WO2023093271A1 - 一种确定s-cscf的方法及装置 - Google Patents
一种确定s-cscf的方法及装置 Download PDFInfo
- Publication number
- WO2023093271A1 WO2023093271A1 PCT/CN2022/121388 CN2022121388W WO2023093271A1 WO 2023093271 A1 WO2023093271 A1 WO 2023093271A1 CN 2022121388 W CN2022121388 W CN 2022121388W WO 2023093271 A1 WO2023093271 A1 WO 2023093271A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cscf
- target
- address information
- data management
- identifier
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 158
- 230000004044 response Effects 0.000 claims abstract description 172
- 238000013523 data management Methods 0.000 claims abstract description 94
- 238000004891 communication Methods 0.000 claims abstract description 93
- 230000006870 function Effects 0.000 claims description 74
- 238000012545 processing Methods 0.000 claims description 47
- 230000015654 memory Effects 0.000 claims description 24
- 238000004590 computer program Methods 0.000 claims description 17
- 238000012217 deletion Methods 0.000 claims description 12
- 230000037430 deletion Effects 0.000 claims description 12
- 230000008569 process Effects 0.000 description 54
- 230000011664 signaling Effects 0.000 description 27
- 238000010586 diagram Methods 0.000 description 19
- 238000012790 confirmation Methods 0.000 description 17
- 238000013475 authorization Methods 0.000 description 9
- 238000007726 management method Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000009286 beneficial effect Effects 0.000 description 5
- 241000532784 Thelia <leafhopper> Species 0.000 description 4
- 230000003993 interaction Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000003190 augmentative effect Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000013144 data compression Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 238000004846 x-ray emission Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1045—Proxies, e.g. for session initiation protocol [SIP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1046—Call controllers; Call servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
Definitions
- the present application relates to the field of communication technologies, and in particular to a method and device for determining a serving-call session control function (serving-call session control function, S-CSCF).
- serving-call session control function serving-call session control function, S-CSCF.
- Data management equipment such as home subscriber server (HSS) in 4G, unified data management (UDM) in 5G
- HSS home subscriber server
- UDM unified data management
- the data management device can provide relevant data for functions/network elements in the IP multimedia subsystem (IP multimedia subsystem, IMS) domain during the process of terminal registration or terminal calling.
- IP multimedia subsystem IP multimedia subsystem, IMS
- I-CSCF interrogation-call session control function
- the I-CSCF may send a location information request (location information request, LIR) message to the data management device based on the invitation message, so as to request to obtain the address information of the target S-CSCF corresponding to the target terminal.
- the data management device sends a location information answer (location information answer, LIA) message to the I-CSCF, and the LIA message carries the address information of the target S-CSCF.
- the I-CSCF In the case of failure to access the data management device, the I-CSCF cannot acquire the address information of the target S-CSCF from the data management device. That is, the I-CSCF cannot determine the target S-CSCF, which results in failure to call the target terminal.
- the present application provides a method and device for determining the S-CSCF, which are used to avoid the failure of registration or calling the target terminal in the case of failure to access the data management device, and help to improve the reliability of the communication system.
- the present application provides a method for determining an S-CSCF, and the method may be executed by an I-CSCF.
- the method includes: the I-CSCF determines that access to the data management device fails, and sends a first acquisition request to the first device; the I-CSCF receives the first acquisition response from the first device; wherein, the first An acquisition response indicates the address information of the target S-CSCF, which is the S-CSCF where the target terminal is registered.
- the data management device may be UDM or HSS.
- the first device may be a target S-CSCF or a backup device.
- the I-CSCF determines that access to the data management device fails, and may send a first acquisition request to the first device. Further, the I-CSCF may receive a first acquisition response from the first device, and the first acquisition response It can be used to indicate the address information of the target S-CSCF, so that the I-CSCF can obtain the address information of the target S-CSCF, and perform the registration process of the target terminal or the process of calling the target terminal according to the address information of the target S-CSCF. Therefore, in the case of failure to access the data management device, the problem of failure to register or call the target terminal is avoided, which helps to improve the reliability of the communication system.
- the first device is the target S-CSCF, and the target S-CSCF is any one of the S-CSCF sets corresponding to the I-CSCF; the first acquisition response includes determining that the first device is the target S-CSCF. - The indication of the CSCF, or including the address information of the target S-CSCF.
- the first device may pass the indication of determining that the first device is the target S-CSCF, or the first acquisition response including the address information of the target S-CSCF, Indicate to the I-CSCF that the first device is the target S-CSCF, so that the I-CSCF determines the target S-CSCF.
- the method further includes: the I-CSCF sends a second acquisition request to the second device, and the second device is an S-CSCF other than the target S-CSCF in the S-CSCF set corresponding to the I-CSCF. - CSCF; the I-CSCF receives an indication from the second device that the second device is not a target S-CSCF, or the I-CSCF does not receive the address information of the target S-CSCF from the second device.
- the I-CSCF can determine the target S-CSCF from the set of S-CSCFs corresponding to the I-CSCF through round-robin training.
- the second device may indicate to the I-CSCF that the second device is not the target S-CSCF by sending an indication to the I-CSCF that the second device is not the target S-CSCF, or by not responding to the I-CSCF, so that the I-CSCF
- the CSCF selects a new S-CSCF from the S-CSCF set and determines whether the new S-CSCF is the target S-CSCF.
- the I-CSCF sending the first acquisition request to the first device includes: the I-CSCF sends the first acquisition request to multiple S-CSCFs included in the S-CSCF set; the I-CSCF receives The first acquisition response of the first device includes: the I-CSCF receives the first acquisition response of the target S-CSCF among the multiple S-CSCFs.
- the method further includes: the I-CSCF receives responses from other S-CSCFs except the target S-CSCF denying that other S-CSCFs are the target S-CSCF from among the multiple S-CSCFs, Or, the I-CSCF has not received the address information of the target S-CSCF from other S-CSCFs except the target S-CSCF among the multiple S-CSCFs.
- the I-CSCF sends acquisition requests to multiple S-CSCFs in the S-CSCF set through multicast or broadcast, which helps to improve the efficiency of the I-CSCF in determining the target S-CSCF.
- the first device is a backup device, and the backup device correspondingly stores the identifier of the target terminal and the address information of the target S-CSCF.
- the first acquisition response includes the address information of the target S-CSCF.
- a backup device is set in the communication system, and the backup device can store the corresponding relationship between the terminal identifier and the address information of the S-CSCF. After the I-CSCF determines that access to the data management device fails, it can query from the backup device The address information of the target S-CSCF corresponding to the target terminal, so that in the case of failure to access the data management device, the problem of failure to register or call the target terminal is avoided, which helps to improve the reliability of the communication system.
- the method further includes: when the access of the data management device is normal, the I-CSCF sends the identifier of the target terminal and the address information of the target S-CSCF to the backup device.
- the corresponding relationship in the backup device may be stored by the I-CSCF in the backup device when the data management device is connected normally.
- it further includes: after receiving the logout request of the target terminal, the I-CSCF sends a deletion instruction to the backup device after the preset logout time period is reached, so as to instruct to delete the target terminal correspondingly stored in the backup device ID and address information of the target S-CSCF.
- the I-CSCF after receiving the logout request from the target terminal, the I-CSCF does not immediately delete the corresponding relationship in the backup device, but waits for the preset logout time to expire before deleting, so that when the target terminal is powered off or in flight mode, although the target terminal has initiated the logout process, the backup device still retains the corresponding relationship, so that the I-CSCF can continue to determine the address information of the target S-CSCF, which helps the I-CSCF to successfully call the target terminal .
- the I-CSCF determines that access to the data management device fails, including: the I-CSCF sends a query request to the data management device; after the I-CSCF sends the query request to the data management device, the preset query It is determined within the time period that the address information of the target S-CSCF from the data management device is not received; or, the I-CSCF receives a query failure response from the data management device.
- the present application provides a method for determining an S-CSCF, and the method may be executed by a first device.
- the first device may be a target S-CSCF or a backup device.
- the method includes: the first device receives a first acquisition request from the I-CSCF, and the first acquisition request indicates that access to the data management device fails; the first device sends the I-CSCF an The CSCF sends a first acquisition response; wherein, the first acquisition response indicates the address information of the target S-CSCF, and the target S-CSCF is the S-CSCF registered by the target terminal.
- the first device is the target S-CSCF, and the first device sends the first acquisition response to the I-CSCF according to the first acquisition request, including: the first device sends the first acquisition response to the I-CSCF according to the target
- the identifier of the terminal determines that the user data of the target terminal is stored in the first device, and sends a first acquisition response to the I-CSCF.
- the method further includes: after the first device receives the logout request from the target terminal, clearing the user data stored in the first device after the preset logout time period expires.
- the first device after the first device receives the logout request from the target terminal, it does not immediately delete the corresponding relationship in the first device, but waits for the preset logout time to expire before deleting, so that when the target terminal is turned off or in In flight mode, although the target terminal has initiated the logout process, the first device still retains the corresponding relationship, so that the I-CSCF can continue to determine the address information of the target S-CSCF based on the user data in the first device , which helps the I-CSCF to successfully call the target terminal.
- the first device is a backup device, and the backup device correspondingly stores the identifier of the target terminal and the address information of the target S-CSCF; the first device sends the first request to the I-CSCF according to the first acquisition request.
- An acquisition response includes: the first device sends the first acquisition response carrying the address information of the target S-CSCF to the I-CSCF according to the identifier of the target terminal in the first acquisition request.
- the method further includes: when the data management device is connected normally, the first device receives the identifier of the target terminal and the address information of the target S-CSCF from the I-CSCF or the target S-CSCF; The first device correspondingly stores the identifier of the target terminal and the address information of the target S-CSCF.
- it further includes: the first device receives a deletion instruction from the I-CSCF or the target S-CSCF; the first device deletes the corresponding stored target terminal identifier and Address information of the target S-CSCF.
- the present application provides a method for determining an S-CSCF, which is applicable to a system including a proxy device, and the proxy device is located between the communication connection between the I-CSCF and the data management device.
- the method can be performed by a proxy device.
- the method includes: the proxy device determines that access to the data management device fails; the proxy device obtains the address information of the target S-CSCF from the local storage, and the target S-CSCF is the S-CSCF registered by the target terminal; The proxy device sends the address information of the target S-CSCF to the I-CSCF.
- the proxy device determines that the access to the data management device fails, it can obtain the address information of the target S-CSCF corresponding to the target terminal locally, and send the address information of the target S-CSCF to the I-CSCF.
- the I-CSCF can obtain the address information of the target S-CSCF, and execute the registration or call process of the target terminal according to the address information of the target S-CSCF. Therefore, in the case of failure to access the data management device, the problem of failure to register or call the target terminal is avoided, which helps to improve the reliability of the communication system.
- the proxy device determines that access to the data management device fails, including: the proxy device forwards the query request from the I-CSCF to the data management device; The address information of the target S-CSCF from the data management device is received; or, the proxy device receives a query failure response from the data management device.
- the proxy device may determine that access to the data management device fails, and then send the address information of the target S-CSCF to the I-CSCF.
- the method further includes: when the data management device is connected normally, the proxy device receives the identification of the target terminal and the address information of the target S-CSCF from the data management device; the proxy device sends the target terminal's The identifier and the address information of the target S-CSCF are stored correspondingly.
- the proxy device forwards the signaling between the data management device and the S-CSCF, or forwards the signaling between the data management device and the I-CSCF, it can obtain the identity of the target terminal from the forwarded signaling
- the corresponding relationship with the address information of the target S-CSCF does not require the I-CSCF or the target S-CSCF to send the corresponding relationship to the proxy device, which helps to reduce signaling overhead.
- the embodiment of the present application provides a communication device, which has the function of implementing the I-CSCF in the first aspect or any possible implementation manner of the first aspect.
- the communication apparatus may also have the function of realizing the second aspect or the first device in any possible implementation manner of the second aspect, where the first device may be a target S-CSCF or a backup device.
- the communication apparatus may also have a function of implementing the third aspect or any possible implementation manner of the third aspect as a proxy device.
- the above-mentioned functions of the communication device may be realized by hardware, or may be realized by executing corresponding software by hardware, and the hardware or software includes one or more modules or units or means (means) corresponding to the above-mentioned functions.
- the structure of the device includes a processing module and a transceiver module, where the processing module is configured to support the device to execute the I-CSCF in the first aspect or any implementation manner of the first aspect
- the corresponding function or execute the corresponding function of the first device in the second aspect or any implementation of the second aspect, or execute the corresponding function of the proxy device in the third aspect or any implementation of the third aspect .
- the transceiver module is used to support communication between the device and other communication devices, for example, when the device is an I-CSCF, it can receive the first acquisition response from the first device.
- the communication device may also include a storage module, which is coupled to the processing module and stores necessary program instructions and data of the device.
- the processing module may be a processor
- the communication module may be a transceiver
- the storage module may be a memory, and the memory may be integrated with the processor or configured separately from the processor.
- the structure of the apparatus includes a processor, and may further include a memory.
- the processor is coupled with the memory, and can be used to execute the computer program instructions stored in the memory, so that the device executes the method in the above-mentioned first aspect or any possible implementation manner of the first aspect, or executes the above-mentioned second aspect or the second aspect.
- the method in any possible implementation manner of the third aspect, or execute the method in the third aspect or any possible implementation manner of the third aspect.
- the device further includes a communication interface, and the processor is coupled to the communication interface.
- the communication interface may be a transceiver or an input/output interface; when the device is a chip contained in the first device or a chip contained in the I-CSCF device, the communication interface The interface may be an input/output interface of the chip.
- the transceiver may be a transceiver circuit, and the input/output interface may be an input/output circuit.
- the embodiment of the present application provides a chip system, including: a processor and a memory, the processor and the memory are coupled, the memory is used to store programs or instructions, and when the programs or instructions are executed by the processor, the chip system realizes
- a chip system including: a processor and a memory, the processor and the memory are coupled, the memory is used to store programs or instructions, and when the programs or instructions are executed by the processor, the chip system realizes
- the above-mentioned first aspect or the method in any possible implementation manner of the first aspect, or realize the above-mentioned second aspect or the method in any possible implementation manner of the second aspect, or implement the above-mentioned third aspect or the method in any possible implementation manner of the second aspect A method in any of the possible implementations of the three aspects.
- the chip system further includes an interface circuit for exchanging code instructions to the processor.
- processors in the chip system, and the processors may be implemented by hardware or by software.
- the processor may be a logic circuit, an integrated circuit, or the like.
- the processor may be a general-purpose processor implemented by reading software codes stored in a memory.
- the memory can be integrated with the processor, or can be set separately from the processor.
- the memory may be a non-transitory processor, such as a read-only memory ROM, which may be integrated with the processor on the same chip, or may be respectively provided on different chips.
- the embodiment of the present application provides a computer-readable storage medium, on which a computer program or instruction is stored, and when the computer program or instruction is executed, the computer executes any one of the above-mentioned first aspect or the first aspect.
- a method in one possible implementation manner or perform the method in any possible implementation manner of the above-mentioned second aspect or the second aspect, or execute the above-mentioned third aspect or any one of the possible implementation manners of the third aspect Methods.
- the embodiment of the present application provides a computer program product, which when the computer reads and executes the computer program product, causes the computer to execute the method in the above-mentioned first aspect or any possible implementation of the first aspect, or Execute the method in the above second aspect or any possible implementation manner of the second aspect, or execute the above third aspect or the method in any possible implementation manner of the third aspect.
- the embodiment of the present application provides a communication system, the communication system includes the I-CSCF in the above first aspect or any possible implementation of the first aspect, and the above second aspect or the I-CSCF of the second aspect
- the first device in any possible implementation manner, wherein the first device may be a target S-CSCF or a backup device.
- FIG. 1 is a schematic diagram of the architecture of the first communication system
- FIG. 2 is a schematic diagram of the architecture of the second communication system
- FIG. 3 is a schematic diagram of the structure of the third communication system
- Fig. 4 is a schematic flow chart of terminal registration
- FIG. 5 is a schematic flow diagram of a third-party registration
- Fig. 6 is a schematic flow chart of a terminal being called
- FIG. 7 is a schematic flowchart of a method for the I-CSCF to determine the target S-CSCF in the case of failure to access the UDM provided by the present application;
- FIG. 8 is a schematic flowchart of a method for determining a target S-CSCF by the I-CSCF in the first terminal registration provided by the present application;
- FIG. 9 is a schematic flowchart of a method for determining a target S-CSCF by the I-CSCF in the second terminal registration provided by the present application.
- FIG. 10 is a schematic flowchart of a method for determining a target S-CSCF by the I-CSCF in the third terminal registration provided by the present application;
- FIG. 11 is a schematic flow chart of a method for storing a correspondence relationship in a backup device provided by the present application.
- FIG. 12 is a schematic flowchart of a method for determining a target S-CSCF by the I-CSCF in the case of another failure to access the UDM provided by the present application;
- FIG. 13 is a schematic flowchart of a method for determining a target S-CSCF by the I-CSCF in the fourth type of terminal registration provided by the present application;
- FIG. 14 is a schematic flow diagram of the method for storing the correspondence relationship in the SCP provided by the present application.
- FIG. 15 is a schematic structural diagram of a device for determining a target S-CSCF provided by the present application.
- FIG. 16 is a schematic structural diagram of another device for determining a target S-CSCF provided by the present application.
- FIG. 1 is a schematic diagram of the architecture of a communication system used in the communication method of the present application.
- the network functions and entities included in the communication system mainly include: terminal equipment (user equipment, UE), radio access network (radio access network, RAN) Device, user plane function (UPF), data network (data network, DN), access and mobility management function (access and mobility management function, AMF), session management function (session management function, SMF), Network exposure function (network exposure function, NEF), policy control function (policy control function, PCF), application function (application function, AF), network slice selection function (network slice selection function, NSSF), authentication server function (authentication server function, AUSF), unified data management (unified data management, UDM), network storage function (network repository function, NRF) and unified data storage function (unified data repository, UDR).
- terminal equipment user equipment
- UE radio access network
- RAN Radio access network
- UPF user plane function
- data network data network
- DN access and mobility management function
- AMF access and
- Figure 1 shows the interaction relationship between network functions and entities and the corresponding interfaces, for example, the terminal device and the AMF can interact through the N1 interface, and the interaction message is called N1Message.
- Some interfaces can be implemented in the form of service interfaces.
- the user's data flow can be transmitted through the protocol data unit session (PDU) session established between the terminal device and the DN, and the specific transmission can be through the wireless access network device and the UPF.
- PDU protocol data unit session
- Terminal equipment can be user equipment, handheld terminal, notebook computer, cellular phone, smart phone, tablet computer, handheld device, augmented reality (augmented reality, AR) equipment, virtual reality (virtual reality, VR) equipment, machine type communication Terminals or other devices that can access the network.
- a certain air interface technology such as new radio (NR) or long term evolution (LTE) technology
- NR new radio
- LTE long term evolution
- a certain air interface technology such as NR or LTE technology
- the communication terminal uploaded by the vehicle can be used as a terminal device, and the roadside unit (RSU) can also be used as a terminal device.
- the drone is equipped with a communication terminal, which can also be regarded as a terminal device.
- a terminal device may also be referred to as a terminal or UE.
- Radio access network equipment mainly responsible for wireless resource management, service quality management, data compression and encryption on the air interface side.
- Radio access network equipment may include base stations in various forms, for example: macro base stations, micro base stations, relay stations, access points, and so on.
- the name of the equipment with the base station function may be different, for example, in the NR system, it is called gNB.
- AMF It belongs to the core network element and is mainly responsible for functions such as access control, mobility management, attachment and detachment, and gateway selection.
- the AMF provides services for the session of the terminal device, it may specifically provide a storage resource of the control plane for the session, and the storage resource may be used to store the identifier of the session, the identifier of the SMF associated with the session, and the like.
- SMF responsible for user plane network element selection, user plane network element redirection, Internet protocol (internet protocol, IP) address allocation, bearer establishment, modification and release, and quality of service (quality of service, QoS) control, etc.
- IP Internet protocol
- UPF responsible for forwarding and receiving user data in terminal equipment. For example, UPF can receive user data from DN and transmit it to terminal equipment through wireless access network equipment; UPF can also receive user data from terminal equipment through wireless access network equipment and forward it to DN. UPF provides transmission resources and scheduling functions of services for terminal equipment.
- NEF Used to support the secure interaction between the 3rd Generation Partnership Project (The 3rd Generation Partnership Project, 3GPP) network and third-party applications.
- 3GPP The 3rd Generation Partnership Project, 3GPP
- AF It is used to provide services, and can also provide some third-party services to the network side.
- PCF responsible for decision-making of policy control, providing policy rules for control plane functions, and flow-based charging control functions.
- NSSF It is mainly responsible for network slice selection, and determines the network slice instance that the terminal device is allowed to access according to the slice selection auxiliary information and subscription information of the terminal device.
- UDM mainly responsible for the contract data management of terminal equipment, including storage and management of terminal equipment identification, terminal equipment access authorization, etc.
- AUSF Supports 3GPP and non-3GPP access authentication.
- NRF Supports registration and discovery of network functions.
- UDR Store and retrieve subscription data used by UDM and PCF.
- the UDM can also communicate with the interrogation-call session control function (interrogation-call session control function, I-CSCF), the serving-call session control function (serving-call session control function, S-CSCF), and the application server (application server) , AS) are respectively connected by communication, and for details, refer to the architecture diagram of another communication system exemplarily shown in FIG. 2 .
- I-CSCF interrogation-call session control function
- S-CSCF serving-call session control function
- AS application server
- the I-CSCF is a unified entry point of the IMS network, and is responsible for allocating or querying the S-CSCF serving users.
- S-CSCF is the central node of the IMS network, responsible for user registration, authentication, session, routing and service triggering. There may be multiple S-CSCFs in an IMS network.
- the AS is used to realize the service logic in the IMS network, and is the core of the service in the IMS network.
- the I-CSCF may further communicate with a proxy-call session control function (proxy-call session control function, P-CSCF).
- P-CSCF proxy-call session control function
- the P-CSCF is an entity in the IMS network that is responsible for verifying the request, forwarding the verification request to a designated target, and processing and forwarding the response.
- UDM can communicate directly with I-CSCF, S-CSCF, and AS respectively.
- I-CSCF can directly send LIR message to UDM, and correspondingly, UDM directly feeds back LIA message to I-CSCF.
- the UDM can also communicate with the I-CSCF, the S-CSCF, and the AS through a proxy device such as a service communication proxy (service communication proxy, SCP).
- the proxy device can be used as a signaling transfer device to receive the signaling and route the signaling to other nodes.
- the signaling can be a signaling conforming to the Diameter protocol, and the signaling can also be called a Diameter signaling.
- the SCP can be deployed between the I-CSCF and the UDM, between the S-CSCF and the UDM, and between the AS and the UDM.
- the SCP can be used to forward the signaling between two network elements. For example, the SCP can forward the signaling from the I-CSCF to the UDM, and correspondingly, the SCP can also forward the signaling from the UDM to the I-CSCF.
- each network element in the core network can also be called a functional entity or device, which can be a network element implemented on dedicated hardware, or a software instance running on dedicated hardware, or a Instances of the virtualization features above.
- the architecture of the communication system shown in this application is not limited to include only the network elements shown in the figure, and may also include other devices not shown in the figure, which are not listed here in this application.
- the embodiment of this application does not limit the distribution form of each network element, and the distribution form shown in the figure is only exemplary, and this application does not make a limitation.
- the communication systems shown in FIG. 1 to FIG. 3 do not constitute a limitation to the applicable communication systems of the embodiments of the present application.
- the communication system architecture shown in Figures 1 to 3 is a 5G system architecture.
- the method in this embodiment of the application can also be applied to 4G, 4.5G system architecture, or future communication systems, such as 5.5G, 6G or Other communication systems etc.
- the UDM can be used to store user data (such as subscription data, identity data, etc.) corresponding to the UE.
- UDM can provide relevant data for functions in the IMS network during UE registration or UE call procedures.
- the I-CSCF can request the address information of the S-CSCF from the UDM, and the I-CSCF can determine the corresponding S-CSCF according to the requested address information, and perform UE registration or call flow based on the S-CSCF .
- the UE registration process, the UE third-party registration process, and the UE call process in the existing solutions involved in this application are explained respectively.
- the UE performing the registration process or the call process may be referred to as the target UE;
- the S-CSCF that the target UE has previously registered with is referred to as the target S-CSCF.
- Fig. 4 is a schematic diagram of a target UE registration process provided by the present application, in which the I-CSCF can request the address information of the target S-CSCF from the UDM, wherein the registration process can be an initial registration process or a re-registration process .
- Step 401 the target UE sends a register (register) message to the I-CSCF.
- the registration message may include the destination address of the request and the user identification of the registered user.
- the target UE can first send a registration message to the P-CSCF, and the P-CSCF obtains the I-CSCF address information according to the destination address in the registration message, and then forwards the registration message to the I-CSCF according to the I-CSCF address information.
- Step 402 the I-CSCF sends a user authorization request (user authorization request, UAR) message to the UDM.
- UAR user authorization request
- the UAR message may include the user identifier of the registered user, and the UAR message may be used for the I-CSCF to request the address information of the target S-CSCF from the UDM.
- Step 403 UDM judges that the user has opened an account according to the user identification of the registered user in the UAR message, and then sends a user authorization response (user authorization answer, UAA) message to the I-CSCF, which may include the address of the target S-CSCF in the UAA message information.
- a user authorization response user authorization answer, UAA
- the I-CSCF obtains the address information of the target S-CSCF from the UAA message, and then sends a registration message to the target S-CSCF according to the address information of the target S-CSCF.
- the registration message may include the address information of the target S-CSCF and the user identifier of the registered user.
- Step 405 the target S-CSCF sends a multimedia authorization request (multimedia authentication request, MAR) message to the UDM.
- the MAR message includes the user ID of the registered user, and the MAR message is used for the target S-CSCF to request an authorization vector (authorization vector, AV) from the UDM, and to notify the UDM that the current target S-CSCF serves the target UE.
- MAR multimedia authorization request
- AV authorization vector
- Step 406 the UDM sends a multimedia authorization response (multimedia authentication answer, MAA) message to the target S-CSCF, wherein the MAA message may include authentication information, and the authentication information may include an authentication vector quintuple, that is, an expected response (expected response , XRES), random number (random, RAND), authentication token (authentication token, AUTN), integrity key (integrity key, IK) and encryption key (cipher key, CK).
- MAA multimedia authorization response
- MAA message may include authentication information
- the authentication information may include an authentication vector quintuple, that is, an expected response (expected response , XRES), random number (random, RAND), authentication token (authentication token, AUTN), integrity key (integrity key, IK) and encryption key (cipher key, CK).
- the target S-CSCF sends a 401 message to the target UE, wherein the 401 message can be used to return authentication information to the target UE.
- the target S-CSCF can generate a random number (nonce) according to the RAND and AUTN in the above authentication information, and return the nonce, IK, CK, and authentication algorithm to the P-CSCF along with the 401 message.
- the P-CSCF continues to forward the remaining authentication elements RAND and AUTN in the 401 message to the target UE.
- Step 408 the target UE sends a registration message to the I-CSCF. Specifically, the target UE authenticates the network according to the authentication information (such as AUTN) in the 401 message, and if the authentication passes, it indicates that the 401 message comes from the user's real home network. Then the UE reconstructs the registration message, and forwards the registration message to the I-CSCF via the P-CSCF.
- the authentication information such as AUTN
- step 409 the I-CSCF sends a UAR message to the UDM.
- Step 410 UDM sends UAA message to I-CSCF.
- Step 411 the I-CSCF obtains the address information of the target S-CSCF from the UAA message, and then sends a registration message to the target S-CSCF according to the address information of the target S-CSCF.
- Step 412 the target S-CSCF sends a server assignment request (server assignment request, SAR) message to the UDM, which may include the user identification of the registered user in the SAR message, and the SAR message is used for the target S-CSCF to request the UDM to download the registered user's contract data.
- server assignment request server assignment request, SAR
- Step 413 UDM sends a server assignment answer (server assignment answer, SAA) to the target S-CSCF according to the user identifier of the registered user in the SAR message, wherein the SAA carries the subscription data of the registered user.
- SAA server assignment answer
- Step 414 the target S-CSCF sends a 200 OK message to the target UE.
- the 200OK message is used to indicate that the registration is successful.
- the 200 OK message may be sent by the target S-CSCF to the target UE via the I-CSCF and the P-CSCF.
- the target S-CSCF can also initiate a third-party registration process to the AS, as shown in Figure 5:
- the target S-CSCF sends a third-party registration request to the AS.
- the third-party registration request may include the user ID of the registered user, which is used for the AS to determine whether the user is registering with the AS for the first time, and for the AS to obtain the user data of the registered user from the UDM.
- Step 502 the AS sends a user data request (user data request, UDR) message to the UDM according to the user identification of the registered user in the third-party registration request, and the UDR message may include the user identification of the registered user for the AS to request registration from the UDM
- the user data of the user where the user data is, for example, user identity data, service contract data, and the like.
- step 503 the UDM sends a user data answer (UDA) message to the AS, and the UDA message carries user data.
- UDA user data answer
- Step 504 the AS sends a subscribe notification request (subscribe notifications request, SNR) message to the UDM according to the user data, and the SNR message is used for the AS to request the UDM to subscribe to the user data.
- SNR subscribe notifications request
- step 505 the UDM sends a subscribe notifications answer (SNA) to the AS.
- SNA subscribe notifications answer
- the AS can determine that the user data has been successfully subscribed according to the SNA message.
- Step 506 the AS sends a 200 OK message to the target S-CSCF.
- the 200OK message is used to indicate that the third-party registration is successful.
- FIG. 6 is a schematic flow diagram of a terminal being called in an exemplary manner provided by the present application, wherein the I-CSCF may request the UDM for the address information of the target S-CSCF.
- Step 601 the calling UE sends an INVITE message to the I-CSCF.
- the calling UE is the initiator UE of the call flow, and the call flow can be used to call the target UE, where the target UE can also be called the called UE.
- the invitation message may include the user identifier of the calling UE and the user identifier of the called UE.
- the calling UE may first send an invitation message to the P-CSCF, and then the P-CSCF sends an invitation message to the I-CSCF, that is, the invitation message is sent from the calling UE to the I-CSCF through the P-CSCF.
- Step 602 the I-CSCF sends a location information request (location information request, LIR) message to the UDM, wherein the LIR message includes the user identifier of the called UE, and the LIR message can be used by the I-CSCF to request the UDM to register the target UE The address of the target S-CSCF.
- LIR location information request
- Step 603 after the UDM receives the LIR message, it checks the address information of the target S-CSCF of the target UE according to the user registration information in the local database, and then sends a location information answer (LIA) message to the I-CSCF,
- the LIA message includes the address information of the target S-CSCF.
- step 604 the I-CSCF sends an invitation message to the target S-CSCF according to the address information of the target S-CSCF included in the LIA message.
- Step 605 the target S-CSCF sends an invite message to the AS.
- the AS here may specifically be a service centralization and continuity application server (SCC AS).
- Step 606 the AS sends a UDR message to the UDM, wherein the UDR message is used for the AS to request the UDM for the terminating-access domain selection (T-ADS) information of the target UE.
- T-ADS terminating-access domain selection
- step 607 the UDM feeds back a UDA message to the AS, wherein the UDA message includes T-ADS information.
- step 608 the AS judges according to the domain selection result whether the call is for a call connection in the IMS domain or in another domain, and then sends an invitation message to the target UE.
- the invitation message may be sent by the AS to the target UE via the target S-CSCF and the P-CSCF.
- FIG. 7 is a flow chart of a method for the I-CSCF to determine the target S-CSCF in the case of failure to access the UDM exemplarily shown in the present application. In the flow chart:
- step 701 the I-CSCF determines that access to the UDM fails.
- the I-CSCF may query the address information of the target S-CSCF from the UDM after receiving the registration message initiated by the target UE or the invitation message to the target UE initiated by the calling UE.
- the I-CSCF sends a query request to the UDM, and the query request can be used to query the address information of the target S-CSCF.
- the query request can include the target UE ID, which can be understood as the user ID corresponding to the target UE, During the UE registration process, the target UE ID is specifically the user ID of the registered user corresponding to the target UE; during the UE calling process, the target UE ID is specifically the user ID of the called user corresponding to the target UE.
- the query request may be the UAR message in the above-mentioned related embodiment of FIG.
- the target UE identifier is specifically the user ID of the registered user in the UAR message; the query request may also be the LIR message in the above-mentioned related embodiment of FIG. 6 , the target UE identifier is specifically the user identifier of the called UE in the LIR message.
- the I-CSCF receives a query response from the UDM, and the query response includes the address information of the target S-CSCF, which means that the I-CSCF accesses the UDM normally.
- the I-CSCF may perform a registration process or a call process based on the address information of the target S-CSCF included in the query response.
- the I-CSCF may send a first acquisition request to the first device, for details, refer to step 702 below.
- the failure to access UDM may include at least one or more of the following situations:
- UDM equipment failure UDM access link unreachable, UDM capacity insufficient, UDM flow control, communication link capacity insufficient, communication link flow control, transmission network failure, SCP failure.
- Step 702 the I-CSCF sends a first acquisition request to the first device.
- the first acquisition request may be used to indicate failure to access the UDM.
- the first device may be an S-CSCF or a backup device.
- the first acquisition request can be used to confirm whether the first device is the target S-CSCF; if the first device is a backup device, the first acquisition request can be used to request the first device
- the address information of the target S-CSCF refer to the description in step 703 for details.
- Step 703 the first device sends a first acquisition response to the I-CSCF according to the first acquisition request.
- the first acquisition response may be used to indicate the address information of the target S-CSCF.
- the first device may be the target S-CSCF or the backup device, which will be described in two cases as follows:
- the first device is the target S-CSCF.
- one I-CSCF may correspond to an S-CSCF set, and the S-CSCF set may include M S-CSCFs, where M is an integer greater than 1.
- the I-CSCF can send an acquisition request to any one of the M S-CSCFs to determine whether the S-CSCF that receives the acquisition request is the target S-CSCF; correspondingly, after receiving the acquisition request, the S-CSCF can send an acquisition request to The I-CSCF indicates whether it is the target S-CSCF.
- the S-CSCF can indicate to the I-CSCF whether it is the target S-CSCF in the following two possible ways:
- the S-CSCF may feed back an acquisition response to the I-CSCF.
- the acquisition response may be a confirmation response or a negative response, wherein the confirmation response may be used to indicate that the S-CSCF is the target S-CSCF, and the negative response may be It can be used to indicate that the S-CSCF is not the target S-CSCF.
- the determination response is an indication of determining that the S-CSCF is the target S-CSCF
- the negative response is an indication of denying that the S-CSCF is the target S-CSCF.
- the acquisition response may indicate whether it is the target S-CSCF through a preset bit.
- the acquisition response may be indicated through 1 preset bit. When the value of 1 bit is 1, Indicates that the S-CSCF confirms that it is the target S-CSCF; when the value of the 1 bit is 0, it indicates that the S-CSCF denies that it is the target S-CSCF.
- the S-CSCF determines that it is the target S-CSCF, it can feed back an acquisition response to the I-CSCF.
- the acquisition response can be a confirmation response (see the above description), or the acquisition response can be
- the address information of the target S-CSCF is included to indicate that the S-CSCF is the target S-CSCF. If the S-CSCF determines that it is not the target S-CSCF, it may not feed back a response to the I-CSCF.
- the following takes possible mode 1 as an example to explain how the I-CSCF selects the target S-CSCF (that is, the first device) from the M S-CSCFs in the S-CSCF set.
- the target S-CSCF that is, the first device
- Example 1 the I-CSCF sends acquisition requests to each S-CSCF in the S-CSCF set.
- the I-CSCF selects an S-CSCF from the S-CSCF set, and then the I-CSCF sends an acquisition request to the S-CSCF to determine whether the S-CSCF is the target S-CSCF.
- the selected S-CSCF determines that it is not the target S-CSCF according to the acquisition request, and then sends a Negative response, to deny that it is the target S-CSCF.
- the selected S-CSCF determines that it is not the target S-CSCF, it sets the value of the preset bit in the acquisition response to 0 (the acquisition response is a negative response).
- the I-CSCF determines that the selected S-CSCF is not the target S-CSCF according to the value 0 of the preset bit in the acquisition response.
- the I-CSCF selects a new S-CSCF from the S-CSCF set, and continues to send an acquisition request to the new S-CSCF to determine whether the new S-CSCF is the target S-CSCF. By analogy, until the I-CSCF selects the target S-CSCF from the S-CSCF set.
- the selected S-CSCF determines that it is the target S-CSCF according to the acquisition request, and then reports to the I-CSCF Send a confirmation response to confirm that it is the target S-CSCF.
- the I-CSCF determines that the selected S-CSCF is the target S-CSCF.
- the selected S-CSCF determines that it is the target S-CSCF, it sets the value of the preset bit in the acquisition response to 1 (the acquisition response is a determination response).
- the I-CSCF determines that the selected S-CSCF is the target S-CSCF according to the value 1 of the preset bit in the acquisition response.
- Example 2 the I-CSCF sends acquisition requests to multiple S-CSCFs in the S-CSCF subset through multicast.
- the S-CSCF set corresponding to the I-CSCF may further include multiple S-CSCF subsets, and the subset may include m S-CSCFs, where m is an integer greater than 1.
- the I-CSCF may select a subset from the plurality of S-CSCF subsets. Then the I-CSCF respectively sends acquisition requests to the m S-CSCFs in the selected subset, so as to determine whether there is a target S-CSCF in the selected subset.
- each S-CSCF in the m S-CSCFs receives the acquisition request, and then determines whether it is the target S-CSCF according to the acquisition request.
- each S-CSCF in the selected subset sends a negative response to the I-CSCF.
- the I-CSCF receives the negative response sent by each S-CSCF in the selected subset, determines that the target S-CSCF is not included in the subset, and then selects another one from the multiple S-CSCF subsets
- the sub-set is used to determine whether the target S-CSCF is included in the new sub-set. By analogy, until the I-CSCF selects a subset containing the target S-CSCF from multiple S-CSCF subsets.
- the target S-CSCF in the selected subset may, after receiving the acquisition request from the I-CSCF, determine itself to be the target S-CSCF according to the acquisition request , and then send a confirmation response to the I-CSCF. Further, all other S-CSCFs in the subset except the target S-CSCF send respective negative responses to the I-CSCF.
- the I-CSCF receives the confirmation response of the target S-CSCF in the subset and the negative responses of other S-CSCFs in the subset except the target S-CSCF, and determines that the target S-CSCF is included in the subset.
- negative response and the confirmation response may refer to the description in the above-mentioned example 1, and will not be repeated here.
- the I-CSCF implements simultaneous (or parallel) sending of acquisition requests to multiple S-CSCFs in the subset by means of multicast, thereby helping to improve the efficiency of the I-CSCF in determining the target S-CSCF.
- Example 3 the I-CSCF sends acquisition requests to all S-CSCFs in the S-CSCF set by broadcasting.
- the target S-CSCF in the S-CSCF set determines that it is the target S-CSCF according to the acquisition request, and then sends a confirmation response to the I-CSCF. Further, all other S-CSCFs in the S-CSCF set except the target S-CSCF send respective negative responses to the I-CSCF.
- the I-CSCF receives the confirmation response from the target S-CSCF in the S-CSCF set and the negative responses from other S-CSCFs in the S-CSCF set except the target S-CSCF, and determines from the S-CSCF set Target S-CSCF.
- negative response and the confirmation response may refer to the description in the above-mentioned example 1, and will not be repeated here.
- the I-CSCF implements simultaneous (or parallel) sending of acquisition requests to all S-CSCFs in the S-CSCF set by broadcasting, thereby helping to improve the efficiency of the I-CSCF in determining the target S-CSCF.
- the S-CSCF can determine whether it is the target S-CSCF by determining whether the user data of the target UE is locally stored.
- the purpose of the I-CSCF to select the target S-CSCF from the S-CSCF set is to find the S-CSCF that the target UE has registered with, that is, in the last registration process of the target UE, the target S-CSCF has saved the S-CSCF User data of the target UE. If the S-CSCF determines that the user data of the target UE is locally stored, it may determine that it is the target S-CSCF.
- the acquisition request sent by the I-CSCF to the S-CSCF includes the identifier of the target UE, where the identifier of the target UE is, for example, an international mobile subscriber identification number (IMSI).
- the S-CSCF may query whether there is locally stored user data corresponding to the target UE ID according to the target UE ID, that is, determine whether there is locally stored user data of the target UE.
- the S-CSCF determines that the user data of the target UE is stored locally, it sends a confirmation response to the I-CSCF, and the confirmation response is specifically an indication to determine that it is the target S-CSCF; if the S-CSCF determines that the user data of the target UE is not stored locally user data, then send a negative response to the I-CSCF, where the negative response is specifically an indication to determine that it is not the target S-CSCF.
- the target S-CSCF since the target S-CSCF needs to store the user data of the target UE in the last registration process, the target S-CSCF will not clear the local storage immediately after receiving the logout request from the target UE. Instead, after receiving the logout request of the target UE and after the preset logout time expires, the user data of the target UE stored locally will be cleared.
- the target S-CSCF sends a confirmation response to the I-CSCF, and other S-CSCFs send a negative response to the I-CSCF. In this way, the I-CSCF can determine the corresponding S-CSCF according to the received confirmation response or negative response. Whether the CSCF is the target S-CSCF.
- the target S-CSCF may also send an acquisition response including the address information of the target S-CSCF (that is, its own address information) to the I-CSCF.
- the I-CSCF obtains the address of the target S-CSCF from the obtaining response, thereby determining the target S-CSCF.
- the other S-CSCF determines that it is not the target S-CSCF, and may not reply any message.
- the I-CSCF determines that the acquisition response has not been received after the preset acquisition time period after sending the acquisition request, it can determine that the current S-CSCF is not the target S-CSCF, so the I-CSCF selects a new S-CSCF -CSCF, and send an acquisition request to the new S-CSCF, the specific implementation may refer to the above description.
- the target S-CSCF among the M S-CSCFs can be understood as the first device, and the acquisition request sent by the I-CSCF to the target S-CSCF can be called the first acquisition request, and the target S-CSCF responds with
- the acquisition response sent to the I-CSCF in the first acquisition request may be referred to as a first acquisition response, where the first acquisition response may be a confirmation response, or the first acquisition response includes address information of the target S-CSCF.
- other S-CSCFs except the target S-CSCF can also be understood as the second device, and the acquisition request sent by the I-CSCF to other S-CSCFs can be called the second acquisition request, and the other S-CSCF -
- the acquisition response sent by the CSCF to the I-CSCF in response to the second acquisition request may be referred to as a second acquisition response, wherein the second acquisition response may be a negative response, or the other S-CSCF does not send a response to the I-CSCF.
- the first device is a backup device.
- the first acquisition response may include the address information of the target S-CSCF.
- the backup device may store N1 correspondences locally, where N1 is an integer greater than or equal to 2.
- N1 is an integer greater than or equal to 2.
- Each corresponding relationship may include the identifier of the UE and the address information of the S-CSCF corresponding to the UE.
- the I-CSCF sends a first acquisition request to the backup device, where the first acquisition request includes the identifier of the target UE.
- the backup device can determine the address information of the target S-CSCF corresponding to the target UE from the locally stored N1 correspondences according to the identity of the target UE in the first acquisition request, and then send the first acquisition request to the I-CSCF
- the first acquisition request includes the address information of the target S-CSCF.
- the target UE is UE12.
- the first acquisition request may include the identifier 12.
- the backup device may determine the address information 12 from the N1 correspondences according to the identifier 12, and then carry the address information 12 in the In the first get response, it is sent to the I-CSCF.
- the I-CSCF when accessing the UDM is normal, can register the user data of the target UE in the UDM, and the specific registration process can be referred to as shown in FIG. 4 . Subsequently, the I-CSCF may send the identity of the target UE and the address information of the target S-CSCF to the backup device, and the backup device stores the two correspondingly. In addition, the backup device may also update the corresponding relationship stored locally.
- the I-CSCF successfully registers the user data of UE12 in UDM, and then the I-CSCF sends the identifier 12 of UE12 and the address information 12 of the target S-CSCF to the backup device. If the backup device determines according to the identifier 12 that there is no identifier 12 and address information corresponding to the identifier 12 in the local storage, it stores the identifier 12 and the address information 12 in correspondence.
- the I-CSCF can also send the identifier 12 of UE12 and the address information of the target S-CSCF (for example, address information 12') to the backup device.
- the backup device determines according to the identifier 12 that there is the identifier 12 and the address information corresponding to the identifier 12 in the local storage, then the corresponding relationship in the local storage can be updated, or it can also be understood that the address information 12' covers the original address information 12.
- the data stored locally in the backup device can be aged. If the relationship has not been read or updated, the corresponding relationship can be deleted.
- the I-CSCF may instruct the backup device to delete the corresponding relationship of the UE stored locally by the I-CSCF based on the UE's logout request.
- the I-CSCF can receive a deregistration request from the target UE, and after receiving the deregistration request, send a delete command to the backup device after the preset deregistration time elapses to instruct to delete the corresponding stored information in the backup device.
- the identifier of the target UE and the address information of the target S-CSCF for example, the identifier of the target UE may be included in the deletion instruction.
- the backup device deletes the locally stored address information of the target UE and the target S-CSCF correspondingly according to the deletion instruction.
- the backup device may also have its own backup device.
- the communication system may include backup device 1 to backup device n, where n is an integer greater than or equal to 2.
- the N1 correspondences may be stored in the backup device 1 to the backup device n respectively, that is, the N1 correspondences are stored in each backup device.
- the I-CSCF cannot obtain the address information of the target S-CSCF from one of the backup devices, it can also obtain the address information from other backup devices, which can increase the stability of the system.
- the I-CSCF may send the corresponding relationship between the identity of the target UE and the address information of the target S-CSCF to backup device 1 to backup device n, so that each backup device stores the corresponding relationship.
- the I-CSCF can also send delete instructions to backup device 1 to backup device n respectively, so as to realize that each backup device deletes the corresponding relationship stored locally.
- the backup device 1 acts as the main backup device, and the I-CSCF can send the corresponding relationship to the backup device 1, and the backup device 1 sends the corresponding relationship to the backup device 2 to the backup device n, so that each backup device stores the corresponding relationship.
- the backup device 1 acts as the main backup device, and the I-CSCF can send the corresponding relationship to the backup device 1, and the backup device 1 sends the corresponding relationship to the backup device 2 to the backup device n, so that each backup device stores the corresponding relationship.
- the I-CSCF can also send a deletion instruction to backup device 1, and backup device 1 sends the deletion instruction to backup device 2 to backup device n respectively, so as to realize the corresponding relationship of each backup device deleting the local storage.
- other methods which are not limited in this application.
- the n backup devices may also perform synchronization operations periodically.
- the N1 correspondences can be divided into n parts, and then the n correspondences are stored in the backup device 1 to the backup device n respectively.
- N1 is equal to 60 million
- n is equal to 2
- the 60 million user correspondences can be split into two parts, of which 30 million user correspondences are stored in backup device 1, and the other 30 million user correspondences are stored in the backup device 2.
- the corresponding relationship in the backup device 1 can also be backed up to the backup device 3 again, and the corresponding relationship in the backup device 2 can be backed up to the backup device 4 again.
- the I-CSCF cannot obtain the address information of the target S-CSCF from one of the backup devices, it can also obtain the address information from other backup devices, which can increase the stability of the system.
- the target S-CSCF may also send the corresponding relationship between the identity of the target UE and the address information of the target S-CSCF to the backup device, or the target S-CSCF may send a delete instruction to the backup device,
- the specific manner is similar to the sending by the I-CSCF and will not be repeated here.
- the backup device may be any one or more of the I-CSCF, S-CSCF, P-CSCF, SCP, and AS in the above communication system.
- the I-CSCF serving as the backup device may be the same or different from the I-CSCF that sends the acquisition request.
- the I-CSCF stores the identity of the target UE and the address information of the target S-CSCF locally; or when it is determined that access to UDM fails, according to the identity of the target UE, Obtain the address information of the target S-CSCF from local storage; or delete the corresponding relationship stored locally.
- the backup device is an S-CSCF
- the S-CSCF serving as the backup device and the target S-CSCF may be the same or different.
- the target S-CSCF stores the identity of the target UE and the address information of the target S-CSCF locally; or after receiving the first acquisition request, it can The identifier of the target UE in the request obtains the address information of the target S-CSCF locally; or deletes the corresponding relationship stored locally.
- the I-CSCF After the I-CSCF receives the first acquisition response, it can acquire the address information of the target S-CSCF according to the first acquisition response. Optionally, the I-CSCF may further perform the following step 704.
- the I-CSCF registers the target UE with the target S-CSCF according to the address information of the target S-CSCF; or connects the call to the target UE.
- the I-CSCF may send a query request to the UDM after receiving a registration request (including an initial registration request or a re-registration request) of the target UE. Then the I-CSCF determines that the access to the UDM fails, and acquires the address information of the target S-CSCF from the first device. In this case, the I-CSCF can further execute the registration procedure of the target UE according to the address information of the target S-CSCF, as shown in FIG. 4 for details.
- the I-CSCF may also send an indication of failure to access UDM to the target S-CSCF and/or AS.
- the target S-CSCF may not need to perform steps 405, 2 in FIG. 4 based on the indication of failure to access UDM.
- Step 406, Step 412 and Step 413; the AS may not need to execute Step 502 to Step 505 in FIG. 5 based on the indication of failure to access the UDM. In this way, it is helpful to avoid unnecessary signaling transmission performed by the target S-CSCF and/or AS.
- the I-CSCF may send a query request to the UDM after receiving the call request to the target UE. Then the I-CSCF determines that the access to the UDM fails, and acquires the address information of the target S-CSCF from the first device. In this case, the I-CSCF may further execute a call process to the target UE according to the address information of the target S-CSCF, as shown in FIG. 6 for details.
- the I-CSCF may also send an indication of failure to access UDM to the AS.
- the AS does not need to perform steps 606 and 607 in FIG. 6 based on the indication of failure to access UDM. In this way, it is helpful to avoid unnecessary signaling transmission performed by the AS.
- the I-CSCF may not only send an indication of failure to access the UDM to the target S-CSCF in step 704, so as to inform the target S-CSCF that the failure to access the UDM ;
- the I-CSCF may also in step 702, indicate to the target S-CSCF the failure to access the UDM through the first acquisition request.
- the first acquisition request may also include an indication of failure to access UDM, correspondingly, after receiving the first acquisition request, the target S-CSCF, according to the indication of failure to access UDM in the first acquisition request and the target After the identity of the UE is determined to be the target S-CSCF, the subsequent UE registration procedure can be continued.
- the first acquisition request can be understood as a registration request, and accordingly, the target S-CSCF continues to execute the subsequent UE registration process according to the registration request. In this way, the I-CSCF does not need to trigger the target S-CSCF to continue the subsequent UE registration procedure.
- the target S-CSCF may also indicate to the AS that it fails to access the UDM.
- Fig. 8 to Fig. 11 respectively show the implementation methods in four specific scenarios provided by the present application:
- Figure 8 is a schematic flow diagram of the scenario where the I-CSCF searches for the target S-CSCF from the S-CSCF set through unicast in the target UE registration process:
- the I-CSCF starts from S-CSCF1 and sends registration messages to S-CSCF1 and S-CSCF2 in sequence (equivalent to the acquisition request in the related embodiment in Figure 7), where S-CSCF2 is the target S-CSCF.
- Step 801 the target UE sends a registration message to the I-CSCF.
- step 802 the I-CSCF sends a UAR message to the UDM according to the registration message.
- the UAR message is equivalent to the query request in step 701 .
- the I-CSCF does not receive a response message from the UDM after the preset query duration after sending the UAR message, so it determines that the access to the UDM fails.
- the I-CSCF sends a registration message to the S-CSCF1, and the registration message may include an indication of failure to access the UDM and an identifier of the target UE.
- Step 805 the S-CSCF1 checks whether the local storage of the S-CSCF1 includes the user data of the target UE according to the registration message. Then S-CSCF1 determines that the local storage does not include the user data of the target UE.
- step 806 the S-CSCF1 sends a negative response to the I-CSCF, and the negative response specifically denies the indication that the S-CSCF1 is the target S-CSCF.
- Step 807 After determining that S-CSCF1 is not the target S-CSCF, the I-CSCF selects a new S-CSCF (that is, S-CSCF2), and then sends a registration message to S-CSCF2, which may still include the access UDM An indication of failure, and the identity of the target UE.
- S-CSCF2 a new S-CSCF (that is, S-CSCF2)
- Step 808 the S-CSCF2 checks whether the local storage of the S-CSCF2 includes the user data of the target UE according to the registration message. The S-CSCF2 then determines that the local storage contains the user data of the target UE.
- step 809 the S-CSCF2 sends a confirmation response to the I-CSCF, and the confirmation response is specifically an indication of determining that the S-CSCF2 is the target S-CSCF.
- Step 810 after determining that S-CSCF2 is the target S-CSCF, the I-CSCF sends a registration message to S-CSCF2, and the registration message includes an indication of failure to access UDM.
- step 811 the S-CSCF2 sends a registration message to the AS, and the registration message includes an indication of failure to access the UDM.
- step 810 is an optional step, and after S-CSCF2 determines that it is the target S-CSCF, it can also directly execute step 811 based on the registration message of the I-CSCF.
- step 801 to step 811 refer to the description in the related embodiment in FIG. 4 , FIG. 5 or FIG. 7 .
- Figure 9 is a schematic flow diagram of the scenario where the I-CSCF searches for the target S-CSCF from the S-CSCF set through multicast in the registration process:
- subset 1 includes S-CSCF11 and S-CSCF12
- subset 2 includes S-CSCF21 and S-CSCF22
- S-CSCF22 is the target S-CSCF.
- Step 901 the target UE sends a registration message to the I-CSCF.
- step 902 the I-CSCF sends a UAR message to the UDM according to the registration message.
- the UAR message is equivalent to the query request in step 701 .
- the I-CSCF does not receive a response message from the UDM after a preset query period after sending the UAR message, so it determines that the access to the UDM fails.
- the I-CSCF sends a registration message to the S-CSCF11 and S-CSCF12 in the subset 1 respectively, and the registration message may include an indication of failure to access the UDM and the identity of the target UE.
- Step 905 each S-CSCF in subset 1 determines that the local storage does not include the user data of the target UE. details as follows:
- the S-CSCF 11 searches whether the local storage of the S-CSCF 11 contains the user data of the target UE. Then the S-CSCF 11 determines that the local storage does not include the user data of the target UE.
- the S-CSCF 12 checks whether the local storage of the S-CSCF 12 contains the user data of the target UE. The S-CSCF 12 then determines that the target UE's user data is not included in the local storage.
- step 906 the S-CSCF11 sends a negative response to the I-CSCF, and the negative response specifically denies the indication that the S-CSCF11 is the target S-CSCF.
- the S-CSCF 12 sends a negative response to the I-CSCF, and the negative response specifically denies the indication that the S-CSCF 12 is the target S-CSCF.
- Step 907 After determining that there is no target S-CSCF in subset 1, the I-CSCF sends a registration message to S-CSCF 21 and S-CSCF 22 in subset 2 respectively, and the registration message may include an indication of failure to access UDM , and the identity of the target UE.
- Step 908 the target S-CSCF in the subset 2 determines that the local storage includes the user data of the target UE, and other S-CSCFs determine that the local storage does not include the user data of the target UE. details as follows:
- the S-CSCF21 checks whether the local storage of the S-CSCF21 contains the user data of the target UE. The S-CSCF21 then determines that the local storage does not include the user data of the target UE.
- the S-CSCF22 checks whether the local storage of the S-CSCF22 includes the user data of the target UE according to the registration message. The S-CSCF 22 then determines that the local storage contains the target UE's user data.
- the S-CSCF21 sends a negative response to the I-CSCF, and the negative response specifically denies the indication that the S-CSCF21 is the target S-CSCF.
- the S-CSCF22 sends a determination response to the I-CSCF, and the determination response is specifically an indication of determining the S-CSCF22 as the target S-CSCF.
- the I-CSCF determines that the S-CSCF22 is the target S-CSCF, and then sends a registration message to the S-CSCF22, which may include an indication of failure to access the UDM.
- step 911 the S-CSCF22 sends a registration message to the AS, and the registration message includes an indication of failure to access the UDM.
- step 910 is an optional step, and after the S-CSCF22 determines that it is the target S-CSCF, it can also directly execute step 911 based on the registration message of the I-CSCF.
- step 911 for content not described in detail in step 901 to step 911 , refer to the description in the related embodiment in FIG. 4 , FIG. 5 or FIG. 7 .
- Figure 10 is a schematic diagram of the process in the scenario where the I-CSCF queries the address information of the target S-CSCF from the backup device in the registration process:
- Step 1001 the target UE sends a registration message to the I-CSCF.
- step 1002 the I-CSCF sends a UAR message to the UDM according to the registration message.
- the UAR message is equivalent to the query request in step 701 .
- the I-CSCF does not receive a response message from the UDM after a preset query period after sending the UAR message, so it determines that the access to the UDM fails.
- Step 1004 the I-CSCF sends a first acquisition request to the backup device, and the first acquisition request may include an indication of failure to access the UDM and an identifier of the target UE.
- Step 1005 the backup device searches the local storage of the backup device for the S-CSCF address information corresponding to the identity of the target UE according to the first acquisition request, and uses it as the address information of the target S-CSCF.
- Step 1006 S-CSCF1 sends a first acquisition response to the I-CSCF, and the first acquisition response may include the address information of the target S-CSCF.
- Step 1007 the I-CSCF sends a registration message to the target S-CSCF according to the address information of the target S-CSCF, and the registration message may include an indication of failure to access the UDM.
- Step 1008 the target S-CSCF sends a registration message to the AS, and the registration message may include an indication of failure to access the UDM.
- step 1001 to step 1008 reference may be made to the description in the related embodiment in FIG. 4 , FIG. 5 or FIG. 7 .
- Figure 11 is a schematic flow diagram of the scene where the I-CSCF stores the identity of the target UE and the address information of the target S-CSCF in the backup device under normal conditions of accessing the UDM:
- steps 1101 to 1114 please refer to steps 401 to 414 in FIG. 4 for details.
- steps 1115 to 1117 are newly added steps:
- Step 1115 the I-CSCF sends a backup message to the backup device, wherein the backup message includes the target UE's identity and the address information of the target S-CSCF.
- Step 1116 the backup device acquires the target UE's identity and the target S-CSCF's address information from the backup message, and stores the target UE's identity and the target S-CSCF's address information correspondingly.
- Step 1117 the backup device sends a backup response to the I-CSCF, which is used to indicate that the identity of the target UE and the address information of the target S-CSCF have been stored correspondingly.
- the target S-CSCF may also send a backup message to the backup device, and correspondingly, the backup device sends a backup response to the target S-CSCF.
- the I-CSCF may send a first acquisition request to the first device. Further, the I-CSCF may receive a first acquisition response from the first device, and the first acquisition response may be available In order to indicate the address information of the target S-CSCF, the I-CSCF can obtain the address information of the target S-CSCF, and then execute the registration process of the target UE or the call process for the target UE according to the address information of the target S-CSCF. Therefore, in the case of failure to access the UDM, it is avoided that the UE cannot be registered successfully or the UE cannot be called, which helps to improve the reliability of the communication system. Of course, this application can also be applied to other scenarios where the target S-CSCF needs to be determined, and this application will not give examples one by one.
- this application is also applicable to the following scenarios : When the target UE is powered off or in airplane mode, the target UE has already initiated a logout procedure. However, through the method in this application, the I-CSCF can still determine the address information of the target S-CSCF, so as to call the target UE successfully.
- This application also provides another method for determining the S-CSCF, which is used to enable the I-CSCF to determine the target S-CSCF for the target UE to register in the case of UDM access failure, so as to complete the registration process of the target UE, or to The call flow of the target UE.
- this method is applicable to the communication system shown in Figure 3, and the signaling interaction between the I-CSCF and UDM needs to go through the SCP.
- the I-CSCF passes the SCP Send UAR message to UDM, and I-CSCF receives UAA message from UDM via SCP, etc.
- the I-CSCF sends the LIR message to the UDM via the SCP, and the I-CSCF receives the LIA message from the UDM via the SCP.
- Step 1201 the SCP receives the query request from the I-CSCF, and forwards the query request to the UDM.
- the I-CSCF may send a query request to the UDM via the SCP.
- the query request refer to the description in step 701.
- step 1202 the SCP determines that the access to the UDM fails.
- the SCP receives a query response from the UDM, the query response includes the address information of the target S-CSCF, that is, the access to the UDM is normal, and the SCP may forward the query response to the I-CSCF.
- the I-CSCF may execute a registration (or call) procedure for the target UE based on the address information of the target S-CSCF in the query response.
- the SCP does not receive a query response from the UDM after sending a query request to the UDM for a preset query duration, or receives a query failure response returned from the UDM, and determines that access to the UDM fails.
- the SCP can obtain the address information of the target S-CSCF from the local storage, carry the address information of the target S-CSCF in the query response, and send it to the I-CSCF. For details, see step 1203 and step 1204 below.
- Step 1203 the SCP acquires the address information of the target S-CSCF corresponding to the target UE's ID from local storage according to the target UE's ID in the query request.
- N2 correspondences can be stored locally in the SCP, where N2 is an integer greater than or equal to 2.
- Each corresponding relationship may include the identifier of the UE and the address information of the S-CSCF corresponding to the UE.
- the identifier of UE21 is represented as identifier 21, and the identifier 21 corresponds to address information 21, that is, UE21 is registered in the S-CSCF corresponding to address information 21; the identifier of UE22 is represented as identifier 22, and the identifier 22 corresponds to The address information 22, that is, the UE 22 is registered in the S-CSCF corresponding to the address information 22, and so on.
- Step 1204 the SCP sends a query response to the I-CSCF, and the query response includes the address information of the target S-CSCF.
- the SCP may also send an indication of failure to access the UDM to the I-CSCF, and the indication of failure to access the UDM may be carried in the query response, or the SCP may send it to the I-CSCF as a separate message.
- the query request includes the identifier 22.
- the SCP can determine the address information of the target S-CSCF as the address information 22 according to the correspondence between the identifier 22 and the local storage.
- the query response sent by the SCP to the I-CSCF includes address information 22 and an indication of failure to access the UDM.
- the I-CSCF when accessing the UDM is normal, the I-CSCF can successfully register the user data of the target UE in the UDM, and the specific registration process can be referred to as shown in FIG. 4 .
- SCP can analyze the forwarded signaling, and then analyze the current registration process from the signaling
- the corresponding relationship between the identity of the target UE and the address information of the target S-CSCF is stored, and then the corresponding relationship between the identity of the target UE and the address information of the target S-CSCF is stored.
- the SCP can also update the locally stored corresponding relationship in the next registration process of the target UE.
- UDM can send an SAA message to the target S-CSCF, and the SAA message can include the correspondence between the identifier 22 of UE22 and the address information 22 of the target S-CSCF .
- the SCP may parse the SAA message to obtain the corresponding relationship between the identifier 22 and the address information 22 . If the SCP determines according to the identifier 22 that there is no address information corresponding to the identifier 22 and the identifier 22 in the local storage, it stores the identifier 22 and the address information 22 correspondingly.
- the SCP can analyze the UDM again to send the SAA message to the target S-CSCF, and then analyze the new corresponding relationship from the SAA message, for example, resolve the identifier 22 and the address corresponding to the identifier 22 information (for example, expressed as address information 22'), the SCP can update the identifier 22 in the local storage and the address information corresponding to the identifier 22, or it can also be understood as covering the original address information 22 with the address information 22'.
- the SCP is a backup device, and when the backup device forwards the signaling between the UDM and the S-CSCF, or when forwarding the signaling between the UDM and the I-CSCF, the target can be obtained from the forwarded signaling.
- the corresponding relationship between the UE identifier and the address information of the target S-CSCF does not need to be sent to the proxy device by the I-CSCF or the target S-CSCF, which helps to reduce signaling overhead.
- the data stored locally in the SCP can be aged. has been read or updated, the corresponding relationship can be deleted.
- the I-CSCF may instruct the SCP to delete the locally stored corresponding relationship of the UE based on the UE's deregistration request.
- the I-CSCF may receive a deregistration request from the target UE, and after receiving the deregistration request and after the preset deregistration time period expires, send a delete instruction to the SCP.
- the SCP deletes the locally stored corresponding relationship according to the deletion instruction.
- the SCP can also have its own backup device.
- the SCP can synchronize its local storage to other backup devices, thereby helping to increase the stability of the system.
- the SCP may divide its locally stored correspondences into multiple sets of correspondences, and store each set of correspondences in its corresponding backup device, thereby helping to reduce the storage capacity of each backup device.
- the I-CSCF may further perform the following step 1205 .
- Step 1205 the I-CSCF registers the target UE with the target S-CSCF according to the address information of the target S-CSCF; or connects the call to the target UE.
- the I-CSCF may send a query request to the UDM via the SCP.
- the SCP determines that the access to the UDM fails, so it acquires the address information of the target S-CSCF from its local storage, and then sends a query response containing the address information of the target S-CSCF to the I-CSCF.
- the I-CSCF can further execute the registration procedure of the target UE according to the address information of the target S-CSCF, as shown in FIG. 4 for details.
- the I-CSCF may also send an indication of failure to access UDM to the target S-CSCF and/or AS.
- the target S-CSCF may not need to perform steps 405, 2 in FIG. 4 based on the indication of failure to access UDM.
- Step 406, Step 412 and Step 413; the AS may not need to execute Step 502 to Step 505 in FIG. 5 based on the indication of failure to access the UDM. In this way, it is helpful to avoid unnecessary signaling transmission performed by the target S-CSCF and/or AS.
- the I-CSCF may send a query request to the UDM via the SCP.
- the SCP determines that the access to the UDM fails, so it acquires the address information of the target S-CSCF from its local storage, and then sends a query response containing the address information of the target S-CSCF to the I-CSCF.
- the I-CSCF may further execute a call process to the target UE according to the address information of the target S-CSCF, as shown in FIG. 6 for details.
- the I-CSCF may also send an indication of failure to access UDM to the AS.
- the AS does not need to perform steps 606 and 607 in FIG. 6 based on the indication of failure to access UDM. In this way, it is helpful to avoid unnecessary signaling transmission performed by the AS.
- Figure 13 and Figure 14 respectively show the implementation methods in two specific scenarios provided by this application:
- Figure 13 is a schematic flow diagram of the I-CSCF obtaining the address information of the target S-CSCF from the SCP in the registration process:
- Step 1301 the target UE sends a registration message to the I-CSCF.
- Step 1302 the I-CSCF sends a UAR message to the SCP according to the registration message.
- step 1303 the SCP sends a UAR message to the UDM.
- Step 1304 the SCP determines that the access to the UDM fails.
- Step 1305 the SCP acquires the address information of the target S-CSCF corresponding to the target UE's ID from local storage according to the target UE's ID included in the UAR message.
- Step 1306 the SCP sends a UAA message to the I-CSCF.
- the UAA message includes the address information of the target S-CSCF and an indication of failure to access the UDM.
- Step 1307 the I-CSCF sends a registration message to the target S-CSCF according to the address information of the target S-CSCF, and the registration message may include an indication of failure to access the UDM.
- step 1301 to step 1308 reference may be made to the description in the related embodiment in FIG. 4 , FIG. 5 or FIG. 12 .
- Figure 14 is a schematic flow diagram of the scenario where the target UE identifier and target S-CSCF address information are stored in the SCP under normal access to UDM:
- steps 1401 to 1412 please refer to steps 401 to 412 in FIG. 4 for details, where the difference is only that the target S-CSCF communicates directly with the UDM in FIG. is forwarded by SCP. Further, in the following steps 1413 to 1416:
- the UDM sends an SAA message to the SCP, wherein the SAA message carries the identity of the target UE and the address information of the target S-CSCF.
- Step 1414 the SCP parses the SAA message, obtains the identity of the target UE and the address information of the target S-CSCF, and then stores the identity of the target UE and the address information of the target S-CSCF locally.
- Step 1415 the SCP sends an SAA message to the target S-CSCF.
- Step 1416 the target S-CSCF sends a 200 OK message to the UE.
- the I-CSCF sends a query request to the SCP, and the SCP can forward the query request to the UDM. If the SCP determines that the access to the UDM fails, it can obtain the address information of the target S-CSCF corresponding to the target UE locally, and Send the address information of the target S-CSCF to the I-CSCF. Correspondingly, the I-CSCF can acquire the address information of the target S-CSCF, and execute the registration process of the target UE or the call process to the target UE according to the address information of the target S-CSCF. Therefore, in the case of failure to access the UDM, it is avoided that the UE cannot be registered successfully or the UE cannot be called, which helps to improve the reliability of the communication system. Of course, this application can also be applied to other scenarios where the target S-CSCF needs to be determined, and this application will not give examples one by one.
- this application can also be applied to the following scenarios: when the target UE is powered off or in flight mode, the target UE has initiated Logout process. However, through the method in this application, the I-CSCF can still obtain the address information of the target S-CSCF from the SCP, so as to successfully call the target UE.
- the network elements or devices in the 5G communication system are taken as examples for illustration.
- the method of the present application is also applicable to 4G communication systems, 4.5G communication systems, or future communication systems such as 5.5G communication systems, In 6G communication system.
- network elements or devices in the 5G communication system can be replaced with network elements or devices in the corresponding communication system.
- "UDM” in the above embodiments may be replaced with "HSS”, "SCP” may be replaced with "DRA” and so on.
- UDM, HSS and other devices used to store user data (such as subscription data, identity data, etc.) can be called data management devices; and SCP, DRA, etc.
- the signaling between the data management device and the target S-CSCF is called a proxy device; and the UE is called a terminal, and the target UE is called a target terminal.
- the backup device stores the identity of the target terminal and the address information of the corresponding target S-CSCF, usually, only after the I-CSCF determines that access to the data management device fails, the The device obtains the address information of the target S-CSCF. It is explained that the backup device only stores the identity of the target terminal and the address information of the corresponding target S-CSCF, and the relevant data of the target terminal stored in the backup device is less than the user data corresponding to the target terminal stored in the data management device.
- the scheme in which the I-CSCF obtains the address information of the target S-CSCF from the backup device in the application is only used as an emergency solution for the failure of accessing the data management device, so as to avoid terminal registration failure or call failure.
- the proxy device sends the address information of the target S-CSCF to the I-CSCF.
- the proxy device will obtain it from the local storage only after determining that the access to the data management device fails.
- the address information of the target S-CSCF and then send the address information of the target S-CSCF to the I-CSCF, so that the I-CSCF can obtain the address information of the target S-CSCF, thereby avoiding terminal registration failure or call failure.
- FIG. 15 and FIG. 16 are schematic structural diagrams of possible communication devices provided in the present application. These communication apparatuses may be used to implement the functions of the I-CSCF, or the first device, or the proxy device in the above method embodiments, and thus also realize the beneficial effects of the above method embodiments.
- the communication device 1500 includes a processing module 1501 and a transceiver module 1502 .
- the communication apparatus 1500 is configured to implement the functions of the I-CSCF or the first device in the method embodiments shown in FIGS. 7 to 11 above.
- the processing module 1501 is configured to determine that access to the data management device fails, and controls the transceiver module 1502 to send the first acquisition request to the first device; the processing module 1501 is also configured to control the transceiver module 1502 to receive A first acquisition response of the first device; wherein, the first acquisition response indicates the address information of the target S-CSCF, and the target S-CSCF is the S-CSCF registered by the target terminal.
- the first device is the target S-CSCF, and the target S-CSCF is any one of the S-CSCF set; the first acquisition response includes an indication of determining that the first device is the target S-CSCF , or include the address information of the target S-CSCF.
- the processing module 1501 is further configured to: control the transceiver module 1502 to send a second acquisition request to the second device, where the second device is an S-CSCF other than the target S-CSCF in the S-CSCF set. CSCF; the control transceiving module 1502 receives an indication from the second device that the second device is not the target S-CSCF, or determines that the address information of the target S-CSCF from the second device has not been received.
- the processing module 1501 is specifically configured to: control the transceiver module 1502 to send the first acquisition request to multiple S-CSCFs included in the S-CSCF set; the processing module 1501 is specifically configured to: control the transceiver module 1502 Receive a first acquisition response of a target S-CSCF among multiple S-CSCFs.
- the processing module 1501 is further configured to: control the transceiving module 1502 to receive from among the multiple S-CSCFs, other S-CSCFs except the target S-CSCF denying that other S-CSCFs are the target S-CSCF. A response from the CSCF, or it is determined that the address information of the target S-CSCF from other S-CSCFs except the target S-CSCF among the multiple S-CSCFs has not been received.
- the first device is a backup device, and the backup device correspondingly stores the identifier of the target terminal and the address information of the target S-CSCF.
- the processing module 1501 is further configured to: when the access of the data management device is normal, control the transceiver module 1502 to send the identification of the target terminal and the address information of the target S-CSCF to the backup device.
- the processing module 1501 is further configured to: control the transceiver module 1502 to send a delete instruction to the backup device after receiving the logout request from the target terminal after the preset logout time elapses, so as to instruct to delete the It corresponds to the stored target terminal identifier and target S-CSCF address information.
- the processing module 1501 is specifically configured to: control the transceiver module 1502 to send a query request to the data management device; after sending the query request to the data management device, determine that no data from the The address information of the target S-CSCF of the management device; or, the control transceiver module 1502 receives the query failure response of the data management device.
- the processing module 1501 is configured to control the transceiver module 1502 to receive the first acquisition request from the I-CSCF, and the first acquisition request indicates that access to the data management device fails; the processing module 1501 is also configured to For the first acquisition request, control the transceiver module 1502 to send a first acquisition response to the I-CSCF; wherein, the first acquisition response indicates the address information of the target S-CSCF, and the target S-CSCF is the S-CSCF registered by the target terminal.
- the device 1500 is the target S-CSCF
- the processing module 1501 is specifically configured to: determine that the user data of the target terminal is stored in the device 1500 according to the identifier of the target terminal in the first acquisition request, and control the sending and receiving Module 1502 sends a first acquisition response to the I-CSCF.
- the processing module 1501 is further configured to: clear the user data stored in the device 1500 after receiving the logout request of the target terminal, and clearing the user data stored in the device 1500 after the preset logout time period is reached.
- the apparatus 1500 is a backup device, and the apparatus 1500 stores the identifier of the target terminal and the address information of the target S-CSCF correspondingly; the processing module 1501 is specifically configured to: according to the target terminal in the first acquisition request ID of the target S-CSCF, and control the transceiving module 1502 to send the first acquisition response carrying the address information of the target S-CSCF to the I-CSCF.
- the processing module 1501 is further configured to: when the access of the data management device is normal, the control transceiver module 1502 receives the target terminal identifier and the target S-CSCF from the I-CSCF or the target S-CSCF. Address information of the CSCF: correspondingly storing the identifier of the target terminal and the address information of the target S-CSCF.
- the processing module 1501 is further configured to: control the transceiver module 1502 to receive a deletion instruction from the I-CSCF or the target S-CSCF; according to the deletion instruction, delete the identifier of the target terminal correspondingly stored in the device 1500 and the address information of the target S-CSCF.
- the communication device 1500 is used to implement the functions of the proxy device in the method embodiments shown in the above-mentioned Figures 12 to 14, the communication device 1500 is located between the communication connection between the I-CSCF and the data management device:
- the processing module 1501 is configured to determine that the access to the data management device fails; and acquire the address information of the target S-CSCF from the local storage, where the target S-CSCF is the S-CSCF registered by the target terminal; The processing module 1501 is further configured to control the transceiver module 1502 to send the address information of the target S-CSCF to the I-CSCF.
- the processing module 1501 is specifically configured to: control the transceiver module 1502 to forward the query request from the I-CSCF to the data management device; The address information of the target S-CSCF of the device; or, the control transceiver module 1502 receives the query failure response of the data management device.
- the processing module 1501 is further configured to: when the access of the data management device is normal, the control transceiver module 1502 receives the identifier of the target terminal and the address information of the target S-CSCF from the data management device; The identifier of the target terminal and the address information of the target S-CSCF are correspondingly stored.
- FIG. 16 shows an apparatus 1600 provided in the embodiment of the present application.
- the apparatus shown in FIG. 16 may be a hardware circuit implementation manner of the apparatus shown in FIG. 15 .
- the apparatus may be applicable to the flow chart shown above, and execute the functions of the I-CSCF, or the first device, or the proxy device in the above method embodiments.
- FIG. 16 For ease of illustration, only the main components of the device are shown in FIG. 16 .
- the apparatus 1600 shown in FIG. 16 includes a communication interface 1610, a processor 1620, and a memory 1630, wherein the memory 1630 is used for storing program instructions and/or data.
- the processor 1620 may operate in cooperation with the memory 1630 .
- Processor 1620 may execute program instructions stored in memory 1630 . When the instructions or programs stored in the memory 1630 are executed, the processor 1620 is used to perform the operations performed by the processing module 1501 in the above embodiments, and the communication interface 1610 is used to perform the operations performed by the transceiver module 1502 in the above embodiments.
- the memory 1630 is coupled to the processor 1620 .
- the coupling in the embodiments of the present application is an indirect coupling or a communication connection between devices, units or modules, which may be in electrical, mechanical or other forms, and is used for information exchange between devices, units or modules.
- At least one of the memories 1630 may be included in the processor 1620 .
- the communication interface may be a transceiver, a circuit, a bus, a module, or other types of communication interfaces.
- the transceiver when the communication interface is a transceiver, the transceiver may include an independent receiver and an independent transmitter; it may also be a transceiver integrated with a transceiver function, or be a communication interface.
- Apparatus 1600 may also include a communication link 1640 .
- the communication interface 1610, the processor 1620 and the memory 1630 can be connected to each other through the communication line 1640;
- the communication line 1640 can be a peripheral component interconnect standard (peripheral component interconnect, referred to as PCI) bus or an extended industry standard architecture (extended industry standard architecture , referred to as EISA) bus and so on.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the communication line 1640 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used in FIG. 16 , but it does not mean that there is only one bus or one type of bus.
- the embodiment of the present application provides a computer-readable storage medium, on which a computer program or instruction is stored.
- the computer executes the I-CSCF in the above method embodiment. , or the first device, or the function of the proxy device.
- the embodiment of the present application provides a computer program product.
- the computer reads and executes the computer program product, the computer executes the I-CSCF, or the first device, or the agent device in the above method embodiment. Function.
- this embodiment of the present application provides a communication system, which includes the I-CSCF and the first device in the above-mentioned related method embodiments in Figure 7 to Figure 11, where the first device may be the target S- CSCF or backup device.
- the embodiment of the present application further provides a communication system, which includes the I-CSCF and the proxy device in the related method embodiments in FIGS. 12 to 14 above.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
一种确定S-CSCF的方法及装置,用于在接入数据管理设备失败的情况下,避免出现注册或者呼叫目标终端失败的问题,有助于提高了通信系统的可靠性。在本申请中,方法包括:I-CSCF确定接入数据管理设备失败,向第一设备发送第一获取请求;第一设备根据第一获取请求向I-CSCF发送第一获取响应;其中,第一获取响应可用于指示目标S-CSCF的地址信息,其中目标S-CSCF是目标终端注册的S-CSCF。其中,第一设备可以是目标S-CSCF或备份设备。
Description
相关申请的交叉引用
本申请要求在2021年11月25日提交中国专利局、申请号为202111411602.2、申请名称为“一种确定S-CSCF的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信技术领域,尤其涉及一种确定服务呼叫会话控制功能(serving-call session control function,S-CSCF)的方法及装置。
数据管理设备(比如4G中的归属签约用户服务器(home subscriber server,HSS),5G中的统一数据管理(unified data management,UDM))可用于存储终端的用户数据,用户数据比如是签约数据、身份数据等。
数据管理设备可在终端注册或终端被叫等流程中为IP多媒体子系统(IP multimedia subsystem,IMS)域中的功能/网元提供相关数据。示例性的,在终端被叫流程中,主叫终端向问询呼叫会话控制功能(interrogation-call session control function,I-CSCF)发起对被叫终端(或称为目标终端)的邀请消息之后,I-CSCF可基于该邀请消息向数据管理设备发送位置信息查询请求(location information request,LIR)消息,以请求获取目标终端对应的目标S-CSCF的地址信息。相应的,数据管理设备向I-CSCF发送位置信息查询响应(location information answer,LIA)消息,LIA消息中携带该目标S-CSCF的地址信息。
而在接入数据管理设备失败的情况下,I-CSCF不能从数据管理设备中获取到目标S-CSCF的地址信息。即I-CSCF不能确定出目标S-CSCF,从而导致呼叫目标终端失败。
发明内容
本申请提供一种确定S-CSCF的方法及装置,用于在接入数据管理设备失败的情况下,避免出现注册或者呼叫目标终端失败的问题,有助于提高了通信系统的可靠性。
第一方面,本申请提供一种确定S-CSCF的方法,该方法可以是由I-CSCF执行。
在一种可能的实现方式中,方法包括:I-CSCF确定接入数据管理设备失败,并向第一设备发送第一获取请求;I-CSCF接收第一设备的第一获取响应;其中,第一获取响应指示目标S-CSCF的地址信息,目标S-CSCF是目标终端注册的S-CSCF。示例性的,数据管理设备可以是UDM或HSS。示例性的,第一设备可以是目标S-CSCF或备份设备。
上述技术方案中,I-CSCF确定接入数据管理设备失败,可向第一设备发送第一获取请求,进一步的,I-CSCF可从第一设备中接收第一获取响应,该第一获取响应可用于指示目标S-CSCF的地址信息,从而I-CSCF可获取到目标S-CSCF的地址信息,根据目标S-CSCF的地址信息执行目标终端的注册流程或呼叫目标终端的流程。从而在接入数据管理设备失败情况下,避免出现注册或者呼叫目标终端失败的问题,有助于提高了通信系统的可靠性。
在一种可能的实现方式中,第一设备是目标S-CSCF,目标S-CSCF是I-CSCF对应的S-CSCF集合中的任一个;第一获取响应中包括确定第一设备为目标S-CSCF的指示,或者包括目标S-CSCF的地址信息。上述技术方案中,若第一设备是目标S-CSCF,则第一设备可以通过该确定第一设备为目标S-CSCF的指示,或者包括有目标S-CSCF的地址信息的第一获取响应,向I-CSCF指示第一设备是目标S-CSCF,以使得I-CSCF确定出目标S-CSCF。
在一种可能的实现方式中,方法还包括:I-CSCF向第二设备发送第二获取请求,第二设备为I-CSCF对应的S-CSCF集合中的除目标S-CSCF以外的其它S-CSCF;I-CSCF接收来自第二设备的否定第二设备为目标S-CSCF的指示,或者,I-CSCF未接收到来自第二设备的目标S-CSCF的地址信息。上述技术方案中,I-CSCF可通过轮训方式从I-CSCF对应的S-CSCF集合中确定出目标S-CSCF,在第二设备(即某个S-CSCF)不是目标S-CSCF的情况下,第二设备可以通过向I-CSCF发送否定第二设备为目标S-CSCF的指示,或者不向I-CSCF响应,来向I-CSCF指示第二设备不是目标S-CSCF,以使得I-CSCF从S-CSCF集合中选择新的S-CSCF并确定该新的S-CSCF是否为目标S-CSCF。
在一种可能的实现方式中,I-CSCF向第一设备发送第一获取请求,包括:I-CSCF向S-CSCF集合中包括的多个S-CSCF发送第一获取请求;I-CSCF接收第一设备的第一获取响应,包括:I-CSCF接收多个S-CSCF中的目标S-CSCF的第一获取响应。在一种可能的实现方式中,方法还包括:I-CSCF接收来自多个S-CSCF中、除目标S-CSCF以外的其它S-CSCF的否定其它S-CSCF为目标S-CSCF的响应,或者,I-CSCF未接收到来自多个S-CSCF中、除目标S-CSCF以外的其它S-CSCF的目标S-CSCF的地址信息。上述技术方案中,I-CSCF通过组播方式或者广播方式向S-CSCF集合中的多个S-CSCF发送获取请求,有助于提高I-CSCF确定出目标S-CSCF的效率。
在一种可能的实现方式中,第一设备是备份设备,备份设备中对应存储有目标终端的标识与目标S-CSCF的地址信息。第一获取响应中包括目标S-CSCF的地址信息。上述技术方案中,通信系统中设置备份设备,该备份设备可存储有终端的标识与S-CSCF地址信息的对应关系,在I-CSCF确定接入数据管理设备失败之后,可以从备份设备中查询目标终端对应的目标S-CSCF的地址信息,从而在接入数据管理设备失败情况下,避免出现注册或者呼叫目标终端失败的问题,有助于提高了通信系统的可靠性。
在一种可能的实现方式中,还包括:在数据管理设备接入正常的情况下,I-CSCF向备份设备发送目标终端的标识与目标S-CSCF的地址信息。上述技术方案中,备份设备中的对应关系可以是数据管理设备接入正常的情况下I-CSCF向备份设备存储的。
在一种可能的实现方式中,还包括:I-CSCF在接收到目标终端的注销请求之后,在预设注销时长到达后向备份设备发送删除指令,以指示删除备份设备中对应存储的目标终端的标识和目标S-CSCF的地址信息。上述技术方案中,I-CSCF在接收到目标终端的注销请求之后,并不是立即将备份设备中的对应关系删除,而是等待预设注销时长到达之后再删除,从而在目标终端关机或者处于飞行模式时,虽然目标终端已经发起了注销流程,但是备份设备中仍然保留有该对应关系,从而I-CSCF仍可继续确定出目标S-CSCF的地址信息,有助于I-CSCF成功呼叫目标终端。
在一种可能的实现方式中,I-CSCF确定接入数据管理设备失败,包括:I-CSCF向数据管理设备发送查询请求;I-CSCF在向数据管理设备发送查询请求之后,在预设查询时长内确定未接收到来自数据管理设备的目标S-CSCF的地址信息;或,I-CSCF接收到数据管 理设备的查询失败响应。
第二方面,本申请提供一种确定S-CSCF的方法,该方法可以是由第一设备执行。示例性的,第一设备可以是目标S-CSCF或备份设备。
在一种可能的实现方式中,方法包括:第一设备接收来自I-CSCF的第一获取请求,第一获取请求指示接入数据管理设备失败;第一设备根据第一获取请求,向I-CSCF发送第一获取响应;其中,第一获取响应指示目标S-CSCF的地址信息,目标S-CSCF是目标终端注册的S-CSCF。
在一种可能的实现方式中,第一设备是目标S-CSCF,第一设备根据第一获取请求,向I-CSCF发送第一获取响应,包括:第一设备根据第一获取请求中的目标终端的标识,确定第一设备中存储有目标终端的用户数据,向I-CSCF发送第一获取响应。
在一种可能的实现方式中,还包括:第一设备在接收到目标终端的注销请求之后,在预设注销时长到达后清空第一设备中存储的用户数据。上述技术方案中,第一设备在接收到目标终端的注销请求之后,并不是立即将第一设备中的对应关系删除,而是等待预设注销时长到达之后再删除,从而在目标终端关机或者处于飞行模式时,虽然目标终端已经发起了注销流程,但是第一设备中仍然保留有该对应关系,从而I-CSCF仍可继续基于该第一设备中的用户数据确定出目标S-CSCF的地址信息,有助于I-CSCF成功呼叫目标终端。
在一种可能的实现方式中,第一设备是备份设备,备份设备中对应存储有目标终端的标识与目标S-CSCF的地址信息;第一设备根据第一获取请求,向I-CSCF发送第一获取响应,包括:第一设备根据第一获取请求中的目标终端的标识,向I-CSCF发送携带有目标S-CSCF的地址信息的第一获取响应。
在一种可能的实现方式中,还包括:在数据管理设备接入正常的情况下,第一设备接收来自I-CSCF或目标S-CSCF的目标终端的标识与目标S-CSCF的地址信息;第一设备将目标终端的标识和目标S-CSCF的地址信息对应存储。
在一种可能的实现方式中,还包括:第一设备接收来自I-CSCF,或目标S-CSCF的删除指令;第一设备根据删除指令,删除第一设备中对应存储的目标终端的标识和目标S-CSCF的地址信息。
上述第二方面中任一方面可以达到的技术效果可以参照上述第一方面中有益效果的描述,此处不再重复赘述。
第三方面,本申请提供一种确定S-CSCF的方法,该适用于包括代理设备的系统中,代理设备位于I-CSCF和数据管理设备的通信连接之间。该方法可以由代理设备执行。
在一种可能的实现方式中,方法包括:代理设备确定接入数据管理设备失败;代理设备从本地存储中获取目标S-CSCF的地址信息,目标S-CSCF是目标终端注册的S-CSCF;代理设备向I-CSCF发送目标S-CSCF的地址信息。
上述技术方案中,代理设备若确定接入数据管理设备失败,则可以从本地中获取目标终端对应的目标S-CSCF的地址信息,并将该目标S-CSCF的地址信息发送至I-CSCF。相应的,I-CSCF可获取到目标S-CSCF的地址信息,根据目标S-CSCF的地址信息执行目标终端的注册或呼叫流程。从而在接入数据管理设备失败情况下,避免出现注册或者呼叫目标终端失败的问题,有助于提高了通信系统的可靠性。
在一种可能的实现方式中,代理设备确定接入数据管理设备失败,包括:代理设备将来自I-CSCF的查询请求,转发至数据管理设备;在预设查询时长到达之后,代理设备确定未接收到来自数据管理设备的目标S-CSCF的地址信息;或,代理设备接收到数据管理设备的查询失败响应。上述技术方案中,可由代理设备确定接入数据管理设备失败,进而向I-CSCF发送目标S-CSCF的地址信息。
在一种可能的实现方式中,还包括:在数据管理设备接入正常的情况下,代理设备接收来自数据管理设备的目标终端的标识和目标S-CSCF的地址信息;代理设备将目标终端的标识和目标S-CSCF的地址信息对应存储。上述技术方案中,该代理设备可以在转发数据管理设备与S-CSCF之间信令,或者转发数据管理设备与I-CSCF之间信令时,从转发的信令中获取到目标终端的标识与目标S-CSCF的地址信息的对应关系,而无需I-CSCF或者目标S-CSCF再向代理设备发送该对应关系,有助于降低信令开销。
第四方面,本申请实施例提供一种通信装置,该装置具有实现上述第一方面或第一方面的任一种可能的实现方式中I-CSCF的功能。
该通信装置也可以具有实现上述第二方面或第二方面的任一种可能的实现方式中第一设备的功能,其中,第一设备可以为目标S-CSCF或备份设备。
该通信装置也可以具有实现上述第三方面或第三方面的任一种可能的实现方式中代理设备的功能。
上述通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现,硬件或软件包括一个或多个与上述功能相对应的模块或单元或手段(means)。
在一种可能的实现方式中,该装置的结构中包括处理模块和收发模块,其中,处理模块被配置为支持该装置执行上述第一方面或第一方面的任一种实现方式中I-CSCF相应的功能,或者执行上述第二方面或第二方面的任一种实现方式中第一设备相应的功能,或者执行上述第三方面或第三方面的任一种实现方式中代理设备相应的功能。收发模块用于支持该装置与其他通信设备之间的通信,例如该装置为I-CSCF时,可接收来自第一设备的第一获取响应。该通信装置还可以包括存储模块,存储模块与处理模块耦合,其保存有装置必要的程序指令和数据。作为一种示例,处理模块可以为处理器,通信模块可以为收发器,存储模块可以为存储器,存储器可以和处理器集成在一起,也可以和处理器分离设置。
在另一种可能的实现方式中,该装置的结构中包括处理器,还可以包括存储器。处理器与存储器耦合,可用于执行存储器中存储的计算机程序指令,以使装置执行上述第一方面或第一方面的任一种可能的实现方式中的方法,或者执行上述第二方面或第二方面的任一种可能的实现方式中的方法,或者执行上述第三方面或第三方面的任一种可能的实现方式中的方法。可选地,该装置还包括通信接口,处理器与通信接口耦合。当装置为第一设备或I-CSCF设备时,该通信接口可以是收发器或输入/输出接口;当该装置为第一设备中包含的芯片或I-CSCF设备中包含的芯片时,该通信接口可以是芯片的输入/输出接口。可选地,收发器可以为收发电路,输入/输出接口可以是输入/输出电路。
第五方面,本申请实施例提供一种芯片系统,包括:处理器和存储器,处理器与存储器耦合,存储器用于存储程序或指令,当程序或指令被处理器执行时,使得该芯片系统实现上述第一方面或第一方面的任一种可能的实现方式中的方法,或实现上述第二方面或第 二方面的任一种可能的实现方式中的方法,或者执行上述第三方面或第三方面的任一种可能的实现方式中的方法。
可选地,该芯片系统还包括接口电路,该接口电路用于交互代码指令至处理器。
可选地,该芯片系统中的处理器可以为一个或多个,该处理器可以通过硬件实现也可以通过软件实现。当通过硬件实现时,该处理器可以是逻辑电路、集成电路等。当通过软件实现时,该处理器可以是一个通用处理器,通过读取存储器中存储的软件代码来实现。
可选地,该芯片系统中的存储器也可以为一个或多个。该存储器可以与处理器集成在一起,也可以和处理器分离设置。示例性的,存储器可以是非瞬时性处理器,例如只读存储器ROM,其可以与处理器集成在同一块芯片上,也可以分别设置在不同的芯片上。
第六方面,本申请实施例提供一种计算机可读存储介质,其上存储有计算机程序或指令,当该计算机程序或指令被执行时,使得计算机执行上述第一方面或第一方面的任一种可能的实现方式中的方法,或执行上述第二方面或第二方面的任一种可能的实现方式中的方法,或者执行上述第三方面或第三方面的任一种可能的实现方式中的方法。
第七方面,本申请实施例提供一种计算机程序产品,当计算机读取并执行计算机程序产品时,使得计算机执行上述第一方面或第一方面的任一种可能的实现方式中的方法,或执行上述第二方面或第二方面的任一种可能的实现方式中的方法,或者执行上述第三方面或第三方面的任一种可能的实现方式中的方法。
第八方面,本申请实施例提供一种通信系统,该通信系统包括上述第一方面或第一方面的任一种可能的实现方式中的I-CSCF,以及上述第二方面或第二方面的任一种可能的实现方式中的第一设备,其中第一设备可以是目标S-CSCF或备份设备。
上述第四方面至第八方面中任一方面可以达到的技术效果可以参照上述第一方面中有益效果的描述,或者上述第二方面中有益效果的描述,或者上述第三方面中有益效果的描述,此处不再重复赘述。
图1为第一种通信系统架构示意图;
图2为第二种通信系统的架构示意图;
图3为第三种通信系统的架构示意图;
图4为一种终端注册的流程示意图;
图5为一种第三方注册的流程示意图;
图6为一种终端被叫的流程示意图;
图7为本申请提供的一种接入UDM失败的情况下,I-CSCF确定目标S-CSCF的方法流程示意图;
图8为本申请提供的第一种终端注册中I-CSCF确定目标S-CSCF的方法流程示意图;
图9为本申请提供的第二种终端注册中I-CSCF确定目标S-CSCF的方法流程示意图;
图10为本申请提供的第三种终端注册中I-CSCF确定目标S-CSCF的方法流程示意图;
图11为本申请提供的备份设备存储对应关系的方法的流程示意图;
图12为本申请提供的再一种接入UDM失败的情况下,I-CSCF确定目标S-CSCF的方法流程示意图;
图13为本申请提供的第四种终端注册中I-CSCF确定目标S-CSCF的方法流程示意图;
图14为本申请提供的SCP存储对应关系的方法流程示意图;
图15为本申请提供的一种确定目标S-CSCF的装置的结构示意图;
图16为本申请提供的再一种确定目标S-CSCF的装置的结构示意图。
下面将结合附图,对本申请实施例进行详细描述。
图1为本申请通信方法使用的一种通信系统的架构示意图,该通信系统中包含的网络功能和实体主要有:终端设备(user equipment,UE)、无线接入网(radio access network,RAN)设备、用户面功能(user plane function,UPF)、数据网络(data network,DN)、接入和移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、网络暴露功能(network exposure function,NEF)、策略控制功能(policy control function,PCF)、应用功能(application function,AF)、网络切片选择功能(network slice selection function,NSSF)、认证服务器功能(authentication server function,AUSF)、统一数据管理(unified data management,UDM)、网络存储功能(network repository function,NRF)和统一数据存储功能(unified data repository,UDR)。
进一步的,图1中展示了网络功能和实体之间的交互关系以及对应的接口,例如终端设备和AMF之间可以通过N1接口进行交互,交互消息称为N1Message。部分接口可以采用服务化接口的方式实现。
用户的数据流可以通过终端设备和DN之间建立的协议数据单元(protocol data unit session,PDU)会话进行传输,具体传输可以经过无线接入网设备和UPF。
如下对网络功能和实体解释如下:
终端设备:可以为用户设备、手持终端、笔记本电脑、蜂窝电话、智能电话、平板型电脑、手持设备、增强现实(augmented reality,AR)设备、虚拟现实(virtual reality,VR)设备、机器类型通信终端或是其他可以接入网络的设备。终端设备与无线接入网设备之间采用某种空口技术(如新空口(new radio,NR)或长期演进(long term evolution,LTE)技术)相互通信。终端设备与终端设备之间也可以采用某种空口技术(如NR或LTE技术)相互通信。在车联网通信中,车辆上载的通信终端可以作为一种终端设备,路边单元(road side unit,RSU)也可以作为一种终端设备。无人机上载有通信终端,也可以看做是一种终端设备。本申请中,终端设备也可称为是终端或UE。
无线接入网设备:主要负责空口侧的无线资源管理、服务质量管理、数据压缩和加密等功能。无线接入网设备可以包括各种形式的基站,例如:宏基站,微基站,中继站,接入点等。在采用不同的无线接入技术的系统中,具备基站功能的设备的名称可能会有所不同,例如,在NR系统中,称为gNB。
AMF:属于核心网网元,主要负责:接入控制、移动性管理、附着与去附着以及网关选择等功能。在AMF为终端设备的会话提供服务的情况下,具体可以为会话提供控制面的存储资源,该存储资源可以用来存储会话的标识、与会话关联的SMF的标识等。
SMF:负责用户面网元选择,用户面网元重定向,因特网协议(internet protocol,IP)地址分配,承载的建立、修改和释放以及业务质量(quality of service,QoS)控制等。
UPF:负责终端设备中用户数据的转发和接收。例如,UPF可以从DN接收用户数据,通过无线接入网设备传输给终端设备;UPF还可以通过无线接入网设备从终端设备接收用 户数据,转发到DN。UPF为终端设备提供服务的传输资源和调度功能。
NEF:用于支持第三代伙伴计划(The 3rd Generation Partnership Project,3GPP)网络和第三方应用安全的交互。
AF:用于提供服务,还可以向网络侧提供第三方的一些服务。
PCF:负责策略控制的决策,提供控制平面功能的策略规则,以及基于流量的计费控制功能等。
NSSF:主要负责网络切片选择,根据终端设备的切片选择辅助信息、签约信息等确定终端设备允许接入的网络切片实例。
UDM:主要负责终端设备的签约数据管理,包括终端设备标识的存储和管理,终端设备的接入授权等。
AUSF:支持3GPP和非3GPP的接入认证。
NRF:支持网络功能的注册和发现。
UDR:存储和获取UDM和PCF使用的签约数据。
进一步的,UDM还可与问询呼叫会话控制功能(interrogation-call session control function,I-CSCF),服务呼叫会话控制功能(serving-call session control function,S-CSCF),以及应用服务器(application server,AS)分别通信连接,具体可参见图2示例性示出的再一种通信系统的架构图。
其中,I-CSCF,是IMS网络的统一入口点,负责分配或者查询为用户服务的S-CSCF。在一个IMS网络中可以有多个I-CSCF,一个I-CSCF可对应于一个或多个S-CSCF。
S-CSCF,是IMS网络的中心节点,负责用户的注册、鉴权、会话,路由和业务触发。在一个IMS网络中可以有多个S-CSCF。
AS,用于实现IMS网络中的业务逻辑,是IMS网络中的业务核心。
I-CSCF可进一步与代理呼叫会话控制功能(proxy-call session control function,P-CSCF)通信连接。其中,P-CSCF是IMS网络中,用于负责验证请求,将验证请求转发给指定的目标,并且处理和转发响应的实体。
如图2中,UDM可分别与I-CSCF、S-CSCF、AS进行直接通信,比如I-CSCF可直接向UDM发送LIR消息,相应的,UDM直接向I-CSCF反馈LIA消息。
此外,UDM还可通过代理设备比如服务通信代理(service communication proxy,SCP),分别与I-CSCF、S-CSCF、AS进行通信。其中,该代理设备可作为信令的转接设备,用来接收信令并将该信令路由到其他节点,该信令可以是符合Diameter协议的信令,该信令还可称为是Diameter信令。如图3示出的再一种通信系统的架构图中,SCP可部署于I-CSCF与UDM之间,S-CSCF与UDM之间,以及AS与UDM之间。该SCP可用于转发两个网元之间的信令,比如SCP可将来自I-CSCF的信令转发给UDM,相应的,SCP还可将来自UDM的信令转发给I-CSCF。
需要说明的是,核心网中的各个网元也可以称为功能实体或者设备,既可以是在专用硬件上实现的网络元件,也可以是在专用硬件上运行的软件实例,或者是在适当平台上虚拟化功能的实例。
本申请所示的通信系统的架构中不限于仅包含图中所示的网元,还可以包含其它未在图中表示的设备,具体本申请在此处不再一一列举。本申请实施例并不限定各个网元的分 布形式,图中所示的分布形式只是示例性的,本申请不作限定。
图1至图3所示的通信系统并不构成本申请实施例能够适用的通信系统的限定。图1至图3所示的通信系统架构为5G系统架构,可选的,本申请实施例的方法还可适用于4G、4.5G系统架构中,或者未来的通信系统,例如5.5G、6G或者其他通信系统等中。
应理解,本申请中所有网元的名称仅仅作为示例,在未来通信中还可以称为其它名称,或者在未来通信中本申请涉及的网元还可以通过其它具有相同功能的实体或者设备等来替代,本申请对此均不作限定。
为方便描述,如下结合图1至图3示出的5G通信系统中各网元解释本申请实施例。
其中,UDM可用于存储UE对应用户的用户数据(比如签约数据、身份数据等)。UDM可在UE注册或UE呼叫等流程中为IMS网络中功能提供相关数据。在一个可能方式中,I-CSCF可向UDM请求S-CSCF的地址信息,I-CSCF可根据请求到的地址信息确定出对应的S-CSCF,并基于该S-CSCF执行UE注册或者呼叫流程。
为方便描述,如下先参照图4至图6,分别对本申请涉及的现有方案中,UE注册流程,UE第三方注册流程,以及对UE的呼叫流程解释。其中,可将执行注册流程或者呼叫流程的UE称为是目标UE;目标UE之前注册过的S-CSCF称为是目标S-CSCF。
图4为本申请示例性提供的一种目标UE注册的流程示意图,其中,I-CSCF可向UDM请求目标S-CSCF的地址信息,其中,该注册流程可以是初始注册流程或是重注册流程。
步骤401,目标UE向I-CSCF发送注册(register)消息。
其中,注册消息中可包括请求的目的地址,以及注册用户的用户标识。目标UE可先向P-CSCF发送注册消息,P-CSCF根据注册消息中的目的地址获得I-CSCF地址信息,然后再根据I-CSCF地址信息向I-CSCF转发注册消息。
步骤402,I-CSCF向UDM发送用户授权请求(user authorization request,UAR)消息。其中,UAR消息可包括有注册用户的用户标识,该UAR消息可用于I-CSCF向UDM请求目标S-CSCF的地址信息。
步骤403,UDM根据UAR消息中的注册用户的用户标识,判断用户已开户,于是向I-CSCF发送用户授权响应(user authorization answer,UAA)消息,该UAA消息中可包括目标S-CSCF的地址信息。
步骤404,I-CSCF从UAA消息中获得目标S-CSCF的地址信息,然后根据目标S-CSCF的地址信息,向目标S-CSCF发送注册消息。此处,注册消息中可包括目标S-CSCF的地址信息,以及注册用户的用户标识。
步骤405,目标S-CSCF向UDM发送多媒体授权请求(multimedia authentication request,MAR)消息。该MAR消息中包括注册用户的用户标识,该MAR消息用于目标S-CSCF向UDM请求认证向量(authorization vector,AV),并且通知UDM当前目标S-CSCF为该目标UE服务。
步骤406,UDM向目标S-CSCF发送多媒体授权响应(multimedia authentication answer,MAA)消息,其中MAA消息中可包含鉴权信息,鉴权信息中可包括认证向量五元组,即期望响应(expected response,XRES)、随机数(random,RAND)、鉴权令牌(authentication token,AUTN)、完整性密钥(integrity key,IK)和加密密钥(cipher key,CK)。
步骤407,目标S-CSCF向目标UE发送401消息,其中401消息可用于向目标UE返回鉴权信息。具体的,目标S-CSCF可根据上述鉴权信息中的RAND和AUTN生成随机数 (nonce),并将nonce同IK、CK,以及鉴权算法,随401消息返回给P-CSCF。P-CSCF将401消息中剩余的鉴权元素RAND和AUTN继续向目标UE转发。
步骤408,目标UE向I-CSCF发送注册消息。具体的,目标UE根据401消息中的鉴权信息(比如AUTN)对网络进行鉴权,鉴权通过则表明401消息来源于用户真实的归属网络。随后UE重新构造注册消息,将该注册消息经P-CSCF转发至I-CSCF。
步骤409,I-CSCF向UDM发送UAR消息。
步骤410,UDM向I-CSCF发送UAA消息。
步骤411,I-CSCF从UAA消息中获得目标S-CSCF的地址信息,然后根据目标S-CSCF的地址信息,向目标S-CSCF发送注册消息。
其中,步骤408至步骤411中涉及的各消息所包含的字段及作用均可参见上述步骤401至步骤404中描述。
步骤412,目标S-CSCF向UDM发送服务器分配请求(server assignment request,SAR)消息,该SAR消息中可包括注册用户的用户标识,该SAR消息用于目标S-CSCF向UDM请求下载注册用户的签约数据。
步骤413,UDM根据SAR消息中注册用户的用户标识,向目标S-CSCF发送服务器分配响应(server assignment answer,SAA),其中,SAA中即携带有注册用户的签约数据。
步骤414,目标S-CSCF向目标UE发送200OK消息。其中200OK消息用于指示注册成功。具体的,200OK消息可由目标S-CSCF,经I-CSCF和P-CSCF,发送至目标UE。
在注册流程之后,目标S-CSCF还可向AS发起第三方注册流程,可参见图5所示:
步骤501,目标S-CSCF向AS发送第三方注册请求。其中,第三方注册请求中可包括注册用户的用户标识,以用于AS确定用户是否为第一次注册至AS中,以及用于AS从UDM中获取注册用户的用户数据。
步骤502,AS根据第三方注册请求中注册用户的用户标识,向UDM发送用户数据请求(user data request,UDR)消息,该UDR消息可包括注册用户的用户标识,以用于AS向UDM请求注册用户的用户数据,其中用户数据比如是用户身份数据、业务签约数据等。
步骤503,UDM向AS发送用户数据响应(user data answer,UDA)消息,该UDA消息中携带有用户数据。
步骤504,AS根据用户数据向UDM发送订阅通知请求(subscribe notifications request,SNR)消息,该SNR消息用于AS向UDM请求订阅用户数据。
步骤505,UDM向AS发送订阅通知响应(subscribe notifications answer,SNA),相应的,AS可根据该SNA消息确定已经成功订阅用户数据。
步骤506,AS向目标S-CSCF发送200OK消息。其中200OK消息用于指示第三方注册成功。
图6为本申请示例性提供的一种终端被叫的流程示意图,其中I-CSCF可向UDM请求目标S-CSCF的地址信息。
步骤601,主叫UE向I-CSCF发送邀请(INVITE)消息。
其中,主叫UE即呼叫流程的发起方UE,呼叫流程可用于呼叫目标UE,此处目标UE又可称为是被叫UE。邀请消息中可包括主叫UE的用户标识和被叫UE的用户标识。
具体的,主叫UE可先向P-CSCF发送邀请消息,然后P-CSCF向I-CSCF发送邀请消息,即邀请消息由主叫UE,经过P-CSCF,发送至I-CSCF。
步骤602,I-CSCF向UDM发送位置信息查询请求(location information request,LIR)消息,其中,该LIR消息中包括被叫UE的用户标识,该LIR消息可用于I-CSCF向UDM请求目标UE注册的目标S-CSCF地址。
步骤603,UDM收到LIR消息之后,根据本地数据库中的用户注册信息,查看目标UE的目标S-CSCF的地址信息,然后向I-CSCF发送位置信息查询响应(location information answer,LIA)消息,该LIA消息中包括目标S-CSCF的地址信息。
步骤604,I-CSCF根据LIA消息中包括的目标S-CSCF的地址信息,向目标S-CSCF发送邀请消息。
步骤605,目标S-CSCF向AS发送邀请消息。此处的AS,具体可以是业务集中及连续应用服务器(service centralization and continuity application server,SCC AS)。
步骤606,AS向UDM发送UDR消息,其中UDR消息用于AS向UDM请求目标UE的终呼域选择(terminating-access domain selection,T-ADS)信息。
步骤607,UDM向AS反馈UDA消息,其中UDA消息中包括T-ADS信息。
步骤608,AS根据域选结果来判断本次呼叫是在IMS域上进行呼叫接续(call connection),还是在其他域上进行呼叫接续,随后向目标UE发送邀请消息。具体的,该邀请消息可由AS,经目标S-CSCF和P-CSCF,发送至目标UE。
在实际运营中,可能存在接入UDM失败的情况,比如在上述对目标UE的注册(或呼叫)流程中,I-CSCF接入UDM失败,则无法从UDM中获取到目标S-CSCF的地址信息,即无法确定出目标S-CSCF,进而导致对目标UE注册(或呼叫)失败。
如此,本申请提供一种确定S-CSCF的方法,用于在接入UDM失败的情况下,实现I-CSCF确定出目标S-CSCF,从而完成目标UE的注册(或呼叫)流程。图7为本申请示例性示出的一种接入UDM失败的情况下,I-CSCF确定目标S-CSCF的方法流程图,在该流程图中:
步骤701,I-CSCF确定接入UDM失败。
本申请中,I-CSCF可以在接收到目标UE发起的注册消息,或者主叫UE发起的对目标UE的邀请消息之后,从UDM中查询目标S-CSCF的地址信息。
I-CSCF向UDM发送查询请求,该查询请求可用于查询目标S-CSCF的地址信息,示例性的,该查询请求中可包括目标UE标识,目标UE标识可以理解为目标UE对应的用户标识,在UE注册过程中,目标UE标识具体是目标UE对应的注册用户的用户标识;在UE被叫过程中,目标UE标识具体是目标UE对应的被叫用户的用户标识。举例来说,该查询请求可以是上述图4相关实施例中的UAR消息,目标UE标识具体是UAR消息中注册用户的用户标识;该查询请求还可以是上述图6相关实施例中的LIR消息,目标UE标识具体是LIR消息中被叫UE的用户标识。
一种情况下,I-CSCF接收到来自UDM的查询响应,该查询响应中包括目标S-CSCF的地址信息,则表示I-CSCF接入UDM正常。I-CSCF可基于查询响应中包括的该目标S-CSCF的地址信息,执行注册流程或呼叫流程。
再一种情况下,I-CSCF在向UDM发送查询请求之后的预设查询时长到达后,未接收 到来自UDM的查询响应,或者接收到来自UDM返回的查询失败响应,则确定接入UDM失败(或接入UDM困难)。相应的,I-CSCF可向第一设备发送第一获取请求,具体可参见下述步骤702。
其中,接入UDM失败至少可包括如下多种情况中的一项或多项:
UDM设备故障、UDM接入链路不可达、UDM容量不足、UDM流控、通信链路容量不足、通信链路流控、传输网故障、SCP故障。
步骤702,I-CSCF向第一设备发送第一获取请求。可选的,第一获取请求可用于指示接入UDM失败。第一设备可以是S-CSCF或备份设备。
具体的,若第一设备是S-CSCF,则第一获取请求可用于确认第一设备是否为目标S-CSCF;若第一设备是备份设备,则第一获取请求可用于向第一设备请求目标S-CSCF的地址信息,具体可参见步骤703中描述。
步骤703,第一设备根据第一获取请求,向I-CSCF发送第一获取响应。其中,第一获取响应可用于指示目标S-CSCF的地址信息。
本申请中,第一设备可以是目标S-CSCF或者是备份设备,如下分两种情况说明:
情况一,第一设备是目标S-CSCF。
在本申请中,一个I-CSCF可对应于S-CSCF集合,S-CSCF集合可包括M个S-CSCF,其中M为大于1的整数。I-CSCF可向该M个S-CSCF中任一个发送获取请求,以确定接收该获取请求的S-CSCF是否为目标S-CSCF;相应的,该S-CSCF接收到获取请求之后,可向I-CSCF指示自己是否为目标S-CSCF。
S-CSCF可通过如下两种可能方式来向I-CSCF指示自己是否为目标S-CSCF:
可能方式1,该S-CSCF可向I-CSCF反馈获取响应,具体的,该获取响应可以是确定响应或者是否定响应,其中确定响应可用于指示该S-CSCF是目标S-CSCF,否定响应可用于指示该S-CSCF不是目标S-CSCF。也可以理解,该确定响应是确定该S-CSCF是目标S-CSCF的指示,该否定响应是否定该S-CSCF是目标S-CSCF的指示。在一个例子中,该获取响应可通过预设比特位来指示自己是否为目标S-CSCF,示例性的,该获取响应可通过1个预设比特指示,当该1比特取值为1时,指示该S-CSCF确认是目标S-CSCF;当该1比特取值为0时,指示该S-CSCF否认是目标S-CSCF。
可能方式2,该S-CSCF若确定自己是目标S-CSCF,则可向I-CSCF反馈获取响应,具体的,该获取响应可以是确定响应(可参见上述描述),或者该获取响应中可包括目标S-CSCF的地址信息,以用于指示该S-CSCF是目标S-CSCF。该S-CSCF若确定自己不是目标S-CSCF,则可不向I-CSCF反馈响应。
为方便描述,如下以可能方式1为例,解释说明I-CSCF如何从该S-CSCF集合的M个S-CSCF中,选择出目标S-CSCF(即第一设备),具体可以参见如下三个示例:
示例1,I-CSCF分别向S-CSCF集合中的每个S-CSCF发送获取请求。
I-CSCF从S-CSCF集合中选择出一个S-CSCF,随后I-CSCF向该S-CSCF发送获取请求,以确定该S-CSCF是否为目标S-CSCF。
若该选择出的S-CSCF不是目标S-CSCF,则该选择出的S-CSCF在接收到I-CSCF的获取请求之后,根据获取请求确定自己不是目标S-CSCF,于是向I-CSCF发送否定响应, 以否定自己是目标S-CSCF。示例性的,该选择出的S-CSCF确定自己不是目标S-CSCF之后,将获取响应中预设比特位的取值设置为0(该获取响应即否定响应)。相应的,I-CSCF根据该获取响应中该预设比特位的取值0,确定该选择出的S-CSCF不是目标S-CSCF。进一步的,I-CSCF从S-CSCF集合中选择新的S-CSCF,继续向该新的S-CSCF发送获取请求,以确定该新的S-CSCF是否为目标S-CSCF。以此类推,直至I-CSCF从S-CSCF集合中选择出目标S-CSCF。
若该选择出的S-CSCF是目标S-CSCF,则该选择出的S-CSCF在接收到I-CSCF的获取请求之后,根据获取请求,确定自己是目标S-CSCF,于是向I-CSCF发送确定响应,以确定自己是目标S-CSCF。I-CSCF接收到该确定响应之后,确定该选择出的S-CSCF是目标S-CSCF。示例性的,该选择出的S-CSCF确定自己是目标S-CSCF之后,将获取响应中预设比特位的取值设置为1(该获取响应即确定响应)。相应的,I-CSCF根据该获取响应中该预设比特位的取值1,确定该选择出的S-CSCF是目标S-CSCF。
示例2,I-CSCF通过组播方式向S-CSCF的子集合中的多个S-CSCF发送获取请求。
I-CSCF对应的S-CSCF集合中,可进一步包括多个S-CSCF的子集合,该子集合中可包括m个S-CSCF,其中m为大于1的整数。I-CSCF可从该多个S-CSCF的子集合中选择出一个子集合。然后I-CSCF向该选择出的子集合中的m个S-CSCF分别发送获取请求,以确定该选择出的子集合中是否存在有目标S-CSCF。相应的,该m个S-CSCF中的每个S-CSCF接收到获取请求,然后根据获取请求确定自己是否为目标S-CSCF。
若该选择出的子集合中不包括目标S-CSCF,则该选择出的子集合中的每个S-CSCF向I-CSCF发送各自的否定响应。I-CSCF接收到该选择出的子集合中每个S-CSCF发送的否定响应,确定该子集合中不包括目标S-CSCF,随后再从多个S-CSCF的子集合中选择出另外一个子集合,确定该新的子集合中是否包括目标S-CSCF。以此类推,直至I-CSCF从多个S-CSCF的子集合中选择出包含有目标S-CSCF的子集合。
若该选择出的子集合中包括目标S-CSCF,则该选择出的子集合中的目标S-CSCF在接收到I-CSCF的获取请求之后,可根据获取请求,确定自己是目标S-CSCF,于是向I-CSCF发送确定响应。进一步的,该子集合中除目标S-CSCF以外的其它S-CSCF均向I-CSCF发送各自的否定响应。I-CSCF接收到该子集合中的目标S-CSCF的确定响应,以及该子集合中除目标S-CSCF以外的其它S-CSCF的否定响应,确定该子集合中包括目标S-CSCF。
在该示例中,否定响应和确定响应,可参见上述示例1中描述,不再赘述。
I-CSCF通过组播方式,实现同时(或并行)向子集合中的多个S-CSCF发送获取请求,从而有助于提高I-CSCF确定出目标S-CSCF的效率。
示例3,I-CSCF通过广播方式向S-CSCF集合中的所有S-CSCF发送获取请求。
在该示例中,该S-CSCF集合中的目标S-CSCF在接收到I-CSCF的获取请求之后,根据获取请求,确定自己是目标S-CSCF,于是向I-CSCF发送确定响应。进一步的,该S-CSCF集合中除目标S-CSCF以外的其它S-CSCF均向I-CSCF发送各自的否定响应。I-CSCF接收到该S-CSCF集合中的目标S-CSCF的确定响应,以及该S-CSCF集合中除目标S-CSCF以外的其它S-CSCF的否定响应,从S-CSCF集合中确定出目标S-CSCF。
在该示例中,否定响应和确定响应,可参见上述示例1中描述,不再赘述。
I-CSCF通过广播方式,实现同时(或并行)向S-CSCF集合中的所有S-CSCF发送获取请求,从而有助于提高I-CSCF确定出目标S-CSCF的效率。
需要补充的是,S-CSCF可通过确定本地是否存储有目标UE的用户数据,来确定自己是否为目标S-CSCF。
解释为,I-CSCF从S-CSCF集合中选择目标S-CSCF的目的是找到目标UE注册过的S-CSCF,即在目标UE上次的注册流程中,目标S-CSCF中已经保存了该目标UE的用户数据。若S-CSCF确定本地存储有目标UE的用户数据,则可确定自己是目标S-CSCF。
一个具体实现中,I-CSCF向S-CSCF发送的获取请求中包括目标UE的标识,其中目标UE的标识比如是国际移动用户识别码(international mobile subscriber identification number,IMSI)。相应的,S-CSCF可根据目标UE的标识,查询本地是否存储有该目标UE的标识对应的用户数据,也即确定本地是否存储有目标UE的用户数据。S-CSCF若确定本地存储有目标UE的用户数据,则向I-CSCF发送确定响应,该确定响应具体为确定自己是目标S-CSCF的指示;S-CSCF若确定本地未存储有目标UE的用户数据,则向I-CSCF发送否定响应,该否定响应具体为确定自己不是目标S-CSCF的指示。
此外,还需要补充的是,由于目标S-CSCF中需要存储目标UE在上次注册流程中的用户数据,则目标S-CSCF在接收到来自目标UE的注销请求之后,不会立即清空本地存储的该目标UE的用户数据,而是会在接收到目标UE的注销请求之后,在预设注销时长到达之后,再清空本地存储的该目标UE的用户数据。
上述实现方式中,目标S-CSCF向I-CSCF发送确定响应,其它S-CSCF向I-CSCF发送否定响应,如此,I-CSCF可根据接收到的确定响应或否定响应,确定对应的S-CSCF是否为目标S-CSCF。本申请还可以有另外的实现方式,具体的,目标S-CSCF还可向I-CSCF发送包括目标S-CSCF的地址信息(也即自己的地址信息)的获取响应。相应的,I-CSCF从该获取响应中获取到目标S-CSCF地址,从而确定出目标S-CSCF。
在该实现中,其它S-CSCF确定自己不是目标S-CSCF,可以不回复任何消息。相应的,I-CSCF若确定在发送获取请求之后,在预设获取时长后仍未收到获取响应,则可确定该当前的S-CSCF不是目标S-CSCF,于是I-CSCF选择新的S-CSCF,并向该新的S-CSCF发送获取请求,具体实现方式可参见上述描述。
上述实现方式中,可以将M个S-CSCF中的目标S-CSCF理解为第一设备,I-CSCF向目标S-CSCF发送的获取请求可称为是第一获取请求,目标S-CSCF响应于第一获取请求向I-CSCF发送的获取响应可称为是第一获取响应,其中,第一获取响应可以是确定响应,或者,第一获取响应中包括目标S-CSCF的地址信息。
还可以将M个S-CSCF中的除目标S-CSCF以外的其它S-CSCF理解为第二设备,I-CSCF向其它S-CSCF发送的获取请求可称为是第二获取请求,其它S-CSCF响应于第二获取请求向I-CSCF发送的获取响应可称为是第二获取响应,其中,第二获取响应可以是否定响应,或者该其他S-CSCF不向I-CSCF发送响应。
情况二,第一设备是备份设备。
相应的,第一获取响应中可包括目标S-CSCF的地址信息。
具体的,该备份设备的本地可存储有N1个对应关系,其中N1为大于或等于2的整数。 其中每个对应关系可包括UE的标识和该UE对应的S-CSCF的地址信息。
比如表1中例子,UE11的标识表示为标识11,该标识11对应于地址信息11,即UE11注册在地址信息11对应的S-CSCF中;UE12的标识表示为标识12,该标识12对应于地址信息12,即UE12注册在地址信息12对应的S-CSCF中,等等。
表1
UE的标识 | S-CSCF的地址信息 |
标识11 | 地址信息11 |
标识12 | 地址信息12 |
标识13 | 地址信息13 |
…… | …… |
标识N1 | 地址信息N1 |
I-CSCF向备份设备发送第一获取请求,其中第一获取请求中包括目标UE的标识。相应的,备份设备可根据第一获取请求中的目标UE的标识,从本地存储的N1个对应关系中,确定目标UE对应的目标S-CSCF的地址信息,然后向I-CSCF发送第一获取响应,该第一获取请求中即包括目标S-CSCF的地址信息。比如目标UE是UE12,结合表1中例子,第一获取请求中可包括标识12,相应的,备份设备可根据标识12从N1个对应关系中确定出地址信息12,然后将地址信息12携带于第一获取响应中,发送至I-CSCF。
在一种可能实现方式中,在接入UDM正常的情况下,I-CSCF可将目标UE的用户数据注册至UDM中,具体注册流程可参见图4所示。随后,I-CSCF可将目标UE的标识与目标S-CSCF的地址信息发送至备份设备,备份设备将该二者对应存储。此外,备份设备还可对本地存储的对应关系进行更新。
仍以目标UE为UE12为例,I-CSCF将UE12的用户数据成功注册至UDM中,然后I-CSCF将UE12的标识12与目标S-CSCF的地址信息12发送至备份设备。备份设备若根据标识12确定本地存储中没有标识12和标识12对应的地址信息,则将该标识12与地址信息12进行对应存储。
进一步的,在UE12的下一次注册流程之后,I-CSCF还可将UE12的标识12与目标S-CSCF的地址信息(比如表示为地址信息12’)发送至备份设备。相应的,备份设备根据标识12确定本地存储中有标识12和标识12对应的地址信息,则可更新本地存储中的对应关系,或者也可以理解为,将地址信息12’覆盖原有的地址信息12。
本申请中,为了保障备份设备中对应关系的有效性,可将备份设备本地存储的数据进行老化处理,比如某个对应关系在备份设备中持续存储的时长达到了预设存储时长,且该对应关系并没有被读取过或者更新过,则可将该对应关系删除掉。
又或者,在另一个可能方式中,I-CSCF可基于UE的注销请求,指示备份设备将其本地存储的该UE的对应关系删除。以目标UE为例,I-CSCF可接收来自目标UE的注销请求,并在接收到该注销请求之后,在预设注销时长到达后向备份设备发送删除指令,以指示删除备份设备中对应存储的目标UE的标识和目标S-CSCF的地址信息,示例性的,删除指令中可包括有目标UE的标识。相应的,备份设备根据删除指令将本地存储的目标UE 与目标S-CSCF的地址信息对应删除。
此外,备份设备也可以有自己的备份设备,比如通信系统中可包括备份设备1至备份设备n,n为大于或等于2的整数。
一种可能方式中,可以将N1个对应关系分别存储于备份设备1至备份设备n中,即每个备份设备中均存储有该N1个对应关系。在I-CSCF无法从其中一个备份设备中获取目标S-CSCF的地址信息的情况下,还可从其他备份设备中获取,如此可增加系统的稳定性。
示例性的,I-CSCF可分别向备份设备1至备份设备n发送目标UE的标识与目标S-CSCF的地址信息的对应关系,从而实现每个备份设备存储该对应关系。相应的,I-CSCF还可分别向备份设备1至备份设备n发送删除指令,从而实现每个备份设备删除本地存储的该对应关系。又或者,备份设备1作为主备份设备,I-CSCF可向备份设备1发送该对应关系,备份设备1将该对应关系分别发送至备份设备2至备份设备n,从而实现每个备份设备存储该对应关系。相应的,I-CSCF还可向备份设备1发送删除指令,备份设备1该删除指令分别发送至备份设备2至备份设备n,从而实现每个备份设备删除本地存储的该对应关系。又或者其他方式,本申请不做限定。
此外,为了保障备份设备1至备份设备n中存储的N1个对应关系的一致性,该n个备份设备还可以定周期执行同步操作。
再一种可能方式中,可以将该N1个对应关系拆分为n份,然后将该n份对应关系分别存储于备份设备1至备份设备n中,比如N1等于6000万,n等于2,即总共有6000万个用户的对应关系,可将该6000万用户的对应关系拆分为2份,其中3000万用户的对应关系存储于备份设备1中,而另3000万用户的对应关系存储于备份设备2中。如此可减少每个备份设备的存储量。当然,还可以分别将备份设备1中的对应关系再次备份至备份设备3中,将备份设备2中的对应关系再次备份至备份设备4中。在I-CSCF无法从其中一个备份设备中获取目标S-CSCF的地址信息的情况下,还可从其他备份设备中获取,如此可增加系统的稳定性。
需要说明的是,本申请中还可以是由目标S-CSCF向备份设备发送目标UE的标识与目标S-CSCF的地址信息的对应关系,或者是由目标S-CSCF向备份设备发送删除指令,具体方式与I-CSCF发送类似,不再赘述。
本申请中,备份设备可以是上述通信系统中的I-CSCF、S-CSCF、P-CSCF、SCP、AS中的任一个或多个。
在备份设备是I-CSCF的情况中,该作为备份设备的I-CSCF,与发送获取请求的I-CSCF可以是同一个,或者不是同一个。在二者为同一个的情况中,可以理解,I-CSCF将目标UE的标识与目标S-CSCF的地址信息对应存储于本地;或在确定接入UDM失败时,根据目标UE的标识,从本地存储中获取目标S-CSCF的地址信息;或删除本地存储的该对应关系。
在备份设备是S-CSCF的情况下,该作为备份设备的S-CSCF和目标S-CSCF可以是同一个,或者不是同一个。在二者为同一个的情况中,可以理解,目标S-CSCF将目标UE的标识与目标S-CSCF的地址信息对应存储于本地;或在接收到第一获取请求之后,可根据第一获取请求中的目标UE的标识,从本地中获取目标S-CSCF的地址信息;或删除本地存储的该对应关系。
在I-CSCF接收到第一获取响应之后,可根据第一获取响应获取到目标S-CSCF的地址信息。可选的,I-CSCF可进一步执行下述步骤704。
步骤704,I-CSCF根据目标S-CSCF的地址信息,将目标UE注册至目标S-CSCF中;或者将呼叫接续到目标UE。
在一个可能情况中,I-CSCF可以在接收到目标UE的注册请求(包括初始注册请求,或者重注册请求)之后,向UDM发送查询请求。然后I-CSCF确定接入UDM失败,并从第一设备中获取目标S-CSCF的地址信息。在这种情况中,I-CSCF可根据目标S-CSCF的地址信息,进一步执行目标UE的注册流程,具体可参见图4所示。
此外,I-CSCF还可向目标S-CSCF和/或AS发送接入UDM失败的指示,相应的,目标S-CSCF基于该接入UDM失败的指示,可无需再执行图4中步骤405、步骤406、步骤412和步骤413;AS基于该接入UDM失败的指示,可无需再执行图5中步骤502至步骤505。如此,有助于避免目标S-CSCF和/或AS执行不必要的信令传输。
在又一个可能情况中,I-CSCF可以在接收到对目标UE的呼叫请求之后,向UDM发送查询请求。然后I-CSCF确定接入UDM失败,并从第一设备中获取目标S-CSCF的地址信息。在这种情况中,I-CSCF可根据目标S-CSCF的地址信息,进一步执行对目标UE的呼叫流程,具体可参见图6所示。
此外,I-CSCF还可向AS发送接入UDM失败的指示,相应的,AS基于该接入UDM失败的指示,可无需再执行上述图6中的步骤606和步骤607。如此,有助于避免AS执行不必要的信令传输。
需要指出的是,若第一设备是目标S-CSCF,则I-CSCF不仅可在该步骤704中向目标S-CSCF发送接入UDM失败的指示,以告知目标S-CSCF,接入UDM失败;I-CSCF还可在步骤702中,通过第一获取请求向目标S-CSCF来指示接入UDM失败。
示例性的,第一获取请求中还可包括接入UDM失败的指示,相应的,目标S-CSCF在接收到第一获取请求之后,根据第一获取请求中的接入UDM失败的指示和目标UE的标识,确定自己是目标S-CSCF之后,可继续执行后续的UE注册流程。此处,第一获取请求可以理解为一条注册请求,相应的,目标S-CSCF根据该注册请求继续执行后续的UE注册流程。如此,I-CSCF无需再次触发目标S-CSCF继续执行后续的UE注册流程。此外,目标S-CSCF还可向AS指示接入UDM失败。
为了更好的解释本申请实施例,如图8至图11分别为本申请提供的四种具体场景下的实现方式:
图8为目标UE注册流程中,I-CSCF通过单播方式从S-CSCF集合中查找目标S-CSCF的场景中的流程示意图:
在该场景中,可假设I-CSCF从S-CSCF1开始,依次向S-CSCF1、S-CSCF2发送的注册消息(相当于图7相关实施例中的获取请求),其中,S-CSCF2为目标S-CSCF。
步骤801,目标UE向I-CSCF发送注册消息。
步骤802,I-CSCF根据注册消息,向UDM发送UAR消息。其中该UAR消息相当于步骤701中的查询请求。
步骤803,I-CSCF在发送UAR消息之后的预设查询时长后,未接收到来自UDM的 响应消息,于是确定接入UDM失败。
步骤804,I-CSCF向S-CSCF1发送注册消息,该注册消息中可包括接入UDM失败的指示,以及目标UE的标识。
步骤805,S-CSCF1根据注册消息,查找S-CSCF1本地存储中是否包括有目标UE的用户数据。然后S-CSCF1确定本地存储中不包括目标UE的用户数据。
步骤806,S-CSCF1向I-CSCF发送否定响应,该否定响应具体是否定S-CSCF1为目标S-CSCF的指示。
步骤807,I-CSCF在确定S-CSCF1不是目标S-CSCF之后,选择新的S-CSCF(即S-CSCF2),然后向S-CSCF2发送注册消息,该注册消息中仍可包括接入UDM失败的指示,以及目标UE的标识。
步骤808,S-CSCF2根据注册消息,查找S-CSCF2本地存储中是否包括有目标UE的用户数据。然后S-CSCF2确定本地存储中包括目标UE的用户数据。
步骤809,S-CSCF2向I-CSCF发送确定响应,该确定响应具体是确定S-CSCF2为目标S-CSCF的指示。
步骤810,I-CSCF在确定S-CSCF2是目标S-CSCF之后,向S-CSCF2发送注册消息,注册消息中包括接入UDM失败的指示。
步骤811,S-CSCF2向AS发送注册消息,注册消息中包括接入UDM失败的指示。
需要说明的是,步骤810为可选步骤,S-CSCF2在确定自己是目标S-CSCF之后也可基于I-CSCF的注册消息直接执行步骤811。此外,步骤801至步骤811中未详尽描述的内容,均可参见图4、图5或图7相关实施例中的描述。
图9为注册流程中,I-CSCF通过组播方式从S-CSCF集合中查找目标S-CSCF的场景中的流程示意图:
在该场景中,可假设I-CSCF从子集合1开始,依次向子集合1中的多个S-CSCF、子集合2中的多个S-CSCF发送注册消息(相当于图7相关实施例中的获取请求)。其中,子集合1中包括S-CSCF11和S-CSCF12,子集合2中包括S-CSCF21和S-CSCF22,S-CSCF22为目标S-CSCF。
步骤901,目标UE向I-CSCF发送注册消息。
步骤902,I-CSCF根据注册消息,向UDM发送UAR消息。其中该UAR消息相当于步骤701中的查询请求。
步骤903,I-CSCF在发送UAR消息之后的预设查询时长后,未接收到来自UDM的响应消息,于是确定接入UDM失败。
步骤904,I-CSCF向子集合1中的S-CSCF11和S-CSCF12,分别发送注册消息,该注册消息中可包括接入UDM失败的指示,以及目标UE的标识。
步骤905,子集合1中各S-CSCF确定本地存储不包括目标UE的用户数据。具体如下:
S-CSCF11根据注册消息,查找S-CSCF11本地存储中是否包括有目标UE的用户数据。然后S-CSCF11确定本地存储中不包括目标UE的用户数据。
S-CSCF12根据注册消息,查找S-CSCF12本地存储中是否包括有目标UE的用户数据。然后S-CSCF12确定本地存储中不包括目标UE的用户数据。
步骤906,S-CSCF11向I-CSCF发送否定响应,该否定响应具体是否定S-CSCF11为 目标S-CSCF的指示。S-CSCF12向I-CSCF发送否定响应,该否定响应具体是否定S-CSCF12为目标S-CSCF的指示。
步骤907,I-CSCF在确定子集合1中不存在目标S-CSCF之后,向子集合2中的S-CSCF21和S-CSCF22分别发送注册消息,该注册消息中可包括接入UDM失败的指示,以及目标UE的标识。
步骤908,子集合2中的目标S-CSCF确定本地存储中包括目标UE的用户数据,其他S-CSCF确定本地存储中不包括目标UE的用户数据。具体如下:
S-CSCF21根据注册消息,查找S-CSCF21本地存储中是否包括有目标UE的用户数据。然后S-CSCF21确定本地存储中不包括目标UE的用户数据。
S-CSCF22根据注册消息,查找S-CSCF22本地存储中是否包括有目标UE的用户数据。然后S-CSCF22确定本地存储中包括目标UE的用户数据。
步骤909,S-CSCF21向I-CSCF发送否定响应,该否定响应具体是否定S-CSCF21为目标S-CSCF的指示。S-CSCF22向I-CSCF发送确定响应,该确定响应具体是确定S-CSCF22为目标S-CSCF的指示。
步骤910,I-CSCF确定S-CSCF22是目标S-CSCF,然后向S-CSCF22发送注册消息,该注册消息中可包括接入UDM失败的指示。
步骤911,S-CSCF22向AS发送注册消息,该注册消息中包括接入UDM失败的指示。
需要说明的是,步骤910为可选步骤,S-CSCF22在确定自己是目标S-CSCF之后也可基于I-CSCF的注册消息直接执行步骤911。此外,步骤901至步骤911中未详尽描述的内容,均可参见图4、图5或图7相关实施例中的描述。
图10为注册流程中,I-CSCF从备份设备中查询目标S-CSCF的地址信息的场景中的流程示意图:
步骤1001,目标UE向I-CSCF发送注册消息。
步骤1002,I-CSCF根据注册消息,向UDM发送UAR消息。其中该UAR消息相当于步骤701中的查询请求。
步骤1003,I-CSCF在发送UAR消息之后的预设查询时长后,未接收到来自UDM的响应消息,于是确定接入UDM失败。
步骤1004,I-CSCF向备份设备发送第一获取请求,该第一获取请求中可包括接入UDM失败的指示,以及目标UE的标识。
步骤1005,备份设备根据第一获取请求,查找备份设备的本地存储中目标UE的标识对应的S-CSCF地址信息,并作为目标S-CSCF的地址信息。
步骤1006,S-CSCF1向I-CSCF发送第一获取响应,该第一获取响应中可包括目标S-CSCF的地址信息。
步骤1007,I-CSCF根据目标S-CSCF的地址信息,向目标S-CSCF发送注册消息,该注册消息中可包括接入UDM失败的指示。
步骤1008,目标S-CSCF向AS发送注册消息,该注册消息中可包括接入UDM失败的指示。
需要说明的是,步骤1001至步骤1008中未详尽描述的内容,均可参见图4、图5或图7相关实施例中的描述。
还需要补充的是,上述图8至图10也可应用于呼叫目标UE的流程中,仅需要将其中的“注册消息”替换为“邀请消息”,“UAR消息”替换为“LIR消息”等,以及AS接收来自目标S-CSCF的邀请消息,根据邀请消息中包含的接入UDM失败的指示,将目标UE呼叫接续到IMS域,具体可参见图6至图10中相关实施例的描述,不再赘述。
图11为接入UDM正常情况下,I-CSCF向备份设备中对应存储目标UE的标识和目标S-CSCF的地址信息的场景中的流程示意图:
其中,步骤1101至步骤1114具体可参见图4中的步骤401至步骤414。本流程中,步骤1115至步骤1117为新增步骤:
步骤1115,I-CSCF向备份设备发送备份消息,其中备份消息包括目标UE的标识和目标S-CSCF的地址信息。
步骤1116,备份设备从备份消息中获取目标UE的标识和目标S-CSCF的地址信息,并对应存储该目标UE的标识和目标S-CSCF的地址信息。
步骤1117,备份设备向I-CSCF发送备份响应,以用于指示成功将目标UE的标识和目标S-CSCF的地址信息对应存储。
需要补充的是,在上述步骤1115至步骤1117中,还可以是目标S-CSCF向备份设备发送备份消息,相应的,备份设备向目标S-CSCF发送备份响应。
上述技术方案中,I-CSCF确定接入UDM失败,则可向第一设备发送第一获取请求,进一步的,I-CSCF可从第一设备中接收第一获取响应,该第一获取响应可用于指示目标S-CSCF的地址信息,从而I-CSCF可获取到目标S-CSCF的地址信息,进而根据目标S-CSCF的地址信息执行目标UE的注册流程或者对目标UE的呼叫流程。从而避免出现在接入UDM失败情况下,无法成功注册UE或者呼叫UE,有助于提高了通信系统的可靠性。当然,本申请还可以适用于其他需要确定目标S-CSCF的场景中,本申请不再一一举例。
还需要补充的是,由于目标S-CSCF中存储有目标UE的用户数据,或者备份设备中存储有目标UE的标识和目标S-CSCF的地址信息,则本申请还可适用于如下的场景中:目标UE关机或者处于飞行模式时,目标UE已经发起了注销流程。而通过本申请中的方法,I-CSCF仍然可确定出目标S-CSCF的地址信息,从而成功呼叫目标UE。
本申请还提供另一种确定S-CSCF的方法,用于在UDM接入失败的情况下,实现I-CSCF确定出目标UE注册的目标S-CSCF,从而完成目标UE的注册流程,或者对目标UE的呼叫流程。
预先说明的是,该方法适用于图3示出的通信系统中,I-CSCF与UDM之间的信令交互需经过SCP,比如图4示例性示出的注册流程中,I-CSCF经SCP向UDM发送UAR消息,以及I-CSCF经SCP接收来自UDM的UAA消息等。
再比如图6示例性示出的呼叫流程中,I-CSCF经SCP向UDM发送LIR消息,以及I-CSCF经SCP接收来自UDM的LIA消息等。
该确定S-CSCF的方法,具体可参见图12示例性示出的流程图:
步骤1201,SCP接收来自I-CSCF的查询请求,并将该查询请求转发给UDM。
具体的,I-CSCF可以在接收到来自于目标UE的注册消息,或者主叫UE对目标UE 的邀请消息之后,经SCP向UDM发送查询请求。其中,查询请求可参见步骤701中描述。
步骤1202,SCP确定接入UDM失败。
一种情况下,SCP接收到来自UDM的查询响应,该查询响应中包括目标S-CSCF的地址信息,即接入UDM正常,SCP可将该查询响应转发至I-CSCF。相应的,I-CSCF可基于查询响应中的该目标S-CSCF的地址信息,执行对目标UE的注册(或呼叫)流程。
再一种情况下,SCP在向UDM发送查询请求的预设查询时长之后,未接收到来自UDM的查询响应,或者接收到来自UDM返回的查询失败响应,确定接入UDM失败。相应的,SCP可从本地存储中获取目标S-CSCF的地址信息,将该目标S-CSCF的地址信息携带于查询响应中,发送至I-CSCF,具体可参见下述步骤1203和步骤1204。
步骤1203,SCP根据查询请求中的目标UE的标识,从本地存储中获取目标UE的标识对应的目标S-CSCF的地址信息。
本申请中,SCP的本地可存储有N2个对应关系,其中N2为大于或等于2的整数。其中每个对应关系可包括UE的标识和该UE对应的S-CSCF的地址信息。
比如表2中例子,UE21的标识表示为标识21,该标识21对应于地址信息21,即UE21注册在地址信息21对应的S-CSCF中;UE22的标识表示为标识22,该标识22对应于地址信息22,即UE22注册在地址信息22对应的S-CSCF中,等等。
表2
UE的标识 | S-CSCF的地址信息 |
标识21 | 地址信息21 |
标识22 | 地址信息22 |
标识23 | 地址信息23 |
…… | …… |
标识N2 | 地址信息N2 |
步骤1204,SCP向I-CSCF发送查询响应,查询响应中包括目标S-CSCF的地址信息。
可选的,SCP还可以向I-CSCF发送接入UDM失败的指示,该接入UDM失败的指示可以携带于查询响应中,或者SCP将其作为单独的一条消息发送至I-CSCF。
结合表2中举例,查询请求中包括标识22,SCP在确定接入UDM失败之后,可以根据标识22和本地存储的对应关系,确定目标S-CSCF的地址信息为地址信息22。相应的,SCP向I-CSCF发送的查询响应中包括地址信息22和接入UDM失败的指示。
在一种可能实现方式中,在接入UDM正常的情况下,I-CSCF可将目标UE的用户数据成功注册至UDM中,具体注册流程可参见图4所示。在注册流程中,由于I-CSCF与UDM,或者S-CSCF与UDM之间的信令均需经过SCP转发,所以SCP可解析其转发的信令,然后从该信令中解析出当前注册流程中的目标UE的标识和目标S-CSCF的地址信息的对应关系,然后将该目标UE的标识和目标S-CSCF的地址信息的对应关系进行存储。此外,SCP还可在该目标UE的下一次注册流程中,对本地存储的对应关系进行更新。
仍以目标UE为UE22为例,在UE22的注册过程中,UDM可向目标S-CSCF发送SAA消息,该SAA消息中可包括有UE22的标识22和目标S-CSCF的地址信息22的对应关系。 随后,SCP可解析该SAA消息,以从中获取到该标识22和地址信息22的对应关系。SCP若根据标识22确定本地存储中没有标识22和标识22对应的地址信息,则将标识22与地址信息22进行对应存储。
进一步的,在UE22的下一次注册过程中,SCP可再次解析UDM向目标S-CSCF发送SAA消息,然后从该SAA消息中解析出新的对应关系,比如解析出标识22和标识22对应的地址信息(比如表示为地址信息22’),则SCP可更新本地存储中的标识22与标识22对应的地址信息,或者也可以理解为,将地址信息22’覆盖原有的地址信息22。
也可以理解,该SCP是一种备份设备,该备份设备可以在转发UDM与S-CSCF之间信令,或者转发UDM与I-CSCF之间信令时,从转发的信令中获取到目标UE标识与目标S-CSCF的地址信息的对应关系,而无需I-CSCF或者目标S-CSCF再向代理设备发送该对应关系,有助于降低信令开销。
本申请中,为了保障SCP中对应关系的有效性,可将SCP本地存储的数据进行老化处理,比如某个对应关系在SCP中持续存储的时长达到了预设存储时长,且该对应关系并没有被读取过或者更新过,则可将该对应关系删除掉。
又或者,在另一个可能方式中,I-CSCF可基于UE的注销请求,指示SCP将其本地存储的该UE的对应关系删除。以目标UE为例,I-CSCF可接收来自目标UE的注销请求,并在接收该注销请求之后,在预设注销时长到达之后,向SCP发送删除指令。相应的,SCP根据删除指令将本地存储的对应关系删除。
此外,SCP也可以有自己的备份设备,相应的,该SCP可以将自己本地存储的对应关系同步至其他的备份设备中,从而有助于增加系统的稳定性。或者,该SCP可以将自己本地存储的对应关系划分为多组对应关系,并将每组对应关系分别存储于各自对应的备份设备中,从而有助于减少每个备份设备的存储量。
可选的,I-CSCF可进一步执行下述步骤1205。
步骤1205,I-CSCF根据目标S-CSCF的地址信息,将目标UE注册至目标S-CSCF中;或者将呼叫接续到目标UE。
在一个可能情况中,I-CSCF可以在接收到目标UE的注册请求之后,经SCP向UDM发送查询请求。其中SCP确定接入UDM失败,于是从自己本地存储中获取目标S-CSCF的地址信息,然后向I-CSCF发送包含有该目标S-CSCF的地址信息的查询响应。在这种情况中,I-CSCF可根据目标S-CSCF的地址信息,进一步执行目标UE的注册流程,具体可参见图4所示。
此外,I-CSCF还可向目标S-CSCF和/或AS发送接入UDM失败的指示,相应的,目标S-CSCF基于该接入UDM失败的指示,可无需再执行图4中步骤405、步骤406、步骤412和步骤413;AS基于该接入UDM失败的指示,可无需再执行图5中步骤502至步骤505。如此,有助于避免目标S-CSCF和/或AS执行不必要的信令传输。
在又一个可能情况中,I-CSCF可以在接收到对目标UE的呼叫请求之后,经SCP向UDM发送查询请求。其中SCP确定接入UDM失败,于是从自己本地存储中获取目标S-CSCF的地址信息,然后向I-CSCF发送包含有该目标S-CSCF的地址信息的查询响应。在这种情况中,I-CSCF可根据目标S-CSCF的地址信息,进一步执行对目标UE的呼叫流程,具体可参见图6所示。
此外,I-CSCF还可向AS发送接入UDM失败的指示,相应的,AS基于该接入UDM失败的指示,可无需再执行上述图6中的步骤606和步骤607。如此,有助于避免AS执行不必要的信令传输。
为了更好的解释本申请实施例,如图13和图14分别为本申请提供的两种具体场景下的实现方式:
图13为注册流程中,I-CSCF从SCP中获取目标S-CSCF的地址信息的流程示意图:
步骤1301,目标UE向I-CSCF发送注册消息。
步骤1302,I-CSCF根据注册消息,向SCP发送UAR消息。
步骤1303,SCP向UDM发送UAR消息。
步骤1304,SCP确定接入UDM失败。
步骤1305,SCP根据UAR消息中包括的目标UE的标识,从本地存储中获取目标UE的标识对应的目标S-CSCF的地址信息。
步骤1306,SCP向I-CSCF发送UAA消息。UAA消息中包括目标S-CSCF的地址信息,以及接入UDM失败的指示。
步骤1307,I-CSCF根据目标S-CSCF的地址信息,向目标S-CSCF发送注册消息,该注册消息中可包括接入UDM失败的指示。
步骤1308,目标S-CSCF向AS发送注册消息,该注册消息中可包括接入UDM失败的指示。
需要说明的是,步骤1301至步骤1308中未详尽描述的内容,均可参见图4、图5或图12相关实施例中的描述。
还需要补充的是,上述图13也可应用于呼叫目标UE的流程中,仅需要将其中的“注册消息”替换为“邀请消息”,“UAR消息”替换为“LIR消息”等,以及AS接收来自目标S-CSCF的邀请消息,根据邀请消息中包含的接入UDM失败的指示,将目标UE呼叫接续到IMS域,具体可参见图6、图12或图13中相关实施例的描述,不再赘述。
图14为接入UDM正常情况下,SCP中存储目标UE的标识和目标S-CSCF的地址信息的场景中的流程示意图:
其中,步骤1401至步骤1412具体可参见图4中的步骤401至步骤412,其中区别仅在于图4中目标S-CSCF与UDM直接通信,以及I-CSCF与UDM直接通信,而图14中均是由SCP转发。进一步的,在如下步骤1413至步骤1416中:
步骤1413,UDM向SCP发送SAA消息,其中SAA消息中携带有目标UE的标识和目标S-CSCF的地址信息。
步骤1414,SCP解析SAA消息,获取到该目标UE的标识和目标S-CSCF的地址信息,然后将该目标UE的标识和目标S-CSCF的地址信息对应存储于本地。
步骤1415,SCP向目标S-CSCF发送SAA消息。
步骤1416,目标S-CSCF向UE发送200OK消息。
上述技术方案中,I-CSCF向SCP发送查询请求,SCP可将查询请求转发给UDM,SCP若确定接入UDM失败,则可以从本地中获取目标UE对应的目标S-CSCF的地址信息, 并将该目标S-CSCF的地址信息发送至I-CSCF。相应的,I-CSCF可获取到目标S-CSCF的地址信息,根据目标S-CSCF的地址信息执行目标UE的注册流程或者对目标UE的呼叫流程。从而避免出现在接入UDM失败情况下,无法成功注册UE或者呼叫UE,有助于提高了通信系统的可靠性。当然,本申请还可以适用于其他需要确定目标S-CSCF的场景中,本申请不再一一举例。
还需要补充的是,由于SCP中存储有目标UE的标识和目标S-CSCF的地址信息,则本申请还可适用于如下的场景中:目标UE关机或者处于飞行模式时,目标UE已经发起了注销流程。而通过本申请中的方法,I-CSCF仍可从SCP中获取目标S-CSCF的地址信息,从而成功呼叫目标UE。
上述实施例中,均以5G通信系统中网元或设备为例说明,当然,本申请方法还可适用于4G通信系统中、4.5G通信系统中、或者未来通信系统比如5.5G通信系统中、6G通信系统中。相应的,可将5G通信系统中的网元或设备替换为对应通信系统中的网元或设备。比如4G通信系统中,可将上述实施例中的“UDM”替换为“HSS”,将“SCP”替换为“DRA”等等。进一步的,可将UDM、HSS等用于存储用户数据(比如是签约数据、身份数据等)的设备称为是数据管理设备;以及将SCP、DRA等用于转发数据管理设备与I-CSCF之间信令,或用于转发数据管理设备与目标S-CSCF之间信令的设备,称为是代理设备;以及,将UE称为是终端,目标UE称为是目标终端。
还需要说明的是,虽然备份设备中存储有目标终端的标识和对应的目标S-CSCF的地址信息,但是通常情况下,仅在I-CSCF确定接入数据管理设备失败之后,才会从备份设备中获取目标S-CSCF的地址信息。解释为,备份设备中仅存储有目标终端的标识和对应的目标S-CSCF的地址信息,其存储的该目标终端的相关数据少于数据管理设备中存储的该目标终端对应的用户数据,本申请中的I-CSCF从备份设备中获取目标S-CSCF的地址信息的方案,仅作为接入数据管理设备失败的应急方案,以避免终端注册失败或呼叫失败。
同理的,该说明也适用于代理设备向I-CSCF发送目标S-CSCF的地址信息的方案中,具体的,代理设备只有在确定接入数据管理设备失败之后,才会从本地存储中获取目标S-CSCF的地址信息,然后将该目标S-CSCF的地址信息发送至I-CSCF,以使得I-CSCF获取到目标S-CSCF的地址信息,从而避免终端注册失败或呼叫失败。
基于上述内容和相同构思,图15和图16为本申请的提供的可能的通信装置的结构示意图。这些通信装置可以用于实现上述方法实施例中I-CSCF,或第一设备,或代理设备的功能,因此也能实现上述方法实施例所具备的有益效果。
如图15所示,该通信装置1500中包括处理模块1501和收发模块1502。通信装置1500用于实现上述图7至图11中所示的方法实施例中I-CSCF或第一设备的功能。
当通信装置1500用于实现上述图7至图11所示的方法实施例的I-CSCF的功能时:
在一种可能的实现方式中,处理模块1501,用于确定接入数据管理设备失败,并控制收发模块1502向第一设备发送第一获取请求;处理模块1501,还用于控制收发模块1502接收第一设备的第一获取响应;其中,第一获取响应指示目标S-CSCF的地址信息,目标S-CSCF是目标终端注册的S-CSCF。
在一种可能的实现方式中,第一设备是目标S-CSCF,目标S-CSCF是的S-CSCF集合中的任一个;第一获取响应中包括确定第一设备为目标S-CSCF的指示,或者包括目标 S-CSCF的地址信息。
在一种可能的实现方式中,处理模块1501还用于:控制收发模块1502向第二设备发送第二获取请求,第二设备为S-CSCF集合中的除目标S-CSCF以外的其它S-CSCF;控制收发模块1502接收来自第二设备的否定第二设备为目标S-CSCF的指示,或者,确定未接收到来自第二设备的目标S-CSCF的地址信息。
在一种可能的实现方式中,处理模块1501具体用于:控制收发模块1502向S-CSCF集合中包括的多个S-CSCF发送第一获取请求;处理模块1501具体还用于:控制收发模块1502接收多个S-CSCF中的目标S-CSCF的第一获取响应。
在一种可能的实现方式中,处理模块1501还用于:控制收发模块1502接收来自多个S-CSCF中、除目标S-CSCF以外的其它S-CSCF的否定其它S-CSCF为目标S-CSCF的响应,或者,确定未接收到来自多个S-CSCF中、除目标S-CSCF以外的其它S-CSCF的目标S-CSCF的地址信息。
在一种可能的实现方式中,第一设备是备份设备,备份设备中对应存储有目标终端的标识与目标S-CSCF的地址信息。
在一种可能的实现方式中,处理模块1501还用于:在数据管理设备接入正常的情况下,控制收发模块1502向备份设备发送目标终端的标识与目标S-CSCF的地址信息。
在一种可能的实现方式中,处理模块1501还用于:控制收发模块1502在接收到目标终端的注销请求之后,在预设注销时长到达后向备份设备发送删除指令,以指示删除备份设备中对应存储的目标终端的标识和目标S-CSCF的地址信息。
在一种可能的实现方式中,处理模块1501具体用于:控制收发模块1502向数据管理设备发送查询请求;在向数据管理设备发送查询请求之后,在预设查询时长内确定未接收到来自数据管理设备的目标S-CSCF的地址信息;或,控制收发模块1502接收数据管理设备的查询失败响应。
当通信装置1500用于实现上述图7至图11所示的方法实施例的第一设备的功能时:
在一种可能的实现方式中,处理模块1501,用于控制收发模块1502接收来自I-CSCF的第一获取请求,第一获取请求指示接入数据管理设备失败;处理模块1501,还用于根据第一获取请求,控制收发模块1502向I-CSCF发送第一获取响应;其中,第一获取响应指示目标S-CSCF的地址信息,目标S-CSCF是目标终端注册的S-CSCF。
在一种可能的实现方式中,装置1500是目标S-CSCF,处理模块1501具体用于:根据第一获取请求中的目标终端的标识,确定装置1500中存储有目标终端的用户数据,控制收发模块1502向I-CSCF发送第一获取响应。
在一种可能的实现方式中,处理模块1501还用于:在接收到目标终端的注销请求之后,在预设注销时长到达后清空装置1500中存储的用户数据。
在一种可能的实现方式中,装置1500是备份设备,装置1500中对应存储有目标终端的标识与目标S-CSCF的地址信息;处理模块1501具体用于:根据第一获取请求中的目标终端的标识,控制收发模块1502向I-CSCF发送携带有目标S-CSCF的地址信息的第一获取响应。
在一种可能的实现方式中,处理模块1501还用于:在数据管理设备接入正常的情况下,控制收发模块1502接收来自I-CSCF或目标S-CSCF的目标终端的标识与目标S-CSCF 的地址信息;将目标终端的标识和目标S-CSCF的地址信息对应存储。
在一种可能的实现方式中,处理模块1501还用于:控制收发模块1502接收来自I-CSCF,或目标S-CSCF的删除指令;根据删除指令,删除装置1500中对应存储的目标终端的标识和目标S-CSCF的地址信息。
当通信装置1500用于实现上述图12至图14所示的方法实施例的代理设备的功能时,通信装置1500位于I-CSCF和数据管理设备的通信连接之间:
在一种可能的实现方式中,处理模块1501,用于确定接入数据管理设备失败;并从本地存储中获取目标S-CSCF的地址信息,目标S-CSCF是目标终端注册的S-CSCF;处理模块1501,还用于控制收发模块1502向I-CSCF发送目标S-CSCF的地址信息。
在一种可能的实现方式中,处理模块1501具体用于:控制收发模块1502将来自I-CSCF的查询请求,转发至数据管理设备;在预设查询时长到达之后,确定未接收到来自数据管理设备的目标S-CSCF的地址信息;或,控制收发模块1502接收数据管理设备的查询失败响应。
在一种可能的实现方式中,处理模块1501还用于:在数据管理设备接入正常的情况下,控制收发模块1502接收来自数据管理设备的目标终端的标识和目标S-CSCF的地址信息;将目标终端的标识和目标S-CSCF的地址信息对应存储。
如图16所示为本申请实施例提供的装置1600,图16所示的装置可以为图15所示的装置的一种硬件电路的实现方式。该装置可适用于前面所示出的流程图中,执行上述方法实施例中I-CSCF,或第一设备,或代理设备的功能。
为了便于说明,图16仅示出了该装置的主要部件。
图16所示的装置1600包括通信接口1610、处理器1620和存储器1630,其中存储器1630用于存储程序指令和/或数据。处理器1620可能和存储器1630协同操作。处理器1620可能执行存储器1630中存储的程序指令。存储器1630中存储的指令或程序被执行时,该处理器1620用于执行上述实施例中处理模块1501执行的操作,通信接口1610用于执行上述实施例中收发模块1502执行的操作。
存储器1630和处理器1620耦合。本申请实施例中的耦合是装置、单元或模块之间的间接耦合或通信连接,可以是电性,机械或其它的形式,用于装置、单元或模块之间的信息交互。存储器1630中的至少一个可以包括于处理器1620中。
在本申请实施例中,通信接口可以是收发器、电路、总线、模块或其它类型的通信接口。在本申请实施例中,通信接口为收发器时,收发器可以包括独立的接收器、独立的发射器;也可以集成收发功能的收发器、或者是通信接口。
装置1600还可以包括通信线路1640。其中,通信接口1610、处理器1620以及存储器1630可以通过通信线路1640相互连接;通信线路1640可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。通信线路1640可以分为地址总线、数据总线、控制总线等。为便于表示,图16中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
基于上述内容和相同构思,本申请实施例提供一种计算机可读存储介质,其上存储有 计算机程序或指令,当该计算机程序或指令被执行时,使得计算机执行上述方法实施例中I-CSCF,或第一设备,或代理设备的功能。
基于上述内容和相同构思,本申请实施例提供一种计算机程序产品,当计算机读取并执行计算机程序产品时,使得计算机执行上述方法实施例中I-CSCF,或第一设备,或代理设备的功能。
基于上述内容和相同构思,本申请实施例提供一种通信系统,该通信系统包括上述图7至图11相关方法实施例中的I-CSCF和第一设备,其中第一设备可以是目标S-CSCF或备份设备。
基于上述内容和相同构思,本申请实施例还提供一种通信系统,该通信系统包括上述图12至图14相关方法实施例中的I-CSCF和代理设备。
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的保护范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
Claims (41)
- 一种确定服务呼叫会话控制功能S-CSCF的方法,其特征在于,包括:问询呼叫会话控制功能I-CSCF确定接入数据管理设备失败,并向第一设备发送第一获取请求;所述I-CSCF接收所述第一设备的第一获取响应;其中,所述第一获取响应指示目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF。
- 如权利要求1所述的方法,其特征在于,所述第一设备是目标S-CSCF,所述目标S-CSCF是所述I-CSCF对应的S-CSCF集合中的任一个;所述第一获取响应中包括确定所述第一设备为所述目标S-CSCF的指示,或者包括所述目标S-CSCF的地址信息。
- 如权利要求1或2所述的方法,其特征在于,还包括:所述I-CSCF向第二设备发送第二获取请求,所述第二设备为所述I-CSCF对应的S-CSCF集合中的除所述目标S-CSCF以外的其它S-CSCF;所述I-CSCF接收来自所述第二设备的否定所述第二设备为所述目标S-CSCF的指示,或者,所述I-CSCF未接收到来自所述第二设备的所述目标S-CSCF的地址信息。
- 如权利要求1至3任一项所述的方法,其特征在于,所述I-CSCF向第一设备发送第一获取请求,包括:所述I-CSCF向S-CSCF集合中包括的多个S-CSCF发送所述第一获取请求;所述I-CSCF接收所述第一设备的第一获取响应,包括:所述I-CSCF接收所述多个S-CSCF中的所述目标S-CSCF的所述第一获取响应。
- 如权利要求4所述的方法,其特征在于,还包括:所述I-CSCF接收来自所述多个S-CSCF中、除所述目标S-CSCF以外的其它S-CSCF的否定所述其它S-CSCF为所述目标S-CSCF的响应,或者,所述I-CSCF未接收到来自所述多个S-CSCF中、除所述目标S-CSCF以外的其它S-CSCF的所述目标S-CSCF的地址信息。
- 如权利要求1所述的方法,其特征在于,所述第一设备是备份设备,所述备份设备中对应存储有所述目标终端的标识与所述目标S-CSCF的地址信息。
- 如权利要求6所述的方法,其特征在于,还包括:在所述数据管理设备接入正常的情况下,所述I-CSCF向所述备份设备发送所述目标终端的标识与所述目标S-CSCF的地址信息。
- 如权利要求6或7所述的方法,其特征在于,还包括:所述I-CSCF在接收到所述目标终端的注销请求之后,在预设注销时长到达后向所述备份设备发送删除指令,以指示删除所述备份设备中对应存储的所述目标终端的标识和所述目标S-CSCF的地址信息。
- 如权利要求1至8中任一项所述的方法,其特征在于,所述I-CSCF确定所述接入数据管理设备失败,包括:所述I-CSCF向所述数据管理设备发送查询请求;所述I-CSCF在向所述数据管理设备发送所述查询请求之后,在预设查询时长内确定 未接收到来自所述数据管理设备的所述目标S-CSCF的地址信息;或,所述I-CSCF接收到所述数据管理设备的查询失败响应。
- 一种确定服务呼叫会话控制功能S-CSCF的方法,其特征在于,包括:第一设备接收来自问询呼叫会话控制功能I-CSCF的第一获取请求,所述第一获取请求指示接入数据管理设备失败;所述第一设备根据所述第一获取请求,向所述I-CSCF发送第一获取响应;其中,所述第一获取响应指示目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF。
- 如权利要求10所述的方法,其特征在于,所述第一设备是所述目标S-CSCF;所述第一设备根据所述第一获取请求,向所述I-CSCF发送第一获取响应,包括:所述第一设备根据所述第一获取请求中的所述目标终端的标识,确定所述第一设备中存储有所述目标终端的用户数据,向所述I-CSCF发送所述第一获取响应。
- 如权利要求10或11所述的方法,其特征在于,还包括:所述第一设备在接收到所述目标终端的注销请求之后,在预设注销时长到达后清空所述第一设备中存储的所述目标终端的用户数据。
- 如权利要求10所述的方法,其特征在于,所述第一设备是备份设备,所述备份设备中对应存储有所述目标终端的标识与所述目标S-CSCF的地址信息;所述第一设备根据所述第一获取请求,向所述I-CSCF发送第一获取响应,包括:所述第一设备根据所述第一获取请求中的所述目标终端的标识,向所述I-CSCF发送携带有所述目标S-CSCF的地址信息的所述第一获取响应。
- 如权利要求10或13所述的方法,其特征在于,还包括:在所述数据管理设备接入正常的情况下,所述第一设备接收来自所述I-CSCF或所述目标S-CSCF的所述目标终端的标识与所述目标S-CSCF的地址信息;所述第一设备将所述目标终端的标识和所述目标S-CSCF的地址信息对应存储。
- 如权利要求10、13和14中任一项所述的方法,其特征在于,还包括:所述第一设备接收来自所述I-CSCF,或所述目标S-CSCF的删除指令;所述第一设备根据所述删除指令,删除所述第一设备中对应存储的所述目标终端的标识和所述目标S-CSCF的地址信息。
- 一种确定服务呼叫会话控制功能S-CSCF的方法,其特征在于,适用于包括代理设备的系统中,所述代理设备位于问询呼叫会话控制功能I-CSCF和数据管理设备的通信连接之间;所述方法包括:所述代理设备确定所述接入数据管理设备失败;所述代理设备从本地存储中获取目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF;所述代理设备向所述I-CSCF发送所述目标S-CSCF的地址信息。
- 如权利要求16所述的方法,其特征在于,所述代理设备确定所述接入数据管理设备失败,包括:所述代理设备将来自所述I-CSCF的查询请求,转发至所述数据管理设备;在预设查询时长到达之后,所述代理设备确定未接收到来自所述数据管理设备的所述目标S-CSCF的地址信息;或,所述代理设备接收到所述数据管理设备的查询失败响应。
- 如权利要求16或17所述的方法,其特征在于,还包括:在所述数据管理设备接入正常的情况下,所述代理设备接收来自所述数据管理设备的所述目标终端的标识和所述目标S-CSCF的地址信息;所述代理设备将所述目标终端的标识和所述目标S-CSCF的地址信息对应存储。
- 一种确定服务呼叫会话控制功能S-CSCF的装置,其特征在于,包括:处理模块,用于确定接入数据管理设备失败,并控制收发模块向第一设备发送第一获取请求;所述处理模块,还用于控制所述收发模块接收所述第一设备的第一获取响应;其中,所述第一获取响应指示目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF。
- 如权利要求19所述的装置,其特征在于,所述第一设备是目标S-CSCF,所述目标S-CSCF是所述装置对应的S-CSCF集合中的任一个;所述第一获取响应中包括确定所述第一设备为所述目标S-CSCF的指示,或者包括所述目标S-CSCF的地址信息。
- 如权利要求19或20所述的装置,其特征在于,所述处理模块还用于:控制所述收发模块向第二设备发送第二获取请求,所述第二设备为所述装置对应的S-CSCF集合中的除所述目标S-CSCF以外的其它S-CSCF;控制所述收发模块接收来自所述第二设备的否定所述第二设备为所述目标S-CSCF的指示,或者,确定未接收到来自所述第二设备的所述目标S-CSCF的地址信息。
- 如权利要求19至21任一项所述的装置,其特征在于,所述处理模块具体用于:控制所述收发模块向S-CSCF集合中包括的多个S-CSCF发送所述第一获取请求;所述处理模块具体还用于:控制所述收发模块接收所述多个S-CSCF中的所述目标S-CSCF的所述第一获取响应。
- 如权利要求22所述的装置,其特征在于,所述处理模块还用于:控制所述收发模块接收来自所述多个S-CSCF中、除所述目标S-CSCF以外的其它S-CSCF的否定所述其它S-CSCF为所述目标S-CSCF的指示,或者,确定未接收到来自所述多个S-CSCF中、除所述目标S-CSCF以外的其它S-CSCF的所述目标S-CSCF的地址信息。
- 如权利要求19所述的装置,其特征在于,所述第一设备是备份设备,所述备份设备中对应存储有所述目标终端的标识与所述目标S-CSCF的地址信息。
- 如权利要求24所述的装置,其特征在于,所述处理模块还用于:在所述数据管理设备接入正常的情况下,控制所述收发模块向所述备份设备发送所述目标终端的标识与所述目标S-CSCF的地址信息。
- 如权利要求24或25所述的装置,其特征在于,所述处理模块还用于:控制所述收发模块在接收到所述目标终端的注销请求之后,在预设注销时长到达后向 所述备份设备发送删除指令,以指示删除所述备份设备中对应存储的所述目标终端的标识和所述目标S-CSCF的地址信息。
- 如权利要求19至26中任一项所述的装置,其特征在于,所述处理模块具体用于:控制所述收发模块向所述数据管理设备发送查询请求;在向所述数据管理设备发送所述查询请求之后,确定在预设查询时长内未接收到来自所述数据管理设备的所述目标S-CSCF的地址信息;或,控制所述收发模块接收所述数据管理设备的查询失败响应。
- 一种确定服务呼叫会话控制功能S-CSCF的装置,其特征在于,包括:处理模块,用于控制收发模块接收来自问询呼叫会话控制功能I-CSCF的第一获取请求,所述第一获取请求指示接入数据管理设备失败;处理模块,还用于根据所述第一获取请求,控制所述收发模块向所述I-CSCF发送第一获取响应;其中,所述第一获取响应指示目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF。
- 如权利要求28所述的装置,其特征在于,所述装置是所述目标S-CSCF,所述处理模块具体用于:根据所述第一获取请求中的所述目标终端的标识,确定所述装置中存储有所述目标终端的用户数据,控制所述收发模块向所述I-CSCF发送所述第一获取响应。
- 如权利要求28或29所述的装置,其特征在于,所述处理模块还用于:在接收到所述目标终端的注销请求之后,在预设注销时长到达后清空所述装置中存储的所述用户数据。
- 如权利要求28所述的装置,其特征在于,所述装置是备份设备,所述备份设备中对应存储有所述目标终端的标识与所述目标S-CSCF的地址信息;所述处理模块具体用于:根据所述第一获取请求中的所述目标终端的标识,控制所述收发模块向所述I-CSCF发送携带有所述目标S-CSCF的地址信息的所述第一获取响应。
- 如权利要求28或31所述的装置,其特征在于,所述处理模块还用于:在所述数据管理设备接入正常的情况下,控制所述收发模块接收来自所述I-CSCF或所述目标S-CSCF的所述目标终端的标识与所述目标S-CSCF的地址信息;将所述目标终端的标识和所述目标S-CSCF的地址信息对应存储。
- 如权利要求28、31和32中任一项所述的装置,其特征在于,所述处理模块还用于:控制所述收发模块接收来自所述I-CSCF,或所述目标S-CSCF的删除指令;根据所述删除指令,删除所述装置中对应存储的所述目标终端的标识和所述目标S-CSCF的地址信息。
- 一种确定服务呼叫会话控制功能S-CSCF的装置,其特征在于,适用于包括代理设备的系统中,所述代理设备位于问询呼叫会话控制功能I-CSCF和数据管理设备的通信连接之间;所述装置包括:处理模块,用于确定所述接入数据管理设备失败;并从本地存储中获取目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF;处理模块,还用于控制收发模块向所述I-CSCF发送所述目标S-CSCF的地址信息。
- 如权利要求34所述的装置,其特征在于,所述处理模块具体用于:控制所述收发模块将来自所述I-CSCF的查询请求,转发至所述数据管理设备;在预设查询时长到达之后,所述代理设备确定未接收到来自所述数据管理设备的所述目标S-CSCF的地址信息;或,控制所述收发模块接收所述数据管理设备的查询失败响应。
- 如权利要求34或35所述的装置,其特征在于,所述处理模块还用于:在所述数据管理设备接入正常的情况下,控制所述收发模块接收来自所述数据管理设备的所述目标终端的标识和所述目标S-CSCF的地址信息;将所述目标终端的标识和所述目标S-CSCF的地址信息对应存储。
- 一种通信装置,其特征在于,包括处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述通信装置执行如权利要求1至9中任一项所述的方法,或者,以使得所述通信装置执行如权利要求10至15中任一项所述的方法,或者,以使得所述通信装置执行如权利要求16至18中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机程序或指令,当所述计算机程序或指令被通信装置执行时,实现如权利要求1至9中任一项所述的方法,或者,实现如权利要求10至15中任一项所述的方法,或者,实现如权利要求16至18中任一项所述的方法。
- 一种计算机程序产品,其特征在于,所述计算机程序产品包括计算机程序或指令,当所述计算机程序或指令被通信装置执行时,实现如权利要求1至9中任一项所述的方法,或者,实现如权利要求10至15中任一项所述的方法,或者,实现如权利要求16至18中任一项所述的方法。
- 一种确定服务呼叫会话控制功能S-CSCF的方法,其特征在于,包括:问询呼叫会话控制功能I-CSCF确定接入数据管理设备失败,并向第一设备发送第一获取请求;所述第一设备向所述I-CSCF发送第一获取响应;其中,所述第一获取响应指示目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF。
- 一种确定服务呼叫会话控制功能S-CSCF的方法,其特征在于,包括:所述代理设备确定所述接入数据管理设备失败;所述代理设备从本地存储中获取目标S-CSCF的地址信息,所述目标S-CSCF是目标终端注册的S-CSCF;问询呼叫会话控制功能I-CSCF接收所述目标S-CSCF的地址信息。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP22897357.4A EP4412180A1 (en) | 2021-11-25 | 2022-09-26 | Method and apparatus for determining s-cscf |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111411602.2 | 2021-11-25 | ||
CN202111411602.2A CN116170416A (zh) | 2021-11-25 | 2021-11-25 | 一种确定s-cscf的方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023093271A1 true WO2023093271A1 (zh) | 2023-06-01 |
Family
ID=86416945
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/121388 WO2023093271A1 (zh) | 2021-11-25 | 2022-09-26 | 一种确定s-cscf的方法及装置 |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4412180A1 (zh) |
CN (1) | CN116170416A (zh) |
WO (1) | WO2023093271A1 (zh) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101489174A (zh) * | 2008-01-18 | 2009-07-22 | 华为技术有限公司 | 一种为用户提供业务的方法、系统和装置 |
EP3075127A1 (en) * | 2013-11-29 | 2016-10-05 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for an i-cscf to assign to a user equipment a s-cscf server in an ims system |
CN110086757A (zh) * | 2018-01-26 | 2019-08-02 | 华为技术有限公司 | 通信方法和通信装置 |
CN110971583A (zh) * | 2018-09-30 | 2020-04-07 | 华为技术有限公司 | 一种通信方法、装置及系统 |
CN113329447A (zh) * | 2021-06-07 | 2021-08-31 | 广州爱浦路网络技术有限公司 | 作用于ip多媒体子系统ims切片网络的通信方法及系统 |
-
2021
- 2021-11-25 CN CN202111411602.2A patent/CN116170416A/zh active Pending
-
2022
- 2022-09-26 EP EP22897357.4A patent/EP4412180A1/en active Pending
- 2022-09-26 WO PCT/CN2022/121388 patent/WO2023093271A1/zh unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101489174A (zh) * | 2008-01-18 | 2009-07-22 | 华为技术有限公司 | 一种为用户提供业务的方法、系统和装置 |
EP3075127A1 (en) * | 2013-11-29 | 2016-10-05 | Telefonaktiebolaget LM Ericsson (publ) | Method and apparatus for an i-cscf to assign to a user equipment a s-cscf server in an ims system |
CN110086757A (zh) * | 2018-01-26 | 2019-08-02 | 华为技术有限公司 | 通信方法和通信装置 |
CN110971583A (zh) * | 2018-09-30 | 2020-04-07 | 华为技术有限公司 | 一种通信方法、装置及系统 |
CN113329447A (zh) * | 2021-06-07 | 2021-08-31 | 广州爱浦路网络技术有限公司 | 作用于ip多媒体子系统ims切片网络的通信方法及系统 |
Non-Patent Citations (1)
Title |
---|
T-MOBILE USA INC: "Discussion Way Forward on HSS discovery", 3GPP DRAFT; S2-1905376 DISCUSSION WAY FORWARD FOR HSS DISCOVERY, 3RD GENERATION PARTNERSHIP PROJECT (3GPP), MOBILE COMPETENCE CENTRE ; 650, ROUTE DES LUCIOLES ; F-06921 SOPHIA-ANTIPOLIS CEDEX ; FRANCE, vol. SA WG2, no. Reno, USA; 20190513 - 20190517, 7 May 2019 (2019-05-07), Mobile Competence Centre ; 650, route des Lucioles ; F-06921 Sophia-Antipolis Cedex ; France , XP051720871 * |
Also Published As
Publication number | Publication date |
---|---|
EP4412180A1 (en) | 2024-08-07 |
CN116170416A (zh) | 2023-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA3151141C (en) | Policy control for multiple accesses | |
EP3747223B1 (en) | Network slicing in ims | |
CN109995721B (zh) | 业务请求处理方法、装置及通信系统 | |
US11683723B2 (en) | Methods and system for offloading data traffic | |
WO2019144935A1 (zh) | 通信方法和通信装置 | |
CN114365466B (zh) | 通过不同5gc切片上的多个ims pdu会话支持ims路由 | |
CN109951876B (zh) | 通信方法、相关装置及系统 | |
CN113573326B (zh) | 一种地址获取方法及装置 | |
JP2006517064A (ja) | 一時的に利用不可能なネットワークユーザーへのメッセージのルーティング方法、システム、およびネットワーク装置 | |
JP2006517064A5 (zh) | ||
CN110166405B (zh) | 通信方法、相关装置及系统 | |
JP2017034470A (ja) | 加入者情報登録方法、通信サービス装置及びプログラム | |
WO2019144786A1 (zh) | 无线信息订阅方法、相关装置及系统 | |
EP3985945B1 (en) | Enhanced n17 interface between ims network and 5g-eir | |
CN113709905A (zh) | 一种通信方法、装置及计算机可读存储介质 | |
KR20220026721A (ko) | Amf에서의 컨텍스트 정보처리 장치 및 방법 | |
US9332055B2 (en) | Method and apparatus for routing XCAP requests | |
CN114916042B (zh) | 呼叫处理方法、装置、设备和存储介质 | |
WO2023093271A1 (zh) | 一种确定s-cscf的方法及装置 | |
KR100447412B1 (ko) | Ip 멀티미디어 서비스 가입자의 이동성 관리를 위한가입자 데이터 관리 장치 및 방법 | |
WO2015196809A1 (zh) | 消息处理方法及装置 | |
WO2022088183A1 (zh) | 一种通信方法及装置 | |
KR20240018427A (ko) | 멀티캐스트 브로드캐스트 서비스 세션 확립 방법, 및 그 시스템과 장치 | |
CN116438824A (zh) | 用于无线网络中核心网装置重分配的方法、装置及系统 | |
CN103001935A (zh) | Ils网络的ue在ims网络中的认证方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22897357 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2022897357 Country of ref document: EP Effective date: 20240429 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |