WO2023197983A1 - 呼叫方法、系统和p-cscf网元 - Google Patents

呼叫方法、系统和p-cscf网元 Download PDF

Info

Publication number
WO2023197983A1
WO2023197983A1 PCT/CN2023/087245 CN2023087245W WO2023197983A1 WO 2023197983 A1 WO2023197983 A1 WO 2023197983A1 CN 2023087245 W CN2023087245 W CN 2023087245W WO 2023197983 A1 WO2023197983 A1 WO 2023197983A1
Authority
WO
WIPO (PCT)
Prior art keywords
call
anonymous user
user terminal
network element
temporary identity
Prior art date
Application number
PCT/CN2023/087245
Other languages
English (en)
French (fr)
Inventor
朱晓洁
彭莉
马金兰
刘展
王庆扬
Original Assignee
中国电信股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中国电信股份有限公司 filed Critical 中国电信股份有限公司
Publication of WO2023197983A1 publication Critical patent/WO2023197983A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/16Communication-related supplementary services, e.g. call-transfer or call-hold

Definitions

  • the present disclosure relates to the field of wireless communications, and in particular to a calling method, system and P-CSCF (Proxy-Call Session Control Function) network element.
  • P-CSCF Proxy-Call Session Control Function
  • Emergency calling is a basic service regulated by governments in various countries. This service requires that the network must support emergency calling services for users without cards to implement outdoor rescues, and must provide emergency call centers with a connectable calling identity for callbacks.
  • IMS IP Multimedia Subsystem, IP Multimedia Subsystem
  • VoLTE/VoNR IP Multimedia Subsystem
  • the home IMS network and the visited IMS network are not interconnected, and the visited IMS cannot obtain the legal identity of the roaming user. information.
  • Emergency calls follow the principle of access based on the calling location and can only be provided through the visited network, including international inbound calls initiated by users without a card or unable to obtain MSISDN (Mobile Station Identification Number) from 5GC/EPC (core network). Emergency call.
  • MSISDN Mobile Station Identification Number
  • a calling method which includes: allocating a temporary identity identifier containing a proxy call session control function P-CSCF device identifier to an anonymous user terminal that initiates a first call request; and using the temporary identity identifier as the calling user The identifier is added to the first call request to form a second call request, so that the call service is implemented based on the second call request.
  • allocating the temporary identity includes: obtaining the domain name of the P-CSCF network element that received the first call request; setting a number for the anonymous user terminal; and constructing the temporary identity based on the number and the domain name of the P-CSCF network element .
  • the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal is recorded.
  • the IP address of the anonymous user terminal corresponding to the temporary identity in the callback request is determined based on the mapping relationship; and the callback request is forwarded to the anonymous user terminal based on the IP address of the anonymous user terminal.
  • the format of the temporary identity is a Session Initiation Protocol SIP Uniform Resource Identifier URI format.
  • the validity time of the mapping relationship is set.
  • a proxy call session control function P-CSCF network element including: an anonymous user data management function module configured to allocate P-CSCF to the anonymous user terminal that initiates the first call request.
  • the temporary identity identifier of the device identifier the anonymous user call processing function module is configured to insert the temporary identity identifier as the calling user identifier into the first call request to form a second call request, so as to implement the call based on the second call request. business.
  • the anonymous user data management function module is configured to obtain the domain name of the P-CSCF network element that receives the first call request, set a number for the anonymous user terminal, and construct a temporary based on the number and the domain name of the P-CSCF network element. Identity mark.
  • the anonymous user data management function module is configured to record the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal.
  • the anonymous user call processing function module is also configured to query the anonymous user data management function module, and determine the IP address of the anonymous user terminal corresponding to the temporary identity in the callback request according to the mapping relationship. The IP address forwards the callback request to the anonymous user terminal.
  • a Proxy Call Session Control Function P-CSCF network element including: a memory; and a processor coupled to the memory, the processor being configured to execute as described above based on instructions stored in the memory call method.
  • a calling system including: the above-mentioned P-CSCF network element; and an emergency call session control function E-CSCF configured to receive a second call request sent by the P-CSCF network element. , map the access number of the nearest call answering center based on the second call request and the location information of the anonymous user terminal, and route the second call request to the corresponding call answering center based on the access number.
  • E-CSCF emergency call session control function
  • the call system further includes: a media gateway control function MGCF configured to determine the corresponding P-CSCF network element based on the temporary identity in the callback request of the call response center.
  • MGCF media gateway control function
  • a non-transitory computer-readable storage medium on which computer program instructions are stored.
  • the instructions are executed by a processor, the above-mentioned calling method is implemented.
  • Figure 1 is a schematic flowchart of some embodiments of the calling method of the present disclosure
  • FIG. 2 is a schematic flowchart of other embodiments of the calling method of the present disclosure.
  • FIG. 3 is a schematic flowchart of other embodiments of the calling method of the present disclosure.
  • FIG. 4 is a schematic flowchart of other embodiments of the calling method of the present disclosure.
  • FIG. 5 is a schematic structural diagram of some embodiments of P-CSCF network elements of the present disclosure.
  • Figure 6 is a schematic structural diagram of other embodiments of P-CSCF network elements of the present disclosure.
  • any specific values are to be construed as illustrative only and not as limiting. Accordingly, other examples of the exemplary embodiments may have different values.
  • FIG. 1 is a schematic flowchart of some embodiments of the calling method of the present disclosure.
  • the calling method is executed by the P-CSCF network element.
  • a temporary identity identifier including the P-CSCF device identifier is allocated to the anonymous user terminal that initiates the first call request.
  • the domain name of the P-CSCF network element that receives the first call request is obtained, a number is set for the anonymous user terminal, and a temporary identity is constructed based on the number and the domain name of the P-CSCF network element.
  • the format of the temporary identity is SIP (Session initialization Protocol, Session Initialization Protocol) URI (Uniform Resource Identifier, Uniform Resource Identifier) format.
  • the temporary identity assigned to an anonymous user terminal is ID@P-CSCF domain name, and the ID is the number of the anonymous user within P-CSCF, which can be a number or a string;
  • P-CSCF domain name is P- The device identification of the CSCF network element.
  • step 120 the temporary identity identifier is used as the calling user identifier and is added to the first call request to form a second call request, so as to implement the call service based on the second call request.
  • the P-CSCF network element forwards the second call request to E-CSCF (Emergency Call Session Control Function, emergency call session control function)/LRF (Location Retrieval Function, location retrieval function), E-CSCF/
  • E-CSCF Emergency Call Session Control Function, emergency call session control function
  • LRF Location Retrieval Function, location retrieval function
  • E-CSCF/ The LRF maps the access number of the nearest call response center based on the second call request and the location information of the anonymous user terminal, and routes the second call request to the corresponding call response center based on the access number.
  • the feature of the P-CSCF device identifier being routable across the entire network is used to allocate a temporary identity identifier containing the P-CSCF device identifier to the user terminal, which is used as the calling identifier of the call, thus enabling anonymous users to implement call services. .
  • FIG. 2 is a schematic flowchart of some other embodiments of the calling method of the present disclosure.
  • the calling method is executed by the P-CSCF network element.
  • step 210 based on the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal, the IP address of the anonymous user terminal corresponding to the temporary identity identifier in the callback request is determined.
  • the P-CSCF network element after the P-CSCF network element allocates a temporary identity identifier to the anonymous user terminal, it records the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal, so that when the P-CSCF network element receives a callback request, Anonymous user terminals can be determined based on the mapping relationship. For example, the P-CSCF network element determines the IP address of the anonymous user terminal based on ID1@P-CSCF1 Domain Name.
  • the source IP address in the call request message sent by the anonymous user terminal is recorded to ensure Store the mapping relationship between the IP address and the temporary identity.
  • the P-CSCF network element sets the validity time of the mapping relationship, for example, sets the validity time of the mapping record according to government regulatory requirements. After the effective time is exceeded, the mapping relationship is deleted, thereby reducing storage space and improving storage space utilization efficiency.
  • step 220 the callback request is forwarded to the anonymous user terminal according to the IP address of the anonymous user terminal.
  • the P-CSCF network element determines the IP address of the anonymous user terminal corresponding to the temporary identity identifier in the callback request based on the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal, thereby enabling callback of the anonymous user. call.
  • FIG. 3 is a schematic flowchart of other embodiments of the calling method of the present disclosure. This embodiment is an anonymous user emergency call initiation process.
  • P-CSCF1 receives an emergency call request initiated by the unauthenticated user UE1.
  • the unauthenticated user is, for example, a cardless user.
  • the emergency call request carries the user's IP address.
  • step 320 after P-CSCF1 fails to obtain user identity information from PCRF (Policy and Charging Rules Function)/PCF (Policy Control function), it assigns a temporary identity to the anonymous user. ID1@P-CSCF1 "Domain Name", and is inserted into the call request as the calling user ID.
  • PCRF Policy and Charging Rules Function
  • PCF Policy Control function
  • step 330 P-CSCF1 forwards the emergency call request INVITE to E-CSCF/LRF.
  • the E-CSCF/LRF maps the access number of the nearest emergency call response center PSAP according to the emergency call indication and anonymous user location information.
  • the telephone number of the Tianhe District alarm center is mapped, such as 38639110; based on the number 120 and the Huangpu District base station identification 2, the Huangpu District emergency center telephone number is mapped, such as 66800120.
  • the call request initiated by the anonymous user will carry P-Access-Network-Info information.
  • the message includes the identification of the base station that the user accesses, so that the location information of the anonymous user can be located.
  • step 350 the E-CSCF/LRF forwards the emergency call request INVITE to the PSAP.
  • step 360 the PSAP receives the call request and records the calling user identification for callback.
  • step 370 the call is answered and call setup is completed.
  • step 380 the network transfers media information from both parties.
  • FIG 4 is a schematic flowchart of some other embodiments of the call method of the present disclosure. This embodiment is for emergency calls. The process of calling back anonymous users.
  • step 410 the emergency call center initiates a callback request INVITE, and the destination user identification is ID1@P-CSCF1 Domain Name.
  • MGCF searches for the corresponding P-CSCF1 based on the P-CSCF1 domain name address (P-CSCF1 Domain Name).
  • step 430 the MGCF routes the call request to P-CSCF1.
  • P-CSCF1 receives the call request and cannot find the connection IP address of the destination user from the legally registered user data. It queries the anonymous user data association module and maps the user ID1@P-CSCF1 Domain Name to the user IP address. .
  • step 450 P-CSCF1 forwards the emergency call request INVITE to the user.
  • step 460 the user answers the call.
  • the callback connection is completed.
  • step 480 the network transfers media information between the UE and the emergency call center.
  • the P-CSCF provides anonymous users with network-wide routable identity identifiers. On the one hand, it completes the identity data management of anonymous users. On the other hand, it supports the processing of the calling and called call connection processes of anonymous users, satisfying the needs of governments of various countries. Emergency calls must provide caller identification and support callback and other regulatory requirements. Moreover, the present disclosure has no additional functional requirements for other IMS network elements, and the technical implementation is simple.
  • FIG. 5 is a schematic structural diagram of some embodiments of the P-CSCF network element of the present disclosure.
  • the P-CSCF network element includes an anonymous user data management function module 510 and an anonymous user call processing function module 520.
  • the anonymous user data management function module 510 is configured to allocate a temporary identity identifier including the P-CSCF device identifier to the anonymous user terminal that initiates the first call request.
  • the anonymous user data management function module 510 obtains the domain name of the P-CSCF network element that received the first call request, sets a number for the anonymous user terminal, and constructs a temporary identity based on the number and the domain name of the P-CSCF network element. .
  • the temporary identity is in a SIP URI format.
  • the temporary identity assigned by the anonymous user data management function module 510 to the anonymous user terminal is ID@P-CSCF domain name, and the ID is the number of the anonymous user in P-CSCF, which can be a number or a string; P -CSCF domain name is the device identification of the P-CSCF network element.
  • the anonymous user data management function module 510 records the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal, so that when the P-CSCF network element receives a callback request, it can system to determine the anonymous user terminal. For example, the P-CSCF network element determines the IP address of the anonymous user terminal based on the ID1@P-CSCF1 Domain Name.
  • the anonymous user data management function module 510 sets the validity time of the mapping relationship. For example, set the validity time of mapped records based on government regulatory requirements. After the effective time is exceeded, the mapping relationship is deleted, thereby reducing storage space and improving storage space utilization efficiency.
  • the anonymous user call processing function module 520 is configured to add the temporary identity identifier as the calling user identifier to the first call request to form a second call request, so as to implement the call service based on the second call request.
  • the P-CSCF network element forwards the second call request to the E-CSCF/LRF, and the E-CSCF/LRF maps the access point of the nearest call answering center based on the second call request and the location information of the anonymous user terminal. access number, and route the second call request to the corresponding call answering center according to the access number.
  • the feature of P-CSCF device identification that can be routed throughout the network is used to allocate a temporary identity identification containing the P-CSCF equipment identification to the user terminal, which is used as the calling identification of the call to ensure no-card and unauthenticated roaming.
  • Anonymous users such as users provide identities to implement emergency calls, meeting the regulatory requirements of the Ministry of Industry and Information Technology and governments of various countries on IMS emergency call service capabilities.
  • the anonymous user call processing function module 520 is configured to query the anonymous user data management function module 510, and determine the temporary identity in the callback request based on the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal.
  • the IP address of the anonymous user terminal corresponding to the identity identifier is used to forward the callback request to the anonymous user terminal according to the IP address of the anonymous user terminal.
  • the P-CSCF network element determines the IP address of the anonymous user terminal corresponding to the temporary identity identifier in the callback request based on the mapping relationship between the temporary identity identifier and the IP address of the anonymous user terminal, thereby enabling callback of the anonymous user. call.
  • FIG. 6 is a schematic structural diagram of other embodiments of P-CSCF network elements of the present disclosure.
  • the P-CSCF network element 600 includes a memory 610 and a processor 620.
  • the memory 610 may be a disk, flash memory or any other non-volatile storage medium.
  • the memory is used to store instructions in the embodiments corresponding to Figures 1-4.
  • Processor 620 is coupled to memory 610 and may be implemented as one or more integrated circuits, such as a microprocessor or microcontroller.
  • the processor 620 is used to execute instructions stored in the memory.
  • processor 620 is coupled to memory 610 via BUS bus 630 .
  • the P-CSCF network element 600 can also be connected to the external storage system 650 through the storage interface 640 to call external data, and can also be connected to the network or another computer system (not shown) through the network interface 660. No further details will be given here.
  • data instructions are stored in the memory, and then the above instructions are processed by the processor, and the feature of the P-CSCF device identifier that can be routed across the entire network is used to allocate passwords containing the P-CSCF device identifier to anonymous users connected to the P-CSCF.
  • the temporary identity is used for the calling identity of emergency calls and the called user identity when calling back. It can provide emergency call services that meet the regulatory requirements of various governments and provide users with complete 4G/5G basic services.
  • a call system is protected.
  • the call system includes a P-CSCF network element and an E-CSCF, wherein the E-CSCF is configured to receive a second call request sent by the P-CSCF network element. , map the access number of the nearest call answering center based on the second call request and the location information of the anonymous user terminal, and route the second call request to the corresponding call answering center based on the access number.
  • the calling system further includes an MGCF configured to determine the corresponding P-CSCF network element based on the temporary identity in the callback request from the call answering center.
  • the disclosed call system can ensure that when users without a card initiate emergency rescue outdoors and unauthenticated roaming users initiate emergency calls, the IMS network can provide relevant users with emergency communication services that comply with government regulatory requirements and provide users with complete 4G/5G basic services. , assume relevant social responsibilities.
  • a computer-readable storage medium has computer program instructions stored thereon, and when the instructions are executed by a processor, the steps of the methods in the embodiments corresponding to Figures 1-4 are implemented.
  • embodiments of the present disclosure may be provided as methods, apparatuses, or computer program products. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment that combines software and hardware aspects.
  • the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk memory, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein. .
  • These computer program instructions may also be stored in a computer-readable memory that causes a computer or other programmable data processing apparatus to operate in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction means, the instructions
  • the device implements one process or multiple processes in the flow chart and/or one in the block diagram Functions specified in a box or boxes.
  • These computer program instructions may also be loaded onto a computer or other programmable data processing device, causing a series of operating steps to be performed on the computer or other programmable device to produce computer-implemented processing, thereby executing on the computer or other programmable device.
  • Instructions provide steps for implementing the functions specified in a process or processes of a flowchart diagram and/or a block or blocks of a block diagram.
  • a computer program including: instructions that, when executed by a processor, cause the processor to execute the calling method as described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开提供了一种呼叫方法、系统和P-CSCF网元,涉及无线通信领域。该呼叫方法包括:发起第一呼叫请求的匿名用户终端分配包含P-CSCF设备标识的临时身份标识;以及将临时身份标识作为主叫用户标识,加插到第一呼叫请求,形成第二呼叫请求,以便基于第二呼叫请求,实现呼叫业务。

Description

呼叫方法、系统和P-CSCF网元
相关申请的交叉引用
本申请是以CN申请号为202210383978.5,申请日为2022年4月13日的申请为基础,并主张其优先权,该CN申请的公开内容在此作为整体引入本申请中。
技术领域
本公开涉及无线通信领域,尤其涉及一种呼叫方法、系统和P-CSCF(Proxy-Call Session Control Funtion,代理呼叫会话控制功能)网元。
背景技术
紧急呼叫是各国政府管制的基础业务,该业务要求网络须支持为无卡用户提供紧急呼叫业务以便实施户外救援,并须为紧急呼叫中心提供可接续的主叫身份标识用于回呼。另外,国际标准要求VoLTE/VoNR等IMS(IP Multimedia Subsystem,IP多媒体子系统)语音业务基于Home Routing架构实现国际漫游,归属IMS网络与拜访IMS网络不互联,拜访地IMS无法获得漫游用户的合法身份信息。紧急呼叫遵循根据主叫位置就近接入的原则,只能通过拜访地网络提供,包括无卡用户发起紧急呼叫或无法从5GC/EPC(核心网)获取MSISDN(移动台识别号码)的国际漫入紧急呼叫。
发明内容
根据本公开一方面,提出一种呼叫方法,包括:为发起第一呼叫请求的匿名用户终端分配包含代理呼叫会话控制功能P-CSCF设备标识的临时身份标识;以及将临时身份标识作为主叫用户标识,加插到第一呼叫请求,形成第二呼叫请求,以便基于第二呼叫请求,实现呼叫业务。
在一些实施例中,分配临时身份标识包括:获取接收第一呼叫请求的P-CSCF网元的域名;为匿名用户终端设置编号;以及基于编号和P-CSCF网元的域名,构建临时身份标识。
在一些实施例中,记录临时身份标识与匿名用户终端的IP地址的映射关系。
在一些实施例中,根据映射关系,确定回呼请求中临时身份标识对应的匿名用户终端的IP地址;以及根据匿名用户终端的IP地址,向匿名用户终端转发回呼请求。
在一些实施例中,临时身份标识的格式为会话初始协议SIP统一资源标识符URI格式。
在一些实施例中,设置映射关系的有效时间。
根据本公开的另一方面,还提出一种代理呼叫会话控制功能P-CSCF网元,包括:匿名用户数据管理功能模块,被配置为为发起第一呼叫请求的匿名用户终端分配包含P-CSCF设备标识的临时身份标识;匿名用户呼叫处理功能模块,被配置为将临时身份标识作为主叫用户标识,加插到第一呼叫请求,形成第二呼叫请求,以便基于第二呼叫请求,实现呼叫业务。
在一些实施例中,匿名用户数据管理功能模块被配置为获取接收第一呼叫请求的P-CSCF网元的域名,为匿名用户终端设置编号,基于编号和P-CSCF网元的域名,构建临时身份标识。
在一些实施例中,匿名用户数据管理功能模块被配置为记录临时身份标识与匿名用户终端的IP地址的映射关系。
在一些实施例中,匿名用户呼叫处理功能模块还被配置为查询匿名用户数据管理功能模块,根据映射关系,确定回呼请求中临时身份标识对应的匿名用户终端的IP地址,根据匿名用户终端的IP地址,向匿名用户终端转发回呼请求。
根据本公开的另一方面,还提出一种代理呼叫会话控制功能P-CSCF网元,包括:存储器;以及耦接至存储器的处理器,处理器被配置为基于存储在存储器的指令执行如上述的呼叫方法。
根据本公开的另一方面,还提出一种呼叫系统,包括:上述的P-CSCF网元;以及紧急呼叫会话控制功能E-CSCF,被配置为接收P-CSCF网元发送的第二呼叫请求,根据第二呼叫请求和匿名用户终端的位置信息,映射出就近呼叫应答中心的接入号码,根据接入号码将第二呼叫请求路由到对应的呼叫应答中心。
在一些实施例中,该呼叫系统还包括:媒体网关控制功能MGCF,被配置为根据呼叫应答中心的回呼请求中的临时身份标识,确定对应的P-CSCF网元。
根据本公开的另一方面,还提出一种非瞬时性计算机可读存储介质,其上存储有计算机程序指令,该指令被处理器执行时实现如上述的呼叫方法。
通过以下参照附图对本公开的示例性实施例的详细描述,本公开的其它特征及其优点将会变得清楚。
附图说明
构成说明书的一部分的附图描述了本公开的实施例,并且连同说明书一起用于解释本公开的原理。
参照附图,根据下面的详细描述,可以更加清楚地理解本公开,其中:
图1为本公开的呼叫方法的一些实施例的流程示意图;
图2为本公开的呼叫方法的另一些实施例的流程示意图;
图3为本公开的呼叫方法的另一些实施例的流程示意图;
图4为本公开的呼叫方法的另一些实施例的流程示意图;
图5为本公开的P-CSCF网元的一些实施例的结构示意图;以及
图6为本公开的P-CSCF网元的另一些实施例的结构示意图。
具体实施方式
现在将参照附图来详细描述本公开的各种示例性实施例。应注意到:除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对布置、数字表达式和数值不限制本公开的范围。
同时,应当明白,为了便于描述,附图中所示出的各个部分的尺寸并不是按照实际的比例关系绘制的。
以下对至少一个示例性实施例的描述实际上仅仅是说明性的,决不作为对本公开及其应用或使用的任何限制。
对于相关领域普通技术人员已知的技术、方法和设备可能不作详细讨论,但在适当情况下,所述技术、方法和设备应当被视为授权说明书的一部分。
在这里示出和讨论的所有示例中,任何具体值应被解释为仅仅是示例性的,而不是作为限制。因此,示例性实施例的其它示例可以具有不同的值。
应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步讨论。
为使本公开的目的、技术方案和优点更加清楚明白,以下结合具体实施例,并参照附图,对本公开进一步详细说明。
当前国际标准尚无IMS网络为匿名用户提供身份标识相关技术规范,现有IMS网络及标准不支持为无卡用户及未认证用户提供身份标识,无法为这类用户提供满足各国政府管制要求的紧急呼叫业务。
图1为本公开的呼叫方法的一些实施例的流程示意图,该呼叫方法由P-CSCF网元执行。
在步骤110,为发起第一呼叫请求的匿名用户终端分配包含P-CSCF设备标识的临时身份标识。
在一些实施例中,获取接收第一呼叫请求的P-CSCF网元的域名,为匿名用户终端设置编号,基于编号和P-CSCF网元的域名,构建临时身份标识。
在一些实施例中,该临时身份标识的格式为SIP(Session initialization Protocol,会话初始协议)URI(Uniform Resource Identifier,统一资源标识符)格式。
例如,为匿名用户终端分配的临时身份标识为ID@P-CSCF domain name,ID为P-CSCF内对匿名用户的编号,可以为号码,也可以为字符串;P-CSCF domain name为P-CSCF网元的设备标识。
在步骤120,将临时身份标识作为主叫用户标识,加插到第一呼叫请求,形成第二呼叫请求,以便基于第二呼叫请求,实现呼叫业务。
在一些实施例中,P-CSCF网元将第二呼叫请求转发到E-CSCF(Emergency Call Session Control Funtion,紧急呼叫会话控制功能)/LRF(Location Retrieval Function,位置检索功能),E-CSCF/LRF根据第二呼叫请求和匿名用户终端的位置信息,映射出就近呼叫应答中心的接入号码,根据接入号码将第二呼叫请求路由到对应的呼叫应答中心。
在上述实施例中,利用P-CSCF设备标识可全网路由的特点,为用户终端分配包含P-CSCF设备标识的临时身份标识,用于呼叫的主叫标识,从而能够支持匿名用户实现呼叫业务。
图2为本公开的呼叫方法的另一些实施例的流程示意图,该呼叫方法由P-CSCF网元执行。
在步骤210,根据临时身份标识与匿名用户终端的IP地址的映射关系,确定回呼请求中临时身份标识对应的匿名用户终端的IP地址。
在一些实施例中,P-CSCF网元在为匿名用户终端分配临时身份标识后,记录临时身份标识与匿名用户终端的IP地址的映射关系,以便P-CSCF网元接收到回呼请求时,能够根据映射关系,确定匿名用户终端。例如,P-CSCF网元根据ID1@P-CSCF1 Domain Name,确定匿名用户终端的IP地址。
在一些实施例中,记录匿名用户终端发送过来的呼叫请求消息中的源IP地址,保 存该IP地址与临时身份标识的映射关系。
在一些实施例中,P-CSCF网元设置映射关系的有效时间,例如,根据政府管制要求设置映射记录的有效时间。在超出有效时间后,删除该映射关系,从而减少存储空间,提高存储空间的利用效率。
在步骤220,根据匿名用户终端的IP地址,向匿名用户终端转发回呼请求。
在上述实施例中,P-CSCF网元根据临时身份标识与匿名用户终端的IP地址的映射关系,确定回呼请求中临时身份标识对应的匿名用户终端的IP地址,从而能够实现匿名用户的回呼。
图3为本公开的呼叫方法的另一些实施例的流程示意图。该实施例为匿名用户紧急呼叫发起流程。
在步骤310,P-CSCF1收到未经身份认证用户UE1发起的紧急呼叫请求。
在一些实施例中,该未经身份认证用户例如为无卡用户。该紧急呼叫请求中携带该用户的IP地址。
在步骤320,P-CSCF1向PCRF(Policy and Charging Rules Function,策略与计费规则功能单元)/PCF(Policy Control function,策略控制功能)获取用户身份信息失败后,为匿名用户分配临时身份标识“ID1@P-CSCF1 Domain Name”,并作为主叫用户标识加插到呼叫请求中。
在步骤330,P-CSCF1转发紧急呼叫请求INVITE到E-CSCF/LRF。
在步骤340,E-CSCF/LRF根据紧急呼叫指示和匿名用户位置信息映射出就近紧急呼叫应答中心PSAP的接入号码。
例如,根据号码110和天河区基站标识1,映射出天河区报警中心电话号码,如38639110;根据号码120和黄浦区基站标识2,映射出黄浦区急救中心电话号码,如66800120。
在一些实施例中,匿名用户发起的呼叫请求中会携带P-Access-Network-Info信息,该消息中包括用户接入的基站标识,从而能够定位该匿名用户的位置信息。
在步骤350,E-CSCF/LRF向PSAP转发紧急呼叫请求INVITE。
在步骤360,PSAP接收呼叫请求,记录主叫用户标识用于回拨。
在步骤370,应答呼叫,完成呼叫建立。
在步骤380,网络传递双方媒体信息。
图4为本公开的呼叫方法的另一些实施例的流程示意图,该实施例为紧急呼叫中 心回呼匿名用户的流程。
在步骤410,紧急呼叫中心发起回呼请求INVITE,目的用户标识为ID1@P-CSCF1 Domain Name。
在步骤420,MGCF根据P-CSCF1域名地址(P-CSCF1 Domain Name),查找对应的P-CSCF1。
在步骤430,MGCF把呼叫请求路由到P-CSCF1。
在步骤440,P-CSCF1接收到呼叫请求,无法从合法注册用户数据中找到该目的用户的连接IP地址,查询匿名用户数据关联模块,根据用户标识ID1@P-CSCF1 Domain Name映射到用户IP地址。
在步骤450,P-CSCF1向用户转发紧急呼叫请求INVITE。
在步骤460,用户应答呼叫。
在步骤470,完成回呼连接。
在步骤480,网络传递UE与紧急呼叫中心间的媒体信息。
在上述实施例中,由P-CSCF为匿名用户提供全网可路由的身份标识,一方面完成匿名用户的身份数据管理,另一方面支持匿名用户的主被叫呼叫接续流程处理,满足各国政府针对紧急呼叫须提供主叫标识和支持回呼等管制要求。并且,本公开对其他IMS网元无额外功能要求,技术实现简单。
图5为本公开的P-CSCF网元的一些实施例的结构示意图,该P-CSCF网元包括匿名用户数据管理功能模块510和匿名用户呼叫处理功能模块520。
匿名用户数据管理功能模块510被配置为为发起第一呼叫请求的匿名用户终端分配包含P-CSCF设备标识的临时身份标识。
在一些实施例中,匿名用户数据管理功能模块510获取接收第一呼叫请求的P-CSCF网元的域名,为匿名用户终端设置编号,基于编号和P-CSCF网元的域名,构建临时身份标识。
在一些实施例中,该临时身份标识的格式为SIP URI格式。
例如,匿名用户数据管理功能模块510为匿名用户终端分配的临时身份标识为ID@P-CSCF domain name,ID为P-CSCF内对匿名用户的编号,可以为号码,也可以为字符串;P-CSCF domain name为P-CSCF网元的设备标识。
在一些实施例中,匿名用户数据管理功能模块510记录临时身份标识与匿名用户终端的IP地址的映射关系,以便P-CSCF网元接收到回呼请求时,能够根据映射关 系,确定匿名用户终端。例如,P-CSCF网元根据ID1@P-CSCF1 Domain Name,确定匿名用户终端的IP地址。
在一些实施例中,匿名用户数据管理功能模块510设置映射关系的有效时间。例如,根据政府管制要求设置映射记录的有效时间。在超出有效时间后,删除该映射关系,从而减少存储空间,提高存储空间的利用效率。
匿名用户呼叫处理功能模块520被配置为将临时身份标识作为主叫用户标识,加插到第一呼叫请求,形成第二呼叫请求,以便基于第二呼叫请求,实现呼叫业务。
在一些实施例中,P-CSCF网元将第二呼叫请求转发到E-CSCF/LRF,E-CSCF/LRF根据第二呼叫请求和匿名用户终端的位置信息,映射出就近呼叫应答中心的接入号码,根据接入号码将第二呼叫请求路由到对应的呼叫应答中心。
在上述实施例中,利用P-CSCF设备标识可全网路由的特点,为用户终端分配包含P-CSCF设备标识的临时身份标识,用于呼叫的主叫标识,确保为无卡及未认证漫游用户等匿名用户提供身份标识实现紧急呼叫,满足工信部及各国政府对IMS紧急呼叫业务能力的管制要求。
在本公开的另一些实施例中,匿名用户呼叫处理功能模块520被配置为查询匿名用户数据管理功能模块510,根据临时身份标识与匿名用户终端的IP地址的映射关系,确定回呼请求中临时身份标识对应的匿名用户终端的IP地址,根据匿名用户终端的IP地址,向匿名用户终端转发回呼请求。
在上述实施例中,P-CSCF网元根据临时身份标识与匿名用户终端的IP地址的映射关系,确定回呼请求中临时身份标识对应的匿名用户终端的IP地址,从而能够实现匿名用户的回呼。
图6为本公开的P-CSCF网元的另一些实施例的结构示意图。该P-CSCF网元600包括存储器610和处理器620。其中:存储器610可以是磁盘、闪存或其它任何非易失性存储介质。存储器用于存储图1-4所对应实施例中的指令。处理器620耦接至存储器610,可以作为一个或多个集成电路来实施,例如微处理器或微控制器。该处理器620用于执行存储器中存储的指令。
在一些实施例中,处理器620通过BUS总线630耦合至存储器610。该P-CSCF网元600还可以通过存储接口640连接至外部存储系统650以便调用外部数据,还可以通过网络接口660连接至网络或者另外一台计算机系统(未标出)。此处不再进行详细介绍。
在该实施例中,通过存储器存储数据指令,再通过处理器处理上述指令,利用P-CSCF设备标识可全网路由的特点,为接续到P-CSCF的匿名用户分配含P-CSCF设备标识的临时身份标识用于紧急呼叫的主叫标识和回呼时的被叫用户标识,能够提供满足各国政府管制要求的紧急呼叫业务,为用户提供完整的4G/5G基础业务。
在本公开的另一些实施例中,保护一种呼叫系统,该呼叫系统包括P-CSCF网元和E-CSCF,其中,E-CSCF被配置为接收P-CSCF网元发送的第二呼叫请求,根据第二呼叫请求和匿名用户终端的位置信息,映射出就近呼叫应答中心的接入号码,根据接入号码将第二呼叫请求路由到对应的呼叫应答中心。
在一些实施例中,该呼叫系统还包括MGCF,被配置为根据呼叫应答中心的回呼请求中的临时身份标识,确定对应的P-CSCF网元。
本公开的呼叫系统能够确保无卡用户户外发起紧急救援、未认证漫游用户发起紧急呼叫时,IMS网络能为相关用户提供符合政府管制要求的紧急通信业务,为用户提供完整的4G/5G基础业务,承担相关社会责任。
在另一些实施例中,一种计算机可读存储介质,其上存储有计算机程序指令,该指令被处理器执行时实现图1-4所对应实施例中的方法的步骤。本领域内的技术人员应明白,本公开的实施例可提供为方法、装置、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用非瞬时性存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本公开实施例的方法、设备(系统)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一 个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在本公开的一些实施例中,还提供了一种计算机程序,包括:指令,所述指令当由处理器执行时使所述处理器执行如前所述的呼叫方法。
至此,已经详细描述了本公开。为了避免遮蔽本公开的构思,没有描述本领域所公知的一些细节。本领域技术人员根据上面的描述,完全可以明白如何实施这里公开的技术方案。
虽然已经通过示例对本公开的一些特定实施例进行了详细说明,但是本领域的技术人员应该理解,以上示例仅是为了进行说明,而不是为了限制本公开的范围。本领域的技术人员应该理解,可在不脱离本公开的范围和精神的情况下,对以上实施例进行修改。本公开的范围由所附权利要求来限定。

Claims (15)

  1. 一种呼叫方法,包括:
    为发起第一呼叫请求的匿名用户终端分配包含代理呼叫会话控制功能P-CSCF设备标识的临时身份标识;以及
    将所述临时身份标识作为主叫用户标识,加插到所述第一呼叫请求,形成第二呼叫请求,以便基于所述第二呼叫请求,实现呼叫业务。
  2. 根据权利要求1所述的呼叫方法,其中,分配临时身份标识包括:
    获取接收第一呼叫请求的P-CSCF网元的域名;
    为所述匿名用户终端设置编号;以及
    基于所述编号和所述P-CSCF网元的域名,构建所述临时身份标识。
  3. 根据权利要求1或2所述的呼叫方法,还包括:
    记录所述临时身份标识与所述匿名用户终端的IP地址的映射关系。
  4. 根据权利要求3所述的呼叫方法,还包括:
    根据所述映射关系,确定回呼请求中所述临时身份标识对应的匿名用户终端的IP地址;以及
    根据所述匿名用户终端的IP地址,向所述匿名用户终端转发所述回呼请求。
  5. 根据权利要求2所述的呼叫方法,其中,
    所述临时身份标识的格式为会话初始协议SIP统一资源标识符URI格式。
  6. 根据权利要求3所述的呼叫方法,还包括:
    设置所述映射关系的有效时间。
  7. 一种代理呼叫会话控制功能P-CSCF网元,包括:
    匿名用户数据管理功能模块,被配置为为发起第一呼叫请求的匿名用户终端分配包含P-CSCF设备标识的临时身份标识;
    匿名用户呼叫处理功能模块,被配置为将所述临时身份标识作为主叫用户标识,加插到所述第一呼叫请求,形成第二呼叫请求,以便基于所述第二呼叫请求,实现呼叫业务。
  8. 根据权利要求7所述的P-CSCF网元,其中,
    所述匿名用户数据管理功能模块被配置为获取接收第一呼叫请求的P-CSCF网元的域名,为所述匿名用户终端设置编号,基于所述编号和所述P-CSCF网元的域名,构建所述临时身份标识。
  9. 根据权利要求7或8所述的P-CSCF网元,其中,
    所述匿名用户数据管理功能模块被配置为记录所述临时身份标识与所述匿名用户终端的IP地址的映射关系。
  10. 根据权利要求9所述的P-CSCF网元,其中,
    所述匿名用户呼叫处理功能模块还被配置为查询所述匿名用户数据管理功能模块,根据所述映射关系,确定回呼请求中所述临时身份标识对应的匿名用户终端的IP地址,根据所述匿名用户终端的IP地址,向所述匿名用户终端转发所述回呼请求。
  11. 一种代理呼叫会话控制功能P-CSCF网元,包括:
    存储器;以及
    耦接至所述存储器的处理器,所述处理器被配置为基于存储在所述存储器的指令执行如权利要求1至6任一项所述的呼叫方法。
  12. 一种呼叫系统,包括:
    权利要求7至11任一所述的P-CSCF网元;以及
    紧急呼叫会话控制功能E-CSCF,被配置为接收所述P-CSCF网元发送的第二呼叫请求,根据所述第二呼叫请求和所述匿名用户终端的位置信息,映射出就近呼叫应答中心的接入号码,根据所述接入号码将所述第二呼叫请求路由到对应的呼叫应答中心。
  13. 根据权利要求12所述的呼叫系统,还包括:
    媒体网关控制功能MGCF,被配置为根据所述呼叫应答中心的回呼请求中的临时身份标识,确定对应的P-CSCF网元。
  14. 一种非瞬时性计算机可读存储介质,其上存储有计算机程序指令,该指令被处理器执行时实现如权利要求1至6任一项所述的呼叫方法。
  15. 一种计算机程序,包括:
    指令,所述指令当由处理器执行时使所述处理器执行根据权利要求1至6任一项所述的呼叫方法。
PCT/CN2023/087245 2022-04-13 2023-04-10 呼叫方法、系统和p-cscf网元 WO2023197983A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210383978.5A CN116963001A (zh) 2022-04-13 2022-04-13 呼叫方法、系统和p-cscf网元
CN202210383978.5 2022-04-13

Publications (1)

Publication Number Publication Date
WO2023197983A1 true WO2023197983A1 (zh) 2023-10-19

Family

ID=88328993

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/087245 WO2023197983A1 (zh) 2022-04-13 2023-04-10 呼叫方法、系统和p-cscf网元

Country Status (2)

Country Link
CN (1) CN116963001A (zh)
WO (1) WO2023197983A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007016695A2 (en) * 2005-08-02 2007-02-08 Qualcomm Incorporated Voip emergency call handling
CN101800960A (zh) * 2009-02-10 2010-08-11 中兴通讯股份有限公司 一种紧急业务会话的切换方法及紧急业务系统
WO2017218177A1 (en) * 2016-06-16 2017-12-21 T-Mobile Usa, Inc. Roaming lte emergency call with call back number retrieval
US20180063688A1 (en) * 2015-04-01 2018-03-01 Telefonaktiebolaget Lm Ericsson (Publ) Ims emergency calls for roaming ues
US20180176376A1 (en) * 2015-04-13 2018-06-21 Ntt Docomo, Inc. Sip control apparatus, mobile communication system and emergency call control method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007016695A2 (en) * 2005-08-02 2007-02-08 Qualcomm Incorporated Voip emergency call handling
CN101800960A (zh) * 2009-02-10 2010-08-11 中兴通讯股份有限公司 一种紧急业务会话的切换方法及紧急业务系统
US20180063688A1 (en) * 2015-04-01 2018-03-01 Telefonaktiebolaget Lm Ericsson (Publ) Ims emergency calls for roaming ues
US20180176376A1 (en) * 2015-04-13 2018-06-21 Ntt Docomo, Inc. Sip control apparatus, mobile communication system and emergency call control method
WO2017218177A1 (en) * 2016-06-16 2017-12-21 T-Mobile Usa, Inc. Roaming lte emergency call with call back number retrieval

Also Published As

Publication number Publication date
CN116963001A (zh) 2023-10-27

Similar Documents

Publication Publication Date Title
US8811988B2 (en) Dynamically creating a globally unique identified of a subscriber device based on an identified of an aggregation device and identification information of the subscriber device for circuit-switched and packet-switched communication systems
US11606324B2 (en) Per-session invocation of priority services based upon network available information
EP3068106A1 (en) Government enterprise network communication device and communication method, and computer storage medium
WO2007003123A1 (en) A geographic location information inquiry method and system in packet domain
US8605736B2 (en) Method, system and apparatus for heterogeneous addressing mapping
CN113645254B (zh) 一种信令寻址的方法和装置
CN105992147A (zh) 一种紧急呼叫方法和装置
CN102916966A (zh) 基于云计算和c2d的his通讯拨号模块
WO2023197983A1 (zh) 呼叫方法、系统和p-cscf网元
US20240089716A1 (en) Method and system for automated provisioning of data from multiple sensors
US20170111402A1 (en) Call method, call apparatus, voip server, and call system
JP2006244099A (ja) Sipサーバ高速化アーキテクチャ
CN107852577B (zh) 一种补充业务实现方法、终端设备和ims服务器
CN107534847B (zh) 一种发现方法及设备
CN109818909A (zh) 一种呼叫处理方法及装置
WO2010075688A1 (zh) Ims集群会议的创建和加入方法、装置及系统
CN103139745A (zh) 紧急呼叫实现方法、系统及归属网络、拜访网络服务装置
CN104661203B (zh) 一种呼叫方法及设备
CN111866763B (zh) 功能别称的处理、请求,管理方法及装置
US9628298B2 (en) Routing technique
US10869178B1 (en) Emergency location service
CN109089000B (zh) 语音呼叫处理方法及装置
CN117998346A (zh) Ims业务的请求方法、终端及核心网设备
TWI528776B (zh) 終端設備及網路協定語音通信方法
KR100836259B1 (ko) 영상통화 제한 서비스 제공 방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23787627

Country of ref document: EP

Kind code of ref document: A1