WO2017213565A1 - Gestion d'identité dans un sous-système multimédia ip - Google Patents

Gestion d'identité dans un sous-système multimédia ip Download PDF

Info

Publication number
WO2017213565A1
WO2017213565A1 PCT/SE2016/050563 SE2016050563W WO2017213565A1 WO 2017213565 A1 WO2017213565 A1 WO 2017213565A1 SE 2016050563 W SE2016050563 W SE 2016050563W WO 2017213565 A1 WO2017213565 A1 WO 2017213565A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
originating
entity
sip
leg
Prior art date
Application number
PCT/SE2016/050563
Other languages
English (en)
Inventor
Michele MAIORINO
Elvira Villani
Francesco TORO
Alessandro Mordacci
Original Assignee
Telefonaktiebolaget Lm Ericsson (Publ)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson (Publ) filed Critical Telefonaktiebolaget Lm Ericsson (Publ)
Priority to PCT/SE2016/050563 priority Critical patent/WO2017213565A1/fr
Publication of WO2017213565A1 publication Critical patent/WO2017213565A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1063Application servers providing network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1076Screening of IP real time communications, e.g. spam over Internet telephony [SPIT]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/006Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer

Definitions

  • Embodiments herein relate to wireless communication and more specifically to handling of identities of an originating entity in an internet protocol multimedia subsystem (IMS).
  • IMS internet protocol multimedia subsystem
  • IMS Internet protocol Multimedia Subsystem
  • IMS has introduced a change in telecommunication network in that it specifies a separation of the access network, e.g. radio access network (RAN) from service networks that provide multimedia services and by such a separation provide a plurality of different of services regardless of access technology used by the device that is used to access the services.
  • RAN radio access network
  • Examples of access technologies include third generation partnership project (3GPP) wideband code division multiple access (WCDMA) as well as long term evolution (LTE) technologies and evolved variants of these, as well as other access technologies including Institute of Electrical and Electronics Engineers' (IEEE) 802.1 1 standards.
  • 3GPP third generation partnership project
  • WCDMA wideband code division multiple access
  • LTE long term evolution
  • IEEE Institute of Electrical and Electronics Engineers'
  • the IMS is completely based on the Internet protocol (IP) and it allows a faster introduction of new services compared to the circuit switched legacy architecture where mobile switching center (MSC) nodes control both service and access.
  • IP Internet protocol
  • MSC mobile switching center
  • IMS services meet flexibility, easy deployment and customization needs coming from both telecommunication operators and end-users.
  • Services that are provided in the IMS context include voice services such as voice over IP (VoIP), video services as well as message services such as chat and short message service (SMS).
  • VoIP voice over IP
  • SMS short message service
  • a network operator shall provide access to intercepted content of communications (CC) and intercept related information (IRI) of mobile targets and services related to the target (e.g. call forwarding) on behalf of law enforcement agencies (LEAs).
  • An LEA provides intercept requests (e.g., lawful authorization or warrant) to the network operator.
  • the intercept request identifies, at a minimum, the target, the type of intercept (i.e., IRI- only, or IRI and CC) that is authorized, the authorized period for interception, and the LEA delivery address(es) for the intercepted information.
  • Figure 1 illustrates an IMS 100 and two connected access networks in the form a RAN 1 12 and a local area network (LAN).
  • An originating entity 1 10 is connected to the RAN 1 12 and a terminating entity 1 14 is connected to the LAN 1 16.
  • the IMS 100 comprises a proxy call/session control function (P-CSCF) 104, a serving call/session control function (S-CSCF) 106 and an application server (AS) 102.
  • a law enforcement agency (LEA)/law enforcement management function (LEMF) 1 18 is connected to the IMS 100. Signaling between the entities in the IMS and the connected entities takes place by means of session initiation protocol (SIP) signaling.
  • SIP session initiation protocol
  • FIG. 2 is a schematically illustrated signaling diagram involving some of the entities in figure 1 .
  • An originating leg 220 illustrates that a SIP invite message 201 from the originating entity 1 10, having an identity N1 , is conveyed via the P-CSCF 104 and the S- CSCF 106 to the AS 102.
  • the AS 102 changes the SIP invite message 201 by replacing the identity N1 with an identity N2 and transmits a changed SIP invite message 203 in a terminating leg 222 to the terminating entity 1 14 via the S-CSCF 106.
  • various other nodes may be present along the terminating leg as illustrated by reference numeral 125 (the functionality of which is outside the scope of the present disclosure) and the broken message line 250.
  • the problem with current solutions is that if the originating entity 1 10 has two associated identities, e.g. N1 and N2, and only e.g. the N2 identity is the one under monitoring in the IMS 100 domain, when a call is started from the originating entity 1 10 by using e.g. N1 identity, in the signaling leg from the originating entity 1 10 up to the AS 102 only e.g. N1 is shown as the originating identity within SIP signaling messages, whilst in the leg from the AS 102 down to the terminating entity 1 14 only e.g. N2 is shown as originating identity within SIP signaling messages.
  • an object of the present disclosure is to overcome or at least mitigate at least some of the drawbacks related to handling identities in an internet protocol multimedia subsystem (IMS).
  • IMS internet protocol multimedia subsystem
  • the method comprises receiving a SIP invite message on an originating leg.
  • the SIP invite message comprises a first identity, N1 , which is associated with an originating entity.
  • a second identity, N2 is then associated with the originating entity and a modified SIP invite message is created.
  • N1 is replaced by N2.
  • the modified SIP invite message is transmitted on a terminating leg.
  • a new SIP message is created that comprises N1 and N2 and this new SIP message is transmitted on the originating leg.
  • the object is achieved in a second aspect by a method performed by a proxy call/session control function in an IMS.
  • This method comprises receiving a SIP invite message from an originating entity on an originating leg.
  • the SIP invite message comprises a first identity, N1 , which is associated with the originating entity.
  • the SIP invite message is transmitted to a serving call/session control function on the originating leg.
  • a new SIP message that comprises N1 and a second identity, N2 is received and a specific service is executed that utilizes at least one of the received identities N1 and N2.
  • a new SIP message is introduced, generated by the AS, to notify at least one entity in the originating leg, for example a P-CSCF or even the originating entity, about the fact that the identity N1 of the originating entity has been changed from N1 to N2 in SIP signaling on the terminating side.
  • An advantage of this is that services implemented in an entity in the originating leg, e.g. the P-CSCF, can make use of this change of identity information.
  • one such service that can make use of the information may be a lawful interception (LI) service.
  • LI lawful interception
  • the creation of the new SIP message that comprises N1 and N2 comprises storing (by the AS) and reading (by the P-CSCF) any of N1 and N2 in a History-Info information field of the new SIP message.
  • an appropriate value may be stored in (and read in) a privacy header field such that N1 and N2 is visible only to at least one intermediate entity between the AS and the originating entity, excluding the originating entity, in the originating leg.
  • supplementary information related to any of N1 and N2 may be stored in and read in any of a reason phrase, a header field and a message body of the new SIP message.
  • the execution, in the P-CSCF, of the specific service may in various embodiments be triggered by the reception of the new SIP message that comprises N1 and N2.
  • embodiments include those wherein the specific service may be a LI service and that the LI service is related to N2 and is requested from a law enforcement agency, (LEA).
  • the new SIP message that comprises N1 and N2 may be transmitted to the originating entity.
  • an application server for an internet protocol multimedia subsystem, IMS.
  • the AS comprises input/output circuitry, a processor and a memory.
  • the memory contains instructions executable by the processor whereby the AS is operative to:
  • SIP session initiation protocol
  • N1 first identity
  • a proxy call/session control function for an internet protocol multimedia subsystem, IMS.
  • the P-CSCF comprises input/output circuitry, a processor and a memory.
  • the memory contains instructions executable by the processor whereby the P-CSCF is operative to:
  • SIP session initiation protocol
  • N1 first identity
  • a computer program comprising instructions which, when executed on at least one processor in an application server, AS, for an internet protocol multimedia subsystem, IMS, cause the AS to carry out the method according to the first aspect summarized above.
  • a computer program comprising instructions which, when executed on at least one processor in a call/session control function, P-CSCF, for an internet protocol multimedia subsystem, IMS, cause the P-CSCF to carry out the method according to the second aspect summarized above.
  • carriers comprising any of the computer programs summarized above, wherein the carrier is one of an electronic signal, an optical signal, a radio signal and a computer readable storage medium.
  • FIG. 1 is a schematically illustrated block diagram of an IMS
  • figure 2 is a prior art signaling diagram
  • FIGS. 3 and 4 are flowcharts illustrating embodiments of methods
  • figure 5 is a signaling diagram
  • FIG. 6 schematically illustrates an application server
  • FIG. 7 schematically illustrates an application server
  • figure 8 schematically illustrates a proxy call/session control function
  • figure 9 schematically illustrates a proxy call/session control function.
  • the IMS 100 is connected to two access networks in the form a RAN 1 12 and a local area network (LAN) that may include a wireless LAN 1 16 that operates according to, e.g. an IEEE 802.1 1 standard.
  • the access networks 1 12, 1 16 are connected to the IMS 100 via interface functionality 121 , 123 in appropriate gateway nodes that are not illustrated in figure 1 .
  • An originating entity 1 10 is connected via an air interface 1 1 1 to the RAN 1 12 and a terminating entity 1 14 is connected to the LAN 1 16 via an appropriate connection interface 1 15.
  • the IMS 100 comprises a proxy call/session control function (P- CSCF) 104, a serving call/session control function (S-CSCF) 106 and an application server (AS) 102.
  • P- CSCF proxy call/session control function
  • S-CSCF serving call/session control function
  • AS application server
  • a law enforcement agency (LEA) 1 18 is connected to the IMS 100 via an appropriate connection interface 125. Signaling between the entities in the IMS and the connected entities takes place by means of session initiation protocol (SIP) signaling.
  • SIP session initiation protocol
  • figure 1 illustrates a single AS 102, a single P-CSCF 5 104 and a single S-CSCF 106
  • typical implementations of an IMS may in various scenarios
  • embodiments include a larger number of these entities.
  • figure 1 illustrates the AS 102, the P-CSCF 104 and the S-CSCF 106 as separate blocks
  • typical implementations may in some embodiments realize these entities in a larger and more general processing system, e.g. in the form of one or more computer servers (e.g. a so-0 called cloud implementation) having functional blocks that operate to realize functionality of the AS, the P-CSCF and the S-CSCF.
  • a SIP invite message 501 is received on an originating leg 520.
  • This SIP invite message comprises a first identity, N1 , which is associated with the originating entity 1 10.
  • N1 is typically carried in a "From" header field in the SIP invite message.
  • a second identity N2 is associated with the originating entity.
  • this action may be seen as the AS changing the identity N1 to the new identity N2.
  • a change may, as the skilled person will realize, be part of, e.g., a service such as a flexible identity presentation (FIP) service that the AS performs on behalf of the originating entity.
  • FIP flexible identity presentation
  • a modified SIP invite message 503 is then created in which N1 is replaced by N2.
  • the modified SIP invite message 503 is then transmitted on a terminating leg 522. As exemplified in figure 5, this modified SIP invite message 503 may reach the terminating entity via the S-CSCF 106 and various other entities as indicated by the broken message line 550.
  • a new SIP message 505 is created that comprises N1 and N2.
  • any of N1 and N2 may be stored in a History-Info information field of the new SIP message.
  • the creation of the new SIP message 505 may comprise storing an appropriate value in a privacy header field. This will mean that N1 and N2 is visible only to at least one intermediate entity between the AS and the originating entity, excluding the originating entity, in the originating leg.
  • Supplementary information related to any of N1 and N2 may also be stored in the new SIP message 505.
  • the storing of such supplementary information may be in any of a reason phrase, a header field and a message body of the new SIP message 505.
  • supplementary information examples include informative text that, e.g., can indicate what the service has done with any of N1 and N2.
  • the new SIP message 505 is then transmitted on the originating leg 520.
  • the SIP invite message 501 is received from the originating entity 1 10 on the originating leg 520.
  • the SIP invite message 501 comprises a first identity, N1 , which is associated with the originating entity 1 10.
  • the SIP invite message 501 is then transmitted to the S-CSCF 106 on the originating leg 5 520.
  • Embodiments include those where any of N1 and N2 is read from a History-Info information field of the new SIP message, as illustrated by an action 4061 .
  • the reading action 4061 comprises reading a value in a privacy header field (in the new SIP message 505) such that N1 and N2 is visible only to at least one intermediate entity between the AS 102 and the originating entity 1 10, excluding the originating entity 1 10, in the originating leg 520.
  • Example embodiments include also those where the reading action 4061 comprises5 reading supplementary information related to any of N1 and N2 in any of a reason phrase, a header field and a message body of the new SIP message 505.
  • supplementary information examples include informative text that, e.g., can indicate what the service has done with any of N1 and N2.
  • a specific service that utilizes at least one of the received identities N1 and N2 is
  • the execution of the specific service may in fact be triggered by the reception of the new SIP message 505.
  • Example embodiments include those where the specific service that is executed by the P-5 CSCF 104 is a lawful interception, LI, service requested from a law enforcement Agency (LEA) 1 18, the LI service being related to N2. Such a request from the LEA 1 18 is exemplified by action 4062. It is to be noted that an actual time of reception of such a LI service activation request may occur at any time, for example at a time that is prior the timing of messages illustrated in figure 5.
  • Action 410 is to be noted that an actual time of reception of such a LI service activation request may occur at any time, for example at a time that is prior the timing of messages illustrated in figure 5.
  • the new SIP message that comprises N1 and N2 is then transmitted to the originating entity 1 10.
  • transmission of the new SIP message 505 to the originating entity 1 10 is optional, since it may have been decided that the originating entity 1 10 is not to be allowed to have knowledge about the change of identity from N1 to N2 in the terminating leg 522. It is to be noted, however, that, even if the transmission in action 410 takes place, the originating entity 1 10 may be prevented knowledge of N2 by way of the use of the privacy header field, as described above.
  • Various actions as described above may be combined into an exemplifying scenario as follows:
  • a call is set up by the SIP invite message 501 that originates at the originating entity 1 10.
  • the AS 102 At the same time the AS 102 generates the new SIP message 505, which is propagated back to the originating leg 520 by carrying both N1 and the new N2 identities within the "History-Info" field.
  • the Reason-Phrase, other header fields or the message body may be used to convey more details about the call progress.
  • Both S-CSCF 106 and the P-CSCF 104 receives the new SIP message 505, but only the P-CSCF 104 reacts on it by starting mid-call interception as the SIP call set-up is already ongoing.
  • the P-CSCF 104 has been triggered due to the fact that N2 is the target (i.e. the monitored identity) as indicated by the LEA 1 18.
  • the IRI provided by the S-CSCF 106 and the P-CSCF 104 is, as the skilled person will realize, correlated by a LI mediation device (not shown in the figures) based on a P- charging-vector, i.e. SIP signalling as intercepted by both the P-CSCF 104 and the S- CSCF 106 contain the same value.
  • the CC provided by the P-CSCF 104 is correlated by LI mediation with IRI as in design base, i.e. correlation between CC and IRI is unchanged and follows relevant standard specifications, e.g.3GPP as well as European Telecommunications Standards Institute (ETSI) standards and American National Standards Institute (ANSI) standards.
  • the new SIP message 505, as propagated to the originating entity 1 10 will make the user aware about the executed AS service. However, this step of propagation to the originating entity 1 10 is optional.
  • the notification to the originating entity 1 10 may not be needed or even confusing for certain services, or may not be supported by certain communication terminals that a user may have. Propagation of the new SIP message 505 to the originating entity 1 10 is therefore optional. Preventing the new SIP message 505 to reach the originating entity 1 10 is possible using current IMS and SIP standards, for example the AS 102 may include a privacy header in the new SIP message 505 with value "history". Such a privacy header will limit the visibility of the history-list.
  • the P-CSCF 104 may be configured to not forward the history-list and/or the new SIP message 505 to the originating entity 1 10.
  • the P-CSCF 104 may implement any service logic to process the header of the new SIP message 505 and the P-CSCF 104 may use any supplementary information, such as reason phrase, header field etc. for services other than LI.
  • the AS 600 is for an IMS.
  • the AS 600 comprises input/output circuitry 606, a processor 602 and a memory 604.
  • the memory 604 contains instructions executable by the processor 602 whereby the AS 600 is operative to:
  • SIP session initiation protocol
  • invite message 501 on an originating leg 520, said SIP invite message 501 comprising a first identity, N1 , which is associated with an originating entity 1 10,
  • the instructions that are executable by the processor 602 may be software in the form of a computer program 641 .
  • the computer program 641 may be contained in or by a carrier 642, which may provide the computer program 641 to the memory 604 and processor 602.
  • the carrier 642 may be in any suitable form including an electronic signal, an optical signal, a radio signal or a computer readable storage medium.
  • the application server is operative such that the creation of the new SIP message that comprises N1 and N2 comprises storing any of N1 and N2 in a History-Info information field of the new SIP message.
  • the application server is operative such that the creation of the new SIP message that comprises N1 and N2 comprises storing an appropriate value in a privacy header field such that N1 and N2 is visible only to at least one intermediate entity between the AS and the originating entity, excluding the originating entity, in the originating leg.
  • the application server is operative such that the creation of the new SIP message that comprises N1 and N2 comprises storing supplementary information related to any of N1 and N2 in any of a reason phrase, a header field and a message body of the new SIP message.
  • FIG. 7 illustrates schematically an application server 700 that comprises:
  • a receiving module 702 configured to receive a session initiation protocol, SIP, invite message 501 on an originating leg 520, said SIP invite message 501 comprising a first identity, N1 , which is associated with an originating entity 1 10,
  • an associating module 704 configured to associate a second identity, N2, with the originating entity 1 10,
  • creating module 706 configured to create a modified SIP invite message 503 in which modified SIP invite message 503 N1 is replaced by N2,
  • a transmitting module 708 configured to transmit, on a terminating leg 522, said modified SIP invite message 503,
  • creating module 710 configured to create a new SIP message 505 that comprises N1 and N2,
  • the application server 700 may comprise further modules that are configured to perform in a similar manner as, e.g., the application server 600 described above in connection with figure 6.
  • the application server 700 may comprise further modules that are configured to perform in a similar manner as, e.g., the application server 600 described above in connection with figure 6.
  • FIG 8, a schematically illustrated P-CSCF 800 will be described in some more detail.
  • the P-CSCF 800 is for an IMS.
  • the P-CSCF 800 comprises input/output circuitry 806, a processor 802 and a memory 804.
  • the memory 804 contains instructions executable by the processor 802 whereby the P-CSCF 800 is operative to:
  • SIP session initiation protocol
  • invite message 501 from an originating entity 1 10 on an originating leg 520, said SIP invite message 501 comprising a first identity, N1 , that is associated with the originating entity 1 10,
  • the instructions that are executable by the processor 802 may be software in the form of a computer program 841 .
  • the computer program 841 may be contained in or by a carrier 15 842, which may provide the computer program 841 to the memory 804 and processor 802.
  • the carrier 842 may be in any suitable form including an electronic signal, an optical signal, a radio signal or a computer readable storage medium.
  • the P-CSCF 800 is operative such that the execution of the specific service is triggered by the reception of the new SIP message that comprises N1 20 and N2.
  • the P-CSCF 800 is operative such that the specific service is a lawful interception, LI, service requested from a law enforcement agency, LEA, the LI service being related to N2.
  • LI lawful interception
  • LEA law enforcement agency
  • the P-CSCF 800 is operative to read any of N1 and N2 from a 25 History-Info information field of the new SIP message.
  • the P-CSCF 800 is operative to read a value in a privacy header field such that N1 and N2 is visible only to at least one intermediate entity between the AS and the originating entity, excluding the originating entity, in the originating leg.
  • the P-CSCF 800 is operative to read supplementary information 30 related to any of N1 and N2 in any of a reason phrase, a header field and a message body of the new SIP message. In some embodiments, the P-CSCF 800 is operative to transmit the new SIP message that comprises N1 and N2 to the originating entity.
  • FIG. 9 illustrates schematically an proxy call/session control function 900 that comprises:
  • a receiving module 902 configured to receive a session initiation protocol, SIP, invite message 501 from an originating entity 1 10 on an originating leg 520, said SIP invite message 501 comprising a first identity, N1 , that is associated with the originating entity 1 10,
  • a transmitting module 904 configured to transmit, to a serving call/session control function, S-CSCF 106, on said originating leg 520, said SIP invite message 501 ,
  • a receiving module 906 configured to receive a new SIP message 505 that comprises N1 and a second identity, N2, and
  • the proxy call/session control function 900 may comprise further modules that are configured to perform in a similar manner as, e.g., the proxy call/session control function 800 described above in connection with figure 8.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Selon l'invention, un serveur d'application (102) dans un sous-système multimédia de protocole Internet, IMS, génère un nouveau message SIP (501) qui notifie, par exemple, une fonction de commande d'appel/session de réseau mandataire, P-CSCF (104) concernant le fait que l'identité N1 d'une entité d'origine (110) a été modifiée de N1 à N2 dans une signalisation SIP sur un côté de terminaison (522). L'avantage de cette invention est que des services, par exemple un service d'interception légale, LI, mis en oeuvre dans une entité dans une tige d'origine (520), par exemple le P-CSCF (104), peut utiliser ledit changement d'informations d'identité.
PCT/SE2016/050563 2016-06-10 2016-06-10 Gestion d'identité dans un sous-système multimédia ip WO2017213565A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SE2016/050563 WO2017213565A1 (fr) 2016-06-10 2016-06-10 Gestion d'identité dans un sous-système multimédia ip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SE2016/050563 WO2017213565A1 (fr) 2016-06-10 2016-06-10 Gestion d'identité dans un sous-système multimédia ip

Publications (1)

Publication Number Publication Date
WO2017213565A1 true WO2017213565A1 (fr) 2017-12-14

Family

ID=56264021

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2016/050563 WO2017213565A1 (fr) 2016-06-10 2016-06-10 Gestion d'identité dans un sous-système multimédia ip

Country Status (1)

Country Link
WO (1) WO2017213565A1 (fr)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120254403A1 (en) * 2011-03-29 2012-10-04 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception in an ip multimedia subsystem network

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120254403A1 (en) * 2011-03-29 2012-10-04 Telefonaktiebolaget Lm Ericsson (Publ) Lawful interception in an ip multimedia subsystem network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G security; Lawful interception architecture and functions (Release 13)", 3GPP STANDARD; 3GPP TS 33.107, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG3, no. V13.2.0, 17 March 2016 (2016-03-17), pages 1 - 261, XP051088120 *

Similar Documents

Publication Publication Date Title
CN107113294B (zh) 用于实现电信网络呼叫控制的设备和方法
AU2010273726B2 (en) System and methods for accessing voice services based on voice service indicators in an evolved packet system
US8848666B2 (en) Handover of emergency calls from a circuit switched to a packet switched access network
US8223927B2 (en) Lawful interception of non-local subscribers
US9504086B2 (en) Service domain selection service indicator
US20100014508A1 (en) Method And System For Emergency Call
SG177296A1 (en) System and methods for accessing voice services based on voice service indicators in an evolved packet system
MX2007012244A (es) Sistema y metodo para manejar continuidad de llamada en ambiente de red de ims utilizando mensajeria de sip.
WO2009051931A2 (fr) Emission d'appel par un serveur d'application dans un sous-système de réseau d'infrastructure multimédia à protocole internet
US20170085704A1 (en) SECURITY METHOD AND SYSTEM FOR INTER-NODAL COMMUNICATION FOR VoIP LAWFUL INTERCEPTION
EP3515096B1 (fr) Traitement de messages sms
KR20070094564A (ko) Ims를 포함하는 네트워크 환경에서 vcc 기능성을제어하는 시스템 및 방법
EP3020175B1 (fr) Méthodes et appareil de mise en oeuvre d'un service d'interdiction de communication
KR102054169B1 (ko) 암호화되고 트랜스코딩된 미디어에 대한 인터셉션
US20170187755A1 (en) Correlation of intercept related information
US10757143B2 (en) Notifying changes in radio access technology
KR20180135756A (ko) 회의 통화 호 처리 서버 및 그 방법
WO2017213565A1 (fr) Gestion d'identité dans un sous-système multimédia ip
KR100996568B1 (ko) Ims 망에서의 라우팅 처리를 위한 장치 및 방법
Kim et al. Tracking location information of volte phones
WO2016023571A1 (fr) Procédé et appareil de gestion de routage basé sur le support
WO2017102019A1 (fr) Corrélation de signalisation ims dans une interception de srevice srvcc
KR101766666B1 (ko) 무한 루핑 방지를 위한 세션 설정 프로토콜 기반의 네트워크 시스템 및 이의 방법
US10477015B2 (en) Processing SMS messages
WO2022037848A1 (fr) Corrélation de messages d'interception légale déclenchés par des points d'interception présents dans de multiples fonctions de réseau virtuel

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16732788

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16732788

Country of ref document: EP

Kind code of ref document: A1