mobile phone terminal generates identification log message using unauthorized response message.
S304, terminal carry out identification log using identification log message.
Optionally, in some possible embodiments of the present invention, terminal carries out authentication note using identification log message During volume, terminal sends identification log message to IMS network, and IMS network carries out authentication verification to the identification log message, works as verification Pass through, IMS returns to confirmation message, and identification log is completed.
For example, in some possible embodiments of the present invention, when mobile phone terminal utilizes unauthorized response generation After identification log message, which is sent to IMS network by LTE, IMS network to the identification log message into Row authentication verification, when being verified, IMS returns to confirmation message, and identification log is completed, that is, realizes VoLTE.
The identification log message of S305, terminal extraction under first network connection status during registration.
Wherein, identification log message carries out identification log for terminal to multi-media subsystem network.
Optionally, it in some possible embodiments of the present invention, extracts when being registered under first network connection status Identification log message, including:
Unauthorized response message is preserved, and the identification log message is generated using unauthorized response message;
Or, preserve identification log message.
For example, in some possible embodiments of the present invention, it is other in order to be switched in next network from LTE Initial registration step is saved during network, mobile phone terminal extracts the identification log message during aforementioned registration step, so as to rear After continuous network switching directly identification log can be carried out using the identification log message.
If S306, terminal switch to the second network connection state from first network connection status, disappeared using identification log It ceases to multi-media subsystem network and sends authentication verification request.
Wherein, authentication verification asks that multi-media subsystem network is asked to carry out authentication verification to identification log message.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
For example, in some possible embodiments of the present invention, when mobile phone switches to Wi- from LTE network connection During Fi network connections, mobile phone is sent to IMS network using the identification log message extracted by Wi-Fi network, asks IMS Network is to its authentication verification.
If S307, authentication verification pass through, terminal receives the confirmation message that multi-media subsystem network is sent.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed.
For example, in some possible embodiments of the present invention, mobile phone utilizes the identification log message extracted IMS network is sent to by Wi-Fi network, request IMS network is to its authentication verification, so as to which IMS networks believe the identification log Breath carries out authentication verification, and after being verified, IMS network sends confirmation message to mobile phone, so as to which mobile phone receives IMS network hair The confirmation message sent, so as to complete identification log.
The communication link information of terminal is updated to the second network by S308, multi-media subsystem network from first network.
For example, in some possible embodiments of the present invention, when authentication verification of the mobile phone based on Wi-Fi network By rear, then illustrate that the IMS business of mobile phone can be based on Wi-Fi network and realize, so as to which IMS network is by the communication link of more new terminal Information, such as the IP address of terminal and the relevant information of communication link, such as by the IP address of terminal from the IP address of LTE network more Newly to the IP address of wireless Wi-Fi, so as to ensure that VoWiFi business works normally.
S309, multi-media subsystem network switching core net associated session control resource.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I- CSCF, S-CSCF and the other and relevant resource of IMS business.
For example, in some possible embodiments of the present invention, after mobile phone switches to VoWiFi from VoLTE, IMS network switches core net session control resource with network-related resources from LTE cables to wireless Wi-Fi network, so as to ensure VoWiFi business works normally.
S310, multi-media subsystem network release first network communication link resources.
For example, in some possible embodiments of the present invention, after mobile phone switches to VoWiFi from VoLTE, IMS network discharges LTE network communication link resources, so as to save power consumption.
It is to be appreciated that step S309 and step S310 do not have stringent priority to perform sequence.
S311, the work of terminal pause first network AM access module.
For example, in some possible embodiments of the present invention, after mobile phone switches to VoWiFi from VoLTE, Mobile phone suspends the work of LTE network AM access module, thus so as to save mobile telephone power consumption.
As can be seen that in the scheme of the present embodiment, authentication note when terminal extraction is registered under first network connection status Volume message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal is from institute It states first network connection status and switches to the second network connection state, then it is sub to the multimedia using the identification log message Grid sends authentication verification request, and the authentication verification asks to ask the multi-media subsystem network to the mirror It weighs registration message and carries out authentication verification;If the authentication verification passes through, receive the multi-media subsystem network and send really Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network Network.By the identification log message being stored in when being registered under first network connection status, so as in the second network connection state The step of directly carrying out identification log using the identification log message during lower registration, eliminating initial registration, operating procedure is significantly Simplify, also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
The embodiment of the present invention also provides terminal, which includes:
Extraction module, for extracting identification log message when being registered under first network connection status, the authentication note Volume message carries out identification log for terminal to multi-media subsystem network;
Sending module, if switching to the second network connection state from the first network connection status for the terminal, It then sends authentication verification to the multi-media subsystem network using the identification log message to ask, the authentication verification request For the multi-media subsystem network to be asked to carry out authentication verification to the identification log message;
First request module if the authentication verification passes through, receives the confirmation that the multi-media subsystem network is sent Message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to the second net from first network Network.
Specifically, referring to Fig. 4, Fig. 4 is a kind of structure diagram for terminal that fourth embodiment of the invention provides, In, as shown in figure 4, a kind of terminal 400 that fourth embodiment of the invention provides can include:
Extraction module 410,420 and first request module 430 of sending module.
Wherein, extraction module 410, for extracting identification log message when being registered under first network connection status, institute It states identification log message and carries out identification log to multi-media subsystem network for terminal.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G (the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into During row network connection, then user mobile phone is in 4G network connection states.
Wherein, referring to Fig. 1-b, it is to be appreciated that under normal circumstances, such as when the first registered ims network of terminal, endpoint registration Flow during IMS network includes initial registration and identification log.Initial registration procedure is the registration initiated from terminal to IMS network Process, registration message will pass sequentially through eNodeB (Evolved Node B, base station), P-CSCF (Proxy Call Session Control Function, Proxy Call Session Control Function), I-CSCF (Interrogating CSCF, inquire CSCF) again S-CSCF (Serving CSCF, serving CSCF) is sent to, and passes through HSS (Home Subscriber Server, ownership signing Client server) authentication is carried out to it.So as to which when terminal initiates registration request to IMS network, IMS network can be sent 401 unauthorizeds respond and carry authentication verification parameter (RAND, AUTH) and initiate to challenge to terminal, after terminal receives the response Authentication Response parameter can be carried out according to the response is calculated response and authentication key, initiates identification log stream again later Journey;Identification log flow is that response and authentication key are sent to IMS network by terminal, completes to authenticate by IMS network and close The process that key is negotiated, and return to the confirmation message 200 (OK) to succeed in registration.
Wherein, terminal sends the information that private user identity mark is carried in initial registration request message.Generally for For VoLTE user, private user identity mark is:Username@reaml, wherein, usename is the IMSI of user (International Mobile Subscriber Identification Number, international mobile subscriber identity) number Code, reaml is home network domain name.Such as:When the IMSI numbers of certain user:234150999999999, then privately owned user's body Part mark form be:234150999999999@ims.mnc015.mcc234.3gppnetwork.org, although terminal and It can (Authentication and Key Agreement, third generation mobile network be recognized by AKA between S-CSCF Card and key agreement protocol) security key negotiated of mechanism notes transmission being encrypted property of information and integrity protection Volume request message that is to say and be sent when security key is not yet negotiated due to being that terminal and S-CSCF do not communicate and send before , so what the message was sent not by any safeguard protection but with plaintext.
Wherein, identification log information refer to after initial registration, identification log it is previously stored for identification log Average information.
Optionally, the present invention other possible embodiments in, identification log information can be using 401 not Authorization response and its authentication verification parameter (RAND, AUTH) of carrying carry out the calculating of Authentication Response parameter according to certain rule The authentication key and response obtained afterwards, so as to after initial registration later identification log information is extracted, then in next time It can not need to carry out initial authentication to terminal again when registration, can directly carry out identification log.
It is appreciated that by extracting identification log information, then identification log information can be directly utilized in handover network Identification log is carried out, the step of so as to eliminate initial registration.
Sending module 420, if switching to the second network connection shape from the first network connection status for the terminal State then sends authentication verification to the multi-media subsystem network using the identification log message and asks, the authentication verification It asks that the multi-media subsystem network is asked to carry out authentication verification to the identification log message.
Wherein, terminal switches to the second network connection state from first network connection status and refers to terminal from using the first net Network communication link carries out switching to the state for carrying out network communication using the second network communication link in the state of network communication, such as Communicated using 4G networks before terminal, then after the range of wireless Wi-Fi coverings is entered, terminal from original 4G nets Network communication switchs to carry out network communication using wireless Wi-Fi.
Optionally, in some possible embodiments of the present invention, identification log that terminal is sent to IP multimedia subsystem, IMS Information responds unauthorized response and the authentication key and response calculated using authentication verification parameter for terminal.
Wherein, authentication verification request refers to that terminal is asked in identification log to the authentication verification that IMS network is sent, request IMS network carries out authentication verification to the identification log information that terminal is sent.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone gets in wireless Wi-Fi coverings point, hand The connection network of machine switchs to Wi-Fi network from LTE network, for the access point using Wi-Fi network as IMS network, then sharp Authentication verification is sent with identification log message to IMS network to ask, request carries out authentication verification.
First request module 430 if the authentication verification passes through, receives the multi-media subsystem network and sends really Recognize message, and ask the multi-media subsystem network that the communication link information of the terminal is updated to second from first network Network.
Wherein, confirmation message refer to when IMS network to identification log information carry out authentication verification and by after, to terminal The confirmation message of transmission, for terminal authentication verification to be notified to pass through, identification log is completed;
Communication link information refers to the network link to communicate between terminal and IMS network, can be mobile operator The network of offer can be accessed speech business namely the VoLTE that IMS network provides by LTE network, can also pass through Wi- at this time The speech business namely VoWiFi, the communication link information that Fi access IMS networks provide can also be other network links.
Optionally, in some possible embodiments of the present invention, when multi-media subsystem network is by the communication of terminal Link information is after first network is updated to the second network, then IMS network business is based on the second real-time performance.
Optionally, in some possible embodiments of the present invention, after communication link changes, IMS network update is eventually The IP address at end etc. and the relevant information of communication link.
For example, the present invention some possible embodiments in, when first network be LTE network, the second network During for wireless Wi-Fi, mobile phone uses LTE network at outdoor, after mobile phone is got in, the connection network of mobile phone from LTE network switchs to Wi-Fi network, in order to as the access point of IMS networks, then utilize identification log message using Wi-Fi network To IMS network send authentication verification request, request carry out authentication verification, when authentication verification by after, IMS network to terminal send 200 confirmation messages illustrate the identification log success based on wireless Wi-Fi, and the IMS network of terminal can be based on wireless Wi-Fi and carry out, So as to which IMS networks are by IP address of more new terminal etc. and the relevant information of communication link, such as by the IP address of terminal from LTE nets The IP address of network is updated to the IP address of wireless Wi-Fi.
It is understood that the function of each function module of the terminal 400 of the present embodiment can be according to above method embodiment In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
As can be seen that in the scheme of the present embodiment, terminal 400 extracts authentication when being registered under first network connection status Registration message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal 400 Switch to the second network connection state from the first network connection status, then terminal 400 using the identification log message to The multi-media subsystem network sends authentication verification request, and the authentication verification asks to ask the IP multimedia subsystem, IMS Network carries out authentication verification to the identification log message;If the authentication verification passes through, terminal 400 receives the multimedia Subsystem network send confirmation message, and ask the multi-media subsystem network by the communication link information of the terminal from First network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, thus Identification log directly is carried out using the identification log message when being registered under the second network connection state, eliminates initial registration Step, operating procedure greatly simplify, and also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
Fig. 5 is referred to, Fig. 5 is a kind of structure diagram for terminal that fifth embodiment of the invention provides, wherein, such as Fig. 5 Shown, a kind of terminal 500 that fifth embodiment of the invention provides can include:
Extraction module 510,520 and first request module 530 of sending module.
Wherein, extraction module 510, the partial function of 520 and first request module 530 of sending module and the present invention the 4th are real Apply example offer extraction module 410, sending module 420 as 430 function of the first request module, with fourth embodiment of the invention Details are not described herein for identical function, in addition, the wearable device 500 of fifth embodiment of the invention is in fourth embodiment of the invention Wearable device 400 on the basis of supplemented, details are as follows.
Optionally, in some possible embodiments of the present invention, the terminal 500 is additionally operable to:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message It is responded including unauthorized;
Using the unauthorized response message generate identification log message, the identification log message include response and The authentication key that the response carries;
Identification log is carried out using the identification log message.
Optionally, in some possible embodiments of the present invention, the extraction module 510 is specifically used for:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two Parameter.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode , judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response The authentication key of carrying.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with And Integrity Key (IK).
Above-mentioned register flow path is that is, when terminal is registered under first network connection status to IMS network, first to IMS nets Network sends initial registration request, comprising terminal private user identity identification information in the registration request, due to IMS at this time not yet The identity of terminal is authenticated, so IMS network responds initial registration request, returns to unauthorized response message to eventually End, it is desirable that terminal carries out further authentication verification, after terminal receives the unauthorized response message, is responded using the unauthorized Identification log message is generated, the response in the identification log message is recycled to be authenticated, then it is appreciated that can be direct Identification log message is preserved, so as to carry out further identification log using identification log message, the step of initial registration can be saved Suddenly, unauthorized response message can be also preserved, unauthorized response message generation identification log message is recycled, can equally save initial The step of registration.
Optionally, in some possible embodiments of the present invention, the terminal further includes:
Suspend module 540, for suspending the work of the terminal first network AM access module, and ask multimedia Grid discharges the first network communication link resources.
It is appreciated that when in terminal, under first network state switches to the second network state, terminal-pair IMS networks are noted After volume success, terminal accesses IMS network using the second network communication link, can stop all of first network communication link Work namely the work of pause terminal first network AM access module and IMS networks release first network communication link resources, So as to save power consumption.
For example, after mobile phone switches to Wi-Fi network from LTE network, and mobile phone by Wi-Fi networks to IMS Network registry success carries out, then mobile phone can suspend the access of its LTE network so as to which the IMS network of mobile phone can be based on Wi-Fi network The work of module, and IMS network release LET network communication link resources, so as to economize on resources and power consumption.
Optionally, in some possible embodiments of the present invention, the terminal further includes:
Second request module 550, for asking the multi-media subsystem network switching core net associated session control money Source.
It is appreciated that when terminal is switched to from first network state under the second network state, terminal-pair IMS network is registered After work(, terminal accesses IMS network using the second network communication link, and IMS network is by itself and the relevant session control of IMS business Resource switch processed carries out IMS business to the second network communication link so as to be based on the second network.
Optionally, in some possible embodiments of the present invention, core net associated session control resource includes I- CSCF, S-CSCF and the other and relevant resource of IMS business.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks Switching.
Optionally, in some possible embodiments of the present invention, when first network is LTE, the second network can be Wi-Fi or Wlan, so as to realize from VoLTE to VoWiFi or the switching of VoWlan.
Optionally, in other possible embodiments of the present invention, when first network is Wi-Fi, the second network Can be LTE, so as to realize the switching from VoWiFi to VoLTE.
Optionally, in other possible embodiments of the present invention, when switching to VoWiFi from VoLTE, and can be with VoLTE is switched to from VoWiFi in the same way, identification log message can also be to be carried out initially in VoLTE for the first time at this time The identification log message preserved when registration and identification log.
It is understood that the function of each function module of the terminal 500 of the present embodiment can be according to above method embodiment In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
As can be seen that in the scheme of the present embodiment, terminal 500 extracts authentication when being registered under first network connection status Registration message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal 500 Switch to the second network connection state from the first network connection status, then terminal 500 using the identification log message to The multi-media subsystem network sends authentication verification request, and the authentication verification asks to ask the IP multimedia subsystem, IMS Network carries out authentication verification to the identification log message;If the authentication verification passes through, terminal 500 receives the multimedia Subsystem network send confirmation message, and ask the multi-media subsystem network by the communication link information of the terminal from First network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, thus Identification log directly is carried out using the identification log message when being registered under the second network connection state, eliminates initial registration Step, operating procedure greatly simplify, and also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
Referring to Fig. 6, Fig. 6 is a kind of structure diagram for terminal that sixth embodiment of the invention provides.As shown in Fig. 6, this A kind of terminal 600 that invention sixth embodiment provides can include:At least one bus 601, be connected with bus it is at least one Processor 602 and at least one processor 603 being connected with bus.
Wherein, processor 602 calls the code stored in memory 603 for extracting in the first net by bus 601 Under network connection status register when identification log message, the identification log message for terminal to multi-media subsystem network into Row identification log;If the terminal switches to the second network connection state from the first network connection status, described in Identification log message sends authentication verification request to the multi-media subsystem network, and the authentication verification request is for asking It states multi-media subsystem network and authentication verification is carried out to the identification log message;If the authentication verification passes through, institute is received The confirmation message of multi-media subsystem network transmission is stated, and asks the multi-media subsystem network by the communication chain of the terminal Road information is updated to the second network from first network.
Wherein, first network connection status refer to terminal it is currently used be first network communication link realize network lead to Letter, terminal refer to the terminal with network connecting function, can be UE (user equipment) terminals or carry wireless network Interface card (Station, STA) terminal, such as mobile phone, tablet computer, multimedia equipment, for example, when user mobile phone uses 4G (the 4th Generation mobile communication technology, fourth generation mobile communication technology) network into During row network connection, then user mobile phone is in 4G network connection states.
Optionally, it is described to bet in the first network connection status in some possible embodiments of the present invention During volume, the processor 602 is used for:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message It is responded including unauthorized;
Using the unauthorized response message generate identification log message, the identification log message include response and The authentication key that the response carries;
Identification log is carried out using the identification log message;
Identification log message when the extraction is registered under first network connection status, the processor 602 are used for:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
Wherein, the certificate parameter that unauthorized response carries is sent to terminal for IMS network, for terminal to be allowed to be tested using this Card parameter generates identification log message, then the calculating of the identification log message is verified by IMS network using the mode that the two is negotiated It is whether correct, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, which includes (RAND, AUTH) two Parameter.
Wherein, response is calculated for the unauthorized response that terminal is sent using IMS network using certain mode , judge whether authentication succeeds using response for IMS, so as to be made whether to authenticate successful response.
Optionally, in some possible embodiments of the present invention, the identification log message further includes response The authentication key of carrying.
Optionally, in some possible embodiments of the present invention, authentication key includes confidentiality key (CK), with And Integrity Key (IK).
Optionally, in some possible embodiments of the present invention, the processor 602 is additionally operable to:
Suspend the work of the terminal first network AM access module, and ask described in the multi-media subsystem network release First network communication link resources.
Optionally, in some possible embodiments of the present invention, the processor 602 is additionally operable to:
Ask the multi-media subsystem network switching core net associated session control resource.
Optionally, in some possible embodiments of the present invention, the first network is the shifting for providing voice service Dynamic network, the WLAN that voice service is provided or the Wireless Fidelity that voice service is provided;
Second network is the mobile network for providing voice service, provides the WLAN of voice service or provide language The Wireless Fidelity of sound service;
Wherein, the first network is different from second network.
It is appreciated that the method for switching network does not limit network, can be carried out between a variety of different networks Switching.
It is understood that the function of each function module of the terminal 600 of the present embodiment can be according to above method embodiment In method specific implementation, specific implementation process is referred to the associated description of above method embodiment, and details are not described herein again.
As can be seen that in the scheme of the present embodiment, terminal 600 extracts authentication when being registered under first network connection status Registration message, the identification log message carry out identification log for terminal to multi-media subsystem network;If the terminal 600 Switch to the second network connection state from the first network connection status, then terminal 600 using the identification log message to The multi-media subsystem network sends authentication verification request, and the authentication verification asks to ask the IP multimedia subsystem, IMS Network carries out authentication verification to the identification log message;If the authentication verification passes through, terminal 600 receives the multimedia Subsystem network send confirmation message, and ask the multi-media subsystem network by the communication link information of the terminal from First network is updated to the second network.By the identification log message being stored in when being registered under first network connection status, thus Identification log directly is carried out using the identification log message when being registered under the second network connection state, eliminates initial registration Step, operating procedure greatly simplify, and also reduce the signaling traffic load registered during network switching.
Further, since initial registration is registers in plain text, identification log is registered for ciphertext, so as to be noted in network switching The step of during volume by eliminating initial registration, the leakage of user account privacy when can prevent initial registration improve registration process Safety.
The embodiment of the present invention also provides a kind of computer storage media, wherein, which can be stored with journey Sequence, the part or all of step including the method for switching network described in above method embodiment when which performs.
It should be noted that for aforementioned each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, certain steps may be used other sequences or be carried out at the same time.Secondly, those skilled in the art should also know It knows, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of Division of logic function, can there is an other dividing mode in actual implementation, such as multiple units or component can combine or can To be integrated into another system or some features can be ignored or does not perform.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, Can be electrical or other forms.
The unit illustrated as separating component may or may not be physically separate, be shown as unit The component shown may or may not be physical unit, you can be located at a place or can also be distributed to multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing unit, also may be used To be that each unit is individually physically present, can also two or more units integrate in a unit.It is above-mentioned integrated The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is independent product sale or uses When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme of the present invention is substantially The part to contribute in other words to the prior art or all or part of the technical solution can be in the form of software products It embodies, which is stored in a storage medium, is used including some instructions so that a computer Equipment (can be personal computer, server or network equipment etc.) perform each embodiment the method for the present invention whole or Part steps.And aforementioned storage medium includes:USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can to store program code Medium.
The above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those of ordinary skill in the art that:It still can be to preceding The technical solution recorded in each embodiment is stated to modify or carry out equivalent replacement to which part technical characteristic;And these Modification is replaced, the range for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of method for switching network, which is characterized in that the method includes:
Identification log message when being registered under first network connection status is extracted, the identification log message is for terminal to more Media subsystem network carries out identification log, and the identification log message includes the authentication key that response carries;
If the terminal switches to the second network connection state from the first network connection status, the identification log is utilized Message sends authentication verification request to the multi-media subsystem network, and the authentication verification asks to ask the multimedia Subsystem network carries out authentication verification to the identification log message;
If the authentication verification passes through, the confirmation message that the multi-media subsystem network is sent is received, and ask described more The communication link information of the terminal is updated to the second network by media subsystem network from first network.
2. according to the method described in claim 1, it is characterized in that, described register under the first network connection status, packet It includes:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message includes The certificate parameter that unauthorized responds and unauthorized response carries;
Identification log message is generated using the unauthorized response message, the identification log message includes response;
Identification log is carried out using the identification log message.
3. according to the method described in claim 2, it is characterized in that, described extract when being registered under first network connection status Identification log message, including:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
4. according to any methods of claim 1-3, which is characterized in that if the authentication verification passes through, receive The confirmation message that the multi-media subsystem network is sent, and ask communication of the multi-media subsystem network by the terminal After first network is updated to the second network, the method further includes link information:
Suspend the work of the terminal first network AM access module, and ask the multi-media subsystem network release described first Network communication link resource.
5. if according to the method described in claim 4, it is characterized in that, the authentication verification passes through, receive described more The confirmation message that media subsystem network is sent, and the multi-media subsystem network is asked to believe the communication link of the terminal After first network is updated to the second network, the method further includes breath:
Ask the multi-media subsystem network switching core net associated session control resource.
6. a kind of terminal, which is characterized in that the terminal includes:
Extraction module, for extracting identification log message when being registered under first network connection status, the identification log disappears Breath carries out identification log for terminal to multi-media subsystem network, and the identification log message includes the mirror that response carries Weigh key;
Sending module, if switching to the second network connection state from the first network connection status for the terminal, profit Authentication verification is sent with the identification log message to the multi-media subsystem network to ask, the authentication verification request is used for The multi-media subsystem network is asked to carry out authentication verification to the identification log message;
First request module if the authentication verification passes through, receives the confirmation message that the multi-media subsystem network is sent, And ask the multi-media subsystem network that the communication link information of the terminal is updated to the second network from first network.
7. terminal according to claim 6, which is characterized in that the terminal is additionally operable to:
The terminal sends initial registration request to the multi-media subsystem network;
The unauthorized response message that the multi-media subsystem network returns is received, wherein, the unauthorized response message includes The certificate parameter that unauthorized responds and unauthorized response carries;
Identification log message is generated using the unauthorized response message, the identification log message includes response;
Identification log is carried out using the identification log message.
8. terminal according to claim 7, which is characterized in that the extraction module is used for:
The unauthorized response message is preserved, and the identification log message is generated using the unauthorized response message;
Or, preserve the identification log message.
9. according to any terminals of claim 6-8, which is characterized in that the terminal further includes:
Suspend module, for suspending the work of the terminal first network AM access module, and ask the IP multimedia subsystem, IMS net Network discharges the first network communication link resources.
10. terminal according to claim 9, which is characterized in that the terminal further includes:
Second request module, for asking the multi-media subsystem network switching core net associated session control resource.
CN201510489642.7A 2015-08-11 2015-08-11 A kind of method for switching network and terminal Active CN105049442B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510489642.7A CN105049442B (en) 2015-08-11 2015-08-11 A kind of method for switching network and terminal
PCT/CN2015/091374 WO2017024671A1 (en) 2015-08-11 2015-09-30 Network switching method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510489642.7A CN105049442B (en) 2015-08-11 2015-08-11 A kind of method for switching network and terminal

Publications (2)

Publication Number Publication Date
CN105049442A CN105049442A (en) 2015-11-11
CN105049442B true CN105049442B (en) 2018-06-15

Family

ID=54455653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510489642.7A Active CN105049442B (en) 2015-08-11 2015-08-11 A kind of method for switching network and terminal

Country Status (2)

Country Link
CN (1) CN105049442B (en)
WO (1) WO2017024671A1 (en)

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231332B (en) * 2016-03-24 2020-09-25 华为技术有限公司 Security policy determination method and device
CN107529200B (en) * 2016-06-21 2021-02-23 中兴通讯股份有限公司 Method and device for releasing resources after network switching of terminal in VoLTE (Voice over Long term evolution)
CN107529160B (en) * 2016-06-21 2022-07-15 中兴通讯股份有限公司 VoWiFi network access method and system, terminal and wireless access point equipment
CN106658630B (en) * 2016-06-30 2021-01-26 努比亚技术有限公司 Communication terminal, base station, system and method
CN107786975B (en) * 2016-08-30 2022-05-13 中兴通讯股份有限公司 Voice service registration method and device and mobile terminal
WO2018152961A1 (en) * 2017-02-22 2018-08-30 华为技术有限公司 Information transmission method and device
CN109104397A (en) * 2017-06-21 2018-12-28 中兴通讯股份有限公司 A kind of implementation method and terminal of adaptive access network
CN109302728B (en) * 2017-07-24 2020-10-20 展讯通信(上海)有限公司 Call switching method and device, storage medium, base station and terminal
CN110800334B (en) * 2017-10-26 2022-11-15 深圳市欢太科技有限公司 User equipment call detection method and related product
US10791154B2 (en) * 2018-02-01 2020-09-29 Edgewater Networks, Inc. Holding registration messages during communication session switching
CN111314922B (en) * 2020-02-21 2023-09-15 宇龙计算机通信科技(深圳)有限公司 Method for releasing spectrum resources and related device
CN111565388B (en) * 2020-04-02 2023-09-19 维沃移动通信有限公司 Network registration method and electronic equipment
CN111669818B (en) * 2020-06-03 2022-08-02 维沃移动通信有限公司 Wi-Fi control method and device and electronic equipment
CN112601224B (en) * 2020-12-03 2023-02-10 海能达通信股份有限公司 Call switching method, device and system
CN112911554A (en) * 2021-01-29 2021-06-04 中国联合网络通信集团有限公司 Method, device and terminal for service fulfillment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175329A (en) * 2007-11-02 2008-05-07 华为技术有限公司 Cross-grouping domain switching method, system and device based on IP multimedia subsystem
CN102056251A (en) * 2009-11-04 2011-05-11 中国移动通信集团公司 Network switching method and system and equipment adopting same
CN101932057B (en) * 2009-06-22 2013-08-28 华为技术有限公司 Method, communication device and communication system of switching processing
CN103458450A (en) * 2009-06-22 2013-12-18 华为技术有限公司 Switchover processing method, switchover processing communication device and communication system
CN104038974A (en) * 2014-06-11 2014-09-10 中国联合网络通信集团有限公司 Method and device for processing voice service
CN104185220A (en) * 2013-05-22 2014-12-03 中国电信股份有限公司 IMS (IP Multimedia Subsystem) core network equipment failure switching method and border access controller
CN104519537A (en) * 2014-12-31 2015-04-15 华为技术有限公司 Communication method, user equipment and communication device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009009519A1 (en) * 2007-07-09 2009-01-15 Interdigital Technology Corporation Method and apparatus for handover and session continuity using pre-registration tunneling procedure
CN101478796B (en) * 2009-01-20 2011-01-05 中国科学院计算技术研究所 Hierarchical switching control signaling system for heterogeneous network and switching method thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101175329A (en) * 2007-11-02 2008-05-07 华为技术有限公司 Cross-grouping domain switching method, system and device based on IP multimedia subsystem
CN101932057B (en) * 2009-06-22 2013-08-28 华为技术有限公司 Method, communication device and communication system of switching processing
CN103458450A (en) * 2009-06-22 2013-12-18 华为技术有限公司 Switchover processing method, switchover processing communication device and communication system
CN102056251A (en) * 2009-11-04 2011-05-11 中国移动通信集团公司 Network switching method and system and equipment adopting same
CN104185220A (en) * 2013-05-22 2014-12-03 中国电信股份有限公司 IMS (IP Multimedia Subsystem) core network equipment failure switching method and border access controller
CN104038974A (en) * 2014-06-11 2014-09-10 中国联合网络通信集团有限公司 Method and device for processing voice service
CN104519537A (en) * 2014-12-31 2015-04-15 华为技术有限公司 Communication method, user equipment and communication device

Also Published As

Publication number Publication date
CN105049442A (en) 2015-11-11
WO2017024671A1 (en) 2017-02-16

Similar Documents

Publication Publication Date Title
CN105049442B (en) A kind of method for switching network and terminal
JP5588017B2 (en) Evolved packet system and emergency call attachment processing method
US10142305B2 (en) Local security key generation
CN109561430A (en) A kind of implementation method and equipment of public network user access private network
US11063990B2 (en) Originating caller verification via insertion of an attestation parameter
CN105519028B (en) A kind of wireless system connection control method and device
CN102111759A (en) Authentication method, system and device
CN108901018A (en) A kind of mobile communication system user identity hiding method that terminal is initiated
CN103987037A (en) Secret communication implementation method and device
CN105100071B (en) A kind of login method, apparatus and system
CN108683690A (en) Method for authenticating, user equipment, authentication device, authentication server and storage medium
CN107104932A (en) Key updating method, apparatus and system
CN108476212A (en) Dynamic wlan connections
CN109691156A (en) The enhanced gathering re-authentication of wireless device
CN103517383A (en) A method and a device for the access of a mobile terminal to a household network
CN108616805A (en) A kind of configuration of emergency numbers, acquisition methods and device
CN103155511A (en) Connection control with b2bua located behind nat gateway
CN104753872A (en) Authentication method, authentication platform, service platform, network elements and system
CN109982319A (en) User authentication method, device, system, node, server and storage medium
CN100571130C (en) A kind of general safety grade arranging method
CN105577634B (en) A kind of processing method and user terminal of the failure of encrypted word connection setup
CN112788738A (en) Code number processing method and device for public and private network convergence system
CN106210148A (en) Real time phone call processing method and processing device
CN107343285A (en) Management equipment and equipment management method
CN108668274A (en) A kind of method and device for realizing VoLTE IMS registrations

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant