CN113726718A - Subscription message processing method, device, system and storage medium - Google Patents

Subscription message processing method, device, system and storage medium Download PDF

Info

Publication number
CN113726718A
CN113726718A CN202010443349.8A CN202010443349A CN113726718A CN 113726718 A CN113726718 A CN 113726718A CN 202010443349 A CN202010443349 A CN 202010443349A CN 113726718 A CN113726718 A CN 113726718A
Authority
CN
China
Prior art keywords
subscription
registration
information
terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010443349.8A
Other languages
Chinese (zh)
Inventor
李星星
丁玲台
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202010443349.8A priority Critical patent/CN113726718A/en
Publication of CN113726718A publication Critical patent/CN113726718A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1073Registration or de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a subscription message processing method, equipment and a storage medium of an IP multimedia subsystem, belonging to the technical field of communication. The method comprises the following steps: returning a registration response to the registration terminal based on a registration request sent by the registration terminal to complete registration; and within a preset time after the registration is finished, receiving a subscription request for finishing the registration sent by the registration terminal through a Session Border Controller (SBC) of the IP multimedia subsystem, wherein the subscription request is used for indicating that the registration terminal is registered and indicating that the SBC does not execute the sending of the P subscription. According to the technical scheme, the used efficiency of the subscription memory and the use performance of the system CPU can be improved.

Description

Subscription message processing method, device, system and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, a device, a system, and a storage medium for processing a subscription message of an IP multimedia subsystem.
Background
With the rapid development of the communication field, the IMS is also rapidly developing. The IMS network is generated based on an IP network, and is an IP-based network architecture proposed by the 3rd Generation Partnership Project (3 GPP) organization, and Session is controlled by a Session Initiation Protocol (SIP) message, so that various services can be conveniently implemented, and cost can be greatly reduced.
A Cloud Data Base (CDB) is used as a cache database of an Application (APP) of a network element, and provides database services of an online Transaction Processing system (OLTP) for the APP, including services of Data storage and management, Data access, subscription notification, Data replication/recovery, Data migration, and upgrading. Because the CDB is used as a backup of the APP Local LDB (Local Data Base), under normal conditions, the CDB and the Data in the LDB need to be updated synchronously in real time, so that frequent changes of the Data in the CDB may affect the overall performance.
Therefore, a method for processing subscription information that can reasonably optimize the resource occupation state is needed.
Disclosure of Invention
The embodiments of the present application mainly aim to provide a method, a device, and a storage medium for processing a subscription message of an IP multimedia subsystem, so as to achieve a reasonable optimization of resource occupation state, and improve the usage efficiency of a subscription memory and the usage performance of a system CPU.
In order to achieve the above object, an embodiment of the present application provides a subscription message processing method for an IP multimedia subsystem, where the method includes the following steps: returning a registration response to the registration terminal based on a registration request sent by the registration terminal to complete registration; and within a preset time after the registration is finished, receiving a subscription request for finishing the registration sent by the registration terminal through a Session Border Controller (SBC) of the IP multimedia subsystem, wherein the subscription request is used for indicating that the registration terminal is registered and indicating that the SBC does not execute the sending of the P subscription.
In order to achieve the above object, an embodiment of the present application further provides a subscription message processing device of an IP multimedia subsystem, where the device includes a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the steps of the subscription message processing method of the IP multimedia subsystem when executing the computer program.
In order to achieve the above object, an embodiment of the present application further provides a subscription message processing system, including a subscription message processing device of an IP multimedia subsystem and a registration terminal, where the registration terminal sends a registration request to the subscription message processing device of the IP multimedia subsystem; the subscription message processing device of the IP multimedia subsystem is configured to execute the steps of the subscription message processing method of the IP multimedia subsystem as described above, in response to the registration request of the registered terminal.
To achieve the above object, the present application provides a storage medium for a computer-readable storage, the storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the steps of the aforementioned method.
According to the subscription message processing method, the device and the storage medium of the IP multimedia subsystem, after a registration request sent by a registration terminal is received, the received registration request is responded to complete registration of the registration terminal in the IP multimedia subsystem, then the subscription request sent by the registration terminal is received through a Session Border Controller (SBC) of the IP multimedia subsystem within the preset time after the registration is completed, whether the SBC is instructed to execute the sending of the P subscription is determined through whether the subscription request sent by the registration terminal is received within the preset time, and if the SBC is monitored to receive the subscription request sent by the registration terminal within the preset time, the SBC is instructed not to execute the sending of the P subscription based on the subscription request. Therefore, the technical scheme can realize the functions of reasonably optimizing the resource occupation state and improving the use efficiency of the subscription memory and the use performance of the system CPU.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart illustrating a subscription message processing method of an IP multimedia subsystem according to an embodiment of the present application;
fig. 2 is a flowchart illustrating steps of encrypting path information according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a subscription message processing method of an IP multimedia subsystem according to another embodiment of the present application;
fig. 4 is a flowchart illustrating a step of decrypting to obtain path information according to an embodiment of the present application;
fig. 5 is an interaction diagram of a subscription message processing method of an IP multimedia subsystem according to an embodiment of the present application;
fig. 6 is a schematic block diagram illustrating a structure of a subscription message processing device of an IP multimedia subsystem according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be divided, combined, or combined, and thus the actual execution order may be changed according to the actual situation.
As shown in fig. 1, fig. 1 is a schematic flowchart of a subscription message processing method of an IP multimedia subsystem according to an embodiment of the present application, where the method includes the following steps:
step S101, a registration response is returned to the registration terminal based on the registration request sent by the registration terminal, so as to complete the initial registration.
The IP Multimedia Subsystem (IMS) is a set of specifications describing the next generation network architecture for implementing IP-based telephony and multimedia services. IMS defines a complete architecture and framework that allows for the aggregation of voice, video, data and mobile networking technologies over an IP-based infrastructure, filling the gap between the two most successful communication paradigms (mobile telephony and Internet technologies). The core processing component of the IMS has a session control function, and can process a multimedia session of a user. When the session is processed, a session initiation protocol SIP is adopted as a signaling protocol.
For example, when the user terminal needs to register in the IMS, the user sends a registration request for registration to the IMS by using the user terminal, so that the IMS responds to the registration request and returns a response success message, thereby completing the initial registration of the user terminal in the IMS.
Step S102, in a preset time after the initial registration is completed, receiving a subscription request which is sent by the registration terminal and completes the registration through a Session Border Controller (SBC) of the IP multimedia subsystem, wherein the subscription request is used for indicating that the registration terminal is registered and indicating that the SBC does not execute the sending of the P subscription.
After the initial registration of the user terminal is completed, since only the network element performing the registration knows that the user terminal completes the registration, it is necessary to synchronize the whole network system with the relevant registration information of the terminal completing the registration, such as the terminal identifier of the terminal, the registration time, the network information of the registration, and the like, and therefore, it is necessary to obtain the registration information of the terminal completing the registration by sending the subscription request.
Generally, when a registered terminal completes initial registration in an IMS network, in order to make each network element in the IMS network system know that the registered terminal has completed registration in the IMS network, the registered terminal has a terminal subscription, that is, the registered terminal sends a corresponding subscription request to a session border controller SBC, and the SBC also performs sending of a P subscription, so as to obtain registration information of the registered terminal.
Since the registered terminal sends the subscription request to the SBC and the SBC sends the P subscription with the same purpose, it is obvious that the subscription memory is occupied by the repeated subscription due to repeated or useless operations, and the CPU of the system is wasted, so a reasonable control method is required to avoid such a situation.
It should be noted that the P subscription is a subscription request sent by a P-CSCF (proxy-CSCF) network element in the IMS when determining that the registered terminal completes registration, and is used to acquire relevant registration information of the registered terminal, where the CSCF is a call session control function.
In an embodiment, when the initial registration of the registered terminal in the IMS is completed, the session border controller SBC is controlled to implement the acquisition of the subscription request, and since the registered terminal generally sends the subscription request to implement the sharing of the registration information after the initial registration is completed, the subscription request sent by the registered terminal to complete the registration is received by the SBC within a preset time after the initial registration is completed, and then the registered terminal of the IMS is indicated according to the received subscription request, and at the same time, the SBC is indicated not to execute the sending of the P subscription.
For example, when the initial registration of the registered terminal in the IMS is completed, a corresponding subscription request is usually sent within 60 seconds to subscribe to obtain the registration information of the terminal, and in order to reduce unnecessary consumption of a subscription memory and occupation of a system CPU, when the registered terminal completes the registration in the IMS, the P-CSCF network element in the SBC is not controlled to execute the sending of the P subscription first, but it is monitored whether the SBC network element will receive the subscription request sent by the registered terminal within 60 seconds, that is, the SBC has 60 seconds to receive the subscription request sent by the registered terminal.
For example, if it is monitored that the SBC receives a subscription request sent by a registered terminal within 60 seconds, the SBC is instructed/controlled not to perform the sending of the P subscription based on the subscription request; and if the SBC does not receive the subscription request sent by the registered terminal within 60 seconds, indicating/controlling the SBC to execute the sending of the P subscription so as to acquire the registration information of the registered terminal. Since the registered terminal will send the subscription request under normal conditions, the SBC can be effectively prevented from sending the P subscription with the same function.
Meanwhile, since the registration information of the registered terminal is acquired by sending the P subscription by the SBC network element within 60 seconds because the subscription request sent by the registered terminal is not received, after 60 seconds, if the subscription request sent by the registered terminal is received, the received registration request is regarded as an invalid request. Or, since the SBC network element is used to send the P subscription, it can be determined that the IMS has already acquired the registration information of the registered terminal, and at this time, further acquisition is not needed.
At this time, after receiving the subscription request sent by the registered terminal, the SBC is controlled not to execute the sending of the P subscription, and the SBC needs to upload the P subscription to the CDB when executing the sending of the P subscription, so that when the SBC is controlled not to execute the sending of the P subscription, performance consumption and memory occupation of the P subscription due to uploading to the CDB can be reduced.
In an embodiment, registration information of the registered terminal needs to be acquired only when the registered terminal successfully registers in the IMS network, so that it is first determined whether the registered terminal successfully registers in the IMS network, and it is determined whether the registration is performed according to the state of the registered terminal itself, therefore, when the network of the registered terminal is initialized, the registered terminal sends a registration request to the IMS to complete the registration in the IMS, the IMS responds after receiving the registration request sent by the registered terminal to complete the registration of the registered terminal, and when the registration is completed, the SBC in the IMS completes the initial registration of the registered terminal, and then performs further processing to achieve the successful registration, and when the SBC completes the initial registration of the registered terminal, the SBC is further controlled to upload the registration information of the registered terminal to the cloud database CBD.
For example, the network initialization of the registered terminal refers to the first use of the network, such as the restart of the registered terminal and the network handover, at which time a corresponding registration will be required to implement the use of the network. After the initial registration of the registered terminal in the IMS network is completed, since the IMS needs to know that the registered terminal has been successfully registered and the relevant information of the registered terminal, the relevant registration information of the registered terminal, including but not limited to the terminal identifier of the registered terminal, the registration time, the registered network, and the like, needs to be uploaded to the cloud database CDB.
In an embodiment, after the SBC receives the subscription request sent by the registered terminal within a preset time, the SBC responds to the subscription request, and then processes a response result. Therefore, after it is monitored that the SBC receives the subscription request sent by the registered terminal within the preset time, the method further includes: obtaining subscription information corresponding to the subscription request; and obtaining corresponding extended information based on the subscription information, storing the extended information in a header field of SIP signaling obtained based on a Session Initiation Protocol (SIP), and placing the SIP signaling in a corresponding message route.
SIP (Session Initiation Protocol) is a multimedia communication Protocol. It is a text-based application-layer control protocol for creating, modifying and releasing sessions of one or more participants. The method supports and is applied to multimedia services such as voice, video and data, and can also be applied to special services such as Presence and Instant Message.
When it is monitored that the SBC receives a subscription request sent by a registered terminal within a preset time, the system will respond to the subscription request to obtain subscription information corresponding to the subscription request, and in order to ensure the security of the subscription information, part of information in the subscription information needs to be hidden, so that information which needs to be hidden in the subscription information is determined first.
When the system responds to the subscription request, the system responds and feeds back the subscription request by each network element in the system, and specifically the responses and feeds back include but are not limited to querying, shielding, recovering, forwarding and the like. And generating information corresponding to each network element every time of response, and further obtaining corresponding subscription information after the whole response is completed.
In practical applications, the main reason for the leakage of the subscription information is caused by node information contained in several message headers in the SIP signaling, including network element information carried by a "via" header and a "record-route" header and terminal address information carried by a "contact" header, so that in order to implement information security, partial key information needs to be hidden, for example, the "via" header, the "record-route" and the "contact" header, and the like, and the hiding of the key information is implemented by a Topology Hiding Internet Gateway (THIG).
When topology hiding is realized, the key information recorded in the SIP signaling needs to be hidden, and specific hiding may include deletion or encryption, and due to different processing means corresponding to different hiding manners, may be determined according to actual requirements. For example, information needs to be backed up when deletion is performed, that is, data to be deleted needs to be uploaded in the CDB, and then the information is deleted, but due to the uploading of the data, a system memory is occupied to a certain extent, and the occupation and utilization rate of a CPU are increased; when encryption is performed, the key information recorded in the SIP signaling is also in a hidden state, that is, the terminal that cannot perform decryption cannot check the key information, and the key information can be checked only after decryption is completed, and meanwhile, the key information does not need to be uploaded to the CDB when encryption is performed. Therefore, in each embodiment of the present application, topology hiding is implemented by encrypting the key information, so as to ensure the security of the data information.
In one embodiment, the subscription request is responded to when the subscription request of the terminal is received. At this time, the network element associated in the IMS responds to the subscription request to obtain corresponding subscription information, then obtains corresponding extension information by acquiring the key information in the subscription information, and further obtains a corresponding SIP signaling based on the session initiation protocol to store the obtained extension information in the header field of the obtained SIP signaling, and at the same time, places the obtained SIP signaling in a corresponding message route.
Illustratively, when the subscription information is hidden, the network element information of each network element responding to the subscription request is hidden. For example, when the first network element responds to the subscription request, the network element information corresponding to the first network element is recorded in the subscription information obtained by the first network element in response to the subscription request, and when the second network element responds after the first network element completes responding, the network element information of the second network element is also recorded in the obtained subscription information. It should be noted that the subscription information includes response results after all network elements that need to respond, which is specifically embodied in that the subscription information includes network element information corresponding to all network elements that respond.
In an embodiment, when obtaining corresponding extended information according to subscription information to store the extended information, the method includes: and acquiring path information contained in the subscription information to encrypt the path information, and storing the encrypted path information in a header field of SIP signaling obtained based on a Session Initiation Protocol (SIP).
When the subscription information is topologically hidden, each network element information recorded in the subscription information, specifically, the network element address, is actually hidden, so after the subscription information is obtained, the network element information recorded in the subscription information is acquired, and all the network element information is collected to obtain the extended information to be hidden.
When the extended information is obtained, path information recorded in the subscription information is actually obtained, where the path information includes all network element addresses, that is, a set of network element addresses is path information, and the path information also includes a sequence in which a request is transmitted in each network element, and then the obtained path information is encrypted, and the encrypted path information is stored in a header field of an SIP signaling, so as to implement hiding of the path information.
Illustratively, when part of information in the extended information is hidden, in order to prevent the system memory from being occupied during the hiding, the hidden information needs to be placed in the message route, and then the hidden information is placed in the header field of the route information in a manner of extending a parameter, so that the information is directly obtained in the message route by reading the header field included in the route information when the information is required to be obtained.
As can be seen from the above description, hiding the network element information is to hide the network element address of each network element responding to the subscription request, and the hiding of the network element address is implemented to hide the entire responding path, so as to ensure the security of the subscription. In an actual application process, each network element completes a response to the subscription request according to a corresponding response sequence, after each network element responds to the subscription request, a network element address of each network element performs response feedback along with generated subscription information, wherein the network element address is obtained extended information, and when each network element address is recorded in the subscription information, decryption processing is required to be performed so as to hide each network element address.
Referring to fig. 2, fig. 2 is a schematic flowchart of a step of encrypting path information according to an embodiment of the present application.
The encrypting process is performed on the path information, and the encrypted path information is stored in a header field of SIP signaling obtained based on a session initiation protocol SIP, including steps S201 to S203.
Step S201, obtaining a public and private key corresponding to the registered terminal according to a preset encryption method, and encrypting the path information by using the public and private key to obtain a ciphertext sub-string, wherein the ciphertext sub-string is a character string;
step S202, obtaining a current network name, and associating the ciphertext substring with the current network name and the registration terminal identification to obtain a corresponding path identification;
step S203, the path identification is encrypted and marked, and the path identification obtained by encryption and marking is stored in the header field of the SIP signaling.
When the obtained path information is encrypted, a public key and a private key corresponding to the registered terminal are obtained according to a preset encryption mode, wherein the public key and the private key are used for realizing encryption and decryption of the information, the obtained path information is further encrypted by using the obtained public key and private key to obtain a ciphertext sub-string corresponding to the path information, then a current network name is obtained, the obtained ciphertext sub-string is associated with the current network name and the registered terminal identifier to obtain a corresponding path identifier, and finally the obtained path identifier is encrypted and marked, so that the path identifier obtained by the encryption and marking is stored in a head field of the SIP signaling.
In an embodiment, when acquiring the encrypted public and private keys corresponding to the registered terminals, in order to ensure the security of data, each registered terminal corresponds to a respective unique public and private key for performing encryption processing on data information that needs to be encrypted, so that the data information that is desired to be acquired in the message route can be acquired only when all the information is accurate.
The public and private keys can be generated in various ways, such as symmetric encryption and asymmetric encryption. When the public and private keys corresponding to the registration terminal are obtained according to the preset encryption mode, the corresponding public and private keys can be obtained by adopting a symmetric encryption mode, and the public and private keys can also be obtained by adopting an asymmetric encryption mode, which is not limited specifically.
Illustratively, when path information is encrypted, the sequence of each network element address recorded in the SIP signaling is different because the response sequence of each network element is different, but no matter how many network element addresses are recorded, the recorded network element addresses are encrypted by one character string, that is, encrypted into a ciphertext sub-string.
In addition, during encryption, the network element address recorded in the subscription information obtained by each response may be encrypted, or all the network element addresses recorded in the subscription information obtained by the response may be uniformly encrypted when the response is completed. In either way, the encryption is performed based on the encrypted public and private keys obtained from the registered terminal.
After path information is encrypted to obtain a corresponding ciphertext sub-string, a currently used network name is obtained, and the current network name and the registration terminal identification may not be character strings capable of being integrated with the ciphertext sub-string, so that the obtained current network name and the registration terminal identification are firstly converted into character strings, and then the character strings obtained by conversion are integrated and associated with the ciphertext sub-string to obtain a path identification. For example, the obtained path identifier is username @ realm @ a, where username is a ciphertext sub-string obtained by encrypting path information, realm is a current network name, and a is a registration terminal identifier, and after the path identifier is obtained by recognition, the ciphertext sub-string is read to decrypt the ciphertext sub-string, so that the subscription information obtained based on which network elements can be obtained.
Since the path information is in a hidden state after being encrypted, the encrypted path identifier needs to be encrypted and marked, so that decryption of the ciphertext substring can be realized in the subsequent use process. When the encrypted mark is carried out, for example, a token niaed-by label is added behind the path mark, and when the encrypted path mark is identified, the encrypted path mark is identified through identifying the token niaed-by label. In addition, when the encryption mark is performed, different labels can be set according to different registered terminals, or the terminal identification of the registered terminal can be added on the label.
After a series of processes, such as encryption, association, and labeling, are completed, the resulting path identification is stored in a header field of the SIP signaling. Illustratively, the field in which the routing-related header field is located in SIP signaling is filled with valid fields, and a valid entry is constructed for a specific header field, such as adding a prefix "SIP/2.0/UDP" to the via field, or adding a "SIP" to the Route and Record-Route fields: ", the relevant field (network element address) of the route is really shielded and stored in the path identification after the encryption marking.
Referring to fig. 3, fig. 3 is a flowchart illustrating a subscription message processing method of an IP multimedia subsystem according to another embodiment of the present application, including steps S301 to S304.
Step S301, when a request instruction is received, determining whether the request instruction contains an encryption mark.
After the subscription information is processed, the path identifier obtained by the processing is stored in a header field of the SIP signaling, and meanwhile, the SIP signaling is placed in the message route, so that the path identifier is directly obtained in the message route when a message request is carried out subsequently, and then the corresponding path information is obtained through corresponding processing.
When a request instruction is received, whether the received request instruction contains a corresponding encryption mark is determined, wherein when the request instruction contains the encryption mark, the corresponding encryption information can be decrypted to realize the response to the request instruction, and when the request instruction does not contain the encryption mark, the corresponding encrypted information cannot be decrypted at this time to realize the response to the request instruction.
For example, according to the above description, when the path identifier is encrypted, a token niaed-by tag may be added after the path identifier, so that the token niaed-by tag is used as the encryption tag. Therefore, when the request instruction is received, whether the request instruction contains the encryption mark can be determined by identifying whether the token niaed-by tag is contained in the request instruction. Similarly, when the path identifier is encrypted and marked using another tag, the path identifier is identified by identifying the corresponding tag.
Step S302, if the request command is determined to contain the encryption mark, identifying the contained target encryption mark, and obtaining a corresponding target path identifier according to the identification of the target encryption mark.
And determining whether the request instruction contains the encryption mark, and identifying to obtain a corresponding path identifier according to the identified encryption label when determining that the request instruction contains the encryption label.
In an embodiment, the encryption mark and the path identifier are stored in association in the SIP signaling, so that when the request instruction is identified to contain the encryption mark, the corresponding encryption mark is obtained first, then the corresponding path identifier is obtained through the encryption mark, and further the response to the request instruction is realized through the processing of the path identifier.
For example, for an encrypted SIP signaling, since information is hidden, for the SIP signaling recorded with hidden information, a corresponding hidden network tag needs to be set, that is, for the SIP signaling with the hidden network tag, a path identifier including the encrypted path identifier is recorded, and then the path identifier can be identified and obtained.
And S303, decrypting the target ciphertext substring contained in the target path identifier to obtain corresponding target path information.
After the corresponding path identifier is obtained through the identification of the encryption identifier, the ciphertext substrings contained in the path identifier are decrypted to obtain corresponding path information.
The path identifier includes current network information, a registration terminal identifier and a ciphertext substring, wherein the current network information and the registration terminal identifier are used for marking the uniqueness of the path identifier, and specifically, the hidden information is the ciphertext substring, so that after the path identifier is obtained, the ciphertext substring included in the path identifier is extracted and decrypted to obtain corresponding path information.
Referring to fig. 4, fig. 4 is a schematic flowchart of a step of decrypting to obtain path information according to an embodiment of the present application, and step S303 includes steps S401 to S403.
Step S401, identifying a target terminal identification contained in the request instruction to obtain a target public and private key corresponding to the target terminal identification;
step S402, identifying the character strings contained in the target path identification to extract the contained target ciphertext substrings;
and S403, decrypting the target ciphertext sub-string based on the target public and private key to obtain corresponding target path information.
The "target terminal identifier", "target public and private key", "target path identifier", "target ciphertext sub-string", and "target path information" mentioned herein are only used to distinguish from the "terminal identifier", "public and private key", "path identifier", "ciphertext sub-string", and "path information" described above, but the actually described objects are consistent.
When decryption is carried out to obtain corresponding target path information, firstly, a target terminal identification contained in a request instruction is identified to obtain a corresponding target public and private key according to the identified target terminal identification, then, a character string contained in the obtained target path identification is identified to extract a target ciphertext sub-string contained in the target path identification, and then, the target ciphertext sub-string is decrypted by using a target public and private key to obtain the corresponding target path information.
In an embodiment, the request instruction is sent by a terminal, and the terminal may add a terminal identifier of the registered terminal to the request instruction when sending the request instruction, or may determine the terminal sending the request instruction in advance, so that the corresponding public and private keys may be obtained by identifying the terminal identifier when receiving the request instruction.
Therefore, when a request instruction is received, whether the request instruction contains an encryption mark is determined, if the request instruction contains the encryption mark, the encryption mark is obtained, the corresponding path identifier is identified according to the encryption mark, ciphertext substrings contained in the path identifier are obtained and decrypted, corresponding path information is obtained, and finally the received request instruction is responded according to the obtained path information.
For example, when a request instruction is received, information included in the request instruction is identified to determine whether a ciphertext sub-string can be obtained for decryption, for example, the request instruction includes a token-by tag, that is, the request instruction includes an encryption tag. And then obtaining a corresponding path identifier according to the carried token niaed-by label and the hidden network identifier, taking the path identifier as user name @ realm @ A as an example, after obtaining the path identifier by identification, obtaining a ciphertext sub-string representing the path information by identification of the character string, namely the user name, and then decrypting the ciphertext sub-string according to the obtained decryption public and private key. When the path identifier is identified by the character string, the character string contained in the path identifier is determined by the character string division code "@" in the path identifier, that is, the method comprises the following steps: the username, realm and A can know that realm is the current network name through the identification of the character strings, A is the terminal identification of the registered terminal, and usemame is the encrypted ciphertext sub-string.
In addition, when the ciphertext substring is decrypted, the network element address corresponding to each network element of the recorded response request, that is, the corresponding path information is obtained.
And step S304, responding the request instruction according to the target path information.
After the path information is obtained, a response to the request instruction will be implemented according to the obtained path information.
For example, after the path information is obtained, that is, it is determined which network elements need to respond to the received request instruction, and further after the path information is obtained, since the path information records address information corresponding to each network element, each network element can be directly controlled to implement a response to the request instruction.
Referring to fig. 5, fig. 5 is an interaction diagram of a subscription message processing method of an IP multimedia subsystem according to an embodiment of the present application.
The method comprises the steps that a user terminal (UE), namely a Register terminal, sends a Register request (Register) to an SBC in an IMS (IP multimedia subsystem), the SBC completes the registration of the user terminal through information interaction with a CSCF (call session control function) network element, the CSCF returns a corresponding successful response message (200) to the SBC at the moment, so that the SBC also sends the successful response message (200) to the Register terminal to determine that the user terminal is registering, and after the user terminal receives the successful response message (200), the SBC is controlled to upload the Register information of the user terminal to a cloud database CDB, namely a REQ instruction is executed, an acknowledgement instruction (ACK) returned by the CDB is received, and at the moment, the user terminal is determined to complete the registration in the IMS.
After the SBC receives the CDB of the UE and receives the confirmation instruction returned by the CDB, the SBC receives a subscription request (Register) sent by the UE, and returns a success response message (200) based on the received subscription request, and simultaneously feeds back the request information (Notify) obtained by responding to the Register, wherein the CSCF sends the Notify to the SBC, the SBC then returns the Notify to the UE, and the SBC and the UE return the success response message (200) after receiving the Notify.
When the SBC is controlled to receive the subscription request sent by the UE, the subscription request sent by the user terminal is received within a certain time after the registration is completed, meanwhile, the SBC is instructed not to execute the sending of the P subscription, and the SBC is instructed to execute the sending of the P subscription only when the subscription request sent by the user terminal is not received, so that the occupation of a subscription memory is reduced.
In an embodiment, after the user terminal completes registration, the subscription request sent by the user terminal is used for realizing sharing of data information in the IMS, and meanwhile, the subscription request and related information do not need to be uploaded to a cloud database when sharing of the data information is realized, so that data interaction with the cloud database is reduced.
In the above-described method, device and storage medium for processing a subscription message of an IP multimedia subsystem, when it is determined that a registration terminal completes initial registration, within a preset time after the initial registration is completed, a subscription request sent by the registration terminal is received by a session border controller SBC of the IP multimedia subsystem, so as to indicate, based on the subscription request, that each network element in an IMS successfully registers the registration terminal, and also indicate that the SBC does not perform P-subscription sending. Since the registered terminal usually initiates the subscription request at the first time after the initial registration is completed, the SBC is controlled not to send the P subscription at the first time, and the current behavior of the SBC is determined by monitoring whether the registered terminal completes sending the subscription request within the preset time, which can effectively reduce useless consumption of the subscription memory. In addition, by reducing the message processing of the SBC network element and the data interaction between the SBC and other network elements, the use efficiency of the system CPU can be effectively improved.
Referring to fig. 6, fig. 6 is a schematic block diagram illustrating a structure of a subscription message processing device of an IP multimedia subsystem according to an embodiment of the present application.
Illustratively, the electronic device may be a cell phone, tablet, notebook, desktop, television, dedicated input device, cash dispenser, and the like.
The electronic device further comprises a processor, a memory for storing the computer program.
The processor is configured to execute the computer program and implement the subscription message processing method of any IP multimedia subsystem provided in the embodiment of the present application when executing the computer program.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In an embodiment, the above-described subscription message processing method of the IP multimedia subsystem is applied to a subscription message processing system of the IP multimedia subsystem, where the system includes a subscription message processing device of the IP multimedia subsystem and a registration terminal, and the number of the registration terminals is not limited. In the system, when the registered terminal determines that the registered terminal needs to be registered in the IMS, the registered terminal sends a registration request to the IMS, so that the IMS responds to the registration request of the registered terminal, and the subscription message processing device of the IP multimedia subsystem is used for finishing the registration of the registered terminal according to the above-described subscription message processing method of the IP multimedia subsystem.
It should be noted that the subscription message processing system of the IP multimedia subsystem is further connected to the corresponding cloud database, so that in the operation process of the system, data that needs to be recorded in the local database is uploaded to the cloud database, so that the transportation bureau performs data backup and update, and data is synchronized to the local database. In addition, in practical application, after the subscription message processing device of the IP multimedia subsystem completes the registration request to the registered terminal, it will also respond to the subsequent received request and subscription.
Embodiments of the present application further provide a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program causes the processor to implement any subscription message processing method of an IP multimedia subsystem provided in the embodiments of the present application.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable storage media, which may include computer readable storage media (or non-transitory media) and communication media (or transitory media).
The term computer-readable storage medium includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer-readable storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
For example, the computer readable storage medium may be an internal storage unit of the electronic device according to the foregoing embodiment, for example, a hard disk or a memory of the electronic device. The computer readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the electronic device.
The electronic device and the computer-readable storage medium provided by the foregoing embodiments enable information to be input through at least two virtual keyboards by displaying at least two virtual keyboards on different display areas on a display screen when a user inputs information; the difficulty of the malicious software for speculating the input information by monitoring the state of the sensor is improved, and the safety of information input is enhanced.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. A method for processing subscription messages of an IP multimedia subsystem, the method comprising the steps of:
returning a registration response to the registration terminal based on a registration request sent by the registration terminal to complete initial registration;
and within a preset time after the initial registration is completed, receiving a subscription request for completing the registration sent by the registration terminal through a Session Border Controller (SBC) of the IP multimedia subsystem, wherein the subscription request is used for indicating that the registration terminal is registered and indicating that the SBC does not execute the sending of the P subscription.
2. The method of claim 1, further comprising:
obtaining subscription information corresponding to the subscription request;
and obtaining corresponding extended information based on the subscription information, storing the extended information in a header field of SIP signaling obtained based on a Session Initiation Protocol (SIP), and placing the SIP signaling in a corresponding message route.
3. The method according to claim 1, wherein after returning a registration response to the registered terminal based on the registration request sent by the registered terminal to complete initial registration, further comprising:
and controlling the SBC to upload the registration message of the registered terminal to a cloud database CDB.
4. The method according to claim 2, wherein the obtaining corresponding extension information based on the subscription information to store the extension information in a header field of SIP signaling obtained based on a session initiation protocol SIP comprises:
and acquiring path information contained in the subscription information to encrypt the path information, and storing the encrypted path information in a header field of SIP signaling obtained based on a Session Initiation Protocol (SIP).
5. The method according to claim 4, wherein the encrypting the path information and storing the encrypted path information in a header field of SIP signaling obtained based on a session initiation protocol SIP comprises:
obtaining a public and private key corresponding to the registration terminal according to a preset encryption method, and encrypting the path information by using the public and private key to obtain a ciphertext sub-string, wherein the ciphertext sub-string is a character string;
acquiring a current network name, and associating the ciphertext substring with the current network name and the registration terminal identifier to obtain a corresponding path identifier;
and carrying out encryption marking on the path identifier, and storing the path identifier obtained by encryption marking in a header field of the SIP signaling.
6. The method of claim 5, wherein associating the ciphertext sub-string with the current network name and the registered terminal identifier to obtain a corresponding path identifier comprises:
converting the character strings of the current network name and the registered terminal identification;
and integrating the character string obtained by converting the character string with the ciphertext sub-string to obtain a corresponding path identifier.
7. The method of claim 5, wherein after placing the SIP signaling in the corresponding message route, further comprising:
when a request instruction is received, determining whether the request instruction contains an encryption identifier;
if the request command is determined to contain the encryption identifier, identifying the contained target encryption identifier, and identifying the path identifier according to the target encryption identifier;
decrypting the target ciphertext substring contained in the target path identifier to obtain target path information;
and responding to the request instruction according to the target path information.
8. The method according to claim 7, wherein the decrypting the target ciphertext sub-string included in the target path id to obtain the target path information comprises:
identifying a target terminal identifier contained in the request instruction to obtain a target public and private key corresponding to the target terminal identifier;
identifying the sub-character strings contained in the target path identification to extract and obtain the contained target ciphertext sub-strings;
and decrypting the target ciphertext substring based on the target public and private key to obtain corresponding target path information.
9. A subscription message processing device of an IP multimedia subsystem, comprising a memory and a processor;
the memory is used for storing a computer program;
the processor for executing the computer program and for implementing the steps of the subscription message handling method of the IP multimedia subsystem according to any of claims 1-8 when executing the computer program.
10. A subscription message processing system is characterized by comprising subscription message processing equipment of an IP multimedia subsystem and a registration terminal, wherein the registration terminal sends a registration request to the subscription message processing equipment of the IP multimedia subsystem; the subscription message handling device of the IP multimedia subsystem is adapted to perform the steps of the subscription message handling method of the IP multimedia subsystem as claimed in any one of claims 1 to 8 in response to a registration request of the registered terminal.
11. A storage medium for computer readable storage, wherein the storage medium stores one or more programs which are executable by one or more processors to implement the steps of the subscription message handling method of an IP multimedia subsystem as claimed in any one of claims 1 to 8.
CN202010443349.8A 2020-05-22 2020-05-22 Subscription message processing method, device, system and storage medium Pending CN113726718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010443349.8A CN113726718A (en) 2020-05-22 2020-05-22 Subscription message processing method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010443349.8A CN113726718A (en) 2020-05-22 2020-05-22 Subscription message processing method, device, system and storage medium

Publications (1)

Publication Number Publication Date
CN113726718A true CN113726718A (en) 2021-11-30

Family

ID=78671345

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010443349.8A Pending CN113726718A (en) 2020-05-22 2020-05-22 Subscription message processing method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN113726718A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150458A (en) * 2022-05-20 2022-10-04 阿里云计算有限公司 Device management system and method
CN115834679A (en) * 2022-11-23 2023-03-21 中国电信股份有限公司 Notification message pushing method and system
CN117834721A (en) * 2023-12-15 2024-04-05 天翼云科技有限公司 Message subscription notification method and system supporting delivery confirmation

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115150458A (en) * 2022-05-20 2022-10-04 阿里云计算有限公司 Device management system and method
CN115834679A (en) * 2022-11-23 2023-03-21 中国电信股份有限公司 Notification message pushing method and system
CN115834679B (en) * 2022-11-23 2024-06-07 中国电信股份有限公司 Notification message pushing method and system
CN117834721A (en) * 2023-12-15 2024-04-05 天翼云科技有限公司 Message subscription notification method and system supporting delivery confirmation

Similar Documents

Publication Publication Date Title
US11468151B2 (en) System and method for memetic authentication and identification
WO2019184135A1 (en) Application login method and apparatus, and computer device and storage medium
US20200320222A1 (en) Information management method, apparatus, and information management system
US20190236300A1 (en) Service processing method and apparatus, data sharing system, and storage medium
CN113726718A (en) Subscription message processing method, device, system and storage medium
CN109936529B (en) Method, device and system for secure communication
US20180365395A1 (en) Multimedia data processing method, apparatus, system, and storage medium
CN107196917B (en) Service response method and middleware thereof
US11368841B2 (en) Network access authentication method and device
US20150163065A1 (en) Identity authentication method and apparatus and server
US12003364B2 (en) Compromised network node detection system
US9854508B2 (en) Downloadable ISIM
US20170373850A1 (en) Data encryption method, decryption method, apparatus, and system
CN107172001B (en) Control method and device of website proxy server and key proxy server
US10798080B2 (en) User authentication in communication systems
CN112738117A (en) Data transmission method, device and system, storage medium and electronic device
US20230079672A1 (en) Cross-chain data transmission method and apparatus, computer device, storage medium, and computer program product
CN102045335B (en) Terminal device, signature generation server, simple id management system, simple id management method
US20210184854A1 (en) Device validation using tokens
CN111405018B (en) File transmission method and device, electronic equipment and storage medium
CN103561063A (en) Method and terminal for logging onto set top box
WO2020228304A1 (en) Information interaction method and apparatus, and computer device and readable storage medium
US20240086562A1 (en) User data management method and related device
CN111327680B (en) Authentication data synchronization method, device, system, computer equipment and storage medium
WO2015096483A1 (en) Terminal application registration method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20211130

WD01 Invention patent application deemed withdrawn after publication