CN117643043A - IMS session method, device, communication equipment and storage medium - Google Patents

IMS session method, device, communication equipment and storage medium Download PDF

Info

Publication number
CN117643043A
CN117643043A CN202280002391.3A CN202280002391A CN117643043A CN 117643043 A CN117643043 A CN 117643043A CN 202280002391 A CN202280002391 A CN 202280002391A CN 117643043 A CN117643043 A CN 117643043A
Authority
CN
China
Prior art keywords
ims session
request
identification information
information
cscf
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202280002391.3A
Other languages
Chinese (zh)
Inventor
商正仪
陆伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Publication of CN117643043A publication Critical patent/CN117643043A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the disclosure provides an IMS session method, an IMS session device, a communication device and a storage medium; the IMS session method is performed by a first UE, comprising: sending an invite request to the CSCF, wherein the invite request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.

Description

IMS session method, device, communication equipment and storage medium Technical Field
The present disclosure relates to, but not limited to, the field of wireless communications technologies, and in particular, to an IMS session method, apparatus, communication device, and storage medium.
Background
The third generation partnership project (3 GPP) has introduced new network capabilities and new types of devices (e.g., virtual Reality (VR) devices, augmented Reality (AR) devices, augmented reality (XR) devices, or robots, etc.). This may bring promising improvements to IP multimedia system (IP Multimedia Subsystem, IMS) multimedia telephony services. While enterprise customers consider multimedia telephony services to provide attractive functionality for their services, they also encounter practical problems that require support from fifth generation mobile communication technology (5G) systems. The 5G system is expected to support advanced functions and capabilities of the enhanced IMS multimedia telephony service to meet new demands of consumers, enterprise customers, and vertical markets.
Currently, the impact on architecture of accessing an IMS network using a third party specific user identity is under investigation, as well as how to enhance the IMS network to support trusted third parties. However, the proposed solution does not take into account the security issues of the UE, such that the UE cannot securely access the IMS network using a third party specific user identity.
Disclosure of Invention
The embodiment of the disclosure provides an IMS session method, an IMS session device, a communication device and a storage medium.
According to a first aspect of the present disclosure, there is provided an IMS session method performed by a first User Equipment (UE), comprising:
sending an Invite Request (Invite Request) to a call session control function (Call Session Control Function, CSCF), wherein the Invite Request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
In some embodiments, the first identification information of the first UE is determined by at least one of:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
In some embodiments, the invite request includes: second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
In some embodiments, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
According to a second aspect of the present disclosure there is provided an IMS session method performed by a CSCF, comprising:
receiving an invitation request, wherein the invitation request comprises first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
In some embodiments, the first identification information of the first UE is determined by at least one of:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
In some embodiments, the invite request includes second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
In some embodiments, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
In some embodiments, the invite request includes: time information;
the method comprises the following steps: based on the time information and the current time, it is determined whether the invite request is attacked.
In some embodiments, a method comprises: acquiring authorization information; wherein the authorization information is used to indicate at least one of:
the UE corresponding to the at least one first identification information allows the initiation and/or the reception of the IMS session;
the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session of the UE corresponding to the at least one second identification information.
In some embodiments, the method comprises at least one of:
determining whether to allow the first UE to transmit and/or receive the IMS session based on the authorization information;
Determining whether to allow the first UE to transmit and/or receive an IMS session with the second UE based on the authorization information;
determining whether the first UE initiates and/or receives an IMS session within a call time range based on the authorization information;
based on the authorization information, it is determined whether the first UE initiates and/or receives an IMS session with the second UE within a call time range.
In some embodiments, a method comprises: sending a first request to a home subscriber server (Home Subscriber Server, HSS), wherein the first request comprises: first identification information of the first UE, or first identification information of the first UE and second identification information of the second UE; the first request is for requesting authorization information.
In some embodiments, obtaining authorization information includes: receiving a first response sent by the HSS, wherein the first response comprises: authorization information.
In some embodiments, a method comprises: transmitting a second request to a third party authentication authorization accounting ((authentication, authorization, accounting), AAA) server; wherein,
the second request includes first identification information of the first UE, and the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session;
alternatively, the second request includes first identification information of the first UE and second identification information of the second UE, and the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
In some embodiments, a method comprises: receiving a second response sent by the third party AAA server, wherein the second response comprises at least one of the following:
whether the first UE is allowed to initiate and/or receive an authorization result of the IMS session;
whether the first UE is allowed to initiate and/or receive the result of the authorization of the IMS session with the second UE.
In some embodiments, the second response further comprises at least one of:
the first UE initiates and/or receives an authorization result of whether the IMS session is within a calling time range;
the first UE initiates and/or receives an authorization result of whether an IMS session with the second UE is within a call time range.
In some embodiments, the CSCF is a CSCF of the first UE;
receiving an invite request, comprising: and receiving an invitation request sent by the first UE.
In some embodiments, the CSCF is the CSCF of the second UE;
receiving an invite request, comprising: and receiving an invite request sent by the CSCF of the first UE.
In some embodiments, a method comprises:
an invite request is sent to a second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE.
According to a third aspect of the present disclosure, there is provided an IMS session method performed by an HSS, comprising:
receiving a first request sent by a CSCF, wherein the first request comprises first identification information of a first UE, and the first request is used for requesting authorization information; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows for initiation and/or reception of an IMS session.
In some embodiments, the first request includes first identification information of the first UE and second identification information of the second UE; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session corresponding to the at least one second identification information.
In some embodiments, a method comprises: a first response is sent to the CSCF, wherein the first response includes authorization information.
According to a fourth aspect of the present disclosure, there is provided an IMS session method performed by a third party AAA server, comprising:
receiving a second request sent by the CSCF, wherein the second request comprises first identification information of the first UE; wherein the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session.
In some embodiments, the second request further includes second identification information of the second UE; the second request is also for requesting whether the first UE allows initiation and/or reception of an IMS session with the second UE.
In some embodiments, based on the second request and the authorization information, an authorization result of at least one of:
whether the first UE is allowed to send and/or receive IMS sessions;
whether the first UE is allowed to send and/or receive IMS sessions with the second UE;
Whether the first UE initiates and/or receives an IMS session within a call time range;
whether the first UE initiates and/or receives an IMS session with the second UE is within a call time range.
In some embodiments, a method comprises: transmitting a second response to the CSCF, wherein the second response includes: and (5) authorizing results.
According to a fifth aspect of the present disclosure, there is provided an IMS session method performed by a second UE, comprising:
receiving an invite request sent by a CSCF of a second UE, wherein the invite request comprises first identification information of the first UE and second identification information of the second UE;
an IMS session is established with the first UE based on the invite request.
According to a sixth aspect of the present disclosure, there is provided an IMS session device, comprising:
a first sending module configured to send an invite request to the CSCF, wherein the invite request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
In some embodiments, the first identification information of the first UE is determined by at least one of:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
And the location related information of the first UE under the third party organization or network.
In some embodiments, the second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
In some embodiments, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
According to a seventh aspect of the present disclosure, there is provided an IMS session device, comprising:
a second receiving module configured to receive an invite request, wherein the invite request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
In some embodiments, the first identification information of the first UE is determined by at least one of:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
And the location related information of the first UE under the third party organization or network.
In some embodiments, the invite request includes second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
In some embodiments, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
In some embodiments, the invite request includes: time information;
the device comprises: and a second processing module configured to determine whether the invitation request is attacked based on the time information and the current time.
In some embodiments, the second receiving module is configured to obtain authorization information; wherein the authorization information is used to indicate at least one of:
the UE corresponding to the at least one first identification information allows the initiation and/or the reception of the IMS session;
the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session of the UE corresponding to the at least one second identification information.
In some embodiments, the second processing module is configured to at least one of:
determining whether to allow the first UE to transmit and/or receive the IMS session based on the authorization information;
determining whether to allow the first UE to transmit and/or receive an IMS session with the second UE based on the authorization information;
determining whether the first UE initiates and/or receives an IMS session within a call time range based on the authorization information;
based on the authorization information, it is determined whether the first UE initiates and/or receives an IMS session with the second UE within a call time range.
In some embodiments, an apparatus comprises: a second sending module configured to send a first request to the HSS, wherein the first request includes: first identification information of the first UE, or first identification information of the first UE and second identification information of the second UE; the first request is for requesting authorization information.
In some embodiments, the second receiving module is configured to receive a first response sent by the HSS, where the first response includes: authorization information.
In some embodiments, the second sending module is configured to send a second request to a third party authentication, authorization, accounting, AAA server;
wherein the second request comprises first identification information of the first UE, and the second request is used for requesting whether the first UE is allowed to initiate and/or receive an IMS session;
Or, the second sending module is configured to send a second request including the first identification information of the first UE and the second identification information of the second UE, and the second request is used for requesting whether the first UE allows to initiate and/or receive an IMS session with the second UE.
In some embodiments, the second receiving module is configured to receive a second response sent by the third party AAA server, wherein the second response includes at least one of:
whether the first UE is allowed to initiate and/or receive an authorization result of the IMS session;
whether the first UE is allowed to initiate and/or receive the result of the authorization of the IMS session with the second UE.
In some embodiments, the second response further comprises at least one of:
the first UE initiates and/or receives an authorization result of whether the IMS session is within a calling time range;
the first UE initiates and/or receives an authorization result of whether an IMS session with the second UE is within a call time range.
In some embodiments, the CSCF is a CSCF of the first UE;
and the second receiving module is configured to receive the invitation request sent by the first UE.
In some embodiments, the CSCF is the CSCF of the second UE;
and the second receiving module is configured to receive an invite request sent by the CSCF of the first UE.
In some embodiments, the second sending module is configured to send the invite request to the second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE.
According to an eighth aspect of the present disclosure, there is provided an IMS session device, comprising:
a third receiving module configured to receive a transmitted first request, wherein the first request includes first identification information of a first UE, the first request being for requesting authorization information; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows for initiation and/or reception of an IMS session.
In some embodiments, the first request includes first identification information of the first UE and second identification information of the second UE; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session corresponding to the at least one second identification information.
In some embodiments, an apparatus comprises: and a third sending module configured to send a first response to the CSCF, wherein the first response includes authorization information.
According to a ninth aspect of the present disclosure, there is provided an IMS session device, comprising:
a fourth receiving module configured to receive a second request sent by the CSCF, where the second request includes first identification information of the first UE; wherein the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session.
In some embodiments, the second request further includes second identification information of the second UE; the second request is also for requesting whether the first UE allows initiation and/or reception of an IMS session with the second UE.
In some embodiments, an apparatus comprises: a third processing module configured to determine, based on the second request and the authorization information, an authorization result of at least one of:
whether the first UE is allowed to send and/or receive IMS sessions;
whether the first UE is allowed to send and/or receive IMS sessions with the second UE;
whether the first UE initiates and/or receives an IMS session within a call time range;
whether the first UE initiates and/or receives an IMS session with the second UE is within a call time range.
In some embodiments, an apparatus comprises: a fourth sending module configured to send a second response to the CSCF, wherein the second response includes: and (5) authorizing results.
According to a tenth aspect of the present disclosure, there is provided an IMS session device, comprising:
a fifth receiving module configured to receive an invite request sent by a CSCF of the second UE, where the invite request includes first identification information of the first UE and second identification information of the second UE;
a fourth processing module configured to establish an IMS session with the first UE based on the invite request.
According to an eleventh aspect of the present disclosure, there is provided a communication apparatus including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the IMS session method of any embodiment of the present disclosure is implemented when the executable instructions are executed.
According to a twelfth aspect of the present disclosure, there is provided a computer storage medium storing a computer executable program which when executed by a processor implements the IMS session method of any embodiment of the present disclosure.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
in an embodiment of the present disclosure, a first UE sends an invite request to a CSCF, where the invite request includes first identification information of the first UE; the invite request is used for requesting the first UE to initiate and/or receive an IMS session; this may allow the first UE to securely access the IMS network for IMS sessions, etc., using third party information (e.g., the first identification information of the first UE).
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of embodiments of the disclosure.
Drawings
Fig. 1 is a schematic diagram illustrating a structure of a wireless communication system according to an exemplary embodiment.
Fig. 2 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 3 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 4 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 5 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 6 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 7 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 8 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 9 is a schematic diagram illustrating an IMS session method according to an example embodiment.
Fig. 10 is a block diagram illustrating an IMS session device according to an example embodiment.
Fig. 11 is a block diagram illustrating an IMS session device according to an example embodiment.
Fig. 12 is a block diagram illustrating an IMS session device according to an example embodiment.
Fig. 13 is a block diagram illustrating an IMS session device according to an example embodiment.
Fig. 14 is a block diagram illustrating an IMS session device according to an example embodiment.
Fig. 15 is a block diagram of a UE, according to an example embodiment.
Fig. 16 is a block diagram of a base station, according to an example embodiment.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the embodiments of the present disclosure. Rather, they are merely examples of apparatus and methods consistent with aspects of embodiments of the present disclosure as detailed in the accompanying claims.
The terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the embodiments of the disclosure. As used in this disclosure of embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in embodiments of the present disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of embodiments of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
Referring to fig. 1, a schematic structural diagram of a wireless communication system according to an embodiment of the disclosure is shown. As shown in fig. 1, the wireless communication system is a communication system based on a cellular mobile communication technology, and may include: a number of user equipments 110 and a number of base stations 120.
User device 110 may be, among other things, a device that provides voice and/or data connectivity to a user. The user equipment 110 may communicate with one or more core networks via a radio access network (Radio Access Network, RAN), and the user equipment 110 may be an internet of things user equipment such as sensor devices, mobile phones (or "cellular" phones) and computers with internet of things user equipment, for example, stationary, portable, pocket, hand-held, computer-built-in or vehicle-mounted devices. Such as a Station (STA), subscriber unit (subscriber unit), subscriber Station (subscriber Station), mobile Station (mobile), remote Station (remote Station), access point, remote terminal (remote terminal), access terminal (access terminal), user terminal (user terminal), user agent (user agent), user device (user device), or user equipment (user request). Alternatively, the user device 110 may be a device of an unmanned aerial vehicle. Alternatively, the user device 110 may be a vehicle-mounted device, for example, a laptop with a wireless communication function, or a wireless user device with an external laptop. Alternatively, the user device 110 may be a roadside device, for example, a street lamp, a signal lamp, or other roadside devices with a wireless communication function.
The base station 120 may be a network-side device in a wireless communication system. Wherein the wireless communication system may be a fourth generation mobile communication technology (the 4th generation mobile communication,4G) system, also known as a long term evolution (Long Term Evolution, LTE) system; alternatively, the wireless communication system may be a 5G system, also known as a new air interface system or a 5G NR system. Alternatively, the wireless communication system may be a next generation system of the 5G system. Among them, the access network in the 5G system may be called a New Generation radio access network (NG-RAN).
The base station 120 may be an evolved node b (eNB) employed in a 4G system. Alternatively, the base station 120 may be a base station (gNB) in a 5G system that employs a centralized and distributed architecture. When the base station 120 adopts a centralized and distributed architecture, it generally includes a Centralized Unit (CU) and at least two Distributed Units (DUs). A protocol stack of a packet data convergence protocol (Packet Data Convergence Protocol, PDCP) layer, a radio link layer control protocol (Radio Link Control, RLC) layer, and a medium access control (Medium Access Control, MAC) layer is provided in the centralized unit; a Physical (PHY) layer protocol stack is provided in the distribution unit, and the specific implementation of the base station 120 is not limited in the embodiments of the present disclosure.
A wireless connection may be established between the base station 120 and the user equipment 110 over a wireless air interface. In various embodiments, the wireless air interface is a fourth generation mobile communication network technology (4G) standard-based wireless air interface; or, the wireless air interface is a wireless air interface based on a fifth generation mobile communication network technology (5G) standard, for example, the wireless air interface is a new air interface; alternatively, the wireless air interface may be a wireless air interface based on a 5G-based technology standard of a next generation mobile communication network.
In some embodiments, an E2E (End to End) connection may also be established between the user devices 110. Such as vehicle-to-vehicle (vehicle to vehicle, V2V) communications, vehicle-to-road side equipment (vehicle to Infrastructure, V2I) communications, and vehicle-to-person (vehicle to pedestrian, V2P) communications in internet of vehicles (vehicle to everything, V2X).
Here, the above-described user equipment can be regarded as the terminal equipment of the following embodiment.
In some embodiments, the wireless communication system described above may also include a network management device 130.
Several base stations 120 are respectively connected to a network management device 130. The network management device 130 may be a core network device in a wireless communication system, for example, the network management device 130 may be a mobility management entity (Mobility Management Entity, MME) in an evolved packet core network (Evolved Packet Core, EPC). Alternatively, the network management device may be other core network devices, such as a Serving GateWay (SGW), a public data network GateWay (Public Data Network GateWay, PGW), a policy and charging rules function (Policy and Charging Rules Function, PCRF) or a home subscriber server (Home Subscriber Server, HSS), etc. The embodiment of the present disclosure is not limited to the implementation form of the network management device 130.
For ease of understanding by those skilled in the art, the embodiments of the present disclosure enumerate a plurality of implementations to clearly illustrate the technical solutions of the embodiments of the present disclosure. Of course, those skilled in the art will appreciate that the various embodiments provided in the embodiments of the disclosure may be implemented separately, may be implemented in combination with the methods of other embodiments of the disclosure, and may be implemented separately or in combination with some methods of other related technologies; the embodiments of the present disclosure are not so limited.
It should be noted that, when a plurality of execution bodies are involved in the embodiments of the present disclosure, when one execution body sends a certain transmission to another execution body, it may mean that one execution body directly sends a transmission to another execution body, or that one execution body sends a transmission to another execution body through any other device; this is not limiting in the embodiments of the present disclosure.
As shown in fig. 2, an embodiment of the present disclosure provides an IMS session method, which is performed by a first UE, including:
step S21: sending an invite request to the CSCF, wherein the invite request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
Here, the first UE and the second UE referred to below may be various mobile terminals or fixed terminals. For example, the first UE and the second UE may be, but are not limited to, a mobile phone, a computer, a server, a wearable device, a vehicle-mounted terminal, a Road Side Unit (RSU), a game control platform, a multimedia device, or the like, respectively.
In one embodiment, the first UE may be a UE initiating an IMS session. Here, the second UE may be a UE receiving an IMS session.
In another embodiment, the first UE may be a UE receiving an IMS session. Here, the first UE may be a UE that initiates an IMS session.
Here, CSCF and HSS, third party AAA servers, etc. referred to below may be logical nodes or functions flexibly deployed in a communication network, etc. For example, the CSCF, HSS and third party AAA server may be logical nodes or functions on the core network side. As another example, the CSCF and HSS may both be logical nodes or functions in the IMS network; the IMS network is a data network connected to a core network. For another example, the third party AAA server may be a logical node or function of a third party network.
In one embodiment, the CSCF may be, but is not limited to being, at least one of: proxy call session control function (Proxy-Call Session Control Function, P-CSCF), serving call session control function (Serving Call Session Control Function, S-CSCF), and query call session control function (Interrogation Call Session Control Function, I-CSCF). The CSCF may be, for example, an S-CSCF.
In another embodiment, the CSCF may be, but is not limited to being, a CSCF of the first UE or a CSCF of the second UE. The CSCF may be, for example, the S-CSCF of the first UE or the S-CSCF of the second UE.
Here, the CSCF of the first UE may be the same as or different from the CSCF of the second UE. Illustratively, if the IMS network where the first UE is located is the same as the IMS network where the second UE is located, the CSCF of the first UE is the same as the CSCF of the second UE. Illustratively, if the IMS network where the first UE is located is different from the IMS network where the second UE is located, the CSCF of the first UE is the same as the CSCF of the second UE, or the CSCF of the first UE is different from the CSCF of the second UE.
In one embodiment, step S21: sending an invite request to a CSCF of a first UE
Here, the invite request is used to request the first UE to initiate and/or receive an IMS session, and may be: an invite request for requesting the first UE to initiate an IMS session with any one UE, and/or for requesting the first UE to receive an IMS session with any one UE. Any UE herein refers to a UE other than the first UE. For example, the invite request may be used to request the first UE to initiate an IMS session with the second UE, and/or may be used to request the first UE to receive an IMS session of the third UE.
In some embodiments, the invite request includes: second identification information of the second UE; the invite request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
Here, the invite request is used to request the first UE to initiate and/or receive an IMS session with the second UE, and may be: the invite request is for requesting the first UE to initiate an IMS session with the second UE, and/or for requesting the first UE to receive an IMS session with the second UE. Here, when the first UE initiates an IMS session with the second UE, the first UE is a calling UE, and the second UE is a called UE. Here, when the first UE receives an IMS session with the second UE, the first UE is a called UE, and the second UE is a calling UE.
In some embodiments, the invite request further includes: time information; the time information is used by the CSCF to determine whether the invite request is attacked.
The embodiment of the disclosure provides an IMS session method, which is executed by a first UE and comprises the following steps: and acquiring the first identification information of the first UE and/or the second identification information of the second UE.
In some embodiments, the first identification information of the first UE is determined by at least one of, but not limited to:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
In some embodiments, the second identification information of the second UE is determined by at least one of, but not limited to:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
Here, the identity of the first UE may be a name of a user corresponding to the first UE; the identity of the second UE may be the name of the corresponding user of the second UE. The job information of the first UE may be job information of a user corresponding to the first UE; the job information of the second UE may be job information of a corresponding user of the second UE. The organization information associated with the first UE may be organization information associated with a corresponding user of the first UE; the organization information associated with the second UE may be organization information associated with a corresponding user of the second UE.
For example, the first UE may obtain the first identification information of the first UE and/or the second identification information of the second UE from a third party AAA server or HSS. As such, in the embodiments of the present disclosure, the first UE may obtain the first identification information of the first UE and/or the second identification information of the second UE directly from the third party AAA server or HSS.
For example, the first UE may obtain third party information of the first UE and/or third party information of the second UE from a third AAA server or HSS; the third party information of the first UE may be, but is not limited to, at least one of an identity of the first UE under a third party organization or network, job information of the first UE under the third party organization or network, organization information associated with the first UE under the third party organization or network, and location related information of the first UE under the third party organization or network; the third party information of the second UE may be, but is not limited to, at least one of an identity of the second UE under a third party organization or network, job information of the second UE under the third party organization or network, organization information associated with the second UE under the third party organization or network, and location related information of the second UE under the third party organization or network. The method comprises the steps that a first UE determines first identification information of the first UE based on third party information of the first UE; and/or the first UE determines second identification information of the second UE based on third party information of the second UE. Thus, in the embodiment of the present disclosure, the first UE may acquire third party information of the first UE and/or the second UE from the third AAA server or the HSS, and determine the first identification information of the first UE and/or the second identification information of the second UE based on the third party information of the first UE and/or the second UE.
In one embodiment, the third party information, i.e., third party specific user identity or third party trusted information.
In an embodiment of the present disclosure, a first UE sends an invite request to a CSCF, where the invite request includes first identification information of the first UE; the invite request is used for requesting the first UE to initiate and/or receive an IMS session; this may allow the first UE to securely access the IMS network for IMS sessions, etc., using third party information (e.g., the first identification information of the first UE).
And, if the invite request includes: second identification information of the second UE; the invite request is used for requesting the first UE to initiate and/or receive an IMS session with the second UE; this may enable the first UE and the second UE to securely access the IMS network for IMS sessions, etc., using third party information (e.g., the first identification information of the first UE and the second identification information of the second UE).
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following IMS session based method, performed by the CSCF, is similar to the description of the IMS session method performed by the first UE described above; for technical details not disclosed in the IMS session method embodiment executed by the CSCF, please refer to a description of an IMS session method example executed by the first UE, and a detailed description thereof will not be provided herein.
As shown in fig. 3, an embodiment of the present disclosure provides an IMS session method, which is executed by a CSCF, including:
step S31: receiving an invitation request, wherein the invitation request comprises first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
In some embodiments of the present disclosure, the CSCF may be the CSCF in the above embodiments; the invite request may be the invite request in the above-described embodiment; the first identification information of the first UE and the second identification information of the second UE may be the first identification information of the first UE and the second identification information of the second UE, respectively.
Illustratively, the CSCF may be, but is not limited to, an S-CSCF. Illustratively, the CSCF may be, but is not limited to being, a CSCF of the first UE or a CSCF of the second UE.
Illustratively, the invite request includes second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
Illustratively, the first identification information of the first UE is determined by at least one of, but not limited to:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
And the location related information of the first UE under the third party organization or network.
Illustratively, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
In some embodiments, the invite request includes: time information;
the method comprises the following steps: based on the time information and the current time, it is determined whether the invite request is attacked.
An embodiment of the present disclosure provides an IMS session method, performed by a UE, including: based on the time information and the current time, it is determined whether the invite request is attacked.
In one embodiment, determining whether the invite request is attacked based on the time information and the current time includes:
if the difference between the time indicated by the time information and the current time is less than or equal to the preset time, determining that the invitation request is not attacked; or,
if the difference between the time indicated by the time information and the current time is greater than the preset time, determining that the invitation request is attacked.
Illustratively, the CSCF of the first UE receives an invite request sent by the UE, where the invite request includes first identification information of the first UE, second identification information of the second UE, and time information for sending the invite request; the CSCF of the first UE determines whether the difference value between the time information indication time and the current time is larger than a preset time; if the difference is determined to be greater than the predetermined time, the invite request is determined to be attacked, or if the difference is determined to be less than or equal to the predetermined time, the invite request is determined to be not attacked.
As such, in embodiments of the present disclosure, it may be determined whether the invite request is a most recently issued invite request through time information in the invite request; so that the accuracy of determining whether the invite request is attacked can be improved.
The above embodiments may be specifically referred to the first UE side, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
In some embodiments, a method comprises: acquiring authorization information; wherein the authorization information is used to indicate at least one of:
the UE corresponding to the at least one first identification information allows the initiation and/or the reception of the IMS session;
the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session of the UE corresponding to the at least one second identification information.
In some embodiments, the CSCF is a CSCF of the first UE;
the receiving of the invite request in step S31 includes: and receiving an invitation request sent by the first UE.
The embodiment of the disclosure provides an IMS session method, which is executed by a CSCF of a first UE and comprises the following steps: and receiving an invitation request sent by the first UE.
As shown in fig. 4, an embodiment of the present disclosure provides an IMS session method, which is performed by a CSCF, including:
step S41: acquiring authorization information; wherein the authorization information is used for indicating: the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session, or the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session with the UE corresponding to the at least one second identification information.
In some embodiments, a method comprises: sending a first request to the HSS, wherein the first request includes: first identification information of the first UE, or first identification information of the first UE and second identification information of the second UE; the first request is for requesting authorization information.
Embodiments of the present disclosure provide an IMS session, performed by a CSCF, comprising: sending a first request to the HSS, wherein the first request includes: first identification information of the first UE, or first identification information of the first UE and second identification information of the second UE; the first request is for requesting authorization information.
In some embodiments, obtaining authorization information includes: receiving a first response sent by the HSS, wherein the first response comprises: authorization information.
Embodiments of the present disclosure provide an IMS session, performed by a CSCF, comprising: receiving a first response sent by the HSS, wherein the first response comprises: authorization information.
Here, the CSCF may obtain subscription information from the HSS, wherein the subscription information includes authorization information; or the CSCF may obtain the authorization information directly from the HSS.
In some embodiments, the method comprises at least one of:
determining whether to allow the first UE to transmit and/or receive the IMS session based on the authorization information;
determining whether to allow the first UE to transmit and/or receive an IMS session with the second UE based on the authorization information;
determining whether the first UE initiates and/or receives an IMS session within a call time range based on the authorization information;
based on the authorization information, it is determined whether the first UE initiates and/or receives an IMS session with the second UE within a call time range.
The embodiment of the disclosure provides an IMS session method, which is executed by a CSCF and comprises at least one of the following steps:
determining whether to allow the first UE to transmit and/or receive the IMS session based on the authorization information;
determining whether to allow the first UE to transmit and/or receive an IMS session with the second UE based on the authorization information;
determining whether the first UE initiates and/or receives an IMS session within a call time range based on the authorization information;
based on the authorization information, it is determined whether the first UE initiates and/or receives an IMS session with the second UE within a call time range.
Here, if the CSCF determines that the invite request meets the requirement of the authorization information corresponding to the first identification information, the CSCF determines to allow the first UE to send and/or receive the IMS session. Or, if the CSCF determines that the invite request does not meet the requirement of the authorization information corresponding to the first identification information, it determines that the first sending and/or receiving of the IMS session is not allowed. Here, the requirement for reaching the authorization information corresponding to the first identification information may be: the authorization information indicates that the user corresponding to the first identification information allows or authorizes to send and/or receive the IMS session.
Here, if the CSCF determines that the authorization information corresponding to the first identification information includes a requirement for the second identification information and determines that the invite request meets the requirement for the authorization information, the CSCF determines to allow the first UE to send and/or receive an IMS session with the second UE. Or if the CSCF determines that the authorization information corresponding to the first identification information includes a requirement for the second identification information and determines that the invite request does not meet the requirement for the authorization information, the CSCF determines that the first UE is not allowed to send and/or receive an IMS session with the second UE. Here, the requirement that the authorization message corresponding to the first identification information includes the second identification information may be: the authorization information indicates that the user corresponding to the first identification information allows or authorizes to send and/or receive the IMS session of the user corresponding to the second identification information.
Embodiments of the present disclosure provide an IMS session, performed by a CSCF, comprising: acquiring a calling time range allowed by a first UE initiating and/or receiving IMS session corresponding to at least one first identification information; and/or acquiring a calling time range allowed by the IMS session of the second UE corresponding to the at least one second identification information, initiated and/or received by the first UE corresponding to the at least one first identification information. In this manner, it may be determined whether the first UE initiates and/or receives an IMS session within a call time range, and/or whether the first UE initiates and/or receives an IMS session with the second UE within a call time range, based on the current time and these call time ranges obtained by the CSCF, etc.
Here, the CSCF of the first UE obtains authorization information from the HSS of the first UE. The CSCF of the second UE obtains authorization information from the HSS of the second UE.
As such, in the embodiments of the present disclosure, the CSCF may obtain authorization information from the HSS and accurately determine, based on the authorization information, whether the first UE can safely access the IMS network using third party information (e.g., first identification information) for an IMS session, or accurately determine, based on the authorization information, whether the first UE can safely access the IMS network using the first identification information and a second UE using third party information (second identification information) for an IMS session.
Of course, in other embodiments, the CSCF may also obtain authorization results from other logical nodes or functions of the communication device, for example, from a third-party AAA server.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
In some embodiments, a method comprises: sending a second request to a third party AAA server; wherein the second request comprises first identification information of the first UE, and the second request is used for requesting whether the first UE is allowed to initiate and/or receive an IMS session; alternatively, the second request includes first identification information of the first UE and second identification information of the second UE, and the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
As shown in fig. 5, an embodiment of the present disclosure provides an IMS session, performed by a CSCF, comprising:
step S51: sending a second request to a third party AAA server;
wherein the second request comprises first identification information of the first UE, and the second request is used for requesting whether the first UE is allowed to initiate and/or receive an IMS session;
Alternatively, the second request includes first identification information of the first UE and second identification information of the second UE, and the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
In some embodiments, a method comprises: receiving a second response sent by the third-party AAA server; wherein the second response includes at least one of: whether the first UE is allowed to initiate and/or receive an authorization result of the IMS session; and whether the first UE is allowed to initiate and/or receive an authorization result of an IMS session with the second UE.
An embodiment of the present disclosure provides an IMS session method, performed by a CSCF, including: receiving a second response sent by the third-party AAA server; wherein the second response includes at least one of: whether the first UE is allowed to initiate and/or receive an authorization result of the IMS session; and whether the first UE is allowed to initiate and/or receive an authorization result of an IMS session with the second UE.
In some embodiments, the second response further comprises at least one of: the first UE initiates and/or receives an authorization result of whether the IMS session is within a calling time range; and the first UE initiates and/or receives the authorization result of whether the IMS session with the second UE is within the calling time range.
An embodiment of the present disclosure provides an IMS session method, performed by a CSCF, including: receiving a second response sent by the third-party AAA server; wherein the second response includes at least one of: the first UE initiates and/or receives an authorization result of whether the IMS session is within a calling time range; and the first UE initiates and/or receives the authorization result of whether the IMS session with the second UE is within the calling time range.
In one embodiment, the CSCF of the first UE obtains the second response from the third party AAA server of the first UE; and/or the CSCF of the second UE obtains the second response from a third party AAA server of the second UE.
In one embodiment, the third party AAA server of the first UE is the same as the third party AAA server of the second UE. Here, the IMS network in which the first UE is located may be the same as or different from the IMS network in which the second UE is located.
In another embodiment, the third party AAA server of the first UE is different from the third party AAA server of the second UE. Here, the IMS network where the first UE is located is different from the IMS network where the second UE is located.
As such, in the disclosed embodiments, the CSCF may send a second request to the third party AAA server to accurately obtain whether to allow the first UE to initiate and/or receive the second response of the IMS session or whether to allow the first UE to initiate and/or receive the second response of the IMS session with the second UE. And does not need to perform authorization check operation, so that the load of the CSCF can be reduced.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
In some embodiments, the CSCF is the CSCF of the first UE,
the method comprises the following steps: an invite request is sent to the CSCF of the second UE.
Embodiments of the present disclosure provide an IMS session, performed by a CSCF of a first UE, comprising: an invite request is sent to the CSCF of the second UE.
Embodiments of the present disclosure provide an IMS session, performed by a CSCF of a first UE, comprising: an invite request is sent to a CSCF of the second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE. In this way, the second UE is facilitated to establish an IMS session with the first UE.
Here, the CSCF may determine whether to allow the first UE to initiate and/or an IMS session with the second UE based on the authorization information, or the CSCF may determine whether to allow the first UE to initiate and/or an IMS session with the second UE from the acquired second response.
In some embodiments, before the CSCF of the first UE sends the invite request to the CSCF of the second UE, it includes: the invite request is signed.
The embodiment of the disclosure provides an IMS session method, which is executed by a CSCF of a first UE and comprises the following steps:
If it is determined that the first UE is allowed to initiate and/or receive an IMS session with the second UE, signing the invite request;
and sending the signed invitation request.
Illustratively, the CSCF of the first UE derives the multimedia common user identity (IP Multimedia Public Identity, IMPU) From a header of the invite request, which may be, but is not limited to, a PAI format or a From format header. The CSCF of the first UE invokes a secure telephony identity authentication service (Secure Telephone Identity Authentication Service, STI-AS) or an application server (Application Server, AS) of the first UE to sign the invite request based on the IMPU; for example, the CSCF of the first UE sends a signature request carrying an invite request to the STI-AS or AS; the STI-AS or AS signs the invitation request based on the signature request, and sends the signed invitation request to the CSCF of the first UE; the signed invite request may add an identity header of the IMPU. Here, if the first UE and the second UE belong to UEs between the same third party; the signature operation may be skipped according to the third party security policy.
Thus, the CSCF of the first UE can invoke the STI-AS to carry out integrity protection on the invitation request, and the safety of the invitation request is improved.
In some embodiments, the CSCF is the CSCF of the second UE;
the receiving of the invite request in step S31 includes: and receiving an invite request sent by the CSCF of the first UE.
Embodiments of the present disclosure provide an IMS session, performed by a CSCF of a second UE, comprising: and receiving an invite request sent by the CSCF of the first UE.
Here, receiving an invite request sent by a CSCF of a first UE includes: and receiving the signed invitation request sent by the CSCF of the first UE.
In some embodiments, the CSCF includes: CSCF of the second UE;
the method comprises the following steps: the signed invite request is verified to verify the integrity and legitimacy of the invite request.
The embodiment of the disclosure provides an IMS session method, which is executed by a CSCF of a second UE and comprises the following steps: the signed invite request is verified to verify the validity and integrity of the invite request. Here, the CSCF of the second UE verifies the signed invitation, and if the verification is successful, the invite request after the verification is successful may be obtained.
Illustratively, the CSCF of the second UE receives the signed invite request sent by the CSCF of the first UE and invokes a secure telephony authentication service (Secure Telephone Identity Verification Service, STI-VS) or an Application Server (AS) to verify the signed invite request to verify the validity and integrity of the invite request. For example, the CSCF of the second UE sends an authentication request to the STI-VS or AS; the STI-VS or AS verifies the signed invite request based on the verification request, and sends the verified invite request to the CSCF of the second UE. Here, if the STI-VS or the AS verifies the signed invite request based on the verification request and the verification fails, a message of the verification failure is sent to the CSCF of the second UE.
In this way, the CSCF of the second UE may invoke the STI-VS/AS to verify the signed invite request so that the CSCF of the second UE may obtain a legitimate invite request.
In some embodiments, a method comprises: an invite request is sent to a second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE.
Here, the sending of the invite request to the second UE may be: and sending the invite request after the authentication is passed to the second UE.
The above embodiments may be specifically referred to the first UE side, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following IMS-based session method is performed by the HSS, similar to the description of the IMS session method performed by the first UE and/or CSCF described above; for technical details not disclosed in the IMS session method embodiment executed by the HSS, please refer to a description of an IMS session method example executed by the first UE and/or CSCF, and a detailed description thereof will not be provided herein.
As shown in fig. 6, an embodiment of the present disclosure provides an IMS session method, performed by an HSS, including:
Step S61: receiving a first request sent by a CSCF, wherein the first request comprises first identification information of a first UE, and the first request is used for requesting authorization information; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows for initiation and/or reception of an IMS session.
In some embodiments of the present disclosure, the CSCF may be the CSCF in the above embodiments. Illustratively, the CSCF includes the CSCF of the first UE or the CSCF of the second UE.
In some embodiments of the disclosure, the HSS comprises the HSS of the first UE and/or the HSS of the second UE. If the HSS is the HSS of the first UE, the HSS of the first UE receives a first request sent by the CSCF of the first UE; if the HSS is the second HSS, the HSS of the second UE receives a first request sent by the CSCF of the second UE. The HSS of the first UE is the HSS of the IMS network where the first UE is located; the HSS of the second UE is the HSS of the IMS network where the second UE is located. The HSS of the first UE is the same as the HSS of the second UE or the HSS of the first UE is different from the HSS of the second UE.
In some embodiments of the present disclosure, the first request may be the first request in the above embodiments; the authorization information may be the authorization information in the above embodiment; the first identification information of the first UE and the second identification information of the second UE may be the first identification information of the first UE and the second identification information of the second UE in the above embodiments, respectively.
Illustratively, the first request includes first identification information of the first UE and second identification information of the second UE; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session corresponding to the at least one second identification information.
Illustratively, the first identification information of the first UE is determined by at least one of, but not limited to:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
Illustratively, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
Illustratively, the authorization information may also be used to indicate: the UE corresponding to the at least one first identification information allows for initiation and/or reception of an IMS session.
An embodiment of the present disclosure provides an IMS session method, performed by an HSS, including: a first response is sent to the CSCF, wherein the first response includes authorization information.
In some embodiments of the present disclosure, the first response may be the first response in the above-described embodiments.
In the embodiment of the disclosure, the HSS may directly send the first response carrying the authorization information to the CSCF by receiving the first request for requesting the authorization information sent by the CSCF, so that the CSCF may implement authorization judgment for the UE to access the IMS network using third party information (for example, the first identification information of the first UE and the second identification information of the second UE) based on the authorization information.
The above embodiments may be specifically referred to the CSCF side, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following IMS session based method, performed by the third party AAA server, is similar to the description of the IMS session method performed by the first UE and/or CSCF described above; for technical details not disclosed in the IMS session method embodiment executed by the third party AAA server, refer to the description of the IMS session method example executed by the first UE and/or CSCF, and will not be described in detail herein.
As shown in fig. 7, an embodiment of the present disclosure provides an IMS session method, which is performed by a third party AAA server, including:
step S71: receiving a second request sent by the CSCF, wherein the second request comprises first identification information of the first UE; wherein the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session.
In some embodiments of the present disclosure, the CSCF may be the CSCF in the above embodiments. Illustratively, the CSCF includes the CSCF of the first UE or the CSCF of the second UE.
In some embodiments of the present disclosure, the third party AAA server comprises a third party AAA server of the first UE and/or a third party AAA server of the second UE. If the third party AAA server is the third party AAA server of the first UE, the third party AAA server of the first UE receives a second request sent by the CSCF of the first UE; if the third party AAA server is the third party AAA server of the second UE, the third party AAA server of the second UE receives a second request sent by the CSCF of the second UE.
In some embodiments of the present disclosure, the second request may be the second request in the above embodiments; the first identification information of the first UE and the second identification information of the second UE may be the first identification information of the first UE and the second identification information of the second UE in the above embodiments, respectively.
The second request further includes second identification information of the second UE; the second request is also for requesting whether the first UE allows initiation and/or reception of an IMS session with the second UE.
Illustratively, the first identification information of the first UE is determined by at least one of, but not limited to:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
Illustratively, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
The embodiment of the disclosure provides an IMS session method, which is executed by a third party AAA server and comprises the following steps: acquiring authorization information; and/or store authorization information. Here, the third-party AAA server may acquire authorization information from a logical node or function such as HSS.
The embodiment of the disclosure provides an IMS session method, which is executed by a third party AAA server and comprises the following steps: based on the second request and the authorization information, determining an authorization result of at least one of the following:
whether the first UE is allowed to send and/or receive IMS sessions;
whether the first UE is allowed to send and/or receive IMS sessions with the second UE;
whether the first UE initiates and/or receives an IMS session within a call time range;
whether the first UE initiates and/or receives an IMS session with the second UE is within a call time range.
The embodiment of the disclosure provides an IMS session method, which is executed by a third party AAA server and comprises the following steps: transmitting a second response to the CSCF, wherein the second response includes: and (5) authorizing results.
Thus, in the embodiment of the present disclosure, after receiving the second request sent by the CSCF, the third-party AAA server may determine authorization of the UE to access the IMS network using third-party information (e.g., the first identification information of the first UE and the second identification information of the second UE) based on the second request and the authorization information, and send an authorization result of the authorization determination to the CSCF. Therefore, the CSCF can accurately know the authorization result of the first UE and the second UE for accessing the IMS network by using the third party information, and the CSCF is not required to carry out the operation of authorization judgment, so that the power consumption and the like of the CSCF can be reduced.
The above embodiments may be specifically referred to the CSCF side, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
The following IMS session based method is performed by the second UE, similar to the description of the IMS session method performed by the first UE and/or CSCF and/or HSS and/or third party AAA server described above; for technical details not disclosed in the IMS session method embodiment executed by the second UE, refer to the description of an IMS session method example executed by the first UE and/or CSCF and/or HSS and/or third party AAA server, and will not be described in detail here.
As shown in fig. 8, an embodiment of the present disclosure provides an IMS session method, which is performed by a second UE, including:
step S81: receiving an invite request sent by a CSCF of a second UE, wherein the invite request comprises first identification information of the first UE and second identification information of the second UE;
step S82: an IMS session is established with the first UE based on the invite request.
In some embodiments of the present disclosure, the invite request may be the invite request in the above-described embodiments; the first identification information of the first UE and the second identification information of the second UE may be the first identification information of the first UE and the second identification information of the second UE in the above embodiments.
Illustratively, the invite request includes first identification information of the first UE and second identification information of the second UE, and the invite request is for requesting the first UE to initiate and/or receive an IMS session with the second UE.
Exemplary, the invite request includes first identification information of the first UE, and the invite request is for requesting the first UE to initiate and/or receive an IMS session
Illustratively, the first identification information of the first UE is determined by at least one of, but not limited to:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
Illustratively, the second identification information of the second UE is determined by at least one of, but not limited to:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
The above embodiments may be specifically referred to the first UE and/or CSCF and/or HSS and/or third party AAA server side, and will not be described herein.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
To further explain any embodiments of the present disclosure, a specific embodiment is provided below.
AS shown in fig. 9, an embodiment of the present disclosure provides an IMS session method, performed by a communication device, where the communication device includes a first UE, an S-CSCF for the first UE, an STI-AS or AS, an HSS, a third party AAA server, an STI-VS or AS, an S-CSCF for a second UE, and the second UE; in the embodiments of the present disclosure, it is assumed that a first UE and/or a second UE may obtain a third party specific user identity, and that the first UE and/or the second UE have been implicitly registered or independently registered with an IMS session; the third party specific user identity may be provided by a third party AAA server or by the (IMS) HSS based on information from the third party; the third party specific user identity may be, but is not limited to being, at least one of an identity under a third party organization or network, job information under a third party organization or network, associated organization information under a third party organization or network, and location related information under a third party organization or network. Here, the third party network may be connected to the IMS network through a 5G network function; messages may be forwarded between the third party AAA server and the CSCF through a network opening function (Network Exposure Function, NEF). The IMS session method comprises the following steps:
Step S901: the method comprises the steps that a first UE sends an invitation request to an S-CSCF of the first UE;
in an alternative embodiment, the invite request includes first identification information of the first UE, and the invite request is for requesting the first UE to initiate and/or receive an IMS session.
In another alternative embodiment, the invite request includes first identification information of the first UE and second identification information of the second UE, and the invite request is used to request the first UE to initiate and/or receive an IMS session with the second UE.
Here, the first identification information of the first UE may be determined by a third party specific user identity of the first UE; and/or the first identification information of the second UE may be determined by a third party specific user identity of the second UE.
Step S902: after receiving the invite request, the S-CSCF of the first UE determines whether the invite request is attacked;
in an alternative embodiment, after receiving the invite request, the S-CSCF of the first UE determines whether the invite request is attacked, based on time information and a current time included in the invite request; if the difference value between the time indicated by the time information and the current time is smaller than or equal to the preset time, determining that the invitation request is not attacked; if the difference between the time indicated by the time information and the current time is larger than the preset time, determining that the invitation request is attacked. Illustratively, the time information is a timestamp. Here, if the invite request is not attacked, the S-CSCF of the first UE checks whether the first UE is authorized to initiate an IMS session; the authorization initiates the IMS session, i.e. allows for initiation of the IMS session.
The step S902 further includes a step S902a or a step S902b; wherein,
step S902a: the S-CSCF of the first UE acquires authorization information from the HSS and checks the authorization;
in an alternative embodiment, the S-CSCF of the first UE sends a first request to the HSS, wherein the first request includes first identification information of the first UE and second identification information of the second UE, and the first request is for requesting authorization information; the S-CSCF of the first UE receives a first response sent by the HSS, wherein the first response comprises authorization information; the authorization information indicates at least: the UE corresponding to the at least one first identification information is allowed to initiate an IMS session for the UE corresponding to the at least one second identification information. The S-CSCF of the first UE determines whether to allow the first UE to initiate an IMS session with the second UE based on the authorization information, the first identification information of the first UE, and the second identification information of the second UE.
In another alternative embodiment, the S-CSCF of the first UE may determine, based on the authorization information, whether the first UE initiates an IMS session with the second UE within a call time range.
Step S902b: the S-CSCF of the first UE acquires an authorization result from a third party AAA server;
in an alternative embodiment, the S-CSCF of the first UE sends a second request to the third party AAA server, where the second request includes the first identification information of the first UE and the second identification information of the second UE, and the second request is used to request whether to allow the first UE to initiate an IMS session with the second UE; the third party AAA server determines whether to allow the first UE to initiate the IMS session with the second UE based on the authorization information and sends a second response to the S-CSCF of the first UE, wherein the second response comprises an authorization result of whether to allow the first UE to initiate the IMS session with the second UE.
In yet another alternative embodiment, the second request sent by the S-CSCF of the first UE to the third party AAA server further includes time information; the third party AAA server determines whether the IMS session initiated by the first UE and the second UE is within the calling time range or not based on the second request and the current time, and sends an authorization result of whether the IMS session initiated by the first UE and the second UE is within the calling time range or not to the S-CSCF of the first UE.
Here, the second request may also be a second request carrying an invite request; the invite request is sent in the S-CSCF, which may also involve the P-CSCF and/or the I-CSCF; since the P-CSCF and/or I-CSCF are used for routing and forwarding, relevant steps will be omitted here.
Step S903: the S-CSCF of the first UE invokes an STI-AS or AS to sign the invitation request;
in an alternative embodiment, the S-CSCF of the first UE obtains the IMPU From the header of the invite request, which may be a PAI or From header; the S-CSCF of the first UE sends a signature request to the STI-AS or AS based on the IMPU, wherein the signature request is used for requesting to sign the invitation request;
step S904: STI-AS or AS signs the invitation request and sends the signed invitation request to S-CSCF of the first UE;
In an alternative embodiment, the STI-AS or AS signs the invite request based on the 5G authentication information, and adds an identity header to the invite request; and sending the signed invite request to the S-CSCF of the first UE.
Here, if the first UE and the second UE belong to the same UE under the third party, the above step S903 and step S904 may be skipped based on the operator policy.
Step S905: the S-CSCF of the first UE sends the signed invitation request to the S-CSCF of the second UE;
step S906: the S-CSCF of the second UE invokes the STI-VS or AS to verify the signed invitation request;
in an alternative embodiment, the S-CSCF of the second UE sends a validation request to the STI-VS or AS requesting validation of the signed invite request.
Step S907: the STI-VS or AS verifies the signed invitation request and sends the verified invitation request to the S-CSCF of the second UE;
in an alternative embodiment, the STI-VS or AS verifies the signed invite request based on the 5G authentication information, and obtains the invite request after verification is passed; the STI-VS or AS sends the invite request after passing the authentication to the S-CSCF of the second UE.
Step S908: if the S-CSCF of the second UE determines that the authentication is passed, checking whether the second UE is authorized to receive the IMS session of the first UE;
Step S908 also includes S908a or S908b; wherein,
step S908a: the S-CSCF of the second UE acquires the authorization information from the HSS and detects the authorization;
in an alternative embodiment, the S-CSCF of the second UE sends a first request to the HSS, wherein the first request includes first identification information of the first UE and identification information of the second UE, and the first request is for requesting authorization information; the S-CSCF of the second UE receives a first response sent by the HSS, wherein the first response comprises authorization information; the authorization information indicates at least: the UE corresponding to the at least one first identification information is allowed to initiate an IMS session for the UE corresponding to the at least one second identification information. The S-CSCF of the second UE determines whether to allow the second UE to receive the IMS session with the first UE based on the authorization information, the first identification information of the first UE, and the second identification information of the second UE.
In another alternative embodiment, the S-CSCF of the second UE may determine, based on the authorization information, whether the IMS session of the first UE received by the second UE is within a call time range.
Step S908b: the S-CSCF of the second UE acquires an authorization result from the third party AAA server;
in an alternative embodiment, the S-CSCF of the second UE sends a second request to the third party AAA server, where the second request includes the identification information of the first UE and the second identification information of the second UE, and the second request is used to request whether the second UE is allowed to receive the IMS session of the first UE; the third party AAA server determines whether to allow the second UE to receive the IMS session of the first UE based on the authorization information and sends a second response to the S-CSCF of the second UE, wherein the second response comprises an authorization result of whether to allow the second UE to receive the IMS session of the first UE.
In another alternative embodiment, the S-CSCF of the second UE sends the second request to the third party AAA server further including time information; the third party AAA server determines whether the IMS session of the first UE received by the second UE is in the calling time range based on the second request and the current time, and sends an authorization result of whether the IMS session of the first UE received by the second UE is in the calling time range to the S-CSCF of the second UE.
Step S909: if the S-CSCF of the second UE determines to allow the second UE to receive the IMS session of the first UE, sending an invitation request to the second UE;
here, the second UE is allowed to receive the IMS session of the first UE, i.e. the second UE is authorized to receive the IMS session of the first UE.
Here, if the S-CSCF of the second UE receives the invite request authentication failure message sent by the STI-VS or AS, the invite request authentication failure message may be sent to the second UE.
Step S910: the second UE establishes an IMS session with the first UE based on the invite request.
It should be noted that, as those skilled in the art may understand, the methods provided in the embodiments of the present disclosure may be performed alone or together with some methods in the embodiments of the present disclosure or some methods in the related art.
As shown in fig. 10, an embodiment of the present disclosure provides an IMS session device, including:
a first sending module 21 configured to send an invite request to the CSCF, wherein the invite request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
The IMS session device provided by the embodiment of the disclosure can be applied to the first UE.
In some embodiments, the first identification information of the first UE is determined by at least one of:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
In some embodiments, the second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
An embodiment of the present disclosure provides an IMS session device, including: a first sending module 21 configured to send an invite request to the CSCF, the invite request including first identification information of a first UE and second identification information of a second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
In some embodiments, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
An embodiment of the present disclosure provides an IMS session device, including: the first receiving module is configured to acquire first identification information of the first UE and/or second identification information of the second UE.
An embodiment of the present disclosure provides an IMS session device, including:
a first receiving module configured to obtain a third party specific user identity of the first UE and/or a third party specific user identity of the second UE;
the first processing module is configured to determine first identification information of the first UE based on a third party specific user identity of the first UE and/or determine second identification information of the second UE based on a third party specific user identity of the second UE.
In some embodiments, the third party specific user identity of the first UE may be at least one of an identity of the first UE under a third party organization or network, job information of the first UE under the third party organization or network, organization information associated with the first UE under the third party organization or network, and location related information of the first UE under the third party organization or network.
In some embodiments, the third party specific user identity of the second UE may be at least one of an identity of the second UE under the third party organization or network, job information of the second UE under the third party organization or network, organization information associated with the second UE under the third party organization or network, and location related information of the second UE under the third party organization or network.
As shown in fig. 11, an embodiment of the present disclosure provides an IMS session device, including:
a second receiving module 31 configured to receive an invite request, wherein the invite request includes first identification information of a first UE; the invite request is used to request the first UE to initiate and/or receive an IMS session.
The IMS session device provided by the embodiment of the present disclosure may be executed by a CSCF.
In some embodiments, the CSCF includes a CSCF of the first UE or a CSCF of the second UE.
In some embodiments, the first identification information of the first UE is determined by at least one of:
an identity of the first UE under a third party organization or network;
the third party organizes or network the job information of the first UE;
organizing or organizing information associated with the first UE under the network by a third party;
and the location related information of the first UE under the third party organization or network.
In some embodiments, the invite request includes second identification information of the second UE; an invite request requesting that a first UE initiate and/or receive an IMS session with a second UE.
In some embodiments, the second identification information of the second UE is determined by at least one of:
an identity of a second UE under a third party organization or network;
the third party organizes or network the job information of the second UE;
organizing or organizing information associated with a second UE under a network by a third party;
and location related information of the second UE under the third party organization or network.
In some embodiments, the invite request includes: time information;
the device comprises: and a second processing module configured to determine whether the invitation request is attacked based on the time information and the current time.
The present disclosure provides an IMS session device, comprising: and a second processing module configured to determine whether the invitation request is attacked based on the time information and the current time.
The present disclosure provides an IMS session device, comprising: a second receiving module 31 configured to acquire authorization information; wherein the authorization information is used to indicate at least one of:
the UE corresponding to the at least one first identification information allows the initiation and/or the reception of the IMS session;
The UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session of the UE corresponding to the at least one second identification information.
The present disclosure provides an IMS session device, comprising: a second processing module configured to at least one of:
determining whether to allow the first UE to transmit and/or receive the IMS session based on the authorization information;
determining whether to allow the first UE to transmit and/or receive an IMS session with the second UE based on the authorization information;
determining whether the first UE initiates and/or receives an IMS session within a call time range based on the authorization information;
based on the authorization information, it is determined whether the first UE initiates and/or receives an IMS session with the second UE within a call time range.
The present disclosure provides an IMS session device, comprising: a second sending module configured to send a first request to the HSS, wherein the first request includes: first identification information of the first UE, or first identification information of the first UE and second identification information of the second UE; the first request is for requesting authorization information.
The present disclosure provides an IMS session device, comprising: the second receiving module 31 is configured to receive a first response sent by the HSS, where the first response includes: authorization information.
The present disclosure provides an IMS session device, comprising: a second sending module configured to send a second request to a third party authentication, authorization and accounting AAA server; wherein the second request comprises first identification information of the first UE, and the second request is used for requesting whether the first UE is allowed to initiate and/or receive an IMS session; or, the second sending module is configured to send a second request including the first identification information of the first UE and the second identification information of the second UE, and the second request is used for requesting whether the first UE allows to initiate and/or receive an IMS session with the second UE.
The present disclosure provides an IMS session device, comprising: a second receiving module 31 configured to receive a second response sent by the third party AAA server, wherein the second response includes at least one of: whether the first UE is allowed to initiate and/or receive an authorization result of the IMS session; and whether the first UE is allowed to initiate and/or receive an authorization result of an IMS session with the second UE.
In some embodiments, the second response further comprises at least one of:
the first UE initiates and/or receives an authorization result of whether the IMS session is within a calling time range;
the first UE initiates and/or receives an authorization result of whether an IMS session with the second UE is within a call time range.
In some embodiments, the CSCF is a CSCF of the first UE;
the second receiving module 31 is configured to receive an invite request sent by the first UE.
The disclosure provides an IMS session device, applied to CSCF of a first UE, comprising: the second receiving module 31 is configured to receive an invite request sent by the first UE.
In some embodiments, the CSCF is the CSCF of the second UE;
and the second receiving module is configured to receive an invite request sent by the CSCF of the first UE.
The disclosure provides an IMS session device, applied to CSCF of a second UE, comprising: a second receiving module 31 configured to receive an invite request sent by the CSCF of the first UE.
The disclosure provides an IMS session device, applied to CSCF of a second UE, comprising: and a second sending module configured to send an invite request to the second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE.
As shown in fig. 12, an embodiment of the present disclosure provides an IMS session device, including:
a third receiving module 41 configured to receive a transmitted first request, wherein the first request includes first identification information of a first UE, the first request being for requesting authorization information; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows for initiation and/or reception of an IMS session.
The IMS session device provided by the embodiment of the disclosure can be applied to the HSS.
In some embodiments, the HSS comprises the HSS of the first UE or the HSS of the second UE.
In some embodiments, the first request includes first identification information of the first UE and second identification information of the second UE; the authorization information is used to indicate: the UE corresponding to the at least one first identification information allows to initiate and/or receive an IMS session corresponding to the at least one second identification information.
An embodiment of the present disclosure provides an IMS session device, including: and a third sending module configured to send a first response to the CSCF, wherein the first response includes authorization information.
As shown in fig. 13, an embodiment of the present disclosure provides an IMS session device, including:
a fourth receiving module 51 configured to receive a second request sent by the CSCF, where the second request includes first identification information of the first UE; wherein the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session.
The IMS session device provided by the embodiment of the disclosure can be applied to a third party AAA server.
In some embodiments, the third party AAA server comprises a third party AAA server of the first UE or a third party AAA server of the second UE.
In some embodiments, the second request further includes second identification information of the second UE; the second request is also for requesting whether the first UE allows initiation and/or reception of an IMS session with the second UE.
The disclosed embodiments provide an IMS session device, comprising: a third processing module configured to determine, based on the second request and the authorization information, an authorization result of at least one of:
whether the first UE is allowed to send and/or receive IMS sessions;
whether the first UE is allowed to send and/or receive IMS sessions with the second UE;
whether the first UE initiates and/or receives an IMS session within a call time range;
whether the first UE initiates and/or receives an IMS session with the second UE is within a call time range.
An embodiment of the present disclosure provides an IMS session device, including: a fourth sending module configured to send a second response to the CSCF, wherein the second response includes: and (5) authorizing results.
As shown in fig. 14, an embodiment of the present disclosure provides an IMS session device, including:
a fifth receiving module 61, configured to receive an invite request sent by the CSCF of the second UE, where the invite request includes first identification information of the first UE and second identification information of the second UE;
a fourth processing module 62 is configured to establish an IMS session with the first UE based on the invite request.
The IMS session device provided by the embodiment of the present disclosure may be applied to the second UE.
It should be noted that, as will be understood by those skilled in the art, the apparatus provided in the embodiments of the present disclosure may be implemented separately or together with some apparatuses in the embodiments of the present disclosure or some apparatuses in the related art.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
The embodiment of the disclosure provides a communication device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the IMS session method of any embodiment of the present disclosure is implemented when the executable instructions are executed.
In one embodiment, the communication device may include, but is not limited to, at least one of: first UE, second UE, CSCF, HSS, and third-party AAA server.
The processor may include, among other things, various types of storage media, which are non-transitory computer storage media capable of continuing to memorize information stored thereon after a power failure of the user device.
The processor may be coupled to the memory via a bus or the like for reading an executable program stored on the memory, for example, at least one of the methods shown in fig. 2-9.
The embodiment of the present disclosure also provides a computer storage medium storing a computer executable program, which when executed by a processor, implements the IMS session method of any embodiment of the present disclosure. For example, at least one of the methods shown in fig. 2-9.
The specific manner in which the respective modules perform the operations in relation to the apparatus or storage medium of the above-described embodiments has been described in detail in relation to the embodiments of the method, and will not be described in detail herein.
Fig. 15 is a block diagram of a user device 800, according to an example embodiment. For example, user device 800 may be a mobile phone, computer, digital broadcast user device, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 15, user device 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the user device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 802 may include one or more processors 820 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interactions between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the user device 800. Examples of such data include instructions for any application or method operating on the user device 800, contact data, phonebook data, messages, pictures, video, and the like. The memory 804 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power supply component 806 provides power to the various components of the user device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the user device 800.
The multimedia component 808 includes a screen between the user device 800 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front camera and/or a rear camera. The front camera and/or the rear camera may receive external multimedia data when the user device 800 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the user device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may be further stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 further includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be a keyboard, click wheel, buttons, etc. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 814 includes one or more sensors for providing status assessment of various aspects of the user device 800. For example, the sensor assembly 814 may detect an on/off state of the device 800, a relative positioning of the components, such as a display and keypad of the user device 800, the sensor assembly 814 may also detect a change in position of the user device 800 or a component of the user device 800, the presence or absence of a user's contact with the user device 800, an orientation or acceleration/deceleration of the user device 800, and a change in temperature of the user device 800. The sensor assembly 814 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communication between the user device 800 and other devices, either in a wired or wireless manner. The user device 800 may access a wireless network based on a communication standard, such as WiFi,4G or 5G, or a combination thereof. In one exemplary embodiment, the communication component 816 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the user device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for executing the methods described above.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as memory 804 including instructions executable by processor 820 of user device 800 to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
As shown in fig. 16, an embodiment of the present disclosure shows a structure of a base station. For example, base station 900 may be provided as a network-side device. Referring to fig. 16, base station 900 includes a processing component 922 that further includes one or more processors and memory resources represented by memory 932 for storing instructions, such as applications, executable by processing component 922. The application programs stored in memory 932 may include one or more modules that each correspond to a set of instructions. Further, processing component 922 is configured to execute instructions to perform any of the methods described above as applied at the base station.
Base station 900 may also include a power component 926 configured to perform power management for base station 900, a wired or wireless network interface 950 configured to connect base station 900 to a network, and an input output (I/O) interface 958. The base station 900 may operate based on an operating system stored in memory 932, such as Windows Server TM, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (34)

  1. An IMS session method, wherein performed by a first UE, comprises:
    sending an invitation request to a Call Session Control Function (CSCF), wherein the invitation request comprises first identification information of a first UE; the invite request is for requesting the first UE to initiate and/or receive an IMS session.
  2. The method of claim 1, wherein the first identification information of the first UE is determined by at least one of:
    an identity of the first UE under a third party organization or network;
    the third party organizes or network the job information of the first UE;
    organizing or organizing information associated with the first UE under the network by a third party;
    and the location related information of the first UE under the third party organization or network.
  3. The method of claim 1 or 2, wherein the invite request comprises: second identification information of the second UE;
    the invite request is used for requesting the first UE to initiate and/or receive an IMS session with the second UE.
  4. The method of claim 3, wherein the second identification information of the second UE is determined by at least one of:
    an identity of a second UE under a third party organization or network;
    the third party organizes or network the job information of the second UE;
    organizing or organizing information associated with a second UE under a network by a third party;
    and location related information of the second UE under the third party organization or network.
  5. An IMS session method, wherein the IMS session method is performed by a call session control function CSCF, comprising:
    receiving an invitation request, wherein the invitation request comprises first identification information of a first UE; the invite request is for requesting the first UE to initiate and/or receive an IMS session.
  6. The method of claim 5, wherein the first identification information of the first UE is determined by at least one of:
    an identity of the first UE under a third party organization or network;
    the third party organizes or network the job information of the first UE;
    organizing or organizing information associated with the first UE under the network by a third party;
    and the location related information of the first UE under the third party organization or network.
  7. The method of claim 5, wherein the invite request includes second identification information of a second UE;
    The invite request is used for requesting the first UE to initiate and/or receive an IMS session with the second UE.
  8. The method of claim 7, wherein the second identification information of the second UE is determined by at least one of:
    an identity of a second UE under a third party organization or network;
    the third party organizes or network the job information of the second UE;
    organizing or organizing information associated with a second UE under a network by a third party;
    and location related information of the second UE under the third party organization or network.
  9. The method of claim 5, wherein the invite request comprises: time information;
    the method comprises the following steps: based on the time information and the current time, it is determined whether the invite request is attacked.
  10. The method according to any one of claims 5 to 9, wherein the method comprises:
    acquiring authorization information; wherein the authorization information is used to indicate at least one of:
    at least one UE corresponding to the first identification information allows initiation and/or reception of an IMS session;
    the UE corresponding to at least one of the first identification information is allowed to initiate and/or receive an IMS session with the UE corresponding to at least one of the second identification information.
  11. The method of claim 10, wherein the method comprises at least one of:
    determining whether to allow the first UE to transmit and/or receive an IMS session based on the authorization information;
    determining whether to allow the first UE to transmit and/or receive an IMS session with the second UE based on the authorization information;
    determining whether the first UE initiates and/or receives an IMS session within a call time range based on the authorization information;
    based on the authorization information, it is determined whether the first UE initiates and/or receives an IMS session with the second UE within a call time range.
  12. The method according to claim 10, wherein the method comprises:
    sending a first request to a home subscriber server, HSS, wherein the first request includes: the first identification information of the first UE or the first identification information of the first UE and the second identification information of the second UE; the first request is for requesting the authorization information.
  13. The method of claim 12, wherein the obtaining authorization information comprises:
    receiving a first response sent by the HSS, wherein the first response includes: the authorization information.
  14. The method according to any one of claims 5 to 9, wherein the method comprises:
    sending a second request to a third party authentication, authorization and accounting (AAA) server;
    wherein the second request includes first identification information of the first UE, and the second request is for requesting whether to allow the first UE to initiate and/or receive an IMS session;
    or,
    the second request includes first identification information of the first UE and second identification information of the second UE, and the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session with the second UE.
  15. The method according to claim 14, wherein the method comprises:
    receiving a second response sent by the third party AAA server, wherein the second response comprises at least one of the following:
    whether the first UE is allowed to initiate and/or receive an authorization result of an IMS session;
    whether the first UE is allowed to initiate and/or receive an authorization result of an IMS session with the second UE.
  16. The method of claim 15, wherein the second response further comprises at least one of:
    the first UE initiates and/or receives an authorization result of whether the IMS session is within a calling time range;
    The first UE initiates and/or receives an authorization result of whether an IMS session with the second UE is within a call time range.
  17. The method of claim 5, wherein the CSCF is a CSCF of the first UE;
    the receiving an invite request includes: and receiving the invitation request sent by the first UE.
  18. The method of claim 5, wherein the CSCF is a CSCF of the second UE;
    the receiving an invite request includes: and receiving the invite request sent by the CSCF of the first UE.
  19. The method of claim 18, wherein the method comprises:
    the invite request is sent to the second UE based on allowing the first UE to initiate and/or receive an IMS session with the second UE.
  20. An IMS session method performed by a home subscriber server HSS, comprising:
    receiving a first request sent by a Call Session Control Function (CSCF), wherein the first request comprises first identification information of the first UE, and the first request is used for requesting authorization information; the authorization information is used for indicating: and allowing the UE corresponding to at least one piece of the first identification information to initiate and/or receive the IMS session.
  21. The method of claim 20, wherein the first request comprises first identification information of the first UE and second identification information of the second UE; the authorization information is used for indicating: the UE corresponding to at least one of the first identification information allows to initiate and/or receive an IMS session corresponding to at least one of the second identification information.
  22. The method according to claim 20 or 21, wherein the method comprises:
    and sending a first response to the CSCF, wherein the first response comprises the authorization information.
  23. An IMS session method, wherein accounting AAA server is performed by third party authentication authorization, comprising:
    receiving a second request sent by a Call Session Control Function (CSCF), wherein the second request comprises first identification information of the first UE; wherein the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session.
  24. The method of claim 23, wherein the second request further comprises second identification information of the second UE; the second request is also for requesting whether the first UE allows initiation and/or reception of an IMS session with the second UE.
  25. The method according to claim 23 or 24, wherein the method comprises:
    based on the second request and the authorization information, determining an authorization result of at least one of the following:
    whether the first UE is allowed to send and/or receive IMS sessions;
    whether the first UE is allowed to send and/or receive IMS sessions with the second UE;
    whether the first UE initiates and/or receives an IMS session within a call time range;
    The first UE initiates and/or receives whether an IMS session with the second UE is within a call time range.
  26. The method of claim 25, wherein the method comprises:
    transmitting the second response to the CSCF, wherein the second response includes: and the authorization result.
  27. An IMS session method, wherein performed by a second UE, comprising:
    receiving an invite request sent by the CSCF of the second UE, wherein the invite request comprises first identification information of the first UE and second identification information of the second UE;
    an IMS session is established with the first UE based on the invite request.
  28. An IMS session device, comprising:
    a first sending module configured to send an invite request to a call session control function CSCF, wherein the invite request includes first identification information of a first UE; the invite request is for requesting the first UE to initiate and/or receive an IMS session.
  29. An IMS session device, comprising:
    a second receiving module configured to receive an invite request, wherein the invite request includes first identification information of a first UE; the invite request is for requesting the first UE to initiate and/or receive an IMS session.
  30. An IMS session device, comprising:
    a third receiving module configured to receive a first request sent by a call session control function CSCF, where the first request includes first identification information of the first UE, and the first request is used for requesting authorization information; the authorization information is used for indicating: and allowing the UE corresponding to at least one piece of the first identification information to initiate and/or receive the IMS session.
  31. An IMS session device, comprising:
    a fourth receiving module configured to receive a second request sent by a call session control function CSCF, wherein the second request includes first identification information of the first UE; wherein the second request is for requesting whether the first UE is allowed to initiate and/or receive an IMS session.
  32. An IMS session device, comprising:
    a fifth receiving module configured to receive an invite request sent by the CSCF of the second UE, where the invite request includes first identification information of the first UE and second identification information of the second UE
    A fourth processing module configured to establish an IMS session with the first UE based on the invite request.
  33. A communication device, wherein the communication device comprises:
    A processor;
    a memory for storing the processor-executable instructions;
    wherein the processor is configured to: for implementing the IMS session method of any one of claims 1 to 4, or claims 5 to 19, or claims 20 to 22, or claims 23 to 26, or claim 27, when the executable instructions are executed.
  34. A computer storage medium storing a computer executable program which when executed by a processor implements the IMS session method of any one of claims 1 to 4, or claims 5 to 19, claims 20 to 22, or claims 23 to 26, or claim 27.
CN202280002391.3A 2022-06-27 2022-06-27 IMS session method, device, communication equipment and storage medium Pending CN117643043A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/101656 WO2024000115A1 (en) 2022-06-27 2022-06-27 Ims session method and apparatus, and communication device and storage medium

Publications (1)

Publication Number Publication Date
CN117643043A true CN117643043A (en) 2024-03-01

Family

ID=89383629

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202280002391.3A Pending CN117643043A (en) 2022-06-27 2022-06-27 IMS session method, device, communication equipment and storage medium

Country Status (2)

Country Link
CN (1) CN117643043A (en)
WO (1) WO2024000115A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426887B (en) * 2013-09-04 2018-06-19 华为技术有限公司 Service authority determines method and apparatus
CN108886520B (en) * 2016-01-25 2021-03-30 黑莓有限公司 Establishing a session initiation protocol session
WO2021044271A1 (en) * 2019-09-05 2021-03-11 Telefonaktiebolaget Lm Ericsson (Publ) Support for ims routing with multiple ims pdu sessions over different 5gc slices
US20220124091A1 (en) * 2020-10-15 2022-04-21 T-Mobile Usa, Inc. Enhanced n17 interface between ims network and 5g-eir

Also Published As

Publication number Publication date
WO2024000115A1 (en) 2024-01-04

Similar Documents

Publication Publication Date Title
CN117643043A (en) IMS session method, device, communication equipment and storage medium
CN115581125A (en) Communication equipment detection method and device, communication equipment and storage medium
CN117652123A (en) IMS session method, device, communication equipment and storage medium
WO2024092801A1 (en) Authentication methods and apparatuses, communication device and storage medium
WO2024031565A1 (en) Information processing method and apparatus, and communication device and storage medium
WO2024031391A1 (en) Ranging or sidelink positioning method and apparatus, communication device, and storage medium
WO2023230924A1 (en) Authentication method, apparatus, communication device, and storage medium
US20230014016A1 (en) Voice call method, terminal and storage medium
WO2024145947A1 (en) Information processing methods and apparatuses, and communication device and storage medium
WO2024016349A1 (en) Method and apparatus for providing sensing service, communication device, and storage medium
CN118302991A (en) Authentication method, authentication device, communication equipment and storage medium
WO2023070685A1 (en) Relay communication method and apparatus, communication device, and storage medium
CN116349271A (en) Authorization method and device for positioning service, communication equipment and storage medium
CN117795915A (en) Application program interface API authentication method, device, communication equipment and storage medium
CN117581508A (en) Authentication method, authentication device, communication equipment and storage medium
CN118056387A (en) Wireless communication method, device, communication equipment and storage medium for proximity service ProSe
CN117136563A (en) Method, device, communication equipment and storage medium for acquiring terminal position
CN117413557A (en) Authentication method, authentication device, communication equipment and storage medium
CN116250276A (en) QoS management method and device, communication equipment and storage medium
CN116406513A (en) Subscription method and device of QoS monitoring result, communication equipment and storage medium
CN116349267A (en) Key distribution method, device, communication equipment and storage medium
CN117597959A (en) Authentication and authorization method, device, communication equipment and storage medium
CN116868613A (en) Information indication method, device, communication equipment and storage medium
CN117795905A (en) API caller authentication method and device, communication equipment and storage medium
CN117597958A (en) Authentication and authorization method, device, communication equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination