CN115226095B - Privacy number application method and system based on IMS network - Google Patents

Privacy number application method and system based on IMS network Download PDF

Info

Publication number
CN115226095B
CN115226095B CN202211137865.3A CN202211137865A CN115226095B CN 115226095 B CN115226095 B CN 115226095B CN 202211137865 A CN202211137865 A CN 202211137865A CN 115226095 B CN115226095 B CN 115226095B
Authority
CN
China
Prior art keywords
privacy
calling
privacy number
called
cscf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211137865.3A
Other languages
Chinese (zh)
Other versions
CN115226095A (en
Inventor
陈文体
莫荣
曾周静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Czty Sci & Tech Co ltd
Original Assignee
Hangzhou Czty Sci & Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Czty Sci & Tech Co ltd filed Critical Hangzhou Czty Sci & Tech Co ltd
Priority to CN202211137865.3A priority Critical patent/CN115226095B/en
Publication of CN115226095A publication Critical patent/CN115226095A/en
Application granted granted Critical
Publication of CN115226095B publication Critical patent/CN115226095B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses an application method and an application system of a privacy number based on an IMS network, wherein the system comprises the following steps: the system comprises a privacy number platform, an HSS, a privacy number attribution S-CSCF, a privacy number attribution I-CSCF and an ENUM/DNS; the HSS stores a calling number, a privacy number, a called number and an IFC rule configured for the privacy number, wherein the IFC rule comprises that the trigger state of the privacy number is set to be registered or unregistered, and the called party of the privacy number is anchored to an IMS network; after receiving a call request from a calling party, obtaining the address of a privacy number I-CSCF through ENUM/DNS inquiry, sending an INVITE message to the privacy number attribution I-CSCF, then routing the INVITE message to a corresponding S-CSCF, and triggering a privacy number service to connect the call to a privacy number platform by the S-CSCF according to an IFC rule configured by the privacy number. According to the invention, the IFC rule is configured for the privacy number to trigger the privacy protection service, no additional operation is required except for configuring the IFC rule, and the operation of privacy protection is simplified.

Description

Privacy number application method and system based on IMS network
Technical Field
The invention relates to the field of communication, in particular to an application method of a privacy number in an IMS network.
Background
In recent years, electronic commerce and mobile internet are rapidly developed, people need to connect mobile phone numbers with the outside every day for online shopping, taxi taking and taking, early mobile phone numbers are all naked, and once personal number information is revealed, various harassments and frauds are faced. Therefore, privacy protection of the personal mobile phone number under the internet ecosystem is an urgent problem to be solved.
The privacy number service is mainly characterized in that an intermediate number is added between two communication parties to isolate the numbers of the two communication parties, and the two communication parties are communicated with each other by the intermediate number to prevent the numbers from being exposed. For example, an express delivery take-away service may use a privacy number to communicate.
The current platform for providing privacy number protection is realized in a mode of MSC based on 2G and 3G modes, along with the development of mobile communication technology, the privacy number protection platform based on IMS networking also appears in succession, the mode realization based on SCSCF is realized, a Diameter interface and an ENUM/DNS interface are required to be applied in the realization mode, and the position registration and the registration process of privacy numbers are required to be realized. In addition, the scheme based on the SCSCF has too large permission, which is not beneficial to service management and control, so that a privacy number application method which can be accessed more flexibly and meets the network access requirements of operators is urgently needed.
Disclosure of Invention
In order to solve the flexibility of private number access, the application provides an application method of the private number.
An IMS network based privacy number application method comprises the following steps:
configuring an IFC rule of a privacy number, setting a trigger state of the privacy number to be registered or unregistered, and anchoring the called privacy number to an IMS network;
receiving calling information, calling a user data request according to the calling information, issuing a corresponding IFC rule according to the user data request, triggering privacy number service according to the IFC rule, filling the calling number of the calling information into a privacy number, constructing a new calling route, and calling a called number. And the IFC rule is utilized to trigger the privacy number service, and the calling number is displayed as the privacy number, so that the trouble in the privacy number registration process is reduced.
Further, configuring an IFC rule of the privacy number, specifically configuring a trigger rule according to the following sequence:
triggering an INVITE message; MT called process triggering; the trigger state is registered or unregistered; setting an exception; the called party is anchored to the IMS network.
Further, the method also comprises deleting the template ID of the IFC rule or modifying the MMTEL AS control parameter for removing the maximum concurrency limit of the privacy number.
Further, receiving calling information, calling a user data request according to the calling information, issuing a corresponding IFC rule according to the user data request, and triggering a private number service according to the IFC rule, the method includes: receiving calling information, judging whether the SIP session of the current calling belongs to a called receiving stage, sending SAR information through a Diameter protocol format, returning to SAA information to send a corresponding IFC rule, triggering once according to a triggering rule in the IFC rule, and triggering privacy number service through the INVITE message.
Further, filling the number of the calling information as a private number, and constructing a new calling route, specifically including: and matching a calling number and a called number in the calling information, matching a privacy binding relationship corresponding to the calling number and the called number, constructing a privacy INVITE message, filling the calling number into a privacy number, and adding an orig identifier in a called route to indicate a new calling route.
Further, calling the called number includes: and responding the 180 Ringing message according to the privacy INVITE message, and calling through transparent transmission and the 180 Ringing message.
Further, the VOLTE attribute of opening the privacy number is also included.
The invention also discloses an application system of the privacy number, which comprises the following steps: the privacy number platform, the HSS and the privacy number attribution S-CSCF;
the HSS stores a calling number, a called number, a privacy number and an IFC rule configured for the privacy number, wherein the IFC rule comprises the steps of setting the trigger state of the privacy number to be registered or unregistered and anchoring the called privacy number to an IMS network;
the private number attribution is used for receiving calling information, calling a user data request to an HSS according to the calling information, the HSS issues a corresponding IFC rule according to the user data request, and the private number attribution triggers private number service to a private number platform according to the IFC rule;
and the privacy number platform is used for filling the calling number of the calling information into a privacy number, constructing a new calling route and calling the called number.
Further, the privacy number platform comprises:
the call session management module is used for transmitting and distributing the strategy of the SIP protocol and receiving the service logic control sent by the service processing module;
the SIP processing module is used for realizing an SIP protocol;
the media gateway service module is used for providing an IP address and a port and sending and receiving media data streams;
the service processing module is used for processing the service logic and issuing service logic control;
the data management module is used for storing service logic data, and the service logic data comprises the privacy binding relationship between a calling number and a called number;
and the external interface management module is used for providing an API interface.
And the playback session management module is used for applying a media data stream to the media gateway service module according to the service data issued by the service processing and management module, negotiating through an SIP protocol, and playing back different service scenes according to playback time points.
And the recording session management module is used for recording the voice of both parties of the call and identifying the DTMF code.
And the video color ring session management module is used for playing the video color ring.
The invention has the beneficial effects that:
according to the invention, the IFC rule is configured for the privacy number to trigger the privacy protection service, no additional operation is needed except for configuring the IFC rule, so that the privacy number can use virtual number resources, registration is not needed, communication networking can be accessed more simply and conveniently, and the operation of privacy protection is simplified. Moreover, by using the anchoring configuration in the rule, the influence of the networking environment where the calling party and the called party are located on the service is avoided, and the IMS network anchoring the privacy number in the 2/3/4G networking can process the service no matter the calling party and the called party are in the 2/3/4G networking.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a connection relationship between the application platform and each communication platform;
fig. 2 is a schematic call flow diagram from an IMS domain to an IMS domain;
fig. 3 is a schematic call flow diagram from the IMS domain to the CS domain;
fig. 4 is a call flow diagram from CS domain to IMS domain;
fig. 5 is a CS domain to CS domain call flow diagram.
Detailed Description
In order to make the purpose, features and advantages of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the embodiments described below are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The invention is further elucidated with reference to the drawings and the embodiments.
The following explanations of terms and acronyms related to the field may be used in the examples:
MDN: mobile phone Number (Mobile Directory Number);
IMSI is International Mobile Subscriber Identity (International Mobile Subscriber Identity);
MO: terminal originated (Mobile asset);
MT: terminal received (Mobile Terminated);
LTE: long-Term Evolution (Long-Term Evolution);
VOLTE: a Voice over Long-Term Evolution (Voice over Long-Term Evolution);
IMS: IP multimedia Subsystem (IP multimedia Subsystem);
HSS: a Home subscriber Server (Home subscriber Server);
S-CSCF, serving-Call Session Control Function (Server-Call Session Control Function);
an I-CSCF, an inquiry-Call Session Control Function (Interrogating-Call Session Control Function);
IP-SM-GW: an IP Short Message Gateway (IP Short Message Gateway);
MGCF: media Gateway Control Function (Media Gateway Control Function);
SMC: short-Message Center (Short-Message Center);
ENUM: telephone Number Mapping (E.164 Number UR I Mapping);
DNS: a Domain Name Server (Domain Name Server);
MAP: mobile Application Part (Mobile Application Part);
SIP: session Initiation Protocol (Session Initiation Protocol);
diameter: diameter protocol name
URI: a Uniform Resource Identifier (Uniform Resource Identifier);
API: an Application Programming Interface (Application Programming Interface);
CS: circuit Switched (Circuit Switched);
RTP: real-time Transport Protocol (Real-time Transport Protocol);
GSM: global System for Mobile Communications (Global System for Mobile Communications);
example 1
The embodiment provides an application system of a privacy number, as shown in fig. 1, including a privacy number platform, an HSS, a privacy number attribution S-CSCF, a privacy number attribution I-CSCF, and an ENUM/DNS.
After receiving a call request which a calling party arrives, acquiring an address of a privacy number I-CSCF through ENUM/DNS inquiry, sending an INVITE message to the privacy number attribution I-CSCF and then routing the INVITE message to a corresponding S-CSCF, connecting the call to a privacy number platform by the S-CSCF according to an IFC rule configured by the privacy number, and completing number hiding and other value added service by the privacy number platform.
The HSS stores a calling number, a privacy number, a called number and an IFC rule configured for the privacy number, wherein the IFC rule comprises the steps of setting the trigger state of the privacy number to be registered or unregistered and anchoring the called privacy number to the IMS network.
And the privacy number attribution receives an INVITE message of calling information, judges that the current SIP session belongs to a called receiving stage, calls a user data request to an HSS according to the calling information, the HSS issues a corresponding IFC rule according to the user data request, and triggers privacy number service to a privacy number platform according to the IFC rule.
And the privacy number platform is used for filling the calling number of the calling information into a privacy number, constructing a new calling route and calling the called number.
The communication between these several platforms will be described in detail in the description of the method of example 2.
Wherein, privacy number platform includes: the system comprises an SIP processing module, a media gateway service module, a service processing module, a data management module, an external interface management module, a call session management module and other session management modules, namely a playback session management module, a recording session management module and a video polyphonic ringtone session management module, wherein the other session management modules are value-added services.
The SIP processing module is used for realizing a SIP protocol stack conforming to the network standard of an operator, and comprises RFC3261, RFC3212 and RFC3213 protocols, wherein the RFC3261 is a voice call base protocol, and RFC3212 and RFC3213 are other value-added service protocols. Meanwhile, the SIP processing module also provides an internal interface for external use, and the SIP information is secondarily packaged and then provided to various session management modules for service logic control, decoupling protocol analysis and service control.
The media gateway service module is responsible for the services of the media layer, needs to participate in the media gateway service module before and after the call is established, provides the IP address and the port negotiated by the local terminal platform, and is responsible for sending and receiving the RTP media data stream. The media gateway service module supports several common media coding formats including PCM, ARM-NB, AMR-WB and business models of playing, recording and receiving DTMF.
The service processing module is responsible for the service logic processing of the privacy number, when receiving messages reported by various session management modules, the service processing module can inquire service data to be executed in a database according to the calling and called number information and issue the service data, wherein the service data comprises control logics such as recording and playing logics, DTMF (dual tone frequency) receiving and sending logics, switching hang-up and the like.
And the data management module is used for storing the service logic data and inquiring the service logic data at a high speed. The method stores the conversion relation among the calling number, the private number and the called number, namely the private binding relation between the calling number and the called number, and also stores various service arrangement rules, such as whether the calling number performs sound reproduction, sound recording and number reception before, during and after the call, and is realized based on a distributed redis open source framework on a technical framework.
The external interface management module provides an API interface for actual customer calling, receives the customer number, the privacy number and calling service logic, such as playback and recording information, to the system platform through calling of the API interface, records the information in the database management module, and executes corresponding flow according to the stored service model after the call arrives.
The calling session management module is responsible for the transparent transmission and distribution strategy of the SIP protocol, reports to the service processing module when a call arrives, determines whether to access other module groups according to the issued data of the service processing module, if no additional service requirement exists, the calling and called parties are directly connected through the privacy number, the calling number is filled as the privacy number, a new calling route is constructed, and the called number is called.
And the recording session management module is responsible for voice recording and DTMF identification of both parties of the call. When the call process needs to start recording or receive DTMF code, the service processing module sends corresponding service logic control to the recording session management module, the recording session management module applies for media resource from the media gateway service module, and after the media plane of the call is established, the call content of the two parties is recorded into a file with a specified format.
The video color ring back tone session management module is responsible for value added services in IMS calls, and the platform determines whether to play the video color ring back tone for the calling party according to the capability determination and the service rule of the called number. The video polyphonic ringtone session management module not only needs to be responsible for the renegotiation of the media types, but also needs to control the media gateway service module to play the appointed polyphonic ringtone file.
Example 2
The embodiment provides a method for applying a privacy number based on the application system of the privacy number in embodiment 1. The application system of the privacy number comprises a privacy number platform, an HSS, a privacy number attribution S-CSCF, a privacy number attribution I-CSCF and an ENUM/DNS.
And accessing the privacy number platform to an IMS network, and communicating with the privacy number attribution S-CSCF network element through an ICS interface.
Before accessing a privacy number platform, configuration data for accessing an IMS network is required to be applied for the privacy number platform, wherein the configuration data comprises a domain name address of the privacy number platform and an IFC template ID, and VOLTE attributes of privacy numbers are opened. The privacy number platform is exemplified AS a general domain name format of the SIP AS access to the IMS network, for example, asynsi. Xx. IMS. China. Cn, and the template ID may be assigned a free ID, for example, 3015, according to the actual plan of the operator.
Configuring IFC rules for the privacy numbers in the HSS, wherein the IFC rules are used for triggering privacy number services, and the specific configuration rules and the sequence are as follows:
INIVTE triggering.
And 2. The MT called flow triggers.
Method = invite AND (SessionCase = "TERMINATING _ register" OR SessionCase = "TERMINATING _ UNREGISTERED"). The privacy number is set to a state that is triggered regardless of whether the privacy number is registered or unregistered.
DefaultHandling is set to SESSION-TERMINATED. If abnormal, the flow ends.
5. The privacy number is set to be anchored to the IMS network for the called party. The call of the CS domain can be anchored in the IMS network, and the use process of the privacy number set by the method is executed.
Meanwhile, the MMTel AS in the IMS network can limit the maximum concurrent number of the privacy number, so the IFC template ID in the MMTel AS is removed from the data configuration, the whole calling process does not pass through the MMTEL AS, and the limit of the maximum concurrent number of the privacy number is relieved. So that the same privacy number can call multiple called numbers simultaneously. The maximum number of concurrent dropped calls can also be achieved by modifying the control parameters on the MMTel AS.
1. Call origination in IMS domain call termination in IMS domain call flow is shown in fig. 2.
(1) After receiving a call request sent by a User Agent (UA), an I/S-CSCF where a calling number A is located inquires and acquires an address of the I-CSCF where a privacy number is located through an internet protocol multimedia subsystem (ENUM)/Domain Name System (DNS), and sends an INVITE message to the I-CSCF where the privacy number belongs and then routes the INVITE message to a corresponding S-CSCF.
(2) After receiving the INVITE message, the privacy number attribution S-CSCF judges that the current SIP session situation belongs to a called receiving stage, and meanwhile, because the privacy number is not registered, the S-CSCF does not store the IFC rule of the privacy number, the S-CSCF sends an SAR message to the HSS through a Diameter protocol format for requesting the HSS to download user data, and the HSS returns an SAA message to issue the IFC rule. And the S-CSCF triggers the INVITE message to a privacy number platform in sequence according to the obtained IFC rules.
(3) After receiving the INVITE message, the privacy number platform takes out the calling number a and the called number B, matches the called number a and the called number B in the INVITE message in the data management module, matches the called number B with the corresponding privacy binding relationship, and constructs a new INVITE message, wherein the calling number a is filled as the privacy number X, the called number is a target called number, and an orig identifier is added in a Route field to indicate that the called number is a new call, and the INVITE message is sent to the S-CSCF in the calling direction.
(4) The S-CSCF receives a strip orig to indicate that the call is an originating call, takes out the called number, acquires the address of the I-CSCF where the called is located through ENUM/DNS inquiry, and sends INVITE to the address.
(5) And the called I-CSCF receives the INVITE message, walks the normal call flow and sends the INVITE message to the UE, the UE responds to the 180 Ringing message, and the called I-CSCF responds to the privacy number attribution S-CSCF with the 180 Ringing message.
(6) And the S-CSCF to which the privacy number belongs transparently transmits 180 Ringing to the privacy number platform.
(7) After receiving the 180 Ringing message, the privacy number platform also responds 180 Ringing response to the previous call and sends the response to the S-CSCF.
(8) And the privacy number attribution S-CSCF transparently transmits 180 Ringing to the calling I/S-CSCF, and finally responds to the calling terminal.
(9) The called UE user picks up the phone and sends 200 OK (INVITE) message, and the called I-CSCF transparently transmits 200 OK (INVITE) to the S-CSCF to which the privacy number belongs.
(10) The S-CSCF to which the privacy number belongs passes through 200 OK (INVITE) to the privacy number platform.
(11) After the privacy number platform receives the 200 OK (INVITE) message, the call at the back end is established, and the privacy number platform also constructs the previous path of response 200 OK (INVITE) and sends the response to the privacy number attribution S-CSCF.
(12) The privacy number attribution S-CSCF transparently transmits 200 OK (INVITE) to the calling I/CSCF, and finally routes to the calling user, and the calling and called parties can talk with each other at the moment.
(13) And the calling subscriber firstly hangs up and sends a BYE message, and the I/CSCF where the calling subscriber is located sends the BYE message to the S-CSCF to which the privacy number belongs.
(14) And the privacy number attribution S-CSCF sends the BYE message to the privacy number platform.
(15) The privacy number platform makes a 200 OK (BYE) confirmation response to the BYE message.
(16) The privacy number attribution S-CSCF transmits 200 OK (BYE) to the calling I/S-CSCF and finally routes to the calling user, and the forward call is released.
(17) And the privacy number platform sends a BYE message to the next section of call and sends the BYE message to the S-CSCF to which the privacy number belongs while responding to 200 OK (BYE) to the calling subscriber.
(18) And the S-CSCF to which the privacy number belongs sends the BYE message to the called I/S-CSCF and finally routes the BYE message to the called user.
(19) The called user responds to the BYE message 200 OK (BYE), and the S-CSCF to which the privacy number belongs is transmitted back through the called I/S-CSCF.
(20) And the privacy number attribution S-CSCF transmits the 200 OK (BYE) back to the privacy number platform in a transparent way to complete the releasing operation of the next section of call.
2. The call flow of the originated call in the IMS domain and the terminated call in the CS domain is shown in fig. 3.
(1) After receiving a call request sent by a UA, the I/S-CSCF where the calling number A is located acquires the address of the I-CSCF where the privacy number is located through ENUM/DNS inquiry, and sends an INVITE message to the privacy number attributive I-CSCF to be routed to the corresponding S-CSCF.
(2) After receiving the INVITE message, the privacy number attribution S-CSCF judges that the current SIP session situation belongs to a called receiving stage, and meanwhile, because the privacy number is not registered, the S-CSCF does not store the IFC rule of the privacy number, the S-CSCF sends an SAR message to the HSS through a Diameter protocol format for requesting the HSS to download user data, and the HSS returns an SAA message to issue the IFC rule. And the S-CSCF triggers the INVITE message to a privacy number platform according to the acquired IFC rules in sequence.
(3) After receiving the INVITE message, the privacy number platform takes out the calling number a and the called number B, matches the called number a and the called number B in the INVITE message in the data management module, matches the called number B with the corresponding privacy binding relationship, and constructs a new INVITE message, wherein the calling number a is filled as the privacy number X, the called number is a target called number, and an orig identifier is added in a Route field to indicate that the called number is a new call, and the INVITE message is sent to the S-CSCF in the calling direction.
(4) The S-CSCF receives a strip orig to indicate that the calling is an originating call, and the called domain is selected in the CS network after the domain selection, and sends an INVITE message to the MGCF gateway.
(5) MGCF gateway converts SIP INVITE message into BICC IAM message and sends to MSC of called position and finally pages to called UE.
(6) The called UE responds to the ACM message back to the MGCF gateway through the MSC.
(7) The MGCF gateway converts the ACM to a 180 Ringing message back to the privacy number home S-CSCF.
(8) And the S-CSCF to which the privacy number belongs transparently transmits 180 Ringing to the privacy number platform.
(9) After receiving the 180 Ringing message, the privacy number platform also responds 180 Ringing response to the previous call and sends the response to the S-CSCF.
(10) And the privacy number attribution S-CSCF transparently transmits 180 Ringing to the calling I/S-CSCF, and finally responds to the calling terminal.
(11) The called UE user takes off the phone, sends ANM message, and sends to MGCF gateway through MSC.
(12) The MGCF gateway converts the ANM off-hook message to a 200 OK (INVITE) message and sends it to the privacy number home S-CSCF.
(13) The S-CSCF to which the privacy number belongs passes through 200 OK (INVITE) to the privacy number platform.
(14) After the privacy number platform receives the 200 OK (INVITE) message, the call at the back end is established, and the privacy number platform also constructs the previous path of response 200 OK (INVITE) and sends the response to the privacy number attribution S-CSCF.
(15) The privacy number attribution S-CSCF transparently transmits 200 OK (INVITE) to the calling I/CSCF, and finally routes to the calling user, and the calling and called parties can talk with each other at the moment.
(16) The calling user firstly hangs up and sends a BYE message, and the I/CSCF where the calling user is located sends the BYE message to the S-CSCF to which the privacy number belongs.
(17) And the privacy number attribution S-CSCF sends the BYE message to the privacy number platform.
(18) The privacy number platform responds with a 200 OK (BYE) acknowledge to the BYE message.
(19) The privacy number attribution S-CSCF transmits 200 OK (BYE) to the calling I/S-CSCF and finally routes to the calling user, and the forward call is released.
(20) And the privacy number platform sends a BYE message to the next section of call and sends the BYE message to the S-CSCF to which the privacy number belongs while responding to 200 OK (BYE) to the calling subscriber.
(21) And the S-CSCF to which the privacy number belongs sends the BYE message to the MGCF gateway.
(22) The MGCF gateway converts the BYE message into an REL message and sends the REL message to the MSC where the called party is located, and finally sends the REL message to the called party UE.
(23) The calling user responds RLC message to the REL message and sends it to MGCF through MSC where the called user is.
(24) The MGCF converts the RLC message to 200 OK (BYE) and routes to the privacy number home S-CSCF.
(25) And the S-CSCF to which the privacy number belongs transparently transmits 200 OK (BYE) back to the privacy number platform to complete the release operation of the next section of call.
3. Call origination in CS Domain the call flow in IMS Domain is terminated, as shown in FIG. 4.
(1) The MSC where the calling party is located sends an SRI message to the HSS to request to acquire the roaming number of the called party.
(2) The fused HLR/HSS returns the T-CSI (Terminating CAMEL Subscription Information) Subscription Information to the MSC Server through the MAP _ SEND _ ROUTING _ Information _ CNF message, wherein the message carries the Anchor AS address.
(3) The calling MSC Server sends an IDP (initial Detection position) message to the Anchor AS to trigger and acquire the called IMRN number.
(4) The Anchor AS sends a Connect message (carrying the IMRN number) to the calling MSC Server.
(5) The calling MSC Server analyzes the number of IMRN routing prefix, acquires the next hop address as MGCF, and routes the call request to the MGCF.
(6) MGCF analyzes the number of IMRN routing prefix, converts IAM message into INVITE message, and routes the call request to I-CSCF to which the privacy number belongs and finally to S-CSCF.
(7) After receiving the INVITE message, the privacy number attribution S-CSCF judges that the current SIP session situation belongs to the called receiving stage, and meanwhile, because the privacy number is not registered and the IFC rule of the privacy number is not stored in the S-CSCF, the S-CSCF sends an SAR message to the HSS through a Diameter protocol format for requesting the HSS to download user data, and the HSS returns an SAA message to issue the IFC rule. And the S-CSCF triggers the INVITE message to a privacy number platform according to the acquired IFC rules in sequence.
(8) After receiving the INVITE message, the privacy number platform takes out the calling number a and the called number B, matches the called number a and the called number B in the INVITE message in the data management module, matches the called number B with the corresponding privacy binding relationship, and constructs a new INVITE message, wherein the calling number a is filled as the privacy number X, the called number is a target called number, and an orig identifier is added in a Route field to indicate that the called number is a new call, and the INVITE message is sent to the S-CSCF in the calling direction.
(9) The S-CSCF receives a strip orig indicating that the calling is an originating call, takes out the called number, acquires the address of the I-CSCF where the called is located through ENUM/DNS inquiry, and sends INVITE to the address.
(10) And the called I-CSCF receives the INVITE message, walks the normal call flow and sends the INVITE message to the UE, the UE responds to the 180 Ringing message, and the called I-CSCF responds to the S-CSCF to which the privacy number belongs.
(11) And the S-CSCF to which the privacy number belongs transparently transmits 180 Ringing to the privacy number platform.
(12) After receiving the 180 Ringing message, the privacy number platform also responds 180 Ringing response to the previous call and sends the response to the S-CSCF.
(13) And the privacy number attribution S-CSCF transparently transmits 180 Ringing to the MGCF.
(14) MGCF converts 180 Ringing into ACM message to be sent to MSC where calling party is located, and finally to be sent to calling party.
(15) The called UE user picks up the phone and sends 200 OK (INVITE) message, and the called I-CSCF transmits 200 OK (INVITE) to the privacy number attribution S-CSCF.
(16) The privacy number home S-CSCF passes through 200 OK (INVITE) to the privacy number platform.
(17) After the privacy number platform receives the 200 OK (INVITE) message, the call at the back end is established, and the privacy number platform also constructs the previous path of response 200 OK (INVITE) and sends the response to the privacy number attribution S-CSCF.
(18) The privacy number home S-CSCF routes 200 OK (INVITE) back to MGCF.
(19) MGCF converts 200 OK (INVITE) to ANM message routing to the calling MSC and ultimately to the calling subscriber.
(20) The calling subscriber first hangs up and sends a REL message to the MGCF via the MSC.
(21) MGCF converts REL message into BYE message and routes to S-CSCF belonging to privacy number.
(22) And the privacy number attribution S-CSCF sends the BYE message to a privacy number platform.
(23) The privacy number platform makes a 200 OK (BYE) confirmation response to the BYE message.
(24) The privacy number home S-CSCF routes 200 OK (BYE) to the MGCF.
(25) The MGCF converts 200 OK (BYE) into an RLC message that is routed back to the calling MSC, and the forward call is released.
(26) And the privacy number platform sends a BYE message to the next section of call and sends the message to the privacy number attribution S-CSCF while responding to 200 OK (BYE) to the calling subscriber.
(27) The privacy number attribution S-CSCF sends the BYE message to the called I/S-CSCF and finally routes the BYE message to the called user.
(28) The called user responds to the BYE message 200 OK (BYE), and the privacy number attribution S-CSCF is transmitted back through the called I/S-CSCF.
(29) And the S-CSCF to which the privacy number belongs transparently transmits 200 OK (BYE) back to the privacy number platform to complete the release operation of the next section of call.
4. Call origination in CS Domain the call flow in CS Domain is terminated as shown in FIG. 5.
(1) The MSC where the calling party is located sends SRI information to the HSS to request for obtaining the roaming number of the called party.
(2) The fused HLR/HSS returns the T-CSI (Terminating CAMEL Subscription Information) Subscription Information to the MSC Server through the MAP _ SEND _ ROUTING _ Information _ CNF message, wherein the message carries the Anchor AS address.
(3) The calling MSC Server sends IDP (initial Detection position) message to Anchor AS to trigger and obtain called IMRN number.
(4) The Anchor AS sends a Connect message (carrying the IMRN number) to the calling MSC Server.
(5) The calling MSC Server analyzes the number of IMRN routing prefix, acquires the next hop address as MGCF, and routes the call request to the MGCF.
(6) MGCF analyzes the number of IMRN routing prefix, converts IAM message into INVITE message and routes the call request to the privacy number attribution I-CSCF and finally to S-CSCF.
(7) After receiving the INVITE message, the privacy number attribution S-CSCF judges that the current SIP session situation belongs to the called receiving stage, and meanwhile, because the privacy number is not registered and the IFC rule of the privacy number is not stored in the S-CSCF, the S-CSCF sends an SAR message to the HSS through a Diameter protocol format for requesting the HSS to download user data, and the HSS returns an SAA message to issue the IFC rule. And the S-CSCF triggers the INVITE message to a privacy number platform according to the acquired IFC rules in sequence.
(8) After receiving the INVITE message, the privacy number platform takes out the calling number a and the called number B, matches the called number a and the called number B in the INVITE message in the data management module, matches the called number B with the corresponding privacy binding relationship, and constructs a new INVITE message, wherein the calling number a is filled as the privacy number X, the called number is a target called number, and an orig identifier is added in a Route field to indicate that the called number is a new call, and the INVITE message is sent to the S-CSCF in the calling direction.
(9) The S-CSCF receives a strip orig to indicate that the call is an originating call, the called domain is selected in the CS network after the AS is selected through the domain, and the INVITE message is sent to the MGCF gateway.
(10) MGCF gateway converts SIP INVITE message into BICC IAM message and sends to MSC of called position and finally pages to called UE.
(11) The called UE responds to the ACM message back to the MGCF gateway through the MSC.
(12) The MGCF gateway converts the ACM to a 180 Ringing message back to the privacy number attribution S-CSCF.
(13) And the privacy number attribution S-CSCF transparently transmits 180 Ringing to a privacy number platform.
(14) After receiving the 180 Ringing message, the privacy number platform also responds 180 Ringing response to the previous call and sends the response to the S-CSCF.
(15) And the privacy number attribution S-CSCF transparently transmits 180 Ringing to the MGCF.
(16) MGCF converts 180 Ringing into ACM message to be sent to MSC where calling party is located, and finally to be sent to calling party.
(17) The called UE user takes off the phone, sends ANM message, and sends to MGCF gateway through MSC.
(18) The MGCF gateway converts the ANM off-hook message to a 200 OK (INVITE) message and sends it to the privacy number home S-CSCF.
(19) The S-CSCF to which the privacy number belongs passes through 200 OK (INVITE) to the privacy number platform.
(20) After the privacy number platform receives the 200 OK (INVITE) message, the call at the back end is already established, and the privacy number platform also constructs the previous path of response 200 OK (INVITE) and sends the response to the privacy number attribution S-CSCF.
(21) The privacy number home S-CSCF routes 200 OK (INVITE) back to MGCF.
(22) MGCF converts 200 OK (INVITE) to ANM message routing to the calling MSC and ultimately to the calling subscriber.
(23) The calling subscriber first hangs up and sends a REL message to the MGCF via the MSC.
(24) MGCF converts REL message into BYE message and routes to S-CSCF belonging to privacy number.
(25) And the privacy number attribution S-CSCF sends the BYE message to the privacy number platform.
(26) The privacy number platform makes a 200 OK (BYE) confirmation response to the BYE message.
(27) The privacy number home S-CSCF routes 200 OK (BYE) to the MGCF.
(28) The MGCF converts 200 OK (BYE) into an RLC message that is routed back to the calling MSC, and the forward call is released.
(29) And the privacy number platform sends a BYE message to the next section of call and sends the BYE message to the privacy number attribution S-CSCF while responding to 200 OK (BYE) to the calling party.
(30) And the privacy number attribution S-CSCF sends the BYE message to the MGCF gateway.
(31) The MGCF gateway converts the BYE message into an REL message and sends the REL message to the MSC where the called party is located, and finally sends the REL message to the called party UE.
(32) The called user responds to the RLC message to the REL message and sends the RLC message to the MGCF through the MSC where the called user is located.
(33) The MGCF converts the RLC message to 200 OK (BYE) and routes it to the S-CSCF to which the privacy number belongs.
(34) And the privacy number attribution S-CSCF transmits the 200 OK (BYE) back to the privacy number platform in a transparent way to complete the releasing operation of the next section of call.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (9)

1. An application method of privacy number based on IMS network is characterized by comprising the following steps:
configuring an IFC rule of a privacy number, setting a trigger state of the privacy number to be registered or unregistered, and anchoring the called privacy number to an IMS network;
and deleting the template ID of the IFC rule or modifying the MMTel AS control parameter for removing the maximum concurrency limit of the privacy number;
receiving calling information, calling a user data request according to the calling information, issuing a corresponding IFC rule according to the user data request, triggering privacy number service according to the IFC rule, filling the calling number of the calling information into a privacy number, constructing a new calling route, and calling a called number.
2. The method for applying the IMS network-based privacy number according to claim 1, wherein the IFC rule of the privacy number is configured, specifically, the trigger rule is configured in the following order:
triggering an INVITE message; MT called process triggering; the trigger state is registered or unregistered; setting an exception; the called party is anchored to the IMS network.
3. The method of claim 2, wherein the receiving of the calling information, the invoking of the user data request according to the calling information, the issuing of the corresponding IFC rule according to the user data request, and the triggering of the private number service according to the IFC rule, comprises: receiving calling information, judging whether the SIP session of the current calling belongs to a called receiving stage, sending SAR information through a Diameter protocol format, returning to SAA information to send a corresponding IFC rule, triggering once according to a triggering rule in the IFC rule, and triggering privacy number service through the INVITE message.
4. The IMS network-based privacy number application method according to claim 1, wherein the step of filling the number of the calling party information as a privacy number and constructing a new call route includes: and matching a calling number and a called number in the calling information, matching a privacy binding relationship corresponding to the calling number and the called number, constructing a privacy INVITE message, filling the calling number into a privacy number, and adding an orig identifier in a called route to indicate a new calling route.
5. The method for applying the IMS network based privacy number according to claim 4, wherein calling the called number comprises: and responding the 180 Ringing message according to the privacy INVITE message, and calling through transparent transmission and the 180 Ringing message.
6. The method for applying the privacy number based on the IMS network according to claim 1, further comprising opening a VOLTE attribute of the privacy number.
7. An application system of a privacy number based on an IMS network is characterized by comprising a privacy number platform, an HSS and a privacy number attribution S-CSCF;
the HSS stores a calling number, a called number, a privacy number and an IFC rule configured for the privacy number, wherein the IFC rule comprises the steps of setting the trigger state of the privacy number to be registered or unregistered and anchoring the called privacy number to an IMS network; deleting the template ID of the IFC rule or modifying the MMTel AS control parameter for removing the maximum concurrency limit of the privacy number;
the privacy number attribution is used for receiving calling information, calling a user data request to an HSS according to the calling information, the HSS issues a corresponding IFC rule according to the user data request, and the privacy number attribution triggers privacy number service to a privacy number platform according to the IFC rule;
and the privacy number platform is used for filling the calling number of the calling information into a privacy number, constructing a new calling route and calling the called number.
8. The IMS network-based privacy number application system according to claim 7, wherein the privacy number platform includes:
the call session management module is used for transmitting and distributing the strategy of the SIP protocol and receiving the service logic control sent by the service processing module;
the SIP processing module is used for realizing an SIP protocol;
the media gateway service module is used for providing an IP address and a port and sending and receiving media data streams;
the service processing module is used for processing the service logic and issuing service logic control;
the data management module is used for storing service logic data, and the service logic data comprises the privacy binding relationship between a calling number and a called number;
and the external interface management module is used for providing an API interface.
9. The IMS network-based privacy number application system according to claim 8, further comprising:
the playback session management module is used for applying a media data stream to the media gateway service module according to the service data issued by the service processing and management module, negotiating through an SIP protocol and playing back different service scenes according to playback time points;
the recording session management module is used for recording the voice of both parties of the call and identifying the DTMF code;
and the video color ring back tone session management module is used for playing the video color ring back tone.
CN202211137865.3A 2022-09-19 2022-09-19 Privacy number application method and system based on IMS network Active CN115226095B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211137865.3A CN115226095B (en) 2022-09-19 2022-09-19 Privacy number application method and system based on IMS network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211137865.3A CN115226095B (en) 2022-09-19 2022-09-19 Privacy number application method and system based on IMS network

Publications (2)

Publication Number Publication Date
CN115226095A CN115226095A (en) 2022-10-21
CN115226095B true CN115226095B (en) 2023-01-06

Family

ID=83616863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211137865.3A Active CN115226095B (en) 2022-09-19 2022-09-19 Privacy number application method and system based on IMS network

Country Status (1)

Country Link
CN (1) CN115226095B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115623470B (en) * 2022-12-12 2023-03-31 杭州诚智天扬科技有限公司 Method for sending short message by using privacy number and privacy number platform
CN116366612A (en) * 2023-04-03 2023-06-30 北京数通亿聚科技有限公司 Method and system for realizing IMS domain privacy number access distributor
CN116506410B (en) * 2023-06-29 2023-09-08 杭州诚智天扬科技有限公司 Method, system and device for showing incoming call intention in privacy call

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008028378A1 (en) * 2006-08-31 2008-03-13 Zte Corporation A system and method for implementing an original call anchoring in voice call continuity service
WO2008151563A1 (en) * 2007-06-13 2008-12-18 Huawei Technologies Co., Ltd. Method and apparatus for realizing private network services in pnm
CN104618898A (en) * 2015-01-29 2015-05-13 东方通信股份有限公司 Method and system for encrypting/ decrypting IP (Internet Protocol) short messages based on SMS (Short Messaging Service) over IMS (IP Multimedia Subsystem)
CN105530618A (en) * 2014-09-29 2016-04-27 中国电信股份有限公司 Method and system for realizing virtual number business
CN108521404A (en) * 2018-03-09 2018-09-11 中国—东盟信息港股份有限公司 A kind of mobile phone safe privacy number protecting platform based on IMS networkings
CN109451482A (en) * 2019-01-03 2019-03-08 中国联合网络通信集团有限公司 Privacy number processing method, device and storage medium
CN113055874A (en) * 2019-12-26 2021-06-29 中国电信股份有限公司 Method, platform, system and medium for realizing multi-number service of cross-network operator

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101866405B (en) * 2010-06-23 2011-11-16 江苏大学 Method for protecting private data in association rule mining
CN105207982B (en) * 2014-06-30 2019-10-11 中兴通讯股份有限公司 Resource-sharing processing method, device and P-CSCF
CN110971766B (en) * 2019-09-27 2021-01-05 华为技术有限公司 Method and apparatus for call processing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008028378A1 (en) * 2006-08-31 2008-03-13 Zte Corporation A system and method for implementing an original call anchoring in voice call continuity service
WO2008151563A1 (en) * 2007-06-13 2008-12-18 Huawei Technologies Co., Ltd. Method and apparatus for realizing private network services in pnm
CN105530618A (en) * 2014-09-29 2016-04-27 中国电信股份有限公司 Method and system for realizing virtual number business
CN104618898A (en) * 2015-01-29 2015-05-13 东方通信股份有限公司 Method and system for encrypting/ decrypting IP (Internet Protocol) short messages based on SMS (Short Messaging Service) over IMS (IP Multimedia Subsystem)
CN108521404A (en) * 2018-03-09 2018-09-11 中国—东盟信息港股份有限公司 A kind of mobile phone safe privacy number protecting platform based on IMS networkings
CN109451482A (en) * 2019-01-03 2019-03-08 中国联合网络通信集团有限公司 Privacy number processing method, device and storage medium
CN113055874A (en) * 2019-12-26 2021-06-29 中国电信股份有限公司 Method, platform, system and medium for realizing multi-number service of cross-network operator

Also Published As

Publication number Publication date
CN115226095A (en) 2022-10-21

Similar Documents

Publication Publication Date Title
CN115226095B (en) Privacy number application method and system based on IMS network
US8503976B2 (en) Method and apparatus for handling emergency calls
CN103763446B (en) Use the IMS network access of existing equipment
US6871070B2 (en) Communication system for providing roaming between an internet protocol multimedia system and a circuit-switched domain
US6954654B2 (en) Provision of services in a communication system including an interworking mobile switching center
US6996087B2 (en) Communication system including an interworking mobile switching center for call termination
US7380022B2 (en) Method and apparatus for transmitting wired data voice over IP data and wireless data through a common IP core network
US7864936B2 (en) Method of avoiding or minimizing cost of stateful connections between application servers and S-CSCF nodes in an IMS network with multiple domains
US7561535B2 (en) System and method for providing dynamic call models for users as function of the user environment in an IMS network
US8392582B2 (en) Method and apparatuses for making use of virtual IMS subscriptions coupled with the identity of a non SIP compliant terminal for non-registered subscribers
US7206611B2 (en) Method for displaying special alerting icon
US8812700B2 (en) Method and apparatus for providing network based services to non-registering endpoints
US20060258394A1 (en) Short message service encapsulation of supplementary service requests for IMS
CN104272696B (en) Reside in the media file in equipment
CN101931923B (en) Method for user registration of IP multimedia subsystem network and service fulfillment system
CN101529883B (en) System and method to provide combinational services to anonymous callers
CN1997201A (en) Method and device for call processing in the phone service continuity
CN101217698B (en) A method for realizing CRBT and/or color image service
CN101102610B (en) A method for realizing user busy call forward in IMS centrally controlled service
CN101155173A (en) Method and system for circuit field sensing IMS field multimedia conversation media information
CN101505509B (en) Resource reservation implementing method and interconnection network element
EP2040508A1 (en) Method, apparatuses and program product for controlling IMS services when user is roaming in CS domain
CN102668487B (en) Method and system for implementing call by media gateway
CN100450210C (en) R4 network system and method for provoding medium resource
EP1978708A1 (en) A system, apparatus and method for transmitting digital subscriber signaling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant