CN116963001A - Calling method, system and P-CSCF network element - Google Patents

Calling method, system and P-CSCF network element Download PDF

Info

Publication number
CN116963001A
CN116963001A CN202210383978.5A CN202210383978A CN116963001A CN 116963001 A CN116963001 A CN 116963001A CN 202210383978 A CN202210383978 A CN 202210383978A CN 116963001 A CN116963001 A CN 116963001A
Authority
CN
China
Prior art keywords
call
anonymous user
cscf
user terminal
network element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210383978.5A
Other languages
Chinese (zh)
Inventor
朱晓洁
彭莉
马金兰
刘展
王庆扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202210383978.5A priority Critical patent/CN116963001A/en
Priority to PCT/CN2023/087245 priority patent/WO2023197983A1/en
Publication of CN116963001A publication Critical patent/CN116963001A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Abstract

The present disclosure provides a calling method, a calling system and a P-CSCF network element, and relates to the field of wireless communication. The calling method comprises the following steps: an anonymous user terminal initiating a first call request allocates a temporary identity comprising a P-CSCF equipment identifier; and inserting the temporary identity as a calling user identity into the first call request to form a second call request so as to realize call service based on the second call request. The present disclosure utilizes the characteristic that the P-CSCF equipment identifier can be routed in the whole network to allocate the temporary identity identifier containing the P-CSCF equipment identifier for the user terminal and the calling identifier used for calling, thereby supporting the anonymous user to realize the calling service and meeting the control requirements of various national governments that the calling identifier is required to be provided and the callback is required to be supported for the emergency call.

Description

Calling method, system and P-CSCF network element
Technical Field
The present disclosure relates to the field of wireless communications, and in particular, to a call method, system, and P-CSCF (Proxy-Call Session Control Funtion, proxy call session control function) network element.
Background
The emergency call is a basic service regulated by governments of various countries, and the industrial information department requires that the network provide an emergency call service for card-free users to support outdoor rescue and a connectable caller identification for an emergency call center for callback. In addition, international standards require that voice services of IMS (IP Multimedia Subsystem ) such as VoLTE/VoNR realize international roaming based on an S8HR architecture, a home IMS network is not interconnected with a visiting IMS network, and the visiting IMS can not obtain legal identity information of roaming users. Emergency calls follow the principle of near access according to the calling location, which can only be provided through a visited network, including international diffuse emergency calls where no card user initiates an emergency call or where MSISDN (mobile station identification number) cannot be obtained from a 5GC/EPC (core network).
However, the international standard does not have the technical specification related to the identity identification provided by the IMS network for anonymous users, the existing IMS network and standard do not support the identity identification provided for non-card users and non-authenticated users, and emergency call services meeting the control requirements of governments of various countries cannot be provided for such users.
Disclosure of Invention
The technical problem to be solved by the present disclosure is to provide a calling method, a system and a P-CSCF network element, which can support anonymous users to realize calling service.
According to an aspect of the present disclosure, a calling method is provided, including: allocating a temporary identity containing a proxy call session control function (P-CSCF) equipment identifier for an anonymous user terminal initiating a first call request; and inserting the temporary identity as a calling user identity into the first call request to form a second call request so as to realize call service based on the second call request.
In some embodiments, assigning the temporary identity comprises: acquiring a domain name of a P-CSCF network element receiving a first call request; setting a number for an anonymous user terminal; and constructing a temporary identity based on the number and the domain name of the P-CSCF network element.
In some embodiments, a mapping of the temporary identity to the IP address of the anonymous user terminal is recorded.
In some embodiments, determining an IP address of an anonymous user terminal corresponding to the temporary identity in the callback request according to the mapping relationship; and forwarding a callback request to the anonymous user terminal according to the IP address of the anonymous user terminal.
In some embodiments, the temporary identity is in the format of a session initiation protocol, SIP, uniform resource identifier, URI.
In some embodiments, the validity time of the mapping is set.
According to another aspect of the present disclosure, there is also provided a proxy call session control function P-CSCF network element, including: an anonymous user data management function module configured to allocate a temporary identity comprising a P-CSCF device identity for an anonymous user terminal originating a first call request; and the anonymous user call processing function module is configured to insert the temporary identity as a calling user identity into the first call request to form a second call request so as to realize call service based on the second call request.
In some embodiments, the anonymous user data management function is configured to obtain a domain name of a P-CSCF network element receiving the first call request, set a number for the anonymous user terminal, and construct the temporary identity based on the number and the domain name of the P-CSCF network element.
In some embodiments, the anonymous user data management function is configured to record a mapping of the temporary identity to an IP address of the anonymous user terminal.
In some embodiments, the anonymous user call processing function module is further configured to query the anonymous user data management function module, determine an IP address of the anonymous user terminal corresponding to the temporary identity in the callback request according to the mapping relationship, and forward the callback request to the anonymous user terminal according to the IP address of the anonymous user terminal.
According to another aspect of the present disclosure, there is also provided a proxy call session control function P-CSCF network element, including: a memory; and a processor coupled to the memory, the processor configured to perform a calling method as described above based on instructions stored in the memory.
According to another aspect of the present disclosure, there is also provided a call system including: the P-CSCF network element; and the emergency call session control function E-CSCF is configured to receive a second call request sent by the P-CSCF network element, map an access number of a nearby call answering center according to the second call request and the position information of the anonymous user terminal, and route the second call request to the corresponding call answering center according to the access number.
In some embodiments, the calling system further comprises: the Media Gateway Control Function (MGCF) is configured to determine the corresponding P-CSCF network element according to the temporary identity in the callback request of the call answering center.
According to another aspect of the disclosure, there is also provided a non-transitory computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement a calling method as described above.
In the embodiment of the disclosure, the temporary identity identifier containing the P-CSCF equipment identifier is distributed for the user terminal by utilizing the characteristic that the P-CSCF equipment identifier can be routed in the whole network and is used for calling the calling identifier of the call, so that the anonymous user can be supported to realize the call service.
Other features of the present disclosure and its advantages will become apparent from the following detailed description of exemplary embodiments of the disclosure, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description, serve to explain the principles of the disclosure.
The disclosure may be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 is a flow diagram of some embodiments of a call method of the present disclosure;
FIG. 2 is a flow diagram of further embodiments of the call method of the present disclosure;
FIG. 3 is a flow chart of other embodiments of the calling method of the present disclosure;
FIG. 4 is a flow diagram of further embodiments of the call method of the present disclosure;
fig. 5 is a schematic structural diagram of some embodiments of a P-CSCF network element of the present disclosure; and
fig. 6 is a schematic structural diagram of other embodiments of a P-CSCF network element of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless it is specifically stated otherwise.
Meanwhile, it should be understood that the sizes of the respective parts shown in the drawings are not drawn in actual scale for convenience of description.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the disclosure, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but should be considered part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
For the purposes of promoting an understanding of the principles and advantages of the disclosure, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same.
Fig. 1 is a flow diagram of some embodiments of a call method of the present disclosure, which is performed by a P-CSCF network element.
In step 110, a temporary identity comprising a P-CSCF device identity is allocated to the anonymous user terminal originating the first call request.
In some embodiments, a domain name of a P-CSCF network element receiving the first call request is obtained, a number is set for the anonymous user terminal, and a temporary identity is constructed based on the number and the domain name of the P-CSCF network element.
In some embodiments, the temporary identity is in the format of a SIP (Session initialization Protocol, session initiation protocol) URI (Uniform Resource Identifier ).
For example, the temporary identity allocated to the anonymous user terminal is ID@P-CSCF domain name, and the ID is the number of the anonymous user in the P-CSCF, and can be a number or a character string; the P-CSCF domain name is the device identity of the P-CSCF network element.
In step 120, the temporary identity is used as a caller id and inserted into the first call request to form a second call request, so as to implement a call service based on the second call request.
In some embodiments, the P-CSCF network element forwards the second call request to the E-CSCF (Emergency Call Session Control Funtion, emergency call session control function)/LRF (Location Retrieval Function ), which maps out the access number of the nearby call answering center based on the second call request and location information of the anonymous user terminal, and routes the second call request to the corresponding call answering center based on the access number.
In the above embodiment, the temporary identity identifier containing the P-CSCF device identifier is allocated to the user terminal by using the characteristic that the P-CSCF device identifier can be routed through the whole network, and is used for the calling identifier of the call, so that the anonymous user can be supported to realize the call service.
Fig. 2 is a flow diagram of further embodiments of the call method of the present disclosure, which is performed by a P-CSCF network element.
In step 210, the IP address of the anonymous user terminal corresponding to the temporary identity in the callback request is determined according to the mapping relationship between the temporary identity and the IP address of the anonymous user terminal.
In some embodiments, after the P-CSCF network element allocates the temporary identity to the anonymous user terminal, a mapping relationship between the temporary identity and the IP address of the anonymous user terminal is recorded, so that when the P-CSCF network element receives the callback request, the anonymous user terminal can be determined according to the mapping relationship. For example, the P-CSCF network element determines the IP address of the anonymous user terminal based on the ID1@P-CSCF1 Domain Name.
In some embodiments, a source IP address in a call request message sent from an anonymous user terminal is recorded, and a mapping relationship between the IP address and a temporary identity is saved.
In some embodiments, the P-CSCF network element sets the validity time of the mapping relationship, e.g., sets the validity time of the mapping record according to government regulatory requirements. And deleting the mapping relation after the effective time is exceeded, so that the storage space is reduced, and the utilization efficiency of the storage space is improved.
In step 220, a callback request is forwarded to the anonymous user terminal according to the IP address of the anonymous user terminal.
In the above embodiment, the P-CSCF network element determines the IP address of the anonymous user terminal corresponding to the temporary identity in the callback request according to the mapping relationship between the temporary identity and the IP address of the anonymous user terminal, so as to implement callback of the anonymous user.
Fig. 3 is a flow chart of other embodiments of the call method of the present disclosure. This embodiment is an anonymous user emergency call initiation procedure.
In step 310, the p-CSCF1 receives an emergency call request initiated by an unauthenticated user UE 1.
In some embodiments, the non-authenticated user is, for example, a card-less user. The emergency call request carries the IP address of the user.
In step 320, after the p-CSCF1 fails to obtain the user identity information from the PCRF (Policy and Charging Rules Function )/PCF (Policy Control function, policy control function), a temporary identity "id1@p-CSCF1 Domain Name" is allocated to the anonymous user, and is inserted into the call request as the caller identity.
In step 330, the p-CSCF1 forwards the emergency call request INVITE to the E-CSCF/LRF.
In step 340, the e-CSCF/LRF maps the access number of the nearby emergency call answering center PSAP based on the emergency call indication and the anonymous user location information.
For example, according to the number 110 and the Tianhe area base station identifier 1, mapping out the telephone number of the Tianhe area alarm center, such as 38639110; the yellow-pumped emergency center telephone number is mapped, as 66800120, based on the number 120 and yellow-pumped base station identification 2.
In some embodiments, the call request initiated by the anonymous user carries P-Access-Network-Info information, where the message includes the base station identifier accessed by the user, so that the location information of the anonymous user can be located.
The e-CSCF/LRF forwards the emergency call request INVITE to the PSAP in step 350.
In step 360, the psap receives the call request and records the caller identification for callback.
In step 370, the call is answered, completing the call setup.
In step 380, the network communicates both parties of the media information.
Fig. 4 is a flow diagram of further embodiments of the call method of the present disclosure, which is a flow of an emergency call center callback of anonymous users.
In step 410, the emergency call center initiates a callback request INVITE with the destination user identified as id1@p-CSCF1 Domain Name.
In step 420, the MGCF looks up the corresponding P-CSCF1 based on the P-CSCF1 Domain Name address (P-CSCF 1 Domain Name).
The mgcf routes the call request to the P-CSCF1 in step 430.
In step 440, the p-CSCF1 receives the call request, cannot find the connection IP address of the destination user from the legal registered user data, queries the anonymous user data association module, and maps to the user IP address according to the user identifier id1@p-CSCF1 Domain Name.
In step 450 the p-CSCF1 forwards the emergency call request INVITE to the user.
At step 460, the user answers the call.
In step 470, the callback connection is completed.
In step 480, the network communicates media information between the UE and the emergency call center.
In the embodiment, the P-CSCF provides the whole network routable identity for the anonymous user, so that on one hand, the identity data management of the anonymous user is finished, and on the other hand, the calling and called call continuing flow processing of the anonymous user is supported, and the control requirements that the government of each country needs to provide a calling identity and support callback for emergency calls are met. In addition, the method has no additional functional requirement on other IMS network elements, and the technical implementation is simple.
Fig. 5 is a schematic diagram of the architecture of some embodiments of the P-CSCF network element of the present disclosure, including an anonymous user data management function 510 and an anonymous user call processing function 520.
The anonymous user data management function 510 is configured to assign a temporary identity comprising a P-CSCF device identity to the anonymous user terminal originating the first call request.
In some embodiments, anonymous user data management function 510 obtains a domain name of a P-CSCF network element receiving the first call request, sets a number for the anonymous user terminal, and constructs a temporary identity based on the number and the domain name of the P-CSCF network element.
In some embodiments, the temporary identity is in the format of a SIP URI.
For example, the temporary identity allocated by the anonymous user data management function module 510 to the anonymous user terminal is id@p-CSCF domain name, where ID is the number of the anonymous user in the P-CSCF, and may be a number or a character string; the P-CSCF domain name is the device identity of the P-CSCF network element.
In some embodiments, the anonymous user data management function 510 records a mapping relationship between the temporary identity and the IP address of the anonymous user terminal, so that when the P-CSCF network element receives the callback request, the anonymous user terminal can be determined according to the mapping relationship. For example, the P-CSCF network element determines the IP address of the anonymous user terminal based on the ID1@P-CSCF1 Domain Name.
In some embodiments, anonymous user data management function 510 sets the validity time of the mapping. For example, the validity time of the mapping record is set according to government regulatory requirements. And deleting the mapping relation after the effective time is exceeded, so that the storage space is reduced, and the utilization efficiency of the storage space is improved.
The anonymous user call processing function 520 is configured to insert the temporary identity as a caller identity into the first call request to form a second call request, so as to implement a call service based on the second call request.
In some embodiments, the P-CSCF network element forwards the second call request to the E-CSCF/LRF, which maps out access numbers of nearby call answering centers based on the second call request and location information of the anonymous user terminal, and routes the second call request to the corresponding call answering center based on the access numbers.
In the above embodiment, the characteristic that the P-CSCF device identifier can be routed over the whole network is utilized to allocate a temporary identity identifier containing the P-CSCF device identifier to the user terminal for calling the caller identifier of the call, so as to ensure that the identity identifier is provided for anonymous users such as non-card and unauthorized roaming users to realize emergency call, thereby meeting the control requirements of the industry and the government on the IMS emergency call service capability.
In other embodiments of the present disclosure, the anonymous user call processing function 520 is configured to query the anonymous user data management function 510, determine an IP address of the anonymous user terminal corresponding to the temporary identity in the callback request according to a mapping relationship between the temporary identity and the IP address of the anonymous user terminal, and forward the callback request to the anonymous user terminal according to the IP address of the anonymous user terminal.
In the above embodiment, the P-CSCF network element determines the IP address of the anonymous user terminal corresponding to the temporary identity in the callback request according to the mapping relationship between the temporary identity and the IP address of the anonymous user terminal, so as to implement callback of the anonymous user.
Fig. 6 is a schematic structural diagram of other embodiments of a P-CSCF network element of the present disclosure. The P-CSCF network element 600 comprises a memory 610 and a processor 620. Wherein: the memory 610 may be a magnetic disk, flash memory, or any other non-volatile storage medium. The memory is used to store instructions in the corresponding embodiments of fig. 1-4. Processor 620, coupled to memory 610, may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller. The processor 620 is configured to execute instructions stored in the memory.
In some embodiments, processor 620 is coupled to memory 610 through BUS 630. The P-CSCF network element 600 may also be connected to an external storage system 650 via a storage interface 640 for invoking external data, and to a network or another computer system (not shown) via a network interface 660. And will not be described in detail herein.
In the embodiment, the data instruction is stored by the memory, and then the instruction is processed by the processor, so that the temporary identity containing the P-CSCF equipment identifier is distributed for anonymous users connected to the P-CSCF for calling identification of emergency calls and called user identification during callback by utilizing the characteristic that the P-CSCF equipment identifier can be routed in a whole network, emergency call service meeting the control requirements of governments of various countries can be provided, and a complete 4G/5G basic service is provided for the users.
In further embodiments of the present disclosure, a call system is protected, the call system comprising a P-CSCF network element and an E-CSCF, wherein the E-CSCF is configured to receive a second call request sent by the P-CSCF network element, map an access number of a nearby call answering center according to the second call request and location information of an anonymous user terminal, and route the second call request to a corresponding call answering center according to the access number.
In some embodiments, the calling system further comprises an MGCF configured to determine a corresponding P-CSCF network element based on the temporary identity in the callback request of the call answering center.
The calling system can ensure that when the card-free user initiates emergency rescue outdoors and the unauthorized roaming user initiates emergency call, the IMS network can provide emergency communication service meeting government regulation requirements for related users, provide complete 4G/5G basic service for the users and bear related social responsibility.
In other embodiments, a computer readable storage medium has stored thereon computer program instructions which, when executed by a processor, implement the steps of the method of the corresponding embodiments of fig. 1-4. It will be apparent to those skilled in the art that embodiments of the present disclosure may be provided as a method, apparatus, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Thus far, the present disclosure has been described in detail. In order to avoid obscuring the concepts of the present disclosure, some details known in the art are not described. How to implement the solutions disclosed herein will be fully apparent to those skilled in the art from the above description.
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (14)

1. A method of calling, comprising:
allocating a temporary identity containing a proxy call session control function (P-CSCF) equipment identifier for an anonymous user terminal initiating a first call request; and
and inserting the temporary identity as a calling user identity into the first call request to form a second call request so as to realize call service based on the second call request.
2. The calling method of claim 1, wherein assigning temporary identities comprises:
acquiring a domain name of a P-CSCF network element receiving a first call request;
setting a number for the anonymous user terminal; and
and constructing the temporary identity based on the number and the domain name of the P-CSCF network element.
3. The calling method according to claim 1 or 2, further comprising:
and recording the mapping relation between the temporary identity and the IP address of the anonymous user terminal.
4. A calling method according to claim 3, further comprising:
according to the mapping relation, determining the IP address of the anonymous user terminal corresponding to the temporary identity in the callback request; and
and forwarding the callback request to the anonymous user terminal according to the IP address of the anonymous user terminal.
5. The calling method of claim 2, wherein,
the format of the temporary identity is the SIP uniform resource identifier URI format.
6. A calling method according to claim 3, further comprising:
and setting the effective time of the mapping relation.
7. A proxy call session control function, P-CSCF, network element comprising:
an anonymous user data management function module configured to allocate a temporary identity comprising a P-CSCF device identity for an anonymous user terminal originating a first call request;
and the anonymous user call processing function module is configured to insert the temporary identity as a calling user identity into the first call request to form a second call request so as to realize call service based on the second call request.
8. The P-CSCF network element of claim 7 wherein,
the anonymous user data management function module is configured to acquire a domain name of a P-CSCF network element receiving a first call request, set a number for the anonymous user terminal, and construct the temporary identity based on the number and the domain name of the P-CSCF network element.
9. The P-CSCF network element of claim 7 or 8, wherein,
the anonymous user data management function module is configured to record a mapping relationship between the temporary identity and an IP address of the anonymous user terminal.
10. The P-CSCF network element of claim 9 wherein,
the anonymous user call processing function module is further configured to query the anonymous user data management function module, determine an IP address of an anonymous user terminal corresponding to the temporary identity in a callback request according to the mapping relationship, and forward the callback request to the anonymous user terminal according to the IP address of the anonymous user terminal.
11. A proxy call session control function, P-CSCF, network element comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the calling method of any of claims 1-6 based on instructions stored in the memory.
12. A call system, comprising:
the P-CSCF network element of any of claims 7 to 11; and
and the emergency call session control function E-CSCF is configured to receive a second call request sent by the P-CSCF network element, map an access number of a nearby call answering center according to the second call request and the position information of the anonymous user terminal, and route the second call request to a corresponding call answering center according to the access number.
13. The call system of claim 12, further comprising:
and the Media Gateway Control Function (MGCF) is configured to determine a corresponding P-CSCF network element according to the temporary identity in the callback request of the call answering center.
14. A non-transitory computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the calling method of any of claims 1 to 6.
CN202210383978.5A 2022-04-13 2022-04-13 Calling method, system and P-CSCF network element Pending CN116963001A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210383978.5A CN116963001A (en) 2022-04-13 2022-04-13 Calling method, system and P-CSCF network element
PCT/CN2023/087245 WO2023197983A1 (en) 2022-04-13 2023-04-10 Call method and system, and p-cscf network element

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210383978.5A CN116963001A (en) 2022-04-13 2022-04-13 Calling method, system and P-CSCF network element

Publications (1)

Publication Number Publication Date
CN116963001A true CN116963001A (en) 2023-10-27

Family

ID=88328993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210383978.5A Pending CN116963001A (en) 2022-04-13 2022-04-13 Calling method, system and P-CSCF network element

Country Status (2)

Country Link
CN (1) CN116963001A (en)
WO (1) WO2023197983A1 (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
BRPI0614520B1 (en) * 2005-08-02 2019-07-09 Qualcomm Incorporated VOIP EMERGENCY CALL SUPPORT
CN101800960B (en) * 2009-02-10 2014-03-12 中兴通讯股份有限公司南京分公司 Method for transferring emergent service session and emergent service system
CN108633327B (en) * 2015-04-01 2021-05-28 瑞典爱立信有限公司 IMS emergency call for roaming UE
US20180176376A1 (en) * 2015-04-13 2018-06-21 Ntt Docomo, Inc. Sip control apparatus, mobile communication system and emergency call control method
WO2017218177A1 (en) * 2016-06-16 2017-12-21 T-Mobile Usa, Inc. Roaming lte emergency call with call back number retrieval

Also Published As

Publication number Publication date
WO2023197983A1 (en) 2023-10-19

Similar Documents

Publication Publication Date Title
CA2604211C (en) Temporary enum gateway
US10856114B2 (en) Provision of additional network addressable numbers on single mobile device
US8737948B2 (en) Providing temporary callback number for emergency calls
CN108141716B9 (en) Communication termination using hunt group and implicit registration
WO2019245711A1 (en) Session control logic with internet protocol (ip)-based routing
US11432349B2 (en) Group creation method, apparatus, and system
CN102348200A (en) Call routing method and system of number portability businesses as well as network element equipment
US9967723B2 (en) Roaming LTE emergency call with call back number retrieval
US11540347B2 (en) Interworking between mobile railway networks and GSM networks
CN102065068A (en) Implementation method, system and equipment for emergency call
CN113645254B (en) Method and device for signaling addressing
US10244112B2 (en) Prioritising calls
CN105992147A (en) Emergency call realization method and apparatus
EP3942847A1 (en) Systems and methods for improving routing of communications to emergency services
US20170111402A1 (en) Call method, call apparatus, voip server, and call system
WO2021198721A1 (en) Method and device for automated provisioning of data from multiple sensors within an emergency services network
CN109818909B (en) Call processing method and device
CN116963001A (en) Calling method, system and P-CSCF network element
CN101924995A (en) Callback method, callback device and visit mobile switching center in emergency call service
CN107852577B (en) Supplementary service implementation method, terminal equipment and IMS server
CN109274820B (en) Method and equipment for realizing emergency call and communication system
CN104917717A (en) Calling method, equipment and system
CN105830412B (en) Session initiation handling
US20150271774A1 (en) System and method for provision of a local second line service to a roaming telecommunications device using mixed protocols
CN112235775A (en) Call routing method and device for number portability service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination