CN112187615A - Message response method, device, terminal and storage medium - Google Patents

Message response method, device, terminal and storage medium Download PDF

Info

Publication number
CN112187615A
CN112187615A CN202010898343.XA CN202010898343A CN112187615A CN 112187615 A CN112187615 A CN 112187615A CN 202010898343 A CN202010898343 A CN 202010898343A CN 112187615 A CN112187615 A CN 112187615A
Authority
CN
China
Prior art keywords
message
timer
terminal
control function
session control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010898343.XA
Other languages
Chinese (zh)
Other versions
CN112187615B (en
Inventor
孙键
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN202010898343.XA priority Critical patent/CN112187615B/en
Publication of CN112187615A publication Critical patent/CN112187615A/en
Application granted granted Critical
Publication of CN112187615B publication Critical patent/CN112187615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/18Commands or executable codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1045Proxies, e.g. for session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/142Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/562Brokering proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present application belongs to the field of communications technologies, and in particular, to a message response method, an apparatus, a terminal, and a storage medium. The message response method comprises the following steps: sending a first message to network equipment, wherein the first message is an invitation transaction flow type message; and when a network response corresponding to the first message is received, if a timer is in an open state, closing the timer, wherein the timer is a timer corresponding to a second message with the same address as the proxy call session control function of the first message, and the second message is a non-invitation transaction flow type message. Therefore, when the timer times out, the terminal does not initiate an IMS registration request for the second message, which can reduce the situation that the transaction flow corresponding to the first message directly fails when the second message is in the IMS registration process, and reduce the failure probability of the transaction flow corresponding to the first message.

Description

Message response method, device, terminal and storage medium
Technical Field
The present application belongs to the field of communications technologies, and in particular, to a message response method, an apparatus, a terminal, and a storage medium.
Background
With the development of scientific technology, IP Multimedia Subsystem (IMS) technology has also been rapidly developed. The terminal sends the non-invitation transaction flow type message, a timer is started, and when the terminal determines that the response information sent by the network equipment is not received within the timing duration of the timer, the terminal can initiate an IMS registration request aiming at the non-invitation transaction flow type message when the timing of the timer is overtime, and the timer is still in an open state. At this time, if the terminal sends a message for inviting the transaction flow type and receives the response information sent by the network device, but the transaction flow corresponding to the message for inviting the transaction flow type is not yet ended, the transaction flow corresponding to the message for inviting the transaction flow type may be directly failed.
Disclosure of Invention
The embodiment of the application provides a message response method, a message response device, a terminal and a storage medium, which can reduce the failure probability of a transaction process corresponding to a first message. The technical scheme comprises the following steps:
in a first aspect, an embodiment of the present application provides a message response method, where the method includes:
sending a first message to network equipment, wherein the first message is an invitation transaction flow type message;
and when a network response corresponding to the first message is received, if a timer is in an open state, closing the timer, wherein the timer is a timer corresponding to a second message with the same address as the proxy call session control function of the first message, and the second message is a non-invitation transaction flow type message.
In a second aspect, an embodiment of the present application provides a message response apparatus, where the apparatus includes:
a message sending unit, configured to send a first message to a network device, where the first message is an invite transaction flow type message;
and a timer closing unit, configured to close a timer if the timer is in an open state when receiving a network response corresponding to the first message, where the timer is a timer corresponding to a second message having the same address as the proxy call session control function of the first message, and the second message is a non-invite transaction flow type message.
In a third aspect, an embodiment of the present application provides a terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method of any one of the above first aspects when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program is used for implementing any one of the methods described above when executed by a processor.
In a fifth aspect, embodiments of the present application provide a computer program product, where the computer program product includes a non-transitory computer-readable storage medium storing a computer program, where the computer program is operable to cause a computer to perform some or all of the steps as described in the first aspect of embodiments of the present application. The computer program product may be a software installation package.
The embodiment of the application provides a message response method, wherein a first message is sent to a network device, and when a network response corresponding to the first message is received, a timer can be closed when the timer is in an open state, so that when the timer times out, a terminal cannot initiate an IMS registration request for a second message, the situation that a transaction flow corresponding to the first message is directly failed when the second message is in an IMS registration process can be reduced, and the failure probability of the transaction flow corresponding to the first message can be reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic view illustrating an application scenario of a message response method or a message response apparatus according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating an example of a time axis of a message response method according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a message response method according to an embodiment of the present application;
fig. 4 is an exemplary diagram illustrating a time axis of a message response method according to an embodiment of the present application;
FIG. 5 is a schematic diagram illustrating an example of a time axis of a message response method according to an embodiment of the present application;
fig. 6 is a flowchart illustrating a message response method according to an embodiment of the present application;
fig. 7 is a flowchart illustrating a message response method according to an embodiment of the present application;
fig. 8 is a flowchart illustrating a message response method according to an embodiment of the present application;
fig. 9 is a flowchart illustrating a message response method according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a message response apparatus according to an embodiment of the present application;
fig. 11 shows a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
With the development of scientific technology, the IMS technology has also been rapidly developed. The IMS core network equipment comprises: a Proxy Call Session Control Function (P-CSCF) entity, an inquiry/Serving Call Session Control Function (I/S-CSCF) entity, a service centralized and continuity application server (SCC AS). The P-CSCF (which may be divided into a calling party P-CSCF and a called party P-CSCF) is a first contact point for the UE to access the IMS network during the VoLTE service. The P-CSCF may be responsible for proxying all VoLTE related signaling and completing routing control. During the VoLTE call, the P-CSCF may also be responsible for sending relevant control messages to a policy and Charging Rules function pcrf (policy and Charging Rules function) entity, and the like. When the UE is in a roaming state, the P-CSCF generally refers to a P-CSCF of the UE visiting a Public Land Mobile Network (VPLMN).
Fig. 1 is a schematic view illustrating an application scenario of a message response method or a message response apparatus according to an embodiment of the present application. As shown in fig. 1, the terminal may start a timer when sending the non-invite transaction flow type message. Within the timing duration of the timer, if the terminal receives the response information of the network device, the transaction flow corresponding to the non-invite transaction flow type message sent by the terminal is ended, the timer is closed, the terminal does not need to initiate a Proxy-call session control function (Proxy-CACF, P-CSCF) recovery flow, that is, the terminal does not need to initiate an IMS registration request based on a new P-CSCF address. When the terminal sends the invite transaction flow type message, the terminal may send the invite transaction flow type message to the network device. When receiving the invitation transaction flow type message, the network device may send response information corresponding to the invitation transaction flow type message to the terminal. When the terminal receives the response message, the terminal may send a confirmation message to the network device, and the service of the terminal is connected.
It will be readily appreciated that the timer may be started when the terminal is sending a non-invite transaction flow type message, as shown in figure 2. If the terminal does not receive the response information of the network equipment to the non-invitation transaction flow type message within the timing duration of the timer, the terminal can initiate a P-CSCF recovery flow when the timer times out, namely the terminal can initiate an IMS registration request to a new P-CSCF, and the timer is still in an open state at the moment. But the terminal may also send an invite transaction flow type message when the timer expires before the timer expires and the terminal may receive response information for the invite type message before the timer expires. However, when the terminal determines that the transaction flow corresponding to the invite transaction flow type message is not ended before the timer expires, the transaction flow corresponding to the invite transaction flow type message may be directly failed because the terminal is in the IMS registration process. For example, when the response information of the invite transaction flow type message received by the terminal is not the last response information of the invite transaction flow type message before the timer times out, the terminal determines that the transaction flow corresponding to the invite transaction flow type message is not ended. Because the terminal initiates a P-CSCF recovery procedure for the non-invite transaction procedure type message when the timer times out, when the terminal is in the IMS registration process, the transaction procedure corresponding to the invite transaction procedure type message fails, and a problem occurs in that the failure probability of the transaction procedure corresponding to the invite transaction procedure type message is high. The embodiment of the application provides a message response method, which can reduce the failure probability of a transaction flow corresponding to a first message.
The message response method provided by the embodiment of the present application will be described in detail below with reference to fig. 3 to 9. The execution body of the embodiment shown in fig. 3-9 may be, for example, a terminal.
Referring to fig. 3, a flow chart of a message response method is provided in the embodiment of the present application. As shown in fig. 3, the method of the embodiment of the present application may include the following steps S101 to S102.
S101, sending a first message to the network equipment, wherein the first message is an invitation transaction flow type message.
According to some embodiments, the invite transaction flow type message follows a multiple-handshake principle. For example, the invite transaction flow type message may be sent by the terminal to the network device, and when the network device receives the invite transaction flow message, the network device may send a network response to the inviting client for the received invite transaction flow message. When the terminal receives the network response, the terminal may, for example, detect whether the network response is the last network response. When the terminal detects that the network response is the last network response, the terminal may send a confirmation message to the network device, and at this time, the service of the terminal is connected, that is, the invitation transaction flow is ended. For example, when the terminal sends an active call message with INVITE as a request method, the terminal may send a confirmation message to the network device after receiving a response of 200 OK. And when the terminal sends the confirmation information, the telephone is connected, and the transaction flow corresponding to the active call message is ended.
It will be readily appreciated that the first message is merely an invite transaction flow type message and does not refer specifically to a fixed message. The transaction flow to which the first message corresponds may be, for example, a first transaction flow. The first transaction flow refers to the transaction flow corresponding to the first message only, and does not refer to a fixed transaction flow. The first network response merely refers to the network response corresponding to the first message, and does not refer to a fixed network response. When the first message changes, the first transaction flow and the first network response change accordingly.
According to some embodiments, when the terminal receives a transmission instruction for the first message, the terminal may transmit the first message to the network device. The sending instruction of the first message includes, but is not limited to, a voice sending instruction, a text sending instruction, a click sending instruction, and the like. The transmission instruction of the embodiment of the present application may be, for example, a voice transmission instruction. When the terminal receives the voice transmission instruction, the terminal may transmit a first message to the network device.
S102, when receiving the network response corresponding to the first message, if the timer is in the starting state, closing the timer, wherein the timer is a timer corresponding to a second message with the same address as the proxy call session control function address of the first message, and the second message is a non-invitation transaction flow type message.
According to some embodiments, the non-invite transaction flow type message may refer to a message that, when the terminal sends the non-invite transaction flow message to the network device, the network device may make a second network response to the received non-invite transaction flow message without the terminal sending acknowledgement information. And when the network equipment makes a second network response, ending the non-invitation transaction flow corresponding to the second message. Non-inviting transaction flow type messages include, but are not limited to, BYE messages, cancel messages, PRACK messages, and the like. For example, when the terminal sends an active hang-up message with BYE as a request method, and the non-inviting client can receive a 200OK response, the call of the non-inviting client is hung up.
It will be readily appreciated that the second message is merely a non-invite transaction flow type message and does not refer specifically to a fixed message. For example, the second message may be a BYE message and the second message may also be a cancel message. The second network response only refers to the network response corresponding to the second message, and does not refer to a fixed network response specifically, and when the second message changes, the second network response also changes accordingly. For example, when the second message is a BYE message, the second network response may be a network response corresponding to the BYE message. For example, when the second message is a cancel message, the second network response may be a network response corresponding to the cancel message.
Optionally, the timer refers to a timer started when the second message is sent. The timing duration of the timer can be set by the terminal based on the duration setting instruction or set by the terminal when leaving the factory. The duration setting instruction may be, for example, a preset text duration setting instruction. The terminal may start the timer when the terminal determines to send the second message. When the terminal starts the timer, the terminal may detect whether a second network response corresponding to the second message is received before the timer times out, that is, the terminal may determine whether a second transaction flow corresponding to the second message is ended. The terminal may turn off the timer because the terminal determines that the second network response is received. Therefore, when the terminal does not detect the second network response corresponding to the second message, the terminal may determine that the timer is in the on state, and the second transaction flow corresponding to the sent second message is not finished.
Optionally, fig. 4 shows an exemplary time axis diagram of a message response method according to an embodiment of the present application. As shown in fig. 4, the terminal may start a timer when the terminal determines to transmit the second message. When the terminal starts the timer, the terminal may detect whether a second network response corresponding to the second message is received before the timer expires, that is, the terminal may detect whether the second transaction flow is ended before the timer expires. When the terminal does not detect the second network response before the timeout of the timer, the terminal may determine that the second transaction flow corresponding to the sent second message is not ended, that is, the timer is in an open state. Before the timer times out, the terminal may send a first message to the network device and detect whether a first network response is received before the timer times out. When the terminal determines that the transmitted first message receives the first network response, the terminal may acquire a second message having the same address as the proxy call session control function of the first message. When the terminal acquires the second message, the terminal may acquire the state information of the timer corresponding to the second message. When the state information of the timer acquired by the terminal is in the open state, the terminal can close the timer. The terminal may turn off the timer before the timer expires. After the terminal closes the timer, the terminal does not initiate an IMS registration request for the second message when the timer is overtime, so that the failure probability of the transaction flow corresponding to the first message can be reduced.
Fig. 5 shows an exemplary time axis diagram of a message response method according to an embodiment of the present application, according to some embodiments. As shown in fig. 5, the terminal may start a timer when the terminal determines to transmit the second message. When the terminal starts the timer, the terminal may detect whether a second network response corresponding to the second message is received before the timer expires. When the terminal does not detect the second network response corresponding to the second message before the timing is overtime, the terminal may determine that the second transaction flow corresponding to the sent second message is not ended, that is, the terminal may determine that the timer is in the on state. The terminal may send the first message before the timer expires. When the terminal receives the first network response corresponding to the first message, the terminal may detect whether the first transaction flow corresponding to the first message is finished. For example, when the terminal detects that the first network response is not the last network response of the first message, that is, when the terminal determines that the first transaction flow corresponding to the first message is not ended, the terminal may turn off the timer, that is, the terminal may turn off the timer at a time point when the first network response is received.
The embodiment of the application provides a message response method, wherein a first message is sent to a network device, and when a network response corresponding to the first message is received, a timer can be turned off when the timer is in an on state, so that when the timer times out, a terminal cannot initiate an IMS registration request for a second message, the situation that a transaction flow corresponding to the first message is directly failed when the second message is in an IMS registration process can be reduced, and the failure probability of the transaction flow corresponding to the first message can be reduced.
Referring to fig. 6, a flow chart of a message response method is provided in the embodiment of the present application. As shown in fig. 6, the method of the embodiment of the present application may include the following steps S201 to S205.
S201, sending a second message to the network device, and starting a timer, wherein the second message is a non-invitation transaction flow type message.
The specific process is as described above, and is not described herein again.
According to some embodiments, the terminal may send the second message to the network device. When the terminal transmits the second message, the terminal may start a timer corresponding to the second message. The timer may be set based on a setting instruction of the terminal, or may be set when the terminal leaves a factory. The timer may have a time length of 5 seconds, for example. The transaction flow corresponding to the second message in the embodiment of the application is the second transaction flow.
S202, sending a first message to the network equipment, wherein the first message is an invitation transaction flow type message.
The specific process is as described above, and is not described herein again.
And S203, when the network response corresponding to the first message is received, if the timer is in the starting state, closing the timer, wherein the timer is the timer corresponding to the second message with the same address as the proxy call session control function address of the first message.
The specific process is as described above, and is not described herein again.
According to some embodiments, the first proxy-call session control function address refers to an address corresponding to the first message and does not refer specifically to a fixed address. When the first message changes, the first proxy call session control function address changes accordingly. The second proxy call session control function address refers to an address corresponding to the second message, and does not refer to a fixed address. When the second message changes, the second proxy call session control function address changes accordingly.
It is easy to understand that, when receiving the network response corresponding to the first message, if the timer is in the on state, the terminal may obtain the first proxy call session control function address corresponding to the first message, and obtain the second proxy call session control function address corresponding to the second message. The first proxy call session control function address acquired by the terminal may be, for example, a11 or a 12. The second proxy call session control function address acquired by the terminal may be, for example, a11 or a 12.
According to some embodiments, when the terminal acquires the first proxy call session control function address and the second proxy call session control function address, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are consistent by using an address detection algorithm. For example, when the first proxy call session control function address acquired by the terminal is a11 and the second proxy call session control function address a11, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are consistent.
It is easily understood that, when the terminal acquires the first proxy call session control function address and the second proxy call session control function address, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are consistent. The terminal may turn off the timer when the terminal detects that the first proxy call session control function address and the second proxy call session control function address are consistent.
Optionally, when the first proxy call session control function address acquired by the terminal is a11 and the second proxy call session control function address a11, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are consistent. The terminal may turn off the timer when the terminal detects that the first proxy call session control function address a11 and the second proxy call session control function address a11 coincide.
S204, if the proxy call session control function address of the first message is not consistent with the proxy call session control function address of the second message, and the timer times out, acquiring a new call session control function address.
According to some embodiments, when the terminal acquires the first proxy call session control function address and the second proxy call session control function address, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are consistent. When the terminal detects that the first proxy call session control function address is inconsistent with the second proxy call session control function address, the terminal does not close the timer, and the terminal can keep the timer in a timing state.
It is easily understood that, when the first proxy call session control function address acquired by the terminal is a11 and the second proxy call session control function address a12, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are identical. When the terminal detects that the first proxy-call session control function address a11 and the second proxy-call session control function address a12 do not coincide, the terminal does not turn off the timer and the terminal can keep the timer in a timed state.
According to some embodiments, when the terminal detects that the first proxy call session control function address and the second proxy call session control function address are not consistent, the terminal does not close the timer, and the terminal can keep the timer in a timing state. When the timer times out, the terminal can acquire a new call session control function address. Wherein the new call session control function address may be a call session control function address that is different from both the first call session control function address and the second call session control function address. The new call session control function address may be a call session control function address that is different from the second call session control function address. For example, the first proxy call session control function address acquired by the terminal may be, for example, a11, and the second call session control function address acquired by the terminal may be, for example, a 12. When the terminal acquires the new call session control function address a 13.
And S205, initiating an IMS registration request aiming at the second message based on the new call session control function address.
According to some embodiments, when the terminal acquires the first proxy call session control function address and the second proxy call session control function address, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are consistent. When the terminal detects that the first proxy call session control function address is inconsistent with the second proxy call session control function address, the terminal does not close the timer, and the terminal can keep the timer in a timing state. When the timer times out, the terminal can acquire a new call session control function address. The terminal may initiate an IMS registration request for the second message based on the new call session control function address.
It is easily understood that, when the first proxy call session control function address acquired by the terminal is a11 and the second proxy call session control function address a12, the terminal may detect whether the first proxy call session control function address and the second proxy call session control function address are identical. When the terminal detects that the first proxy-call session control function address a11 and the second proxy-call session control function address a12 do not coincide, the terminal does not turn off the timer and the terminal can keep the timer in a timed state. When the timer times out, the terminal can acquire a new call session control function address. The new call session control function address acquired by the terminal may be, for example, a 13. When the terminal acquires the new call session control function address a13, the terminal may initiate an IMS registration request for the second message. The timing length of the timer may be 3 minutes, for example, and the terminal may acquire the new call session control function address a13 when the timing length of the 3 minutes expires, and based on the new call session control function address a13, the terminal may initiate an IMS registration request for the first message.
Referring to fig. 7, a flow chart of a message response method according to some embodiments is provided. As shown in fig. 7, the method of the embodiment of the present application may further include the following steps S301 to S302. S301, before the timer times out, determining that the second message does not receive the second network response; s302, before the first message is sent, when the second message is determined to receive the second network response, the timer is closed.
It is easy to understand that, the terminal may detect whether the second network response is received before the terminal determines that the sent second message does not receive the second network response before the timer expires, that is, the second transaction flow corresponding to the second message is not ended, and before the terminal sends the first message. When the terminal determines that the second message receives the second network response before sending the first message, the terminal may determine that the second transaction flow corresponding to the second message is ended, and the terminal may turn off the timer. When the terminal closes the timer and sends the first message, the terminal does not send an IMS registration request aiming at the second message, the condition that the first transaction flow fails because the second message is in the IMS registration process is avoided, and the failure probability of the first transaction flow can be reduced.
According to some embodiments, please refer to fig. 8, which provides a flowchart of a message response method according to an embodiment of the present application. As shown in fig. 8, when receiving a network response corresponding to a first message, the method according to the embodiment of the present application may further include the following steps S401 to S402 after closing the timer if the timer is in an on state. S401, after the transaction process corresponding to the first message is determined to be finished, restarting a timer; and S402, when the timer times out, initiating an IMS registration request aiming at the second message.
It is easy to understand that, before the terminal times out the timer, the terminal receives the first network response of the first message, and when the terminal determines that the first transaction flow corresponding to the first message is not ended, the terminal may close the timer. After the terminal closes the timer, it may detect whether the transaction flow corresponding to the first message is finished. For example, before the timer times out, the terminal receives a first network response of the first message, the first network response is not the last network response, and when the terminal does not send acknowledgement information for the last network response to the network device, the terminal determines that the first transaction flow corresponding to the sent first message is not ended, that is, the terminal determines that the first transaction flow is not ended, and after the timer is turned off, the terminal may detect whether the first transaction flow is ended. When the terminal determines to send the acknowledgement information for the last network response to the network device, the terminal may determine the transaction flow corresponding to the first message, that is, the terminal determines that the first transaction flow is ended, the terminal may restart the timer, and detect whether the second network response is received before the timer is overtime. The terminal can also detect whether the timer is in an open state after restarting the timer. When the terminal determines that the second network response is not received before the timer times out or determines that the timer is in the open state before the timer times out, the terminal may determine that the second transaction flow is not ended, and the terminal may initiate an IMS registration request for the second message when the timer times out. When the terminal determines that the second network response is received before the timer expires, the terminal may not initiate an IMS registration request for the second message.
Alternatively, the timing length of the timer may be 3 minutes, for example. The terminal determines that the transaction flow corresponding to the sent first message is not ended before the timer times out, and after the timer is closed, the terminal may detect whether the transaction flow corresponding to the first message is ended, for example, the terminal may detect whether to send an acknowledgement message for the last network response of the first message to the network device. When the terminal sends a confirmation message to the network device, and determines that the first transaction flow is finished, the terminal may restart the timer and detect whether a second network response is received before the timer does not exceed 3 minutes. When the terminal determines that the second network response is not received before the timer times out, the terminal may determine that the second transaction flow is not ended, and the terminal may initiate an IMS registration request for the second message when the timer times out for 3 minutes.
Referring to fig. 9, a flow chart of a message response method according to some embodiments is provided. As shown in fig. 9, when receiving a network response corresponding to a first message, the method according to the embodiment of the present application may further include the following steps S501 to S502 after the timer is in the on state. S501, before the timer times out, when the transaction process corresponding to the first message is determined not to be ended, the timing duration of the timer is prolonged; and S502, when the transaction flow corresponding to the first message is determined to be finished within the prolonged timing duration, and when the prolonged timer times out, initiating an IMS registration request aiming at the second message.
It is to be understood that the terminal may send the first message after determining that the sent second message does not receive the second network response before the timer expires, i.e., the terminal determines that the second transaction flow is not ended. When the terminal sends the first message, it may detect whether the first transaction flow corresponding to the first message sent before the timer times out. Before the timer times out, when the terminal determines that the transaction flow corresponding to the sent first message is not ended, the terminal may extend the timing duration of the timer. The extended length of the timer may be determined based on preset instructions. The setting instruction includes, but is not limited to, a text setting instruction, a voice setting instruction, and the like. Before the extended timer times out, the terminal may determine whether a transaction flow corresponding to the sent first message is ended and whether a second network response is received. When the terminal determines that the transaction flow corresponding to the first message is ended within the extended timing duration and determines that the second network response is not received, the terminal may initiate an IMS registration request for the second message.
It is easy to understand that the timing length of the timer may be 3 minutes, for example. The extended length of the timer may be, for example, 5 minutes. When the terminal determines that the transaction flow corresponding to the sent first message is not ended before the timing of the terminal is overtime in 3 minutes, the terminal may extend the timing duration of the timer. Within 5 minutes of the extended timing duration, the terminal may determine whether the transaction flow corresponding to the first message is finished and whether a second network response is received. When the terminal determines that the transaction flow corresponding to the first message is ended within 5 minutes of the extended timing duration, and determines that the second network response is not received, the terminal may initiate an IMS registration request for the second message.
The embodiment of the application provides a message response method, wherein when a timer is in an open state and a first proxy call session control function address corresponding to a first message is consistent with a second proxy call session control function address corresponding to a second message when a first message is sent to a network device and a network response corresponding to the first message is received, the timer is closed, accuracy of closing the timer can be improved, and IMS signaling when an IMS registration request aiming at the second message is initiated when the timer is overtime can be reduced. In addition, the terminal closes the timer, so that the probability of failure of the transaction flow corresponding to the first message caused by the second message in the IMS registration process can be reduced, the failure probability of the transaction flow corresponding to the first message can be reduced, and the use experience of the user can be improved. Secondly, when the first proxy call session control function address is inconsistent with the second proxy call session control function address and the timer times out, the terminal initiates an IMS registration request aiming at the second message based on the acquired new call session control function address, so that the influence of closing the timer on the second message when the first proxy call session control function address is inconsistent with the second proxy call session control function address can be reduced, and the response success rate of the second message is improved. Finally, the terminal sends an IMS registration request aiming at the second message when the first proxy call session control function address is inconsistent with the second proxy call session control function address, so that the IMS registration process can be simplified, and the use experience of the user can be improved.
The message response device provided by the embodiment of the present application will be described in detail below with reference to fig. 10. It should be noted that the message response apparatus shown in fig. 10 is used for executing the method of the embodiment shown in fig. 3 to fig. 9 of the present application, and for convenience of description, only the portion related to the embodiment of the present application is shown, and details of the specific technology are not disclosed, please refer to the embodiment shown in fig. 3 to fig. 9 of the present application.
Please refer to fig. 10, which shows a schematic structural diagram of a message response apparatus according to an embodiment of the present application. The message response device 1000 may be implemented as all or a part of a user terminal through software, hardware, or a combination of both. According to some embodiments, the message response apparatus 1000 includes a message sending unit 1001 and a timer closing unit 1002, and is specifically configured to:
a message sending unit 1001, configured to send a first message to a network device, where the first message is an invite transaction flow type message;
a timer closing unit 1002, configured to close a timer if the timer is in an open state when a network response corresponding to the first message is received, where the timer is a timer corresponding to a second message having the same address as the proxy call session control function of the first message, and the second message is a non-invite transaction flow type message.
According to some embodiments, before the message sending unit 1002 is configured to send the first message to the network device, it is further specifically configured to:
a second message is sent to the network device and a timer is started.
According to some embodiments, the message response apparatus 1000 further includes a request initiating unit 1003, configured to, if the proxy call session control function address of the first message is not consistent with the proxy call session control function address of the second message, and the timer times out, obtain a new call session control function address;
an IMS registration request for the second message is initiated based on the new call session control function address.
According to some embodiments, the request initiating unit 1003 is configured to, when receiving the network response corresponding to the first message, if the timer is in an on state, after the timer is turned off, further specifically:
and after the transaction flow corresponding to the first message is determined to be finished, restarting the timer, and initiating an IMS registration request aiming at the second message when the timer times out.
According to some embodiments, the request initiating unit 1003 is configured to, when receiving the network response corresponding to the first message, if the timer is in the on state, further specifically:
before the timer times out, when the transaction flow corresponding to the first message is determined not to be ended, prolonging the timing duration of the timer;
and when the transaction flow corresponding to the first message is determined to be finished within the prolonged timing duration, and when the prolonged timer times out, initiating an IMS registration request aiming at the second message.
The embodiment of the present application provides a message response apparatus, where a message sending unit sends a first message to a network device, where the first message is an invite transaction flow type message, and a timer closing unit closes a timer if the timer is in an on state when receiving a network response corresponding to the first message, where the timer is a timer corresponding to a second message having a same address as a proxy call session control function address of the first message, and the second message is a non-invite transaction flow type message. Therefore, when the timer times out, the message response device does not initiate an IMS registration request for the second message, which can reduce the situation that the transaction flow corresponding to the first message directly fails when the second message is in the IMS registration process, and can reduce the failure probability of the transaction flow corresponding to the first message.
Please refer to fig. 11, which is a schematic structural diagram of a terminal according to an embodiment of the present disclosure. As shown in fig. 11, the terminal 1100 may include: at least one processor 1101, at least one network interface 1104, a user interface 1103, a memory 1105, at least one communication bus 1102.
Wherein a communication bus 1102 is used to enable connective communication between these components.
The user interface 1103 may include a Display screen (Display) and a GPS, and the optional user interface 1103 may also include a standard wired interface and a wireless interface.
The network interface 1104 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface).
Processor 1101 may include one or more processing cores, among other things. The processor 1101 connects various parts throughout the terminal 1100 using various interfaces and lines to perform various functions of the terminal 1100 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 1105 and invoking data stored in the memory 1105. Optionally, the processor 1101 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 1101 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 1101, but may be implemented by a single chip.
The Memory 1105 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 1105 includes non-transitory computer-readable storage media. The memory 1105 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 1105 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. The memory 1105 may alternatively be at least one storage device located remotely from the processor 1101. As shown in fig. 11, the memory 1105, which is a type of computer storage medium, may include an operating system, a network communication module, a user interface module, and an application program for message response.
In the terminal 1100 shown in fig. 11, the user interface 1103 is mainly used as an interface for providing input for a user, and acquiring data input by the user; and the processor 1101 may be configured to invoke an application of the message response stored in the memory 1105, and specifically perform the following operations:
sending a first message to the network equipment, wherein the first message is an invitation transaction flow type message;
and when a network response corresponding to the first message is received, if the timer is in an open state, closing the timer, wherein the timer is a timer corresponding to a second message with the same address as the proxy call session control function of the first message, and the second message is a non-invitation transaction flow type message.
According to some embodiments, before sending the first message to the network device, the processor 1101 is further configured to:
a second message is sent to the network device and a timer is started.
According to some embodiments, the processor 1101 further performs the following operations:
if the proxy call session control function address of the first message is inconsistent with the proxy call session control function address of the second message, and the timer times out, acquiring a new call session control function address;
an IMS registration request for the second message is initiated based on the new call session control function address.
According to some embodiments, the processor 1101 is configured to, when receiving the network response corresponding to the first message, if the timer is in an on state, after closing the timer, further specifically perform the following operations:
and after the transaction flow corresponding to the first message is determined to be finished, restarting the timer, and initiating an IMS registration request aiming at the second message when the timer times out.
According to some embodiments, the processor 1101 is configured to, when receiving the network response corresponding to the first message, after the timer is in the on state, further specifically perform the following operations:
before the timer times out, when the transaction flow corresponding to the first message is determined not to be ended, prolonging the timing duration of the timer;
and when the transaction flow corresponding to the first message is determined to be finished within the prolonged timing duration, and when the prolonged timer times out, initiating an IMS registration request aiming at the second message.
The embodiment of the application provides a terminal, and when a first message is sent to a network device and a network response corresponding to the first message is received, a timer can be turned on and turned off, so that when the timer times out, the terminal cannot initiate an IMS registration request for a second message, a situation that a transaction flow corresponding to the first message fails when the second message is in an IMS registration process can be reduced, and a failure probability of the transaction flow corresponding to the first message can be reduced.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method. The computer-readable storage medium may include, but is not limited to, any type of disk including floppy disks, optical disks, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any one of the message response methods as set forth in the above method embodiments.
It is clear to a person skilled in the art that the solution of the present application can be implemented by means of software and/or hardware. The "unit" and "module" in this specification refer to software and/or hardware that can perform a specific function independently or in cooperation with other components, where the hardware may be, for example, a Field-ProgrammaBLE Gate Array (FPGA), an Integrated Circuit (IC), or the like.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some service interfaces, devices or units, and may be an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program, which is stored in a computer-readable memory, and the memory may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above description is only an exemplary embodiment of the present disclosure, and the scope of the present disclosure should not be limited thereby. That is, all equivalent changes and modifications made in accordance with the teachings of the present disclosure are intended to be included within the scope of the present disclosure. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A message response method, the method comprising:
sending a first message to network equipment, wherein the first message is an invitation transaction flow type message;
and when a network response corresponding to the first message is received, if a timer is in an open state, closing the timer, wherein the timer is a timer corresponding to a second message with the same address as the proxy call session control function of the first message, and the second message is a non-invitation transaction flow type message.
2. The method of claim 1, wherein prior to sending the first message to the network device, further comprising:
and sending the second message to the network equipment, and starting the timer.
3. The method of claim 1, further comprising:
if the proxy call session control function address of the first message is inconsistent with the proxy call session control function address of the second message, and the timer times out, acquiring a new call session control function address;
initiating an IMS registration request for the second message based on the new call session control function address.
4. The method of claim 1, wherein after closing a timer if the timer is in an on state when the network response corresponding to the first message is received, further comprising:
and restarting the timer after the transaction flow corresponding to the first message is determined to be finished, and initiating an IMS registration request aiming at the second message when the timer times out.
5. The method of claim 1, wherein when receiving the network response corresponding to the first message, after the timer is in an on state, further comprising:
before the timer times out, when the transaction flow corresponding to the first message is determined not to be ended, prolonging the timing duration of the timer;
and when the transaction flow corresponding to the first message is determined to be finished within the prolonged timing duration, and when the prolonged timer times out, initiating an IMS registration request aiming at the second message.
6. A message response apparatus, the apparatus comprising:
a message sending unit, configured to send a first message to a network device, where the first message is an invite transaction flow type message;
and a timer closing unit, configured to close a timer if the timer is in an open state when receiving a network response corresponding to the first message, where the timer is a timer corresponding to a second message having the same address as the proxy call session control function of the first message, and the second message is a non-invite transaction flow type message.
7. The apparatus of claim 6, wherein the message sending unit, before sending the first message to the network device, is further specifically configured to:
and sending the second message to the network equipment, and starting the timer.
8. The apparatus of claim 6, further comprising:
a request initiating unit, configured to obtain a new call session control function address if the proxy call session control function address of the first message is inconsistent with the proxy call session control function address of the second message, and the timer times out;
initiating an IMS registration request for the second message based on the new call session control function address.
9. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method of any of the preceding claims 1-5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of any one of the preceding claims 1 to 5.
CN202010898343.XA 2020-08-31 2020-08-31 Message response method, device, terminal and storage medium Active CN112187615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010898343.XA CN112187615B (en) 2020-08-31 2020-08-31 Message response method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010898343.XA CN112187615B (en) 2020-08-31 2020-08-31 Message response method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112187615A true CN112187615A (en) 2021-01-05
CN112187615B CN112187615B (en) 2022-11-08

Family

ID=73924637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010898343.XA Active CN112187615B (en) 2020-08-31 2020-08-31 Message response method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112187615B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050237999A1 (en) * 2004-04-23 2005-10-27 Shores William N Session initiation protocol retransmission method
CN102547651A (en) * 2010-12-14 2012-07-04 中兴通讯股份有限公司 User roaming method and ICS (internet connection sharing) enhanced network
US20140201767A1 (en) * 2013-01-16 2014-07-17 Comcast Cable Communications, Llc Tracking and Responding to Distracting Events
EP2996312A1 (en) * 2006-12-29 2016-03-16 Huawei Technologies Co., Ltd. Method and apparatus for service processing after network element fails
CN106358225A (en) * 2016-09-20 2017-01-25 广东欧珀移动通信有限公司 Network data processing method, network data processing device and mobile terminal
CN107343288A (en) * 2016-05-03 2017-11-10 中兴通讯股份有限公司 The method, apparatus and system of Connection Release in a kind of calling procedure
CN108683588A (en) * 2018-05-18 2018-10-19 Oppo(重庆)智能科技有限公司 A kind of information management method, message management apparatus and mobile terminal
CN109525536A (en) * 2017-09-18 2019-03-26 深圳市中兴微电子技术有限公司 A kind of IP multimedia subsystem cut-in method and device
CN110383935A (en) * 2017-03-09 2019-10-25 T移动美国公司 By the call setting timer of different agreement triggering and termination
CN111107058A (en) * 2019-11-28 2020-05-05 华为技术有限公司 IMS registration time management system and terminal equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050237999A1 (en) * 2004-04-23 2005-10-27 Shores William N Session initiation protocol retransmission method
EP2996312A1 (en) * 2006-12-29 2016-03-16 Huawei Technologies Co., Ltd. Method and apparatus for service processing after network element fails
CN102547651A (en) * 2010-12-14 2012-07-04 中兴通讯股份有限公司 User roaming method and ICS (internet connection sharing) enhanced network
US20140201767A1 (en) * 2013-01-16 2014-07-17 Comcast Cable Communications, Llc Tracking and Responding to Distracting Events
CN107343288A (en) * 2016-05-03 2017-11-10 中兴通讯股份有限公司 The method, apparatus and system of Connection Release in a kind of calling procedure
CN106358225A (en) * 2016-09-20 2017-01-25 广东欧珀移动通信有限公司 Network data processing method, network data processing device and mobile terminal
CN110383935A (en) * 2017-03-09 2019-10-25 T移动美国公司 By the call setting timer of different agreement triggering and termination
CN109525536A (en) * 2017-09-18 2019-03-26 深圳市中兴微电子技术有限公司 A kind of IP multimedia subsystem cut-in method and device
CN108683588A (en) * 2018-05-18 2018-10-19 Oppo(重庆)智能科技有限公司 A kind of information management method, message management apparatus and mobile terminal
CN111107058A (en) * 2019-11-28 2020-05-05 华为技术有限公司 IMS registration time management system and terminal equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭晨等: "呼叫中心会话边界控制的一种设计与实现", 《软件》 *

Also Published As

Publication number Publication date
CN112187615B (en) 2022-11-08

Similar Documents

Publication Publication Date Title
US9705938B2 (en) System and method for subscribing for internet protocol multimedia subsystems (IMS) services registration status
US20180213008A1 (en) Method and apparatus for voip communication completion to a mobile device
US10764430B2 (en) Calling an unready terminal
CN107070950B (en) Method, device and computer readable storage medium for IMS registration control
CN114980065B (en) Voice calling method and device and electronic equipment
US20230139150A1 (en) Method and apparatus for processing call initiation anomaly
US8843601B1 (en) Systems and methods for VOIP communication completion to a mobile device
US9392032B2 (en) Session transfer method, device and system
CN112187615B (en) Message response method, device, terminal and storage medium
US20150031341A1 (en) Method for responding to push notification based communication request
US20150016336A1 (en) Method and apparatus for voip communication completion to a mobile device
CN116346988A (en) Method and device for receiving incoming call
US20220006845A1 (en) Self-healing and resilient ip multimedia subsystem core
CN114286301A (en) Voice service control method and device, storage medium and terminal equipment
CN111147475A (en) Voice calling method, device, storage medium and terminal
EP3249872B1 (en) Voice service registration method and digital terminal
US11997146B1 (en) IMS restoration triggered by receipt of a MWI or a text message via fallback protocol
US11588898B2 (en) Controlling communication session handling at a user equipment using a script generated by an application server
CN109548181B (en) Information acquisition method and device, storage medium and mobile terminal
CN113169955B (en) Apparatus, method and computer program for call session control function recovery
CN116418768A (en) Instant voice call method, device, electronic equipment and readable storage medium
EP4289127A1 (en) System and method for managing push notifications on a user device
KR20160089684A (en) Ip multimedia subsystem(ims) registration method of mobile terminal and the mobile terminal
US20160057174A1 (en) Method and device for managing circuit switched data calls
CN108011772A (en) Method, apparatus and Session Border Controller of a kind of SBC to terminal heartbeat detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant